-
Machine Learning and Gene Editing at the Helm of a Societal Evolution
What are the key advancements at the intersection of ML and GE? What is the connectedness between policy and technology and what we learn from trends over time? What kind of policy considerations are needed to govern converging technologies bearing in mind international drivers of collaboration and competition?
-
-
“Surveillance: From Vision to Data” Explores History of Surveillance
The term surveillance may suggest images of high-tech cameras or George Orwell’s ever-watching Big Brother, but surveillance involves more than watching and being watched. To understand surveillance and its consequences, look to data: who collects it, what information is compiled, how it is interpreted, and ultimately, why it matters.
-
-
Navigating the Risks and Benefits of AI: Lessons from Nanotechnology on Ensuring Emerging Technologies Are Safe as Well as Successful
Twenty years ago, nanotechnology was the artificial intelligence of its time. The specific details of these technologies are, of course, a world apart. But the challenges of ensuring each technology’s responsible and beneficial development are surprisingly alike.
-
-
Happy 60th Birthday to Vela, Watchman for Nuclear Detonations
Sixty years ago last week, on Oct. 16, 1963, the United States launched a pair of satellites whose primary purpose was to determine the feasibility of using satellites to detect nuclear detonations in outer space. The satellites were part of the Vela program, initiated in 1959 to provide a nuclear detonation detection capability to verify compliance with nuclear treaties. On Sept. 27, 1984, the last of the Vela satellites were turned off.
-
-
Tackling Fake News
Cutting-edge technologies gave the world fake news, but researchers are developing even newer technology to stop it. Their innovative system — the first of its kind — relies on something already famous for underpinning Bitcoin and other cryptocurrencies — blockchain.
-
-
Testing Seafloor Fiber Optic Cable as an Earthquake Early Warning System
One of the biggest challenges for earthquake early warning systems (EEW) is the lack of seismic stations located offshore of heavily populated coastlines, where some of the world’s most seismically active regions are located. Researchers show how unused telecommunications fiber optic cable can be transformed for offshore EEW.
-
-
New Cyber Algorithm Shuts Down Malicious Robotic Attack
Researchers have designed an algorithm that can intercept a man-in-the-middle (MitM) cyberattack on an unmanned military robot and shut it down in seconds.
-
-
Critical Vulnerabilities Found within Major LLMs
Large Language Models (LLMs) such as ChatGPT and Bard have taken the world by storm this year, with companies investing millions to develop these AI tools, and some leading AI chatbots being valued in the billions. Computer scientists have demonstrated that chunks of these LLMs can be copied in less than a week for as little as $50, and the information gained can be used to launch targeted attacks.
-
-
Responsible AI Initiative Seeks to Solve Societal Problems
With a $100 million investment, a new research initiative focuses on artificial intelligence (AI) that aims to responsibly use advanced AI technology to tackle societal issues.
-
-
Fueling the Future of Fusion Energy
Long considered the ultimate source of clean energy, nuclear fusion promises abundant electrical power without greenhouse gas emissions or long-lasting radioactive waste. The process has fueled the core of the sun for more than four billion years – with billons more to go. Nore scientists are joining the global pursuit of harnessing that reaction.
-
-
Modular Dam Design Could Accelerate the Adoption of Renewable Energy
Researchers have developed a new modular steel buttress dam system designed to resolve energy storage issues hindering the integration of renewable resources into the energy mix. The m-Presa modular steel buttress dam system cut dam construction costs by one-third and reduce construction schedules by half.
-
-
Not the Usual Suspects: New Interactive Lineup Boosts Eyewitness Accuracy
Allowing eyewitnesses to dynamically explore digital faces using a new interactive procedure can significantly improve identification accuracy compared to the video lineup and photo array procedures used by police worldwide.
-
-
Securing the Food Pipeline from Cyberattacks
Sensors detecting the amount of food that herds of cattle are eating. Machines taking thousands of photos of fruit per second to detect their defects and sort them by quality. Robots packing fruit and vegetables into bags and boxes for purchase at grocery stores: Researchers are protecting the food and agriculture sector.
-
-
Scorpius Images to Test Nuclear Stockpile Simulations
One thousand feet below the ground, three national defense labs and a remote test site are building Scorpius — a machine as long as a football field — to create images of plutonium as it is compressed with high explosives, creating conditions that exist just prior to a nuclear explosion. The Sandia injector is key to validating plutonium pit performance.
-
-
Chi-Nu Experiment Concludes with Data to Support Nuclear Security, Energy Reactors
The Chi-Nu project, a years-long experiment measuring the energy spectrum of neutrons emitted from neutron-induced fission, recently concluded the most detailed and extensive uncertainty analysis of the three major actinide elements — uranium-238, uranium-235 and plutonium-239.
-
More headlines
The long view
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.
Prototype Self-Service Screening System Unveiled
TSA and DHS S&T unveiled a prototype checkpoint technology, the self-service screening system, at Harry Reid International Airport (LAS) in Las Vegas, NV. The aim is to provide a near self-sufficient passenger screening process while enabling passengers to directly receive on-person alarm information and allow for the passenger self-resolution of those alarms.
Falling Space Debris: How High Is the Risk I'll Get Hit?
An International Space Station battery fell back to Earth and, luckily, splashed down harmlessly in the Atlantic. Should we have worried? Space debris reenters our atmosphere every week.
Testing Cutting-Edge Counter-Drone Technology
Drones have many positive applications, bad actors can use them for nefarious purposes. Two recent field demonstrations brought government, academia, and industry together to evaluate innovative counter-unmanned aircraft systems.
Strengthening the Grid’s ‘Backbone’ with Hydropower
Argonne-led studies investigate how hydropower could help add more clean energy to the grid, how it generates value as grids add more renewable energy, and how liner technology can improve hydropower efficiency.
The Tech Apocalypse Panic is Driven by AI Boosters, Military Tacticians, and Movies
From popular films like a War Games or The Terminator to a U.S. State Department-commissioned report on the security risk of weaponized AI, there has been a tremendous amount of hand wringing and nervousness about how so-called artificial intelligence might end up destroying the world. There is one easy way to avoid a lot of this and prevent a self-inflicted doomsday: don’t give computers the capability to launch devastating weapons.
The Tech Apocalypse Panic is Driven by AI Boosters, Military Tacticians, and Movies
From popular films like a War Games or The Terminator to a U.S. State Department-commissioned report on the security risk of weaponized AI, there has been a tremendous amount of hand wringing and nervousness about how so-called artificial intelligence might end up destroying the world. There is one easy way to avoid a lot of this and prevent a self-inflicted doomsday: don’t give computers the capability to launch devastating weapons.