55 research outputs found

    Relentless Strike: The Secret History of Joint Special Operations Command, by Sean Naylor

    Get PDF
    Once again, Sean Naylor has produced an authoritative and well-written book. Relentless Strike chronicles the history of the Joint Special Operations Com- mand (JSOC), America’s top-tier special operations military unit. To the benefit of history and the reader, and most likely to the consternation of the Pentagon, Naylor’s knowledge of special operations and his extensive contacts reveal the temperaments and competencies of key individuals and the details of numerous clandestine missions and organizational capabilities. Many will condemn Naylor for revealing these secrets, but the fault is not with Naylor; it is with those who talked. The book also, perhaps unintentionally, exposes flaws in how the United States wages war, as well as the limitations of special operations

    PALB2, CHEK2 and ATM rare variants and cancer risk: data from COGS

    Get PDF
    Background: The rarity of mutations in PALB2, CHEK2 and ATM make it difficult to estimate precisely associated cancer risks. Population-based family studies have provided evidence that at least some of these mutations are associated with breast cancer risk as high as those associated with rare BRCA2 mutations. We aimed to estimate the relative risks associated with specific rare variants in PALB2, CHEK2 and ATM via a multicentre case-control study.Methods: We genotyped 10 rare mutations using the custom iCOGS array: PALB2 c.1592delT, c.2816T&gt;G and c.3113G&gt;A, CHEK2c.349A&gt;G, c.538C&gt;T, c.715G&gt;A, c.1036C&gt;T, c.1312G&gt;T, and c.1343T&gt;G and ATM c.7271T&gt;G. We assessed associations with breast cancer risk (42 671 cases and 42 164 controls), as well as prostate (22 301 cases and 22 320 controls) and ovarian (14 542 cases and 23 491 controls) cancer risk, for each variant.Results: For European women, strong evidence of association with breast cancer risk was observed for PALB2 c.1592delT OR 3.44 (95% CI 1.39 to 8.52, p=7.1×10−5), PALB2 c.3113G&gt;A OR 4.21 (95% CI 1.84 to 9.60, p=6.9×10−8) and ATM c.7271T&gt;G OR 11.0 (95% CI 1.42 to 85.7, p=0.0012). We also found evidence of association with breast cancer risk for three variants in CHEK2, c.349A&gt;G OR 2.26 (95% CI 1.29 to 3.95), c.1036C&gt;T OR 5.06 (95% CI 1.09 to 23.5) and c.538C&gt;T OR 1.33 (95% CI 1.05 to 1.67) (p≀0.017). Evidence for prostate cancer risk was observed for CHEK2 c.1343T&gt;G OR 3.03 (95% CI 1.53 to 6.03, p=0.0006) for African men and CHEK2 c.1312G&gt;T OR 2.21 (95% CI 1.06 to 4.63, p=0.030) for European men. No evidence of association with ovarian cancer was found for any of these variants.Conclusions: This report adds to accumulating evidence that at least some variants in these genes are associated with an increased risk of breast cancer that is clinically important.</p

    Functional analysis of the sporulation-specific SPR6 gene of Saccharomyces cerevisiae

    Full text link
    The SPR6 gene of Saccharomyces cerevisiae encodes a moderately abundant RNA that is present at high levels only during sporulation. The gene contains a long open reading frame that could encode a hydrophilic protein approximately 21 kDa in size. This protein is probably produced by the yeast, because the lacZ gene of Escherichia coli is expressed during sporulation when fused to SPR6 in the expected reading frame. SPR6 is inessential for sporulation; mutants that lack SPR6 activity sporulate normally and produce viable ascospores. Nonetheless, the SPR6 gene encodes a function that is relevant to sporulating cells; the wild-type allele can enhance sporulation in strains that are defective for several SPR functions. SPR6 is located on chromosome V, 14.4 centimorgans centromere-distal to MET6 .Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/46973/1/294_2004_Article_BF00318210.pd

    The heat shock response in neurons and astroglia and its role in neurodegenerative diseases

    Full text link

    Two Taxonomies of Deception for Attacks on Information Systems

    Get PDF
    This paper appeared in the Journal of Information Warfare, 3 (2), July 2004, 27-39.'Cyberwar' is information warfare directed at the software of information systems. It represents an increasing threat to our militaries and civilian infrastructures. Six principles of military deception are enumerated and applied to cyberwar. Two taxonomies of deception methods for cyberwar are then provided, making both offensive and defensive analogies from deception strategies and tactics in conventional war to this new arena. One taxonomy has been published in the military literature, and the other is based on case theory in linguistics. The application of both taxonomies to cyberwar is new. We then show how to quantify and rank proposed deceptions for planning using 'suitability' numbers associated with the taxonomies. The paper provides planners for cyberwar with a more comprehensive enumeration than any yet published to the tactics and strategies that they and their enemies may use. Some analogies to deception in conventional warfare hold, but many do not, and careful thought and preparation must be applied to any deception effort.Approved for public release; distribution is unlimited

    Phase II report on intelligent software decoys: intelligent software decoy tools for cyber counterintelligence and security countermeasures

    Get PDF
    This report documents our accomplishments during Phase II of the Intelligent Software Decoys Project, including the development of a theory of cyber deception, tools for conduction cyber-based deception, and issues pertaining to the acceptable use of cyber deception within the context of homeland security and homeland defense.Approved for public release; distribution is unlimited

    THE NATO SPECIAL OPERATIONS FORCES TRANSFORMATION INITIATIVE: OPPORTUNITIES AND CHALLENGES

    No full text
    Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sour ces, gather ing and maintaining the da ta needed, and co mpleting and r eviewing the collection of info rmation. Send comments regarding this burden estimate or any other aspect of this collection of i nformation, including suggestions for reducing this burden, t
    • 

    corecore