• MILITARY TECHNOLOGYAssessment of Israeli Strike on Iran near Esfahan

    By David Albright, Sarah Burkhard, Victoria Cheng, Spencer Faragasso, and Mohammadreza Giveh

    The Israeli attack on the S-300 missile defense system deployed around Iran’s nuclear facility in Esfahan demonstrated the capability of Israeli stand-off weapons to target deep inside Iran, evading detection and air defenses, leaving Iran’s nuclear and military facilities more vulnerable to attack.

  • CRIME DETECTIONDeep Learning Model Helps in Crime Detection and Crime Hot Spot Prediction

    By David Bradley

    New research has turned to emotional data alongside machine learning (ML) and deep learning (DL) techniques to develop technology that might one day help us better understand the criminal mind and perhaps even predict criminal activity so that it might be prevented.

  • DATA SECURITYThis Tiny Chip Can Safeguard User Data While Enabling Efficient Computing on a Smartphone

    By Adam Zewe

    Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.

  • MISSILE DEFENSE15 Things You Don’t Know About Israel’s Air Defense Systems

    By John Jeffay

    Israel has sustained attacks from enemies throughout its history and has invested heavily in high tech defense technologies that are the envy of the world’s military.

  • DEEPFAKESDeFake Tool Protects Voice Recordings from Cybercriminals

    By Shawn Ballard

    In what has become a familiar refrain when discussing AI-enabled technologies, voice cloning is enabling increasingly sophisticated scams and deepfakes. The Federal Trade Commission held a Voice Cloning Challenge to encourage the development of technologies to prevent, monitor and evaluate malicious voice cloning.

  • CHINA WATCHSpyware as Service: What the i-Soon Files Reveal About China’s Targeting of the Tibetan Diaspora

    Governments are increasingly incorporating cyber operations into the arsenal of statecraft. This sophisticated integration combines open-source intelligence, geospatial intelligence, human intelligence, and cyber espionage with artificial intelligence, allowing for the gathering and analysis of ever-expanding data sets. Increasingly, such operations are being outsourced.

  • CYBERSECURITYIsrael’s Cybersecurity Market is Maturing, and Just in Time

    By Zachy Hennessey

    As tensions around the world rise and cyber threats multiply like digital rabbits, the Israeli cyber scene’s maturation seems like a saving grace.

  • NUCLEAR WEAPONSKey Weapons Component Development Milestone

    By Kenny Vigil

    Sandia and the Kansas City National Security Campus completed a crucial weapons component development milestone, prior to full rate production. The Mark 21 Replacement Fuze interfaces with the W87-0 warhead for deployment onto the Minuteman III and, eventually, the Sentinel ICBM.

  • CRITICAL MINERALSAustralia’s Leadership Imperatives in Critical Minerals

    By Ian Satchwell

    Australia, like Canada, is well placed to be a global leader in the critical minerals sector. The country has the natural endowment, technical expertise and experience, global mining footprint, and mining capital base to back a claim to worldwide leadership.

  • CRITICAL MINERALSA More Efficient Way to Extract Lithium from Mining Sites, Oil Fields, Used Batteries

    Lithium is a lightweight metal commonly used in energy-dense and rechargeable batteries. Electric vehicles, which are needed to achieve net-zero emissions by 2050, rely on lithium-ion batteries. Chemists have invented a more efficient way to extract lithium from waste liquids leached from mining sites, oil fields and used batteries.

  • FLOODS & BATTERIESFrom Florida Floods to Idaho Desert: Understanding Impacts of Flood Damage on Vehicle Batteries

    By Michelle Goff

    Electric vehicles offer some clear advantages over gasoline-power cars including zero emissions and lower operation and maintenance costs. But they also present some new challenges. Recent storms have revealed that seawater-flooded EVs can pose safety concerns for passengers, emergency responders and recovery personnel.

  • ENERGY SECURITYSubterranean Storage of Hydrogen

    By Mollie Rappe

    Hydrogen is an important clean fuel: It can be made by splitting water using solar or wind power, it can be used to generate electricity and to power heavy industry, and it could be used to energize fuel-cell-based vehicles. Sandia scientists are using computer simulations and laboratory experiments to see if depleted oil and natural gas reservoirs can be used for storing this carbon-free fuel.

  • WATER SECURITYAccelerating Research and Development for a Secure Water Future

    By Lauren Core

    Water and energy are interdependent – water is used to produce nearly every major energy source, and energy is critical to transporting and treating water. A research consortium will continue to lead a DOE desalination hub to drive innovation for sustainable water security.

  • AI & WARGaza War: Israel Using AI to Identify Human Targets Raising Fears That Innocents Are Being Caught in the Net

    By Elke Schwarz

    A new report finds that AI targeting systems have played a key role in identifying – and potentially misidentifying – tens of thousands of targets in Gaza. This suggests that autonomous warfare is no longer a future scenario. It is already here and the consequences are horrifying.

  • RADIATION DETECTIONA New Way to Detect Radiation Involving Cheap Ceramics

    By Elizabeth A. Thomson

    The radiation detectors used today for applications like inspecting cargo ships for smuggled nuclear materials are expensive and cannot operate in harsh environments, among other disadvantages. Work by MIT engineers could lead to plethora of new applications, including better detectors for nuclear materials at ports.