-
Protecting Sensitive Metadata So It Cannot Be Used for Surveillance
MIT researchers have designed a scalable system that secures the metadata of millions of users in communications networks, to help protect the information against possible state-level surveillance. The system ensures hackers eavesdropping on large networks cannot find out who is communicating and when they’re doing so.
-
-
U.S. Mine Produced $86.3 Billion in Minerals in 2019
U.S. mines produced approximately $86.3 billion in minerals in 2019 –- more than $2 billion higher than revised 2018 production totals. The U.S. continues to rely on foreign sources for some raw and processed mineral materials. In 2019, imports made up more than one-half of U.S apparent consumption for 46 nonfuel mineral commodities, and the U.S. was 100 percent net import reliant for 17 of those. The domestic production of critical rare-earth mineral concentrates increased by 8,000 metric tons (over 44 percent) in 2019 to 26,000 metric tons, making the U.S. the largest producer of rare-earth mineral concentrates outside of China.
-
-
New Technologies, Strategies Expanding Search for Extraterrestrial Life
Emerging technologies and new strategies are opening a revitalized era in the search for extraterrestrial intelligence (SETI). New discovery capabilities, along with the rapidly expanding number of known planets orbiting stars other than the Sun, are spurring innovative approaches by both government and private organizations.
-
-
New Center to Lead Counterterrorism, Terrorism Prevention Research
DHS S&T has awarded the University of Nebraska at Omaha a 10-year, $36 million grant to establish a DHS Center of Excellence (COE) for Terrorism Prevention and Counterterrorism Research (TPCR). TPCR will lead a consortium of academic, industry, government, and laboratory partners aiming to gain better understanding of terrorism and its sources, and help fashion effective counterterrorism policies.
-
-
Identifying the Greatest Risk to U.S. Mineral Resource Supplies
Policymakers and the U.S. manufacturing sector now have a powerful tool to help them identify which mineral commodities they rely on that are most at risk to supply disruptions. The risk tool identified 23 mineral commodities whose supply poses the greatest risk, including those used in consumer electronics, renewable energy, aerospace, and defense applications.
-
-
Climate Change Poses “High-to-Catastrophic” Security Threats to U.S. Security: Experts
A comprehensive report finds that plausible climate change trajectories pose “High-to-Catastrophic” threats to U.S. national security. An expert panel analyzed the globe through the lens of the U.S. Geographic Combatant Commands, and concluded that “Even at scenarios of low warming, each region of the world will face severe risks to national and global security in the next three decades. Higher levels of warming will pose catastrophic, and likely irreversible, global security risks over the course of the twenty-first century.”
-
-
A Human-Machine Collaboration to Defend Against Cyberattacks
Being a cybersecurity analyst at a large company today is a bit like looking for a needle in a haystack — if that haystack were hurtling toward you at fiber optic speed. PatternEx merges human and machine expertise to spot and respond to hacks.
-
-
Custom Circuits to Make IoT Systems 14,000 Times Harder to Crack than Current Tech
The “internet of things” (IoT) allows devices — kitchen appliances, security systems, wearable technologies and many other applications — to communicate with each other through networks. With the world on the verge of adopting them by the billions, the best possible security is paramount. Engineers have one-upped their own technique to increase security for the “internet of things.” In truth, their upping is far greater than one.
-
-
Emulating Snakes for Building Better Robots for Search-and-Rescue Missions
Snakes live in diverse environments ranging from unbearably hot deserts to lush tropical forests. But regardless of their habitat, they are able to slither up trees, rocks, and shrubbery with ease. Mechanical engineers design a snake robot based on the climbing technique of the kingsnake. The new design could help advance search-and-rescue technology.
-
-
Mixed-Signal Hardware Security Thwarts Powerful Electromagnetic Attacks
Security of embedded devices is essential in today’s internet-connected world. Security is typically guaranteed mathematically using a small secret key to encrypt the private messages. When these computationally secure encryption algorithms are implemented on a physical hardware, they leak critical side-channel information in the form of power consumption or electromagnetic radiation. Now, researchers have developed technology to kill the problem at the source itself – tackling physical-layer vulnerabilities with physical-layer solutions.
-
-
WWI Helmets Protect Against Shock Waves as Well as or Better than Modern Designs
Biomedical engineers have demonstrated that, despite significant advancements in protection from ballistics and blunt impacts, modern military helmets are no better at protecting the brain from shock waves created by nearby blasts than their First World War counterparts. And one model in particular, the French Adrian helmet, actually performed better than modern designs in protecting from overhead blasts.
-
-
How to Deflect an Asteroid
MIT researchers have devised a framework for deciding which type of mission would be most successful in deflecting an incoming asteroid. Their decision method takes into account an asteroid’s mass and momentum, its proximity to a gravitational keyhole, and the amount of warning time that scientists have of an impending collision — all of which have degrees of uncertainty, which the researchers also factor in to identify the most successful mission for a given asteroid.
-
-
Courtrooms Seldom Overrule Bad Science
In television crime dramas, savvy lawyers are able to overcome improbable odds to win their cases by presenting seemingly iron-clad scientific evidence. In real-world courtrooms, however, the quality of scientific testimony can vary wildly, making it difficult for judges and juries to distinguish between solid research and so-called junk science.
-
-
Tool Identifies Source of Errors Caused by Software Updates
We’ve all shared the frustration — software updates that are intended to make our applications run faster inadvertently end up doing just the opposite. These bugs, dubbed in the computer science field as performance regressions, are time-consuming to fix since locating software errors normally requires substantial human intervention. Researchers and computer scientists have designed a tool to identify the source of errors caused by software updates.
-
-
How I Hacked the Government (It Was Easier than You May Think)
Max Weiss, Harvard Class of 2020, never intended to hack the government. His discovery of how easy it is to do — outlined in a new paper he authored — came of the best of intentions. He used bots to show an agency its website vulnerability.
-
More headlines
The long view
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
A Brief History of Federal Funding for Basic Science
Biomedical science in the United States is at a crossroads. For 75 years, the federal government has partnered with academic institutions, fueling discoveries that have transformed medicine and saved lives. Recent moves by the Trump administration — including funding cuts and proposed changes to how research support is allocated — now threaten this legacy.
Bookshelf: Preserving the U.S. Technological Republic
The United States since its founding has always been a technological republic, one whose place in the world has been made possible and advanced by its capacity for innovation. But our present advantage cannot be taken for granted.
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Ukraine Drone Strikes on Russian Airbase Reveal Any Country Is Vulnerable to the Same Kind of Attack
Air defense systems are built on the assumption that threats come from above and from beyond national borders. But Ukraine’s coordinated drone strike on 1 June on five airbases deep inside Russian territory exposed what happens when states are attacked from below and from within. In low-level airspace, visibility drops, responsibility fragments, and detection tools lose their edge. Drones arrive unannounced, response times lag, coordination breaks.
Shots to the Dome—Why We Can’t Model US Missile Defense on Israel’s “Iron Dome”
Starting an arms race where the costs are stacked against you at a time when debt-to-GDP is approaching an all-time high seems reckless. All in all, the idea behind Golden Dome is still quite undercooked.