The EU’s drug regulator has backed the emergency use of Merck’s pill for the treatment for clinically vulnerable Covid-19 patients as cases surge across the continent.

On Friday, the European Medicines Agency (EMA) “issued advice” backing the emergency use of the drug developed by Merck in collaboration with Ridgeback Biotherapeutics, although it has not yet been authorized by national authorities.

Read more

© Reuters / Piroschka van de Wouw
EMA green lights new Covid treatments

In a statement, the drug regulator said the medicine called Lagevrio – also known as molnupiravir or MK 4482 – “can be used to treat adults with Covid-19 who do not require supplemental oxygen and who are at increased risk of developing severe Covid-19.

It said the treatment should be administered as soon as possible after Covid-19 is diagnosed and within five days of the start of symptoms. The medicine should be taken twice a day for a period of five days.

The EMA listed the potential side effects of the capsules, including mild or moderate diarrhea, nausea, dizziness and headache. The treatment is not recommended for pregnant women.

The watchdog announced earlier on Friday that it had begun reviewing Pfizer’s medicine Paxlovid for Covid-19 with the same goal “to support national authorities” who may decide on its early use prior to marketing authorization in light of rising cases and deaths in Europe.

On Friday, Austria announced it would enter a new nationwide lockdown from Monday and make vaccination mandatory, while Germany’s health authorities claimed the country had turned into “one big outbreak.”

Both Pfizer and Merck have requested approval for their coronavirus medicines from the US Food and Drug Administration, but it is unclear when it might be granted.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

The Philippine government has accused the Chinese Coast Guard of unleashing water cannon on two supply ships in a disputed stretch of the South China Sea, claiming its boats were blocked and forced to turn around.

Manila’s Department of Foreign Affairs detailed the encounter in a statement on Wednesday, alleging that a pair of supply boats en route to the Ayungin Shoal – also known as the Second Thomas Shoal – were stopped by three Chinese vessels and “water cannoned” before they could reach their destination.

“Fortunately, no one was hurt; but our boats had to abort their resupply mission,” Foreign Affairs Secretary Teodoro Locsin said, adding that the department had conveyed its “outrage, condemnation and protest of the incident” to Beijing’s envoy to the Philippines, Huang Xilian.

The acts of the Chinese Coast Guard vessels are illegal. China has no law enforcement rights in and around these areas. They must take heed and back off.

Though both China and the Philippines claim territorial rights to the Ayungin Shoal, The Hague’s Permanent Court of Arbitration ruled in the latter country’s favor in 2016. And despite Chinese objections, the Philippines has occupied the area for much longer, after its military purposely grounded a naval vessel on the shoal in 1999.  

READ MORE: Manila backs controversial AUKUS security pact as move to fix ‘imbalance’ of power in Southeast Asia

Manila was also quick to note that the supply ships are “covered by the Philippines-United States Mutual Defense Treaty,” a pact inked with Washington in 1951 that calls for a US military response to any attack on the country, including “island territories under its jurisdiction in the Pacific Ocean, its armed forces, public vessels or aircraft.” 

Beijing so far has not commented on the alleged run-in.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

Hospitals in the Netherlands have begun delaying certain operations to free-up ICU beds during a record wave of Covid-19 infections, while an infectious diseases researcher has warned of an impending ‘Code Black’ in the sector.

The country set a daily national record for new Covid infections on Thursday, registering around 23,600 cases. It was the third day in a row of the figure topping 20,000.

To make more staff available for Covid wards, a number of operations, including those for cancer and heart patients, are being canceled from this week on, Dutch healthcare officials have said. Fewer than 200 beds remained available in Dutch ICUs as of Thursday, while Friday figures show almost half (47.8%) of occupied ICU beds were being used by Covid patients.

Read more

FILE PHOTO. A woman wearing a protective mask walks past a store in Amsterdam, Netherlands.
Netherlands re-introduces facemasks & other restrictions as Covid-19 cases surge

“These are cancer patients that should actually be operated-on within six weeks of diagnosis, and that won’t be met in all cases. It’s also heart patients,” said a spokesperson for the National Coordination Center for Patient Distribution (LCPS).

Meanwhile, new calculations by an infectious disease modeller at Wageningen University & Research suggest that a so-called ‘Code Black’ in hospitals is looming. The emergency designation means that patient safety is at risk and, if declared, would mean many people with life-threatening illnesses cannot go to the ICU, while doctors have to prioritize who to treat.

According to recent estimates from the Dutch Healthcare Authority (NZa), up to 200,000 operations were not performed as a result of urgently needed Covid care since the start of the pandemic. On Thursday, the NZa revealed that almost a quarter of operating rooms across the country are not currently in use due to a combination of Covid patient pressures and rising staff absences due to illness.

It is not yet clear what impact the delayed care will have on public health. In December 2020, the Dutch National Institute for Public Health and the Environment (RIVM) calculated that an estimated 34,000 to 50,000 ‘healthy life years’ had been lost due to the first Covid-19 wave alone.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

Chris Inglis’ new White House office has a startup feel to it. There are desks, a few chairs, a coffee maker and a poster hanging on the wall.  But as the head of the newly established Office of the National Cyber Director, Inglis has to make due with what he has while still advising President Joe Biden on the smartest ways for the US to prevent and respond to cyberattacks.

Inglis has already had numerous conversations with the president, who has made clear that the government has a role to play in the defense of the private sector and in assisting the private sector in defending critical infrastructure.  And the president knows, says Inglis, that means the government needs to get its own cyber house in order. 

But like any real startup, Inglis’ resources are scarce.  More than three months after being confirmed by the Senate, he still doesn’t have the full staff he needs to take on his timely and critical mission.  That’s because the funding for his office – some $21 million, part of the $1 trillion infrastructure bill making its way through Congress – is still stuck in the political spin cycle.  Why does it matter?

“The threat is greater than I can ever remember,” Inglis told me during last month’s AFCEA and INSA Intelligence & National Security Summit in National Harbor, Maryland. “The audacity, the brazenness, the thresholds that have been crossed at every turn; we’re in a difficult place.”

While he’s waiting for Congress to act, he says he’s spending about fifty percent of his time defining his role, being careful not to duplicate the work already being done by other agencies and departments, while spending another fifty percent building relationships that will be important later.  Eventually, he’s expected to have a staff of some 75 people who will be expected to work hand in glove with CISA, the National Security Council’s cyber staff, the OMB and others.  The remaining fifty percent of his time, Inglis jokes, is spent figuring out how to attract the country’s best talent.   

“People are starting to flow into the organization. I’m confident that we’re coming up to a breakout moment, not for the National Cyber Director, but the contribution that we can and should make. I’m sobered by the nature of the challenge, I’m optimistic we can make a difference.”

Optimistic he is.  And he’s not even complaining about being given a critical task for US national security and then having to wait for politics to play out before being able to act on it.

“It has been a semi-silver lining in that we would not have had time to think about how we want to apply the resources coming our way.”

While Inglis has been waiting, he and his small team have had time to think about the four things they’d like to focus on right away. 

First, is streamlining the roles and responsibilities in government of who handles what when it comes to protecting the public and private sectors from cyberattacks.  He also spoke during his confirmation hearing about the importance of allocation of resources and while the Office of the National Cyber Director doesn’t have the authority to move money, it does have what Inglis calls the responsibility to account for cyber money.

“One of the most critical gaps in cyber is that the physical digital infrastructure is not built to a common standard. The executive order related to this requires that within a certain amount of time we have to install basic procedures like multifactor authentication and encryption of stored material. That is a challenge and a potential vulnerability for us. We need to make sure that we make these investments necessary to buy down the lack of investment for years.

The second gap is in talent related to number of people required to occupy these jobs. It’s not simply the folks with IT or cyber in their name, but general cyber awareness. There is some expenditure of resources of time, attention, and money to get awareness right on the part of the truly accountable parties like agency and department heads. We have to make sure they don’t see cyber as a cost center, but an enabler on the part of all the users as they understand what their roles are and what the accountability is.

He admits there is still a level of education needed within government to get there.

That is usually the case in both the government and the private sector,” he said.  “We need to think this way about cyber and invest in cyber so that we can enable the mission, not hold it back. I think that education is the most important and effective way to handle this. Then, it is to make sure that the accountability is aligned and harmonized. We tend to take risk in one place and expect someone in another place to be the mitigator of a risk they don’t understand was taken in the first place. We need to operate in a collaborative fashion and get away from divisions of effort which are an agreement not to collaborate and allow adversaries to pick us off one at a time.”

Inglis says that unity of effort must start at home.  “The executive order issued in May has begun to lay out common expectations about the hardware, software, and practices that we need to begin in those spaces,” he said.  “Externally, if we have sector risk management agencies who engage the private sector for the purposes of supporting and engaging the critical components of that infrastructure, we need to make sure you don’t need a Ph.D. in government to know who to deal with and what you’re going to get from them.”

He is arguing for the government to also put ‘valuable material’ on the table.  “That could be our convening power,” said Inglis. “We could perhaps address and reduce liability or give companies a clue as to what might be around the corner because the government has access to exquisite intelligence. If that setup is possible, we also need a venue where collaboration takes place. Information doesn’t collaborate, people do.”

Inglis likes to point to the example of CISA and the Joint Cyber Collaborative.  “They put people from the private sector and the public sector side by side to co-discover threats that hold us at common risk. That project sets up the possibility of implicit collaboration in what we then do with that common operational picture. The government could take ideas that private sector companies turn into proprietary systems and enrich and classify them to deal with it in their system.”

Using what he calls “all the tools in the toolkit,” Inglis also notes the importance of international relationships, which fits nicely into the White House’s International Summit on Ransomware last week in Washington, which zeroed in on tighter cryptocurrency standards, among other things. “Beyond the Five Eyes, what do other like-minded nations think about what is expected behavior in this? What are governmental actions that are appropriate,” he asked.  

Inglis has been an active participant in the president’s recent actions in cyber.  He took part in a White House meeting with tech leaders in August that was hosted by President Biden, who Inglis says, spent the first hour sharing his vision about how the country should focus on collaborative integration.  “The companies represented weren’t only companies like Microsoft and Apple, but people who operate in the critical infrastructure space,” said Inglis.  “The people component, educators, were represented reflecting the president’s view that cyberspace is not just technology, it is also the people component. They are a major link in the chain, and we need to get the roles and responsibilities right.”

While he’s waiting for the funding he needs to get his office fully staffed, Inglis said he’s also putting thought into reconciling resources with aspirations.  Managing expectations is going to be important.  Frustration has been growing for years over what some see as a lack of government response to some of the largest hacks in history.  The phrase ‘time and place of our choosing’ as a definition of response has grown old and some Americans are weary of a government that isn’t responding in a more public way to the beating it sees the US taking in cyberspace.

So, I asked Inglis whether there should be red lines in cyber.

“Red lines are both good and bad,” he answered.  “They are clear and crisp, and everybody knows what they are. The downside is that because of that, an adversary knows exactly how far they can go. It means that you set up a somewhat permissive environment. Red lines also don’t have context; sometimes there is a reason that a defender would make the ransomware payment. As a matter of policy, the U.S. government does not pay ransomware, but I imagine there will be a situation at some point where a hospital is against the Russian state and actual life and safety is at risk. If there is no other way to get the material back, in order to get back in the business of saving lives, they would want to rethink if a red line is a red line in that particular situation. I think the right thing to do here is not to establish hard thresholds of things with scripted responses, but outline what we are prepared to defend and what principles we will exercise in defense of those things. We commit to defending the private sector when it is held at risk by a nation state in cyberspace as much as in the kinetic space and make that clear to adversaries. I think that would be more helpful in changing decision calculus and creating a useful ambiguity about when and where we will come in.”

Inglis said he’s also thinking a lot about present and future resilience.  It’s a worthwhile focus, given that the White House estimates that nearly half a million public and private sector cybersecurity jobs are currently unfilled. 

“That is a massive problem,” said Inglis. “However, the more insidious problem is that the 320 million people in the United States who use the internet who have no idea how to properly take their place on the front lines of this issue. There is an awareness issue that requires us not to make Python programmers out of them but to make sure they understand the nature of this space.”

Everyone has heard the old saying that time is money, but in Inglis’ case, time is security so I asked him point blank whether he thought government was moving has quickly as it should on the cyber problem.

“Government is moving at speed; the question is if it is at the necessary speed. I don’t think anyone is moving at the necessary speed. Some are moving at light speed, but at the end of the day, we need an integrated, collaborative approach. While we won’t have unity of command, I think there needs to be a universally felt sense of urgency so that we will all get our heads in the game.”

Congress, are you listening?  Oh, and by the way, that poster in Inglis’ office? It reads, ‘Hours Since the Last Surprise.”

As a startup with maybe too few resources at the start and who often didn’t understand how all the wickets are run, we have our occasional surprise,” said Inglis.  “When we encounter those surprises and go to someone with the deep and sharp expertise to help us navigate that, we get what we need. However, we are not a full functioning, full featured, fully capable organization yet. We’re trying to build somebody else’s airplane while we’re free falling from our own. We have a parachute, and we can land safely, but it is a bit of a challenge at times.”

Find out more about why experts like former NSA Director General Keith Alexander (Ret.), Mandiant CEO Kevin Mandia and others have joined The Cyber Initiatives Group, powered by The Cipher Brief

Read more expert national security insights, perspective and analysis in The Cipher Brief

The post Chris Inglis and the Gathering Cyber Storm appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

The Islamic State terrorist group is tearing a path across Afghanistan, establishing itself in “nearly all” of its provinces while increasing attacks more than five-fold in the past year, the UN’s envoy to the country has warned.

Addressing the UN Security Council on Wednesday, the body’s special representative for Afghanistan Deborah Lyons spoke of a major Islamic State (IS, formerly ISIS) surge through the war-torn country, claiming the jihadist group has now expanded nationwide.

“Once limited to a few provinces and the capital, ISKP now seems to be present in nearly all provinces, and increasingly active,” Lyons said, referring to the group’s Afghanistan-based ‘Khorasan’ faction. She added that so far in 2021, IS has carried out 334 attacks, up from just 60 last year.

The envoy’s comments came just hours after an Islamic State bombing erupted in a Shiite Muslim neighborhood of the Afghan capital, killing one and wounding six others, according to Reuters.

Since taking over as the government following a chaotic US withdrawal and the outright collapse of the American-backed administration in Kabul last summer, the Taliban has struggled to keep the terrorist group at bay, Lyons said. Though she noted that the Taliban insists it is “waging a concerted campaign” against IS and is making “genuine efforts to present itself as a government,” she said its response “appears to rely heavily on extrajudicial detentions and killings.”

READ MORE: ‘Ghost soldiers’ to blame for Afghan government’s quick defeat – ex-minister

Despite the rise in IS attacks in recent months, however, Lyons said the overall security situation in Afghanistan has improved since the end of the US war, which stretched on for two decades.

In addition to the terrorism issue, the UN representative also cited broader concerns for the country in the coming months, warning of a looming “humanitarian catastrophe” driven by a litany of causes, including foreign sanctions – which she said have “paralyzed” the local banking system – as well as growing levels of food shortages due to famine and a failing economy, among other factors.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

EXPERT OPINION — More than 200 U.S. officers have been hunted around the globe and targeted by an adversary using a mysterious weapon that causes permanent brain injury. It’s time to get serious about fighting back.

The Authors:

Paul Kolbe served for 25 years in the CIA’s Directorate of Operations. He is currently Director of the Intelligence Project at Harvard Kennedy School’s Belfer Center for Science and International Affairs.

Marc Polymeropoulos worked for the CIA for 26 years. He is author of “Clarity in Crisis: Leadership Lessons from the CIA.

John Sipher worked for the CIA’s clandestine service for 28 years. He is now a nonresident senior fellow at the Atlantic Council and a co-founder of Spycraft Entertainment.

Prior to 9/11, al Qaida declared war on the United States, bombed the USS Cole, and blew up U.S. embassies in Nairobi and Dar es Salam. Despite heavy casualties, America viewed successive al Qaida terrorist attacks as somehow unique, not representative of a larger threat or state of war. We went about our business and failed to take hard action against al Qaida despite clear warning. Our failure to respond forcefully led to 9/11 and the two decades of war that followed.

Fast forward to today.  Since 2016, more than 200 U.S. officials have reportedly suffered from a mysterious series of symptoms which have caused long-lasting, debilitating injuries. Suffering from searing headaches, vertigo, vision impairment, and nausea, many victims have been formally diagnosed with traumatic brain injuries (TBI) at the Walter Reed National Military Medical Center and other leading hospitals. Family members and young children have suffered as well. Some medical tests can now confirm the markers of brain injury, similar to those suffered by victims of concussive injuries in Iraq and Afghanistan.

These injuries began with a cluster of reports from Cuba in 2016 and have become commonly referred to as Havana Syndrome. Moscow, Vienna, Belgrade, and Hanoi are among more than a dozen cities where U.S. officials reportedly have been attacked and injured. In residences, on the street, in vehicles, and even at secure U.S. facilities, U.S. officers are being hunted. Stunningly, even a close aide to CIA Director Bill Burns was reportedly attacked on a trip to India just this past August.

The CIA, after a period of confusion, delay, and even denial at times, now appears to take these threats very seriously. CIA Director Burns and Deputy Director David Cohen have publicly stated that U.S. officials are being “attacked.” They have improved health care for CIA officers who are hurt. And an agency task force is hard at work trying to obtain additional intelligence on those responsible. We credit Director Burns for his solid leadership.

The cause of these injuries? The National Academy of Sciences has pointed to Directed Energy Weapons – devices which emit microwave pulses which can inflict pain and damage tissue. The United States, Russia, China, and others have all developed Directed Energy Weapons to destroy equipment, counter drones, and control crowds. This is not science fiction.

Directed energy weapons would account for the highly directional and locational nature of these incidents. When victims can “move off the x,” the signature sounds, sensations, and pain that goes with the attacks often stop, though damage has already occurred. The amount of exposure seems to affect the degree of injury. Other technologies could be at play and are being investigated, but microwaves appear to be the most likely vector. Russia has used them before, flooding the U.S. Embassy in Moscow with microwave radiation for decades.

Regardless of form, the weapons being used in these attacks are nothing less than weapons of terror, designed to cause injury to non-combatants. Who would use such a weapon to attack U.S. intelligence officers, diplomats, and military personnel, and to what conceivable end?


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


CIA Deputy Director Cohen stated at a recent intelligence summit, that the U.S. was closer to identifying the culprit, and Politico has reported that members of the Senate Intelligence Committee are increasingly convinced that Russia or another hostile adversary is behind the attack, although reportedly, no smoking gun has been found.

As former CIA operations officers with extensive experience dealing with both counterterrorism and counterintelligence issues, we have few doubts about who will be named as the culprit. For at least a decade, Russia has conducted itself as in a state of conflict with the West in general and the United States in particular. Russia has launched cyberattacks impacting critical infrastructure and supply chains, assassinated opponents with nuclear poisons and chemical weapons, gunned down people in the streets using criminal proxies, sabotaged a Czech ammunition depot, and mounted a violent coup attempt in Montenegro. It has also bombarded the U.S. embassy in Moscow with microwave radiation and used carcinogenic “spy dust” without regard to health effects. The attacks on U.S. officials would fit this pattern of behavior.

We recognize that it is important to let the intelligence community do its job and its findings must inform policy action. Congress and the administration must work together to formulate a range of possible responses and it is not too early to begin. As Senator Collins and others have stated, these attacks are “an act of war,” and as such, preparation for a future attribution call by the national security establishment is in order. So how could the U.S. respond?

Let’s start with what doesn’t work – sanctions. Sanctions feel good and satisfy an action imperative but they are feckless. Sanctions have not stopped Russia from killing dissidents, halted the Nordstream II pipeline, compelled a pull back from occupied territories, reduced support for tyrants, or hindered oil and gas production. Sanctions have simply forced Russia to develop more creative money laundering and sanction circumvention mechanisms.

So, what would work? For starters, we must understand that the Putin regime considers itself in a state of conflict with the U.S., short of war, but nonetheless deadly real. We are dealing with a state sponsor of terror which conducts operations across the globe to weaken the U.S. abroad, divide it from its allies, and sow discord at home. Our policy must be calibrated to win this conflict, without sparking a shooting war, but at risk of one.

Russia understands reciprocity and strength. When four Russian diplomats were kidnapped by extremists in Beirut in 1985, and one of them was killed, Russia reportedly responded by kidnapping and gruesomely killing a relative of the group’s leader. The surviving diplomats were released immediately. The story may be apocryphal, but it does illustrate the Russian approach. Tempting as it may be for America to retaliate tit for tat, we need not mirror Russia’s actions. Instead, we should play to our greater economic, diplomatic, and military advantages.

We offer five elements to frame a response: enlist U.S. allies, expand forward deterrence, limit the adversary’s reach, choke off money, and bring those accountable to justice.

NATO: With proof of the attacks on U.S. officials, we should activate NATO’s Article Five collective defense clause. The only other time this was enacted was after 9/11. As justification, in addition to the Havana Syndrome attacks, (which also caused Canadian casualties), we would include GRU and FSB assassination operations across Europe, deadly sabotage in the Czech Republic, a coup attempt in Montenegro, persistent cyberattacks, and a litany of other actions that can only be described as irregular warfare directed against NATO members.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Forward Presence: A crystal clear signal that we understand the nature of Russian hybrid warfare and are responding would be to enhance our deployed military presence in Poland, the Baltic States, and in the Black Sea region. These units would pose no offensive threat to Russia but would be a clear signal that the U.S. is prepared to counter any Russian shenanigans. We should also significantly ramp up our lethal aid and training to the Ukraine, where the nature of Russian aggression is well known. Weakness in Eastern Europe is an invitation to conflict.

Travel and Presence: We should drastically limit Russian business and tourist travel which is being used as cover for FSB and GRU operations. We would reduce Russian diplomatic presence in each capital to the bare minimum – handfuls not hundreds. American and European counterintelligence experts believe there are more Russian intelligence officers operating from embassies than during the Cold War. Limiting the size of Russia’s espionage infrastructure will complicate the planning and execution of all of its intelligence operations.

Finance: A key tool in counterterrorism operations is the ability to target sources of finance which constitute material support to terrorism. In this case, we would apply that principle to the Russian government, state enterprises, and individuals who provide cover, tools, and sources of funding to Russia’s campaign to undermine the West with violence, terror, and media manipulation. Russia’s dirty money has been used to undermine the west and poison our politics. We should limit the easy access of shady money to western banks.

Criminal Cases: We need bring war crime cases to the International Court of Justice (ICJ) in the Hague. Following a decade of conflict in the Balkans, the ICJ brought to justice 161 indicted Serbian, Croatian, and Bosnian war criminals. This was an astounding success – a manhunt which included American and European law enforcement and intelligence services. Just as in Nuremberg after World War II, these actions to hold war criminals accountable drew a line in the sand.

This is a start.  Successive Democratic and Republican administrations have pursued Russia policies which represent the triumph of hope over experience. We have treated the symptoms of malign Russian actions rather than the underlying pathology. It is now time to finally acknowledge that we are in a long-term hybrid conflict and forget the fantasy of changing Putin’s behavior. Only a new regime in the Kremlin would hold the hope of bringing about a change in actions. Eventually, the Putin regime will wither or collapse, but until it does, we and our allies must do a better job of defending ourselves.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post Havana and the Global Hunt for U.S. Officers appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Vaccination of all Hungarian citizens against Covid-19 is inevitable, PM Viktor Orban has said, stating that even the most hardline anti-vaxxers will ultimately face a choice between dying with the virus and getting a jab.

Speaking to Kossuth radio on Friday, the Hungarian leader lashed out at those reluctant to get vaccinated against coronavirus, branding them a threat “not only to themselves but to all others.”

In the end, everyone will have to be vaccinated; even the anti-vaxxers will realize that they will either get vaccinated or die. So, I urge everyone to take this opportunity.

The EU member state is currently experiencing its fourth wave of coronavirus, Orban stated, blaming the situation on those who had not got vaccinated. “If everybody were inoculated, there would be no fourth wave or it would be just a small one,” the PM claimed.

Read more

FILE PHOTO. ESSEN, GERMANY. © AFP / Ina FASSBENDER
Covid rates take Germany to ‘nationwide state of emergency’

Apart from urging the unvaccinated to go and finally get their jabs, Orban also promoted booster shots, revealing that he had already taken three doses of a coronavirus vaccine.

“The only thing that protects us from the virus is vaccination. And we are now also seeing, at least the experts are unanimous in saying, that four to six months after the second vaccination, the protective power of the vaccine weakens. Therefore, a third vaccination is justified,” he said.

Hungary has already announced new anti-Covid measures, though somewhat short of the strict measures proposed by the nation’s Medical Chamber on Wednesday. The medical body called for a blanket ban on mass events, and suggested making entry to restaurants, theaters and other indoor venues conditional on bearing a Covid-19 inoculation certificate. Instead, Budapest rolled out compulsory mask wearing for most indoor environments, as well as making booster shots mandatory for all medical workers, starting from Saturday.

A nation of 10 million, Hungary’s total tally of logged Covid cases is hovering just below the one million mark. On Friday, it registered a new daily record, with nearly 11,300 new Covid infections. More than 32,700 people in Hungary have succumbed to the disease over the course of the pandemic.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

Syrian-born musician Omar Souleyman, who worked with the likes of Bjork and Damon Albarn, has been detained in Turkey over alleged links to the Kurdistan Workers’ Party, which is deemed a terrorist group by Ankara.

Souleyman was brought in for questioning on Wednesday, with officers also searching through his home in Turkey’s southeastern province of Sanliurfa, the singer’s manager said.

Read more

Pro-Kurdish Peoples' Democratic Party (HDP) supporters shout slogans and hold flags during a rally as part of Nowruz (Newroz). © Tunahan Turhan/SOPA Images/LightRocket via Getty Images
Turkey’s top court accepts indictment to dissolve pro-Kurdish HDP party

The arrest was likely provoked by recent reports that the musician had traveled to an area in Syria controlled by the Kurdish militias known as the YPG, he added.

The YPG have been US allies in the fight against Islamic State (IS, formerly ISIS), but Turkey considers them to be an extension of the Kurdistan Workers’ Party (PKK) and a threat to its national security.

For decades, the Workers’ Party has been fighting Turkish troops in the southeast of the country, striving for greater autonomy for the Kurdish population.  

Souleyman’s son denied his father’s alleged terrorist links, saying he didn’t have any political affiliation and had become the victim of a “malicious report.” Some media outlets claimed the musician could be released from custody later on Thursday.

Coming from Syria’s majority-Kurdish province of Hasekeh, Souleyman had been known as a prolific wedding performer in his home country. But his international career skyrocketed after he moved to Turkey a decade ago, fleeing the Syrian conflict. The 55-year-old’s clips, including his top hit ‘Warni Warni’, have garnered millions of views on YouTube. He performed at the Nobel Peace Prize ceremony in 2013, as well as at many large festivals around the globe.

His unique style, which is based on mixing traditional Middle Eastern folk music with electronic sound, has attracted the attention of such stars as Bjork, Four Tet, Damon Albarn, and Diplo, who have all collaborated with Souleyman.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

A Roadmap for AI in the Intelligence Community

(Editor’s Note: This article was first published by our friends at Just Security and is the fourth in a series that is diving into the foundational barriers to the broad integration of AI in the IC – culture, budget, acquisition, risk, and oversight.  This article considers a new IC approach to risk management.)

OPINION — I have written previously that the Intelligence Community (IC) must rapidly advance its artificial intelligence (AI) capabilities to keep pace with our nation’s adversaries and continue to provide policymakers with accurate, timely, and exquisite insights. The good news is that there is strong bipartisan support for doing so. The not-so-good news is that the IC is not well-postured to move quickly and take the risks required to continue to outpace China and other strategic competitors over the next decade.

In addition to the practical budget and acquisition hurdles facing the IC, there is a strong cultural resistance to taking risks when not absolutely necessary. This is understandable given the life-and-death nature of intelligence work and the U.S. government’s imperative to wisely execute national security funds and activities. However, some risks related to innovative and cutting-edge technologies like AI are in fact necessary, and the risk of inaction – the costs of not pursuing AI capabilities – is greater than the risk of action.

The Need for a Risk Framework

For each incredible new invention, there are hundreds of brilliant ideas that have failed. To entrepreneurs and innovators, “failure” is not a bad word. Rather, failed ideas are often critical steps in the learning process that ultimately lead to a successful product; without those prior failed attempts, that final product might never be created. As former President of India A.P.J. Abdul Kalam once said, “FAIL” should really stand for “First Attempt In Learning.”

The U.S. government, however, is not Silicon Valley; it does not consider failure a useful part of any process, especially when it comes to national security activities and taxpayer dollars. Indeed, no one in the U.S. government wants to incur additional costs or delay or lose taxpayer dollars. But there is rarely a distinction made within the government between big failures, which may have a lasting, devastating, and even life-threatening impact, and small failures, which may be mere stumbling blocks with acceptable levels of impact that result in helpful course corrections.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


As a subcommittee report of the House Permanent Select Committee on Intelligence (HPSCI) notes “[p]rogram failures are often met with harsh penalties and very public rebukes from Congress which often fails to appreciate that not all failures are the same. Especially with cutting-edge research in technologies … early failures are a near certainty …. In fact, failing fast and adapting quickly is a critical part of innovation.” There is a vital difference between an innovative project that fails and a failure to innovate. The former teaches us something we did not know before, while the latter is a national security risk.

Faced with congressional hearings, inspector general reports, performance evaluation downgrades, negative reputational effects, and even personal liability, IC officers are understandably risk-averse and prefer not to introduce any new risk. That is, of course, neither realistic nor the standard the IC meets today. The IC is constantly managing a multitude of operational risks – that its officers, sources, or methods will be exposed, that it will miss (or misinterpret) indications of an attack, or that it will otherwise fail to produce the intelligence policymakers need at the right time and place. Yet in the face of such serious risks, the IC proactively and aggressively pursues its mission. It recognizes that it must find effective ways to understand, mitigate, and make decisions around risk, and therefore it takes action to make sure potential ramifications are clear, appropriate, and accepted before any failure occurs. In short, the IC has long known that its operations cannot be paralyzed by a zero-risk tolerance that is neither desirable nor attainable. This recognition must also be applied to the ways in which the IC acquires, develops, and uses new technology.

This is particularly important in the context of AI. While AI has made amazing progress in recent years, the underlying technology, the algorithms and their application, are still evolving and the resulting capabilities, by design, will continue to learn and adapt. AI holds enormous promise to transform a variety of IC missions and tasks, but how and when these changes may occur is difficult to forecast and AI’s constant innovation will introduce uncertainty and mistakes. There will be unexpected breakthroughs, as well as failures in areas that initially seemed promising.

The IC must rethink its willingness to take risks in a field where change and failure is embraced as part of the key to future success. The IC must experiment and iterate its progress over time and shift from a culture that punishes even reasonable risk to one that embraces, mitigates, and owns it. This can only be done with a systematic, repeatable, and consistent approach to making risk-conscious decisions.

Today there is no cross-IC mechanism for thinking about risk, let alone for taking it. When considering new activities or approaches, each IC element manages risk through its own lens and mechanisms, if at all. Several individual IC elements have created internal risk assessment frameworks to help officers understand the risks of both action and inaction, and to navigate the decisions they are empowered to make depending upon the circumstances. These frameworks increase confidence that if an activity goes wrong, supervisors all the way up the chain will provide backing as long as the risk was reasonable, well-considered and understood, and the right leaders approved it. And while risk assessments are often not precise instruments of measurement – they reflect the quality of the data, the varied expertise of those conducting the assessments, and the subjective interpretation of the results – regularized and systematic risk assessments are nevertheless a key part of effective risk management and facilitate decision-making at all levels.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Creating these individual frameworks is commendable and leading-edge for government agencies, but more must be done holistically across the IC. Irregular and inconsistent risk assessments among IC elements will not provide the comfort and certainty needed to drive an IC-wide cultural shift to taking risk. At the same time, the unique nature of the IC, comprised of 18 different elements, each with similar and overlapping, but not identical, missions, roles, authorities, threats and vulnerabilities, does not lend itself to a one-size-fits-all approach.

For this reason, the IC needs a flexible but common strategic framework for considering risk that can apply across the community, with each element having the ability to tailor that framework to its own mission space. Such an approach is not unlike how the community is managed in many areas today – with overarching IC-wide policy that is locally interpreted and implemented to fit the specific needs of each IC element. When it comes to risk, creating an umbrella IC-wide framework will significantly improve the workforce’s ability to understand acceptable risks and tradeoffs, produce comprehensible and comparable risk determinations across the IC, and provide policymakers the ability to anticipate and mitigate failure and unintended escalation.

Critical Elements of a Risk Framework

A common IC AI risk framework should inform and help prioritize decisions from acquisition or development, to deployment, to performance in a consistent way across the IC. To start, the IC should create common AI risk management principles, like its existing principles of transparency and AI ethics, that include clear and consistent definitions, thresholds, and standards. These principles should drive a repeatable risk assessment process that each IC element can tailor to its individual needs, and should promote policy, governance, and technological approaches that are aligned to risk management.

The successful implementation of this risk framework requires a multi-disciplinary approach involving leaders from across the organization, experts from all relevant functional areas, and managers who can ensure vigilance in implementation. A whole-of-activity methodology that includes technologists, collectors, analysts, innovators, security officers, acquisition officers, lawyers and more, is critical to ensuring a full 360-degree understanding of the opportunities, issues, risks, and potential consequences associated with a particular action, and to enabling the best-informed decision.

Given the many players involved, each IC element must strengthen internal processes to manage the potential disconnects that can lead to unintended risks and to create a culture that instills in every officer a responsibility to proactively consider risk at each stage of the activity. Internal governance should include an interdisciplinary Risk Management Council (RMC) made up of senior leaders from across the organization. The RMC should establish clear and consistent thresholds for when a risk assessment is required, recommended, or not needed given that resource constraints likely will not allow all of the broad and diverse AI activities within organizations to be assessed. These thresholds should be consistent with the IC risk management principles so that as IC elements work together on projects across the community, officers have similar understandings and expectations.

The risk framework itself should provide a common taxonomy and process to:

  • Understand and identify potential failures, including the source, timeline, and range of effects.
  • Analyze failures and risks by identifying internal vulnerabilities or predisposing conditions that could increase the likelihood of adverse impact.
  • Evaluate the likelihood of failure, taking into consideration risks and vulnerabilities.
  • Assess the severity of the potential impact, to include potential harm to organizational operations, assets, individuals, other organizations, or the nation.
  • Consider whether the ultimate risk may be sufficiently mitigated or whether it should be transferred, avoided, or accepted.

AI-related risks may include, among other things, technology failure, biased data, adversarial attacks, supply chain compromises, human error, cost overruns, legal compliance challenges, or oversight issues.

An initial risk level is determined by considering the likelihood of a failure against the severity of the potential impact. For example, is there is a low, moderate, or high likelihood of supply chain compromise? Would such a compromise affect only one discrete system or are there system-wide implications? These calculations will result in an initial risk level. Then potential mitigation measures, such as additional policies, training, or security measures, are applied to lower the initial risk level to an adjusted risk level. For example, physically or logically segmenting an organization’s systems so that a compromise only touches one system would significantly decrease the risk level associated with that particular technology. The higher the likelihood of supply chain compromise, the lower the severity of its impact must be to offset the risk, and vice versa. Organizations should apply the Swiss Cheese Model of more than one preventative or mitigative action for a more effective layered defense. Organizations then must consider the adjusted risk level in relation to their tolerance for risk; how much risk (and potential consequence) is acceptable in pursuit of value? This requires defining the IC’s risk tolerance levels, within which IC elements may again define their own levels based upon their unique missions.

Understanding and considering the risk of action is an important step forward for the IC, but it is not the last step. Sometimes overlooked in risk assessment practices is the consideration of the risk of inaction. To fully evaluate potential options, decision-makers must consider whether the overall risk of doing something is outweighed by the risks of not doing it. If the IC does not pursue particular AI capabilities, what is the opportunity cost of that inaction? Any final determination about whether to take action must consider whether declining to act would cause greater risk of significant harm. While the answer will not always be yes, in the case of AI and emerging technology, it is a very realistic possibility.

And, finally, a risk framework only works if people know about it. Broad communication – about the existence of the framework, how to apply it, and expectations for doing so – is vital. We cannot hold people accountable for appropriately managing risk if we do not clearly and consistently communicate and help people use the structure and mechanisms for doing so.

Buy-in To Enhance Confidence

An IC-wide AI risk framework will help IC officers understand risks and determine when and how to take advantage of innovative emerging technologies like AI, increasing comfort with uncertainty and risk-taking in the pursuit of new capabilities. Such a risk framework will have even greater impact if it is accepted – explicitly or implicitly – by the IC’s congressional overseers. The final article in this series will delve more deeply into needed changes to further improve the crucial relationship between the IC and its congressional overseers. It will also provide a link to a full report that provides more detail on each aspect of the series, including a draft IC AI Risk Framework.

Although Congress is not formally bound by such a framework, given the significant accountability measures that often flow from these overseers, a meeting of the minds between the IC and its congressional overseers is critical. Indeed, these overseers should have awareness of and an informal ability to provide feedback into the framework as it is being developed. This level of transparency and partnership would lead to at least two important benefits: first, increased confidence in the framework by all; and second, better insight into IC decision-making for IC overseers.

Ultimately, such a mutual understanding would encourage exactly what the IC needs to truly take advantage of next-generation technology like AI: a culture of experimentation, innovation, and creativity that sees reasonable risk and failure as necessary steps to game-changing outcomes.

Read also AI and the IC: The Tangled Web of Budget and Acquisition

Read also Artificial Intelligence in the IC: Culture is Critical

Read also AI and the IC: The Challenges Ahead

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post A Roadmap for AI in the IC appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

At least two people were wounded by police gunfire in the Dutch city of Rotterdam after a protest over renewed Covid-19 restrictions spiraled into a violent riot, seeing demonstrators torch a squad car and clash with officers.

A large crowd of protesters showed up at Rotterdam’s iconic Coolsingel street on Friday evening to denounce a new round of pandemic measures, including an ongoing partial lockdown, a ban on New Year’s Eve fireworks displays, as well as fears the government will impose a ‘2G’ pass system allowing only the vaccinated and those who’ve recently recovered from the virus to enter a long list of public places.

At least two people were wounded during the demonstration, a local police spokesperson told Reuters, adding the injuries were “probably” due to officers’ “warning shots” but also noting that “direct shots were fired because the situation was life-threatening” to law enforcement.

Footage of the heated protest circulated online, some clips showing a police squad car fully engulfed in flames after it was apparently torched by rioters.

Demonstrators were also seen launching fireworks at police, who appeared to respond with large quantities of tear gas, which at one point blanketed the area.

Local law enforcement said that officers deployed a mobile riot control unit to Coolsingel and unleashed water cannon on protesters who refused to clear the streets, also noting that some arrests were made after an emergency order was imposed to cordon off the area.

The Dutch government announced the fireworks ban earlier on Friday, saying it is meant to “prevent, as much as possible, extra strain on healthcare, law enforcement and first responders.” However, while private displays are prohibited, officials said that local governments may still put on fireworks shows so long as their Covid-19 restrictions allow it.

The Netherlands currently has a ‘3G’ rule in place, allowing the vaccinated, the recently recovered, as well as those who test negative for the virus to enter most public spaces. But as the country remains under a partial three-week lockdown to rein in growing infections, officials are now mulling the stricter ‘2G’ scheme, prompting the intense demonstrations seen on Friday night.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !