-
26 -- Second test of the water and Africa story codes
The sovereign citizen movement, the roots of which lie in white separatism and anti-Semitism, now welcomes non-white adherents. Especially susceptible to recruitment efforts by the movement are African Americans – called “Moorish Americans” or “Moorish Natives” by movement members – from poor and neglected neighborhoods.“They are much more reflective of the demographics of society today,” a former FBI case manager notes.
-
-
25 -- Testing the functionality of the Africa and Water story codes
The sovereign citizen movement, the roots of which lie in white separatism and anti-Semitism, now welcomes non-white adherents. Especially susceptible to recruitment efforts by the movement are African Americans – called “Moorish Americans” or “Moorish Natives” by movement members – from poor and neglected neighborhoods.“They are much more reflective of the demographics of society today,” a former FBI case manager notes.
-
22 -- Testof Africa and Water codes functionality
Three members of a right-wing militia have been sentenced to twelve years in prison for conspiring to use weapons of mass destruction in attacks against federal government agencies. The defendants planned to attack critical infrastructure in Georgia while motivating militia groups in other states to rise up and join them in removing government officials who they believed had exceeded their Constitutional power. The militia members planned on starting a revolution against the federal government by conducting an attack aimed at the infrastructure supporting the TSA, DHS, and FEMA.
-
-
21 -- Test of the Waer and Africa codes functionality
Three members of a right-wing militia have been sentenced to twelve years in prison for conspiring to use weapons of mass destruction in attacks against federal government agencies. The defendants planned to attack critical infrastructure in Georgia while motivating militia groups in other states to rise up and join them in removing government officials who they believed had exceeded their Constitutional power. The militia members planned on starting a revolution against the federal government by conducting an attack aimed at the infrastructure supporting the TSA, DHS, and FEMA.
-
20 -- Test of the Africa code funtionality
Three members of a right-wing militia have been sentenced to twelve years in prison for conspiring to use weapons of mass destruction in attacks against federal government agencies. The defendants planned to attack critical infrastructure in Georgia while motivating militia groups in other states to rise up and join them in removing government officials who they believed had exceeded their Constitutional power. The militia members planned on starting a revolution against the federal government by conducting an attack aimed at the infrastructure supporting the TSA, DHS, and FEMA.
-
-
Water15 -- Test of the Water code functionality
Europe is searching for a solution to its worst refugee crisis since the Second World War. Hungary is building a fence along its 110-mile border with Serbia, and is considering using its military to protect its southern border, as thousands of migrants, many of them fleeing Syria, are desperately trying to enter the European Union zone. Greece saw fifty thousand refugees arrived on Greek shores during the month in July alone, . and the Greek authorities have taken to ferrying many of them – mostly Syrian refugees — from Greece’s overwhelmed islands to Athens, from where they head north by buses provided by the government. The Serbia authorities said that about 10,000 refugees were passing through Serbia at any time. As Hungary border fence building advances, more and more of these refugees remain in Serbia, unable to cross into Hungary or go back into Greece.
-
Water12 -- Test of the Water code functioanlity
Europe is searching for a solution to its worst refugee crisis since the Second World War. Hungary is building a fence along its 110-mile border with Serbia, and is considering using its military to protect its southern border, as thousands of migrants, many of them fleeing Syria, are desperately trying to enter the European Union zone. Greece saw fifty thousand refugees arrived on Greek shores during the month in July alone, . and the Greek authorities have taken to ferrying many of them – mostly Syrian refugees — from Greece’s overwhelmed islands to Athens, from where they head north by buses provided by the government. The Serbia authorities said that about 10,000 refugees were passing through Serbia at any time. As Hungary border fence building advances, more and more of these refugees remain in Serbia, unable to cross into Hungary or go back into Greece.
-
-
African security12 -- Test of the Africa code functionality
Europe is searching for a solution to its worst refugee crisis since the Second World War. Hungary is building a fence along its 110-mile border with Serbia, and is considering using its military to protect its southern border, as thousands of migrants, many of them fleeing Syria, are desperately trying to enter the European Union zone. Greece saw fifty thousand refugees arrived on Greek shores during the month in July alone, . and the Greek authorities have taken to ferrying many of them – mostly Syrian refugees — from Greece’s overwhelmed islands to Athens, from where they head north by buses provided by the government. The Serbia authorities said that about 10,000 refugees were passing through Serbia at any time. As Hungary border fence building advances, more and more of these refugees remain in Serbia, unable to cross into Hungary or go back into Greece.
-
-
African security11 -- Test of the Africa code functionality
The University of Virginia announced Sunday (16 August) that it has successfully completed a comprehensive system security upgrade in response to a cyberattack originating in China. The University said it had taken these actions further to enhance the security of data and information stored on university resources and to aid in prevention of future cyberattacks. The cyberattack on U.Va. is the second massive cyberattack by Chinese government hackers on an American institution of higher learning. Last fall, the Penn State College of Engineering was the target of two sophisticated cyberattacks by Chinese government hackers
-
-
10 -- Test of the Africa Security Wire functionality
Seasonal water shortages already occur in the Central Andes of Peru and Bolivia. By the end of the century, precipitation could fall by up to 30 percent according to an international team of researchers. Researchers show that precipitation in the rainy season could drop noticeably - and this could happen within the next twenty years.
-
-
ISISISIS closes gates on Ramadi dam, cutting off water to towns loyal to Baghdad
Global security analysts have warned for some time now that water scarcity due to climate change will be used as a tool of war in regions with poor governance. The on-going wars in Iraq and Syria provide the first examples of the strategic and tactical use of water as a tool of war, as militant groups operating in both countries – and, in Syria, to government of Bashar al-Assad — have been using the denial of water as a tool against areas and populations they regard as hostile. Last month ISIS militants captured a dam on the Euphrates River to the north of the Iraqi city of Ramadi, and last week they began closing most of its gates, cutting water supplies to pro-government towns and villages downstream.
-
-
Africa securityNigerian army should be investigated for war crimes against civilians: Amnesty
A comprehensive new report by Amnesty International offers detailed evidence to support the charge that the Nigerian military, pervasively and systematically, committed gross human rights violations under the guise of fighting Boko Haram. Among the findings: the Nigerian military has arrested at least 20,000 young men and boys since 2009, some as young as nine years old. In most cases, they were arbitrarily arrested, often based solely on the word of a single unidentified secret informant. Almost none of those detained has been brought to court and all have been held without the necessary safeguards against murder, torture, and ill-treatment. More than 8,000 people were murdered, starved, suffocated, and tortured to death since March 2011 in military-run detention centers. More than 1,200 people were unlawfully killed in extrajudicial executions since February 2012. In order to combat the spread of disease and stifle the stench, over-crowded cells were regularly fumigated with powerful chemicals – with the detainees kept inside the cells during fumigation, leading to hundreds of deaths. Amnesty International calls for the new Nigerian government to ensure prompt, independent, and effective investigations of the top military and defense officials – named in the report – who authorized these measures for potential individual or command responsibility for war crimes. The organization also calls for new government to bring to an end the culture of impunity within the Nigeria’s armed forces.
-
-
Seismic protectionMaking building hover to protect them from earthquake
Los Gatos California-based Arx Pax, creator of the Hendo Hoverboard and Magnetic Field Architecture (MFA), yesterday announced that it is integrating the ShakeAlert earthquake early-warning software into its patented three-part foundation system, which the company says is a more cost effective means of decoupling an object or building from the earth to provide real protection against earthquakes, floods, and sea-level rise. The company is now beta testing isolation of structures from unwanted earth movement.
-
-
HurricanesShould I stay or should I go: timing affects hurricane evacuation decisions
When a hurricane is gathering strength offshore, people in its possible line of fire still need to decide whether or not to evacuate to safer ground. Emergency managers are charged with ensuring the safety of the population. “Prepare for the worst” is probably a good philosophy in most circumstances, but not in the case of evacuation for a hurricane many days away, when the cost of mobilizing is high and the probability of it being needed is very low. The government and media also grapple with not wanting to be unnecessarily alarmist. The correct philosophy is “know what the worst case could be and be prepared to face it if it comes to pass.” When an evacuation order is issued, it’s usually in a very compressed time frame — but that’s ok as long as people are prepared. If people plan three to five days ahead, knowing that there is a small but real chance they will be asked to evacuate and a small but real chance of death if they do not, they can be ready when the definitive order comes in.
-
-
Infectious diseaseCHIKV Challenge winners --- forecasting the spread of infectious diseases
The chikungunya virus (CHIKV) is quickly spreading through the Western Hemisphere; as of 15 May 2015, the Pan-American Health Organization (PAHO) had tallied close to 1.4 million suspected cases and more than 33,000 confirmed cases since the virus’ first appearance in the Americas in December 2013. Spread by mosquitoes, chikungunya is rarely fatal but can cause debilitating joint and muscle pain, fever, nausea, fatigue and rash, and poses a growing public health and national security risk. Governments and health organizations could take more effective proactive steps to limit the spread of CHIKV if they had accurate forecasts of where and when it would appear. But such predictions for CHIKV and other emerging infectious diseases remain beyond the reach of current modeling capabilities. To accelerate the development of new infectious disease forecasting methods, DARPA launched its CHIKV Challenge competition last year.
-
-
Food securityPurdue to host fourth Global Food Security summer program
The fourth annual Borlaug Summer Institute on Global Food Security will be held 7-20 June at Purdue University, aiming to challenge graduate students from around the country to pool their research in various areas of study in finding innovative ways to alleviate world hunger. In attendance will be forty graduate students selected from twenty-three universities from across the United States.
-
-
WaterWater security key to unlocking African prosperity
There is mounting evidence of the risks posed by water scarcity to business and economic growth. A 2012 projection by the International Food Policy Research Institute says 45 percent of total GDP — $63 trillion — will be at risk due to water stress by 2050. With coordinated action, better water provision in Africa will strengthen economic growth and unlock the path to prosperity for millions, according to SABMiller’s Chief Executive Alan Clark.
-
-
Bioweapons51 labs in 17 states may have received live anthrax samples: Pentagon
Deputy Secretary of Defense Robert Work said yesterday (Wednesday) that the Pentagon may have shipped live anthrax samples to fifty-one labs in seventeen states and the District of Columbia, as well as three foreign countries. Word also said that it was likely that the numbers of labs which might have received live anthrax will go up as the Pentagon’s investigation into the shipments continues. All the samples shipped belonged to three lots, dating back to 2007, stored at the Dugway Proving Ground in Utah. CDC raises questions about the effectiveness of the method used by the Dugway lab to deactivate anthrax spores.
-
-
CybersecurityCombating cyber threats to the global financial industry
Today more than fifteen billion devices are connected to the Internet; in the next five years, that number will grow to fifty billion. With each new device presenting an opportunity to be infiltrated and compromised by hackers, it is easy to understand why the importance of cybersecurity continues to skyrocket. So explained keynote speaker Elizabeth Petrie, director of strategic intelligence analysis for Citigroup, who kicked off a one-day conference at the University of Delaware on cybersecurity issues impacting the global financial industry.
-
-
Africa securityGambian government expels Hezbollah funder
Husayn Tajideen, one of three Lebanese brothers sanctioned by the United States for providing financial support to Hezbollah, was accused of “unacceptable business practices that are detrimental to the Gambian economy,” ordered to cease all business operations, and leave the country within thirty days.
-
-
HealthNanosensor bandage measures wound oxygenation
There is nothing new in the understanding that with combat come injuries, sometimes extreme injuries. In treating and healing wounds, however, physicians must overcome one obstacle which always challenges the healing of wounds: lack of oxygen. Thus, it is necessary to make certain that sufficient oxygen is reaching the healing wound. Chemists have developed a nanosensor bandage which measures the level of oxygen in wounds – a bandage which uses a changing color scheme to inform doctors of the level of oxygen supply in the treated wound.
-
-
Extreme weatherExtreme weather events connected to climate change
The amount of rain or snow falling in the heaviest one percent of storms has risen nearly 20 percent on average in the United States — almost three times the rate of increase in total precipitation between 1958 and 2007. Recent heavy rains in Texas and the deadly heat wave in India are indicators that climate change, brought on by increased greenhouse gases in the atmosphere, is most likely enhancing the effects of these extreme weather events, according to climatologists.
-
More headlines
The long view
Nuclear weaponsTo prevent Iranian nukes, a negotiated deal better than a military strike: David Albright
David Albright is the founder and president of the Washington, D.C.-based non-profit Institute for Science and International Security (ISIS), and author of several books on fissile materials and nuclear weapons proliferation. In a testimony before the House Foreign Affairs Committee on Wednesday, and an interview with Deutsche Welle on Thursday, Albrights says that there is every reason to be suspicious of Iran because it has cheated on its obligations in the past and has been uncooperative on an ongoing basis. Iran has also built many sites in secret, so any agreement with Iran should have extra insurance — a more powerful inspection and verification tool to try to ferret out any secret nuclear activities or facilities that Iran would build. Still, a negotiated deal, if it includes sufficiently robust inspection and verification measures, would be a more effective way than a military strike to make sure Iran does not develop nuclear weapons.
Nuclear risksHow to verify a comprehensive Iran nuclear deal
With the negotiation between the P5+1(the United States, European Union, Britain, France, Russia, and China) and Iran resuming yesterday (Wednesday) about a set of parameters for an eventual Joint Comprehensive Plan of Action, the shape of a final deal about Iran’s nuclear program has emerged. Many important provisions of a final deal, however, remain to be negotiated in the coming months. David Albright, the president of the Institute for Science and International Security, says that a critical set of these provisions involves the adequacy of verification arrangements which would be in place to monitor Iran’s compliance with a deal. Tehran’s long history of violations, subterfuge, and non-cooperation requires extraordinary arrangements to ensure that Iran’s nuclear program is indeed peaceful.
Domestic terrorismFusion centers, created to fight domestic terrorism, suffering from mission creep: Critics
Years before the 9/11 attacks, law enforcement agencies throughout the country, alarmed by the 1995 Oklahoma City bombing, began to monitor and investigate signs of domestic terrorism. That increased monitoring, and the need for coordination among various law enforcement agencies, gave rise to the fusion centers. A new report, which is supported by current and former law enforcement and government officials, concludes that post-9/11, fusion centers and the FBI teams which work with them shifted their focus from domestic terrorism to global terrorism and other crimes, including drug trafficking.Experts say that at a time when the number of domestic terrorism threats, many of which are linked to right-wing extremist groups, is surging, law enforcement must refocus their attention on the threats from within.
Who's online
TerrorismLack of evidence-based terrorism research hobbles counterterrorism strategies
The Global Terrorism Database at the University of Maryland estimates that groups connected with al-Qaeda and the Islamic State committed almost 200 attacks per year between 2007 and 2010. That number has increased to about 600 attacks in 2013. As terrorism becomes more prevalent, the study of terrorism has also increased, which, in theory, should lead to more effective antiterrorism policies, and thus to less terrorism. The opposite is happening, however, and this could be partly due to the sort of studies which are being conducted. The problem: few of these studies are rooted in empirical analysis, and there is an “almost complete absence of evaluation research” concerning anti-terrorism strategies, in the words of a review of such studies.
Infrastructure protectionU.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
Cyber insuranceTo bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
CybersecurityU.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.
GridProtecting the U.S. power grid
The U.S. power grid is made up of complex and expensive system components, which are owned by utilities ranging from small municipalities to large national corporations spanning multiple states. A National Academy of Sciences report estimates that a worst-case geomagnetic storm could have an economic impact of $1 trillion to $2 trillion in the first year, which is twenty times the damage caused by a Katrina-class hurricane.
CBPCBP IA Operation Hometown reduces violence and corruption: Tomsheck shuts it down -- Pt. 5
By Robert Lee Maril
Operation Hometown appears to be yet another example in a series of programs at Customs and Border Protection (CBP) demonstrating blatant dysfunctionality and mismanagement within the Department of Homeland Security. Meticulously designed to target border violence and corruption among CBP employees, Operation Hometown was labeled a success in reaching its stated objectives. CBP Internal Affair’s (IA) James F. Tomsheck,however, shut the program down. As Congress and President Obama debate various aspects of a new federal immigration policy,few politicians are willing to acknowledge the serious problems at CBP Internal Affairs – but they should, as these problems may directly impact the success of any or all new immigration reforms.
Border security More money, different approach offer opportunities to border security tech companies
The number of border agents has reached roughly 21,000, up from 5,000 two decades ago. In fiscal year 2012, spending for border and immigration enforcement totaled almost $18 billion — 24 percent more than the combined budgets of the FBI, the DEA, the Secret Service, the U.S. Marshals, and the Bureau of Alcohol, Tobacco, Firearms and Explosives (total: $14.4 billion). One major trend driving the border security industry is the government’s shift from large-scale border security infrastructure projects to small unit security systems.
Border securityLawmakers want more attention to be paid to security along the northern border
Over the years, concerns over U.S. border security have largely focused on the southern border, where hundreds of thousands of illegal migrants have been apprehended and millions of dollars in illegal drugs have been seized by border patrol agents. One reason for the inattention to the northern border is that it is not associated with highly charged issues such as immigration, day laborers, and violent drug traffickers.Scotty Greenwood, a senior adviser to the Canadian-American Business Council, is not surprised that the southern border gets more attention than the northern border. “The political theater isn’t as intense when you’re talking about what a good job we do.”
EarthquakesMore than 143 million Americans at risk from earthquakes
More than 143 million Americans living in the forty-eight contiguous states are exposed to potentially damaging ground shaking from earthquakes, with as many as twenty-eight million people in the highest hazard zones likely to experience strong shaking during their lifetime, according to new research. The research puts the average long-term value of building losses from earthquakes at $4.5 billion per year, with roughly 80 percent of losses attributed to California, Oregon, and Washington. By comparison, FEMA estimated in 1994 that seventy-five million Americans in thirty-nine states were at risk from earthquakes. In the highest hazard zones, the researchers identified more than 6,000 fire stations, more than 800 hospitals, and nearly 20,000 public and private schools that may be exposed to strong ground motion from earthquakes.
EarthquakesA large Ventura Fault quake could trigger a tsunami
Earthquake experts had not foreseen the 2011 magnitude-9 Japan earthquake occurring where it did, so soon after the disaster, scientists in Southern California began asking themselves, “What are the big things we’re missing?” For decades, seismic experts believed the Ventura fault posed only a minor to moderate threat, but new research suggests that a magnitude-8 earthquake could occur on the fault roughly every 400 to 2,400 years. The newly discovered risk may even be more damaging than a large earthquake occurring on the San Andreas Fault, which has long been considered the state’s most dangerous. Unlike the Ventura fault, the San Andreas Fault is so far inland in Southern California, that it does not pose a tsunami risk. A large earthquake on the Ventura fault, however, could create a tsunami that would begin “in the Santa Barbara Channel area, and would affect the coastline … of Santa Barbara, Carpinteria, down through the Santa Monica area and further south.”
Coastal infrastructureCoastal communities can lower flood insurance rates by addressing sea-level rise
City leaders and property developers in Tampa Bay are urging coastal communities to prepare today for sea-level rise and future floods in order to keep flood insurance rates low in the future. FEMA, which administers the National Flood Insurance Program(NFIP), is increasing flood insurance premiums across the country, partly to offset losses from recent disasters such as hurricanes Katrina and Sandy. Cities can reduce insurance premiums for nearly all residents who carry flood coverage by improving storm-water drainage, updating building codes to reflect projected rise in sea-levels, moving homes out of potentially hazardous areas, and effectively informing residents about storm danger and evacuation routes.
WaterCalifornia drought highlights the state’s economic divide
As much of Southern California enters into the spring and warmer temperatures, the effects of California’s historic drought begin to manifest themselves in the daily lives of residents, highlighting the economic inequality in the ways people cope. Following Governor Jerry Brown’s (D) unprecedented water rationing regulations,wealthier Californians weigh on which day of the week no longer to water their grass, while those less fortunate are now choosing which days they skip a bath.
WaterChanging human behavior key to tackling California drought: Expert
California is experiencing a drought that has gone far beyond a “dry spell,” and the state has imposed the first water restriction in state history, aiming to cut back on water consumption by 25 percent. One expert says that strict water conservation measures are long overdue, and that “what is happening is a realization that you can’t simply transplant another ecosystem onto a California desert system or arid southwestern system. In a sense, California and much of the U.S. southwest are living beyond their ecological means. Certain lifestyles have been adopted and crops are being grown that are not endemic or sustainable for this particular bioregion.” He adds: “This is a moment for not just cutting off personal water use and turning the tap off when you’re brushing your teeth, as important as that is. This is a moment of reflection, invitation and, I hope, legislation that will cause people to think about water use in the industrial sector too. This is for the long-term prosperity of the state and sustainability of the ecosystem.”