Masters in Biochemistry and Molecular Biology | Georgetown University

The Master of Science in Biochemistry & Molecular Biology at Georgetown University is a basic science program that infuses core concepts of biochemistry and molecular biology as applied to biomedical sciences and biotechnology, providing students with a rigorous and challenging curriculum. Graduates from the program excel in various career paths with government agencies, academic institutions, research laboratories, and biotechnology companies. Alumni have also continued their education by pursuing doctoral, medical, and law degrees, using the skills and training at Georgetown University to propel their future academic and research careers.

Core concepts and skills are taught through required core courses, advanced electives, special topics courses, and a 4 credit internship. At least 30 graduate credits with a cumulative GPA of 3.0 or greater are required for the M.S. degree. Our courses expose students to advanced methods in biochemistry, molecular biology, and cell biology, laboratory research, and literature-based research and include a significant number of hands-on lab-based courses that develop research expertise.

Our program offers a well-organized, intensive capstone internship program that culminates in students presenting their research at tri-annual poster presentation sessions. The internships are done with research mentors in various GUMC laboratories on-campus, or off-campus in government agencies such as NIH and FDA or biotechnology companies.

Continue reading here:
Masters in Biochemistry and Molecular Biology | Georgetown University

Serum Biochemistry | VCA Animal Hospital

What is serum?

When blood clots, it separates into two parts a clear pale yellow liquid called serum and a small solid portion composed of blood cells.

Serum is collected by placing a tube of clotted blood in a machine called a centrifuge, which spins the blood very quickly in a small circle, forcing the cells to the bottom of the tube and allowing the serum to sit on top. The serum is then lifted off the top and placed in a fresh tube for testing.

Serum biochemistry refers to the chemical analysis of serum. There are many substances in serum, including proteins, enzymes, lipids, hormones, etc. Testing for these various substances provides information about the organs and tissues in the body as well as the metabolic state of the animal. If a test result is abnormal, it may indicate that disease is present. Further assessment of the test results may offer clues about which organ system is affected and also the nature and severity of the disorder.

There are too many substances in serum to consider testing all of them each time a pet gets sick, so tests for the various substances are arranged into smaller groups, called serum biochemistry panels or profiles. Each panel or profile is a selected group of biochemistry tests designed to investigate a specific interest or concern.

For example, a general health profile would include a wide range of tests with the aim of assessing a variety of organs, while a kidney profile would include a smaller number of tests related specifically to the kidney, and so on. A profile can be simple or complex and your veterinarian will determine which profile is best suited to the needs of your pet.

Proteins (total protein, albumin, globulin). The two main types of protein found in blood are called albumin and globulin. These proteins can be measured individually, or combined into a single test called total protein, which measures all protein in the sample. Albumin levels can indicate if a pet is dehydrated, and can provide information about the function of the liver, kidneys, and digestive system. Globulin levels reflect underlying inflammation and/or antibody production. Increased levels of globulins are often associated with infectious diseases, immune-mediated disease, and some types of cancer.

Liver Enzymes (ALT, ALP). There are many different liver enzymes, but the two that appear in most profiles are alanine aminotransferase (ALT), and alkaline phosphatase (ALP). The first enzyme is typically found when the cells of the liver are stressed or damaged. The second enzyme is generally increased when bile flow in the liver is reduced.

Bilirubin is a pigment produced primarily in the liver that is associated with the breakdown of hemoglobin from red blood cells. Bilirubin is stored in the gall bladder as a component of bile. Increases in bilirubin are associated with increased red cell destruction or decreased bile flow through the liver.

Kidney Tests (urea, creatinine). The two substances most commonly measured to assess kidney function are urea (also called blood urea nitrogen or BUN) and creatinine. Urea is a by-product of protein breakdown; it is produced in the liver and excreted from the body by the kidney. Increases in BUN may indicate dehydration, gastrointestinal bleeding, cardiac disease, or primary kidney disease. Decreases in BUN are associated with over hydration, liver failure, or reduced protein intake in the diet. Creatinine is a by-product of muscle metabolism and it is excreted entirely by the kidney. Increased levels of creatinine indicate decreased kidney function.

Pancreatic Enzymes (amylase, lipase, pancreatic lipase immunoreactivity). Two commonly measured pancreatic enzymes are amylase and lipase.Increases in these enzymes may occur when the pancreas is inflamed, although they can also be elevated with kidney or intestinal disease, and when certain drugs are used. They are not very reliable indicators of pancreatitis. A newer test for pancreatic inflammation called pancreatic lipase immunoreactivity (PLI) is more reliable because it rises only with pancreatic inflammation (see handouts "Pancreatitis in Cats - Pancreas-Specific Lipase" and "Pancreatitis in Dogs - Pancreas-Specific Lipase"). Certain laboratories run variations of this test called spec cPL, fPL or PSL.

Glucose (blood sugar). A persistently high blood sugar is associated with diabetes mellitus, also known as "sugardiabetes." A temporary rise in blood sugar is commonly found in cats associated with the excitement of visiting the veterinarian; this stress response can make it difficult to diagnose diabetes mellitus in some cats.Low blood sugar can be found in newborn animals, some very small breeds of dogs, and high performance dogs, such as hunting dogs, that exercise extensively. Low blood sugar is also associated with some types of cancer, bacterial infections, or insulin overdose in diabetic patients. False low glucose values often occur when a blood sample is not stored correctly after collection.

Calcium and Phosphorus. These minerals are present in tiny amounts in blood and changes, either up or down, may be associated with a variety of diseases or conditions. For example, persistently high calcium levels may indicate the presence of kidney disease, cancer, or disease of the parathyroid glands, while low calcium levels may be due to pancreatitis, antifreeze poisoning, or disease of the parathyroid gland. High phosphorus levels are associated with kidney failure and some nutritional problems. Low phosphorous level can occur with dietary problems, gastrointestinal disease, and kidney disease etc.

Muscle Enzymes (CK, AST, ALT). Creatinine kinase (CK) is the enzyme most frequently measured to assess injury. Of lesser importance are the enzymes aspartate aminotransferase (AST) and alanine aminotransferase (ALT), which are also used to assess liver function. Increased muscle enzyme levels are often found with muscular activity (exercise, exertion, convulsions etc.), as well as trauma and muscle inflammation.

Cholesterol is produced in the liver as part of fat metabolism. Increases in cholesterol are associated with hormonal and metabolic diseases, liver disease, and serious kidney disease.

Electrolytes. The most important electrolytes are potassium, chloride, sodium, and bicarbonate. These substances are present in blood in small quantities, and each electrolyte has a different role to play in the body. Collectively, electrolytes help to maintain blood and tissue fluids in balanced state. Disturbances in electrolytes are often caused by vomiting, diarrhea, and kidney disease, and accompany many serious metabolic disorders.

More:
Serum Biochemistry | VCA Animal Hospital

Association of myocardial infarction and angina pectoris with obesity and biochemical indices in the South Korean population | Scientific Reports -…

The demographic characteristics of the subjects

Table 1 indicates the demographic characteristics for all indices. A total of 22,509 subjects aged 50 years were included in the final analysis. The final dataset consisted of 21,426 subjects without MIAP (men = 8869, women = 12,557) and 1083 subjects with MIAP (men = 583, women = 500). The prevalence of MIAP in Korean adults aged 50 years was 4.81% (6.57% for men and 3.98% for women). All other indices analyzed in this study except for ischemic heart disease (IHD) family history (p = 0.588), systolic blood pressure (SBP, p = 0.146), and BMI (p = 0.721) showed statistically significant differences between men and women. We also analyzed the difference between the non-MIAP and MIAP groups. Among the demographic factors, age, education level, occupation, and household income, but not residential area, showed significant differences between the two groups in both men and women. The average age of the MIAP group (men: 65.88 0.46, women: 68.7 0.42) was older than that of the non-MIAP group (men: 60.84 0.12, women: 61.53 0.11). The MIAP group was significantly more likely to have a lower educational level and household income and a higher unemployment rate than the non-MIAP group. In particular, the difference between the non-MIAP and MIAP groups in these indices tended to be more prominent in women than in men. Among the health behavior factors, stress showed a significant difference only in women. The prevalence of 'slight' was the highest in both the non-MIAP group and the MIAP group, but the percentage of very' tended to be higher in the MIAP group than in the non-MIAP group. In addition, alcohol consumption showed significant differences in both men and women, and the MIAP group was more likely to have lower alcohol consumption than the non-MIAP group. Smoking status showed no significant difference between the two groups in both men and women. Among the preliminary health examination and disease-related indices, IHD family history, hypertension, diabetes, and hypercholesterolemia showed significant differences between the two groups in men and women, whereas hypertriglyceridemia showed no significant difference in men (p = 0.095) or women (p = 0.181). In particular, the IHD family history in the MIAP group tended to be 63.10% greater in men and 110.60% greater in women than in the non-MIAP group. Among the health examination-related indices, in men, diastolic blood pressure (DBP), height, BMI, WC, WHtR, glucose, total cholesterol, triglycerides, HDL-C, hemoglobin, hematocrit, blood urea nitrogen (BUN), creatinine, white blood cells (WBCs), red blood cells (RBCs), and platelets showed significant differences between the two groups. In women, SBP, DBP, height, BMI, WC, WHtR, glucose, total cholesterol, HDL-C, aspartate aminotransferase (AST), hemoglobin, hematocrit, BUN, creatinine, WBC, RBC, and platelet showed significant differences between the two groups. SBP was significantly different between the two groups only in women, and the MIAP group was higher than the non-MIAP group, whereas DBP was lower in the MIAP group than the non-MIAP group in men and women. The MIAP group tended to be shorter and have higher weight than the non-MIAP group, but there was no substantial difference. On the other hand, WC was more likely to be larger in the MIAP group than in the non-MIAP group. Although most biochemical indices did not differ significantly between the two groups, the MIAP group was more likely to have lower total cholesterol than the non-MIAP group in men and women.

Tables 2 and 3 show the associations between MIAP and blood pressure, anthropometric indices, and biochemical indices in Korean men and women aged 50 years. Of all indices, total cholesterol showed a more strongly negative association with MIAP than all other indices in men (OR = 0.401 [0.3540.453], p < 0.001) and women (OR = 0.472 [0.4130.539], p < 0.001) in the crude analysis. In addition, this association was strongly maintained in men (adjusted OR = 0.436 [0.3840.495], adjusted p < 0.001) and women (adjusted OR = 0.541 [0.4750.618], adjusted p < 0.001) after adjusting for age, residential areas, education, occupation, household incomes, stress, alcohol consumption, smoking status, IHD family history, and BMI. In addition to total cholesterol, creatine and platelets showed significant associations with MIAP in men and women in the crude and adjusted analyses. Nevertheless, except for these three variables, the association between MIAP and all other variables showed sex differences.

Among blood pressure-related variables, in men, only DBP showed a negative association with MIAP in the crude (OR = 0.614 [0.5510.685], p < 0.001) and adjusted analyses (adjusted OR = 0.719 [0.6380.809], adjusted p < 0.001), whereas only SBP showed a significant association with MIAP in the crude (OR = 0.838 [0.7510.933], p < 0.001) and adjusted (adjusted OR = 1.133 [1.0191.259], adjusted p = 0.022) analyses in women. Of the obesity indices, WC and WHtR showed a significant association with MIAP in the crude and adjusted analyses in men. In particular, WHtR (adjusted OR = 1.325 [1.0821.623], adjusted p = 0.007) showed a more significant association with MIAP than WC (adjusted OR = 1.290 [1.0721.553], adjusted p = 0.007). In contrast, in women, all indices showed a significant association in the crude analysis, but there was no association between MIAP and any obesity index in the adjusted analysis. Among biochemical indices, total cholesterol, creatine, and platelets were associated with MIAP in men and women, but other variables except for these variables showed sex differences. In men, hemoglobin (adjusted OR = 0.749 [0.6770.830], adjusted p < 0.001), hematocrit (adjusted OR = 0.777 [0.7040.858], adjusted p < 0.001), BUN (adjusted OR = 1.077 [1.0001.160], adjusted p = 0.049), and RBC (adjusted OR = 0.787 [0.7090.873], adjusted p < 0.001) were associated with MIAP in the crude and adjusted analyses, whereas in women, only AST (adjusted OR = 1.072 [1.0011.149], adjusted p = 0.047) showed an additional association with MIAP in the crude and adjusted analyses.

Read more here:
Association of myocardial infarction and angina pectoris with obesity and biochemical indices in the South Korean population | Scientific Reports -...

Inaugural program with Fresno State, Rowan and Valdosta State universities spurs unforgettable summer of research – Princeton University

How can we create a diverse network of colleagues? That deceptively simple question sparked an "unforgettable" initiative from the Department of Chemistry:the inaugural Visiting Faculty Research Partnership (VFRP), which wrapped recently with a symposium and poster session that celebrated visiting professors and their undergraduates from Fresno State, Rowan and Valdosta State universities.

The two-month summer program draws faculty from moderate to small research institutions that serve historically underrepresented groups. This inaugural year provided research and stipend funding to three visiting faculty who each brought two undergraduates with them.

Visiting faculty in Princeton Chemistrys two-month Visiting Faculty Research Partnership, at Frick Laboratory. From left: Qiao-Hong Chen, professor in the Department of Chemistry and Biochemistry at California State University, Fresno; Tolulope Salami, professor in the Department of Chemistry at Valdosta State University; Rashanique Quarels, assistant professor in the Department of Chemistry and Biochemistry at Rowan University; and Princeton Chemistry Department Chair Gregory Scholes, the William S. Tod Professor of Chemistry.

Photo by

C. Todd Reichart, Department of Chemistry

The visitors paired up with Princeton faculty and embedded in labs, group meetings and workshops to complete research collaborations.

I am thrilled to see the positive impact Princeton Chemistrys VFRP had for all participating faculty and students, said Shawn Maxam, associate provost for diversity and inclusion. The relationships and collaborations developed seem to be exceptional. We know that talent exists everywhere, and our pursuit of academic excellence requires a robust engagement with diverse groups of scientists and scholars.

My gratitude to the department for launching this program. I am excited by the future opportunities for science and collaboration catalyzed by VFRP, he said.

The three visiting professors were Qiao-Hong Chen, professor in the Department of Chemistry and Biochemistry at California State University, Fresno; Rashanique Quarels, assistant professor in the Department of Chemistry and Biochemistry at Rowan University; and Tolulope Salami, professor in the Department of Chemistry at Valdosta State University.

VFRP is part of department chair Greg Scholes goal to open Princeton Chemistry to non-traditional routes of collaboration.

What a great response we got for this program. It says a lot that we could make three top-quality appointments that spanned three different labs in our department, said Scholes, the William S. Tod Professor of Chemistry. We imagine that the experience will enhance the visiting students applications for graduate school or employment, and that we have seeded productive, long-term connections with them.

Chen and her two students partnered with Erik Sorensen, the Arthur Allan Patchett Professor in Organic Chemistry, and his research group. After two months, Chen declared the program an exciting, unforgettable summer of research. Its been a great chance for me, for my two students who came with me, and my entire group at Fresno State. We were all so happy to do this.

A first-generation college student herself, Chen chose two undergraduates to accompany her whom she felt would most benefit from the opportunity: Jasmine Hang and first-generation college student Khamyl Cooksey, both of whom traveled to the East Coast for the first time.

Coming here pushed me a little bit more towards doing a Ph.D., said Hang. Im actually a biology major, so chemistry wasnt ever anything I was going to touch other than the classes I need to take. But I really enjoyed the hands-on part of the lab. So now, Im thinking maybe I can do research on campus.

Tolulope Salami (center) and his undergraduates Jayden Thomas (left) and Jodeci Mitchell (right) from Valdosta State University atttend the Summer Symposium Poster Session at Frick Laboratory.

Photo by

C. Todd Reichart, Department of Chemistry

I have loved every moment of it, she added. Being able to work here and be a part of the whole environment where everyone is so research-driven, it just makes it so much more impactful.

Said Cooksey: The Sorensen Lab was very welcoming. We got to talk to the postdocs and graduate students and hear a lot about the paths theyve taken. Its definitely given me the opportunity to explore my options.

Jodeci Mitchell, who visited with Salami from Valdosta, embedded with the Bocarsly Lab, the research group of Professor Andrew Bocarsly. This program has given me access to more diverse experimentation and different equipment. Using that knowledge is definitely going to be useful to my career, no matter what I decide to do, she said. The hands-on activity in the lab is definitely beneficial in that aspect. Just getting used to the lab environment in general has been wonderful.

Salami said he feels its important to continue learning throughout ones professional career, and he found the opportunity to do that with the Bocarsly Lab.

The students too, theyve been encouraged that they can do this, he said. They had some trepidation about coming to Princeton, but when they got here, it was like, Hmmm, I actually can do this. Were all just chemists. I think it has done a lot to build their confidence.

Quarels and her two students from Rowan University partnered with Rob Knowles, a professor of chemistry, and his research group. Quarles noted that the Knowles Lab has a piece of equipment integral to her research a cryocooler, a refrigerator designed to reach cryogenic temperatures that is not available at Rowan. Just being able to utilize some of the resources here at Princeton was a big check for me.

She added that one of the students who accompanied her, Jonathan Santoro, was up until this point a chemical engineering major at Rowan. Following this summers fellowship, he plans to change his major to chemistry full time and continue on the path to graduate school.

Read this article:
Inaugural program with Fresno State, Rowan and Valdosta State universities spurs unforgettable summer of research - Princeton University

U of U Health-Led Research Awarded $28 Million to Explore HIV’s Inner Workings and Vulnerabilities – University of Utah Health Care

Media Contacts Julie Kiefer

Associate Director, Science Communications, University of Utah HealthEmail: julie.kiefer@hsc.utah.eduPhone: 801-587-1293

Aug 08, 2022 10:00 AM

A University of Utah Health-led multi-institutional research center that studies the inner workings and vulnerabilities of HIV, the human immunodeficieny virus that causes AIDS, recently received a five-year, $28 million grant renewal from the National Institutes of Health.

Since its founding in 2007, the CHEETAH Center for Structural Biology of HIV Infection Restriction and Viral Dynamics has published more than 300 research papers that have led to a better understanding of HIV and its potential treatments.

Wesley Sundquist, Ph.D., the centers director and professor and chair of the Department of Biochemistry at U of U Health, is leading 20 research teams from 12 institutions. With the grant renewal, the researchers will focus on:

The outstanding science stemming from this program is changing an understanding of HIV/AIDS, other viral diseases, and cellular biology, enabling the development of novel therapeutics such as lenacapavir and D-peptide inhibitors, says Rachel Hess, M.D., associate vice president for research at U of U Health, referring to two investigational drugs with roots in CHEETAH.

From deep understanding to investigational drugs

Just a half-century ago, HIV infection almost inevitably led to serious illness and death. Todays antiretroviral therapies can suppress the virus and prevent symptoms, but improvement is still needed. If these drugs arent taken daily, the virus can rebound and acquire drug resistance. The medicines can also cause difficult side effects. The underpinnings for two new investigational drugs that could help circumvent these issues are based on years of research by CHEETAH scientists.

Research from Sundquist; Christopher Hill, D.Phil, distinguished biochemistry professor at U of U Health; and other CHEETAH Center labs on the HIV capsida structure they found is vital for different steps of the HIV life cyclelaid the groundwork that led the pharmaceutical company Gilead Sciences to identify the capsid inhibitor, lenacapavir. This investigational drug is now in phase 3 clinical trials and is already showing great promise as a potent, long-acting treatment.

Taking a different approach, Michael Kay, M.D., Ph.D., CHEETAH investigator and biochemistry professor, and Debra Eckert, Ph.D., biochemistry research assistant professor, used synthetic chemistry to design a D-peptide inhibitor called CPT31 that jams HIVs infection machinery. The molecule is now in phase 1 clinical trials sponsored by Navigen, Inc.

Often people forget that drug development builds from basic research, Sundquist says. These are two more cases where that has happened, and it is very satisfying.

Learning lessons from HIV

CHEETAH continues to bring an understanding of HIV, related viruses, and host biology in new directions through collaborations between its scientists, who come from a variety of disciplines. "The CHEETAH Center is doing exciting, interdisciplinary science in a collaborative environment that allows us to accomplish projects that wouldn't otherwise be possible in any single lab," says Pamela Bjorkman, Ph.D., a professor of biology and biological engineering at Caltech.

NelsElde, Ph.D., professor of human genetics at U of U Health, turns to evolution for inspiration, noting that many animals are not as susceptible as humans to disease caused by HIV. He is collaborating with fellow CHEETAH scientists to explore whether a gene found in mice and squirrel monkeys that prevents HIV from exiting cells after replicating could become the basis for anew type of antiviral.

Nature has done seemingly countless billions of experiments that got us to where we are today, Elde says. Can we learn from whats happened and borrow and deploy them in ways that are useful?

By contrast, Owen Pornillos, Ph.D., a CHEETAH investigator from the University of Virginia who received his doctorate from the U, takes advantage of his biochemistry expertise to take a different approach. In a collaborative project with several CHEETAH Center members, he is removing the virus from the complex environment of the host cell and bringing it to the test tube. By adding back specific ingredients a few at a time, the team is identifying key virus and host cell components that are essential for early stages of viral infection and replication. Combining this approach with new microscope technologies is allowing them to visualize these steps with unprecedented clarity.

CHEETAH is committed to doing excellent science and is always planning for where we envision the field will be five years from now, Pornillos says. Its exciting to be a part of it.

These diverse tactics are providing valuable insights into virology and biology, and uncovering targets for new types of therapeutic intervention.

# # #

Research News iii

See original here:
U of U Health-Led Research Awarded $28 Million to Explore HIV's Inner Workings and Vulnerabilities - University of Utah Health Care

Precision Lab Testing Made Easy by Innovative Wave Spectrophotometer and Pre-Programmed Biochemical Assay Kit – wineindustryadvisor.com

As the 2022 harvest ramps up in earnest,BSG Wine, a leading winemaking ingredients and product supply group headquartered in the Napa Valley since 2007, is uniquely positioned to equip the winemaking community with what it needs to for a spectacularly successful season.

BSG is the leading U.S. distributor of the MegaQuant Wave Spectrophotometer, a powerful, user-friendly instrument ideal for laboratories performing up to 200 analyses per day.

BSG wants winemakers and lab technicians to know that its MegaQuant Wave Starter Pack offers products that are more cost-effective than any external laboratory through pre-programmed protocols for wine tests that require no manual manipulation and are analysis-ready right out of the box.

The MegaQuant Wave Starter Pack features the MegaQuant Wave Spectrophotometer with a streamlined design offering a touch screen interface, superb optics, on-board curve fitting software and built in printer to meet the requirements of most winery labs.

In addition, the MegaQuant Wave Starter Pack includes pre-programmed protocols for measuring volatile acidity, fructose, glucose and sucrose, primary amino nitrogen, ammonia, L-arginine and urea ammonia, as well as a host of other analytes.

The MegaQuant Wave is available as a single item spectrophotometer (D-MQWAVE-1) or as part of theMegaQuant Wave Starter Pack.

The MegaQuant Wave Spectrophotometer, a stand-alone, bench top unit with specific, built-in instruction, automatically calculates results usingMegazyme biochemical assay kits.

In addition to the spectrophotometer, the MegaQuant Wave Starter Pack comes equipped with:

Any winery could go from no lab or a rudimentary lab to full lab capability with the addition of the MegaQuant Wave Spectrophotometer and our MegaQuant Wave Starter Pack, notes James Kress, BSGs Technical Sales Manager for Wine in the Northeastern U.S.

An extensive, web-based knowledge program that provides specific information about each analytic methodology, complete with user-friendly training manuals and instructional videos, supports The MegaQuant system.

For more specifications and orders, go to:bsgwine.com/megazyme-assay-kits.

See original here:
Precision Lab Testing Made Easy by Innovative Wave Spectrophotometer and Pre-Programmed Biochemical Assay Kit - wineindustryadvisor.com

The CHIPS and Science Act becomes law – ASBMB Today

President Joe Biden today signed into law the CHIPS and Science Act, which authorizes funding and policies to bolster American research and development and increase national science and technology competitiveness.

The act contains several provisions endorsed previously by the American Society for Biochemistry and Molecular Biology:

The Bioeconomy Research and Development Act of 2021 will help to unify and strengthen bioengineering efforts across U.S. agencies.

The Restore and Modernize Our National Labs Act originally proposed $6.1 billion to repair and modernize U.S. national laboratories. The final legislation authorizes $4 billion across fiscal years 2023 to 2027.

The STEM Opportunities Actwill facilitate participation of historically marginalized groups in science, technology, engineering and math. Notably, the legislation contains language, for which the ASBMB advocated, to extend caregiving flexibilities to trainees, not only investigators awarded federal grants.

The Rural STEM Education Research Act supports rural communities access to STEM education and research through several mechanisms. The legislation includes the ASBMBs preferred language expanding investments in the Established Program to Stimulate Competitive Research. This means that the National Science Foundation will increase the percentage of funds (to 20% from 13%) that go to emerging research institutions, many of which are in rural communities.

The majority of the MSI STEM Achievement Actwas included in the legislation. It will increase capacity and infrastructure at minority-serving institutions of higher education, including historically Black colleges and universities and tribal colleges and universities.

The Combatting Sexual Harassment in STEM Act has funding for executing preventative measures and response frameworks for addressing sexual and gender harassment in STEM.

The ASBMB-endorsed language in the NSF for the Future Actwill increase the number of graduate research fellowships and improve the NSFs training policies by instating mentorship plans, career exploration and increased inclusivity.

It has taken a lot of effort to get the CHIPS and Science Act over the finish line.

In June 2021, as the U.S. experienced increasing inflation and supply-chain deficiencies and fell behind in R&D globally, the U.S. Senate responded by passing the United States Innovation and Competition Act of 2021, also known as USICA.

This bipartisan bill combined multiple legislative efforts to strengthenthe nations leadership in R&D by protecting American intellectual property with enhanced research security policies, robust scientific funding authorizations and investments in the STEM workforce.

In February, the U.S. House passed its version of the bill, the America Creating Opportunities for Manufacturing, Pre-Eminence in Technology, and Economic Strength Act of 2022, calledCOMPETES for short.

COMPETES expanded on the science provisions in USICA with strong bipartisan input and engagement with stakeholders from the science, education and industrial sectors. It also significantly differed from USICA by including provisions related to clean energy and trade provisions.

At the time, U.S. Rep. Frank Lucas, R-Okla., the ranking member of the House Science Committee, said in a statement how much he opposed the COMPETES Act but called for consensus between Democrats and Republicans: While there are many flaws in USICA, I believe that we had a good opportunity to find a consensus agreement through a formal House and Senate Conference.

In March, the ASBMB published a statement detailing its position on the two versions and endorsed several provisions that remain largely intact in the CHIPS and Science Act.

In April, the bill entered a bicameral conferencing process, during which a conferencing committee of 107 lawmakers would negotiate the more than 1,000 differences between USICA and COMPETES. The ASBMB shared its statement with the offices of those members.

During the ASBMBs annual Capitol Hill Day in May, the societys Public Affairs Advisory Committee strongly advocated for provisions in USICA and COMPETES that would modernizethe infrastructure of national labs, strengthen the bioeconomy, and support the next generation of scientists.

Over the summer, the legislation faced many negotiation hurdles and political attacks. Yet more pressure stemmed from looming deadlines to pass incentives for semiconductor manufacturing before companies set up shop internationally. Communication began to break down among congressional and conferencing leaders.

Once concerns emerged that Congress would strip the pro-science provisions in the U.S. competitiveness legislation to meet the semiconductor deadlines, Senate Majority Leader Chuck Schumer, D-N.Y., agreed to a test vote on July 19 to assess support for a bill that had semiconductor manufacturing incentives and the pro-science provisions that had been successfully negotiated. That version of the legislation was called CHIPS+.

After a successful test vote, the ASBMB called for passage in the Senate on July 25. Notably, the ASBMB was one of many other scientific stakeholders that demonstrated their support for CHIPS+ upon the rapid arrival of the bill in both chambers.

The Senate passed the final iteration the CHIPS and Science Act on July 27.

This is one of the most significant long-term thinking bills weve passed in a very long time, Schumer said after the Senate vote. Our grandchildren will hold good paying jobs in industries we cant even imagine because of what we are doing right now and we did it together, both sides cooperating in good faith, on some truly difficult issues.

The House passed the legislation the next day, and President Joe Biden signed it into law today.

Sudip Parikh, chief executive officer of the American Association for the Advancement of Science, called the CHIPS and Science Act one of the most important pieces of science and technology legislation in a generation and a down payment on our future to ensure America remains a world leader in scientific discovery and innovation.

The scientific community played an important role in making the legislation a reality.

Sarina Neote, ASBMBs director of public affairs, said: The ASBMB applauds the work of congressional leadership and conferencing members who laid the groundwork for the (legislation). We also really appreciate all the time and effort our PAAC members have dedicated to advocating for the science workforce provisions in the final version of the bill. Its important for scientists to make sure their voices are heard, and our committee members did exactly that.

James Brown, executive director of the STEM Education Coalition, said in a statement: Our future prosperity depends on our ability to lead the world in technology development, job creation in high demand technical fields, and our ability to train more Americans for the best, highest paying jobs in the global economy. We are delighted that so many members of both parties in the U.S. Senate have come together behind this goal.

The next hurdle will be actual follow-through on the funding authorizations agreed to in the act. The scientific community will be watching the negotiations for FY23 appropriations closely.

Read the original:
The CHIPS and Science Act becomes law - ASBMB Today

Research Assistant, Metabolic Lab job with NATIONAL UNIVERSITY OF SINGAPORE | 304611 – Times Higher Education

Job Description

The National University of Singapore invites applications forResearch Assistant (Metabolic Lab)in the Department ofMedicine,Yong Loo Lin School of Medicine. Appointments will be made on a1-yearcontract basis renewable

Purpose of the post

The staff is to provide support to the Principal Investigator and his team in terms of research, laboratory and administrative needs. The staff shall work on projects in the area of metabolism and diabetes mellitus. He/She shall be the primary lead for lab management.

Main Duties and Responsibilities

a) Research:

Main Duties and Responsibilities

b) Laboratory:

Main Duties and Responsibilities

Main Duties and Responsibilities

c) Administrative duties:

d) Any other duties as required

Qualifications

Remuneration will be commensurate with the candidates qualifications and experience.

Formal application:Please submit your application, indicating current/expected salary, supported by a detailed CV (including personal particulars, academic and employment history, complete list of publications/oral presentations and full contacts of3referees to this job portal.

We regret that only shortlisted candidates will be notified.

Knowledge

Knowledge

Covid-19 Message

At NUS, the health and safety of our staff and students are one of our utmost priorities, and COVID-vaccination supports our commitment to ensure the safety of our community and to make NUS as safe and welcoming as possible. Many of our roles require a significant amount of physical interactions with students/staff/public members. Even for job roles that may be performed remotely, there will be instances where on-campus presence is required.

Taking into consideration the health and well-being of our staff and students and to better protect everyone in the campus, applicants are strongly encouraged to have themselves fully COVID-19 vaccinated to secure successful employment with NUS.

More Information

Location: Kent Ridge CampusOrganization: Yong Loo Lin School of MedicineDepartment : MedicineEmployee Referral Eligible: NoJob requisition ID : 16845

View post:
Research Assistant, Metabolic Lab job with NATIONAL UNIVERSITY OF SINGAPORE | 304611 - Times Higher Education

Research shows oilseeds’ potential for bioproduct creation – The Fence Post

LINCOLN, Nebraska, Plant science is opening up promising opportunities to create environmentally friendly bioproducts fuels, lubricants and other products that substitute for petroleum-based ones. Researchers with the University of Nebraska-Lincolns Institute of Agriculture and Natural Resources are exploring a range of innovative approaches.

A key focus involves new types of vegetable oils with fatty acid structures that enable production of biomaterials in significant quantity. To create those oils on the needed scale, scientists first must conduct complex research to understand the oils enzymes and genes.

Research by Husker biochemist Ed Cahoon and colleagues is advancing this scientific knowledge. The journal Proceedings of the National Academy of Sciences recently published the findings by Cahoon and his collaborators in Nebraskas Center for Plant Science Innovation and Department of Biochemistry, the Brookhaven National Laboratory in New York, Prince of Songkla University in Thailand and Huazhong Agricultural University in China.

The IANR project studied a specific, unusual fatty acid in Thunbergia, a tropical vine. The acid is unusual in that the plant chemicals have unconventional molecular chains that give new functional properties to vegetable oils. Understanding the enzymes that create the fatty acid was essential for the researchers. Because of their distinct properties, these enzymes are particularly suited to produce genetically engineered plants rich in the fatty acid.

GMO SORGHUM

Genetically modified sorghum, for example, lends itself well to such genomic modification and is a focus of Cahoon and his IANR colleagues. Once modified in that way, sorghums fatty acid has strong potential for facilitating production of biofuels and biomaterials.

Nature makes enzymes do certain things, said Cahoon, George W. Holmes Professor of biochemistry. If we can learn from the plants that do something different, we can design the enzymes to have new functions, such as creation of specialty chemicals. Such efforts are known as protein engineering, stemming from the understanding of the oilseed enzymes and their three-dimensional structures.

As Cahoon and his colleagues write in their new paper, studies of unusual monounsaturated fatty acids have provided a wealth of biochemical information and biotechnological utility. (Monounsaturated fats have a double bond in their molecular structure, resulting in the oil being liquid at room temperature but solid when chilled.)

Petroselinic acid was the main unusual fatty acid studied by Cahoon and his colleagues in their analysis of Thunbergia. The scientists found the plants seeds to be extraordinarily rich in the acid, which has strong biomaterials potential. Petroselinic acid accounted for more than 90% of the seed oils weight.

Thunbergia is a nice ornamental vine and looks beautiful, but we could never grow it as a crop in Nebraska, said Cahoon, director of the Center for Plant Science Innovation. But we can find the genes that make the unusual fatty acid, and we can then engineer them into sorghum and oilseed crops to create higher-value oils.

FIVE-YEAR GRANT

The IANR research was funded through a $3.8 million, five-year grant from the U.S. Department of Energys Center for Advanced Bioenergy and Bioproducts Innovation. Cahoon and Thomas Clemente, Eugene W. Price Distinguished Professor of Biotechnology at Nebraska, are among the array of scientists nationwide contributing to research for the center.

Among the focuses of the Center for Advanced Bioenergy and Bioproducts Innovation is a plants-as-factories concept by which genetic engineering produces plant cells with bioproducts-related properties. Sorghum, along with sugarcane, is one of the worlds highest biomass producers, the center notes, with demonstrated potential for accumulation of oil in vegetative biomass after successful metabolic engineering.

The IANR research has both a fundamental aspect to it of learning new things about fatty acids and enzymes, Cahoon said. The second part is trying to use that information to design new types of oils that might have increased-value industrial applications and biofuels.

This research project featured a basic three-part division of labor. Cahoon, the principal investigator, made the initial discovery of Thunbergia oilseeds extraordinarily high level of petroselinic acid. Lu Gan and Kiyoul Park, postdoctoral scientists in Cahoons lab in the Center for Plant Science Innovation, isolated the genes for enzymes the plant uses to make the fatty acid. Among the enzymes identified was an enzyme known as a fatty acid desaturase that introduces double bonds unsaturation in novel places in fatty acids. As a result, those fatty acids have new functional properties of vegetable oils.

Structural biologist Qun Liu and biochemist John Shanklin at Brookhaven National Laboratory carried out complex analyses of the enzymes three-dimensional structure. This information guided the design of new fatty acid desaturases that can create monounsaturated fatty acids not found in nature.

Nebraskas Gan and Park then genetically engineered camelina oilseed to produce petroselinic acid-rich vegetable oils.

View original post here:
Research shows oilseeds' potential for bioproduct creation - The Fence Post

Research Assistant job with UNIVERSITY OF MELBOURNE | 304172 – Times Higher Education

Location:ParkvilleRole type:Full time/Fixed-termfor 12 monthsFaculty: Faculty of Medicine, Dentistry and Health SciencesDepartment/School:Department of Biochemistry and PharmacologySalary:Level A $77,171 - $104,717 (pro rata)p.a. plus 17% super

The University of Melbourne would like to acknowledge and pay respect to the Traditional Owners of the lands upon which our campuses are situated, the Wurundjeri and Boon Wurrung Peoples, the Yorta Yorta Nation, the Dja Dja Wurrung People. We acknowledge that the land on which we meet and learn was the place of age-old ceremonies, of celebration, initiation and renewal, and that the local Aboriginal Peoples have had and continue to have a unique role in the life of these lands.

AbouttheDepartment of Biochemistry and Pharmacology

The Department of Biochemistry and Pharmacology has critical mass, interdisciplinary teaching and a remarkable breadth and depth in research expertise that underpin our key themes of molecular understanding of biology and disease, translational research, drug discovery and development

About the Role

An experienced research assistant and lab manager is sought to join the Department of Biochemistry & Pharmacology, Faculty of Medicine, Dentistry & Health Sciences in The University of Melbourne. The successful applicant will report to the laboratory head, Dr. David Stroud. The Functional Proteomics & Diagnostics laboratory studies monogenic rare disease biology, with a focus on mitochondrial disease pathology and the development of functional genomics and diagnostic approaches utilising mass-spectrometry based proteomics.

Responsibilities include:

About You

You are a confident communicator with an ability to work effectively with other laboratory personnel. You are highly organised with excellent time management skills, and can simultaneously work on multiple tasks independently and be flexible and responsive to changing priorities.

You will also have:

To ensure the University continues to provide a safe environment for everyone, this position requires the incumbent to hold a current and valid Working with Children Check.

About the University

The University of Melbourne is consistently ranked amongst the leading universities in the world. We are proud of our people, our commitment to research and teaching excellence, and our global engagement.

Benefits of Working with Us

In addition to having the opportunity to grow and be challenged, and to be part of a vibrant campus life, our people enjoy a range of rewarding benefits:

To find out more, visithttps://about.unimelb.edu.au/careers/staff-benefits.

Be Yourself

We value the unique backgrounds, experiences and contributions that each person brings to our community and encourage and celebrate diversity. First Nations people, those identifying as LGBTQIA+, females, people of all ages, with disabilities and culturally and linguistically diverse people are encouraged to apply. Our aim is to create a workforce that reflects the community in which we live.

Join Us!

If you feel this role is right for you, please submit your application including a brief cover letter, your resume and your responses against the selection criteria^ (found in the Position Description) for the role.

^For information to help you with compiling short statements to answer the selection criteria and competencies, please go tohttp://about.unimelb.edu.au/careers/selection-criteria

We are dedicated to ensuring barrier free and inclusive practices to recruit the most talented candidates. If you require any reasonable adjustments with the recruitment process, please contact us athr-talent@unimelb.edu.au.

The University of Melbourne is required to comply with applicable health guidance and directions issued from the Victorian Health Minister. All University of Melbourne employees are to be fully vaccinated against COVID-19, unless an exemption order applies. Applicants must meet this requirement when submitting an application.

Applications close:22 Aug 2022 11:55 PM AUS Eastern Standard Time

Excerpt from:
Research Assistant job with UNIVERSITY OF MELBOURNE | 304172 - Times Higher Education

Presentations by young Chinese aquaculture scientists: From the 2021 China Society of FisheriesAnnual Conference of Youth Scholars – World Aquaculture…

Photo by iStock 1 INTRODUCTION

Young scientists are the most active force driving scientific advancement and technological innovation. Nonetheless, young scholars also face challenges such as heavy workloads, shortage of research-focused hours, high competition in grant application, and securing an academic job, among others. Mentorship from supervisors and senior peers is important to encourage and reassure the scientific endeavors of young scholars. Favorable policies and activities arranged by public agencies or academic societies are also essential for nurturing and promoting the successful establishment of young scholars. Chinese young scientists have been making great contributions to aquaculture research and applications. The China Society of Fisheries organized the Annual Conference of Youth Scholars in Shanghai on October 18, 2021. There were over 300 attendees to this meeting, which covered the topics of aquaculture techniques and equipment, biotechnologies and breeding, nutrition and feeds, diseases and quality security, aquaculture resources and conservation, and aquaculture economy and management. Here, we summarize some representative work by the attendees who were selected for this special issue, which partially reflects the recent research focus on young aquaculture scientists in China.

The healthy and sustainable development of aquaculture depends heavily on research on nutritional feeds in terms of precise nutritional requirements of aquatic animals. The largemouth bass,Micropterus salmoides, characterized by its fast growth and delicious taste, is currently a major species of freshwater aquaculture in China. According to the China Fishery Statistical Yearbook report, the total production of farmed largemouth bass in 2020 was more than 619,500 tons, and the national demand for this fish is also increasing yearly (China Fishery Yearbook,2021). To date, the requirement of each vitamin of the largemouth bass has its own specific and irreplaceable function, so it is necessary to investigate the optimal level of usage one by one. The requirement for fat-soluble vitamins, including vitamins A, D, E, and K, has been reported in this species (Li et al.,2018,2020; Lian et al.,2017; Wei et al.,2021). In contrast, minimal information has been published on the nutritional requirements of water-soluble vitamins, particularly the B vitamins. Folic acid, one of the water-soluble B vitamins, which plays a role in maintaining normal hematopoiesis, facilitating growth performance and immune response of aquatic animals, is essential for growth maintenance in aquatic animals (Shiau & Huang,2001). Hang et al. (2022) evaluated the graded dietary levels of folic acid on growth performance, body composition, blood biochemistry, nutritional metabolism, and antioxidant immunity of largemouth bass. They found that the growth performance, total hepatic antioxidant capacity, protein content, hemoglobin, hematocrit of whole blood cells, and plasma total protein in each folic acid supplementation group were higher than those in the control group to various degrees. Dietary supplementation with 0.51.5mg/kg of folic acid significantly decreased albumin, plasma glutamic-pyruvic transaminase activity, serum malonaldehyde activity, and liver glycogen content. According to the regression analysis of growth performance and additive gradients, the optimal amount of folic acid in the feed of juvenile largemouth bass was 1.421.46mg/kg diet.

Gibel carp,Carassius auratus gibelio, is one of the main farmed carp species in China, with a total annual production of more than 2.59 million tons (Liu et al.,2018). Given the deterioration of the aquatic aquaculture environment and degradation of germplasm resources, diseases caused by bacteria and viruses have caused large-scale mortalities of farmed gibel carp and led to enormous losses (Xu et al.,2013). Among the pathogens, Cyprinid herpesvirus 2 (CyHV-2) andAeromonasspp. are the most common pathogens of carps (Sahoo et al.,2016). Thus, the use of functional feed additives that can boost the innate immune system and natural mucosal barrier of fish has attracted more attention during antibiotic-free farming. Recently, poly--hydroxybutyrate (PHB), as a polymer storing intracellular energy and carbon sources, has been gradually shown to have positive effects on growth, immunity, and disease resistance in aquatic animals (Duan et al.,2017). However, the efficacy and application method of PHB on gibel carp culture is still unclear. Liu et al. (2022) detected that dietary PHB supplementation could promote growth performance, upregulate the expression of immune-related genes and activities of immune-related enzymes, significantly enhance the disease resistance of fish, and strengthen the tight junction of the intestine and affect the intestinal mucosal barrier of gibel carps. These findings provide a good model to illustrate its immune-stimulatory mechanism in fish. It has played a guiding role in the sustainable culture of gibel carp, and may contribute to the green, environmental, and healthy development of the aquaculture industry.

Phytoplankton are the primary producers in the aquatic food web and play essential roles in the biotic water environment (Zhao et al.,2022). Most phytoplankton are single-celled photosynthetic organisms that can achieve a rapid increase in number after continuous cell cycles by cell proliferation and division in suitable environments (Dewitte & Murray,2003). Therefore, understanding the cell cycle and regulation mechanism to achieve the appropriate biomass is essential for maintaining aquatic ecosystem health. Zhao et al. (2022) summarized the current information about the eukaryotic phytoplankton cell cycle and the environmental factors that affect it. They also introduced the research methods for the phytoplankton cell cycle, highlighted the progress in understanding the molecular mechanisms of phytoplankton cell cycle regulation, and discussed future directions for phytoplankton cell cycle research. This information will strengthen our understanding of the phytoplankton cell cycle and its regulation mechanisms, inspiring further studies on maintaining aquatic and health of natural ecosystems.

There are abundant germplasm resources of freshwater pearl mussels in China.Hyriopsis cumingiiis one of the main bivalve species used for freshwater pearl culture. It is well-known that the color of pearl production is an essential criterion for evaluating the quality of pearls and further determining their market value (Li et al.,2014). Furthermore, exogenous dietary carotenoids are considered the main factor affecting the color of the inner shell and pearl (Sun et al.,2020). Therefore, studying key enzyme genes involved in carotenoid metabolism is the vital premise of pearl quality control research. Zhang et al. (2022) successfully cloned the completeHcStAR-likegene and proposed thatHcStAR-likeplays a crucial role in the accumulation of carotenoids of shell or pearl pigmentation inH. cumingiiby dsRNA interference assay. Their findings contribute to our further understanding of the shell formation mechanism of pearl color.

Dissolved oxygen is the most important limiting factor in rearing of fish and directly affects fish health and survival. How fish adapt to hypoxia in aquaculture has been a hot topic. Fish in high-latitude regions suffer from sustained hypoxia in winter and diel-cycling hypoxia in summer.Phoxinus lagowskii, a high-latitude fish distributed and mainly cultured in northeast China, was chosen to determine the biochemical, physiological, and histological responses to these two conditions (Yao et al.,2022). Histological analysis revealed changes in the relative thickness of the layers in the midbrain under hypoxia.P. lagowskiiadapts to sustained hypoxia through myocardial hypertrophy and mitochondria deformation. During diel-cycling hypoxia, the oxidative stress biomarkers, enzyme activities, and triglycerides in the heart were significantly elevated. HIF expression patterns indicated its function in diel-cycling hypoxia in the heart and sustained hypoxia in the brain. Collectively, these findings reveal thatP. lagowskiiexhibits varied adaptation strategies to the exposure of sustained and diel-cycling hypoxia.

Diseases have become one of the main constraints to sustainable aquaculture production and trade. Disease resistance is another most important trait for healthy aquaculture development in addition to stress resistance. Therefore, it is essential to uncover appropriate drugs for these diseases.

Singapore grouper iridovirus (SGIV-Gx) causes high mortality rates in mariculture, and effective treatments against SGIV-Gx infection are urgently required. Metformin is a famous drug for many diseases. ZUniet al. (2022) evaluated the therapeutic effect of metformin on SGIV-Gx. Results showed that metformin exerts a dose-dependent antiviral effect by disrupting SGIV-Gx particles, suggesting its great potential in dealing with SGIV-Gx infection. Li et al. (2022) assessed the in vivo antiviral effect ofGlycyrrhiza uralensiscomponents against SGIV infection. Results showed that the ingredients did not have significant effects against SGIV infection, whereas aqueous extract (GUF) showed significant anti-SGIV infection activity in a concentration-dependent manner, and it also destroyed the structure of virus particles, which is similar to the function of metformin.

In addition to medication, sets of gene responses to bacterial infection produce various effective proteins important for disease prevention mechanisms. Caspase genes are candidate genes because of their role in regulating apoptosis during development and inflammation. In Japanese pufferfish, 10 caspase genes were identified through bioinformatics analyses and detected in all examined tissues. The expression of 10 caspases significantly varied in a time-dependent manner afterVibrio harveyiinfection, suggesting their roles in the antibacterial process of Japanese pufferfish (Yang et al.,2022).

It was reported that many young scientists chose a science career because of their love of the work (Pain,2014). The China Society of Fisheries sponsors the Young Scientist Award and organizes the Annual Conference of Youth Scholars to promote the talents of young aquaculture researchers. Young scientists engaged in aquaculture studies, both applicable and theoretical, may enjoy both the love and productive reward from such work, because of the increasing need for technologies from the ever-expanding aquaculture industry. The Journal of the World Aquaculture Society welcomes high-quality submissions from young scholars from China or elsewhere in the world.

Read the original here:
Presentations by young Chinese aquaculture scientists: From the 2021 China Society of FisheriesAnnual Conference of Youth Scholars - World Aquaculture...

For the Record, Aug. 12, 2022 | UDaily – UDaily

For the Record provides information about recent professional activities and honors of University of Delaware faculty, staff, students and alumni.

Recent presentations, publications and honors include the following:

Sharon Pitt, vice president of Information Technologies and CIO, spoke on Flexible Work in Higher Ed What Does Your Workforce Look Like? at the Higher Education CIO Congress in Washington, D.C., on Aug. 7, 2022.

Trevor A. Dawes, vice provost for libraries and museums and May Morris University Librarian, was an invited panelist for a webinar sponsored by the National Information Standards Organization (NISO) entitled, Eliminating Outdated Workflows: Developing the New, on Aug. 10, 2022. Panelists discussed how traditional workflows were suddenly subject to examination due to the COVID-19 pandemic and which workflows, whether due to the pandemic or not, have now become the standard in their respective organizations.

Ethan Joella, adjunct faculty member in the Associate in Arts Program and best-selling author of the novel A Little Hope, was the keynote speaker at theWilmington Writers' Workshop, held virtually Aug. 6, 2022. He also led a writing workshop.

Wendy Smith,Emma Smith Morris Professor of Management,andKyle Emich,associate professor of management,both in the Alfred Lerner College of Business and Economics, collaborated with colleagues onConceiving opposites together: Cultivating paradoxical frames and epistemic motivation fosters team creativity, published in the July 2022 issue ofOrganization Behavior and Human Decision Processes. A related article, Paradox Mindset: The Source of Remarkable Creativity in Teams,was covered by INSEADs Knowledge Blog. Emichhas also coauthored a paper recently published online by theJournal of Business Research. The article, A house divided: A multilevel bibliometric review of the job search literature, focuses on how economists focus on organizational budgets when considering job search, while psychologists focus on job-seeker well being.

Timothy J. Shaffer, Stavros Niarchos Foundation (SNF) Chair of Civil Discourse and faculty member in theJoseph R. Biden, Jr. School of Public Policy and Administrationand Department of Communication, is co-editor of Grassroots Engagement and Social Justice through CooperativeExtension.This book, released Aug. 1, 2022, focuses on contemporary efforts to address systemic inequities and highlights Cooperative Extension'srole in, and responsibility for, culturally relevant community education that isrooted in democratic practices and social justice. Shaffer's co-editor, Nia Imani Fields, is a 2006 Biden School alumna and serves as the Maryland 4-H program leader and assistantdirector of Maryland Extension.

Melissa Melby, professor of anthropology, coauthored the editorial Seeking shelter against contagion: households of resilience, recently published by the Canadian Science Policy Centre in its 2022 Editorial Series titled Building Resilience During International Crisis. CSPC publishes opinion, commentary and critique from members of the science and innovation community on a wide range of issues.

Zvi Schwartz, professor of hospitality business management, andTim Webb, assistant professor of hospitality business management, both in the Alfred Lerner College of Business and Economics, were awarded the Journal of Hospitality and Tourism Researchs Article of the Year Highly Commended award at the 2022 International Council of Restaurant Institutional Education Conference in Washington, D.C., for their articleResource Similarity, Market Commonality, and Spatial Distribution of Hotel Competitive SetPic

Roxanne Evande, graduate student in the Department of Medical and Molecular Sciences, has been selected as one out of 10 students nationally for the role of advocacy trainee delegate by the American Society for Biochemistry and Molecular Biology. Evandes application highlighted how this opportunity fits in with her program and current career goals, as well as her background in policy and science, such as serving on the Graduate Student Government Executive Board. The role provides a three-month externship with opportunities to learn the basics of policy and how science can be applied to it for meaningful connections between these fields, which play critical roles in how society acts against rising issues such as the COVID-19 pandemic. Evandes project aims to reexamine and improve the review process for the National Science Foundation graduate fellowships. In her research at UD, she studies the cellular mechanisms of the human papillomavirus E2 protein for effective drug development in the future.

Alisa Moldavanova, incoming associate professor and director of the Master of Public Administration program in theJoseph R. Biden, Jr. School of Public Policy and Administration, was recently elected to serve on the Association for Research on Nonprofit Organizations and Voluntary Action (ARNOVA)Board of Directors. She has been an active leader and contributor to the ARNOVA community since 2012 and is a known champion of diversity, equity and inclusion in the nonprofit research field.

Kevin Solomon, an assistant professor of chemical and biomolecular engineering, has earned the Society for Industrial Microbiology and Biotechnology (SIMB) annual Early Career Award (formerly the Young Investigator Award) for 2022. The award aims to encourage young investigators to continue their research and to recognize and support their efforts at the beginning of their career and is given to a scientist or engineer who has demonstrated outstanding scientific contributions in the field of biotechnology and or industrial microbiology. Solomon was honored at the SIMB annual meeting on Aug. 9, 2022.

Eleftherios Terry Papoutsakis, the Unidel Eugene Du Pont Chair at the Department of Chemical and Biomolecular Engineering, has earned the Society for Industrial Microbiology and Biotechnology (SIMB) annual Charles Thom Award, the societys senior award. Named after a pioneer in industrial microbiology and mycology, the award honors researchers demonstrating exceptional merit in industrial microbiology and biotechnology through research contributions and publications, and for their independence of thought and originality that added appreciably to scientific knowledge. Papoutsakis was honored at the SIMB annual meeting on Aug. 9, 2022.

This summer,Paul Laux, professor of finance and JP Morgan Chase Senior Fellow at the Lerner College, oversaw the University of Delaware/ISCTE-Lisbon University Institute Trading and Bloomberg Program. It was a two-week program for graduate students studying finance at ISCTE. As part of the program, 30 students and faculty from ISCTE participated, training in Lerners Geltzeiler Trading Center and visiting other local sites and social gatherings. Lerner Dean Bruce Weber taught a class to participants.

To submit information for inclusion in For the Record, write to ocm@udel.edu and include For the Record in the subject line.

See more here:
For the Record, Aug. 12, 2022 | UDaily - UDaily

Overcoming the Impossible With DNA to Building Superconductor That Could Transform Technology – SciTechDaily

In DNA, scientists find a solution to building a superconductor that could transform technology.

Scientists have used DNA to overcome a nearly insurmountable obstacle to engineering materials that will revolutionize electronics. Published in the journal Science on July 28, the work was performed by researchers at the University of Virginia School of Medicine and their collaborators.

One possible outcome of these engineered materials could be superconductors, which have zero electrical resistance, allowing electrons to flow unimpeded. That means that, unlike current means of electrical transmission, they dont lose energy and dont create heat. Development of a superconductor that could be used widely at normal pressures and room temperature instead of at extremely high or low temperatures, as is now possible could lead to many technological wonders. These include hyper-fast computers, shrinking the size of electronic devices, allowing high-speed trains to float on magnets and slash energy use, and many more.

One such superconductor was first proposed by Stanford physicist William A. Little more than 50 years ago. Scientists have spent decades trying to make it work. However, even after validating the feasibility of his idea, they were left with a challenge that appeared impossible to overcome. Until now.

Edward H. Egelman, PhD, of the University of Virginia School of Medicines Department of Biochemistry and Molecular Genetics, has been a leader in the field of cryo-electron microscopy (cryo-EM), and he and his colleagues used cryo-EM imaging for this seemingly impossible project. It demonstrates, he said, that the cryo-EM technique has great potential in materials research. Credit: Dan Addison, UVA Communications

Edward H. Egelman, PhD, of UVAs Department of Biochemistry and Molecular Genetics, has been a leader in the field of cryo-electron microscopy (cryo-EM), and he and Leticia Beltran, a graduate student in his lab, used cryo-EM imaging for this seemingly impossible project. It demonstrates, he said, that the cryo-EM technique has great potential in materials research.

One possible way to realize Littles idea for a superconductor is to modify lattices of carbon nanotubes. These are hollow cylinders of carbon so tiny they must be measured in nanometers billionths of a meter. However, there was a huge challenge: controlling chemical reactions along the nanotubes so that the lattice could be assembled as precisely as needed and function as intended.

Egelman and his colleagues found an answer in the very building blocks of life. They took DNA, the genetic material that tells living cells how to operate, and used it to guide a chemical reaction that would overcome the great barrier to Littles superconductor. In short, they used chemistry to perform astonishingly precise structural engineering construction at the level of individual molecules. The result was a lattice of carbon nanotubes assembled specifically as needed for Littles room-temperature superconductor.

This work demonstrates that ordered carbon nanotube modification can be achieved by taking advantage of DNA-sequence control over the spacing between adjacent reaction sites, Egelman said.

For now, the lattice they built has not been tested for superconductivity. However, it offers proof of principle and has great potential for the future, the researchers say. While cryo-EM has emerged as the main technique in biology for determining the atomic structures of protein assemblies, it has had much less impact thus far in materials science, said Egelman, whose prior work led to his induction in the National Academy of Sciences, one of the highest honors a scientist can receive.

Egelman and his collaborators say their DNA-guided approach to lattice construction could have a wide variety of useful research applications, especially in physics. But it also validates the possibility of building Littles room-temperature superconductor. The scientists work, combined with other breakthroughs in superconductors in recent years, could ultimately transform technology as we know it and lead to a much more Star Trek future.

While we often think of biology using tools and techniques from physics, our work shows that the approaches being developed in biology can actually be applied to problems in physics and engineering, Egelman said. This is what is so exciting about science: not being able to predict where our work will lead.

The researchers have published their findings in the journal Science. The team consisted of Zhiwei Lin, Leticia Beltran, Zeus A. De los Santos, Yinong Li, Tehseen Adel, Jeffrey A Fagan, Angela Hight Walker, Egelman and Ming Zheng.

Reference: DNA-guided lattice remodeling of carbon nanotubes by Zhiwei Lin, Leticia C. Beltran, Zeus A. De los Santos, Yinong Li, Tehseen Adel, Jeffrey A Fagan, Angela R. Hight Walker, Edward H. Egelman and Ming Zheng, 28 July 2022, Science.DOI: 10.1126/science.abo4628

The work was supported by the Department of Commerces National Institute of Standards and Technology and by National Institutes of Health grant GM122510, as well as by an NRC postdoctoral fellowship.

Read the original:
Overcoming the Impossible With DNA to Building Superconductor That Could Transform Technology - SciTechDaily

ThreeSixty Journalism summer camps aim to increase diversity within media – MinnPost

Isaac Santino-Garcia and Jaydin Fairbanks are frequent camp goers. In the summers, they attend the various media camps ThreeSixty Journalism hosts, like the podcast camp and its news reporter academy.

This year, they were at the television broadcast camp, where they worked on creating a broadcast news story. Santino-Garcia and Fairbanks dove into the topic of Native American boarding schools with their video.

Article continues after advertisement

Topics like this need to be covered more, Santino-Garcia, an incoming junior at Cretin Derham Hall High School, said. And the best way to tell stories about different communities is to have those communities involved and lead the process.

Newsroom employees are more likely to be more white and male than U.S. workers overall, and more than three-quarters (77%) of newsroom employees are white, according to the Pew Research Center. ThreeSixty Journalism has been around for more than 20 years, partnering with the University of St. Thomas with a mission is to change how newsrooms look and the resulting narratives.

Santino-Garcia, who is Lower Sioux Dakota and White Earth Ojibwe, and half Mexican, thinks ThreeSixty puts underrepresented and marginalized voices first.

Every story Ive seen or at least heard about (in the program) has been somebody whos not Caucasian and a story that might not have been regularly told, he said.

For program graduate Samantha HoangLong, being surrounded by so many kids of color was uplifting.

It was like the first space to be a space that young with a class full of people who are also young journalists of color, she said. I feel really lucky that I was in a class full of diversity at that young age.

Part of bringing diversity into newsrooms is creating incentive, said Chad Caruthers, executive director of the journalism program. ThreeSixty also helps by giving stipends to the participants for their time and work.

It was the only reason (I attended) at first, but then I kept doing other things (camps), and I stayed because I always liked it, said Fairbanks, who is going to be a senior at Osseo High School.

The stipend allows people of various socioeconomic backgrounds to participate without the financial strain of losing income for a couple of weeks.

Article continues after advertisement

As students get older in high school, they work more, they need to support their families, they need to support themselves, whatever it may be. To come to a program thats a week-long or two weeks long at St. Thomas during the summer means that they dont work over that period of time, Caruthers said. If its not extra money in their pocket, we hope that it is replacing any income that they would lose by joining us.

Because of the program, some kids are considering studying journalism or some form of media. Santino-Garcia wants to attend St. Thomas, where ThreeSixty offers a four-year scholarship.

I like learning new things, and journalism gives me a good life experience that you may not learn other places, Santino-Garcia said. It just fascinates me because I can go out and tell other peoples stories that may not have been told.

Samantha HoangLong

I actually wanted to be a dentist before that. I was like applying to college with biology and biochemistry, and I was ready to go to dental school. And then I did this camp, she said. I learned that you can talk to people for a living and learn about what they do. I thought that was really cool, so I kind of just stuck with it.

After graduating high school, she interned for ThreeSixty Journalism and learned more about video production. She received a four-year scholarship from ThreeSixty to study communication and journalism at St. Thomas.

At the most recent camp, Babs Santos from Fox 9 and Jeff Wagner from WCCO taught the students how to speak on air and how to structure a story. Another component of the program, HongLong said, was touring a newsroom.

HongLong appreciated seeing what happens behind the scenes in a newsroom.

Article continues after advertisement

I think having that experience right after high school gave me an advanced look of what it could be if I worked in that job, she said. Being able to access and walk through the newsrooms was really cool. Thats what made me want to go into broadcast TV.

She went on to intern at Fox 9, then worked there after graduating college. Shes now on the audience team at Sahan Journal.

ThreeSixty does some recruiting for potential participants but also partners with various schools that identify students who would be a good fit for the program. It offers seasonal journalism workshops throughout the year and a camp per week during the summer.

Caruthers said that free and reduced lunch eligible students pay nothing for the program, but theres flexibility for other income levels. Typically, the organization aims for 80% of its participants to be free and reduced lunch qualified.

But the pandemic reduced that figure to between 50 and 75%.

Harder to reach students became, in many cases, harder to reach during the pandemic, Caruthers said. You look at all the gaps that many of us hear about in terms of education gaps, health disparities, things like that. Technology gaps are a big one, and thats part of it. When everything went to virtual, we had to do the same, and unfortunately, not all of our students have equal access to the technology that was required.

Of the total participants, roughly 10 percent pay to attend, Caruthers said. Its able to do so because of partnerships with the Center for Prevention at Blue Cross Blue Shield, which funds the projects, and helps with the topics.Blue Cross Blue Shield is a sponsor of the Race and Health Equity fellowship at MinnPost, but has no editorial say in content.

People whove attended ThreeSixty have gone on to work in newsrooms across the state. Some alumni are now at the Star Tribune, Fox 9, Sahan Journal, and MPR, among other places, Caruthers said.

MinnPost's in-depth, independent news is free for all to access no paywall or subscriptions. Will you help us keep it this way by supporting our nonprofit newsroom with a tax-deductible donation today?

Read more from the original source:
ThreeSixty Journalism summer camps aim to increase diversity within media - MinnPost

National Security Agency – Wikipedia

U.S. signals intelligence organization

Seal of the National Security Agency

Flag of the National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine.[10] The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees.[11]

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of personnel and budget, but information available as of 2013 indicates that the CIA pulled ahead in this regard, with a budget of $14.7 billion.[6][12] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[13] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[14][15] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a highly classified intelligence team) inserts eavesdropping devices in high value targets (such as presidential palaces or embassies). SCS collection tactics allegedly encompass "close surveillance, burglary, wiretapping, [and] breaking and entering".[16][17]

Unlike the CIA and the Defense Intelligence Agency (DIA), both of which specialize primarily in foreign human espionage, the NSA does not publicly conduct human-source intelligence gathering. The NSA is entrusted with providing assistance to, and the coordination of, SIGINT elements for other government organizations which are prevented by law from engaging in such activities on their own.[18] As part of these responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which facilitates cooperation between the NSA and other U.S. defense cryptanalysis components. To further ensure streamlined communication between the signals intelligence community divisions, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

The NSA's actions have been a matter of political controversy on several occasions, including its spying on antiVietnam War leaders and the agency's participation in economic espionage. In 2013, the NSA had many of its secret surveillance programs revealed to the public by Edward Snowden, a former NSA contractor. According to the leaked documents, the NSA intercepts and stores the communications of over a billion people worldwide, including United States citizens. The documents also revealed the NSA tracks hundreds of millions of people's movements using cellphones' metadata. Internationally, research has pointed to the NSA's ability to surveil the domestic Internet traffic of foreign countries through "boomerang routing".[19]

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau.[20] It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war, it was relocated in the army's organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the Navy's cryptanalysis functions in July 1918. World War I ended on November 11, 1918, and the army cryptographic section of Military Intelligence (MI-8) moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[21][22]

After the disbandment of the U.S. Army cryptographic section of military intelligence known as MI-8, the U.S. government created the Cipher Bureau, also known as Black Chamber, in 1919. The Black Chamber was the United States' first peacetime cryptanalytic organization.[23] Jointly funded by the Army and the State Department, the Cipher Bureau was disguised as a New York City commercial code company; it actually produced and sold such codes for business use. Its true mission, however, was to break the communications (chiefly diplomatic) of other nations. At the Washington Naval Conference, it aided American negotiators by providing them with the decrypted traffic of many of the conference delegations, including the Japanese. The Black Chamber successfully persuaded Western Union, the largest U.S. telegram company at the time, as well as several other communications companies to illegally give the Black Chamber access to cable traffic of foreign embassies and consulates.[24] Soon, these companies publicly discontinued their collaboration.

Despite the Chamber's initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating, "Gentlemen do not read each other's mail."[25]

During World War II, the Signal Intelligence Service (SIS) was created to intercept and decipher the communications of the Axis powers.[26] When the war ended, the SIS was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[26]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[26] This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[27] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[27] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[27] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[28]

The National Security Council issued a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9. On the same day, Truman issued a second memorandum that called for the establishment of the NSA.[29] The actual establishment of the NSA was done by a November 4 memo by Robert A. Lovett, the Secretary of Defense, changing the name of the AFSA to the NSA, and making the new agency responsible for all communications intelligence.[30] Since President Truman's memo was a classified document,[29] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as "No Such Agency".[31]

In the 1960s, the NSA played a key role in expanding U.S. commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USSMaddox during the Gulf of Tonkin incident.[32]

A secret operation, code-named "MINARET", was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as key leaders of the civil rights movement, including Martin Luther King Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[33] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was "disreputable if not outright illegal".[33]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However, a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit and intercept U.S. communications.[34]:Vol I,p.79

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Senator Frank Church[35] revealed that the NSA, in collaboration with Britain's SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[36] The NSA tracked these individuals in a secret filing system that was destroyed in 1974.[37] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[38] Senator Frank Church uncovered previously unknown activity,[38] such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[39] The investigation also uncovered NSA's wiretaps on targeted U.S. citizens.[40]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed. This was designed to limit the practice of mass surveillance in the United States.[38]

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided "irrefutable" evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[41][42]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA's role in economic espionage in a report entitled 'Development of Surveillance Technology and Risk of Abuse of Economic Information'.[43] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[44] The memorial is a, "tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology".[44] NSA employees must be retired for more than fifteen years to qualify for the memorial.[44]

NSA's infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3million to get the system running again. (Some incoming traffic was also directed instead to Britain's GCHQ for the time being.) Director Michael Hayden called the outage a "wake-up call" for the need to invest in the agency's infrastructure.[45]

In the 1990s the defensive arm of the NSAthe Information Assurance Directorate (IAD)started working more openly; the first public technical talk by an NSA scientist at a major cryptography conference was J. Solinas' presentation on efficient Elliptic Curve Cryptography algorithms at Crypto 1997.[46] The IAD's cooperative approach to academia and industry culminated in its support for a transparent process for replacing the outdated Data Encryption Standard (DES) by an Advanced Encryption Standard (AES). Cybersecurity policy expert Susan Landau attributes the NSA's harmonious collaboration with industry and academia in the selection of the AES in 2000and the Agency's support for the choice of a strong encryption algorithm designed by Europeans rather than by Americansto Brian Snow, who was the Technical Director of IAD and represented the NSA as cochairman of the Technical Working Group for the AES competition, and Michael Jacobs, who headed IAD at the time.[47]:75

After the terrorist attacks of September 11, 2001, the NSA believed that it had public support for a dramatic expansion of its surveillance activities.[48] According to Neal Koblitz and Alfred Menezes, the period when the NSA was a trusted partner with academia and industry in the development of cryptographic standards started to come to an end when, as part of the change in the NSA in the post-September 11 era, Snow was replaced as Technical Director, Jacobs retired, and IAD could no longer effectively oppose proposed actions by the offensive arm of the NSA.[49]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a "privacy mechanism"; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread's privacy system.[50]

Trailblazer Project ramped up in 2002 and was worked on by Science Applications International Corporation (SAIC), Boeing, Computer Sciences Corporation, IBM, and Litton Industries. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004.

Turbulence started in 2005. It was developed in small, inexpensive "test" pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[51] It was to be a realization of information processing at higher speeds in cyberspace.[52]

The massive extent of the NSA's spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor Edward Snowden. On 4 September 2020, the NSA's surveillance program was ruled unlawful by the US Court of Appeals. The court also added that the US intelligence leaders, who publicly defended it, were not telling the truth.[53]

NSA's eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[54]

According to a 2010 article in The Washington Post, "[e]very day, collection systems at the National Security Agency intercept and store 1.7billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases."[55]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand the NSA Centers of Academic Excellence in Information Assurance Education Program.[56]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008, by President Bush, the NSA became the lead agency to monitor and protect all of the federal government's computer networks from cyber-terrorism.[9]

A part of NSA's mission is to serve as a combat support agency for the Department of Defense.[57]

Operations by the National Security Agency can be divided into three types:

"Echelon" was created in the incubator of the Cold War.[58] Today it is a legacy system, and several NSA stations are closing.[59]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Australian Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[60] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world's transmitted civilian telephone, fax and data traffic.[61]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[62] Investigative journalist Duncan Campbell reported in 1988 on the "ECHELON" surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[63] On November 3, 1999, the BBC reported that they had confirmation from the Australian Government of the existence of a powerful "global spying network" code-named Echelon, that could "eavesdrop on every single phone call, fax or e-mail, anywhere on the planet" with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was "linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland".[64]

NSA's United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about "... U.S. persons, entities, corporations or organizations...." without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[65]

The NSA was also involved in planning to blackmail people with "SEXINT", intelligence gained about a potential target's sexual activity and preferences. Those targeted had not committed any apparent crime nor were they charged with one.[66]

In order to support its facial recognition program, the NSA is intercepting "millions of images per day".[67]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[68] This "collect it all" strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[69]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[70] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[71][72]

In June 2015, WikiLeaks published documents showing that NSA spied on French companies.[73]

In July 2015, WikiLeaks published documents showing that NSA spied on federal German ministries since the 1990s.[74][75] Even Germany's Chancellor Angela Merkel's cellphones and phones of her predecessors had been intercepted.[76]

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8billion telephone data items and 97.1billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. Initially, it was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France,[77] but later on, it became clear that those data were collected by European agencies during military missions abroad and were subsequently shared with NSA.

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual EC DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[78][79] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[80] Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[79]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[81][82]

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013, that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[83] However, later, Linus' father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[84]

When my oldest son was asked the same question: "Has he been approached by the NSA about backdoors?" he said "No", but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, everybody understood that the NSA had approached him.

IBM Notes was the first widely adopted software product to use public key cryptography for clientserver and serverserver authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed the export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a "workload reduction factor" for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[86][87]

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA's ability to surveil the domestic Internet traffic of foreign countries.[19] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[19]

Intercepted packages are opened carefully by NSA employees

A "load station" implanting a beacon

A document included in NSA files released with Glenn Greenwald's book No Place to Hide details how the agency's Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as "some of the most productive operations in TAO because they preposition access points into hard target networks around the world."[88]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[89] Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA's Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish a network bridge "that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants."[90]

NSA's mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes "foreign intelligence or counterintelligence" while not "acquiring information concerning the domestic activities of United States persons". NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[91]

The appearance of a 'Domestic Surveillance Directorate' of the NSA was soon exposed as a hoax in 2013.[92][93]

NSA's domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures apply to the contents of all communications, whatever the means, because "a person's private communications are akin to personal papers."[94] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA's foreign surveillance efforts are subject to far fewer limitations under U.S. law.[95] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[95]

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorneys General were unsure if the NSA's programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA's programs continued.[96] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records. This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[97][98]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[99]

Proponents of the surveillance program claim that the President has executive authority to order such action[citation needed], arguing that laws such as FISA are overridden by the President's Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court's ruling in Hamdan v. Rumsfeld deprecates this view.[100]

Under the PRISM program, which started in 2007,[101][102] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[103] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, videos, photos, VoIP chats such as Skype, and file transfers.

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[104] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[105][106][107][108]

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. A division which conducts such operations is the Tailored Access Operations (TAO) division, which has been active since at least circa 1998.[109]

According to the Foreign Policy magazine, "... the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People's Republic of China."[110][111]

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria's internet blackout in 2012.[112]

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[113]

Unlike other intelligence organizations such as the CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided into units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[115][116]

As of 2013[update], NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known.[117]

In the year 2000, a leadership team was formed consisting of the director, the deputy director and the directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[118]

After president George W. Bush initiated the President's Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[119]

A 2016 proposal would combine the Signals Intelligence Directorate with Information Assurance Directorate into Directorate of Operations.[120]

NSANet stands for National Security Agency Network and is the official NSA intranet.[121] It is a classified network,[122] for information up to the level of TS/SCI[123] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[124]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency's systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[125]

In 1998, NSANet, along with NIPRNET and SIPRNET, had "significant problems with poor search capabilities, unorganized data and old information".[126] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[127] Some universities that do highly sensitive research are allowed to connect to it.[128]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in "a file-sharing location on the NSA's intranet site"; so, they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents. As a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to safer storage locations.[129]

The NSA maintains at least two watch centers:

The NSA has its own police force, known as NSA Police (and formerly as NSA Security Protective Force) which provides law enforcement services, emergency response and physical security to the NSA's people and property.[131]

NSA Police are armed federal officers. NSA Police have use of a K9 division, which generally conducts explosive detection screening of mail, vehicles and cargo entering NSA grounds.[132]

NSA Police use marked vehicles to carry out patrols.[133]

The number of NSA employees is officially classified[4] but there are several sources providing estimates.In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s, NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA's budget and workforce were cut by one third, which led to a substantial loss of experience.[134]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is "somewhere between 37,000 and one billion" as a joke,[4] and stated that the agency is "probably the biggest employer of introverts."[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world's largest single employer of mathematicians.[135] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[136]

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[137] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, "If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired." David Kahn criticized the NSA's tactics of concealing its doings as smug and the Congress' blind faith in the agency's right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[137]

Edward Snowden's leaking of the existence of PRISM in 2013 caused the NSA to institute a "two-man rule", where two system administrators are required to be present when one accesses certain sensitive information.[136] Snowden claims he suggested such a rule in 2009.[138]

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[139] As part of the latter, historically EPQs or "embarrassing personal questions" about sexual behavior had been included in the NSA polygraph.[139] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive "termination of employment", according to a 1982 memorandum from the director of the NSA.[140]

There are also "special access examination" polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[140] NSA's brochure states that the average test length is between two and four hours.[141] A 1983 report of the Office of Technology Assessment stated that "It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions."[142] Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[139]

In 2010 the NSA produced a video explaining its polygraph process.[143] The video, ten minutes long, is titled "The Truth About the Polygraph" and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays "various applicants, or actors playing themit's not cleardescribing everything bad they had heard about the test, the implication being that none of it is true."[144] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[143][145] George Maschke, the founder of the Web site, accused the NSA polygraph video of being "Orwellian".[144]

A 2013 article indicated that after Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[146]

The number of exemptions from legal requirements has been criticized. When in 1964 Congress was hearing a bill giving the director of the NSA the power to fire at will any employee, The Washington Post wrote: "This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself." Yet, the bill was accepted by an overwhelming majority.[137] Also, every person hired to a job in the US after 2007, at any private organization, state or federal government agency, must be reported to the New Hire Registry, ostensibly to look for child support evaders, except that employees of an intelligence agency may be excluded from reporting if the director deems it necessary for national security reasons.[147]

When the agency was first established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army's cryptographic operations.[148] Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[149]

Construction of additional buildings began after the agency occupied buildings at Fort Meade in the late 1950s, which they soon outgrew.[149] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the "Headquarters Building" and since the NSA management occupied the top floor, workers used "Ninth Floor" to refer to their leaders.[150] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[149] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[151] The four NSA buildings became known as the "Big Four."[151] The NSA director moved to 2B when it opened.[151]

Headquarters for the National Security Agency is located at 39632N 764617W / 39.10889N 76.77139W / 39.10889; -76.77139 in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Fort Meade is about 20mi (32km) southwest of Baltimore,[152] and 25mi (40km) northeast of Washington, D.C.[153] The NSA has two dedicated exits off BaltimoreWashington Parkway. The Eastbound exit from the Parkway (heading toward Baltimore) is open to the public and provides employee access to its main campus and public access to the National Cryptology Museum. The Westbound side exit, (heading toward Washington) is labeled "NSA Employees Only".[154][155] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[156]

NSA is the largest employer in the state of Maryland, and two-thirds of its personnel work at Fort Meade.[157] Built on 350 acres (140ha; 0.55sqmi)[158] of Fort Meade's 5,000 acres (2,000ha; 7.8sqmi),[159] the site has 1,300 buildings and an estimated 18,000 parking spaces.[153][160]

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as "a modern boxy structure" that appears similar to "any stylish office building."[161] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[161] It contains 3,000,000 square feet (280,000m2), or more than 68 acres (28ha), of floor space; Bamford said that the U.S. Capitol "could easily fit inside it four times over."[161]

The facility has over 100 watchposts,[162] one of them being the visitor control center, a two-story area that serves as the entrance.[161] At the entrance, a white pentagonal structure,[163] visitor badges are issued to visitors and security clearances of employees are checked.[164] The visitor center includes a painting of the NSA seal.[163]

Read more:

National Security Agency - Wikipedia

Posted in NSA

Defence analyst Pravin Sawhneys new book begins with an imagined cyberattack on India by China – Scroll.in

Prime Ministers Office, New Delhi, 22 February 2024

...Whats the problem? the prime minister rasps.

Sir, this looks like a formidable cyberattack. Even our secure network has been breached, the NSA says. We are unable to contact anyone.

The prime minister of Indias office has turned into an island.

In a few minutes it becomes clear that the PMO is not the only one to fall off the internet highway. The ministries of defence, home, finance, as well as the service headquarters of the armed forces have all gone offline. The Government of India has been thrown backwards by more than three decades. Even the phone lines are not working.

A sense of foreboding descends on the room. The prime minister walks back to his office, followed by the NSA. The principal secretary is tasked with physically summoning the members of the Cabinet Committee on Security (CCS), the chief of defence staff (CDS), and the three service chiefs for an immediate meeting.

Unlikely, replies the NSA. Beads of perspiration appear on his forehead.

China?

Thats most likely.

China had been issuing warnings to India since the previous year when the prime minister had visited Bum La in Arunachal Pradesh and addressed the troops in Tawang. China had termed this a grave provocation. Consequently, it increased military activity in its Western Theatre Command (WTC) close to the border with India. According to the intelligence reports that the NSA has been receiving over the last few months, the activity appeared to be more than the regular exercises that the Peoples Liberation Army (PLA) regularly conducts.

Convoys of all kinds of trucks are frequently spotted moving stores, ammunition, and fuel on the multiple tar roads heading towards Lhasa (the headquarters of Tibet Military Command), and sometimes on the arterial roads linking up to the LAC1. Since 2020, the PLA has built robust and technologically advanced underground facilities (UGFs) to protect all aspects of its military forces, including command and control, logistics, ammunition, and missile systems.

Started around 2012, the UGF building programme in the Tibet Autonomous Region (TAR) had been upgraded and expanded. The deeply buried UGFs were traditionally meant to protect military assets from the effects of penetrating conventional munitions and nuclear strikes.

According to intelligence reports, after the 2020 Ladakh face-off, the PLA deployed electronic and cyber warfare units in TAR. Dual-use airports were upgraded for combat jet and drone flights. Huge communication towers had been set up. Blast pens or hardened shelters for combat aircraft had been built. Numerous air defence and missile sites had been dug. But India had been ignoring these provocations.

Despite all the threats, the prime minister and the NSA were convinced that China would not enter all-out war with India and imperil its own economic growth. This view was also supported by the military establishment led by the CDS. Even in 2024, the Indian military held the view it had formulated back in 2009 that China would not want to wage a war with India because a stalemate on ground would be viewed as defeat.

And stalemate it would be, they believed, because the Indian military of 2024 was not the same as 1962. It was prepared to fight and was battle hardened by decades of fighting terrorism on the Line of Control (LoC) with Pakistan. The Indian Air Force, with some 250-300 combat aircraft from all bases located at much lower altitudes, had many advantages over the PLA Air Force (PLAAF). It would make sure that it sent back thousands of body bags of PLA soldiers, thereby destroying Chinas reputation as a world power.

But was the Chinese military of 2024 the same as the one in 1962? This was an uncomfortable question with an unsavoury answer. Since the prime minister was not in the habit of listening to unpleasant answers, nobody raised this question. Perhaps nobody knew that this was a question that needed to be asked.

Despite ongoing studies on China, the Indian military, even in 2024, was oblivious of the war China had been preparing for. Traditionally, the Indian military believed that China was at least a decade ahead of Indian capabilities. Sanguine in this assessment, it was clueless about the rapid transformation that had been taking place in the neighbourhood.

But if China does not intend to go to war with India, why would it mount such a formidable cyberattack on the seat of the government?

Looking through his notes based on a recent intelligence report, the NSA runs the prime minister through what he knows about the PLAs presence in TAR. The combat support forces (Rocket Force, Strategic Support Force, and Joint Logistics Support Force) in the WTC have been conducting training with combat units to deploy and manoeuvre with them. The reported PLA convoys into TAR include large numbers of unmanned vehicles combat as well as reconnaissance. One report mentions sighting thousands of humanoid robots in military buses and trains to Lhasa.

Humanoid robots?

They are likely to be used for combat support like maintenance, readying of ammunition, supplies, fuel and so on, the NSA says in a slightly dismissive tone.

Difficult to say. But its unlikely that a phishing attack would disrupt our networks. This seems to be something else.

By this time, the CCS has assembled in the conference room. Breaking protocol, the chief of air staff (CAS) blurts out, This is not an ordinary cyberattack. The malware that has attacked us is extremely sophisticated. It has breached all our firewalls. Our entire communication network has collapsed. We have been rendered blind and deaf.

A cold frisson runs through the conference room. The army and the navy chiefs have similar reports to share. The navy chief is particularly worried. The navy has lost contact with the INS Vikrant carrier battle group that includes two destroyers, four frigates, three submarines, fifteen fighters, eight helicopters, two long-range maritime patrol aircraft, and a number of smaller vessels.

Seeing the prime ministers quizzical look, the NSA explains stoically, Sir, if we have lost contact with them, it means they have also lost contact with ground control. This can lead to accidents.

The CAS interrupts. Its a very serious situation. We have deployed six aircraft for this exercise. All communications with them have snapped.

Glancing at the NSA, he adds, In Ladakh, the PLA has also deployed a large number of unmanned and autonomous systems, including combat systems. If they get up to some mischief using machines, we wont get to know. Of course, our troops are trained and prepared for all eventualities. But communication with headquarters is critical.

Despite the apparent calm in the room, the panic was palpable. The COASs remark was foreboding, but it also held a clue to the motive for the cyberattack. The principal secretary was told to summon the director of National Critical Information Infrastructures Protection Centre (NCIIPC) that works under the National Technical Research Organisation (NTRO), the head of the Defence Cyber Agency under the Integrated Defence Headquarters, and the National Cyber Security Coordinator who works directly under the PMO.

The reports are worse than expected.

Sir, it doesnt look like a mere cyberattack. The internet in peninsular India has stopped working. Most DRDO laboratories, ISRO, and the DPSUs have no internet. We dont know yet how much of the infrastructure has been affected, the NSA says, running his hand over his forehead.

Its a major cyberattack, the prime minister says.

After a moments silence, the NSA adds, It looks like some of our submarine cables that connect us to the global internet have been tampered with. Maybe they have been cut.

But thats an act of war, the prime minister says to the now silent room.

The conference room turns into an impromptu war room.

I need updates every half hour, the prime minister declares and storms out.

Excerpted with permission from The Last War: How AI Will Shape Indias Final Showdown with China, Pravin Sawhney, Aleph Book Company.

Go here to see the original:

Defence analyst Pravin Sawhneys new book begins with an imagined cyberattack on India by China - Scroll.in

Posted in NSA

All the new movies and TV shows streaming in August 2022 – Boston.com

StreamingA full list of new streaming options on Netflix, Hulu, Amazon Prime, HBO Max, and Disney Plus in August 2022.Maitreyi Ramakrishnan as Devi in "Never Have I Ever." Netflix

While more Bostonians may be focused on enjoying the last full month of summer by enjoying some outdoor activities (including outdoor movies), August is also shaping up to be another great month for couch potatoes, with intriguingnew streaming optionsavailable on Netflix, HBO Max, Hulu, Amazon Prime Video, and Disney Plus.

Netflix is bringing back the Mindy Kaling-produced Never Have I Ever for Season 3 (its penultimate season) and is also debuting the Mark Wahlberg-Kevin Hart buddy comedy Me Time.

HBO Max, meanwhile, is targeting Game of Thrones fans with its new spinoff House of the Dragon, Disney Plus has the Chris Evans Pixar movie Lightyear, Amazon Prime Video has a series remake of the classic baseball movie A League of Their Own, and Hulu has the newest movie in the Predator franchise, Prey. (Note: We got to see an early screening of Prey last week, and its fantastic.)

Heres the full list of new movies and TV shows now streaming on Netflix, HBO Max, Hulu, Amazon Prime Video, and Disney Plus in August 2022.

August 128 Days8 MileAbove the RimThe Age of AdalineBattle: Los AngelesBridget Joness BabyBridget Joness DiaryConstantineDinner for SchmucksEyes Wide ShutFerris Buellers Day OffFootloose(2011)Hardcore HenryLegends of the FallLove & BasketballMade of HonorMen in BlackMen in Black 2Men in Black 3Miss CongenialityMonster-in-LawNo Strings AttachedShes Funny That WaySpace Jam(1996)Spider-ManSpider-Man 2Spider-Man 3The TownWoman in Gold

August 2Flight

August 3Buba Netflix FilmDont Blame Karma Netflix Film

August 4Wedding Season Netflix Film

August 5Carter Netflix FilmDarlings Netflix FilmThe InformerRise of the Teenage Mutant Ninja Turtles: The Movie Netflix FilmSkyfall

August 6Reclaim Netflix Film

August 8Code Name: Emperor Netflix Film

August 9The Nice Guys

August 10Bank Robbers: The Last Great Heist Netflix DocumentaryHeartsong Netflix Film

August 11DopeStay on Board: The Leo Baker Story Netflix Documentary

August 1213: The Musical Netflix FilmDay Shift Netflix Film

August 15Learn to Swim

August 17Look Both Ways Netflix FilmRoyalteen Netflix Film

August 18Inside the Mind of a Cat Netflix Documentary

August 19The Next 365 Days Netflix Film

August 20Fullmetal Alchemist The Revenge of Scar Netflix Film

August 21A Cowgirls Song

August 24Running with the Devil: The Wild World of John McAfee Netflix DocumentaryWatch Out, Were Mad Netflix Film

August 25Thats Amor Netflix Film

August 26DisobedienceLoving Adults Netflix FilmMe Time Netflix FilmSeoul Vibe Netflix Film

August 29Under Her Control Netflix Film

August 31I Came By Netflix Film

August 1Pawn Stars, Season 13Polly Pocket: Tiny Taste Adventure, Season 4: part 2Top Gear, Season 29-30

August 2Ricardo Quevedo: Tomorrow Will Be Worse Netflix Comedy Special

August 3Good Morning, Vernica, Season 2 Netflix Series

August 4Lady Tamara Netflix SeriesKAKEGURUI TWIN Netflix AnimeSuper Giant Robot Brothers Netflix Family

August 5The Sandman Netflix Series

August 7Riverdale, Season 6

August 8Team Zenko Go, Season 2 Netflix Family

August 9I Just Killed My Dad Netflix Documentary

August 10Indian Matchmaking, Season 2 Netflix SeriesInstant Dream Home Netflix SeriesIron Chef Brazil Netflix SeriesLocke & Key, Season 3 Netflix SeriesSchool Tales The Series Netflix Series

August 11DOTA: Dragons Blood: Book 3 Netflix Anime

August 12A Model Family Netflix SeriesNever Have I Ever, Season 3 Netflix Series

August 15Ancient Aliens, Season 4

August 16Untold: Volume 2 Netflix Documentary (new episodes weekly)Untold: The Girlfriend Who Didnt Exist(2 Parts)

August 17High Heat Netflix SeriesJunior Baking Show, Season 6 Netflix SeriesUnsuspicious Netflix Series

August 18He-Man and the Masters of the Universe,Season 3 Netflix FamilyTekken: Bloodline Netflix Anime

August 19The Cuphead Show!, Part 2 Netflix FamilyEchoes Netflix SeriesThe Girl in the Mirror (Alma) Netflix SeriesGlow Up, Season 4 Netflix SeriesKleo Netflix Series

August 23Chad and JT Go Deep Netflix SeriesUntold: The Rise and Fall of AND1 Netflix Documentary

August 24Lost Ollie Netflix SeriesMo Netflix SeriesQueer Eye: Brazil Netflix SeriesSelling The OC Netflix SeriesUnder Fire Netflix Series

August 25Angry Birds: Summer Madness, season 3 Netflix FamilyHistory 101, Season 2 Netflix DocumentaryRilakkumas Theme Park Adventure Netflix Anime

August 26Drive Hard: The Maloof Way Netflix SeriesLudik Netflix Series

August 29Mighty Express, Season 7 Netflix Family

August 30I AM KILLER, Season 3 Netflix DocumentaryUntold: Operation Flagrant Foul Netflix Documentary

August 31Club Amrica vs Club Amrica Netflix DocumentaryFamily Secrets Netflix Series

August 1A Glimpse Inside the Mind of Charlie Swan IIIA Most Violent YearAmyBarely LethalBelle, 2013Biker BoyzBlow OutBlue VelvetBugCadillac ManCharlies AngelsCharlies Angels: Full ThrottleChasing PapiChildren of a Lesser GodChocolate CityColorsDamien Omen IIDark PlacesDays of Being WildDC Showcases Short:Constantine The House of MysteryEnemyEverything You Always Wanted to Know About Sex But Were Afraid to AskEx MachinaFantastic VoyageFightingFrom HellGarfieldGarfield: A Tail of Two Kitties Extended VersionGaslightGhost Dog: The Way of the SamuraiGinger & RosaHow to Lose Friends and Alienate PeopleHow to Talk to Girls at PartiesInvasion of the Body Snatchers, 1978 Ivanhoe, 1952Jeff, Who Lives at HomeLaggiesLate August, Early SeptemberLean on PeteLife After BethLions for LambsLittle MenLittle Women, 1994LockeLove & BasketballMan of the YearMiles AheadMississippi GrindMojaveMy Big Fat Greek Wedding 2Mystic PizzaObjective, Burma!Obvious ChildOriginal Cast Album:Company, 1970Out of the PastRememberRevenge of the Green DragonsSlow WestSon of a GunSource CodeStardustThe Adderall DiariesThe Blood of a PoetThe CaptiveThe Devils BackboneThe End of the TourThe Fault in Our StarsThe Field Guide to EvilThe Great EscapeThe Last WordThe NotebookThe OneThe Possession Extended VersionThe RoverThe Spectacular NowThe Spiderwick ChroniclesThe Testament of OrpheusThe Transporter RefueledThunderstruckTranscendenceTrouble With the CurveTuskUnder the SkinWhiplash

August 3Belle, 2021

August 5Belfast

August 13The Princess, original documentary premiere

August 21American Sniper

August 24Katrina Babies, original documentary premiere

August 25The Hobbit: The Desolation of SmaugExtended Version

August 26Wolf

August 1Industry, Season 2 premiereTeen Titans Go, Season 7

August 4Sweet Life: Los Angeles, Max Original Season 2 premiere

August 5Jesus Sepulveda: Mr. Tough Life, comedy special premiere

August 7The Smiling Friends Go To Brazil, special

August 9Hard Knocks: Training Camp with the Detroit Lions, Season 17 premiere

August 21House of the Dragon, series premiere

August 25House of Ho, Max original, Season 2 premiere

August 26Victor and Valentino, Season 3

August 121Akeelah and the BeeAmerican AssassinAqu Entre NosBig Mommas: Like Father, Like SonBlack SwanThe Blair Witch ProjectBlast From the PastBlazing SaddlesBook of Shadows: The Blair Witch 2Bucky Larson: Born to Be a StarBugsyCast AwayThe Chronicles of RiddickDan in Real LifeDespicable MeDespicable Me 2DetroitThe Devil Wears PradaFantastic Mr. FoxGandhiGhostbusters(1984)Ghostbusters IIGood Luck ChuckGroundhog DayGullivers TravelsHotel TransylvaniaI Feel PrettyIn TimeJiro Dreams of SushiJust Go With ItKindergarten CopThe Leisure SeekerMan on FireMen of HonorMiles AheadThe Muppets Take ManhattanNinja AssassinNurse 3-DThe Object of My AffectionPaul Blart: Mall CopPretty WomanSee No Evil, Hear No EvilShameSimply IrresistibleThe Sixth ManSo I Married an Axe MurdererSource CodeSpider-ManSpider-Man 2Spider-Man 3Step Up RevolutionSurfs UpSwimfanSynecdoche, New YorkTower HeistVantage PointWanderlustWar HorseThe Wedding SingerWhat a Girl WantsX-Men Origins: WolverineYouve Got Mail

August 5Prey(Hulu Original)

August 15The China HustleThe Hate U GiveJourney to the WestMonstersNymphomaniac Volume I Extended Directors CutRed CliffStage MotherWhat Just HappenedWhose Streets?

August 18International Falls

August 24Hostile Territory

August 3FXsReservation Dogs, Season 2 premiere

August 4CMA Fest (ABC)

August 10Password, series premiere (NBC)

August 11Trolls: TrollsTopia, complete seventh and final season (Hulu Original)

August 12This Fool, complete season one (Hulu Original)

August 13FXsChildren of the Underground, complete Season one

August 15Legacy: The True Story of the L.A. Lakers, limited-series premiere (Hulu Original)

August 16Hotties, complete season one (only on Hulu)

August 17On the Count of Three

August 18Dragons: The Nine Realms, complete Season 3 (Hulu Original)International Falls

August 23Yu-Gi-Oh! Sevens, Season 1B (Disney XD)

August 24Blippi, complete Season 4Hostile Territory

August 25Mike, Season 1 premiere (Hulu Original)Welcome to Wrexham, Season 1 premiere (FX)

August 26Doc McStuffins: The Doc Is 10!(Disney Jr.)Little Demon, Season 1 premiere (FX)

August 30FXsThe Patient, limited-series premiere (only on Hulu)Keep This Between Us, Season 1 premiere (Freeform)

August 31The Croods: Family Tree, complete Season 4 (Hulu Original)

August 3Lightyear

August 5The Lion King (2019) (Sing-Along Version)The Lion King II: Simbas Pride (Sing-Along Version)Old Dogs

August 12Father of the BrideFather of the Bride II

August 19Beauty and the Beast (1991) (Sing-Along Version)Beauty and the Beast (2017) (Sing-Along Version)Tangled (Sing-Along Version)

August 3Alice in Wonderland Bakery, Season 1, 5 episodesThe Ghost and Molly McGee, Season 1, 5 episodesMarvel Studios Assembled: The Making of Ms. Marvel, premiere

August 5LEGO Star Wars Summer Vacation, premiere

August 10Bluey, season 3, 25 episodesRunning Wild with Bear Grylls: The Challenge, Season 1I Am Groot, premiere (all shorts streaming)

August 12Disney Summer Magic Quest

August 17Meet Spidey and His Amazing Friends, Season 2She-Hulk: Attorney At Law, premiere

August 24Blackish, Season 8Chibi Tiny Tales (Shorts), Season 2Eureka, Season 1, 4 episodes

August 26Doc McStuffins: The Doc is 10!

August 31Americas National Park, Season 1Europe From Above, Season 2Secrets of the Zoo: Down Under, Season 3

August 1(500) Days Of Summer1 Buck16 To Life3000 Miles To Graceland5 Star Day59 SecondsA Dark PlaceA Fish Called WandaA Night At The RoxburyA.I. Artificial IntelligenceAarons BloodAbsolutionAcid HorizonAlready GoneAlright NowAnguishAnnapolisAny DayAssimilateBaby BoomBackstageBackwoodsBad FrankBad TherapyBasicBattle ScarsBefore MidnightBig Brother VolcanoButch Cassidy and the Sundance KidClockstoppersCourage Under FireCrossed the LineDating My MotherDereks DeadDisappearanceDont ClickDownhill RacerDrive Me CrazyEadweardEscape From AlcatrazEverybody Loves SomebodyEvil Dead (2013)Face/Off (1997)FilthFirewalkerFollow the ProphetFright Night (2011)Un Gallo Con Muchos HuevosGame of SpyGetting to Know YouGonzoGoodbye ButterflyGrand CruHappy Yummy ChickenHardballHere On OutHes Way More Famous Than YouI Am A GhostI Like MeI Love You, Beth CooperIceland Is BestIm Still HereImpossible MonstersInternational FallsIve Got IssuesJimmy Vestvood: Amerikan HeroKing ArthurKing Kong (1976)King Of KnivesKingpinLeaving Las VegasLetter from MasanjiaLine of DescentLost BayouMaking Waves: The Art of Cinematic SoundMan from RenoMcLintockMermaidsMisma Luna (Under The Same Moon)Mr. 3000Neil Young Heart of GoldNever HeardNew MoneyObeyOnceOnce Upon a Time in the West (1969)One and the SameParadox LostPerfect SistersPet Sematary (1989)ProphecyRivers EdgeRockawayRomy And Micheles High School ReunionRoninSafe InsideScary Movie 5SerpicoSingle White FemaleSoldiers of FortuneStar Trek II: The Wrath of KhanStar Trek III: The Search for SpockStar Trek IV: The Voyage HomeStar Trek V: The Final FrontierStar Trek VI: The Undiscovered CountryStar Trek GenerationsStar Trek: InsurrectionStep Up RevolutionStill TodaySurrogate ValentineThe AtoningThe Best Exotic Marigold HotelThe Devil Wears PradaThe Exorcism of Emily RoseThe FeelsThe HauntingThe Hornets NestThe Killer EliteThe MachinistThe Middle of XThe Missouri BreaksThe SaintThe ShootistThe Wrong ToddThe YardsThiefTim & Erics Billion Dollar MovieTo TokyoTrail of AshesTricksterTriggerTwo Ways HomeTyler Perrys Diary of a Mad Black WomanTyler Perrys Diary of a Mad Black Woman The PlayTyler Perrys Madea Goes To JailUnder the Tuscan SunUndertowVampires SuckWalk Hard: The Dewey Cox StoryWaynes World IIWe Were SoldiersWeepah Way for NowWhite on RiceWild Honey Pie!Writers BlockWuthering Heights (1970)YinzYours, Mine & Ours

Read more here:

All the new movies and TV shows streaming in August 2022 - Boston.com

September symposium will celebrate life and legacy of John Claypool – Baptist News Global

If youve ever heard a sermon preached by a moderate Baptist pastor, youve likely heard the influence of John Claypool, whether you knew it or not.

Claypool served four well-known Baptist churches as pastor in the second half of the 20th century before becoming an Episcopal priest. He was best-known for a confessional style of preaching that continues to be emulated by many moderate and progressive preachers.

I know of few if any pastors or preachers who have had such a great impact on our generation of ministers as Claypool, said Stephen Shoemaker, who followed the legendary pastor at two churches, Broadway Baptist in Fort Worth, Texas, and Crescent Hill Baptist in Louisville, Ky.

I know of few if any pastors or preachers who have had such a great impact on our generation of ministers as Claypool.

Shoemaker will be among the 16 presenters at a Sept. 16-18 symposium celebrating Claypools life and legacy. The event will be held at Crescent Hill Baptist Church as this years William M. Johnson Lecture Series. Registration information is online at https://gladreunion2022.eventbrite.com.

As a preacher and the author of 11 books, Claypool gained national notoriety especially among a generation of Southern Baptist pastors coming of age as the Southern Baptist Convention splintered between moderates and conservatives, labels that influenced not only theology but also preaching styles.

Claypools narrative-driven preaching differed significantly from the three points and a poem style often associated with Southern Baptist sermons of the era. It also differed from the strictly exegetical style favored by conservative and fundamentalist preachers. Younger pastors sought to emulate his style.

His innovative and deeply authentic style of proclamation developed from personal tragedy called confessional preaching provided powerful pastoral care from the pulpit and reminded generations of Baptists and Episcopalians alike that life is a gift, said Aaron Weaver, communications director for the Cooperative Baptist Fellowship and co-editor of a new book on Claypool that will debut at the symposium. As a Baptist historian, Im excited to share more about Claypools story and his continued influence on present-day Baptist pastors.

Claypools preaching was significantly influenced by the death of his 9-year-old daughter, Laura Lue, from leukemia in 1970. His first book was on the spirituality of grief, Tracks of a Fellow Struggler. He also was shaped by and supportive of the Civil Rights movement at a time when most Southern Baptists were not.

Over the course of his ministry, John Claypool made significant contributions to the Christian faith and the progressive Baptist tradition through his affirmation of the full dignity of Black women and men as well as his role as an ally and advocate in the civil rights struggle of the 1960s, Aaron Weaver explained.

Claypool earned an undergraduate degree at Baylor University in Texas and then a doctorate from Southern Baptist Theological Seminary in Kentucky. Those two states would become important locales in his pastoral career. He served as senior pastor at Crescent Hill Baptist in Louisville from 1960 to 1971 and then at Broadway Baptist Church in Fort Worth from 1971 to 1976. Both congregations included large contingencies of faculty members from SBC seminaries located nearby. Thus Claypool shaped not only his congregations but also those who were teaching young pastors.

In an unusual move in 1976, Claypool left the 5,000-member Broadway Baptist Church to become pastor of a much smaller congregation of 400 members at Northminster Baptist Church in Jackson, Miss. Historically, few Baptist pastors leave larger churches to serve smaller churches. From Northminster, Claypool moved back to Texas to serve Second Baptist Church of Lubbock, but in 1985 resigned and moved toward ordination as an Episcopal priest. He served 14 years as rector of St. Lukes Episcopal Church in Birmingham, Ala., until his retirement in 2000. He later taught preaching at McAfee School of Theology, a Baptist-affiliated seminary in Atlanta, until his death in 2005.

In 1979, Claypool became the first Southern Baptist minister to deliver the Lyman Beecher Lectures at Yale University. In the 1960s, he also appeared regularly on a weekly radio program called The Moral Side of the News.

Another of the young pastors deeply influenced by Claypool is Charles Johnson, who today leads the public-school advocacy group Pastors for Texas Children. Johnson was called to serve alongside Claypool as youth minister at Northminster and later followed him as pastor at Second Baptist Church in Lubbock.

Claypool played a pivotal role in his life and ministry, said Johnson, who is one of the organizers of the September symposium.

In addition to Shoemaker, Johnson and Aaron Weaver, other presenters at the symposium will include Kevin Cosby, president of Simmons College of Kentucky; Douglas Weaver of Baylor University; Alan Culpepper, former dean at McAfee; John W. Arnett, member of Crescent Hill Baptist Church; Glenn Jonas of Campbell University; Mark LaGory, deacon at St. Lukes Episcopal Church in Birmingham; Henry Parsley, Episcopal bishop of Alabama; Rowan Claypool, John Claypools son; Loyd Allen of McAfee School of Theology; Julie Whidden Long of McAfee; Carolyn Ratliff of Birmingham; and Bill Leonard, former dean of Wake Forest University School of Divinity.

Read more here:

September symposium will celebrate life and legacy of John Claypool - Baptist News Global

Space Jam Is Now Streaming on Netflix – ComicBook.com

Come on and slam, and welcome to the jam:Space Jamis now streaming on Netflix. The 1996 hybrid live-action and animated film, which teams NBA superstar Michael Jordan with Bugs Bunny and an all-star squad of Looney Tunes, is part ofAugust's lineup of Netflix movies. After having a blockbuster month in July with the release of Netflix originalsStranger Things Season 4: Volume 2and new movieThe Gray Man, the streamer is taking things into overtime with vampire comedyDay Shiftand Neil Gaiman'sThe Sandmanseries. Netflix is also adding throwback favorites from the '90s and 2000s, including the Men in Black trilogy and the original Spider-Man trilogy.

Space Jam '96 remains available to watch on HBO Max along with its sequel, 2021's Space Jam: A New Legacy, starring LeBron James and Don Cheadle.

When alien amusement park owner Swackhammer (voice of Danny DeVito) challenges the Looney Tunes to a high-stakes intergalactic game of basketball, Bugs Bunny (voice of Billy West) recruits Michael Jordan (himself) to help the Tune Squad take on the Monstars.Space Jamfeatures a cast that includes Wayne Knight, Theresa Randle, Bill Murray, and NBA players Patrick Ewing, Larry Johnson, Muggsy Bogues, Shawn Bradley, and Charles Barkley.

See the full list of every movie and TV title coming to Netflix in August below.

28 Days8 MileAbove the RimThe Age of AdalineBattle: Los AngelesBridget Jones's BabyBridget Jones's DiaryConstantineDinner for SchmucksEyes Wide ShutFerris Bueller's Day OffFootloose (2011)Hardcore HenryLegends of the FallLove & BasketballMade of HonorMen in BlackMen in Black 3Men in Black IIMiss CongenialityMonster-in-LawNo Strings AttachedPawn Stars: Season 13Polly Pocket: Season 4: Part 2: Tiny Taste AdventureShe's Funny That WaySpace Jam (1996)Spider-ManSpider-Man 2Spider-Man 3Top Gear: Season 29-30The TownWoman in Gold

Big Tree City -- NETFLIX FAMILYA team of animal heroes with special skills and speedy vehicles work together to keep Big Tree City safe and solve the town's trickiest problems.

Flight

Ricardo Quevedo: Tomorrow Will Be Worse -- NETFLIX COMEDY SPECIALFrom road rage to couples fighting during the pandemic, comic Ricardo Quevedo examines the absurdity of the situations that try our patience.

Buba -- NETFLIX FILMWhen a small-town con artist joins the local mafia with his manipulative brother, his obsession with balancing his karma gets hilariously brutal.

Clusterf**k: Woodstock '99 -- NETFLIX DOCUMENTARYWoodstock 1969 promised peace and music, but its '99 revival delivered three days of rage, riots and real harm. Why did it go so horribly wrong?

Don't Blame Karma! -- NETFLIX FILMWhen her model sister and high-school crush start dating, fashion designer Sara must decide whether her alleged bad luck is the real culprit behind this.

Good Morning, Vernica: Season 2 -- NETFLIX SERIESPresumed to be dead, Vernica works to unravel the mysteries of the religious cult that fuels abuse and corruption within the government.

Lady Tamara -- NETFLIX SERIESThe glamorous life of socialite Tamara Falc takes center stage in this reality series as she balances work, play and her famous family.

KAKEGURUI TWIN -- NETFLIX ANIMEDetermined to climb up the social ladder, Mary Saotome invests everything she has into what her elite high school values most: high stakes gambling.

Super Giant Robot Brothers -- NETFLIX FAMILYOnce the squabbling stops, the battling begins! Robot siblings Shiny and Thunder and their whiz inventor must defend Earth when space monsters attack.

Wedding Season -- NETFLIX FILMUnder parental pressure to find spouses, Asha and Ravi pretend to date during a summer of weddings but their ruse goes awry when feelings turn real.

Carter -- NETFLIX FILMA man wakes up missing his memories. Directed by a mysterious voice from a device in his ear, he sets off on a hostage rescue mission rife with danger.

Darlings -- NETFLIX FILMBadru hopes her volatile husband will reform if he stops drinking. But when his rage goes too far, she and her mom boldly, albeit clumsily, seek revenge.

The Informer

Rise of the Teenage Mutant Ninja Turtles: The Movie -- NETFLIX FILMThe teen turtles and their mystic ninja powers are put to the ultimate test when ruthless creatures from another universe look to unleash extreme chaos.

The Sandman -- NETFLIX SERIESAfter years of imprisonment, Morpheus the King of Dreams embarks on a journey across worlds to find what was stolen from him and restore his power.

Skyfall

Reclaim -- NETFLIX FILMShouldering all of her family's responsibilities, a mother scrambles to find a bigger apartment for her suddenly crowded household.

Riverdale: Season 6 (August 7)

Code Name: Emperor -- NETFLIX FILMAn intelligence agent tasked with incriminating a squeaky-clean politician must decide if there are still some lines he won't cross.

Team Zenko Go: Season 2 -- NETFLIX FAMILYRunaway robo-dogs, sleepwalking uncles and troublesome tots! These kid heroes in hiding are finding more ways to help around the town of Harmony Harbor.

I Just Killed My Dad -- NETFLIX DOCUMENTARYI Just Killed My Dad is an unprecedented documentary series, which tells the unbelievable, never-been-told-before true story of the Templet family. Anthony Templet shot his father and never denied it. But why he did it is a complex question with profound implications that go far beyond one family. This three-episode documentary series explores the psyche of Anthony leading up to the events of June 3, 2019 and the journey of his mental and emotional aftermath.

The Nice Guys

Bank Robbers: The Last Great Heist -- NETFLIX DOCUMENTARYThrough candid interviews, the perpetrators of Argentina's most notorious bank heist detail how and why they carried out the radical 2006 operation.

Heartsong -- NETFLIX FILMWhile serenading a wedding that quickly implodes, a nomadic musician falls for the bride, who runs afoul of her family. Now he has to save her life.

Indian Matchmaking: Season 2 -- NETFLIX SERIESSima Taparia, everyone's favorite matchmaker, returns for another season of helping eligible, eccentric and eager clients find their future spouses.

Instant Dream Home -- NETFLIX SERIESA team of rapid-fire renovators takes big risks and makes painstaking plans to transform families' homes from top to bottom in just 12 hours.

Iron Chef Brazil -- NETFLIX SERIESWelcome to Iron Chef Brazil! In this cooking competition, rising culinary talents battle Brazil's greatest chefs for a chance to be named Iron Legend.

Locke & Key: Season 3 -- NETFLIX SERIESIn the thrilling final chapter of the series, the Locke family uncovers more magic as they face a demonic new foe who's dead-set on possessing the keys.

School Tales The Series -- NETFLIX SERIESUnspeakable horrors roam the halls of high school in this anthology featuring ghost stories directed by seasoned Thai horror directors.

Dope

DOTA: Dragon's Blood: Book 3 -- NETFLIX ANIMEThe time has come for brave warriors to conquer an indomitable foe. But can the ultimate sacrifice bring lasting peace to all possible worlds?

Stay on Board: The Leo Baker Story -- NETFLIX DOCUMENTARYFrom Netflix, Pulse Films, a division of VICE Media Group, and Flower Films comes a raw and immersive feature film that follows competitive skateboarding icon Leo Baker in the lead up to the 2020 Olympics. As he faces the sharpening stakes and intensifying disconnect between how the world sees him and who he knows himself to be, the pressure to keep on the course or be true to himself comes to a career and life-defining turning point. Stay on Board is Leo's journey balancing the gendered world of sports, transition, society, and skate culture, which ultimately leads him to the punkest thing imaginable.

13: The Musical -- NETFLIX FILMAfter moving from New York to Indiana in the wake of his parents' divorce, a clever middle schooler is determined to throw the best bar mitzvah ever.

A Model Family -- NETFLIX SERIESAfter unwittingly stealing money from a cartel, a cash-strapped professor finds the only way to save his broken family is by working as a drug courier.

Day Shift -- NETFLIX FILMJamie Foxx stars as a hard working blue collar dad who just wants to provide a good life for his quick-witted daughter, but his mundane San Fernando Valley pool cleaning job is a front for his real source of income, hunting and killing vampires as part of an international Union of vampire hunters.

Never Have I Ever: Season 3 -- NETFLIX SERIESDevi and her friends may finally be single no more. But they're about to learn that relationships come with a lot of self-discovery and all the drama.

Ancient Aliens: Season 4

Deepa & Anoop -- NETFLIX FAMILYJoined by her color-changing pet elephant, a joyful little girl creates music, merriment and mischief at her Indian family's Mango Manor hotel.

Learn to Swim

UNTOLD: The Girlfriend Who Didn't Exist (2 Parts)Born into a Hawaiian paradise, All-American football standout Manti Te'o leads a simple life summed up in just three words: faith, family, football. College football's golden boy could do no wrong, but when tragedy strikes, the increased scrutiny of his online relationship causes a media maelstrom that threatens his future and legacy. Featuring in-depth interviews with Manti Te'o and the person behind the online identity, Ronaiah 'Naya' Tuiasosopo. Directed by Ryan Duffy and Tony Vainuku.

High Heat -- NETFLIX SERIESWhen clues to his brother's murder lead Poncho to a fire brigade, he joins it to investigate further and finds romance, family... and a serial killer.

Junior Baking Show: Season 6 -- NETFLIX SERIESBritain's most talented young bakers wow judges with cakes, biscuits, breads and more in this kid-focused spinoff of "The Great British Baking Show."

Look Both Ways -- NETFLIX FILMOn the night of her college graduation, Natalie's life splits into parallel realities after she takes a pregnancy test. What will life and love bring?

Royalteen -- NETFLIX FILMA teenager struggles to keep her scandal-ridden past and a big secret from getting out when she strikes up an unlikely romance with the crown prince.

Unsuspicious -- NETFLIX SERIESConned by the same playboy, three women and their families go to his mansion to get answers and must stay for an investigation when he's found dead.

He-Man and the Masters of the Universe: Season 3 -- NETFLIX FAMILYWith Skeletor intent on controlling the universe, He-Man and his heroic squad must fulfill their destinies. The epic battle for ultimate power is on!

Inside the Mind of a Cat -- NETFLIX DOCUMENTARYCat experts dive into the mind of the feline to reveal the true capabilities of the pouncing pet in this captivating and cuddly documentary.

Tekken: Bloodline -- NETFLIX ANIMEAfter losing his home to a powerful enemy, a hot-tempered fighter trains under his zealous grandfather while awaiting his chance for revenge.

The Cuphead Show!: Part 2 -- NETFLIX FAMILYFollow the misadventures of the impulsive Cuphead and his easily swayed brother Mugman in this animated series based on the hit video game.

Echoes -- NETFLIX SERIESIdentical twins Leni and Gina have secretly swapped lives since they were children. But their world is thrown into disarray when one sister goes missing.

The Girl in the Mirror (Alma) -- NETFLIX SERIESAfter losing her memory in a bizarre accident that kills most of her classmates, Alma tries to unravel what happened that day and regain her identity.

Glow Up: Season 4 -- NETFLIX SERIESTen new contestants test the limits of their creativity as they tackle a variety of challenges in hopes of becoming the next big name in makeup.

Kleo -- NETFLIX SERIESAfter the fall of the Berlin Wall, a former East German spy resolves to find out who betrayed her and why and use her lethal skills to exact revenge.

The Next 365 Days -- NETFLIX FILM

Fullmetal Alchemist The Revenge of Scar -- NETFLIX FILMIn this sequel to the first feature film, the Elric brothers meet their toughest opponent yet a lone serial killer with a large scar on his forehead.

A Cowgirl's Song (August 21)

Chad and JT Go Deep -- NETFLIX SERIESBest bros Chad and JT set out to spread positivity through community activism and chill vibes in this raucous prank comedy series.

Untold: The Rise and Fall of AND1 -- NETFLIX DOCUMENTARY (New episodes weekly)Born out of the playgrounds of New York City, the "And 1 Mixtape Tour" took streetball to the masses, challenging convention and picking up a team of basketball misfits along the way. "The Rise and Fall of AND1" traces the journey of how three young friends with a dream of bringing greater acclaim to the game they loved, connected with the underground artform of streetball, and ended up flipping the billion-dollar basketball industry on its head. AND1 co-founders along with streetball legends The Professor, Hot Sauce, Skip 2 My Lou, The Main Event, Shane the Dribbling Machine and more reflect on their experience and the brand's journey. Directed by Kevin Wilson Jr.

Lost Ollie -- NETFLIX SERIESA toy searches the countryside for the young boy who lost him in this family series inspired by the book "Ollie's Odyssey."

Mo -- NETFLIX SERIESIn Texas, Mo straddles the line between two cultures, three languages and a pending asylum request while hustling to support his Palestinian family.

Queer Eye: Brazil -- NETFLIX SERIESThe uplifting makeover series hits Brazil with a new Fab Five and more courageous journeys of transformation along with lots of tears and laughs.

Running with the Devil: The Wild World of John McAfee -- NETFLIX DOCUMENTARYHe's the original computer genius gone rogue, inventor of one of the most successful (and most hated) pieces of software of all time: McAfee Anti-Virus. At his peak, John McAfee was worth $100 million. But when his neighbour was murdered, McAfee went on the run and invited a film crew with him. With access to hundreds of hours of never-before-broadcast footage of McAfee as he was pursued by the authorities, this is the definitive story of a larger-than-life character, a man who ran for President, escaped from prison multiple times, and claimed to have hacked the world.

Selling The OC -- NETFLIX SERIESThe Oppenheim Group expands to Orange County, where an all-new real estate team shows off lavish oceanfront listings and big personalities make waves.

Under Fire -- NETFLIX SERIESAt East Bank Station, a close-knit team of firefighters must balance a dangerous, high-stress job, personal challenges and professional setbacks.

Watch Out, We're Mad -- NETFLIX FILMIn this reboot of the 1970s Bud Spencer and Terence Hill film, two brothers estranged for 25 years reunite to reclaim their father's beloved dune buggy.

Angry Birds: Summer Madness: Season 3 -- NETFLIX FAMILYTeen birds Red, Chuck, Bomb and Stella are crashing through Camp Splinterwood with their fellow feathered campers for a summer of high-flying hijinks!

History 101: Season 2 -- NETFLIX DOCUMENTARYThe bite-size history lessons return, this time to investigate psychedelic drugs, weaponized lasers and even bottled water.

Rilakkuma's Theme Park Adventure -- NETFLIX ANIMECuddly bear Rilakkuma and his lovable friends have a day full of adventure at a sweets-themed amusement park that's about to close its doors forever.

That's Amor -- NETFLIX FILMAfter her job and relationship implode on the same day, Sofia starts from scratch and meets a dashing Spanish chef who might be her missing ingredient.

Disobedience

Drive Hard: The Maloof Way -- NETFLIX SERIESLegendary racer Sammy Maloof and his family of racers and stunt drivers build the world's baddest cars to make sure their clients take the checkered flag on race day. And when the racing dust settles, the Maloofs pull back the curtain on professional stunt driving as they practice and execute the most action-packed feats imaginable.

Loving Adults -- NETFLIX FILMThe thin line between love and hate turns deadly when a wife discovers her husband's affair and they both take extreme measures to get what they want.

Ludik -- NETFLIX SERIESTo save a kidnapped family member, an enterprising furniture tycoon must use his secret diamond smuggling operation to transport guns across the border.

Me Time -- NETFLIX FILMWhen a stay-at-home dad finds himself with some "me time" for the first time in years while his wife and kids are away, he reconnects with his former best friend for a wild weekend that nearly upends his life.

Seoul Vibe -- NETFLIX FILMIn the days leading up to the 1988 Seoul Olympics, a ragtag team of drivers and mechanics go undercover to dismantle a massive money-laundering ring.

Under Her Control -- NETFLIX FILMAn ambitious young woman enters into an unusual arrangement with her charismatic boss. By the time doubts creep in, it may be too late to back out.

Mighty Express: Season 7 -- NETFLIX FAMILYNate, Flicker and the rest of the trains raise the rails for more thrilling deliveries, special missions and lighthearted lessons on the track.

I AM A KILLER: Season 3 -- NETFLIX DOCUMENTARYWhile serving hard time for murder, inmates recount their crimes and reflect on how their actions destroyed lives including their own.

Untold: Operation Flagrant Foul -- NETFLIX DOCUMENTARY (New episodes weekly)In the summer of 2007, news broke that an NBA referee was being investigated for gambling on his own games, igniting a media storm and sending the NBA, FBI and sports fans into crisis. That referee was Tim Donaghy and the story didn't just start and end with him, but wound its way from the small town bookies of the Philadelphia suburbs to lining the pockets of the notorious New York crime families and worldwide sports gambling underworld. For the first time, all three co-conspirators discuss their involvement and, unsurprisingly, their stories don't all line-up. Featuring revealing sit-down interviews with Tim Donaghy, Tommy Martino, Jimmy "The Sheep" Battista plus FBI agent Phil Scala, Donaghy's lawyer John Lauro, Donaghy's ex-wife Kim Strupp Donaghy, and more. Directed by David Terry Fine.

Club Amrica vs Club Amrica -- NETFLIX DOCUMENTARYThis docuseries depths into the past and present of America, the most winning and controversial soccer club in Mexico.

Family Secrets -- NETFLIX SERIESA couple's wedding day threatens to turn disastrous when they begin to unravel a web of secrets and lies that connects their two families.

I Came By -- NETFLIX FILMA graffiti artist who targets homes of the elite uncovers a twisted secret in a hidden basement triggering events that put his loved ones in danger.

Link:

Space Jam Is Now Streaming on Netflix - ComicBook.com

What Is Litecoin? How Does It Work? Forbes Advisor

Editorial Note: We earn a commission from partner links on Forbes Advisor. Commissions do not affect our editors' opinions or evaluations.

While you might not see Litecoin (LTC) in headlines nearly as often as Bitcoin (BTC), its still one of the most popular cryptocurrencies. Its also the oldest crypto after Bitcoin.

As its name suggests, Litecoin was originally created to improve several of Bitcoins perceived shortcomings, such as slow transaction processing speeds and mining monopolies. LTC is built to be used in everyday transactions, whereas Bitcoin has evolved into more of a store of value.

Created by former Google engineer Charlie Lee, Litecoin was one of the first altcoinsa name given to cryptocurrencies other than Bitcoin (and sometimes other than Ethereum).

Litecoin is the second-oldest cryptocurrency, forked from the Bitcoin protocol in 2011, says Jay Blaskey, digital currency specialist at BitIRA. It was engineered to be used for fast, secure and low-cost payments. Think of it as a Bitcoin spinoff.

The goal in launching Litecoin was to improve on Bitcoin in a few different ways. For one, Lee developed a new hashing algorithm for Litecoin called Scrypt (pronounced S-crypt). The simpler algorithm supported Litecoins faster transaction speeds. Bitcoin has a slow transaction processing speed of roughly five transactions per second. Generating new blocks on the Bitcoin blockchain can take about 10 minutes.

This slow transaction speed frustrates merchants who want to accept Bitcoin as payment. You can wait up to an hour, on average, for the six confirmations required for a Bitcoin transaction. Imagine buying something online using a credit card and being on that your transaction is processing screen for an entire hour.

Litecoins transaction processing speed, on the other hand, is 54 per secondand new blocks on the Litecoin blockchain can be created about every 2.5 minutes. While Litecoin still requires a minimum of six confirmations from most exchanges to be considered irreversible, peer-to-peer (P2P) crypto payment networks can often settle Litecoin transactions almost immediately.

The improved transaction speed was meant to prove to merchants that they no longer had to be frustrated by Bitcoins long settlement time. Instead, they could accept Litecoin and settle payments faster and, therefore, conduct business more quickly and at speeds more on par with other digital payment methods.

Featured Partner Offers

Limited Time Offer:

Deposit $100 get $10 (US Only)

Cryptocurrencies Available for Trade

20+

Fees (Maker/Taker)

0.40%/0.40%

Cryptocurrencies Available for Trade

170+

Fees (Maker/Taker)

0.95%/1.25%

Cryptocurrencies Available for Trade

150+

Litecoin shares several similarities with Bitcoin. Both are open-source projects that use proof of work to verify transactions.

But Litecoin has some notable differences from Bitcoin, too. Besides processing speed, theres the issue of supply. While Bitcoin is capped at a maximum supply of 21 million coins, Litecoin is capped at 84 million coins.

Litecoin miners solve complex mathematical problems called hashes to earn the right to record new transactions to the blockchain.

The blockchain cannot be altered once a block is closed. As a reward for being the first miner to correctly solve the hash associated with a transaction via the proof of work consensus mechanism, the miner receives 12.5 LTC.

Litecoin mining operations arent something youll typically see running on a computer out of someones living room. Solving hashes requires immense computing power, which requires significant energy and space.

In fact, the lions share of Litecoin mining is performed by mining farms and pools of crypto miners using sophisticated hardware.

To help control Litecoins supply, Litecoin halves just like Bitcoin.

Litecoins supply is capped at 84 million coins. Yet when miners add a new block to Litecoins blockchain, theyre rewarded with newly-generated LTC. This could indefinitely increase the supply of Litecoin if it werent for halving.

Through halving, the miner reward for successfully recording new blocks to the Litecoin blockchain is decreased (halved) at regular intervals. In Litecoins case, its every 840,000 transactions. So when Litecoin first launched, the miner reward for adding a new block to Litecoins blockchain was 50 LTC. Over the past few years, that reward has decreased via halving to 12.5 LTC as a block award.

The next LTC halving is expected to happen in 2023.

Litecoin is highly liquid, which makes it a crypto for easier trades. In fact, Litecoin holders will find that merchants such as Newegg, SlingTV and even nonprofits like the American Red Cross are happy to accept their cryptocurrency.

You can also use digital currency apps like BitPay or CryptoPay to make a payment using LTC. If you want to use LTC for P2P payments, you can use the Binance app to pay someone with LTC.

From the get-go, without any additional tech layers added on top of the Litecoin blockchain, its a faster cryptocurrency to transact than Bitcoin, and it does so more cheaply.

At the time of this writing, Bitcoin transaction fees were significantly higher, at around 3.92% on average, compared with Litecoins transaction fees of roughly 0.06%.

In 2017, Litecoin creator Charles Lee divested himself of most of his Litecoin holdings, citing a conflict of interest, and Lees action caused some loss of faith in the crypto.

Something that caught the investors eye and had an impact on the investors confidence is that in 2017, Charles Lee, Litecoins founder, has sold his stake in Litecoin, says Claudiu Minea, CEO and co-founder of SeedOn, a blockchain-based crowdfunding platform.

While designed to have a faster TPS than Bitcoin, Carlos Gonzlez Campo, research analyst at 21Shares, says, Layer-2 solutions on top of Bitcoin like the Lightning Network have both sped up Bitcoin transactions and potentially diminished the need for Litecoins use case as a faster payment network.

There are also newer cryptocurrencies with faster TPS speeds. These include EOS at 4,000 TPS, XRP at 1,500 TPS and Cardano at 257 TPS, to name just a few.

While Litecoin remains one of the most-traded cryptocurrencies, does it make for a sound crypto investment?

Blaskey of BitIRA says that Litecoin might be a fit for a seasoned cryptocurrency investors portfolio who appreciate its staying value and flexibilityespecially those who want a combination store-of-value asset with the side benefit of convenient transactions.

Litecoin could be a decent place to place a small stake to get used to the ins and outs of crypto trading for the newer crypto investor, some experts say.

On whether LTC is a good choice for your wallet, Minea surmises, There are other blockchain competitors that people can choose from, however, Litecoin still remains a relevant choice.

Before you invest in Litecoin, learn how to buy Litecoin and read up on cryptocurrency wallets. Speak with a financial advisor about how much you could realistically invest in cryptocurrency based on your unique financial goals.

Link:

What Is Litecoin? How Does It Work? Forbes Advisor