-
Overcoming the trust barrier in nuclear weapons verification measurements
Trust but verify. The catchphrase for arms control popularized by President Ronald Reagan sounds simple. However, verification involving sensitive data is a very complex endeavor. Verifying that a nuclear warhead actually is a warhead may include confirming key attributes. But the act of confirming certain technical attributes might reveal critical design information — closely guarded national secrets for any country. Confirming these attributes will likely require overcoming the hurdle of protecting sensitive design data. Sandia National Laboratories physicist Peter Marleau has developed a new method for verifying warhead attributes.
-
-
Why there’s no modern guide to surviving a nuclear war
The risk of thermonuclear war has rarely been greater. But despite the growing threat, the general public are less prepared than they ever have been to cope with an attack. Time is short – but the United Kingdom is not ready. In May 1980, the government created a series of public information films, radio broadcasts, and the booklet Protect and Survive. But the effort was mocked, and the government abandoned to effort. The failure of Protect and Survive is the reason the United Kingdom doesn’t have public information on how to prepare for a nuclear war today. There are good reasons for keeping us unaware. Releasing guidance may cause anxiety and even make other countries suspicious that our preparations are a sign that we intend to strike first. On the other hand, if the government does intend to issue information at the last minute then it is taking a huge risk as to whether it can get the advice out in time. If an accidental launch, or an unexpected first strike, occurs then there may be no time. Maybe now is the right time to buy that reprinted copy of Protect and Survive – just in case.
-
-
Israeli data startups driving N.Y. ecosystem
The ability to interpret big data and find the needle in the haystack of information to help in decision-making is crucial. Israel startups thrive at finding needle-in-the-haystack information in order to make sense of the data and help in decision-making. “Data is a natural resource. Data by itself is like bricks. It’s all about what you do with it,” says Amir Orad, CEO of Sisense.
-
-
Russia successfully tests hypersonic missile which renders Western defenses obsolete
Russia says it has successfully tested a hypersonic missile, a year ahead of schedule. The missile is faster than any other missile currently deployed by the world’s armies, capable of reaching a speed of up to 4,600 mph, which is nearly six times the speed of sound— covering a distance of 155 miles in just 2.5 minutes. At that speed, no current missile defense would be capable of intercepting and destroying the missile as it travels toward its target. “We’re in a period of possible military parity again,” says a British defense analyst, adding that the new hypersonic missile will push Russia ahead.
-
-
Detecting and preventing the use of chemical weapons
Like detectives looking for clues, researchers at the Department of Energy’s Pacific Northwest National Laboratory have been working for nearly a decade on ways to identify the “fingerprints” of potential chemical threats. The ability to identify a particular agent and attribute its source is key to responding to and even preventing these threats.
-
-
New fabric coating could neutralize chemical weapons, save lives
Chemical weapons are nightmarish. In a millisecond, they can kill hundreds, if not thousands. But, in a new study, scientists report that they have developed a way to adhere a lightweight coating onto fabrics that is capable of neutralizing a subclass of these toxins — those that are delivered through the skin. The life-saving technique could eventually be used to protect soldiers and emergency responders.
-
-
Helping explosive detection canine teams across the U.S.
Dogs are uniquely suited to sniffing out explosives – their sense of smell is more than a million times stronger than a human’s. Harnessing this natural ability to help law enforcement identify explosives requires specialized training and testing. Many detection canine teams, however, have limited access to critical training materials and limited time to establish rigorous training scenarios. DHS S&T’s Detection Canine Program has developed an initiative to support these needs for the nation’s more than 4,000 explosives detection canine teams.
-
-
Extracting useful insights from a flood of data is hard to do
A mantra of these data-rife times is that within the vast and growing volumes of diverse data types, such as sensor feeds, economic indicators, and scientific and environmental measurements, are dots of significance that can tell important stories, if only those dots could be identified and connected in authentically meaningful ways. Getting good at that exercise of data synthesis and interpretation ought to open new, quicker routes to identifying threats, tracking disease outbreaks, and otherwise answering questions and solving problems that previously were intractable.
-
-
How can we better protect crowds from terrorism?
As the recent terrorist attacks in the United Kingdom painfully show, the odds are in favor of terrorists. All they have to do is succeed once, no matter how many times they try. For public safety professionals to be fully successful, they have to prevent 100 percent of the terror attempts. It’s a number to aspire to, but even the most experienced countries fighting terror – such as Israel and the U.K.– can’t measure up to this standard. These days, it’s necessary to consider any place where crowds congregate as vulnerable “soft targets” for the attackers. Community policing, though, could help. Community policing means using the community as a resource to minimize the spread of radical ideologies. By informing and supporting law enforcement through proactive partnerships, citizens can become key players and reliable partners in what some call “co-produced” public safety. These strategies won’t provide absolute security. But they will help minimize attacks and get us closer to that golden 100 percent standard.
-
-
Eight minutes on London Bridge: years of training led to lightning police response
Eight minutes. That is the length of time from the start of the London Bridge attack to the three terrorists being killed by armed police. The Metropolitan Police Service is rightly being heralded for the speed, courage and effectiveness of its members in ending a terrorist atrocity. But the success in their response which prevented more people from being injured and killed is, besides individual bravery, about learning from previous terrorist attacks, training, and resources. The terrorism situation in the United Kingdom is clearly in flux. At the moment, the only pattern when it comes to terrorist attacks is that there is no pattern. Nonetheless, members of the police will continue to prepare to deal with worst-case scenarios, based on previous attacks, that they hope will never materialize.
-
-
Cybersecurity on the fly
When we think of cybersecurity, we think of applying protection measures to our desktop computers such as installing antivirus programs and using passcodes and pin numbers. Just like our computers, aircraft systems are vulnerable and are not exempt from a cyber-attack. If hacked, some examples of possible cyber effects on aircraft systems can be anything from breakdowns in communication and navigation systems to the more critical systems such as collision avoidance and life support systems.
-
-
Hackers could take control of missiles on U.K. subs, start a “catastrophic” nuclear war: Report
Britain’s Trident nuclear weapons deterrent program consists of four Vanguard-class submarines, each carrying up to sixteen Trident II D5 ballistic missiles with a nuclear warhead. Hackers could take control of nuclear weapons-carrying Vanguard-class submarines and start a “catastrophic” nuclear war, a new report warns. The 38-page report warns a security breach could “neutralize operations, lead to loss of life, defeat or perhaps even the catastrophic exchange of nuclear warheads (directly or indirectly).” Des Browne, former U.K. Defense Secretary, said: “To imagine that critical digital systems at the heart of nuclear weapon systems are somehow immune or can be confidently protected by dedicated teams of network managers is to be irresponsibly complacent.”
-
-
Diplomat: Hezbollah is now more powerful than most NATO members
The Iran-backed terrorist group Hezbollah is “now more militarily powerful than most North Atlantic Treaty Organization members,” a former Israeli ambassador to the United Nations says. In violation of UN Resolution 1701, which was adopted to end the 2006 Lebanon War, Hezbollah has acquired an estimated 150,000 missiles — more than the combined arsenals of 27 NATO nations — with a range capable of striking “anywhere in Israel” and the ability to “launch 1,500 of them a day,” Ron Prosor wrote.
-
-
Coroners unable to agree on cause of death, or whether a case merits inquest
Around 507,000 people die in England and Wales every year. Nearly half (45 percent) of these deaths are reported to coroners, who investigate those believed to be violent, unnatural, or of unknown cause, to find out the identity of the deceased and the circumstances of his or her death. A former top detective turned university researcher has published his findings that coroners in England and Wales are seemingly unable to agree on what caused a person’s death or whether it merits an inquest, even when faced with identical case information.
-
-
Face Recognition Challenge seeks better face-identification software
Have you developed software to identity faces in general web photographs? Can your software verify that a face in one photograph is the same as in another? The Intelligence Advanced Research Projects Activity (IARPA) announced the launch of the Face Recognition Prize Challenge (FRPC). The challenge aims to improve biometric face recognition by improving core face recognition accuracy.
-
More headlines
The long view
AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare
Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.
What We’ve Learned from Survivors of the Atomic Bombs
Q&A with Dr. Preetha Rajaraman, New Vice Chair for the Radiation Effects Research Foundation in Hiroshima and Nagasaki, Japan.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Twenty-One Things That Are True in Los Angeles
To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”