• Energy SecurityIs Russia Using Energy as a Weapon Again?

    By Stephen Sestanovich

    Europe is experiencing energy turmoil, with spot prices for natural gas surging in the past month to levels five times those of a year ago. Putin and Gazprom didn’t create Europe’s new gas crisis, but they are happy to exploit it.

  • CybersecurityHackers-for-Hire Drive Evolution of Threat Landscape

    Cybersecurity threats are on the rise. The new edition of the ENISA Threat Landscape (ETL) highlights the surge in cybercriminality motivated by monetization using ransomware or cryptojacking. Supply-chains attacks also rank highly among prime threats because of the significant potential they have in inducing catastrophic cascading effects.

  • 2021 State of ClimateExtreme Events and Major Impacts

    In a sobering new report, the World Meteorological Organization (WMO) says that record atmospheric greenhouse gas concentrations and associated accumulated heat have propelled the planet into uncharted territory, with far-reaching repercussions for current and future generations

  • Climate & SecurityDHS Strategic Framework for Addressing Climate Change

    Two weeks ago, the Biden administration released four reports, by DHS, the intelligence community, the Department of Defense, and the National Security Council, on how climate change-driven developments — among them:  worsening conflict within and between nations; increased dislocation and migration as people flee climate-fueled instability; heightened military tension and uncertainty; infrastructure destruction; worsening public health; food and water shortages; financial hazards, and more – are posing an increasingly more serious challenge to global stability and to U.S. national security.

  • Truth DecayThe Three Horsemen of Cyber Risks: Misinformation, Disinformation, and Fake News

    The risks associated with misleading information can have a profoundly negative impact – from eroding trust in democracy to threatening public health by spreading anti-science conspiracies. But how do organizations prepare against such threats? A new study aims to provide recommendations on responding to the new digital age challenges.

  • PandemicsModeling Improvements Promise Increased Accuracy of Epidemic Forecasting

    Accurate forecasting of epidemic scenarios is critical to implementing effective public health intervention policies. Much progress has been made in predicting the general magnitude and timing of epidemics, but there is still room for improvement in forecasting peak times.

  • TornadosUsing Overpasses as Shelter from Tornado Is Unsafe

    Contrary to popular belief, waiting out a tornado under an overpass is not safe. Experts say that doing so could actually increase the risk of death, in part because the wind from a tornado is thought to accelerate as it flows under the overpass, in what’s known as the wind tunnel effect.

  • Planetary SecurityWaste of Space: A Proactive Approach to Removing Space Junk

    There are more than 27,000 pieces of space debris bigger than the size of a softball currently orbiting Earth, and they are traveling at speeds of up to 17,500 mph, fast enough for a small chunk to damage a satellite or spacecraft like an intergalactic cannonball. Cleaning up this space junk will be an important task if agencies are to shoot more rockets and satellites into orbit.

  • Our Picks5G Cloud Infrastructures Security | Supply Chain Crisis | Migrant Protection Protocols, and more

    ·  The International Order Isn’t Ready for the Climate Crisis

    ·  NSA and CISA Provide Cybersecurity Guidance for 5G Cloud Infrastructures

    ·  Termination of the Migrant Protection Protocols

    ·  Josh Hawley Wants to Make the Supply Chain Crisis Permanent

    ·  Left Behind After U.S. Withdrawal, Some Former Afghan Spies and Soldiers Turn to Islamic State

    ·  ‘There Will Be a Next Time’: Anti-Hate Groups Warn More Radicals Like Patrik Mathews Are Out There

    ·  Police Warn of Threat of Pre-Christmas Terror Attacks in London

    ·  CISA Wants to Identify the Most Vulnerable Critical Infrastructure

  • Border SecurityOfficial Reject Claims of Terrorists Infiltrating U.S. From Mexico

    By Jeff Seldin

    DHS Counterterrorism Coordinator said that fears the Taliban takeover of Afghanistan could reinvigorate terror groups like al-Qaida and Islamic State, and lead to a surge of attempted infiltrations along the southern U.S. border, have not been realized. “It is just factually inaccurate to frame the southern border as a place where we are seeing a significant number of al-Qaida or ISIS-related terrorists or foreign terrorists,” he said.

  • VaccinesLess than a Third of U.S. Parents Eager to Vaccinate Young Kids Against COVID-19

    By Stephanie Soucheray

    The latest poll from the Kaiser Family Foundation found that only 27 percent of parents said they were eager to get their young children vaccinated against COVID-19. Thirty percent said they would definitely not get their child vaccinated, and 33 percent said they would take a wait-and-see approach.

  • BiosecurityImproving Safety in Labs Dealing with Lethal Viruses

    Biosafety-Level (BSL) 4 laboratories undertake hazardous research into lethal viruses to improve our understanding of diseases such as Ebola and Lassa Fever and to better prepare the world against new and emerging diseases. But these activities pose significant risks. Surges in the number of labs and an expansion in the high-risk research carried out within them have exacerbated safety and security risks.

  • BiosecurityPromise and Peril: Dual-Use Research in the Life Sciences

    Advances in the life sciences and technology are making important contributions to improving global health. Transformative developments in many fields, however, can also pose risks to global health. It is thus only prudent to assess the potential adverse consequences of choosing particular technological pathways and potentially deleterious applications of technologies.

  • RansomwareTargeted: Masterminds of Global Ransomware Attacks Against Critical Infrastructure

    Twelve individuals who were wreaking havoc across the world with ransomware attacks against critical infrastructure have been targeted as the result of a law enforcement and judicial operation involving eight countries.

  • Quantum TechnologyCommercial and Military Applications for Quantum Technology

    Most of the quantum technologies are still in the laboratory, but we may see quantum-based applications within the next few years. China currently leads the world in the development of quantum communication, while the United States leads in the development of quantum computing.

  • Water SecurityManaging Water Resources in a Low-to-No-Snow Future

    With mountain snowpacks shrinking in the western U.S., a new Lab study analyzes when a low-to-no-snow future might arrive and implications for water management.

  • Our PicksChinese Military to Surpass US, Russia | Encryption and Online Safety | No Time to Die, and more

    ·  U.S. Lawmakers Vote to Tighten Restrictions on Huawei, ZTE

    ·  Chinese Military on Target to Surpass US, Russia

    ·  No Time to Die: An In-Depth Analysis of James Bond’s Exposure to Infectious Agents

    ·  2 Neo-Nazi Group Members Sentenced to 9 Years in Prison

    ·  Senators Examine How Social Media Amplifies Extremism

    ·  Why Encryption and Online Safety Go Hand-in-Hand

    ·  New Activity from Russian Actor Nobelium

    ·  State Department to Form New Cyber Office to Face Proliferating Global Challenges

    ·  FBI, Others Crush REvil Using Ransomware Gang’s Favorite Tactic Against It

    ·  Britain Wants to Use Its New Cyber Command to ‘Hunt’ Ransomware Gangs

     

  • Hypersonic WeaponsChina Hypersonic Test “Has All of Our Attention”: Gen. Milley

    By Jeff Seldin

    A July test by China of a hypersonic weapons system is an indication that China’s efforts to surpass the United States as the world’s foremost military power are making significant progress, military experts say. The test took U.S. intelligence officials by surprise.

  • Hypersonic WeaponsCan U.S. Missile-Defense Systems Handle China’s New Missiles?

    By Malcolm Davis

    A hypersonic glide vehicle, possibly with a fractional orbital bombardment system (FOBS), would enable the Chinese to circumvent existing and likely planned U.S. missile-defense and early warning systems. They would go through the back door, rather than try to bash down the defended and watched front door.

  • BiosecurityExamining the Practically Nonfunctional Federal Biowatch Program

    The Bipartisan Commission on Biodefense’s new report addresses inadequacies of BioWatch, the DHS environmental biodetection program. The report, released on the 20th anniversary of the anthrax attacks, shows that BioWatch system remains ineffective after nearly two decades of operation.

  • Border SecurityNorthern Skies Provide the Backdrop for Testing Border Security Tech

    The purpose of demonstrations and tests recently conducted in Montana North Dakota was to evaluate specialized air domain awareness technologies such as radar systems; electro-optical and infrared cameras; radio frequency detection systems; and acoustic devices to see how effectively each can monitor, safeguard, and secure the various terrains and airspace that surround the northern border between the U.S. and Canada.

  • WildfiresHarnessing Science and Technology for Battling Wildfires

    Catastrophic wildfires in Europe have become a far too common headline and this year has been no exception as the world once again bore witness to parts of the continent burning. While southern Europe is no stranger to the devastation and loss they leave in their wake, countries in central and northern Europe – areas that were previously not prone to wildfires – are now also experiencing them. Harnessing science and technology, researchers are proving that there is more than one way to fight and respond to fire.