Why Trump Is Lying About Disaster Relief | U.S. Migration Is More Complex Than Politics Show | Florida Communities Hit by 3 Hurricanes Grapple with Whether to Rebuild, and more

Budget Restrictions, Staff Issues and AI Are Threats to States’ Cybersecurity  (Paige Gross, Stateline)
Many state chief information and security officers say they don’t have the budget, resources, staff or expertise to feel fully confident in their ability to guard their government networks against cyberattacks, according to a new Deloitte & Touche survey of officials in all 50 states and the District of Columbia.

CBP, ICE, and TSA Did Not Fully Assess Risks Associated with Releasing Noncitizens without Identification into the United States and Allowing Them to Travel on Domestic Flights  (DHS OIG)
Although U.S. Customs and Border Protection (CBP) and U.S. Immigration and Customs Enforcement (ICE) have policies and procedures to check the identity of noncitizens seeking entry into the United States, they cannot always verify the noncitizens’ identities. Noncitizens without Transportation Security Administration (TSA)-acceptable identification are allowed to board domestic flights. TSA’s vetting and screening procedures do not eliminate the risk that noncitizens who may pose a threat to fellow passengers could board domestic flights.
Under current processes, CBP and ICE cannot ensure they are keeping high-risk noncitizens without identification from entering the country. Additionally, TSA cannot ensure its vetting and screening procedures prevent high-risk noncitizens who may pose a threat to the flying public from boarding domestic flights.

Thwarting Disinformation/Misinformation and Foreign Actor Influence through a Strategic and Coordinated Response  (Moshe Nelson, HSToday)
While kinetic warfare has dominated the headlines as China, Russia, Iran, and their proxies have benefited from this global alliance through common military coordination, a much broader and unseen war has taken place through today’s cyber and virtual battlefields. These actors have increased focus and resources on influence campaigns strategically, wielding disinformation and misinformation as weapons against the U.S. and its allies. They are achieving startling and effective results.

Evolving Aviation Threats and the Impact on our AVSEC Systems Are We Ready?  (John Halinski, HSToday)
In the world of aviation security, attempting to mitigate new threats is often like creating a cure for a new disease. Usually, we only begin to find a solution once the problem has created enough havoc to illicit an equal reaction. However, when it concerns protecting American lives and infrastructure, we aren’t in the business of response; we are in the business of prevention.

Anonymous Answers: How Can We Manage Infohazards in Biosecurity?  (Anemone Franz and Tessa Alexanian, 80,000 Hours)
In the field of biosecurity, many experts are concerned with managing information hazards (or infohazards). This is information that some believe could be dangerous if it were widely known — such as the gene sequence of a deadly virus or particular threat models.

Navigating the complexities of infohazards and the potential misuse of biological knowledge is contentious, and experts often disagree about how to approach this issue.

CBWNet Working Paper on Chemical Terrorism Threat Perceptions and CWC Review Conference Responses  (Alexander Kelle, CBWNet)
The new CBWNet Working Paper by Alexander Kelle examines the evolving salience of chemical terrorism within the framework of the Chemical Weapons Convention (CWC) and the contribution of the Organization for the Prohibition of Chemical Weapons (OPCW) to the global fight against terrorism. It traces the response of CWC states parties to chemical terrorism, analyzing how the issue has been prioritized in relation to other OPCW objectives, such as the destruction of chemical weapons stockpiles. The paper finds that, much like state parties’ threat perceptions, review conference responses to chemical terrorism have largely revolved around the elements identified in 2001 and have been linked most often to the international cooperation and assistance norms, and regularly noted the work of the Open-Ended Working Group on Terrorism.

Heritage Foundation Staffers Flood Federal Agencies with Thousands of Information Requests  (Sharon Lerner and Andy Kroll, ProPublica)
The conservative think tank’s requests are clogging the pipeline at federal agencies in an apparent attempt to find employees a potential Trump administration would want to purge.