Toggle light / dark theme

The next chapter for African genomics

The rest of the world is interested, too. Africa contains much more genetic diversity than any other continent because humans originated there. This diversity can provide insights into human evolution and common diseases. Yet fewer than 2% of the genomes that have been analysed come from Africans. A dearth of molecular-biology research on the continent also means that people of African descent might not benefit from drugs tailored to unique genetic variations. Infectious-disease surveillance also falls short, meaning that dangerous pathogens could evade detection until an outbreak is too big to contain easily.


Nigeria is poised to become a hub for genetics research, but a few stubborn challenges block the way.

Moscow deploys facial recognition technology for coronavirus quarantine

Sobyanin said last month that the city had begun using facial recognition as part of its city security surveillance programme.

Kremlin spokesman Dmitry Peskov said he had not seen details of the actions being taken in Moscow but that measures to curb the spread of the coronavirus should not be discriminatory.

The clamp down on quarantine rules comes after a woman in St. Petersburg staged an elaborate escape from a hospital where she said she was being kept against her will.

Information theft via manipulating screen brightness in air-gapped computers

Data can be stolen from an air gapped personal computer just by using variations in screen brightness. Researchers at Ben-Gurion University wrote a paper on it.

As the team defines them, “Air-gapped computers are systems that are kept isolated from the Internet since they store or process .”

That they have come up with yet another discovery on how to wrest from a came as no shock to Naked Security, which recognized that “Researchers at Ben-Gurion University of the Negev have made a name for themselves figuring out how to get data out of air-gapped computers. They’ve dreamed up ways to communicate using speakers, blinking LEDs in PCs, infrared lights in , and even computer fans.”

H-IIA conducts IGS Optical 7 launch

Making its first flight in over a year, Mitsubishi Heavy Industries’ H-IIA rocket lifted off from the Tanegashima Space Centre on Sunday with a reconnaissance satellite for the Japanese government. Liftoff occurred at10:34 local time 01:34 UTC, during a five-minute launch window.

Sunday’s launch deployed the IGS Optical 7 satellite for the Cabinet Satellite Intelligence Centre, an agency of the Japanese government responsible for space-based surveillance. IGS Optical 7 is part of the Information Gathering Satellite (IGS) or Joho Shushu Eisei (JSE) system, consisting of spacecraft collecting optical and radar images of the Earth.

Japan began development of IGS in the late 1990s, following North Korea’s attempted satellite launch in 1998. Although the North Korean launch failed to reach orbit, the rocket carrying it crossed Japan during its ascent, sparking fears that North Korean missiles would be able to target the islands. With IGS, Japan aimed to develop an independent reconnaissance capability to monitor future threats. The constellation can also be used for disaster monitoring and other civilian applications by the Japanese government.

DARPA is testing drones it can launch from a plane—then collect mid-air

The news: The Defense Advanced Research Projects Agency (DARPA) has conducted the first test of a new type of drone that can be launched from a plane in a swarm and recovered in mid-air when it’s done its job.

How it works: A military transport or bomber plane releases a series of drones in rapid succession. They carry out the task designated to them (surveillance, for example) and then return to the plane, docking on a line before being winched in. It looks a bit like the airborne refueling process.

Testing: A test, which took place in Utah in November but was first reported this week, showed that a military transport plane can successfully launch and monitor the drone, known as an X-61A Gremlin. However, after a successful mid-air launch and a flight lasting one hour, 41 minutes, the drone crashed when “mechanical issues” prevented its parachute from deploying, the firm behind the drone, Dynetics, said in a press statement. There’s video of the test here (it includes bad music, be warned). This spring, DARPA will try to fly and recover four of the drones for the first time.

Surveillance of Bat Coronaviruses in Kenya Identifies Relatives of Human Coronaviruses NL63 and 229E and Their Recombination History

Circa 2017 Bats harbor a large diversity of coronaviruses (CoVs), several of which are related to zoonotic pathogens that cause severe disease in humans. Our screening of bat samples collected in Kenya from 2007 to 2010 not only detected RNA from several novel CoVs but, more significantly, identified sequences that were closely related to human CoVs NL63 and 229E, suggesting that these two human viruses originate from bats. We also demonstrated that human CoV NL63 is a recombinant between NL63-like viruses circulating in Triaenops bats and 229E-like viruses circulating in Hipposideros bats, with the breakpoint located near 5′ and 3′ ends of the spike (S) protein gene. In addition, two further interspecies recombination events involving the S gene were identified, suggesting that this region may represent a recombination “hot spot” in CoV genomes. Finally, using a combination of phylogenetic and distance-based approaches, we showed that the genetic diversity of bat CoVs is primarily structured by host species and subsequently by geographic distances.


bMarie Bashir Institute for Infectious Diseases and Biosecurity, Charles Perkins Centre, School of Life and Environmental Sciences and Sydney Medical School, The University of Sydney, Sydney, Australia.

Find articles by Mang Shi

aDivision of Viral Diseases, Centers for Disease Control and Prevention, Atlanta, Georgia, USA.

Why Gene Editors Like CRISPR/Cas May Be a Game-Changer for Neuroweapons

This year marks the Eighth Review Conference (RevCon) of the Biological Toxins and Weapons Convention (BWC). At the same time, ongoing international efforts to further and more deeply investigate the brain’s complex neuronal circuitry are creating unprecedented capabilities to both understand and control neurological processes of thought, emotion, and behavior. These advances have tremendous promise for human health, but the potential for their misuse has also been noted, with most discussions centering on research and development of agents that are addressed by existing BWC and Chemical Weapons Convention (CWC) proscriptions. In this article, we discuss the dual-use possibilities fostered by employing emergent biotechnologic techniques and tools—specifically, novel gene editors like clustered regular interspaced short palindromic repeats (CRISPR)—to produce neuroweapons. Based on our analyses, we posit the strong likelihood that development of genetically modified or created neurotropic substances will advance apace with other gene-based therapeutics, and we assert that this represents a novel—and realizable—path to creating potential neuroweapons. In light of this, we propose that it will be important to re-address current categorizations of weaponizable tools and substances, so as to better inform and generate tractable policy to enable improved surveillance and governance of novel neuroweapons.

Keywords: : CRISPR, Gene editing, Neuroweapon, Neurotherapeutic pathways, Dual-use neuroscience, Biosecurity policy.

T his year marks the Eighth Review Conference (RevCon) of the Biological Toxins and Weapons Convention (BWC), the purpose of which is to ensure that the convened parties’ directives continue to be relevant to and viable for prohibiting the development, production, and stockpiling of biological weapons in the face of newly emerging scientific advancements and biotechnologies. Apropos of issues raised at previous RevCons and elsewhere, there are growing concerns about current and future weaponization of neurobiological agents and tools (ie, “neuroweapons”1–6).

Thousands of Chinese Students’ Data Exposed on Internet

A Chinese facial-recognition database with information on thousands of children was stored without protection on the internet, a researcher discovered, raising questions about school surveillance and cybersecurity in China.

The cache was connected to a surveillance system labeled “Safe School Shield” and contained facial-identification and location data, according to Victor Gevers, a researcher at the Dutch nonprofit GDI Foundation, which scans the internet for vulnerabilities and flags them to owners for fixing.

Special sunglasses, license-plate dresses: How to be anonymous in the age of surveillance

Cory Doctorow’s sunglasses are seemingly ordinary. But they are far from it when seen on security footage, where his face is transformed into a glowing white orb.

At his local credit union, bemused tellers spot the curious sight on nearby monitors and sometimes ask, “What’s going on with your head?” said Doctorow, chuckling.

The frames of his sunglasses, from Chicago-based eyewear line Reflectacles, are made of a material that reflects the infrared light found in surveillance cameras and represents a fringe movement of privacy advocates experimenting with clothes, ornate makeup and accessories as a defense against some surveillance technologies.