-
MILITARY TECHNOLOGYAssessment of Israeli Strike on Iran near Esfahan
The Israeli attack on the S-300 missile defense system deployed around Iran’s nuclear facility in Esfahan demonstrated the capability of Israeli stand-off weapons to target deep inside Iran, evading detection and air defenses, leaving Iran’s nuclear and military facilities more vulnerable to attack.
-
-
CRIME DETECTIONDeep Learning Model Helps in Crime Detection and Crime Hot Spot Prediction
New research has turned to emotional data alongside machine learning (ML) and deep learning (DL) techniques to develop technology that might one day help us better understand the criminal mind and perhaps even predict criminal activity so that it might be prevented.
-
-
DATA SECURITYThis Tiny Chip Can Safeguard User Data While Enabling Efficient Computing on a Smartphone
Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.
-
-
MISSILE DEFENSE15 Things You Don’t Know About Israel’s Air Defense Systems
Israel has sustained attacks from enemies throughout its history and has invested heavily in high tech defense technologies that are the envy of the world’s military.
-
-
DEEPFAKESDeFake Tool Protects Voice Recordings from Cybercriminals
In what has become a familiar refrain when discussing AI-enabled technologies, voice cloning is enabling increasingly sophisticated scams and deepfakes. The Federal Trade Commission held a Voice Cloning Challenge to encourage the development of technologies to prevent, monitor and evaluate malicious voice cloning.
-
-
CHINA WATCHSpyware as Service: What the i-Soon Files Reveal About China’s Targeting of the Tibetan Diaspora
Governments are increasingly incorporating cyber operations into the arsenal of statecraft. This sophisticated integration combines open-source intelligence, geospatial intelligence, human intelligence, and cyber espionage with artificial intelligence, allowing for the gathering and analysis of ever-expanding data sets. Increasingly, such operations are being outsourced.
-
-
CYBERSECURITYIsrael’s Cybersecurity Market is Maturing, and Just in Time
As tensions around the world rise and cyber threats multiply like digital rabbits, the Israeli cyber scene’s maturation seems like a saving grace.
-
-
NUCLEAR WEAPONSKey Weapons Component Development Milestone
Sandia and the Kansas City National Security Campus completed a crucial weapons component development milestone, prior to full rate production. The Mark 21 Replacement Fuze interfaces with the W87-0 warhead for deployment onto the Minuteman III and, eventually, the Sentinel ICBM.
-
-
CRITICAL MINERALSAustralia’s Leadership Imperatives in Critical Minerals
Australia, like Canada, is well placed to be a global leader in the critical minerals sector. The country has the natural endowment, technical expertise and experience, global mining footprint, and mining capital base to back a claim to worldwide leadership.
-
-
CRITICAL MINERALSA More Efficient Way to Extract Lithium from Mining Sites, Oil Fields, Used Batteries
Lithium is a lightweight metal commonly used in energy-dense and rechargeable batteries. Electric vehicles, which are needed to achieve net-zero emissions by 2050, rely on lithium-ion batteries. Chemists have invented a more efficient way to extract lithium from waste liquids leached from mining sites, oil fields and used batteries.
-
-
FLOODS & BATTERIESFrom Florida Floods to Idaho Desert: Understanding Impacts of Flood Damage on Vehicle Batteries
Electric vehicles offer some clear advantages over gasoline-power cars including zero emissions and lower operation and maintenance costs. But they also present some new challenges. Recent storms have revealed that seawater-flooded EVs can pose safety concerns for passengers, emergency responders and recovery personnel.
-
-
ENERGY SECURITYSubterranean Storage of Hydrogen
Hydrogen is an important clean fuel: It can be made by splitting water using solar or wind power, it can be used to generate electricity and to power heavy industry, and it could be used to energize fuel-cell-based vehicles. Sandia scientists are using computer simulations and laboratory experiments to see if depleted oil and natural gas reservoirs can be used for storing this carbon-free fuel.
-
-
WATER SECURITYAccelerating Research and Development for a Secure Water Future
Water and energy are interdependent – water is used to produce nearly every major energy source, and energy is critical to transporting and treating water. A research consortium will continue to lead a DOE desalination hub to drive innovation for sustainable water security.
-
-
AI & WARGaza War: Israel Using AI to Identify Human Targets Raising Fears That Innocents Are Being Caught in the Net
A new report finds that AI targeting systems have played a key role in identifying – and potentially misidentifying – tens of thousands of targets in Gaza. This suggests that autonomous warfare is no longer a future scenario. It is already here and the consequences are horrifying.
-
-
RADIATION DETECTIONA New Way to Detect Radiation Involving Cheap Ceramics
The radiation detectors used today for applications like inspecting cargo ships for smuggled nuclear materials are expensive and cannot operate in harsh environments, among other disadvantages. Work by MIT engineers could lead to plethora of new applications, including better detectors for nuclear materials at ports.
-
More headlines
The long view
AUTONOMOUS VEHICLESAutonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
CYBERDETERRENCETantalizing Method to Study Cyberdeterrence
By Trina West
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.
AIRPORT SECURITYPrototype Self-Service Screening System Unveiled
TSA and DHS S&T unveiled a prototype checkpoint technology, the self-service screening system, at Harry Reid International Airport (LAS) in Las Vegas, NV. The aim is to provide a near self-sufficient passenger screening process while enabling passengers to directly receive on-person alarm information and allow for the passenger self-resolution of those alarms.
SPACE DEBRISFalling Space Debris: How High Is the Risk I'll Get Hit?
By Zulfikar Abbany, Julia Vergin, and Katja Sterzik
An International Space Station battery fell back to Earth and, luckily, splashed down harmlessly in the Atlantic. Should we have worried? Space debris reenters our atmosphere every week.
DRONESTesting Cutting-Edge Counter-Drone Technology
Drones have many positive applications, bad actors can use them for nefarious purposes. Two recent field demonstrations brought government, academia, and industry together to evaluate innovative counter-unmanned aircraft systems.
ENERGY SECURITYStrengthening the Grid’s ‘Backbone’ with Hydropower
By Michael Matz
Argonne-led studies investigate how hydropower could help add more clean energy to the grid, how it generates value as grids add more renewable energy, and how liner technology can improve hydropower efficiency.
TECH APOCALYPSEThe Tech Apocalypse Panic is Driven by AI Boosters, Military Tacticians, and Movies
By Matthew Guariglia
From popular films like a War Games or The Terminator to a U.S. State Department-commissioned report on the security risk of weaponized AI, there has been a tremendous amount of hand wringing and nervousness about how so-called artificial intelligence might end up destroying the world. There is one easy way to avoid a lot of this and prevent a self-inflicted doomsday: don’t give computers the capability to launch devastating weapons.
TECH APOCALYPSEThe Tech Apocalypse Panic is Driven by AI Boosters, Military Tacticians, and Movies
By Matthew Guariglia
From popular films like a War Games or The Terminator to a U.S. State Department-commissioned report on the security risk of weaponized AI, there has been a tremendous amount of hand wringing and nervousness about how so-called artificial intelligence might end up destroying the world. There is one easy way to avoid a lot of this and prevent a self-inflicted doomsday: don’t give computers the capability to launch devastating weapons.