Cyber.RAR

Sophie Faaborg-Andersen, Winnona DeSombre, Bethan Saunders, Danielle Levin, Grace Park

Cyber.RAR is a podcast series from six Harvard Kennedy School students: Michaela Lee, Bethan Saunders, Winnona DeSombre, Danielle Levin, Sophie Faaborg-Andersen, and Grace Park. While each bring a different lens to the show, they all share a common conviction: the field of cybersecurity is rapidly evolving, yet the national security field is falling behind. In this podcast, they uncover why the U.S. government struggles to build basic cyber infrastructure​​, explore how to regulate offensive cyber capabilities, debate the meaning and merits of “hacktivism”, and laugh with each other along the way. Tune in to Cyber.RAR for discussions, debates, and expert interviews on the biggest questions, challenges, and opportunities in cybersecurity.

  1. 30/11/2022

    Is Big Tech Imploding? Cybersecurity and Content Moderation

    Big Tech, honey, are you doing okay?   Whether we like it or not, large technology platforms and the for-profit institutions that make them are here to stay in our society and economy. Governments are starting to craft often-overlapping regulations to try and fix the problems that come up, but instead of looking at issues one by one, let's look at these organizations as a whole - fundamentally “grow fast and break things” companies who somehow ended up in shouldering a lot of our national security, growing the international economy, and protecting values that underpin our Western society. How well does big tech help or hinder our security, privacy, and social fabric, and how will that change as the economy slows down?  Show notes: Twitter:Content moderation & security: Mudge whistleblower complainthttps://techcrunch.com/2022/09/13/twitter-whistleblower-mudge-congress/Deplatforming vs. Echo chambershttps://www.vanderbilt.edu/jetlaw/2021/01/31/the-de-platforming-debate-balancing-concerns-over-online-extremism-with-free-speech/https://www.youtube.com/watch?v=6V_sEqfIL9Qhttps://www.axios.com/2021/12/06/conservative-social-media-crypto-publishing-internetStaffing at Twitterhttps://www.reuters.com/technology/after-elon-musks-ultimatum-twitter-employees-start-exiting-2022-11-18/Radioshack tries to sell off user datahttps://www.washingtonpost.com/news/the-switch/wp/2015/03/26/bankrupt-radioshack-wants-to-sell-off-user-data-but-the-bigger-risk-is-if-a-facebook-or-google-goes-bust/Uber:Uber CISO court case: https://www.csoonline.com/article/3676078/what-the-uber-verdict-means-to-cisos-youre-probably-not-going-to-jail.html   Facebook / Meta:Advisory board / election issueshttps://www.cnn.com/2021/10/05/world/meanwhile-in-america-oct-6-intlBody issues re: instagram https://www.npr.org/2021/10/05/1043194385/whistleblowers-testimony-facebook-instagramOverlapping foreign government action + industrial policyState overlapping privacy lawshttps://www.ncsl.org/research/telecommunications-and-information-technology/state-laws-related-to-internet-privacy.aspx   China data privacy laws / increased balkanization of internethttps://www.ey.com/en_kw/forensic-integrity-services/how-chinas-data-privacy-and-security-rules-could-impact-your-business  Google’s Operation Aurora: https://www.youtube.com/watch?v=przDcQe6n5oCybersecurity in a technology recession (cyber security as compliance)Google being told to cut costs by VChttps://www.businessinsider.com/google-layoffs-cost-cutting-analyst-2022-11   Benefits of security / private attribution, compliance for government contractshttps://www.securityweek.com/google-wins-lawsuit-against-glupteba-botnet-operatorsFTXhttps://www.forbes.com/sites/ninabambysheva/2022/11/21/ftx-hacker-moved-nearly-200-million-of-ether-to-different-wallets/https://www.cnn.com/2022/11/18/investing/ftx-bahamas-seizure

    46 min
  2. 06/10/2022

    Your Data is Oozing: How the US Government Accesses Citizens' Data Using Consumer AdTech

    Bloomberg - FTC Sues Mobile Data Broker Over Abortion Location Data Sale https://www.bloomberg.com/news/articles/2022-08-29/ftc-sues-mobile-data-broker-over-abortion-location-data-sales?sref=P6Q0mxvj&leadSource=uverify%20wall Vice - Data Broker Is Selling Location Data of People Who Visit Abortion Clinics https://www.vice.com/en/article/m7vzjb/location-data-abortion-clinics-safegraph-planned-parenthood Forbes - Black Lives Matter Protestors Tracked by Secretive Phone Location Technology https://www.forbes.com/sites/zakdoffman/2020/06/26/secretive-phone-tracking-company-publishes-location-data-on-black-lives-matter-protesters/?sh=77520f5f4a1e AP - Tech Tool Offers Police ‘Mass Surveillance on a Budget’ https://apnews.com/article/technology-police-government-surveillance-d395409ef5a8c6c3f6cdab5b1d0e27ef AP - Across the US, Police Offers Abuse Confidential Databases https://apnews.com/article/699236946e3140659fff8a2362e16f43 Wired - WhatsApp Has Shared Your Data with Facebook for Years Actually https://www.wired.com/story/whatsapp-facebook-data-share-notification/ Gizmodo - Rights Groups Say the Pentagon is Buying its Way Around the Fourth Amendment https://gizmodo.com/rights-groups-say-pentagon-buys-freedom-from-fourth-ame-1849604210 Gizmodo - The American Data Privacy Act Would Be a Bipartisan Triumph - If It Could Pass https://gizmodo.com/can-american-data-privacy-protection-act-pass-1849413911 Gizmodo - Congresswoman Urges FTC to Investigate Newly Revealed Police Software Surveilling Americans’ Movements https://gizmodo.com/congresswoman-ftc-to-investigate-fog-data-science-softw-1849547432 Brookings - The FTC Can Rise to the Privacy Challenge, but Not Without Help from Congress https://www.brookings.edu/blog/techtank/2019/08/08/the-ftc-can-rise-to-the-privacy-challenge-but-not-without-help-from-congress/ Berkman Klein Center and Minnesota Law Review - Understanding Chilling Effects https://cyber.harvard.edu/story/2021-06/understanding-chilling-effects PEN America - Chilling Effects: NSA Surveillance Drives US Writers to Self-Censor https://pen.org/research-resources/chilling-effects/

    36 min
  3. 21/09/2022

    Are Turtles War Machines? AI-Enabled Cybersecurity Has an Answer

    AI-enabled security can process data faster and more accurately than humans, but can it tell the difference between turtles and rifles? We answer this question and more as we cover AI-enabled cybersecurity for network defense, insider threat, and user privacy, including considering whether AI ethics are simply business ethics. We also discuss asymmetric uses for nation-states on both offensive and defensive postures and AI-enabled malware and social engineering. Dani concludes with a deep dive into "Fog Reveal" a law enforcement cellphone tracking tool that'll make you squirm. The Verge - Google's AI Thinks Turtles are Rifles: https://www.theverge.com/2017/11/2/16597276/google-ai-image-attacks-adversarial-turtle-rifle-3d-printedForbes - Ukrainian Drones Strike Russian Artillery: https://www.forbes.com/sites/davidaxe/2022/09/02/ukraines-drones-are-back-and-blowing-up-russian-artillery/?sh=71b8f8946b8fDefenseNews - Torch.AI wins DoD Contract for Insider Threat Detection: https://www.defensenews.com/cyber/2022/08/15/torchai-wins-pentagon-insider-threat-cybersecurity-contract/Lawfare - AI and National Security: https://www.lawfareblog.com/recent-developments-ai-and-national-security-what-you-need-knowOxford Internet Institute ‘Trusting Artificial Intelligence in Cybersecurity is a Double-Edged Sword’National Security Commission on Artificial Intelligence Final Report: https://www.nscai.gov/wp-content/uploads/2021/03/Full-Report-Digital-1.pdfAP Report on Fog Reveal: https://apnews.com/article/technology-police-government-surveillance-d395409ef5a8c6c3f6cdab5b1d0e27ef

    44 min
  4. 07/09/2022

    Crypto & Lowrise Jeans: Cybersecurity on the Blockchain

    What do Cryptocurrency and the 90's have in common? Easily exploitable bugs and also Paris Hilton, apparently. We cover the state of regulation and cybersecurity within the blockchain and cryptocurrency space - covering environmental, democratization, and equity concerns, as well as user vs. system security, code audits and minimum standards. Corinna Fehst (MPP'18 and crypto strategy expert) makes a surprise guest appearance. Bethan talks about whether you should post your laptop screen on BeReal [spoiler alert, please don't].  Show Notes: Corinna Fehst: https://www.belfercenter.org/person/corinna-fehstSecurity:Scams:Reports show scammers cashing in on crypto craze | Federal Trade CommissionEmbattled crypto lender Celsius is a 'fraud' and 'Ponzi scheme,' lawsuit allegesExploiting vulnerabilities in smart contracts/wallets/code:Nomad crypto bridge loses $200 million in ‘chaotic’ hack - The VergeSolana Wallet Hack: Here’s What We Know So Far - DecryptNumber of Blockchain Hacks on the RiseMoney laundering / enabler of illegal activity:U.S. seizes $2.3 mln in bitcoin paid to Colonial Pipeline hackers | ReutersFBI Seizes $500,000 Ransomware Payments and Crypto from North Korean HackersDeFi Is the Wild West of Banking and Investing. Here's What Crypto Investors Should KnowCrypto Crime Trends for 2022: Illicit Transaction Activity Reaches All-Time High in Value, All-Time Low in Share of All Cryptocurrency Activity - ChainalysisMid-year Crypto Crime Update: Illicit Activity Falls With Rest of Market, With Some Notable Exceptions - Chainalysishttps://www.cnbc.com/2022/05/18/china-is-second-biggest-bitcoin-mining-hub-as-miners-go-underground.html

    48 min

Notes et avis

5
sur 5
12 notes

À propos

Cyber.RAR is a podcast series from six Harvard Kennedy School students: Michaela Lee, Bethan Saunders, Winnona DeSombre, Danielle Levin, Sophie Faaborg-Andersen, and Grace Park. While each bring a different lens to the show, they all share a common conviction: the field of cybersecurity is rapidly evolving, yet the national security field is falling behind. In this podcast, they uncover why the U.S. government struggles to build basic cyber infrastructure​​, explore how to regulate offensive cyber capabilities, debate the meaning and merits of “hacktivism”, and laugh with each other along the way. Tune in to Cyber.RAR for discussions, debates, and expert interviews on the biggest questions, challenges, and opportunities in cybersecurity.