Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Defense Dept. Jumps On Climate Change Research

DOD says poor intelligence on the negative effects of climate change poses a national security threat.

50 Most Influential Government CIOs
Slideshow: 50 Most Influential Government CIOs
(click image for larger view and for slideshow)
The Department for Defense (DOD) is calling for a better system for collecting and analyzing data related to climate change in order to make more accurate forecasts about the world's changing weather patterns.

A report by the DOD's Defense Science Board task force calls for the creation of a "climate information system" that will gather intelligence from multiple agencies and experts both inside and outside the federal government, and allow that information to be used to forecast and mitigate the negative effects of climate change.

"The current collection of observational and model assets while important for conducting exploratory climate science do not constitute a robust, sustained, or comprehensive resource for generating actionable climate forecasts," according to the report.

Doing so requires collaboration and information sharing between multiple agencies, including the National Oceanic and Atmospheric Administration, NASA, the U.S. Geological Survey, the CIA, and the departments of Agriculture, Defense, Energy, and State, as well as private-sector climate researchers and experts.

Indeed, climate-change research is already for a priority for agencies like NASA and NOAA, which are using advanced technology such as satellites and supercomputers to study changes in Earth's weather and climate patterns.

[Supercomputers keep getting more powerful. Check out Top 10 Supercomputers: U.S. Still Dominates.]

The report lists attributes of the proposed climate information system, which the DOD would manage. Those characteristics include the collection of "reliable, sustained climate data" over decades, including observations and system models; minimal gaps in data collection and minimal service interruptions; a clearinghouse of data records that keep track of "essential climate variables"; and global data records.

Other attributes a system should have include decision support tools to "enable synthesis assessment and translation of climate data records" into metrics that have benefits to society; transparency and the ability to reproduce observational data, models, and decision support tools and analysis; and sustained support for ongoing climate research, according to the report.

The report identifies climate change as a very real problem that has broad socioeconomic implications across the globe. Therefore, finding a way to harness research being done to "manage the consequences" of climate change should be a priority for the U.S. government, according to the report.

"Changes in climate patterns and their impact on the physical environment can create profound effects on populations in parts of the world and present new challenges to global security and stability," DOD science panel co-chairs Gen. Larry Welch and Dr. William Howard wrote in a memo attached to the report. "Failure to anticipate and mitigate these changes increases the threat of more failed states with the instabilities and potential for conflict inherent in such failures."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4428
PUBLISHED: 2019-12-09
IBM Watson Assistant for IBM Cloud Pak for Data 1.0.0 through 1.3.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session....
CVE-2019-4611
PUBLISHED: 2019-12-09
IBM Planning Analytics 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 168519.
CVE-2019-4612
PUBLISHED: 2019-12-09
IBM Planning Analytics 2.0 is vulnerable to malicious file upload in the My Account Portal. Attackers can make use of this weakness and upload malicious executable files into the system and it can be sent to victim for performing further attacks. IBM X-Force ID: 168523.
CVE-2019-4621
PUBLISHED: 2019-12-09
IBM DataPower Gateway 7.6.0.0-7 throug 6.0.14 and 2018.4.1.0 through 2018.4.1.5 have a default administrator account that is enabled if the IPMI LAN channel is enabled. A remote attacker could use this account to gain unauthorised access to the BMC. IBM X-Force ID: 168883.
CVE-2019-19230
PUBLISHED: 2019-12-09
An unsafe deserialization vulnerability exists in CA Release Automation (Nolio) 6.6 with the DataManagement component that can allow a remote attacker to execute arbitrary code.