-
“Cyberbiosecurity” and the protection of the life sciences
Biology and biotechnology have entered a digital age, but security policies around such activities have not kept pace. New research outlines how the evolving nature of biotechnology should sound alarm bells for new ways to keep life sciences assets safe. This could be from accidental cyber-physical breaches, or more nefarious threats.
-
-
Biosecurity conference fosters international, multidisciplinary collaboration
Biosecurity prevents unauthorized access, loss and intentional release of biological pathogens, information and equipment that may cause harm. Biosecurity professionals from across the United States and Mexico gathered on Arizona State University’s Tempe campus 7-8 December, the first time a biosecurity conference of this scope had taken place in Arizona and one of the largest ever to be held in the United States. Leaders in the field shared multidisciplinary approaches and perspectives on biosecurity.
-
-
Trump to unveil administration’s national security strategy
In a speech later today, President Donald Trump will outline his administration’s national security strategy, which portrays the world as a more competitive arena for the great powers. The administrations of both George W. Bush and Barack Obama emphasized great power cooperation while focusing on emerging threats such as terrorism, disease, and climate change. “After being dismissed as a phenomenon of an earlier century, great power competition returned,” the new national security document says.
-
-
DHS, election industry members to launch Sector Coordinating Council
Election industry representatives from across the country met last week with DHS and representatives from the Election Assistance Commission (EAC) to launch the formation of an industry-led Sector Coordinating Council (SCC). Sector Coordinating Councils are bodies that enable critical infrastructure owners and operators to share information and work together with DHS on sector-specific strategies, policies, and activities.
-
-
Bill targeting vehicular terror attacks
New legislation — “Shielding Public Spaces from Vehicular Terrorism Act” — instructs DHS to develop tools to address evolving terror tactics, including vehicular attacks. The bill also ensures that first responders can use vital Homeland Security Grant Program and Urban Area Security Initiative funding to address security vulnerabilities of public spaces, such as bus stops, bike paths, and other mass gathering locations.
-
-
Geologists report new findings about Kansas, Oklahoma earthquakes
In the more than three decades between 1977 and 2012, only 15 earthquakes with a magnitude of 3.0 or greater were recorded in the entire state of Kansas. Since 2012 more than 100 earthquakes of 3.0 or greater have been recorded in only two counties in the state, Sumner and Harper. These include the largest earthquake ever monitored in Kansas in November 2014, a magnitude 4.9 event near the Sumner County town of Milan. The frequency of earthquakes has continued to increase. Between May 2015 and July 2017, sensors detected more than 2,400 earthquakes in Sumner County alone, ranging in magnitude from 0.4 to 3.6. As concern rises about earthquakes induced by human activity like oil exploration, geologists report a new understanding about recent earthquakes in Kansas and Oklahoma.
-
-
Exposure to terror attacks may increase risk of migraine, other headaches
Survivors of a terror attack have an increased risk of frequent migraine and tension headaches after the attack, according to a study. “We know a lot about the psychological effects of terror attacks and other extreme violence on survivors, but we don’t know much about the physical effects of these violent incidents,” said the study’s author. “Our study shows that a single highly stressful event may lead to ongoing suffering with frequent migraines and other headaches, which can be disabling when they keep people from their work or school activities.”
-
-
The border fence looms over these Texans. Should the government pay them?
Long before President Donald Trump promised to build a wall, Homeland Security used its powers of eminent domain to seize hundreds of acres of land in south Texas to construct a border fence. Under the law, if the government takes or damages your property, it’s supposed to pay to make you whole again. In Texas, the agency has paid $18 million to landholders over the last decade. But scores of Texas landowners who have lived in the shadow of the border fence for years were never compensated for any damage to their property values.
-
-
Encouraging progress at Biological Weapons Convention meeting
The Biological Weapons Convention Meeting of States Parties (MSP) was held last week, with many participants not knowing what to expect after last year’s failure of the Biological Weapons Convention (BWC) Review Conference. One attendee noted that “the role of the NGOs felt even more important in such a disjointed climate where the future of the BWC was in many ways, up in the air. The importance of support and pushing for future cohesion regarding not only the intersessional process (ISP), but also S&T developments, was a significant point within the NGO statement.”
-
-
DNA has gone digital – what could possibly go wrong?
Biology is becoming increasingly digitized. Researchers like us use computers to analyze DNA, operate lab equipment and store genetic information. But new capabilities also mean new risks – and biologists remain largely unaware of the potential vulnerabilities that come with digitizing biotechnology. In 2010, a nuclear plant in Iran experienced mysterious equipment failures which paralyzed Iran’s nuclear weapons program. Months later, a security firm was called in to troubleshoot an apparently unrelated problem, and found a malicious computer virus called Stuxnet, which was telling uranium-enrichment centrifuges to vibrate. Stuxnet demonstrated that cybersecurity breaches can cause physical damages. What if those damages had biological consequences? Could bioterrorists target government laboratories studying infectious diseases? What about pharmaceutical companies producing lifesaving drugs? As life scientists become more reliant on digital workflows, the chances are likely rising. The emerging field of cyberbiosecurity explores the whole new category of risks that come with the increased use of computers in the life sciences.
-
-
Russia-related intelligence information left out of Trump's daily briefings for fear it would upset him
White House and national security officials have said that they purposefully leave intelligence information on Russian ongoing hacking and disinformation activities against the United States out of President Donald Trump’s daily briefings for fear such intelligence information will upset him. If the information cannot be left out, it is usually placed toward the end of the briefing in order to prevent a situation in which the president would refuse to listen to or discuss the rest of the PDB (Presidential Daily Brief).
-
-
Experts: Treason charge against Argentinian ex-president vindicates murdered prosecutor
Last Thursday, Argentinians woke up to a political earthquake as the federal judge Claudio Bonadio, who investigated the role of the government of ex-President Cristina Fernández de Kirchner in covering up Iran’s involvement in the 1994 bombing of the Jewish community center, indicted Kirchner, Foreign Minister Hector Timerman, as well as other government officials. Experts argued that the treason charge brought against Kirchner and a number of her top aides vindicates the late Alberto Nisman’s investigation into the 1994 AMIA bombing.
-
-
What is Vladimir Putin really up to? Carnegie scholars aim to find out
The Trump administration’s national security team – of not the president himself – is increasingly concerned that Russia is expanding its influence around the world at a time when the United States and leading Western powers in Europe are focused on their own domestic problems. The Carnegie Endowment for International Peace is about to launch a two-year project, called “The Return of Global Russia: A Reassessment of the Kremlin’s International Agenda,” aiming to examine and analyze Russia’s activist foreign and military policies. According to Carnegie researchers, Moscow is trying to systematically undermine democracies such as the United States and alliances like the European Union and the North Atlantic Treaty Organization.
-
-
Sen. Marco Rubio: “Vladimir Putin chose to interfere in U.S. elections”
“[W]hat is abundantly clear is that Vladimir Putin chose to interfere in the U.S. elections — in my opinion, not so much to favor one candidate over another, but to sow instability”; “[H]is ultimate goal was to ensure that whoever was elected the next U.S. president, they did so with their credibility damaged. I also think that he wanted to exploit the already existing divisions in American society for the purpose of forcing us to go through what we’re going through right now — investigations, divisive debates, talk about impeachment, and the like.”
-
-
Effective counter-messaging strategies to check terrorist recruitment
The Department of Defense has awarded four social science professors $794,000 to research the effects of extremist propaganda on different personality types, as well as the effects of different counter-messaging strategies. The research will answer basic questions about the effects of exposure to online extremist messages and counter-messages, such as: What kind of messaging is most effective? What are the short- and medium-term results of exposure to extremist messages and counter-messages? What personality characteristics in viewers make them more or less receptive to different kinds of messages?
-
More headlines
The long view
How Quickly Could Iran Make Nuclear Weapons Today?
For Iran, two of the three poles in the tent of building nuclear weapons – fissile material and delivery vehicles — are essentially complete. It will take them one week to enrich enough uranium to 90 percent for one bomb (and one month to enrich enough uranium for six bombs). Iran also has a variety of delivery systems, including nuclear-capable missiles: the delivery pole is ready. Weaponization is the pole that needs more work. The accelerated weaponization program can be accomplished in a matter of six months.
Fifty-Five Hours of Risk: The Dangerous Implications of Slow Attack Attribution
Assuming that its foreign adversaries’ recent violent threats are to be taken seriously, and that the likelihood of a direct attack against the United States is, if not on the rise, at least significant enough to warrant serious attention, the United States has an urgent mandate to prepare effective cognitive defenses. Foremost among these is the ability to quickly and accurately attribute attacks to their originators, and to deliver that information to the public through a trustworthy vehicle.
Is Left-Wing Terrorism Making a Comeback in Germany? Analyzing the “Engel – Guntermann Network”
For Germany, the reemergence of more violence orientated left-wing extremist actors has diversified the threat posed by non-state actors even further. Violent left-wing extremism is also of growing concern across Europe. While left-wing violent extremism does not currently represent as acute a threat as currently manifested by jihadist and right-wing terrorist attacks, the recent concerning trend among German left-wing extremists is toward greater violence and transnationalism.
The True Dangers of Long Trains
Trains are getting longer. Rail companies had recently adopted a moneymaking strategy to move cargo faster than ever, with fewer workers, on trains that are consistently longer than at any time in history. Railroads are getting richer, but these “monster trains” are jumping off of tracks across America and regulators are doing little to curb the risk.
New Report Card to Assess, Rank Campus Responses to Antisemitism
In the face of growing antisemitism across U.S. college campuses, ADL announced that it is developing a new tool to evaluate the climate of antisemitism on individual campuses. The ADL will create comparative evaluation of how leading colleges and universities are responding to the surge of antisemitism and protecting their Jewish students.
Truth Decay and National Security
The line between fact and opinion in public discourse has been eroding, and with it the public’s ability to have arguments and find common ground based in fact. Two core drivers of Truth Decay are political polarization and the spread of misinformation—and these are particularly intertwined in the national security arena. Exposure to misinformation leads to increased polarization, and increased polarization decreases the impact of factual information. Individuals, institutions, and the nation as a whole are vulnerable to this vicious cycle.