Seven questions for reporters, lawmakers, and the public to demand answers.
Christopher Wylie goes on the record to discuss his role in hijacking the profiles of millions of Facebook users in order to target the US electorate
The Trump administration has accused Russia of a coordinated “multi-stage intrusion campaign” to hack into critical U.S. infrastructure networks and conduct “network reconnaissance” while attempting to delete evidence of their intrusions.
The king is dead, long live the king!
Nectome will preserve your brain, but you have to be euthanized first.
In this second post in our series about Canada’s national security law reform, we begin a discussion of changes proposed for the Communications Security Establishment (CSE), Canada’s primary signals intelligence and cybersecurity agency. We focus specifically on how Canada will address an issue that has also arisen in allied states: oversight of bulk collection that may incidentally include communications involving nationals.
Petrochemical companies were hit by a series of cyberassaults last year. The worst of them, against a widely used safety system, could have set off an explosion.
This picture is much better than Anglteon and that whole week of bad photos.
Cyber events of the past two years—perpetrated by state actors in several notable cases, according to public statements by the U.S. and British governments— have demonstrated the potential for damaging impact to national security, critical infrastructures, and the global economy. Electric power distribution, healthcare services, pharmaceutical manufacturing and global shipping have all suffered significant disruptions, … Continue reading “The ‘Greek Tragedy’ of Cyber Security: We Know How This Ends”
Wise words on risks of accuracy in profiling, customized crafting of messages, impersonation and loss of confidence in authentication of individual. I am not sure how otherwise relevant scale and speed of AI can be. Limitations on information input, absorption and processing capability of human beings are blessings that cap the output power any information presentation system. The danger is not in death by a thousand cuts of utterly confused and zombie citizens, but one mission bullets which then are not effective for mass deception, and easier to defend against their best logical targets of critical decision makers.
Today, waging information warfare is a manpower-intensive effort. What if that changes?
A few years ago, shortly after stepping down as Assistant Attorney General for National Security, I published a long article called Law Enforcement as a Counterterrorism Tool. As its title suggests, the article’s central thesis was that law enforcement methods are useful in combating international terrorism. I did not try to make the case that law enforcement is the only, or even necessarily the best, way of combating terrorism.