Chris Inglis’ new White House office has a startup feel to it. There are desks, a few chairs, a coffee maker and a poster hanging on the wall.  But as the head of the newly established Office of the National Cyber Director, Inglis has to make due with what he has while still advising President Joe Biden on the smartest ways for the US to prevent and respond to cyberattacks.

Inglis has already had numerous conversations with the president, who has made clear that the government has a role to play in the defense of the private sector and in assisting the private sector in defending critical infrastructure.  And the president knows, says Inglis, that means the government needs to get its own cyber house in order. 

But like any real startup, Inglis’ resources are scarce.  More than three months after being confirmed by the Senate, he still doesn’t have the full staff he needs to take on his timely and critical mission.  That’s because the funding for his office – some $21 million, part of the $1 trillion infrastructure bill making its way through Congress – is still stuck in the political spin cycle.  Why does it matter?

“The threat is greater than I can ever remember,” Inglis told me during last month’s AFCEA and INSA Intelligence & National Security Summit in National Harbor, Maryland. “The audacity, the brazenness, the thresholds that have been crossed at every turn; we’re in a difficult place.”

While he’s waiting for Congress to act, he says he’s spending about fifty percent of his time defining his role, being careful not to duplicate the work already being done by other agencies and departments, while spending another fifty percent building relationships that will be important later.  Eventually, he’s expected to have a staff of some 75 people who will be expected to work hand in glove with CISA, the National Security Council’s cyber staff, the OMB and others.  The remaining fifty percent of his time, Inglis jokes, is spent figuring out how to attract the country’s best talent.   

“People are starting to flow into the organization. I’m confident that we’re coming up to a breakout moment, not for the National Cyber Director, but the contribution that we can and should make. I’m sobered by the nature of the challenge, I’m optimistic we can make a difference.”

Optimistic he is.  And he’s not even complaining about being given a critical task for US national security and then having to wait for politics to play out before being able to act on it.

“It has been a semi-silver lining in that we would not have had time to think about how we want to apply the resources coming our way.”

While Inglis has been waiting, he and his small team have had time to think about the four things they’d like to focus on right away. 

First, is streamlining the roles and responsibilities in government of who handles what when it comes to protecting the public and private sectors from cyberattacks.  He also spoke during his confirmation hearing about the importance of allocation of resources and while the Office of the National Cyber Director doesn’t have the authority to move money, it does have what Inglis calls the responsibility to account for cyber money.

“One of the most critical gaps in cyber is that the physical digital infrastructure is not built to a common standard. The executive order related to this requires that within a certain amount of time we have to install basic procedures like multifactor authentication and encryption of stored material. That is a challenge and a potential vulnerability for us. We need to make sure that we make these investments necessary to buy down the lack of investment for years.

The second gap is in talent related to number of people required to occupy these jobs. It’s not simply the folks with IT or cyber in their name, but general cyber awareness. There is some expenditure of resources of time, attention, and money to get awareness right on the part of the truly accountable parties like agency and department heads. We have to make sure they don’t see cyber as a cost center, but an enabler on the part of all the users as they understand what their roles are and what the accountability is.

He admits there is still a level of education needed within government to get there.

That is usually the case in both the government and the private sector,” he said.  “We need to think this way about cyber and invest in cyber so that we can enable the mission, not hold it back. I think that education is the most important and effective way to handle this. Then, it is to make sure that the accountability is aligned and harmonized. We tend to take risk in one place and expect someone in another place to be the mitigator of a risk they don’t understand was taken in the first place. We need to operate in a collaborative fashion and get away from divisions of effort which are an agreement not to collaborate and allow adversaries to pick us off one at a time.”

Inglis says that unity of effort must start at home.  “The executive order issued in May has begun to lay out common expectations about the hardware, software, and practices that we need to begin in those spaces,” he said.  “Externally, if we have sector risk management agencies who engage the private sector for the purposes of supporting and engaging the critical components of that infrastructure, we need to make sure you don’t need a Ph.D. in government to know who to deal with and what you’re going to get from them.”

He is arguing for the government to also put ‘valuable material’ on the table.  “That could be our convening power,” said Inglis. “We could perhaps address and reduce liability or give companies a clue as to what might be around the corner because the government has access to exquisite intelligence. If that setup is possible, we also need a venue where collaboration takes place. Information doesn’t collaborate, people do.”

Inglis likes to point to the example of CISA and the Joint Cyber Collaborative.  “They put people from the private sector and the public sector side by side to co-discover threats that hold us at common risk. That project sets up the possibility of implicit collaboration in what we then do with that common operational picture. The government could take ideas that private sector companies turn into proprietary systems and enrich and classify them to deal with it in their system.”

Using what he calls “all the tools in the toolkit,” Inglis also notes the importance of international relationships, which fits nicely into the White House’s International Summit on Ransomware last week in Washington, which zeroed in on tighter cryptocurrency standards, among other things. “Beyond the Five Eyes, what do other like-minded nations think about what is expected behavior in this? What are governmental actions that are appropriate,” he asked.  

Inglis has been an active participant in the president’s recent actions in cyber.  He took part in a White House meeting with tech leaders in August that was hosted by President Biden, who Inglis says, spent the first hour sharing his vision about how the country should focus on collaborative integration.  “The companies represented weren’t only companies like Microsoft and Apple, but people who operate in the critical infrastructure space,” said Inglis.  “The people component, educators, were represented reflecting the president’s view that cyberspace is not just technology, it is also the people component. They are a major link in the chain, and we need to get the roles and responsibilities right.”

While he’s waiting for the funding he needs to get his office fully staffed, Inglis said he’s also putting thought into reconciling resources with aspirations.  Managing expectations is going to be important.  Frustration has been growing for years over what some see as a lack of government response to some of the largest hacks in history.  The phrase ‘time and place of our choosing’ as a definition of response has grown old and some Americans are weary of a government that isn’t responding in a more public way to the beating it sees the US taking in cyberspace.

So, I asked Inglis whether there should be red lines in cyber.

“Red lines are both good and bad,” he answered.  “They are clear and crisp, and everybody knows what they are. The downside is that because of that, an adversary knows exactly how far they can go. It means that you set up a somewhat permissive environment. Red lines also don’t have context; sometimes there is a reason that a defender would make the ransomware payment. As a matter of policy, the U.S. government does not pay ransomware, but I imagine there will be a situation at some point where a hospital is against the Russian state and actual life and safety is at risk. If there is no other way to get the material back, in order to get back in the business of saving lives, they would want to rethink if a red line is a red line in that particular situation. I think the right thing to do here is not to establish hard thresholds of things with scripted responses, but outline what we are prepared to defend and what principles we will exercise in defense of those things. We commit to defending the private sector when it is held at risk by a nation state in cyberspace as much as in the kinetic space and make that clear to adversaries. I think that would be more helpful in changing decision calculus and creating a useful ambiguity about when and where we will come in.”

Inglis said he’s also thinking a lot about present and future resilience.  It’s a worthwhile focus, given that the White House estimates that nearly half a million public and private sector cybersecurity jobs are currently unfilled. 

“That is a massive problem,” said Inglis. “However, the more insidious problem is that the 320 million people in the United States who use the internet who have no idea how to properly take their place on the front lines of this issue. There is an awareness issue that requires us not to make Python programmers out of them but to make sure they understand the nature of this space.”

Everyone has heard the old saying that time is money, but in Inglis’ case, time is security so I asked him point blank whether he thought government was moving has quickly as it should on the cyber problem.

“Government is moving at speed; the question is if it is at the necessary speed. I don’t think anyone is moving at the necessary speed. Some are moving at light speed, but at the end of the day, we need an integrated, collaborative approach. While we won’t have unity of command, I think there needs to be a universally felt sense of urgency so that we will all get our heads in the game.”

Congress, are you listening?  Oh, and by the way, that poster in Inglis’ office? It reads, ‘Hours Since the Last Surprise.”

As a startup with maybe too few resources at the start and who often didn’t understand how all the wickets are run, we have our occasional surprise,” said Inglis.  “When we encounter those surprises and go to someone with the deep and sharp expertise to help us navigate that, we get what we need. However, we are not a full functioning, full featured, fully capable organization yet. We’re trying to build somebody else’s airplane while we’re free falling from our own. We have a parachute, and we can land safely, but it is a bit of a challenge at times.”

Find out more about why experts like former NSA Director General Keith Alexander (Ret.), Mandiant CEO Kevin Mandia and others have joined The Cyber Initiatives Group, powered by The Cipher Brief

Read more expert national security insights, perspective and analysis in The Cipher Brief

The post Chris Inglis and the Gathering Cyber Storm appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Criminals convicted of multiple cases of rape could face chemical castration in Pakistan as the country’s parliament supported new legislation aimed at tackling the rise in sexual offenses there.

The amendments to existing legislation, which allow for speedy conviction and harsher punishments for rapists, have been voted in by the MPs on Wednesday.

They introduce the death penalty or a life sentence for gang rape as well as chemical castration for repeat sex offenders, with the consent of the convict.

Chemical castration was described in the bill as a process through which “a person is rendered incapable of performing sexual intercourse for any period of his life, as may be determined by the court through administration of drugs.”

Read more

RT
High court rules Pakistan’s ‘two-finger’ virginity test for rape victims unconstitutional

It’s planned to establish special courts across the country to make sure that verdicts in sexual assault cases are delivered “expeditiously, preferably within four months.” If chemical castration is assigned as a punishment, it “shall be conducted through a notified medical board,” according to the new legislation.

Mushtaq Ahmed, a senator for the religious Jamaat-i-Islami party, had earlier denounced the bill as un-Islamic. Ahmed argued that there was no mention of chemical castration in Sharia law and that rapists are to be hanged in public.

By resorting to drugs to reduce the libido of repeat sex offenders, Pakistan joins South Korea, Poland, the Czech Republic and some US states, where chemical castration has been introduced.

The measure was put on the table a year ago by Pakistani President Arif Alvi in response to a vast public outcry over a spike across the country in cases of rape involving both women and children.

Back then, Amnesty International decried chemical castration as a “cruel, inhumane” treatment, advising Islamabad to instead focus on reforming its “flawed” justice system and to ensure justice for the victim.

Local NGO War Against Rape told Reuters last year that less than 3% of sexual assault or rape prosecutions in Pakistan result in a conviction.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

An Argentinian woman has become the second-ever HIV-infected person whose immune system helped defeat the virus without requiring additional medical treatment. She was first diagnosed with the AIDS-causing infection in 2013.

Scientists have dubbed the 30-year-old mother the “Esperanza patient,” after her hometown. The word ‘esperanza’ translates to ‘hope’ in English. Publishing their findings in the Annals of Internal Medicine journal on Monday, the researchers said the discovery boosts hope for a “sterilizing cure” for the estimated 38 million people with the life-long infection.

“I enjoy being healthy,” the Esperanza patient told NBC News over email. “I have a healthy family. I don’t have to medicate, and I live as though nothing has happened. This already is a privilege.”

The study found no intact remnants of the virus in the 1.5 billion blood and tissue cells the researchers analyzed – confirming the discovery first announced in March at an international meeting of HIV experts.

Read more

© Belova59 from Pixabay
‘Elite controllers’ can cure themselves of HIV without any medical treatment, bombshell research claims

No additional information about the woman has been made public, but she was described at the time as “athletic and beautiful” and revealed to have an HIV-negative boyfriend and newborn baby.

Only one other person, identified in August 2020 as 67-year-old Loreen Willenberg from San Francisco, has been confirmed to have overcome the virus without medical intervention. The two women have been labeled ‘elite controllers’, referring to a rare subset of HIV patients who show no signs of the infection despite not undergoing antiretroviral treatments.

Typically, an HIV-infected person requires constant drug therapy to prevent the virus from attaching to their immune cells’ DNA and replicating. But, in the eight years since she was diagnosed, the Esperanza patient only received medication for six months during pregnancy to ensure her baby would be healthy.

In all, there have been four patients cured of HIV, two of whom – the ‘Berlin patient’ Timothy Ray Brown and the ‘London patient’ Adam Castillejo – were also cancer patients who received risky bone marrow transplants from donors with HIV-resistant genes. However, the success of their procedures is yet to be replicated.

“This is really the miracle of the human immune system that did it,” Dr. Xu Yu, an immunologist at the Ragon Institute in Boston, who co-authored the study, told NBC.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Controversial psychologist and author Jordan Peterson claimed Western countries had no “moral right” to force developing nations to reduce pollution output, noting instead that improving their economies was key.

During an appearance on the BBC’s ‘Question Time’ show on Thursday, the Canadian professor noted that the focus of climate change policies should be on incentivizing the development of cheap energy in poorer polluter countries.

“The best long term solution is to try to make developing countries as rich as possible, and the best way to do that is not control their pollution output, but to help them develop the cheapest energy they can possibly manage as fast as they possibly can,” Peterson said.

The debate saw UK undersecretary for employment Mims Davies suggest that measures taken to tackle climate change should not come at the “expense of developing countries.” But Peterson countered that it “absolutely, 100% will be [at their expense].”

I don’t think we have any moral right in the West at all to do that.

Read more

FILE PHOTO: Jordan Peterson speaking with attendees at the 2018 Student Action Summit hosted by Turning Point USA in West Palm Beach, Florida, December 20, 2018 © Flickr / Gage Skidmore
Jordan Peterson hammers ‘totalitarian’ Covid rules

He also criticized the recent COP26 climate change conference for failing to explore ideas on how best to improve national economies in the developing world, noting that he saw “very little of that sort of idea” coming out of the UN summit.

In the final hours of the two-week conference, China and India had intervened to soften the wording around the use of coal in the Glasgow Pact. The two countries demanded a change in the final text of the agreement that called for coal to be phased out, revising this to “phasing down unabated coal.”

The move prompted COP26 president and UK minister Alok Sharma to declare that China and India would have to “justify” their actions to countries that were more vulnerable to global warming effects. However, officials in both Beijing and New Delhi have countered that the criticism was unfair.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

The Funniest Clothing Labels Ever – When was the last time you read the label on your favorite shirt or most comfortable pair of jeans? Maybe it’s time to take a look, your clothing tags may hide a funny message.

The Perfect Gift For Someone You Hate – Hungry AND tired? You can rest on this soft body pillow shaped like smoked pig’s feet! What really amazes us are the details, it looks so real… and so disgusting.

Every Cat at 3AM – If you currently have or have ever had a cat, you’ll be able to relate to Gus Johnson’s video, in which he demonstrates one of the many ways in which our furry friends can be a-holes.

The Funniest Dog Videos Of All Time – We understand the value of a good funny dog video, so here’s a list of our six best viral pup videos of all time. You’re welcome.

Mildly Infuriating Things In Life – Sometimes the internet shows you a photo that’s ever so slightly wrong that it sticks in your brain forever…

Funny Images Showing How Differently Men and Women Act – Yup, we’re different and there is no denying that fact. We have different bodies, different brains and different ways of using both.

Dads Who Didn’t Want The Damn Dogs In Their Lives – Dad logic is a weird thing. They say they hate dogs, and then you end up with a gallery like this…

Random Funny Pictures – What do you do when you are bored at work? You just mindlessly scroll through random funny pictures, of course!

Mr. Bean Playing Every Role In Hollywood – When one thinks of a rugged, versatile actor capable of elevating any role given to them, Mr. Bean naturally springs to mind. And yet he was never cast as Frodo Baggins or Indiana Jones, which in our eyes is one of the saddest tragedies of modern filmmaking.

Funny Thanksgiving Cake Fails – Thanksgiving is a day to reflect and enjoy time with family… and sometimes to FAIL.

Still bored to tears and want to see more funny and entertaining links? You should check out Linkiest, Leenks, or Fark!

The post This Month’s Funniest Internet Finds first appeared on .

find more fun & mates at SoShow now !

Chris Inglis’ new White House office has a startup feel to it. There are desks, a few chairs, a coffee maker and a poster hanging on the wall.  But as the head of the newly established Office of the National Cyber Director, Inglis has to make due with what he has while still advising President Joe Biden on the smartest ways for the US to prevent and respond to cyberattacks.

Inglis has already had numerous conversations with the president, who has made clear that the government has a role to play in the defense of the private sector and in assisting the private sector in defending critical infrastructure.  And the president knows, says Inglis, that means the government needs to get its own cyber house in order. 

But like any real startup, Inglis’ resources are scarce.  More than three months after being confirmed by the Senate, he still doesn’t have the full staff he needs to take on his timely and critical mission.  That’s because the funding for his office – some $21 million, part of the $1 trillion infrastructure bill making its way through Congress – is still stuck in the political spin cycle.  Why does it matter?

“The threat is greater than I can ever remember,” Inglis told me during last month’s AFCEA and INSA Intelligence & National Security Summit in National Harbor, Maryland. “The audacity, the brazenness, the thresholds that have been crossed at every turn; we’re in a difficult place.”

While he’s waiting for Congress to act, he says he’s spending about fifty percent of his time defining his role, being careful not to duplicate the work already being done by other agencies and departments, while spending another fifty percent building relationships that will be important later.  Eventually, he’s expected to have a staff of some 75 people who will be expected to work hand in glove with CISA, the National Security Council’s cyber staff, the OMB and others.  The remaining fifty percent of his time, Inglis jokes, is spent figuring out how to attract the country’s best talent.   

“People are starting to flow into the organization. I’m confident that we’re coming up to a breakout moment, not for the National Cyber Director, but the contribution that we can and should make. I’m sobered by the nature of the challenge, I’m optimistic we can make a difference.”

Optimistic he is.  And he’s not even complaining about being given a critical task for US national security and then having to wait for politics to play out before being able to act on it.

“It has been a semi-silver lining in that we would not have had time to think about how we want to apply the resources coming our way.”

While Inglis has been waiting, he and his small team have had time to think about the four things they’d like to focus on right away. 

First, is streamlining the roles and responsibilities in government of who handles what when it comes to protecting the public and private sectors from cyberattacks.  He also spoke during his confirmation hearing about the importance of allocation of resources and while the Office of the National Cyber Director doesn’t have the authority to move money, it does have what Inglis calls the responsibility to account for cyber money.

“One of the most critical gaps in cyber is that the physical digital infrastructure is not built to a common standard. The executive order related to this requires that within a certain amount of time we have to install basic procedures like multifactor authentication and encryption of stored material. That is a challenge and a potential vulnerability for us. We need to make sure that we make these investments necessary to buy down the lack of investment for years.

The second gap is in talent related to number of people required to occupy these jobs. It’s not simply the folks with IT or cyber in their name, but general cyber awareness. There is some expenditure of resources of time, attention, and money to get awareness right on the part of the truly accountable parties like agency and department heads. We have to make sure they don’t see cyber as a cost center, but an enabler on the part of all the users as they understand what their roles are and what the accountability is.

He admits there is still a level of education needed within government to get there.

That is usually the case in both the government and the private sector,” he said.  “We need to think this way about cyber and invest in cyber so that we can enable the mission, not hold it back. I think that education is the most important and effective way to handle this. Then, it is to make sure that the accountability is aligned and harmonized. We tend to take risk in one place and expect someone in another place to be the mitigator of a risk they don’t understand was taken in the first place. We need to operate in a collaborative fashion and get away from divisions of effort which are an agreement not to collaborate and allow adversaries to pick us off one at a time.”

Inglis says that unity of effort must start at home.  “The executive order issued in May has begun to lay out common expectations about the hardware, software, and practices that we need to begin in those spaces,” he said.  “Externally, if we have sector risk management agencies who engage the private sector for the purposes of supporting and engaging the critical components of that infrastructure, we need to make sure you don’t need a Ph.D. in government to know who to deal with and what you’re going to get from them.”

He is arguing for the government to also put ‘valuable material’ on the table.  “That could be our convening power,” said Inglis. “We could perhaps address and reduce liability or give companies a clue as to what might be around the corner because the government has access to exquisite intelligence. If that setup is possible, we also need a venue where collaboration takes place. Information doesn’t collaborate, people do.”

Inglis likes to point to the example of CISA and the Joint Cyber Collaborative.  “They put people from the private sector and the public sector side by side to co-discover threats that hold us at common risk. That project sets up the possibility of implicit collaboration in what we then do with that common operational picture. The government could take ideas that private sector companies turn into proprietary systems and enrich and classify them to deal with it in their system.”

Using what he calls “all the tools in the toolkit,” Inglis also notes the importance of international relationships, which fits nicely into the White House’s International Summit on Ransomware last week in Washington, which zeroed in on tighter cryptocurrency standards, among other things. “Beyond the Five Eyes, what do other like-minded nations think about what is expected behavior in this? What are governmental actions that are appropriate,” he asked.  

Inglis has been an active participant in the president’s recent actions in cyber.  He took part in a White House meeting with tech leaders in August that was hosted by President Biden, who Inglis says, spent the first hour sharing his vision about how the country should focus on collaborative integration.  “The companies represented weren’t only companies like Microsoft and Apple, but people who operate in the critical infrastructure space,” said Inglis.  “The people component, educators, were represented reflecting the president’s view that cyberspace is not just technology, it is also the people component. They are a major link in the chain, and we need to get the roles and responsibilities right.”

While he’s waiting for the funding he needs to get his office fully staffed, Inglis said he’s also putting thought into reconciling resources with aspirations.  Managing expectations is going to be important.  Frustration has been growing for years over what some see as a lack of government response to some of the largest hacks in history.  The phrase ‘time and place of our choosing’ as a definition of response has grown old and some Americans are weary of a government that isn’t responding in a more public way to the beating it sees the US taking in cyberspace.

So, I asked Inglis whether there should be red lines in cyber.

“Red lines are both good and bad,” he answered.  “They are clear and crisp, and everybody knows what they are. The downside is that because of that, an adversary knows exactly how far they can go. It means that you set up a somewhat permissive environment. Red lines also don’t have context; sometimes there is a reason that a defender would make the ransomware payment. As a matter of policy, the U.S. government does not pay ransomware, but I imagine there will be a situation at some point where a hospital is against the Russian state and actual life and safety is at risk. If there is no other way to get the material back, in order to get back in the business of saving lives, they would want to rethink if a red line is a red line in that particular situation. I think the right thing to do here is not to establish hard thresholds of things with scripted responses, but outline what we are prepared to defend and what principles we will exercise in defense of those things. We commit to defending the private sector when it is held at risk by a nation state in cyberspace as much as in the kinetic space and make that clear to adversaries. I think that would be more helpful in changing decision calculus and creating a useful ambiguity about when and where we will come in.”

Inglis said he’s also thinking a lot about present and future resilience.  It’s a worthwhile focus, given that the White House estimates that nearly half a million public and private sector cybersecurity jobs are currently unfilled. 

“That is a massive problem,” said Inglis. “However, the more insidious problem is that the 320 million people in the United States who use the internet who have no idea how to properly take their place on the front lines of this issue. There is an awareness issue that requires us not to make Python programmers out of them but to make sure they understand the nature of this space.”

Everyone has heard the old saying that time is money, but in Inglis’ case, time is security so I asked him point blank whether he thought government was moving has quickly as it should on the cyber problem.

“Government is moving at speed; the question is if it is at the necessary speed. I don’t think anyone is moving at the necessary speed. Some are moving at light speed, but at the end of the day, we need an integrated, collaborative approach. While we won’t have unity of command, I think there needs to be a universally felt sense of urgency so that we will all get our heads in the game.”

Congress, are you listening?  Oh, and by the way, that poster in Inglis’ office? It reads, ‘Hours Since the Last Surprise.”

As a startup with maybe too few resources at the start and who often didn’t understand how all the wickets are run, we have our occasional surprise,” said Inglis.  “When we encounter those surprises and go to someone with the deep and sharp expertise to help us navigate that, we get what we need. However, we are not a full functioning, full featured, fully capable organization yet. We’re trying to build somebody else’s airplane while we’re free falling from our own. We have a parachute, and we can land safely, but it is a bit of a challenge at times.”

Find out more about why experts like former NSA Director General Keith Alexander (Ret.), Mandiant CEO Kevin Mandia and others have joined The Cyber Initiatives Group, powered by The Cipher Brief

Read more expert national security insights, perspective and analysis in The Cipher Brief

The post Chris Inglis and the Gathering Cyber Storm appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

People around the world will need to get a jab against Covid-19 once a year, at least when it comes to the Pfizer vaccine, BioNTech’s CEO Ugur Sahin said in an interview on Sunday, as he praised the quality of its booster shot.

In an interview with Germany’s Bild newspaper on Sunday, Sahin said he considers the vaccine, co-developed by his company, to be “very effective.”

Read more

© Getty Images / sasacvetkovic33
Drastic drop in Covid vaccine effectiveness – study

When asked whether people should be worried about the “breakthrough infections” – in which those vaccinated with the Pfizer-BioNTech vaccine still developed Covid-19 symptoms – he dismissed such concerns, saying that the jab offers a “90 percent protection” against cases that require intensive care in those aged over 60.

A “very high” level of protection against severe illness lasts for up to nine months, the BioNTech CEO maintained. He said this level starts decreasing “from the fourth month,” however. To maintain the protection, Sahin strongly pushed for booster shots, arguing that they would not just restore levels of antibodies but would potentially help “to break … chains of infection.”

He also encouraged doctors to be “as pragmatic as possible” when it comes to greenlighting vaccination and “not to send people home unvaccinated even though they could be vaccinated without any problems.”

In the future, people might need to get booster shots once a year, the BioNTech CEO believes. He said that he expects protection from a booster shot to “last longer” than the initial immunity one acquires after getting two doses of the vaccine.

“Subsequent … vaccinations may only be needed every year – just like [with] influenza,” he said. Currently, the German Federal Center for Health Education – an agency subordinated to the Health Ministry – recommends a booster shot six months after one gets the second dose of a vaccine. It also says that “booster vaccination makes sense after a minimum interval of about four months.”

Read more

© AFP / MARTIN BERNETTI
FDA approves Covid booster shots for all US adults

Sahin’s interview comes days after it was revealed that Pfizer, BioNTech and Moderna are making a combined profit of $65,000 every minute – all thanks to their Covid-19 jabs. That is according to estimates made by the People’s Vaccine Alliance (PVA) – a coalition demanding wider access to vaccines.

The PVA estimated that the three companies are to earn a total of $34 billion in combined pre-tax profits this year alone, which roughly translates into more than $1,000 a second and $93.5 million a day.

PVA has slammed the three companies over their refusal to allow vaccine technology transfer despite receiving a combined $8 billion in public funding. Such a move could increase global supply and save millions of lives as well as drive down prices, the coalition said.

“Pfizer, BioNTech and Moderna have used their monopolies to prioritize the most profitable contracts with the richest governments, leaving low-income countries out in the cold,” said Maaza Seyoum of the African Alliance and People’s Vaccine Alliance Africa.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

The Robert Koch Institute, Germany’s disease control agency, has warned that the country will face a “really terrible Christmas” unless steps are taken to mitigate a huge rise in Covid-19 cases.

Speaking on Thursday, the director of the Robert Koch Institute, Lothar Wieler, reiterated the case for new, strict countermeasures to prevent the spread of Covid-19.

Read more

(FILE PHOTO) © REUTERS/David W Cerny
Czechia rolls out new restrictions for unvaccinated

“We are currently heading toward a serious emergency,” Wieler stated, adding we are going to have a really terrible Christmas if we don’t take countermeasures now.” He added that hospitals were already struggling to find enough beds.

Wieler has called for a campaign for a further increase in vaccine uptake, from the current 67% to well over 75%.

The diseases institute director also believes bars, nightclubs, and other large-scale venues should be temporarily forced to close, and that other areas of public life should be off-limits to the unvaccinated.

His comments come as German leaders ponder new restrictions to replace the nationwide epidemic rules, which could include a lockdown of the unvaccinated, following measures already taken in neighboring Austria.

On Thursday, in an attempt to counter waning immunity levels, the country’s vaccine advisory board recommended that booster shots be made available to everyone aged 18 or above. 

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Israel has allegedly launched two missiles targeting an area south of the Syrian capital, Damascus, Syria’s state media reported, noting that one of the projectiles was intercepted. There are no reports of damage.

The reported attack took place shortly after midnight on Wednesday local time, according to Syria’s SANA news agency. The projectiles came from the direction of the Israeli-occupied Golan Heights, the outlet noted. The strike targeted an “empty building” south of the capital and resulted in no losses, according to the report.

Read more

Historic town of the Crusader city of Tartus, Tartous, built on the antique citadel, Syria, Middle East, West Asia. © Global Look Press / imagebroker / Egmont Strigl
Syria accuses Israel of missile strikes near Russian base

Israel routinely makes incursions into Syria under the pretext of taking out alleged Iranian outposts there. The Israel Defense Forces (IDF) typically refrain from commenting on the raids, in line with its long-standing policy on military operations conducted outside its borders. Just over a week ago, two Syrian soldiers were injured in reported Israeli missile strikes on the cities of Tartus and Homs, near Russia’s naval base. The bombing also reportedly inflicted material losses. 

Damascus has repeatedly condemned Israeli attacks against its territory as violations of its sovereignty. Russia, Iran, and Turkey have also denounced the Israeli airstrikes in Syria as a breach of international law.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

The longest lunar eclipse in over 500 years will occur in the early hours of November 19, lasting several hours.

The peak of the partial eclipse will take place in the predawn hours on Friday when 97% of the moon will be eclipsed by the Earth’s shadow. The previous longest partial eclipse took place in 2018 and lasted less than two hours, while this will last for several hours.

The eclipse will be visible from all 50 US states, Canada, and Mexico, as well as parts of South America, Polynesia, Australia, and China, according to NASA.

The moon will be at its farthest point from Earth during the eclipse, slowing its orbit and extending the time it takes to move out of the darkest part of the planet’s shadow, known as the umbra, as the moon, Earth, and sun will all be aligned. The Holcomb Observatory has released a video detailing what the eclipse will look like. 

The event will begin shortly after midnight and unlike a solar eclipse, no one will need special eyewear to view the phenomenon.

When the eclipse occurs, the moon will take on a reddish hue, with only a sliver of the actual moon visible. The event will last for several hours, making it the longest of its kind in 580 years, with the next lunar eclipse not occurring until May of 2022.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !