Seven questions for reporters, lawmakers, and the public to demand answers.
Christopher Wylie goes on the record to discuss his role in hijacking the profiles of millions of Facebook users in order to target the US electorate
Wise words on risks of accuracy in profiling, customized crafting of messages, impersonation and loss of confidence in authentication of individual. I am not sure how otherwise relevant scale and speed of AI can be. Limitations on information input, absorption and processing capability of human beings are blessings that cap the output power any information presentation system. The danger is not in death by a thousand cuts of utterly confused and zombie citizens, but one mission bullets which then are not effective for mass deception, and easier to defend against their best logical targets of critical decision makers.
Today, waging information warfare is a manpower-intensive effort. What if that changes?
A few years ago, shortly after stepping down as Assistant Attorney General for National Security, I published a long article called Law Enforcement as a Counterterrorism Tool. As its title suggests, the article’s central thesis was that law enforcement methods are useful in combating international terrorism. I did not try to make the case that law enforcement is the only, or even necessarily the best, way of combating terrorism.
Reality is no longer what you think it is.
The Kremlin-backed troll farm at the center of Russia’s interference in the 2016 U.S. election has quietly suffered a catastrophic security breach, The Daily Beast has confirmed, in a leak that spilled new details of its operations onto obscure corners of the internet.
Two Democratic senators on Wednesday asked major vendors of U.S. voting equipment whether they have allowed Russian entities to scrutinize their software, saying the practice could allow Moscow to hack into American elections infrastructure.
On Feb. 13, our colleague Robert Chesney flagged the upcoming Cyber Command legal conference titled “Cyberspace Operations in the Gray Zone.” The conference—which begins Monday morning and involves heavy interagency and private sector and academia participation—is set to address a number of key international and domestic law issues surrounding cyberspace operations, such as the exploiting of social media in the gray zone, the characterizing of information warfare in cyberspace, the protecting of domestic information systems, the countering of gray zone cyber threats, technology and warfare, and privacy implications of military cyberspace operations.
Litvinenko defected, this guy was exchanged. Not that FSB can’t. Seems pretty bold, unnecessary and out of line for exchanges. A false flag, attempt to chill exchanges or a prelude to a planned tit-for-tat misdirection?
The man, living in the UK, was one of two exposed to a “substance” in Salisbury, the BBC is told.