EXPERT OPINION — More than 200 U.S. officers have been hunted around the globe and targeted by an adversary using a mysterious weapon that causes permanent brain injury. It’s time to get serious about fighting back.

The Authors:

Paul Kolbe served for 25 years in the CIA’s Directorate of Operations. He is currently Director of the Intelligence Project at Harvard Kennedy School’s Belfer Center for Science and International Affairs.

Marc Polymeropoulos worked for the CIA for 26 years. He is author of “Clarity in Crisis: Leadership Lessons from the CIA.

John Sipher worked for the CIA’s clandestine service for 28 years. He is now a nonresident senior fellow at the Atlantic Council and a co-founder of Spycraft Entertainment.

Prior to 9/11, al Qaida declared war on the United States, bombed the USS Cole, and blew up U.S. embassies in Nairobi and Dar es Salam. Despite heavy casualties, America viewed successive al Qaida terrorist attacks as somehow unique, not representative of a larger threat or state of war. We went about our business and failed to take hard action against al Qaida despite clear warning. Our failure to respond forcefully led to 9/11 and the two decades of war that followed.

Fast forward to today.  Since 2016, more than 200 U.S. officials have reportedly suffered from a mysterious series of symptoms which have caused long-lasting, debilitating injuries. Suffering from searing headaches, vertigo, vision impairment, and nausea, many victims have been formally diagnosed with traumatic brain injuries (TBI) at the Walter Reed National Military Medical Center and other leading hospitals. Family members and young children have suffered as well. Some medical tests can now confirm the markers of brain injury, similar to those suffered by victims of concussive injuries in Iraq and Afghanistan.

These injuries began with a cluster of reports from Cuba in 2016 and have become commonly referred to as Havana Syndrome. Moscow, Vienna, Belgrade, and Hanoi are among more than a dozen cities where U.S. officials reportedly have been attacked and injured. In residences, on the street, in vehicles, and even at secure U.S. facilities, U.S. officers are being hunted. Stunningly, even a close aide to CIA Director Bill Burns was reportedly attacked on a trip to India just this past August.

The CIA, after a period of confusion, delay, and even denial at times, now appears to take these threats very seriously. CIA Director Burns and Deputy Director David Cohen have publicly stated that U.S. officials are being “attacked.” They have improved health care for CIA officers who are hurt. And an agency task force is hard at work trying to obtain additional intelligence on those responsible. We credit Director Burns for his solid leadership.

The cause of these injuries? The National Academy of Sciences has pointed to Directed Energy Weapons – devices which emit microwave pulses which can inflict pain and damage tissue. The United States, Russia, China, and others have all developed Directed Energy Weapons to destroy equipment, counter drones, and control crowds. This is not science fiction.

Directed energy weapons would account for the highly directional and locational nature of these incidents. When victims can “move off the x,” the signature sounds, sensations, and pain that goes with the attacks often stop, though damage has already occurred. The amount of exposure seems to affect the degree of injury. Other technologies could be at play and are being investigated, but microwaves appear to be the most likely vector. Russia has used them before, flooding the U.S. Embassy in Moscow with microwave radiation for decades.

Regardless of form, the weapons being used in these attacks are nothing less than weapons of terror, designed to cause injury to non-combatants. Who would use such a weapon to attack U.S. intelligence officers, diplomats, and military personnel, and to what conceivable end?


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


CIA Deputy Director Cohen stated at a recent intelligence summit, that the U.S. was closer to identifying the culprit, and Politico has reported that members of the Senate Intelligence Committee are increasingly convinced that Russia or another hostile adversary is behind the attack, although reportedly, no smoking gun has been found.

As former CIA operations officers with extensive experience dealing with both counterterrorism and counterintelligence issues, we have few doubts about who will be named as the culprit. For at least a decade, Russia has conducted itself as in a state of conflict with the West in general and the United States in particular. Russia has launched cyberattacks impacting critical infrastructure and supply chains, assassinated opponents with nuclear poisons and chemical weapons, gunned down people in the streets using criminal proxies, sabotaged a Czech ammunition depot, and mounted a violent coup attempt in Montenegro. It has also bombarded the U.S. embassy in Moscow with microwave radiation and used carcinogenic “spy dust” without regard to health effects. The attacks on U.S. officials would fit this pattern of behavior.

We recognize that it is important to let the intelligence community do its job and its findings must inform policy action. Congress and the administration must work together to formulate a range of possible responses and it is not too early to begin. As Senator Collins and others have stated, these attacks are “an act of war,” and as such, preparation for a future attribution call by the national security establishment is in order. So how could the U.S. respond?

Let’s start with what doesn’t work – sanctions. Sanctions feel good and satisfy an action imperative but they are feckless. Sanctions have not stopped Russia from killing dissidents, halted the Nordstream II pipeline, compelled a pull back from occupied territories, reduced support for tyrants, or hindered oil and gas production. Sanctions have simply forced Russia to develop more creative money laundering and sanction circumvention mechanisms.

So, what would work? For starters, we must understand that the Putin regime considers itself in a state of conflict with the U.S., short of war, but nonetheless deadly real. We are dealing with a state sponsor of terror which conducts operations across the globe to weaken the U.S. abroad, divide it from its allies, and sow discord at home. Our policy must be calibrated to win this conflict, without sparking a shooting war, but at risk of one.

Russia understands reciprocity and strength. When four Russian diplomats were kidnapped by extremists in Beirut in 1985, and one of them was killed, Russia reportedly responded by kidnapping and gruesomely killing a relative of the group’s leader. The surviving diplomats were released immediately. The story may be apocryphal, but it does illustrate the Russian approach. Tempting as it may be for America to retaliate tit for tat, we need not mirror Russia’s actions. Instead, we should play to our greater economic, diplomatic, and military advantages.

We offer five elements to frame a response: enlist U.S. allies, expand forward deterrence, limit the adversary’s reach, choke off money, and bring those accountable to justice.

NATO: With proof of the attacks on U.S. officials, we should activate NATO’s Article Five collective defense clause. The only other time this was enacted was after 9/11. As justification, in addition to the Havana Syndrome attacks, (which also caused Canadian casualties), we would include GRU and FSB assassination operations across Europe, deadly sabotage in the Czech Republic, a coup attempt in Montenegro, persistent cyberattacks, and a litany of other actions that can only be described as irregular warfare directed against NATO members.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Forward Presence: A crystal clear signal that we understand the nature of Russian hybrid warfare and are responding would be to enhance our deployed military presence in Poland, the Baltic States, and in the Black Sea region. These units would pose no offensive threat to Russia but would be a clear signal that the U.S. is prepared to counter any Russian shenanigans. We should also significantly ramp up our lethal aid and training to the Ukraine, where the nature of Russian aggression is well known. Weakness in Eastern Europe is an invitation to conflict.

Travel and Presence: We should drastically limit Russian business and tourist travel which is being used as cover for FSB and GRU operations. We would reduce Russian diplomatic presence in each capital to the bare minimum – handfuls not hundreds. American and European counterintelligence experts believe there are more Russian intelligence officers operating from embassies than during the Cold War. Limiting the size of Russia’s espionage infrastructure will complicate the planning and execution of all of its intelligence operations.

Finance: A key tool in counterterrorism operations is the ability to target sources of finance which constitute material support to terrorism. In this case, we would apply that principle to the Russian government, state enterprises, and individuals who provide cover, tools, and sources of funding to Russia’s campaign to undermine the West with violence, terror, and media manipulation. Russia’s dirty money has been used to undermine the west and poison our politics. We should limit the easy access of shady money to western banks.

Criminal Cases: We need bring war crime cases to the International Court of Justice (ICJ) in the Hague. Following a decade of conflict in the Balkans, the ICJ brought to justice 161 indicted Serbian, Croatian, and Bosnian war criminals. This was an astounding success – a manhunt which included American and European law enforcement and intelligence services. Just as in Nuremberg after World War II, these actions to hold war criminals accountable drew a line in the sand.

This is a start.  Successive Democratic and Republican administrations have pursued Russia policies which represent the triumph of hope over experience. We have treated the symptoms of malign Russian actions rather than the underlying pathology. It is now time to finally acknowledge that we are in a long-term hybrid conflict and forget the fantasy of changing Putin’s behavior. Only a new regime in the Kremlin would hold the hope of bringing about a change in actions. Eventually, the Putin regime will wither or collapse, but until it does, we and our allies must do a better job of defending ourselves.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post Havana and the Global Hunt for U.S. Officers appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

An American nonprofit behind the US-funded bat virus research in China has denied ever sending virus samples from Laos – a place where SARS-CoV-2 closest natural relative was found – to Wuhan in response to fresh allegations.

“No work was ever conducted in Laos as a part of this collaborative research project,” EcoHealth Alliance – a group that conducted experiments on coronaviruses while receiving funding from the National Institutes of Health (NIH) – said in a series of tweets on Sunday, responding to media reports alleging that the group might have transported a potentially dangerous virus from Laos to the laboratory in Wuhan.

The group’s name surfaced in October when the NIH principal deputy director, Lawrence Tabak, revealed EcoHealth Alliance did experiment on the viruses with the agency’s financial help. At that time, White House Medical Advisor Dr. Anthony Fauci stated that the viruses studied as part of the project “were distant enough molecularly that no matter what you did to them, they could never, ever become SARS-CoV-2.”

EcoHealth has come under renewed scrutiny after its emails, obtained through a Freedom of Information request, appeared to suggest that the group was discussing the prospect of collecting viral samples from bats in Laos and sending them to the Wuhan Institute of Virology. The emails were initially obtained by the White Coat Waste Project and sparked a flurry of reports over the weekend, including in the Spectator by British science writer Matt Ridley.

Read more

FILE PHOTOS.
Fauci DID fund Wuhan virus experiments, but officials insist virus involved ‘could not have been’ cause of Covid-19 pandemic

The emails shared between EcoHealth Alliance and its US government funders reportedly reveal that the scientists discussed collecting viral samples from bats in eight countries, including in Laos, between 2016 and 2019, and toyed with the idea of transporting them to Wuhan, ostensibly, to avoid red tape. One email from 2016 cited by the Spectator reportedly reads: “All samples collected would be tested at the Wuhan Institute of Virology.”

Laos is the birthplace of at least one virus that seems to be very close to SARS-Cov-2. A bat viral strain called Banal-52 discovered in Laos in September shares 96.8 percent of its genome with the virus behind the Covid-19 pandemic

On Sunday, EcoHealth Alliance claimed that the emails cited by Ridley “do not show…that we were sampling bats in Laos and sending the results to Wuhan.”

The group acknowledged, however, that it requested NIH permission to work in Southeast Asian countries, including in Laos, and that this permission was granted. 

However, the nonprofit claimed it ended focusing on China instead.

 The response failed to satisfy Ridley, who is also a co-author of a book on Covid’s origin, who demanded “evidence” proving that  his report was not “fully accurate.”

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

The city council in Austria’s second-largest city, Graz, has elected a new mayor. Communist Party member Elke Kahr has become the first Communist leader of a major city in the country.

The 60-year-old politician, who has been working in the municipal government for more than 15 years and previously served as vice mayor of Graz, was elected as the new city leader on Wednesday. A member of the Austrian Communist Party (KPÖ, Kommunistische Partei Österreichs) for almost 30 years, she won the election with 28 of 46 votes. Kahr succeeded the previous long-standing mayor Siegfried Nagl of the center-right, liberal-conservative People’s Party.

Read more

FILE PHOTO: A protester waves a EU flag outside the parliament building in Budapest, December 16, 2014
Brussels, we got a problem! 30 years after collapse of communism, Eastern Europe is losing its faith in Liberal Democracy

Who would have thought that the daughter of a locksmith, a Communist, would become mayor,” she said in her first speech following the vote.

Having acknowledged a number of issues to deal with in the city, especially during the Covid-19 pandemic, the new mayor highlighted a housing policy, pledging to put a stop to profit-driven construction in Ganz.

The Communists have also already formed a coalition with the Greens and the Social Democratic Party (SPÖ), and another precedent in European city governance was made – two women serving as mayor and deputy. Green leader Judith Schwentner was chosen as Graz’s vice mayor, with the new governing coalition saying they would support not only social, but also environmental changes, aiming to improve living standards especially for low-income groups. Providing a bicycle for every child in the city from the municipality is in their program.

However, not everyone in the local government is happy with the new Communist rule. A member of the right-wing Freedom Party of Austria (FPÖ), Alexis Pascuttini, described the choice as “unpleasant,” having accused the Graz Communists of empty catchphrases in their program and refusing to participate in what he described as “left-wing nonsense.” Kahr herself has been exposed to strong pressure to justify her party, being repeatedly asked about her position on “the crimes of communist parties around the world since 1917,” according to Austrian media.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Planetary alignment on Friday has offered sky-gazers around the globe a chance to witness a spectacular near-total lunar eclipse, the longest since the 1440s.

The fascinating astronomical phenomenon lasted three hours and 28 minutes – the longest in centuries, according to international space agencies. On Thursday and Friday, depending on local time zones, the Earth, Sun and Moon aligned in such a way that 97.4% of our natural satellite’s surface was darkened in shadow.

When the Moon came out of the shroud, it turned bloody or rusty red in sunlight.

The dramatic celestial show was visible in those parts of the globe where the Moon appeared above the horizon during the eclipse.

Sky watchers in North and South America, parts of Eastern Asia and Australia had a chance to witness the phenomenon.

In Russia, the partial eclipse could be seen in Siberia and the Far East. Russian space agency Roscosmos also shared images of the shadowed moon as seen from the International Space Station (ISS).

Adding to the astonishment, the Moon was very low in the sky for much of the eclipse, causing an optical illusion that made it seem larger.

While the full Moon travels through Earth’s shadow roughly two times a year, lunar eclipses are usually far shorter.

The latest event, due to its rare duration, might have affected people not only visually, but also emotionally, astrologers cautioned.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

An adviser to the EU’s top court has claimed that citizens’ information in Germany is being illegally harvested, after telecom companies challenged bulk data collection.

The German data retention law was criticized on Thursday by an adviser to the Court of Justice of the European Union (CJEU), who stated that general and indiscriminate retention of traffic and location data is only allowed in exceptional cases, such as a threat to national security.

According to the adviser, bulk collection of data generates a ‘serious risk’ of leaks or improper access. It also entails a ‘serious interference’ with citizens’ fundamental rights to privacy and the protection of personal data.

Read more

(FILE PHOTO) © REUTERS/Russell Cheyne
Google won’t pay for spying on UK iPhone users

This comes after two companies, SpaceNet and Telekom Deutschland, challenged the obligation to store their customers’ telecommunications traffic data in 2016. The Administrative Court of Cologne ruled that the two companies were not obliged to retain data because such an obligation violated Union law. Germany then appealed to the Federal Administrative Court, who asked the CJEU about the compatibility of the data retention obligation.

The CJEU has often stated that indiscriminate mass surveillance does not fit within the general principles of EU law. Over a year ago it saw a similar case involving legal challenges around national bulk data collection under UK and French law. The court then ruled that only limited data collection and temporary retention were allowed. France seeks to bypass the CJEU on data retention and has asked the country’s highest administrative court (the Council of State) not to follow the EU ruling. France is waiting for the conclusion of the procedure launched by the Council of State before “assessing to what extent” national law should be changed. 

Despite recent EU court attempts to curb surveillance powers, leaked papers from June 2021 show that the national governments of the Netherlands, France, Spain, Luxembourg, Slovakia, and Estonia are pushing for a new pan-EU data retention law. They claim that data retention is essential for safeguarding public security and ensuring effective criminal investigations.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

The Islamic State terrorist group is tearing a path across Afghanistan, establishing itself in “nearly all” of its provinces while increasing attacks more than five-fold in the past year, the UN’s envoy to the country has warned.

Addressing the UN Security Council on Wednesday, the body’s special representative for Afghanistan Deborah Lyons spoke of a major Islamic State (IS, formerly ISIS) surge through the war-torn country, claiming the jihadist group has now expanded nationwide.

“Once limited to a few provinces and the capital, ISKP now seems to be present in nearly all provinces, and increasingly active,” Lyons said, referring to the group’s Afghanistan-based ‘Khorasan’ faction. She added that so far in 2021, IS has carried out 334 attacks, up from just 60 last year.

The envoy’s comments came just hours after an Islamic State bombing erupted in a Shiite Muslim neighborhood of the Afghan capital, killing one and wounding six others, according to Reuters.

Since taking over as the government following a chaotic US withdrawal and the outright collapse of the American-backed administration in Kabul last summer, the Taliban has struggled to keep the terrorist group at bay, Lyons said. Though she noted that the Taliban insists it is “waging a concerted campaign” against IS and is making “genuine efforts to present itself as a government,” she said its response “appears to rely heavily on extrajudicial detentions and killings.”

READ MORE: ‘Ghost soldiers’ to blame for Afghan government’s quick defeat – ex-minister

Despite the rise in IS attacks in recent months, however, Lyons said the overall security situation in Afghanistan has improved since the end of the US war, which stretched on for two decades.

In addition to the terrorism issue, the UN representative also cited broader concerns for the country in the coming months, warning of a looming “humanitarian catastrophe” driven by a litany of causes, including foreign sanctions – which she said have “paralyzed” the local banking system – as well as growing levels of food shortages due to famine and a failing economy, among other factors.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

A Roadmap for AI in the Intelligence Community

(Editor’s Note: This article was first published by our friends at Just Security and is the fourth in a series that is diving into the foundational barriers to the broad integration of AI in the IC – culture, budget, acquisition, risk, and oversight.  This article considers a new IC approach to risk management.)

OPINION — I have written previously that the Intelligence Community (IC) must rapidly advance its artificial intelligence (AI) capabilities to keep pace with our nation’s adversaries and continue to provide policymakers with accurate, timely, and exquisite insights. The good news is that there is strong bipartisan support for doing so. The not-so-good news is that the IC is not well-postured to move quickly and take the risks required to continue to outpace China and other strategic competitors over the next decade.

In addition to the practical budget and acquisition hurdles facing the IC, there is a strong cultural resistance to taking risks when not absolutely necessary. This is understandable given the life-and-death nature of intelligence work and the U.S. government’s imperative to wisely execute national security funds and activities. However, some risks related to innovative and cutting-edge technologies like AI are in fact necessary, and the risk of inaction – the costs of not pursuing AI capabilities – is greater than the risk of action.

The Need for a Risk Framework

For each incredible new invention, there are hundreds of brilliant ideas that have failed. To entrepreneurs and innovators, “failure” is not a bad word. Rather, failed ideas are often critical steps in the learning process that ultimately lead to a successful product; without those prior failed attempts, that final product might never be created. As former President of India A.P.J. Abdul Kalam once said, “FAIL” should really stand for “First Attempt In Learning.”

The U.S. government, however, is not Silicon Valley; it does not consider failure a useful part of any process, especially when it comes to national security activities and taxpayer dollars. Indeed, no one in the U.S. government wants to incur additional costs or delay or lose taxpayer dollars. But there is rarely a distinction made within the government between big failures, which may have a lasting, devastating, and even life-threatening impact, and small failures, which may be mere stumbling blocks with acceptable levels of impact that result in helpful course corrections.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


As a subcommittee report of the House Permanent Select Committee on Intelligence (HPSCI) notes “[p]rogram failures are often met with harsh penalties and very public rebukes from Congress which often fails to appreciate that not all failures are the same. Especially with cutting-edge research in technologies … early failures are a near certainty …. In fact, failing fast and adapting quickly is a critical part of innovation.” There is a vital difference between an innovative project that fails and a failure to innovate. The former teaches us something we did not know before, while the latter is a national security risk.

Faced with congressional hearings, inspector general reports, performance evaluation downgrades, negative reputational effects, and even personal liability, IC officers are understandably risk-averse and prefer not to introduce any new risk. That is, of course, neither realistic nor the standard the IC meets today. The IC is constantly managing a multitude of operational risks – that its officers, sources, or methods will be exposed, that it will miss (or misinterpret) indications of an attack, or that it will otherwise fail to produce the intelligence policymakers need at the right time and place. Yet in the face of such serious risks, the IC proactively and aggressively pursues its mission. It recognizes that it must find effective ways to understand, mitigate, and make decisions around risk, and therefore it takes action to make sure potential ramifications are clear, appropriate, and accepted before any failure occurs. In short, the IC has long known that its operations cannot be paralyzed by a zero-risk tolerance that is neither desirable nor attainable. This recognition must also be applied to the ways in which the IC acquires, develops, and uses new technology.

This is particularly important in the context of AI. While AI has made amazing progress in recent years, the underlying technology, the algorithms and their application, are still evolving and the resulting capabilities, by design, will continue to learn and adapt. AI holds enormous promise to transform a variety of IC missions and tasks, but how and when these changes may occur is difficult to forecast and AI’s constant innovation will introduce uncertainty and mistakes. There will be unexpected breakthroughs, as well as failures in areas that initially seemed promising.

The IC must rethink its willingness to take risks in a field where change and failure is embraced as part of the key to future success. The IC must experiment and iterate its progress over time and shift from a culture that punishes even reasonable risk to one that embraces, mitigates, and owns it. This can only be done with a systematic, repeatable, and consistent approach to making risk-conscious decisions.

Today there is no cross-IC mechanism for thinking about risk, let alone for taking it. When considering new activities or approaches, each IC element manages risk through its own lens and mechanisms, if at all. Several individual IC elements have created internal risk assessment frameworks to help officers understand the risks of both action and inaction, and to navigate the decisions they are empowered to make depending upon the circumstances. These frameworks increase confidence that if an activity goes wrong, supervisors all the way up the chain will provide backing as long as the risk was reasonable, well-considered and understood, and the right leaders approved it. And while risk assessments are often not precise instruments of measurement – they reflect the quality of the data, the varied expertise of those conducting the assessments, and the subjective interpretation of the results – regularized and systematic risk assessments are nevertheless a key part of effective risk management and facilitate decision-making at all levels.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Creating these individual frameworks is commendable and leading-edge for government agencies, but more must be done holistically across the IC. Irregular and inconsistent risk assessments among IC elements will not provide the comfort and certainty needed to drive an IC-wide cultural shift to taking risk. At the same time, the unique nature of the IC, comprised of 18 different elements, each with similar and overlapping, but not identical, missions, roles, authorities, threats and vulnerabilities, does not lend itself to a one-size-fits-all approach.

For this reason, the IC needs a flexible but common strategic framework for considering risk that can apply across the community, with each element having the ability to tailor that framework to its own mission space. Such an approach is not unlike how the community is managed in many areas today – with overarching IC-wide policy that is locally interpreted and implemented to fit the specific needs of each IC element. When it comes to risk, creating an umbrella IC-wide framework will significantly improve the workforce’s ability to understand acceptable risks and tradeoffs, produce comprehensible and comparable risk determinations across the IC, and provide policymakers the ability to anticipate and mitigate failure and unintended escalation.

Critical Elements of a Risk Framework

A common IC AI risk framework should inform and help prioritize decisions from acquisition or development, to deployment, to performance in a consistent way across the IC. To start, the IC should create common AI risk management principles, like its existing principles of transparency and AI ethics, that include clear and consistent definitions, thresholds, and standards. These principles should drive a repeatable risk assessment process that each IC element can tailor to its individual needs, and should promote policy, governance, and technological approaches that are aligned to risk management.

The successful implementation of this risk framework requires a multi-disciplinary approach involving leaders from across the organization, experts from all relevant functional areas, and managers who can ensure vigilance in implementation. A whole-of-activity methodology that includes technologists, collectors, analysts, innovators, security officers, acquisition officers, lawyers and more, is critical to ensuring a full 360-degree understanding of the opportunities, issues, risks, and potential consequences associated with a particular action, and to enabling the best-informed decision.

Given the many players involved, each IC element must strengthen internal processes to manage the potential disconnects that can lead to unintended risks and to create a culture that instills in every officer a responsibility to proactively consider risk at each stage of the activity. Internal governance should include an interdisciplinary Risk Management Council (RMC) made up of senior leaders from across the organization. The RMC should establish clear and consistent thresholds for when a risk assessment is required, recommended, or not needed given that resource constraints likely will not allow all of the broad and diverse AI activities within organizations to be assessed. These thresholds should be consistent with the IC risk management principles so that as IC elements work together on projects across the community, officers have similar understandings and expectations.

The risk framework itself should provide a common taxonomy and process to:

  • Understand and identify potential failures, including the source, timeline, and range of effects.
  • Analyze failures and risks by identifying internal vulnerabilities or predisposing conditions that could increase the likelihood of adverse impact.
  • Evaluate the likelihood of failure, taking into consideration risks and vulnerabilities.
  • Assess the severity of the potential impact, to include potential harm to organizational operations, assets, individuals, other organizations, or the nation.
  • Consider whether the ultimate risk may be sufficiently mitigated or whether it should be transferred, avoided, or accepted.

AI-related risks may include, among other things, technology failure, biased data, adversarial attacks, supply chain compromises, human error, cost overruns, legal compliance challenges, or oversight issues.

An initial risk level is determined by considering the likelihood of a failure against the severity of the potential impact. For example, is there is a low, moderate, or high likelihood of supply chain compromise? Would such a compromise affect only one discrete system or are there system-wide implications? These calculations will result in an initial risk level. Then potential mitigation measures, such as additional policies, training, or security measures, are applied to lower the initial risk level to an adjusted risk level. For example, physically or logically segmenting an organization’s systems so that a compromise only touches one system would significantly decrease the risk level associated with that particular technology. The higher the likelihood of supply chain compromise, the lower the severity of its impact must be to offset the risk, and vice versa. Organizations should apply the Swiss Cheese Model of more than one preventative or mitigative action for a more effective layered defense. Organizations then must consider the adjusted risk level in relation to their tolerance for risk; how much risk (and potential consequence) is acceptable in pursuit of value? This requires defining the IC’s risk tolerance levels, within which IC elements may again define their own levels based upon their unique missions.

Understanding and considering the risk of action is an important step forward for the IC, but it is not the last step. Sometimes overlooked in risk assessment practices is the consideration of the risk of inaction. To fully evaluate potential options, decision-makers must consider whether the overall risk of doing something is outweighed by the risks of not doing it. If the IC does not pursue particular AI capabilities, what is the opportunity cost of that inaction? Any final determination about whether to take action must consider whether declining to act would cause greater risk of significant harm. While the answer will not always be yes, in the case of AI and emerging technology, it is a very realistic possibility.

And, finally, a risk framework only works if people know about it. Broad communication – about the existence of the framework, how to apply it, and expectations for doing so – is vital. We cannot hold people accountable for appropriately managing risk if we do not clearly and consistently communicate and help people use the structure and mechanisms for doing so.

Buy-in To Enhance Confidence

An IC-wide AI risk framework will help IC officers understand risks and determine when and how to take advantage of innovative emerging technologies like AI, increasing comfort with uncertainty and risk-taking in the pursuit of new capabilities. Such a risk framework will have even greater impact if it is accepted – explicitly or implicitly – by the IC’s congressional overseers. The final article in this series will delve more deeply into needed changes to further improve the crucial relationship between the IC and its congressional overseers. It will also provide a link to a full report that provides more detail on each aspect of the series, including a draft IC AI Risk Framework.

Although Congress is not formally bound by such a framework, given the significant accountability measures that often flow from these overseers, a meeting of the minds between the IC and its congressional overseers is critical. Indeed, these overseers should have awareness of and an informal ability to provide feedback into the framework as it is being developed. This level of transparency and partnership would lead to at least two important benefits: first, increased confidence in the framework by all; and second, better insight into IC decision-making for IC overseers.

Ultimately, such a mutual understanding would encourage exactly what the IC needs to truly take advantage of next-generation technology like AI: a culture of experimentation, innovation, and creativity that sees reasonable risk and failure as necessary steps to game-changing outcomes.

Read also AI and the IC: The Tangled Web of Budget and Acquisition

Read also Artificial Intelligence in the IC: Culture is Critical

Read also AI and the IC: The Challenges Ahead

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post A Roadmap for AI in the IC appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

People who live in the big cities are definitely masters of eavesdropping. Sometimes they can’t help it, accidentally overhearing conversations from complete strangers can be so funny, it’s hard not to share them with someone else. And here comes the fittingly named Instagram account Overheard San Francisco that’s dedicated to sharing the funniest eavesdropped interactions in San Francisco and the Bay area. Scroll down to see the funniest examples!

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

Funny conversation overheard in San Francisco.

The post Hilarious Private Conversations People Overheard In San Francisco first appeared on .

find more fun & mates at SoShow now !

Australia’s Jewish community has condemned the repeated displays of Nazi references at anti-vaccine and anti-lockdown rallies in Victoria, some of which saw the state premier depicted as Adolf Hitler.

Daniel Aghion, the president of the Jewish Community Council of Victoria, claims that references to the genocidal regime of the Nazis amid the current unrest over pandemic rules is a false equivalence.

“The Nazis had the intention of wiping from the face of the Earth a race or religion simply because of what they were,” Aghion told Guardian Australia. “Nothing in the current proposals is remotely like that, and the comparison to Nazi Germany is therefore shocking, inappropriate and wrong,” he added.

Aghion’s comments come after demonstrators, protesting against pandemic laws, referenced Nazi Germany in an effort to make their point. Some carried placards depicting state premier, Daniel Andrews, as Hitler. 

 Wendy Lovell, a Liberal MP, had also claimed laws proposed to govern future pandemics were similar to Germany’s 1933 Enabling Act – which allowed the Reich government to issue laws without the consent of parliament and preceded atrocities, most notably the Holocaust.

MP Bernie Finn had gone as far as to share a social media post depicting the state premier as Hitler. It was later deleted.Laws proposed by Andrews seek to grant powers to the state leaders in the event of another pandemic. Under the move, the minister “may make any order… that the minister believes is reasonably necessary to protect public health.” 

Opponents claim the legislation, which would see power concentrated with the head of state and health minister, is too broad and far reaching.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Japan’s fifth wave of Covid-19 has virtually disappeared so dramatically that some scientists are puzzled as to why it happened. One team suggests the highly infectious Delta strain mutated into extinction on the island nation.

In mid-August, Japan experienced a peak in Covid-19 infections, recording over 23,000 new cases per day. Now the metric is just around 170, with deaths attributed to the disease mostly remaining in single digits this month.

The decline has been attributed by many to high vaccination rates, public acceptance of masks, and other factors, but some researchers say the drop was uniquely significant, compared to other nations with similar conditions.

Ituro Inoue, a geneticist at the National Institute of Genetics, believes that Japan had the good fortune of witnessing the Delta strain mostly rooting out other variants of the SARS-CoV-2 virus before then eradicating itself. He explained his team’s theory to the Japan Times newspaper this week.

For some time now, Inoue and his fellow scientists were researching mutations of SARS-CoV-2 and how they are affected by the protein nsp14, which is crucial for the reproduction of the virus.

RNA viruses, like the one causing Covid-19, tend to have a very high mutation rate, which helps them quickly adapt to changes in the environment. However, this opens the door for a so-called “error catastrophe,” when bad mutations pile up and finally cause the full extinction of a strain. The protein nsp14 appears to offer a form of error proofreading that helps the virus genome to stay below the threshold of the “error catastrophe.”

Read more

© Getty Images / Morsa Images
Fighting for our lives: Humanity’s weapons against Covid-19

In the case of Japan’s fifth wave of Covid-19, the Delta variant’s nsp14 failed at this job, Inoue believes, based on the genetic study of specimens collected from June to October. Contrary to his team’s expectations, there was a lack of genetic diversity, while many samples had many genetic changes in the site called A394V, which is linked to the error-fixing protein.

“We were literally shocked to see the findings,” the researcher told the Japan Times. “The Delta variant in Japan was highly transmissible and [was] keeping other variants out. But as the mutations piled up, we believe it eventually became a faulty virus and it was unable to make copies of itself.”

The theory could be relevant to the previous SARS strain, which was identified in 2003, explaining why it didn’t cause a pandemic. But that would be hard to confirm, since the outbreak ended relatively quickly and didn’t result in the massive collection of genetic data necessary to test the hypothesis.

It’s not clear why Japan had this lucky turn of events, but nothing comparable happened in other East Asian countries like South Korea, where populations are genetically close to that of Japan. Virus mutations similar to those flagged by the scientists have been discovered in at least 24 countries, Inoue said. He and his team plan to publish a paper detailing their findings by the end of November.

Even if the natural extinction theory is confirmed, it is at best a temporary reprieve for the Japanese people. New, more successful strains are likely to eventually find their way into the country, though quarantine measures and immigration control could delay the emergence of new variants in Japan, Inoue believes.

Meanwhile, Tokyo is bracing for a new wave of Covid-19 this winter and is preparing to live with the virus. The government reportedly plans to ease travel restrictions by increasing the number of people it allows to enter the country per day from 3,500 to 5,000.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !