• Iran’s nukesNatanz Attack Sets Back Iran’s Nuclear Operations

    The Israeli Sunday sabotage operation against Iran’s nuclear facility at Natanz destroyed a well-protected electrical substation housed 40 to 50 meters underground.Iranian officials said that thedestruction of the power supply led to the damage or destruction of “thousands of centrifuges” by causing them to slow down too rapidly.

  • Iran’s nukesSabotage May Weaken Tehran’s Position in Indirect Talks with U.S.

    By Michael Lipin, Payam Yazdian, Katherine Ahn, Linda Gradstein

    With the U.S. and Iran planning their second round of indirect nuclear talks in Vienna this week, some analysts say Sunday’s sabotage of Iran’s Natanz nuclear site has weakened the Iranian position, while others contend it all depends on Iran’s response.

  • Iran’s nukesThe Natanz Blackout: Can the Iran Deal Talks Still Succeed?

    By Ray Takeyh

    Washington and Tehran seem determined to revive the deal that freezes Iran’s nuclear program, despite domestic criticism on both sides and the apparent sabotage of an Iranian facility.

  • Supply chain securitySupply Chains and National Security

    By Bradley Martin

    What became apparent during the pandemic is that the supply chain for ventilator components is spread across the globe, including into areas of China where factories were shut due to the pandemic. Ultimately, chains were reconstituted, and manufacturing began such that by summer there was in fact an excess of ventilator inventory. But the case was instructive. Even with no attempt by anyone to disrupt supply, an unexpected event challenged the ability of the United States to react to a major crisis.

  • Communication technologyLow-Cost NIST Demo Links Public Safety Radios to Broadband Wireless Network

    Engineers have built a low-cost computer system that connects older public safety radios with the latest wireless communications networks, showing how first responders might easily take advantage of broadband technology offering voice, text, instant messages, video and data capabilities.

  • Communication technologyResearchers Developing Tech to Mitigate Interference for Wideband RF Systems

    The radio frequency (RF) spectrum is a scarce resource that is becoming increasingly congested and contested as demand for spectrum access continues to grow. Within this crowded environment, the Department of Defense’s (DoD) RF systems are hampered by mission-compromising interference from both self- and externally-generated signals. Researchers aim to develop new tunable filter, signal canceller architectures to protect wideband radios.

  • Negative emission technologiesNegative Emissions, Positive Economy

    By Mark Dwortzan

    The long-term goals of the Paris Agreement — keeping global warming well below 2 degrees Celsius and ideally 1.5 C in order to avert the worst impacts of climate change — may not be achievable by greenhouse gas emissions-reduction measures alone. Most scenarios for meeting these targets also require the deployment of negative emissions technologies (NETs) that remove carbon dioxide (CO2) from the atmosphere. Bioenergy with carbon capture and storage could help stabilize the climate without breaking the bank.

  • Our picksOpening Terrorists’ iPhones | Security Pivot to Violent Domestic Extremism | Vacant DHS Posts, and more

    ·  13 Investigations, No Court-Martials: Here’s How the U.S. Navy and Marine Corps Quietly Discharge White Supremacists

    ·  Germany Opens Trial of Far-Right ‘Terrorist’ Group

    ·  The Crusade against Pornhub Is Going to Get Someone Killed

    ·  Key Homeland Security Positions Still Waiting to be Filled

    ·  How will Homeland Security Pivot to Violent Domestic Extremism?

    ·  Capitol Police Told to Hold Back on Riot Response on Jan. 6, Report Finds

    ·  The FBI Wanted to Unlock the San Bernardino Shooter’s iPhone. It Turned to a Little-Known Australian Firm.

  • Our picks: China watchChina Tops U.S. Intel's Global Threat List | China to America: We’re an Equal Now | Clean Energy Powered by Dirty Labor, and more

    ·  China’s Message to America: We’re an Equal Now

    ·  U.S. Senate Unveils Bipartisan Plan to Counter Global Influence of China

    ·  China, Other Countries Now Top U.S. Intel’s Global Threat List, Not Terrorist Groups

    ·  Gmail “Safer than Parliament’s Email System” Says Tory MP

    ·  China’s Economy Is Still Dependent on Housing and Exports

    ·  In Battle with U.S. for Global Sway, China Showers Money on Europe’s Neglected Areas

    ·  EU Rebuffs Montenegro Plea to Help Repay $1B Chinese Highway Loan

    ·  When Clean Energy Is Powered by Dirty Labor

    ·  China Learning from Russia’s “Emerging Great Power” Global Media Tactics

    ·  How Growing Conflict with China Could Impact U.K. Nuclear Power

    ·  How China Spurred Innovation in the U.S. and Europe

  • Public healthWeather Forecasts Predict Meningitis Outbreaks

    Scientists are using weather forecasts to predict the location and scale of impending meningitis outbreaks in sub-Saharan Africa. It is part of an early-warning system being piloted with the aim of giving health agencies more time to activate emergency response plans.

  • Iran’s nukesIran Blames Israel for Suspected Sabotage at Nuclear Facility, Vows Revenge

    Iran has vowed to take “revenge” for an alleged act of sabotage at its main Natanz nuclear site that it blames on its archenemy Israel, an incident that could overshadow diplomatic efforts to revive the 2015 nuclear deal abandoned by former U.S. President Donald Trump.

  • VirusesNew Tool Assesses Risk of Wild-Life Origin Viruses

    Researchers have a developed a new framework and interactive web tool, SpillOver, which “estimates a risk score for wildlife-origin viruses, creating a comparative risk assessment of viruses with uncharacterized zoonotic spillover potential alongside those already known to be zoonotic.”

  • China watchMessaging Authoritarianism: China’s Four Messaging Pillars and How ‘Wolf Warrior’ Tactics Undermine Them

    By Rachael Dean Wilson

    A messaging strategy is only as good as the goal it serves; as Xi Jinping has made clear, China is seeking to make the world safer for its brand of authoritarianism by reshaping the world order. An analysis of messaging from China’s diplomats, state-backed media, and leaders of the Chinese Communist Party (CCP) demonstrates that Beijing repeatedly uses narratives, angles, and comparisons that serve to change perceptions about China’s autocracy and the United States’ democracy—to China’s advantage.

  • ARGUMENT: Militias & social mediaAfter the Islamic State: Social Media and Armed Groups

    The Islamic State is often credited with pioneering the use of social media in conflict, having created a global brand that drew between 20,000 and 40,000 volunteers from at least 85 countries. Social media served as a key recruiting tool, source of fundraising, and platform for disseminating graphic propaganda to a global audience. Laura Courchesne and Brian McQuinn write that the Islamic State perfected tactics and strategies already widely used by hundreds of other armed groups.

  • CybersecurityHarnessing Chaos to Protect Devices from Hackers

    Researchers have found a way to use chaos to help develop digital fingerprints for electronic devices that may be unique enough to foil even the most sophisticated hackers. Just how unique are these fingerprints? The researchers believe it would take longer than the lifetime of the universe to test for every possible combination available.

  • Planetary securityHow Do We Know Whether an Asteroid Headed Our Way Is Dangerous?

    By Jonathan O’Callaghan

    There are a lot of things that pose a threat to our planet – climate change, natural disasters, and solar flares, for example. But one threat in particular often captures public imagination, finding itself popularized in books and films and regularly generating alarming headlines: asteroids.

  • PandemicPrepare Now for the Next Pandemic | Biden’s Border Test | Saving California’s Beaches, and more

    ·  Young Migrants Crowd Shelters, Posing Test for Biden

    ·  With Iran, First Prevent the Nukes

    ·  5 Strategies to Prepare Now for the Next Pandemic

    ·  How to Save Beaches and Coastlines from Climate Change Disasters

    ·  Trump’s Border Wall Belongs to Biden Now

    ·  Biden Administration Pressed by Lawmaker to Label White Supremacists Overseas as Terrorists

    ·  Biden Budget Adds $111 Million to Battle Domestic Terrorism

    ·  California Police Officer Fired over Ties to Proud Boys Extremist Group

  • Security challengesGlobal Security Trends

    The National Intelligence Council (NIC) on Thursday released the seventh edition of its quadrennial Global Trends report. Global Trends 2040: A More Contested World is an unclassified assessment of the forces and dynamics that the NIC anticipates are likely to shape the national security environment over the next twenty years. Global competition for influence will intensify. “During the next two decades, the intensity of competition for global influence is likely to reach its highest level since the Cold War,” the report notes.

  • InsurrectionFormer National Security Officials Call for a 9/11 Commission-Like investigation of the Attack on the Capitol

    More than a hundred former senior national security, military, and elected officials, both Republicans and Democrats, have called on lawmakers to form an independent bipartisan commission to investigate the attack. “We write to encourage this Congress to establish an independent and bipartisan national commission to investigate the January 6th assault of the U.S. Capitol Complex and its direct causes, and to make recommendations to prevent future assaults and strengthen the resilience of our democratic institutions,” the letter, which was signed by 140 officials, read.

  • Hemispheric securityU.S. “Monitoring” as Iran Sends Fuel Tankers to Venezuela in Defiance of Sanctions

    By Michael Lipin

    As Iran sent three gasoline shipments to fuel-starved Venezuela in recent months in defiance of U.S. sanctions, the Biden administration apparently did nothing to stop the tankers, signaling a reticence to enforce the sanctions and a savviness by the anti-U.S. allies in evading them.

  • CybersecurityIn the Wake of SolarWinds: Making and Breaking a Rules-Based Global Cyber Order

    By Anatol Lieven

    We should recognize that the need to make careful distinctions between different categories of cyber operations, and shun the use of emotive and misleading language about “attacks,” should also be extended to the field of political influence via the internet. Using cyberspace to spread propaganda, influence political outcomes and reveal or invent damaging information is an extension of tactics that have been used in different ways for millennia—including by the U.S. Actually trying to rig U.S. elections by tampering with the count online would be completely different and vastly more serious.

  • CybersecurityCybersecurity Guide Tailored to the Hospitality Industry

    A new practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable and attractive target for hackers: the hotel property management system (PMS), which stores guests’ personal information and credit card data.