• Making the Power Grid More Reliable and Resilient

    The U.S. power grid comprises nearly 12,000 power plants, 200,000 miles of high-voltage transmission lines, 60,000 substations and 3 million miles of power lines. It may well be the most massive and complex machine ever assembled. Argonne National Labs’ researchers help keep this machine working in the face of daunting challenges.

  • Six Pressing Questions We Must Ask About Generative AI

    The past twenty-five years have demonstrated that waiting until after harms occur to implement internet safeguards fails to protect users. The emergence of Generative Artificial Intelligence (GAI) lends an unprecedented urgency to these concerns as this technology outpaces what regulations we have in place to keep the internet safe.

  • Lessons from ‘Star Trek: Picard’ – a Cybersecurity Expert Explains How a Sci-Fi Series Illuminates Today’s Threats

    Sometimes Hollywood gets it right by depicting reality in ways that both entertain and educate. And that’s important, because whether it’s a large company, government or your personal information, we all share many of the same cybersecurity threats and vulnerabilities. As a former cybersecurity industry practitioner and current cybersecurity researcher, I believe the final season of “Star Trek: Picard” is the latest example of entertainment media providing useful lessons about cybersecurity and the nature of the modern world.

  • Making Electric Vehicle Charging Stations Cybersecure

    As more electric vehicles (EVs) hit the road, charging stations are popping up across the United States. The benefits go beyond curbing carbon emissions from road travel. These systems can also link to the electric grid through smart charging, drawing power when overall demand is low and feeding it back to the grid when needed.

  • Research Shows How Terrorism Affects Our Language and Voting Patterns

    Following the series of terrorist attacks between 2015 and 2017, German twitter users shifted their language towards that of the far right AfD party. Eventually voters rewarded the party at the 2017 election.

  • Quantum Cryptography Applications

    The development of quantum computing means that the use of classic cryptography for secure communications is in danger of becoming obsolete. Quantum cryptography, on the other hand, uses the laws of quantum mechanics to ensure total security. One example of this is quantum key distribution, which enables two parties to secure a message via a random secret key.

  • Cybersecurity Goes Undercover to Protect Electric-Grid Data

    Researchers, inspired by one of the mysteries of human perception, invented a new way to hide sensitive electric grid information from cyberattack: Within a constantly changing color palette.

  • Are We Asking Too Much of Cyber?

    Both cyber enthusiasts and skeptics may be asking too much of cyber. “U.S. cyber strategies should be more explicit about articulating not only the strategic benefits cyberspace offers but also its limitations,” Erica Lonegran and Michael Poznansky write. “More realism about cyberspace may help leaders truly integrate cyber capabilities.”

  • Using Quantum Physics to Secure Wireless Devices

    From access cards and key fobs to Bluetooth speakers, the security of communication between wireless devices is critical to maintaining privacy and preventing theft. Unfortunately, these tools are not foolproof and information on how to hack, clone and bypass these systems is becoming easier to find.

  • CCP’s Increasingly Sophisticated Cyber-enabled Influence Operation

    Last week DOJ announced police officers from China’s Ministry of Public Security (MPS) created thousands of fake online personas on social media sites to target Chinese dissidents through online harassment and threats. The announcement marked the first definitive public attribution to a specific Chinese government agency of covert malign activities on social media. The MPS, however, is one of many party-controlled organizations that analysts have long suspected of conducting covert and coercive operations to influence users on social media.

  • The Key to Securing Legacy Computing Systems

    For a cyber-attack to be successful, one must conduct a sequence of exploits to move from the initial system access, through privilege escalation and lateral motion steps, until reaching the ultimate target. DARPA is pursuing an approach to cyber resilience that would subdivide software systems into smaller, secure compartments that prevent an initial attempt at penetration from becoming a successful attack.

  • “Smart” Tech Coming to a City Near You

    The data-driven smart tech trend extends far beyond our kitchens and living rooms. Will real-time sensors and data offer new solutions to the challenges cities face, or just exacerbate existing inequalities?

  • U.S.-China Tech Competition Expands to AI Regulations

    Competition between the U.S. and China in artificial intelligence has expanded into a race to design and implement comprehensive AI regulations. The efforts to come up with rules to ensure AI’s trustworthiness, safety, and transparency come at a time when governments around the world are exploring the impact of the technology on national security and education.

  • The Liberal Cyber Order

    Grand strategy is a theory of security, a logical narrative about how states employ the instruments of national power to make themselves safe. States may choose from a variety of grand strategies. Joshua Rovner writes that two grand strategies are particularly important to the current U.S. debate: restraint and liberal internationalism. Last month the Biden administration released its National Cybersecurity Strategy, which offers a full display of the foundations of liberal internationalism. This is surprising, since Joe Biden’s approach to national security has always blended liberal ideals with realist restraint.

  • The 2020 Election Saw Fewer People Clicking on Misinformation Websites: Study

    Stanford scholars find a smaller percentage of Americans visited unreliable websites in the run-up to the 2020 U.S. election than in 2016 – which suggests mitigation and education efforts to identify misinformation are working.