-
To protect us from the risks of advanced artificial intelligence, we need to act now
Artificial intelligence can play chess, drive a car and diagnose medical issues. Examples include Google DeepMind’s AlphaGo, Tesla’s self-driving vehicles, and IBM’s Watson. This type of artificial intelligence is referred to as Artificial Narrow Intelligence (ANI) – non-human systems that can perform a specific task. With the next generation of AI the stakes will almost certainly be much higher. Artificial General Intelligence (AGI) will have advanced computational powers and human level intelligence. AGI systems will be able to learn, solve problems, adapt and self-improve. They will even do tasks beyond those they were designed for. The introduction of AGI could quickly bring about Artificial Super Intelligence (ASI). When ASI-based systems arrive, there is a great and natural concern that we won’t be able to control them.
-
-
Interview with "Virtual Terror" author Daniel Wagner
“One of the characteristics of Virtual Terrorism is that it allows countries like North Korea (and Iran) to punch well above their weight in the cyber arena, and conduct their own form of ‘diplomacy’ on the cyber battlefield. These countries have already attacked the U.S. and other countries – all countries with the capability to do so, do so,” says Daniel Wagner. “The best way to fight it is to help ensure that as many people as possible understand what it is, what some of the challenges are in fighting it, and what can we do about it.”
-
-
Data breaches are inevitable – here’s how to protect yourself anyway
It’s tempting to give up on data security altogether, with all the billions of pieces of personal data – Social Security numbers, credit cards, home addresses, phone numbers, passwords and much more – breached and stolen in recent years. But that’s not realistic – nor is the idea of going offline entirely. In any case, huge data-collection corporations vacuum up data about almost every American without their knowledge. As cybersecurity researchers, we offer good news to brighten this bleak picture. There are some simple ways to protect your personal data that can still be effective, though they involve changing how you think about your own information security.
-
-
Huawei industrial espionage in Poland leads to calls for boycott
The Chinese telecom giant’s industrial espionage activities in Poland have prompted calls for the company to be banned. The United States is leading the push for a boycott, but many EU governments remain undecided. Huawei offers a capable 5G technology, which represents a quantum leap in wireless communication speed, and which will be key to developing the Internet of Things (IoT), including self-driving cars. Critics charge that much of that technology was stolen from Western companies by Chinese intelligence agencies, for which Huwawei serves as a front.
-
-
The quiet threat inside ‘internet of things’ devices
As Americans increasingly buy and install smart devices in their homes, all those cheap interconnected devices create new security problems for individuals and society as a whole. The problem is compounded by businesses radically expanding the number of sensors and remote monitors it uses to manage overhead lights in corporate offices and detailed manufacturing processes in factories. Governments, too, are getting into the act – cities, especially, want to use new technologies to improve energy efficiency, reduce traffic congestion and improve water quality. The number of these “internet of things” devices is climbing into the tens of billions. They’re creating an interconnected world with the potential to make people’s lives more enjoyable, productive, secure and efficient. But those very same devices, many of which have no real security protections, are also becoming part of what are called “botnets,” vast networks of tiny computers vulnerable to hijacking by hackers.
-
-
Manafort wanted polling data sent to Ukrainians
When, during the 2016 campaign, Paul Manafort sent Trump campaign’s internal polling data to Konstantin Kilimnik – a cut-out for the GRU, Russia’s military intelligence branch — he intended that data to be handed off to two Kremlin-allied Ukrainian oligarchs, Serhiy Lyovochkin and Rinat Akhmetov. Manafort told his accountant in August 2016 he was expecting $2.4 million from Ukraine in November 2016. His spokesman insists that money was payment for an old debt and not the data.
-
-
How Russia hacked U.S. power grid
In an aptly titled investigative report — “America’s Electric Grid Has a Vulnerable Back Door—and Russia Walked Through It” — the Wall Street Journal has used “documents, computer records and interviews” to reconstruct exactly how Russian hackers accessed the U.S. electric grid in the spring of 2016, an attack that continued through 2017 and possibly 2018.
-
-
Manafort shared Trump campaign polling with Konstantin Kilimnik, a cut-out to Russian intelligence
While he was the chairman of the Donald Trump presidential campaign, Paul Manafort shared internal campaign polling data with Konstantin Kilimnik, a cut-out for the GRU, Russia’s military intelligence service. Analysts believe he is, in fact, a Russian intelligence operative. It appears that the Trump campaign’s internal data Manafort shared with Russian intelligence was aimed to help the GRU to make the Kremlin’s social-media disinformation effort on behalf of Trump more targetd and effective, especially in suppressing the African American vote for Hillary Clinton. Kilimnik was indicted by Special Counsel Robert Mueller’s grand jury on 8 June 2018 on charges of obstruction of justice and conspiracy to obstruct justice by attempting to tamper with a witness on behalf of Manafort.
-
-
Hundreds of German politicians hacked – except those on the pro-Russia far right
The personal and job-related information of German Chancellor Angela Merkel, senior politicians, and members of the Bundestag from all political parties was released by hackers and posted to Twitter. The leaked information included office letters, internal memos, departmental communicatin, contact details, office access passcodes, and more. The only politicians who were not hacked and the information of which was not released: Members of the populist, far-right, pro-Russia Aleternative for Germany (AfD). In the run-up to the fall 2017 federal election in Germany, the GRU, Russia’s military intelligence, helped the AfD by employing the same combination of hacking and social media disinformation the GRU had succefully used to help Donald Trump win the 2016 U.S. election. The Russian campaign was successful, and the AfD is now the thiord-largest party in the Bundestag.
-
-
AI advancement opens health data privacy to attack
Advances in artificial intelligence have created new threats to the privacy of health data, a new study shows. The study suggests current laws and regulations are nowhere near sufficient to keep an individual’s health status private in the face of AI development.
-
-
Cybercrime is on the rise, and Norway is worried
As society becomes ever more technology-driven and digitized, electronic crime is rising along with it. In Norway, cybercrime results in an annual loss of 0.64 percent of Norway’s GDP — this amounts to NOK 19 billion ($2.2 billion) a year, money that does not benefit society.
-
-
Russian interference: Far, wide, ongoing, and successful
Thanks to the bipartisan, exhaustive work of the Senate Intelligence Committee, we now know more about Russia’s broad, sustained effort to help Donald Trump win the 2016 U.S. presidential campaign. This effort was similar to Russia’s interference campaign in more than two dozen other countries, aiming to bring to power – or increase the power of – leaders, parties, and movements who would be more accommodating toward Russia’s interests. Here is how the U.S. media covered the two important reports written based on material gathered by the Intel Committee.
-
-
The time of the trolls
The West woke up to the threat of Kremlin trolls in 2016, however it had already been very damaging in 2014–2015. The Ukraine crisis saw the deployment of trolls to Facebook and VKontakte, as well as YouTube and Twitter. The investigation into Russian meddling in the U.S. presidential election showed that trolling was never completely dependent on a technology like bots, nor that it was predominantly about Kremlin employees sitting somewhere in Russia manufacturing anti-Clinton propaganda. Rather, it was ordinary Americans and Europeans that were sharing the messages launched by trolls, and often posting them themselves.
-
-
Sen. Warner: Moscow has closed cyber gap with U.S.
The top Democrat on the Senate Intelligence Committee warns the United States is being outgunned in cyberspace, already having lost its competitive advantage to Russia while China is rapidly closing in. “When it comes to cyber, misinformation and disinformation, Russia is already our peer and in the areas of misinformation or disinformation, I believe is ahead of us,” Senator Mark Warner told an audience Friday in Washington.
-
-
Butina pleads guilty to meddling in U.S. politics under the direction of “Russian Official”
ABC News has obtained a copy of Maria Butina’s plea agreement, and she has decided to plead guilty to conspiracy charges and cooperate with authorities’ ongoing investigations. Butina admits that she and an unnamed “U.S. Person 1,” which sources have identified as longtime Republican operative Paul Erickson, with whom she had a multiyear romantic relationship, “agreed and conspired, with a Russian government official (“Russian Official”) and at least one other person, for Butina to act in the United States under the direction of Russian Official without prior notification to the Attorney General.”
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.