Cybersecurity

Cyber AI Director Ben Buchanan sat down with Scientific American to discuss the cyberattack on an Oldsmar, Florida water supply facility and how to protect public facilities in the future.

Russian hack brings changes, uncertainty to US court system

The Associated Press
| February 2, 2021

CSET's CyberAI Director Ben Buchanan discusses whether the Russian cyber hack was targeted to affect the U.S. court system.

China’s STI Operations

William Hannas Huey-Meei Chang
| January 2021

Open source intelligence (OSINT) and science and technology intelligence (STI) are realized differently in the United States and China, China putting greater value on both. In the United States’ understanding, OSINT “enables” classified reporting, while in China it is the intelligence of first resort. This contrast extends to STI which has a lower priority in the U.S. system, whereas China and its top leaders personally lavish great attention on STI and rely on it for national decisions. Establishing a “National S&T Analysis Center” within the U.S. government could help to address these challenges.

U.S. research security requires trust and collaboration between those conducting R&D and the federal government. Most R&D takes place in the private sector, outside of government authority and control, and researchers are wary of federal government or law enforcement involvement in their work. Despite these challenges, as adversaries work to extract science, technology, data and know-how from the United States, the U.S. government is pursuing an ambitious research security initiative. In order to secure the 78 percent of U.S. R&D funded outside the government, authors Melissa Flagg and Zachary Arnold propose a new, public-private research security clearinghouse, with leadership from academia, business, philanthropy, and government and a presence in the most active R&D hubs across the United States.

AI and the Future of Cyber Competition

Wyatt Hoffman
| January 2021

As states turn to AI to gain an edge in cyber competition, it will change the cat-and-mouse game between cyber attackers and defenders. Embracing machine learning systems for cyber defense could drive more aggressive and destabilizing engagements between states. Wyatt Hoffman writes that cyber competition already has the ingredients needed for escalation to real-world violence, even if these ingredients have yet to come together in the right conditions.

CSET senior fellow Anna Puglisi comments on a busted theft of U.S. semiconductor secrets. "Technological knowledge is as important as the actual widgets."

In the syndicated public radio program "Here & Now," CSET's Director of CyberAI, Ben Buchanan, explains what happened in the SolarWinds cyber attack.

Director of CSET's Cybersecurity and AI project Ben Buchanan questions the intent of the 2020 cyberespionage campaign.

Hacking AI

Andrew Lohn
| December 2020

Machine learning systems’ vulnerabilities are pervasive. Hackers and adversaries can easily exploit them. As such, managing the risks is too large a task for the technology community to handle alone. In this primer, Andrew Lohn writes that policymakers must understand the threats well enough to assess the dangers that the United States, its military and intelligence services, and its civilians face when they use machine learning.

“Cyberoperations are almost ordinary, they happen every single day. This threat is constant. Nearly everyone is on the front lines of this global competition, not just the big players," said Director of CSET's Cybersecurity and AI Project Ben Buchanan. Buchanan notes that nation-state hacking is a part of the new era of espionage.