U.S. carried out cyber strike on Iran after Saudi oil attack | How one tweet turned pro-China trolls against the NBA | Bot-like Turkish accounts complement military operation in Syria
The United States carried out a secret cyber operation against Iran in the wake of the Sept. 14 attacks on Saudi Arabia’s oil facilities, which Washington and Riyadh blame on Tehran, two U.S. officials have told Reuters. Reuters
A review of nearly 170,000 tweets, plus analysis from expert information warfare researchers, shows that Morey was the target of what appears to be a coordinated harassment campaign after his tweet on Oct. 4 set off an international furor and threatened the NBA’s future in the world’s most populous country. Wall Street Journal
As Turkish forces continued to bombard the Kurdish militia allied with the United States in its counter-Islamic State campaign in northeastern Syria, Turkish accounts waged a parallel hashtag campaign on Twitter: #BabyKillerPKK. DFR Lab
The Chinese party-state engages in data collection on a massive scale as a means of generating information to enhance state security—and, crucially, the political security of the Chinese Communist Party (CCP)—across multiple domains. The party-state intends to shape, manage and control its global operating environment so that public sentiment is favourable to its own interests. This report explains how the party-state’s tech-enhanced authoritarianism is expanding globally. The effort doesn’t always involve distinctly coercive and overtly invasive technology, such as surveillance cameras. In fact, it often relies on technologies that provide useful services.
Read Dr Samantha Hoffman’s accompanying article in The Strategist: Engineering global consent: the Chinese Communist Party’s data-driven power expansion
Australian CEOs are too overoptimistic for cybersecurity, out of touch on privacy
Only 6% of surveyed CEOs think their organisation has suffered a data breach in the last year, but 63% of their CISOs say they have, according to Unisys research. Big disconnect.
Chinese tech firm Huawei is taking Australian students to China as ‘ambassadors’
Adelaide students are going on all-expenses-paid trips to China with banned tech company Huawei, thanks to Federal Government funding.
How One Tweet Turned Pro-China Trolls Against the NBA
The Wall Street Journal
A review of nearly 170,000 tweets, plus analysis from expert information warfare researchers, shows that Morey was the target of what appears to be a coordinated harassment campaign after his tweet on Oct. 4 set off an international furor and threatened the NBA’s future in the world’s most populous country.. There were 4,855 total users in all who had never tweeted until they replied to Morey, and 3,677 accounts didn’t exist until his tweet. “I’m not saying this is a state-affiliated operation,” Linvill said. “But I’ve only seen so many brand-new accounts used at one time when it was a state-affiliated operation.”
A graphic by the Wall Street Journal showing waves of tweets replying to Daryl Morey.
Chinese tech makes cities ‘smart,’ but critics say it spreads authoritarianism
Chinese 5G technology is designed to transmit huge amounts of data instantly, and deploy vast networks of surveillance cameras and facial recognition software. While dozens of countries around the world plan to adopt the innovation, human rights advocates and the U.S. are sounding the alarm. Nick Schifrin reports as part of "China: Power and Prosperity," with support from the Pulitzer Center.
China’s social credit system isn’t about scoring citizens — it’s a massive API
The Next Web
When most people think about the social credit system, they imagine it primarily as a scoring mechanism, a way for the central government to rank China’s citizens and companies based on their behavior. But that’s a skewed misconception of what social credit actually is. The social credit system, at its core, is perhaps better described as a data-sharing service; the more technical among you could reasonably think of it as a massive national API.
Fearing spies, Huawei redeploys US-linked executives
Nikkei Asian Review
Huawei Technologies is redeploying senior executives and scientists who have U.S. links due to growing concern inside China's biggest tech company that they could be co-opted by American agents and leak confidential data, multiple sources have told the Nikkei Asian Review.
With more US doors closing to China what are the supply chain options for its emerging AI champions?
South China Morning Post
China’s tech champions took a body check last week after eight of them were added to a US trade blacklist, preventing them from buying US technology. The companies will shrug off US move, but ultimately they will have to find domestic alternatives to current US hardware.
Huawei unveils new 5G antennae ahead of China ramp
Huawei Technologies on Wednesday launched a new generation of 5G mobile antennae, anticipating an acceleration in the pace of network upgrades led by the three operators in its vast Chinese home market.
U.S. carried out secret cyber strike on Iran in wake of Saudi oil attack: officials
The United States carried out a secret cyber operation against Iran in the wake of the Sept. 14 attacks on Saudi Arabia’s oil facilities, which Washington and Riyadh blame on Tehran, two U.S. officials have told Reuters.
Meet America’s newest military giant: Amazon
MIT Technology Review
The Pentagon’s controversial $10bn JEDI cloud computing deal is one of the most lucrative defense contracts ever. Amazon’s in pole position to win—and its move into the military has been a long time coming.
China's TikTok tries to stay ahead of D.C.'s tech backlash
Chinese-owned social media firm TikTok is enlisting former U.S. lawmakers amid a preemptive bid to sidestep the Silicon Valley backlash in Washington that's paralyzing so many larger U.S. tech giants like Facebook, Google and Twitter.
The hybrid-warfare crosshairs: Can India beat arch rivals Pakistan and China at their own game?
Economic Times India
Gone are the days when only the army, air force, and the navy fought in a war. Today, the focus has turned to hybrid warfare, in which the Internet and electronics are deadly weapons. While India has the manpower to fight in conventional military conflicts, experts feel it lacks the preparedness to take on its aggressive neighbours in a hybrid war.
Australia & India: Partners in a future with innovation
The Asian Age
India is a very important partner for Australia on innovation. India’s start-up sector is world class and, like India’s population, the market for innovative solutions for social and business problems is huge. It is no surprise companies from around the world are competing to enter the Indian market. As more Indians go online, India will grow to be the largest population of digitally connected people. India’s market for consumer technologies and the masses of data created will be an important asset that will require careful management.
A Women in Tech event at CyFy India Conference. Source: Harinder Sidhu
UK vulnerable to malicious meddling in election, warns study
Britain needs to take concerted action to reduce the risk of malicious actors in the UK and abroad from contaminating the results of a looming general election, according to a new study that warns of the risks of public “abuse and deception”.
UK quietly ditches porn age checks in favor of wider online harms rules
A controversial UK government scheme to introduce mandatary age checks for accessing online pornography has been dropped — for now.
Argentinian security researcher arrested after tweeting about government hack
Argentinian police briefly detained and raided the home of a well-known security researcher last week on suspicion of hacking and leaking data from government systems. Following his release, Javier Smaldone, the security researcher, obtained and published court documents pertaining to his arrest on Twitter.
The Middle East
Bot-like Turkish accounts complement military operation in Syria
As Turkish forces continued to bombard the Kurdish militia allied with the United States in its counter-Islamic State campaign in northeastern Syria, Turkish accounts waged a parallel hashtag campaign on Twitter: #BabyKillerPKK.
Mysterious UAE Cyber Firm Luring ex-Israeli Intel Officers With Astronomical Salaries
Probe finds DarkMatter works for UAE’s intelligence agency attacking Western targets, journalists and human rights activists, with graduates of Israel's Defense Forces earning up to $1 million annually.
Feds Bust One of the Dark Web's Biggest Child Porn Sites Thanks to Tremendously Bad Opsec
The site, "Welcome to Video," hosted 8 terabytes of child porn. More than 337 people have been arrested in 38 countries.
Google employees are fighting over their company’s decision to ban a Hong Kong protest video game app
The move has helped spark a fiery debate playing out on the search giant’s internal mailing lists.
The Lines of Code That Changed Everything
Apollo 11, the JPEG, the first pop-up ad, and 33 other bits of software that have transformed our world.
Mind-reading technology is everyone's next big security nightmare
While the hardware can be made as secure as possible, turning our thoughts into a digital form will put them at risk just like any other data.
How A Massive Facebook Scam Siphoned Millions Of Dollars From Unsuspecting Boomers
Asher Burke built his company, Ads Inc, on the back of one of the internet’s most persistent, lucrative, and sophisticated scams — the subscription trap. And then it all fell apart.
Moving beyond ‘Zuck sucks’
Columbia Journalism Review
@amnadler @Hamsini_S @dorontaussig
Tech journalism has made impressive strides in recent years. Journalists covering Silicon Valley have increasingly embraced the role of “watchdog” rather than “mascot”—a development that marked the rise of “adversarial” tech reporting.
Influence wanes as likes are hidden.
The disruptors are becoming the disrupted. Facebook’s shock move to drop the “like” count from Instagram and its own app has thrown the business models of influencers and their agencies into question.
AT&T and Verizon Don't Want You To Know Where 5G Really Is
Big Telecom is resisting efforts by the government to require it to include 5G availability in broadband maps.
The unexpected norm-setters: Intelligence agencies in cyberspace
Contemporary Security Policy
By implementing novel intelligence techniques in cyberspace, security and intelligence agencies have become major actors in the cybersecurity landscape. As they no longer just passively gather information for their governments but conduct both defense and offense operations in cyberspace, they signal international actors that their conduct is at least tolerable, even if not officially acceptable.
Expanding Disclosure Policy to Drive Better Cybersecurity
Council on Foreign Relations
Companies should disclose instances of cyber-enabled intellectual property theft. Disclosure requirements would give companies greater incentives to protect their intellectual property and allow investors to make better-informed decisions.
Cyber Security Hypothetical – Panel
We invite you to join us on 22 October, in challenging paradigms and provoking discussion around this important topic that impacts and targets us all. Cyber Security Hypothetical will be led and moderated by Mr Steve Wilson and panellists will include MAJGEN Marcus Thompson, Professor Michael Frater, Mr Alastair MacGibbon, Ms Kate Carruthers and Mr Justin Warren.
The rise of information warfare: in-conversation with Peter W. Singer
This event for 29 October is SOLD OUT but you can watch a livestream on the ASPI facebook page - ASPI's International Cyber Policy Centre invites you to an in-conversation with Peter W. Singer and Danielle Cave to consider the rise of information warfare. Peter Warren Singer is strategist and senior fellow at New America. He has been named by the Smithsonian as one of the nation’s 100 leading innovators, by Defense News as one of the 100 most influential people in defense issues, by Foreign Policy to their Top 100 Global Thinkers List, and as an official “Mad Scientist” for the U.S. Army’s Training and Doctrine Command. A drinks and canapes reception will conclude the event. This event is kindly supported by Microsoft.