• Anonymizing Personal Data “Not Enough to Protect Privacy”: Study

    Current methods for anonymizing data leave individuals at risk of being re-identified, according to new research. Researchers demonstrated that allowing data to be used — to train AI algorithms, for example — while preserving people’s privacy, requires much more than simply adding noise, sampling datasets, and other de-identification techniques.

  • Making it Easier to Program and Protect the Web

    Behind the scenes of every web service, from a secure web browser to an entertaining app, is a programmer’s code, carefully written to ensure everything runs quickly, smoothly, and securely. MIT Professor Adam Chlipala builds tools to help programmers more quickly generate optimized, secure code.

  • FaceApp Makes Today’s Privacy Laws Look Antiquated

    Cameras are everywhere, and data brokers are vacuuming up information on individuals. But regulations have not kept pace. You should stop using FaceApp, because there are few controls on how your data, including your face data, will be used. But the problems that FaceApp poses aren’t unique. Walking around anywhere can get your face included in facial-recognition databases. How that information can be mined, manipulated, bought, or sold is minimally regulated—in the United States and elsewhere.

  • China Cyber Attacks on AFSPC Contractors ‘Stealing Us Blind’

    “Cyber keeps me up at night,” says Brig. Gen. DeAnna Burt, director of Air Force Space Command (AFSPC) operations and communications, because China’s cyber warriors are routinely breaching defense and space contractor networks and stealing data on a regular basis. “For every defense contractor in this room, the thing that keeps me up at night is how we manage data on your systems or your sub’s systems,” she warned. “We have had breaches … the Chinese and others stealing things from cleared defense contractors.”

  • A New Red Scare Is Reshaping Washington

    The Committee on the Present Danger, a long-defunct group that campaigned against the dangers of the Soviet Union in the 1970s and 1980s, has recently been revived with the help of Stephen K. Bannon, the president’s former chief strategist, to warn against the dangers of China. “These are two systems that are incompatible,” says Bannon. “One side is going to win, and one side is going to lose.”

  • Tackling Emerging Cyber-Social Threats

    DoD has awarded a $2.4 million grant to researchers to support the development of research infrastructure to assess social media and blogs in real time and respond to the growing weaponization of online discourse in influencing peacekeeping, and tactical, operational, and strategic operations.

  • Gaining Competitive Advantage for the U.S. in the Gray Zone

    The United States is entering a period of intensifying strategic competition with several rivals, most notably Russia and China. U.S. officials expect this competition to be played out primarily below the threshold of armed conflict, in what is sometimes termed the gray zone between peace and war. The United States is ill prepared and poorly organized to compete in this space, but the United States can begin to treat the ongoing gray zone competition as an opportunity more than a risk.

  • How Cyber Weapons Are Changing the Landscape of Modern Warfare

    In the weeks before two Japanese and Norwegian oil tankers were attacked, on 13 June, in the Gulf of Oman—acts which the United States attributes to Iran—American military strategists were planning a cyberattack on critical parts of that country’s digital infrastructure. On 20 June, the United States launched a cyberattack aimed at disabling Iran’s maritime operations. Then, in a notable departure from previous Administrations’ policies, U.S. government officials, through leaks that appear to have been strategic, alerted the world, in broad terms, to what the Americans had done.

  • These Hackers Made an App That Kills to Prove a Point

    Two years ago, researchers Billy Rios and Jonathan Butts discovered disturbing vulnerabilities in Medtronic’s popular MiniMed and MiniMed Paradigm insulin pump lines. An attacker could remotely target these pumps to withhold insulin from patients, or to trigger a potentially lethal overdose. And yet months of negotiations with Medtronic and regulators to implement a fix proved fruitless. So the researchers resorted to drastic measures. They built an Android app that could use the flaws to kill people.

  • Russia’s Election Hackers Are Back—and Targeting George Soros

    The Russian intelligence agency behind 2016’s election attacks is training its sights on billionaire financier George Soros. The move comes hot on the heels of a surge in U.S.-focused hacking by Russia’s Main Intelligence Directorate with similarities to 2016 in targeting and methodology. The Kremlin’s targeting of Soros and his organization carries echoes of 2016, when the GRU dumped 2,500 files stolen from the Open Society Foundations for the debut of “DC Leaks”, the fake leak site the spies created for their 2016 election interference campaign. 

  • Four Ways Blockchain Could Make the Internet Safer, Fairer, and More Creative

    The internet is unique in that it has no central control, administration or authority, but in recent years internet services such as search engines and social media platforms have increasingly been provided by a small number of very large tech firms. The internet is slowly turning into something like the current financial system, which centrally monitors all transactions and uses that data to predict what people will buy in future. Bitcoin, which surfaced on the internet in 2008, sought to break the influence that large, private bodies have over what we do online. The researchers had finally solved one of the biggest concerns with digital currencies – that they need central control by the companies that operate them, in the same way traditional currencies are controlled by a bank. People researching Bitcoin – and blockchains which undergird it — may have overlooked one of its most useful applications – making the internet better for everyone who uses it.

  • Cyberattack Attribution and the Virtues of Decentralization

    In the midst of rising tensions between the United States and Iran over tanker attacks and Iran’s downing of a U.S. drone, reports emerged that U.S. Cyber Command had launched a responsive cyber operation against a group linked to the Iranian Revolutionary Guard Corps. As cyber operations by both states heat up, non-governmental actors may play pivotal roles, not just as potential victims and collateral damage from states’ actions, but also as accusers of states.

  • As Feds Struggle, States Create Their Own Anti-election Propaganda Programs

    As the 2020 presidential campaign heats up, individual states are ramping up education efforts to counter the threat posed by foreign disinformation campaigns to US elections. A lack of action at the federal level has prompted many states to craft their own programs designed to counter foreign efforts to undermine American democracy and educate the next generation of voters in schools.

  • Europe Built a System to Fight Russian Meddling. It’s Struggling.

    The European Union launched an ambitious effort earlier this year to combat election interference: an early-warning system that would sound alarms about Russian propaganda. Despite high expectations, however, records show that the system has become a repository for a mishmash of information, produced no alerts and is already at risk of becoming defunct.

  • Report: Pentagon Should Assume U.S. Satellites Are Already Hacked

    The U.S. and its allies need to double down on the cybersecurity of their satellites as space infrastructure becomes ever more integral to national security, according to a recent report. The Pentagon and other Western military forces rely heavily on space-based systems to guide weapons, gather intelligence and coordinate operations around the globe, but security gaps in their satellite infrastructure threaten to bring those functions to a grinding halt or worse, a new Chatham House study found. Jack Corrigan, writing in Defense One, quotes the study’s authots to say that as adversaries like Russia and China ramp up their offensive cyber capabilities, the Western world needs to lock down its space infrastructure against potentially crippling attacks. And in the meantime, “it would be prudent” for countries to assume their systems have already been infiltrated.”