“Catastrophic and famine-like conditions” hang over Afghanistan’s farmers and herders, whose needs continue to worsen with the onset of winter, UN humanitarians said on Friday.
As India is mulling new rules for digital money, Prime Minister Narendra Modi has called for regulations to ensure cryptocurrencies like bitcoin do not “end up in the wrong hands,” warning that this could “spoil” young people.
While he did not expand on those concerns, Modi spoke on Thursday about the need for “democratic nations” to band together and deal with challenges posed by emerging technologies. He was delivering a virtual address at the Sydney Dialogue, an annual cyber-tech summit.
Noting that technology and data could either become “new weapons” for conflict or “instruments of cooperation,” Modi brought up digital currencies as an example of how it was important that like-minded nations “work together on this” to “ensure it does not end up in the wrong hands, which can spoil our youth.”
We are at a historic moment of choice. Whether all the wonderful powers of technology of our age will be instruments of cooperation or conflict, coercion or choice, domination or development, oppression or opportunity.
He also urged the development of technical and governance standards and norms, singling out the use of data, and called for renewed efforts to prevent manipulation of public opinion. In recent weeks, Indian authorities have raised concerns over claims of huge returns from cryptocurrency investment as well as its potential connections to money laundering, organized crime and terror financing.
On Saturday, Modi chaired a meeting to formulate the country’s approach to digital currencies and examine their impact on the economy. According to The Economic Times, Indian officials are drafting regulations to propose a ban on all transactions and payments in cryptocurrencies, while allowing investors to hold them as assets, similar to gold, bonds and stock shares.
Citing unnamed sources familiar with the government’s discussions, the newspaper said there was a belief in policy circles that crypto markets needed to be regulated in order to tackle the problem of opaque advertising that exaggerates investment returns in order to attract young investors.
The sources informed the newspaper that draft legislation on the matter was expected to be forwarded to Modi’s cabinet for consideration in the next two to three weeks.
In September, China had banned all cryptocurrency transactions and crypto-mining.
A strike of more than 20,000 metal workers in Cadiz, Spain has halted the operations of key manufacturing plants, including Airbus and Alestis, with barricades erected, roads blocked, and vehicles burned.
Cadiz, the capital of the southernmost province of the country, has become one of the main sites of protests over working conditions. The Avenida de Astilleros is currently closed to traffic, with protesters burning vehicles.
Picket lines also blocked access to major shipbuilding and industrial sites of key local companies, such as Airbus, Navantia, Dragados, Alestis, and Acerinox, causing their work to be interrupted.
Protesters also cut off access to major industrial zones in Puerto Real and Campo de Gibraltar with barricades and bonfires. Rail traffic is also being obstructed, with pipes thrown onto the tracks.
The national police have been deployed to bring the situation under control and to protect the industrial sites. At one point on Tuesday, the strike turned into a full-scale confrontation, with protesters throwing rocks and screws at police, who reacted by firing rubber bullets. One person was arrested.
🎥🛑En #España 2º día y arden las calles de Cádiz en el segundo día de la #huelgadelmetal indefinida.
🔥🏴Todo nuestro apoyo a lxs trabajadorxs del sector del metal en #Cadiz.
The Federation of Metal Entrepreneurs (FEMCA), which represents major employers in the region, reiterated earlier its offer for dialogue with the workers, while stressing that the union’s requests were “unjustified” and “disproportionate.”
The workers say they will continue the strike until FEMCA provides them with an acceptable agreement.
Think your friends would be interested? Share this story!
A Canadian teenager has been arrested after allegedly stealing $36.5 million in cryptocurrency from a person in the US. The police claim it was the largest such heist involving one victim ever registered in North America.
Police in the city of Hamilton, Ontario, arrested the unidentified perpetrator on Wednesday, after over a year investigating what they have described as the biggest-ever cryptocurrency theft from a single person in either the US or Canada. Local police began a joint investigation with the Federal Bureau of Investigation and the US Secret Service Electronic Crimes Task Force in March 2020, when the theft was reported.
The Hamilton Police Service said it had made “multiple” seizures in excess of CA$7 million (US$5.5 million) during the arrest, which came after investigators noticed some of the stolen money had been used to buy an online username considered “rare” in the gaming community, according to a police statement.
The victim was apparently targeted by a cell phone hijack known as SIM swapping. This method involves manipulating cellular network employees to duplicate phone numbers in order to let the scammer intercept the two-factor authorization requests that allow them access to a victim’s account.
This method is considered especially potent because a lot of people use the same password for multiple sites, according to Detective Constable Kenneth Kirkpatrick, of the Hamilton Police’s cybercrimes unit. He added that cyber and cryptocurrency crimes were becoming increasingly common, but noted that the figures involved in this case were “very surprising.”
“It’s a large amount of money in anybody’s opinion,” Kirkpatrick said, adding that the case was currently in the Hamilton court system.
The police haven’t revealed the age or gender of the youth, the username they purchased, or whether they were acting alone.
People who live in the big cities are definitely masters of eavesdropping. Sometimes they can’t help it, accidentally overhearing conversations from complete strangers can be so funny, it’s hard not to share them with someone else. And here comes the fittingly named Instagram account Overheard San Francisco that’s dedicated to sharing the funniest eavesdropped interactions in San Francisco and the Bay area. Scroll down to see the funniest examples!
A Canadian teenager has been arrested after allegedly stealing $36.5 million in cryptocurrency from a person in the US. The police claim it was the largest such heist involving one victim ever registered in North America.
Police in the city of Hamilton, Ontario, arrested the unidentified perpetrator on Wednesday, after over a year investigating what they have described as the biggest-ever cryptocurrency theft from a single person in either the US or Canada. Local police began a joint investigation with the Federal Bureau of Investigation and the US Secret Service Electronic Crimes Task Force in March 2020, when the theft was reported.
The Hamilton Police Service said it had made “multiple” seizures in excess of CA$7 million (US$5.5 million) during the arrest, which came after investigators noticed some of the stolen money had been used to buy an online username considered “rare” in the gaming community, according to a police statement.
The victim was apparently targeted by a cell phone hijack known as SIM swapping. This method involves manipulating cellular network employees to duplicate phone numbers in order to let the scammer intercept the two-factor authorization requests that allow them access to a victim’s account.
This method is considered especially potent because a lot of people use the same password for multiple sites, according to Detective Constable Kenneth Kirkpatrick, of the Hamilton Police’s cybercrimes unit. He added that cyber and cryptocurrency crimes were becoming increasingly common, but noted that the figures involved in this case were “very surprising.”
“It’s a large amount of money in anybody’s opinion,” Kirkpatrick said, adding that the case was currently in the Hamilton court system.
The police haven’t revealed the age or gender of the youth, the username they purchased, or whether they were acting alone.
Chris Inglis’ new White House office has a startup feel to it. There are desks, a few chairs, a coffee maker and a poster hanging on the wall. But as the head of the newly established Office of the National Cyber Director, Inglis has to make due with what he has while still advising President Joe Biden on the smartest ways for the US to prevent and respond to cyberattacks.
Inglis has already had numerous conversations with the president, who has made clear that the government has a role to play in the defense of the private sector and in assisting the private sector in defending critical infrastructure. And the president knows, says Inglis, that means the government needs to get its own cyber house in order.
But like any real startup, Inglis’ resources are scarce. More than three months after being confirmed by the Senate, he still doesn’t have the full staff he needs to take on his timely and critical mission. That’s because the funding for his office – some $21 million, part of the $1 trillion infrastructure bill making its way through Congress – is still stuck in the political spin cycle. Why does it matter?
“The threat is greater than I can ever remember,” Inglis told me during last month’s AFCEA and INSA Intelligence & National Security Summit in National Harbor, Maryland. “The audacity, the brazenness, the thresholds that have been crossed at every turn; we’re in a difficult place.”
While he’s waiting for Congress to act, he says he’s spending about fifty percent of his time defining his role, being careful not to duplicate the work already being done by other agencies and departments, while spending another fifty percent building relationships that will be important later. Eventually, he’s expected to have a staff of some 75 people who will be expected to work hand in glove with CISA, the National Security Council’s cyber staff, the OMB and others. The remaining fifty percent of his time, Inglis jokes, is spent figuring out how to attract the country’s best talent.
“People are starting to flow into the organization. I’m confident that we’re coming up to a breakout moment, not for the National Cyber Director, but the contribution that we can and should make. I’m sobered by the nature of the challenge, I’m optimistic we can make a difference.”
Optimistic he is. And he’s not even complaining about being given a critical task for US national security and then having to wait for politics to play out before being able to act on it.
“It has been a semi-silver lining in that we would not have had time to think about how we want to apply the resources coming our way.”
While Inglis has been waiting, he and his small team have had time to think about the four things they’d like to focus on right away.
First, is streamlining the roles and responsibilities in government of who handles what when it comes to protecting the public and private sectors from cyberattacks. He also spoke during his confirmation hearing about the importance of allocation of resources and while the Office of the National Cyber Director doesn’t have the authority to move money, it does have what Inglis calls the responsibility to account for cyber money.
“One of the most critical gaps in cyber is that the physical digital infrastructure is not built to a common standard. The executive order related to this requires that within a certain amount of time we have to install basic procedures like multifactor authentication and encryption of stored material. That is a challenge and a potential vulnerability for us. We need to make sure that we make these investments necessary to buy down the lack of investment for years.
The second gap is in talent related to number of people required to occupy these jobs. It’s not simply the folks with IT or cyber in their name, but general cyber awareness. There is some expenditure of resources of time, attention, and money to get awareness right on the part of the truly accountable parties like agency and department heads. We have to make sure they don’t see cyber as a cost center, but an enabler on the part of all the users as they understand what their roles are and what the accountability is.
He admits there is still a level of education needed within government to get there.
“That is usually the case in both the government and the private sector,” he said. “We need to think this way about cyber and invest in cyber so that we can enable the mission, not hold it back. I think that education is the most important and effective way to handle this. Then, it is to make sure that the accountability is aligned and harmonized. We tend to take risk in one place and expect someone in another place to be the mitigator of a risk they don’t understand was taken in the first place. We need to operate in a collaborative fashion and get away from divisions of effort which are an agreement not to collaborate and allow adversaries to pick us off one at a time.”
Inglis says that unity of effort must start at home. “The executive order issued in May has begun to lay out common expectations about the hardware, software, and practices that we need to begin in those spaces,” he said. “Externally, if we have sector risk management agencies who engage the private sector for the purposes of supporting and engaging the critical components of that infrastructure, we need to make sure you don’t need a Ph.D. in government to know who to deal with and what you’re going to get from them.”
He is arguing for the government to also put ‘valuable material’ on the table. “That could be our convening power,” said Inglis. “We could perhaps address and reduce liability or give companies a clue as to what might be around the corner because the government has access to exquisite intelligence. If that setup is possible, we also need a venue where collaboration takes place. Information doesn’t collaborate, people do.”
Inglis likes to point to the example of CISA and the Joint Cyber Collaborative. “They put people from the private sector and the public sector side by side to co-discover threats that hold us at common risk. That project sets up the possibility of implicit collaboration in what we then do with that common operational picture. The government could take ideas that private sector companies turn into proprietary systems and enrich and classify them to deal with it in their system.”
Using what he calls “all the tools in the toolkit,” Inglis also notes the importance of international relationships, which fits nicely into the White House’s International Summit on Ransomware last week in Washington, which zeroed in on tighter cryptocurrency standards, among other things. “Beyond the Five Eyes, what do other like-minded nations think about what is expected behavior in this? What are governmental actions that are appropriate,” he asked.
Inglis has been an active participant in the president’s recent actions in cyber. He took part in a White House meeting with tech leaders in August that was hosted by President Biden, who Inglis says, spent the first hour sharing his vision about how the country should focus on collaborative integration. “The companies represented weren’t only companies like Microsoft and Apple, but people who operate in the critical infrastructure space,” said Inglis. “The people component, educators, were represented reflecting the president’s view that cyberspace is not just technology, it is also the people component. They are a major link in the chain, and we need to get the roles and responsibilities right.”
While he’s waiting for the funding he needs to get his office fully staffed, Inglis said he’s also putting thought into reconciling resources with aspirations. Managing expectations is going to be important. Frustration has been growing for years over what some see as a lack of government response to some of the largest hacks in history. The phrase ‘time and place of our choosing’ as a definition of response has grown old and some Americans are weary of a government that isn’t responding in a more public way to the beating it sees the US taking in cyberspace.
So, I asked Inglis whether there should be red lines in cyber.
“Red lines are both good and bad,” he answered. “They are clear and crisp, and everybody knows what they are. The downside is that because of that, an adversary knows exactly how far they can go. It means that you set up a somewhat permissive environment. Red lines also don’t have context; sometimes there is a reason that a defender would make the ransomware payment. As a matter of policy, the U.S. government does not pay ransomware, but I imagine there will be a situation at some point where a hospital is against the Russian state and actual life and safety is at risk. If there is no other way to get the material back, in order to get back in the business of saving lives, they would want to rethink if a red line is a red line in that particular situation. I think the right thing to do here is not to establish hard thresholds of things with scripted responses, but outline what we are prepared to defend and what principles we will exercise in defense of those things. We commit to defending the private sector when it is held at risk by a nation state in cyberspace as much as in the kinetic space and make that clear to adversaries. I think that would be more helpful in changing decision calculus and creating a useful ambiguity about when and where we will come in.”
Inglis said he’s also thinking a lot about present and future resilience. It’s a worthwhile focus, given that the White House estimates that nearly half a million public and private sector cybersecurity jobs are currently unfilled.
“That is a massive problem,” said Inglis. “However, the more insidious problem is that the 320 million people in the United States who use the internet who have no idea how to properly take their place on the front lines of this issue. There is an awareness issue that requires us not to make Python programmers out of them but to make sure they understand the nature of this space.”
Everyone has heard the old saying that time is money, but in Inglis’ case, time is security so I asked him point blank whether he thought government was moving has quickly as it should on the cyber problem.
“Government is moving at speed; the question is if it is at the necessary speed. I don’t think anyone is moving at the necessary speed. Some are moving at light speed, but at the end of the day, we need an integrated, collaborative approach. While we won’t have unity of command, I think there needs to be a universally felt sense of urgency so that we will all get our heads in the game.”
Congress, are you listening? Oh, and by the way, that poster in Inglis’ office? It reads, ‘Hours Since the Last Surprise.”
“As a startup with maybe too few resources at the start and who often didn’t understand how all the wickets are run, we have our occasional surprise,” said Inglis. “When we encounter those surprises and go to someone with the deep and sharp expertise to help us navigate that, we get what we need. However, we are not a full functioning, full featured, fully capable organization yet. We’re trying to build somebody else’s airplane while we’re free falling from our own. We have a parachute, and we can land safely, but it is a bit of a challenge at times.”
Find out more about why experts like former NSA Director General Keith Alexander (Ret.), Mandiant CEO Kevin Mandia and others have joined The Cyber Initiatives Group, powered by The Cipher Brief
Read more expert national security insights, perspective and analysis in The Cipher Brief
President Joe Biden admitted during his address from the White House this week that, “The scenes we’re seeing in Afghanistan, they’re gut-wrenching, particularly for our veterans, our diplomats, humanitarian workers, for anyone who has spent time on the ground working to support the Afghan people.”
Yet the voices of the veteran community aren’t always heard in mainstream media, which tends to prioritize finger pointing and political bickering instead of focusing on the impact of such events on the people who served there, or the people who lost loved ones there. The depression and rage that flowed through the veteran community – as the US flag came down from the Embassy in Kabul, and as the U.S. failed to secure even a safe route out of the country for its own people, much less the Afghans who have supported the US-led effort there for the past 20 years – was swift and devastating to many in the veteran community, who often don’t engage with media, but turn to each other for support via chatrooms.
A statement released by former President George Bush and former First Lady Laura Bush read, “Many of you deal with wounds of war, both visible and invisible. And some of your brothers and sisters in arms made the ultimate sacrifice in the war on terror. Each day, we have been humbled by your commitment and your courage. You took out a brutal enemy and denied Al Qaeda a safe haven while building schools, sending supplies, and providing medical care. You kept America safe from further terror attacks, provided two decades of security and opportunity for millions, and made America proud. We thank you from the bottom of our hearts and will always honor your contributions.”
The Cipher Brief reached out to two veteran leaders, Matthew Griffin and Scott Chapman, who wrote a fictitious letter they titled ‘Writing in Taliban’ as a way to share their outrage over recent events and how they believe – based on their unique on-the-ground experience – the Taliban will communicate this ‘victory’ to their followers.
“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”
Matthew “Griff” Griffin is a former Special Operations Army Ranger and a West Point Graduate. He served four combat tours in Afghanistan and Iraq with the 2nd Ranger Battalion. Griff departed the military in 2006 and co-founded Combat Flip Flops; manufacturing fashion and lifestyle products in war zones, with profits supporting girl’s education, land mine clearance, and veteran’s charities.
Scott Chapman, Former Army Ranger
Scott Chapman served in 2nd Battalion 75th Ranger Regiment from 2001-2005. He deployed to Iraq during the 2003 invasion and to Afghanistan 4 times. After the military, Scott worked as a contractor providing security support to the Intelligence community where he deployed 17 times mostly at Forward Operating Bases (FOB) providing security support for Intelligence personnel and operations. Scott’s final duty rotation was at the US Embassy Annex in Kabul where he worked as a mentor for Local Guard Forces.
Author’s Note:We’ve spent the past week trying to find a way to communicate our thoughts to the American people in a manner that would intentionally evoke some of the anger, rage, action, and understanding that we feel. Writing in the voice of a Taliban felt right. If reading our letter from the Taliban makes you angry, cry, or contemplative–then our goal is achieved. Our hope is that it inspires you to take action by reaching out to your elected officials. They’ve been repeating the same failed playbook since World War II with your sons, daughters, and tax dollars. If you want this to keep happening, do nothing. If you don’t, then do something. If we all do a little, together we do a lot.
‘Written in Taliban’
OPINION/PERSPECTIVE — The first time I saw you was in the Khyber Pass. You came with your technology, elite fighters fueled by revenge, and the hubris to believe you could disprove history.
This was a war that you didn’t have the stomach to fight. But I’m glad you tried.
We bled you the same way we bled the Soviets in our Holy Land. We bled you the same way the Vietnamese bled you in their homeland. We did it patiently and deliberately.
Patience. Something Westerners never learn.
Our history is millennial. We don’t yearn for an early victory when the Infidel ravages our Holy Land. Our victory is celebrated decades from now. We’ve endured, then ravaged every standing military that crossed our borders. Why? How? We’re patient.
In 30 days, we’ll be stronger, richer, and have control over precious natural resources that you need for your pathetic life dictated by comfort. We will have women, riches, land, guns, and ownership of one of the greatest chapters in military history.
You lose.
If you want to try again, we welcome the challenge. You will fail regardless of how much money you burn in our deserts. For pity, here is free advice that may contribute to your future success; should you ever decide to invade again.
You recruit your warriors and supporters from a drug addicted, distracted, disillusioned population that’s obsessed with comfort and entertainment. A population obsessed with altering their mundane reality. Alcohol, marijuana, pills, and our new favorite — Tide Pods. Every time your doctors prescribe opiate painkillers, you line our coffers with gold. Your population’s thirst for our pristine heroin has never been more lucrative for our warrior tribes. We will keep feeding you poison for as long as you keep your hands out.
If your population wasn’t so spineless, undisciplined, and self-loathing, then you might be able to compile a raiding party with enough tenacity to outthink ours. Our fighters are born into war. Raised in it. It’s a way of life that evades your “first world” nations. They live a life of such immense misery and pain that they’re willing to fight barefoot in the snow for the opportunity to martyr themselves. They yearn for the opportunity to die. When they do have the blessed opportunity to sacrifice themselves, they sit above Mohammed at the right hand of God. Blessed in Allah for eternity
What honors do your fighters receive? Their empty sacrifice is remembered in the form of a “three-day weekend.” The majority of your population uses this sacred time to get drunk and grow more fat as a way to celebrate their fallen warriors. Sadly, we pay tribute to their death more honorably.
The colored pieces of cloth you pin on their chests are similar to the jewelry worn by our women. What good are accolades and vanity if you don’t have the stomach to endure a fight? We don’t offer the burden of healthcare to our fighters as they often want to die for Allah. Your fighters fight to live. Their inability to reconcile the inevitable outcome of our patience leads them to kill themselves. Your medications, counselors and non-profits will never undo the pain and suffering you’ve forced them to endure. It will never remove the pain we’ve caused your broken nation. You are your own worst enemy.
We will give your fighters credit. Some are creative, tenacious, and fierce. They outgun us in every way possible. But again, we simply wait them out. Allah is patient. You cycle them through our Holy Lands every 3 to 12 months for their combat rotations. After their tour is complete, they return to the comfort of their warm beds and endless entertainment. If you left them here, in our Holy Land, with no way out but to win, then you might of have had a chance of success. The longer you poisoned our Holy Land with your presence, your “rules of engagement” only strengthened our position. There is only one rule in war – that is to win.
Your commanders made you fight with your hands tied behind your back. Your rules also confused our fighters too. “We’re clearly the enemy; why are they letting us go?” Thank you for your compassion as it allowed our fighters to kill more Infidels. We began to feel as if your commanders were on our side. We’re thankful your most vicious dogs were never allowed off their leash.
Your showcase Generals make us laugh. You spend millions of dollars flying them around our country, inventing new ways to win while ignoring the guidance of our most capable foes. Your Generals make decisions to minimize risk to their fragile reputation with the ultimate goal of securing a lucrative retirement–jobs with suppliers that fuel your losing force. A self-serving circle that’s built on the backs of your youngest and most naive fighters.
Your retired Generals “earn” tens of thousands of dollars talking to your political, industrial, and financial leaders about “teams, winning, and discipline.” It’s a mockery of the war they refused to fight. It’s a mockery of the Infidel warriors who died in our lands. We urge you to continue following their vacuous personalities so we can further watch your once great nation collapse.
Your statesman and elected officials are spineless, narcissistic, and more cowardly than your Generals. They crave power over you above all else. They come to our country, hide behind blast walls, and only heed the word of the indigenous leader they put in power. I believe your soldiers call this a “self-licking ice cream cone.”
They’ve burned billions of dollars in a wasted effort to bring clean water, electricity, business, education, agriculture, and exports to a region that didn’t ask for it. You should have saved yourself the effort and simply given the money directly to us. Don’t worry; your diplomatic friends gave us plenty of your American tax dollars. If you want to give it another shot with your “soft power,” send those with real experience, not fancy degrees and silver tongues.
Over the next few months, we will make the world understand that you failed worse than any fighting force that’s ever invaded our lands. Today we celebrate victory.
As you evacuate your embassy, our fighters will be standing in the shade. Our RPG marksmen will be patient. We thank you for the parting gifts. You’ll find surface-to-air missiles staged in the back of Toyota pickup trucks that you purchased for us. We saw what Extortion 17 did to your nation and the morale of your fighting force. Do your citizens even remember that victory? We’ll be repeating and improving upon our victory while your citizens and sympathizers evacuate in disgrace. Every one of your foes around the world will know exactly how to break you. You are welcome to fly your empty drones, target our cell phones, and send your spies. But they, too, will ultimately fail. We’ll use their failures to show the world that you’re not all-powerful. You’re a false front–an empty shell. You lie, cheat, steal, and are easily defeated because you lack the spine to fight. This is your history now. We’re grateful Allah gave us the opportunity to show the world how to defeat the Infidels.
We look forward to seeing you again across the battlefield.
Praise be to God,
The Taliban
The Cipher Brief is committed to publishing a range of veteran views on this issue. Stay tuned for more and read different informed, national security perspectives in The Cipher Brief
An object lurking in the outer region of our solar system may well be the elusive Planet 9, a leading British astronomer has suggested after digging through the telescope archives of 250,000 point sources.
Possible evidence of a mysterious planet up to 10 times bigger than Earth, with a distant orbit around the Sun, has been unveiled by professor of astrophysics at Imperial College of London, Michael Rowan-Robinson. Aiming to prove – or rule out – the existence of another big planet beyond Neptune, the UK scientist decided to conduct a new analysis of data collected by the Infrared Astronomical Satellite (IRAS) in 1983.
The astronomer has looked through some 250,000 point sources detected by the telescope, which took a far-infrared survey of 96% of the sky. Having analyzed the data, keeping in mind the hypothetical planet’s size and distance, “at the very limit of the survey,” he singled out a moving object that the satellite picked out on three occasions.
The candidate for Planet 9 would be up to five times the mass of Earth, according to the IRAS data. Its orbital distance would be some 225 times farther than that of our planet, equaling about 33.7 billion kilometers (20.9 billion miles) from the Sun.
If the enigmatic object is indeed rotating around the Sun at such a distance, it would be extremely cold and not much sunlight would be reflected by it, making it even more elusive and harder to find. While the latest study is not a clear detection, it could be valuable as guidance for where exactly to search for the new planet, the astronomer concluded.
“Given the great interest of the Planet 9 hypothesis, it would be worthwhile to check whether an object with the proposed parameters and in the region of sky proposed, is inconsistent with the planetary ephemerides,” he wrote in the preprint paper, accepted for publication in the Monthly Notices of the Royal Astronomical Society.
A debate on the possible existence of an undiscovered planet in our solar system has been ongoing for decades. With no concrete evidence found, there has been speculation about its presence, mainly based on the gravitational clustering of objects in the system’s outer reaches. Several years ago, a suggestion was put forward that a group of icy objects that lie beyond the orbit of Neptune in the Kuiper Belt are possibly under the gravitational influence of a larger mysterious body, possibly Planet 9. The claim was based not on observation, but on modeling.
Currently, the eighth and farthest known planet from the Sun is Neptune. In the last century, Pluto, discovered in 1930, was regarded as the ninth planet, but a controversial vote at the International Astronomical Union (IAU) in 2006 formally excluded it from the solar system’s ‘planets’, and reclassified it as a dwarf planet.
Covid-battered global supply chains are being threatened by organized criminals, including drug cartels and con artists posing as legit suppliers, a new study has found, warning that the situation is set to get worse.
The international supply chain woes amid the Covid-19 pandemic are highlighted in a new annual report, released this week by the British Standards Institution (BSI).
The document, titled the ‘Supply Chain Risk Insights Report’, highlights Covid’s impact on supply chains, with the experts also warning that organized crime has increasingly preyed on this crucial area during the pandemic. On multiple instances, criminals were posing as legitimate logistics providers, stealing goods during shipment.
“I’m seeing a significant number of false suppliers acting as genuine potential suppliers in supply chain logistics provision – warehousing distribution, distribution centres, transportation companies – and actually, they are criminal groups trying to infiltrate the logistics supply chain,” said David Fairnie, BSI’s principal consultant in supply chain security. He urged producers to “continuously monitor” the supply chain and to not immediately trust new logistics providers – especially those contacted only remotely.
So, arguably today more than ever, you do need to know your suppliers. So far in 2021, BSI has noted this issue of fake carriers in an increasing number of countries in both the Americas and Europe.
Criminals have apparently been trying to steal goods in various ways, with phony truck drivers loading up items and taking off with them, while conmen “posing as legitimate employees” have reportedly been observed lurking around delivery destinations to steal cargo.
At the same time, the report found that trade in illicit goods has also been on the rise lately, with the illegal drug industry in particular appearing to flourish. While the supply chain for drug cartels, which require large amounts of assorted chemicals to produce narcotics, was disrupted due to the pandemic lockdowns and border closures impacted trafficking routes, organized crime quickly overcame these problems, the BSI noted.
“Drug cartels around the world did not miss a beat,” Chris Tomas, BSI lead intelligence analyst, said.
While many cartels shifted their production towards synthetic drugs, namely amphetamine, amid the pandemic, the apparent “lack of eradication of coca crops in Latin American countries” also remains an issue, the BSI said. The flow of cocaine has grown over the past year and is expected to increase even further, the organization warned.
“The numbers and quantities of cocaine seizures in Europe increased steadily in 2020 and 2021 and are expected to continue to rise in 2022,” the report reads.
Think your friends would be interested? Share this story!