Digital Forensic Research Lab
Wed, Jul 24, 2024
OT Cyber Policy: The Titanic or the Iceberg
Current policy does not address the issue of cyber-physical security with a systemic approach, instead focusing with tunnel vision on specific events. This analysis uses the iceberg model for systems thinking to address policy gaps in the OT ecosystem, detailing recommendations for the Cybersecurity and Infrastructure Security Agency (CISA).
by Danielle Jablanski
Wed, Jul 17, 2024
The sovereignty trap
How the promise of sovereign AI obscures its pitfalls
by Konstantinos Komaitis, Esteban Ponce de León, Kenton Thibaut, Trisha Ray, Kevin Klyman
Tue, Jul 16, 2024
Fake Cameroonian news sites spread pro-Russia, anti-France content
Fake Cameroonian outlets disseminated AI-generated voiceovers across Facebook and other social media platforms
Wed, Jul 10, 2024
Anti-Ukraine narratives spread following Kyiv children’s hospital attack
Narratives blamed Ukraine for the incident, accusing it of targeting itself or deploying air defense systems ineptly
by Ruslan Trad
Tue, Jul 9, 2024
How Kenya’s tax bill protests spread online
After the bill's withdrawal, online conversations continued to call for President Ruto's resignation
Tue, Jul 9, 2024
AI tools usage for disinformation in the war in Ukraine
How and what technology Russia used to spread disinformation after the full-scale invasion of Ukraine
Mon, Jul 8, 2024
Inauthentic Facebook ad campaign spreads anti-EU messages
Facebook pages disguised as neutral news sources sponsored ads to promote anti-EU narratives ahead of Moldova's referendum on EU integration
Mon, Jul 8, 2024
Spambots continue to suppress speech and enable harassment of the Chinese community on X
Networks of Chinese-language spambots risk the censoring of posts during politically sensitive events, repeating past oversights
Thu, Jul 4, 2024
Operation targets French snap elections using AI-generated content
Operation uses AI to rewrite articles to adopt a more 'conservative stance'
Mon, Jul 1, 2024
The Impact of Corruption on Cybersecurity: Rethinking National Strategies Across the Global South
As the Global South prepares for the next stage in ICT development, governments must prioritize policies that reduce corruption in critical network software procurement to protect those countries' developing cyberspace.
by Robert Peacock
Mon, Jun 24, 2024
User in the Middle: An Interoperability and Security Guide for Policymakers
When technologies work together, it benefits users and the digital ecosystem. Policymakers can advance interoperability and security in tandem by understanding how each impacts the other.
Wed, Jun 12, 2024
In Sub-Saharan Africa, China embraces Russian messaging against Ukraine
Russian narratives thrive in Sub-Saharan Africa with the help of Chinese media networks, localization expertise, and infrastructure