-
Spyware as Service: What the i-Soon Files Reveal About China’s Targeting of the Tibetan Diaspora
Governments are increasingly incorporating cyber operations into the arsenal of statecraft. This sophisticated integration combines open-source intelligence, geospatial intelligence, human intelligence, and cyber espionage with artificial intelligence, allowing for the gathering and analysis of ever-expanding data sets. Increasingly, such operations are being outsourced.
-
-
Israel’s Cybersecurity Market is Maturing, and Just in Time
As tensions around the world rise and cyber threats multiply like digital rabbits, the Israeli cyber scene’s maturation seems like a saving grace.
-
-
Key Weapons Component Development Milestone
Sandia and the Kansas City National Security Campus completed a crucial weapons component development milestone, prior to full rate production. The Mark 21 Replacement Fuze interfaces with the W87-0 warhead for deployment onto the Minuteman III and, eventually, the Sentinel ICBM.
-
-
Australia’s Leadership Imperatives in Critical Minerals
Australia, like Canada, is well placed to be a global leader in the critical minerals sector. The country has the natural endowment, technical expertise and experience, global mining footprint, and mining capital base to back a claim to worldwide leadership.
-
-
A More Efficient Way to Extract Lithium from Mining Sites, Oil Fields, Used Batteries
Lithium is a lightweight metal commonly used in energy-dense and rechargeable batteries. Electric vehicles, which are needed to achieve net-zero emissions by 2050, rely on lithium-ion batteries. Chemists have invented a more efficient way to extract lithium from waste liquids leached from mining sites, oil fields and used batteries.
-
-
From Florida Floods to Idaho Desert: Understanding Impacts of Flood Damage on Vehicle Batteries
Electric vehicles offer some clear advantages over gasoline-power cars including zero emissions and lower operation and maintenance costs. But they also present some new challenges. Recent storms have revealed that seawater-flooded EVs can pose safety concerns for passengers, emergency responders and recovery personnel.
-
-
Subterranean Storage of Hydrogen
Hydrogen is an important clean fuel: It can be made by splitting water using solar or wind power, it can be used to generate electricity and to power heavy industry, and it could be used to energize fuel-cell-based vehicles. Sandia scientists are using computer simulations and laboratory experiments to see if depleted oil and natural gas reservoirs can be used for storing this carbon-free fuel.
-
-
Accelerating Research and Development for a Secure Water Future
Water and energy are interdependent – water is used to produce nearly every major energy source, and energy is critical to transporting and treating water. A research consortium will continue to lead a DOE desalination hub to drive innovation for sustainable water security.
-
-
Gaza War: Israel Using AI to Identify Human Targets Raising Fears That Innocents Are Being Caught in the Net
A new report finds that AI targeting systems have played a key role in identifying – and potentially misidentifying – tens of thousands of targets in Gaza. This suggests that autonomous warfare is no longer a future scenario. It is already here and the consequences are horrifying.
-
-
A New Way to Detect Radiation Involving Cheap Ceramics
The radiation detectors used today for applications like inspecting cargo ships for smuggled nuclear materials are expensive and cannot operate in harsh environments, among other disadvantages. Work by MIT engineers could lead to plethora of new applications, including better detectors for nuclear materials at ports.
-
-
Artificial Intelligence and Critical Infrastructure
What is the technology availability for AI applications in critical infrastructure in the next ten years? What risks and scenarios (consisting of threats, vulnerabilities, and consequences) is AI likely to present for critical infrastructure applications in the next ten years?
-
-
Tech War: China Could Face U.S., EU Curbs Over Legacy Chips Dominance
Legacy chips, used in everything from washing machines to cars and TVs to medical devices, may not be as powerful as the state-of-the-art semiconductors that power artificial intelligence (AI) platforms. But they’re a growing headache for the United States and European Union: After the United States cut China’s access to cutting-edge chips, the EU and the United States are concerned about the country’s dominance of semiconductors used in everyday technology.
-
-
Deepfake Defense Tech Ready for Commercialization
The threat of manipulated media has steadily increased as automated manipulation technologies become more accessible, and social media continues to provide a ripe environment for viral content sharing. The speed, scale, and breadth at which massive disinformation campaigns can unfold require computational defenses and automated algorithms to help humans discern what content is real and what’s been manipulated or synthesized, why, and how.
-
-
New Geo-Tracking Buoys Make a Splash During Live Test Events
New rugged buoy technologies equipped with Automatic Identification Systems aim to help the U.S. Coast Guard mark and track objects in the water.
-
-
Top Computer Scientists: The Future of Artificial Intelligence Is Similar to That of Star Trek
Leading computer scientists from around the world have shared their vision for the future of artificial intelligence – and it resembles the capabilities of Star Trek character ‘The Borg’.
-
More headlines
The long view
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.
Prototype Self-Service Screening System Unveiled
TSA and DHS S&T unveiled a prototype checkpoint technology, the self-service screening system, at Harry Reid International Airport (LAS) in Las Vegas, NV. The aim is to provide a near self-sufficient passenger screening process while enabling passengers to directly receive on-person alarm information and allow for the passenger self-resolution of those alarms.
Falling Space Debris: How High Is the Risk I'll Get Hit?
An International Space Station battery fell back to Earth and, luckily, splashed down harmlessly in the Atlantic. Should we have worried? Space debris reenters our atmosphere every week.
Testing Cutting-Edge Counter-Drone Technology
Drones have many positive applications, bad actors can use them for nefarious purposes. Two recent field demonstrations brought government, academia, and industry together to evaluate innovative counter-unmanned aircraft systems.
Strengthening the Grid’s ‘Backbone’ with Hydropower
Argonne-led studies investigate how hydropower could help add more clean energy to the grid, how it generates value as grids add more renewable energy, and how liner technology can improve hydropower efficiency.
The Tech Apocalypse Panic is Driven by AI Boosters, Military Tacticians, and Movies
From popular films like a War Games or The Terminator to a U.S. State Department-commissioned report on the security risk of weaponized AI, there has been a tremendous amount of hand wringing and nervousness about how so-called artificial intelligence might end up destroying the world. There is one easy way to avoid a lot of this and prevent a self-inflicted doomsday: don’t give computers the capability to launch devastating weapons.
The Tech Apocalypse Panic is Driven by AI Boosters, Military Tacticians, and Movies
From popular films like a War Games or The Terminator to a U.S. State Department-commissioned report on the security risk of weaponized AI, there has been a tremendous amount of hand wringing and nervousness about how so-called artificial intelligence might end up destroying the world. There is one easy way to avoid a lot of this and prevent a self-inflicted doomsday: don’t give computers the capability to launch devastating weapons.