Cyber Security | Wilson Center

Cyber Security

Manipulating Fast, and Slow

As a discipline, cyberpsychology focuses on the impact of emerging technologies on human behavior. In this article, Dr. Mary Aiken talks about how the discipline helps us better understand online manipulation of audiences -- particularly in the context of recent elections. Most critically, cyberpsychology as a discipline may offer the tools to examine critical questions in security to fake news and we must fully explore this potential. Read more by downloading the brief below.

Security and the Connected Vehicle

Today's vehicles have effectively become computers on wheels: from navigation systems to infotainment to HMI (human-machine interface). To date, these technologies have helped to improve the overall experience of driving in many ways. But are security protocols being properly considered in implementing such technologies? Are these systems built to last in today's high-threat cyber environments? What is the mobility sector doing to secure transportation today and tomorrow? How do smart cities and government regulations impact these connected vehicles?

Book Launch: The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

The Wilson Center presents an exclusive look at The Perfect Weapon, the sobering new book by acclaimed New York Times National Security Correspondent David Sanger, who researched and wrote while in residence as a distinguished fellow:

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country.

Mass Killing and Technology: The Hidden Links

This blog post originally appeared on Debugged, a Wilson Center Blog from the Digital Futures Project. 

Going Darker? The Challenge of Dark Net Terrorism

When most people think of the Dark Net, they think of crime, fraud, illegal online activities and terrorism. But what really is the Dark Net? Why is it appealing to internet-savvy terrorists? How can we counter this new age of terrorism? Perhaps most crucially, is the Dark Net all Dark?

Quo Vadis? Mexico’s National Cybersecurity Strategy

In order to reach a destination, you have to know where you are going. Having a roadmap traces a path towards reaching a goal and that is the purpose of a national Cybersecurity strategy. Mexican society has become ever more reliant on information and communications technology (ICTs) and on-line government services. The financial sector and the national economy as a whole is increasingly dependent on digital platforms. Being interconnected, however, brings risks and having a national security strategy is fundamental to protecting the country’s well-being.

Pulling Back the Curtain on the Dark Net

The majority of internet content – as much as 96 percent – exists beyond the reach of your Google searches in a place known as the “dark net.” This hidden part of the web, which is not indexed by standard search engines and browsers, serves as a haven for criminals and cyberterrorists, but also provides an important tool for democracy activists and journalists. Is it possible to police bad actors without destroying a powerful option for those with legitimate reasons to operate with anonymity?