55 research outputs found
Relentless Strike: The Secret History of Joint Special Operations Command, by Sean Naylor
Once again, Sean Naylor has produced an authoritative and well-written book. Relentless Strike chronicles the history of the Joint Special Operations Com- mand (JSOC), Americaâs top-tier special operations military unit. To the benefit of history and the reader, and most likely to the consternation of the Pentagon, Naylorâs knowledge of special operations and his extensive contacts reveal the temperaments and competencies of key individuals and the details of numerous clandestine missions and organizational capabilities. Many will condemn Naylor for revealing these secrets, but the fault is not with Naylor; it is with those who talked. The book also, perhaps unintentionally, exposes flaws in how the United States wages war, as well as the limitations of special operations
PALB2, CHEK2 and ATM rare variants and cancer risk: data from COGS
Background: The rarity of mutations in PALB2, CHEK2 and ATM make it difficult to estimate precisely associated cancer risks. Population-based family studies have provided evidence that at least some of these mutations are associated with breast cancer risk as high as those associated with rare BRCA2 mutations. We aimed to estimate the relative risks associated with specific rare variants in PALB2, CHEK2 and ATM via a multicentre case-control study.Methods: We genotyped 10 rare mutations using the custom iCOGS array: PALB2 c.1592delT, c.2816T>G and c.3113G>A, CHEK2c.349A>G, c.538C>T, c.715G>A, c.1036C>T, c.1312G>T, and c.1343T>G and ATM c.7271T>G. We assessed associations with breast cancer risk (42â
671 cases and 42â
164 controls), as well as prostate (22â
301 cases and 22â
320 controls) and ovarian (14â
542 cases and 23â
491 controls) cancer risk, for each variant.Results: For European women, strong evidence of association with breast cancer risk was observed for PALB2 c.1592delT OR 3.44 (95% CI 1.39 to 8.52, p=7.1Ă10â5), PALB2 c.3113G>A OR 4.21 (95% CI 1.84 to 9.60, p=6.9Ă10â8) and ATM c.7271T>G OR 11.0 (95% CI 1.42 to 85.7, p=0.0012). We also found evidence of association with breast cancer risk for three variants in CHEK2, c.349A>G OR 2.26 (95% CI 1.29 to 3.95), c.1036C>T OR 5.06 (95% CI 1.09 to 23.5) and c.538C>T OR 1.33 (95% CI 1.05 to 1.67) (pâ€0.017). Evidence for prostate cancer risk was observed for CHEK2 c.1343T>G OR 3.03 (95% CI 1.53 to 6.03, p=0.0006) for African men and CHEK2 c.1312G>T OR 2.21 (95% CI 1.06 to 4.63, p=0.030) for European men. No evidence of association with ovarian cancer was found for any of these variants.Conclusions: This report adds to accumulating evidence that at least some variants in these genes are associated with an increased risk of breast cancer that is clinically important.</p
Functional analysis of the sporulation-specific SPR6 gene of Saccharomyces cerevisiae
The SPR6 gene of Saccharomyces cerevisiae encodes a moderately abundant RNA that is present at high levels only during sporulation. The gene contains a long open reading frame that could encode a hydrophilic protein approximately 21 kDa in size. This protein is probably produced by the yeast, because the lacZ gene of Escherichia coli is expressed during sporulation when fused to SPR6 in the expected reading frame. SPR6 is inessential for sporulation; mutants that lack SPR6 activity sporulate normally and produce viable ascospores. Nonetheless, the SPR6 gene encodes a function that is relevant to sporulating cells; the wild-type allele can enhance sporulation in strains that are defective for several SPR functions. SPR6 is located on chromosome V, 14.4 centimorgans centromere-distal to MET6 .Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/46973/1/294_2004_Article_BF00318210.pd
Two Taxonomies of Deception for Attacks on Information Systems
This paper appeared in the Journal of Information Warfare, 3 (2), July 2004, 27-39.'Cyberwar' is information warfare directed at the software of information systems. It represents an increasing threat
to our militaries and civilian infrastructures. Six principles of military deception are enumerated and applied to
cyberwar. Two taxonomies of deception methods for cyberwar are then provided, making both offensive and
defensive analogies from deception strategies and tactics in conventional war to this new arena. One taxonomy has
been published in the military literature, and the other is based on case theory in linguistics. The application of both
taxonomies to cyberwar is new. We then show how to quantify and rank proposed deceptions for planning using
'suitability' numbers associated with the taxonomies. The paper provides planners for cyberwar with a more
comprehensive enumeration than any yet published to the tactics and strategies that they and their enemies may use.
Some analogies to deception in conventional warfare hold, but many do not, and careful thought and preparation
must be applied to any deception effort.Approved for public release; distribution is unlimited
The Strategic Utility of Small-State Special Operations Forces (SOF) as Information Collectors to Support National Decision-Making
Defense Analysis Poste
Phase II report on intelligent software decoys: intelligent software decoy tools for cyber counterintelligence and security countermeasures
This report documents our accomplishments during Phase II of the Intelligent Software Decoys Project, including the development of a theory of cyber deception, tools for conduction cyber-based deception, and issues pertaining to the acceptable use of cyber deception within the context of homeland security and homeland defense.Approved for public release; distribution is unlimited
THE NATO SPECIAL OPERATIONS FORCES TRANSFORMATION INITIATIVE: OPPORTUNITIES AND CHALLENGES
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sour ces, gather ing and maintaining the da ta needed, and co mpleting and r eviewing the collection of info rmation. Send comments regarding this burden estimate or any other aspect of this collection of i nformation, including suggestions for reducing this burden, t
- âŠ