Laura DeNardis, American University School of Communication
Co-opting internet-connected devices could disrupt transportation systems on Election Day, stymie political campaigns, or help make information warfare more credible.
The wool industry was paralysed for several days after hackers held to ransom the IT system that governs almost all wool sales in Australia and New Zealand. More attacks are a case of if, not when.
A U.S. Census Bureau staff member uses digital maps to help identify where people live and need to be counted.
U.S. Census Bureau via AP
Cyber security firms have sparked a revolution similar to the spread of private police forces.
Two CubeSats, part of a constellation built and operated by Planet Labs Inc. to take images of Earth, were launched from the International Space Station on May 17, 2016.
NASA
SpaceX and other companies are rushing to put thousands of small, inexpensive satellites in orbit, but pressure to keep costs low and a lack of regulation leave those satellites vulnerable to hackers.
You’re at the airport, or on the bus, and your phone’s low on juice so you plug into a nearby USB port. But you could be getting more than a power boost - some ports are booby-trapped with malware.
Are these people’s votes accurately recorded and properly counted?
Bill Clark/CQ Roll Call
Around the world, elections are under attack. U.S. officials could learn from other countries about how to ensure everyone’s vote is recorded and counted accurately.
Seven hackers tied to the Iranian government were indicted for attempting to take over a New York dam’s control system.
Alex Wong/Getty Images
The Iranian military operates cyber espionage and sabotage through a network of dozens of contractors, allowing the state to attack foes while denying involvement.
In the wake of U.S. killings, Iran’s supreme leader vowed ‘harsh revenge’ – which could come in the form of cyber attacks.
Office of the Iranian Supreme Leader via AP
Less overt than conventional military actions, cyber attacks can have dangerous consequences – especially when they target critical infrastructure systems controlled by the private sector.
Who is responsible for protecting consumer data? Data breaches are now a regular occurrence, and governments are stepping in.
(Shutterstock)
Kenya, Rwanda, and Uganda are at the forefront of the war against cyber criminals.
As our worlds are become increasingly digitised, we’re starting to rely more on machines and devices for everyday tasks. But in an age when even pacemakers can be hacked, how do we know when and who to trust?
SHUTTERSTOCK
Research shows we’re pretty gullible as it is. And our increasing reliance on machines for completing everyday tasks makes us all-the-more vulnerable to being exploited.
What digital border controls should be used in Russia?
Wikimedia
The Russian government would like to free itself from the global Internet. This push for “digital sovereignty” has raised technical scepticism and political concerns.
Nick Warner, the new director general of the Office of National Intelligence, has sounded the alarm about Australia’s lack of preparedness to counter cyber-threats.
Alan Porritt/AAP
We have not been able to develop an intelligence workforce that can keep up with the speed of advancing technologies and their threat to our national security.
Linking your mobile number to your bank account could have unintended consequences.
SewCream/Shutterstock.com
PayID has been misused and compromised in various ways since its 2018 launch. The system deals only in “incoming” payments, not outgoing ones – but that doesn’t mean users are safe from cyber crime.
Indonesia needs to urgently pass this bill as the country still does not have a specific law on cyber security.
www.shutterstock.com
Indonesia is set to issue its first cyber security bill. It’s badly needed, but in its current form the legislation also create risks of abuses of power and violations of human rights.
A push for digital peace is growing around the world.
Finchen/Shutterstock.com