-
China Looks to Africa in Race for Lithium
Electric cars, and other green technologies, are dependent on lithium, and growing demand has caused the prices for lithium to increase by almost 500 percent in the past year. Africa has ample resources of lithium, and China is leading the race to control the continent’s lithium resources.
-
-
Five Cybersecurity Challenges Beyond Technology
The data are clear: cyberattacks have been on the rise in recent years and the cybersecurity situation is increasingly complex. More than 90% of cyberattacks are made possible, to a greater or lesser extent, by human error.
-
-
U.S. Set to Block Most Imports Tied to China's Xinjiang Province
Later this month, the Biden administration will begin enforcing a new law barring products made with forced labor in China’s Xinjiang province from being imported to the United States. Under the law, U.S. Customs and Border Protection will treat any goods that are made in Xinjiang, either wholly or in part, as the product of forced labor unless the importer can show “clear and convincing evidence” that they are not.
-
-
China’s Growing Agricultural Problems Pose Risks for the U.S.
China is facing a growing demand on its agricultural production. The Chinese government has taken several domestic initiatives to address the growing problem, but it has also gone abroad to address its needs through investments and acquisitions of farmland, animal husbandry, agricultural equipment, and intellectual property (IP), particularly of GM seeds These efforts present several risks to U.S. economic and national security.
-
-
Inside the Government Fiasco That Nearly Closed the U.S. Air System
The upgrade to 5G was supposed to bring a paradise of speedy wireless. But a chaotic process under the Trump administration, allowed to fester by the Biden administration, turned it into an epic disaster. The problems haven’t been solved.
-
-
Identifying and Predicting Insider Threats
Insider threats are one of the top security concerns facing large organizations. Current and former employees, business partners, contractors—anyone with the right level of access to a company’s data—can pose a threat. A new project seeks to detect and predict insider threats.
-
-
Bad for Computer Security: Employees Returning to the Office
When employees feel they deserve superior technology compared to other employees—and they don’t receive unrestricted access to it—they pose a security risk to their companies, according to a new research.
-
-
Faster Ransomware Detection
Ransomware extortion is hugely expensive, and instances of ransomware extortion are on the rise. The FBI reports receiving 3,729 ransomware complaints in 2021, with costs of more than $49 million. What’s more, 649 of those complaints were from organizations classified as critical infrastructure.
-
-
Strengthen Advanced Manufacturing for Critical and Emerging Technologies
NIST has awarded a total of $2.08 million to seven organizations in six states to develop manufacturing technology roadmaps to strengthen U.S. innovation and productivity. Each award will fund projects for up to 18 months to address national priorities such as manufacturing of critical infrastructure, communication, and transformative approaches and technologies in construction.
-
-
The "Rock-to-Metal Ratio" of Critical Minerals
A new metric to quantify the amount of waste rock generated by mining for minerals essential to 21st century society has been created by the U.S. Geological Survey and Apple.
-
-
IBM, Historically Black Colleges Partner to Tackle Cybersecurity Talent Shortage
In 2020, the talent shortage in the U.S. has more than tripled over ten years, with 69 percent of employers surveyed struggling to fill skilled positions. By September 2021, there were more than 1.2 million U.S. job vacancies postings in software-related professions. IBM joins with Historically Black Colleges & Universities to launch cybersecurity degree programs.
-
-
AMLO's Lithium Grab and War on Green Energy Will Hurt North America
Nationalizing Mexico’s lithium reserves and extending state control over electricity and energy will undermine the region’s prosperity and security.
-
-
Undetected and Dormant: Managing Australia’s Software Security Threat
At the same time as software has become integral to our prosperity and national security, attacks on software supply chains are on the rise. Software supply chain attacks are popular, can have a big impact and are used to great effect by a range of cyber adversaries.
-
-
Cornell University Profs Call for School to Halt, Reverse Its Growing Academic, Business Ties with China
An event at Cornell University, organized by three professors, which called for the university to halt, and then reverse, its growing academic and business ties with China, reflected a broader trend of calls for colleges and universities to cut ties with and divest from Chinese groups linked to human rights abuses.
-
-
The Future of Nuclear Waste: What’s the Plan and Can It Be Safe?
The UK is planning to significantly expand its nuclear capability — from approximately 8 gigawatts (GW) today to 24GW by 2050, which would meet around 25% of the forecast UK energy demand — in an effort to decrease its reliance on carbon-based fossil fuels. New reactors will inevitably mean more radioactive waste. Above-ground nuclear waste storage isn’t a feasible long term plan. What are the alternatives?
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Trying to “Bring Back” Manufacturing Jobs Is a Fool’s Errand
Advocates of recent populist policies like to focus on the supposed demise of manufacturing that occurred after the 1970s, but that focus is misleading. The populists’ bleak economic narrative ignores the truth that the service sector has always been a major driver of America’s success, for decades, even more so than manufacturing. Trying to “bring back” manufacturing jobs, through harmful tariffs or other industrial policies, is destined to end badly for Americans. It makes about as much sense as trying to “bring back” all those farm jobs we had before the 1870s.
The Potential Impact of Seabed Mining on Critical Mineral Supply Chains and Global Geopolitics
The potential emergence of a seabed mining industry has important ramifications for the diversification of critical mineral supply chains, revenues for developing nations with substantial terrestrial mining sectors, and global geopolitics.
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”