21 Dec 2018

Plan to Dumb-Down the Power Grid In Name of Cybersecurity Passes Senate

The Senate passed a measure to establish a two-year pilot program to investigate the possibilities of analog systems to be integrated into the U.S. power grid in order to prevent cyber vulnerabilities. Introduced in 2017 and approved by the Energy and Natural Resources Committee, a mirror version of the “retro

Read More
20 Dec 2018

Your High-Tech Car Is a Magnet for Hacking

“Hopping into an Uber or a Car2Go is a great way to get around. Unfortunately, hackers agree, exploiting weaknesses in apps to go on ‘phantom rides’ with someone else’s profile. From such trips—like a man in Australia who went on more than 30 free drives on the GoGet car-sharing platform

Read More
20 Dec 2018

Canadian Hacker Talks to Arizona Man Directly Through His Nest Security Camera

A Canadian “white hat” hacker spoke directly to somebody in Arizona through a hacked Nest security camera, allegedly as part of an effort to warn people of the security risks of such devices. The method the hacker(s) employed to access the device were not highly sophisticated, and allegedly involved using

Read More
18 Dec 2018

Ex-CIA director: It’s a tech war, not a trade war

Michael Morell, former acting director of the CIA, has characterized the ongoing China-U.S. trade war as a “an escalating technological cold war…not centered on tariffs and trade…[but] involves both China’s use of technology to steal information and the theft of technology itself.” In the area of telecommunications, Morell warns that

Read More
17 Dec 2018

The Amazing Ways Facial Recognition AIs Are Used In China

“The country on the cutting edge of facial recognition technology and the amazing ways it can be put to use is definitely China. While the Chinese government and many of the country’s current systems, large population (more than 1.3 billion citizens) and centralized identity data bases might make adopting facial

Read More
17 Dec 2018

U.S. Customs and Border Protection Is Using Retinal Scans to Try to Catch Liars

“U.S. Customs and Border Protection is using a futuristic eye-scanning device to weed out dishonest potential recruits during the initial application phase. That’s according to a detail contained within a blistering report from the Homeland Security Department’s Office of the Inspector General released last week. The report criticizes the agency for wasting millions

Read More
14 Dec 2018

The Growing Gulf Between Silicon Valley and Washington: A National Security Issue

The gap between Silicon Valley’s tech giants and Washington, especially the Defense Department and the Intelligence Community, is a national security issue, according to a recent opinion piece in The Atlantic. While decisions on tough foreign policy actions against actors like China and Russia have become increasingly bipartisan, tech giants

Read More
12 Dec 2018

The Grim Future of Urban Warfare

In spite of technologies like surgical missile strikes that carry the potential of limiting civilian casualties compared with more indiscriminate bombings, this NextGov prediction on the nature of future warfare is a dark one. “War has changed and remained the same…war is always bad, but it’s going to become much

Read More
11 Dec 2018

Blurry satellite photos of military bases reveal more than they hide

“Open-source researchers often use satellite images, especially across multiple providers, to uncover information that is otherwise difficult to obtain. In November 2017, the World Bank released an analysis of satellite footage of ISIS-held territory to reveal that the statelet was struggling to produce oil. In September 2018, open-source investigation house

Read More
11 Dec 2018

‘PowerSnitch’ Hacks Androids via Power Banks

“An inexpensive Android hacking tool can create a covert communications channel in the power current generated while a smartphone charges on a power bank. The so-called ‘PowerSnitch’ attack, which was demonstrated here this week by Oxford University researcher Riccardo Spolaor, shows that a determined hacker doesn’t actually need a network

Read More