-
Hackers: A Psychological Profile
Whether cracking digital security for good or ill, hackers tend to be people who are manipulative, deceitful, exploitative, cynical and insensitive, according to research. The study analyzed the psychological profiles of college students in computer science and management to see which personality traits led to three different kinds of computer hacking: white hat, gray hat and black hat.
-
-
Election Security after Iowa
The Iowa caucus debacle offers an illustration of election security failure in action, and the failure was followed by public anger and the spreading of conspiracy theories. Simon Handler writes that “If the Iowa caucus delay is any indication of how the public may react to an electoral snafu, a great deal more mayhem could arise from a far more serious threat.” In 2015 Russian cyberattacks shutdown power stations in Ukraine, causing blackouts in parts of the country. “Disrupting power distribution at the right moment in the right portions of the U.S. grid, targeting a few select states or counties, could cause just enough disruption to bring on a level of chaos that would dwarf what happened in Iowa,” Handler writes.
-
-
U.S.: Chinese Government Hackers Behind Equifax Breach
Chinse government hackers stole the personal information of nearly 150 million Americans in 2017, when they successfully hacked Equifax. China has been using its vast network of intelligence agencies to conduct a sustained campaign aiming to collect data on the citizens of the United States and other countries, and systematically steal scientific research and innovation, in order to weaken Western economies and accelerate China’s march toward global scientific and economic hegemony.
-
-
Senate Intel: Obama Admin “Frozen by ‘Paralysis of Analysis’” in Its Response to Russian Election Interference
Senate Select Committee on Intelligence on Thursday released the third volume in the Committee’s bipartisan investigation into Russian election interference. The report examines the Obama administration’s reaction to initial reports of election interference and the steps officials took or did not take to deter Russia’s activities. The 2016 Russian interference in the elections on behalf of Donald Trump was unprecedented in the history of the United States, but “Frozen by ‘paralysis of analysis,’ hamstrung by constraints both real and perceived, Obama officials debated courses of action without truly taking one,” said Committee Chairman Richard Burr (R-North Carolina).
-
-
Thwarting Hacks by Thinking As the Humans Behind Them
If we understood the humans behind hacking incidents – and their intent – could we stop them? Research reveals the importance of factoring in a hacker’s motive for predicting, identifying and preventing cyberattacks.
-
-
Russia Unleashes New Weapons in Its “Cyber Attack Testing Ground”: Report
“Ukraine is, by and large, a Russian cyberattack testing ground,” Vitali Kremez told Forbes’s Zak Doffman. “One of the inherent cyber dangers with Russia, China, Iran and North Korea, but particularly with Russia, is the potential for state actors to sharpen their tools and techniques on neighboring countries,” Doffman writes. And Russia “doesn’t have Ukraine in its sights with this costly approach, it is looking much further west.”
-
-
USC Kicks Off 50-State Election Cybersecurity Trainings
Today, 28 January, the University of Southern California is kicking off its nonpartisan, independent, 50-state election cybersecurity training initiative in Maryland. Attendees will learn how to best protect their campaigns against misinformation and disinformation, hacking threats, and how to prepare and manage a potential crisis.
-
-
U.S.: “Serious consequences” If U.K. Allows Huawei Access to Britain’s 5G Network
President Donald Trump has warned British Prime Minister Boris Johnson of “serious consequences” if he allows the Chinese telecom giant Huawei a role in building Britain’s 5G phone network, according to officials on both sides of the Atlantic. Supporters of allowing Huawei access to U.K. communication infrastructure say that the espionage and disruption risk Huawei poses can be mitigated by limiting Huawei’s access to “non-core” segments of Britain’s communication system, but U.S. intelligence officials and their counterparts at Britain’s GCHQ, the eavesdropping spy agency and the country’s largest intelligence service, say restricting Huawei to the non-core “edges” of the new network would make little difference to the security risk.
-
-
It Is Now 100 Seconds to Midnight
The Bulletin of the Atomic Scientists’ Doomsday Clock is now closer to midnight than ever in its history. The Bulletin cites worsening nuclear threat, lack of climate action, and rise of “cyber-enabled disinformation campaigns” in moving the clock hand. December 2020 marks the 75th anniversary of the first edition of the Bulletin of the Atomic Scientists, initially a six-page, black-and-white bulletin and later a magazine, created in anticipation that the atom bomb would be “only the first of many dangerous presents from the Pandora’s Box of modern science.”
-
-
Encryption “Backdoors” Would Weaken Election Security: Election Protection Coalition
A coalition working on improving elections security sent a letter to Attorney General William Barr Wednesday, criticizing the AG for recent comments he made in he called on tech companies to create a “backdoor” in their devices. The backdoor would allow law enforcement to examine the communications of individuals arrested on suspicion of committing crimes or engaging in terrorism.
-
-
Letting “A Fox Loose in A Chicken Coop”: U.K. Intel Anxious about Huawei Deal
High-level officials at the U.K. Government Communications Headquarters (GCHQ), the British equivalent of the U.S. NSA (and Britain’s largest intelligence agency), said they were concerned about the imminent decision by the government of Boris Johnson to allow Huawei access to the U.K. new telecoms network infrastructure. A high-level GCHQ source told The Times that handing Huawei access the U.K. telecom networks would be akin to “letting a fox loose in a chicken coop.”
-
-
Israeli Court to Hear Case against Spy-Software Company NSO Behind Closed Doors
On Thursday, a judge at Tel Aviv’s District Court begin hearing arguments as to why Israel’s Ministry of Defense (MoD) should revoke the export license of NSO Group. The firm’s Pegasus software has been used to target journalists and activists in several countries – including in Morocco, Saudi Arabia, Mexico, and the United Arab Emirates.
-
-
Why Britain's Spooks Are Wrong to Downplay the Risks of Huawei
The U.K. wants Huawei’s 5G technology because of what John Hemmings correctly describes as the company’s “laughably cheap prices” (Huawei’s prices are cheap because the company is heavily subsidized by the Chinese government). Hemmings writes that it is this desire for inexpensive technology which leads British decisionmakers – among them Sir Andrew Parker, the outgoing director of MI5, Britain’s spy agency — to ignore the geopolitical context of an increasingly authoritarian China, which is funding Huawei’s expansion across Europe, and also ignore the reason behind China’s promotion of Huawei: The fact that China is the leading source of global cyber espionage.
-
-
If Russia Hacked Burisma, Brace for the Leaks to Follow
The Kremlin hackers who helped put Donald Trump in the White House are at it again – this time in an effort to keep him there, and the hacking of the Ukrainian energy company Burisma by hackers of the GRU, Russia’s military intelligence service, is one of the first plays in their new campaign. Andy Greenberg writes that what should worry Americans – both voters and journalists – is the next play: the selective release of documents – some forged, some doctored – by Kremlin disinformation and propaganda specialists, timed to inflict maximum damage on Joe Bide’s campaign and be of maximum help to the Trump campaign. Greenberg asks: “Did the U.S. learn enough from 2016 to ignore” such selective leaks?
-
-
Latest “Intrusion Truth” Data Dump Peels Back Layers on Chinese Front Companies
Intrusion Truth, the anonymous group which gained a name for itself by publishing detailed blog posts about suspected nation-state hackers, released new information last Thursday detailing how Chinese technology companies are recruiting attackers working on Beijing’s behalf.
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.