A group of human rights lawyers and investigators called on the Hague this week to bring what would be the first ever “cyber war crimes” charges. This group is asking the International Criminal Court for charges to be brought against Sandworm, a Russian hacking group that is dangerous and destructive. It is controlled by Russia’s military intelligence agency GRU. Activists are trying to block Russia’s use of satellites owned by France to broadcast state-run propaganda programming.
Researchers released findings this week that thousands of popular websites record data that users type into forms on the site before they hit the Submit button–even if the user closes the page without submitting anything. Google released a report on an in-depth security analysis it conducted with the chipmaker AMD to catch and fix flaws in specialty security processors used in Google Cloud infrastructure. The company also announced a slew of privacy and security features for its new Android 13 mobile operating system along with a vision for making them easier for people to understand and use.
The European Union is considering child protective legislation that would require scanning private chats, potentially undermining end-to-end encryption at a massive scale. Plus, defenders from the cybersecurity nonprofit BIO-ISAC are racing to protect the bioeconomy from digital threats, announcing a partnership this week with Johns Hopkins University Applied Physics Lab that will help fund pay-what-you-can incident response resources.
But wait, there’s more. We round up all the news we don’t cover or didn’t break each week. To read the complete stories, click on the headlines. Keep safe out there.
The United States is currently developing a new generation high-security encryption standards. These standards will be strong in today’s technical environment and can be circumvented in the age quantum computing. The National Security Agency was a key contributor to the creation of the new standards, but the agency claims it doesn’t have any special means of compromising the security. Rob Joyce, the NSA director for cybersecurity, stated to Bloomberg this week that there are no “backdoors.” The NSA has been implicated in schemes to backdoor encryption before, including in a situation in the early 2010s in which the US removed an NSA-developed algorithm as a federal standard over backdoor concerns. A thorough investigation by Georgetown Law’s Center on Privacy & Technology has revealed a more detailed picture of the surveillance capabilities and practices of the US Immigration and Customs Enforcement agencies. The report published this week shows that ICE started to develop its surveillance infrastructure after the George W. Bush administration ended. This is years before it was thought that it had begun such efforts. And researchers found that ICE spent $2.8 billion on surveillance technology, including face recognition, between 2008 and 2021. ICE was well-known for its aggressive and intrusive surveillance tactics during Donald Trump’s anti-immigration crackdowns. However, the report also argues ICE “played a major role in the larger federal government’s push to gather as much information possible” about Americans. The report states that ICE is now a domestic surveillance agency after a two-year investigation. This included hundreds of Freedom of Information Act requests, a thorough review of ICE’s contracting and procurement records, and a detailed review of ICE’s contracts and procurement records. “By reaching into the digital records of st