Julian Assange Charges, Japan's Top Cybersecurity Official, and More Security News This Week

Julian Assange Charges, Japan's Top Cybersecurity Official, and More Security News This Week

Security News This Week: Japan's Top Cybersecurity Official Has Never Used a ComputerTOSHIFUMI KITAMURA/AFP/Getty ImagesThe US refused to join a new global cybersecurity agreement this week—maybe because it was created by French president Emmanuel Macron, with whom President Trump isn’t on great terms with.On the same day, internet traffic that was supposed to route through Google’s cloud servers instead went haywire, traveling through unplanned servers based in the likes of Russia and China.

Surveillance Kills Freedom By Killing Experimentation

Surveillance Kills Freedom By Killing Experimentation

Of course the story is more complicated than that, but the ability for members of society to privately smoke weed was essential for putting it on the path to legalization.We don’t yet know which subversive ideas and illegal acts of today will become political causes and positive social change tomorrow, but they’re around.

Top US Intelligence Official Sue Gordon Wants Silicon Valley on Her Side

Top US Intelligence Official Sue Gordon Wants Silicon Valley on Her Side

Artificial intelligence, she says, presents a huge opportunity for the government and the private sector, but the risks of its being abused, biased, or deployed by foreign adversaries is so real that the government and tech companies should be collaborate to secure it.Some in tech openly agree with that notion—Bezos told the audience at WIRED 25 last month that “if big tech companies are going to turn their back on US Department of Defense, this country is going to be in a lot of trouble”—much of the rank and file are uneasy or flat-out hostile to the idea of working with the government on matters of war.Google, in particular, has had a recently rocky relationship.

Mozilla's 'Privacy Not Included' Gift Report Highlights Security Concerns

Mozilla's 'Privacy Not Included' Gift Report Highlights Security Concerns

And in some cases, it’s easy to forget that they’re even connected to the internet.”Among the important signifiers of a trustworthy stocking stuffer, according to Mozilla’s rubric: the use of encryption, pushing automatic software security updates, strong password hygiene, a way to deal with vulnerabilities should they arise, and a privacy policy that doesn’t take a PhD to parse."We’re trying to give people essentially a way to look at any product and what to look for, what questions to ask."Ashley Boyd, MozillaThe most surprising result of Mozilla’s testing may be how many products actually earned its seal of approval.

The US Sits out an International Cybersecurity Agreement

The US Sits out an International Cybersecurity Agreement

“The private sector is now willing to say that we can and we will do more.”"Over the past three or four years, we’ve really seen a groundswell of private leadership."Megan Stifel, Public KnowledgeIn April, Microsoft announced the Cybersecurity Tech Accord, an agreement similar to the Paris Call that was signed by more than 60 technology corporations, which it dubbed a “a Digital Geneva Convention.” In July, the company publicly advocated for the regulation of facial recognition technology and said it was developing its own set of principles for how it should be used.

Hey! Know-It-Alls! Can I Vote Online?

Hey! Know-It-Alls! Can I Vote Online?

You should probably just bring it.In some states you can bring your phone into the voting booth with you, and even post a “ballot selfie,” but in others you can’t, so again, check your local election sites.

Citing No Evidence, Brian Kemp Accuses Georgia Democrats of Hacking

Citing No Evidence, Brian Kemp Accuses Georgia Democrats of Hacking

Now, two days before an election in which Kemp himself is the Republican candidate for governor, he has levied similarly unsupported charges—this time against his democratic opponents.The Georgia Secretary of State’s office released a short statement on Sunday morning that it had opened an investigation into the Democratic Party the previous evening, “after a failed attempt to hack the state's voter registration system.”The Democratic Party of Georgia sharply denied the accusations in a statement to reporters.

A Decade-Old Attack Can Break the Encryption of Most PCs

A Decade-Old Attack Can Break the Encryption of Most PCs

It's not super technically challenging."Segerdahl notes that the findings have particular implications for corporations and other institutions that manage a large number of computers, and could have their whole network compromised off of one lost or stolen laptop.'It's pretty quick and very doable for a knowledgable hacker.'Olle Segerdahl, F-SecureTo carry out the attack, the F-Secure researchers first sought a way to defeat the the industry-standard cold boot mitigation.

Trump's New Executive Order Slaps a Bandaid on Election Interference Problems

Trump's New Executive Order Slaps a Bandaid on Election Interference Problems

"We remain woefully underprepared to secure the upcoming elections, and an executive order is simply no substitute for congressional action," Democratic Senator Mark Warner of Virginia, the vice chairman of the Senate Intelligence Committee, said in a statement.Analysts also noted that the apparent lack of collaboration between the White House and Congress could indicate that the order is more of a bandaid than a concerted effort by the administration to build deterrents against election meddling."Trump is way late to the game.

How You Can Prepare to Evacuate Your Home for Hurricane Florence

How You Can Prepare to Evacuate Your Home for Hurricane Florence

How You Can Prepare to Evacuate Your Home for Hurricane Florence Here are some tips for getting ready: Make a plan, bring documents, close lids, clear the yard, blast the freezer.Illustration by Claire O'Neill/The New York TimesFor the latest updates, read our Hurricane Florence live briefing here.When a hurricane is poised to make landfall and the authorities issue an evacuation order, you may not have much time before you leave to protect your home from the storm — and from flooding.“People have a hard time internalizing, preparing for something that’s outside their realm of experience,” said J.

The 19th Century Argument for a 21st Century Space Force

The 19th Century Argument for a 21st Century Space Force

Security experts warn that Russia and China are both catching up and developing anti-satellite weapons capable of tripping up America’s strategic orbital foothold.The fourth thing to know about space power is, if America gives up its military dominance, expect its economic influence to wane as well.

How Google Chrome Spent a Decade Making the Web More Secure

How Google Chrome Spent a Decade Making the Web More Secure

So the original design of Chrome had two big pieces: auto-updates to make sure you always had the most updated version, and the Chrome sandbox to make sure that if there was a vulnerability that could be exploited we could confine that within the sandbox."'I will be very, very upset if three to five years from now password phishing is still something that we don’t feel we’ve largely solved.'Justin Schuh, Chrome EngineerThese features that set Chrome apart in 2008 are now an industry standard, but at the time Google received criticism for its new browser's big bets.

Riding With the Diplomatic Couriers Who Deliver America's Secret Mail

Riding With the Diplomatic Couriers Who Deliver America's Secret Mail

We’re on just one of thousands of such trips the service will execute this year as it delivers classified cargo, contained in tamper-proof orange pouches, to 270 US embassies and consulates around the world.The little-known, 100-year-old Diplomatic Courier Service works like your interoffice mail system, but on a planetary scale, with complex protocols and security measures that ensure the reliable transport of sensitive material by land, air, and sea.

Phone Numbers Were Never Meant as ID. Now We’re All At Risk

Phone Numbers Were Never Meant as ID. Now We’re All At Risk

Companies don't seem interested in catching up.'If it’s not a secret, then you can’t use it as an authenticator.'Jeremy Grant, Better Identity CoalitionIdentity management experts have warned for years about over-reliance on phone numbers.

Why strengthening land rights strengthens development

Why strengthening land rights strengthens development

Reflecting the importance of secure land ownership to the SDGs’ success, the World Bank Group is now working with developing countries to improve their land-tenure systems and expand the coverage of legally recognized and registered rights.