• ENCRYPTIONMathematics Works in Serendipitous Ways

    By Catarina Chagas

    In the digital era and moving towards quantum computing, protecting data against hack attacks is one of our biggest challenges. Mathematical theorem used to crack U.S. government encryption algorithm.

  • CLIMATE CHALLENGESCarbon-Hungry Microorganisms to Help Battle Climate Change

    By Theresa Duque

    Scientists have demonstrated a new technique, modeled after a metabolic process found in some bacteria, for converting carbon dioxide (CO2) into liquid acetate, a key ingredient in “liquid sunlight” or solar fuels produced through artificial photosynthesis. New technique could fast-track future carbon-free solar fuels.

  • NORTH KOREAGermany Did Research with North Korea -- Despite UN Sanctions

    By Esther Felden

    Kim Jong Un wants to modernize his nuclear weapons. To stop him, the UN has banned research collaboration with North Korea. One Berlin institute continued to collaborate with North Korea on research projects — without flagging the risks.

  • BLOCKCHAIN & ELECTRIC-GRID RESILIENCEUsing Blockchain to Increase Electric Grid Resiliency

    Blockchain is best known for securing digital currency payments, but researchers are using it to track a different kind of exchange: It’s the first time blockchain has ever been used to validate communication among devices on the electric grid.

  • DAM SAFETYProbable Maximum Flood Events Will Significantly Increase Over Next Decades

    The flood capacity of dams could be at greater risk of being exceeded due to out-of-date modelling for potential maximum rainfall. A new study concludes that the rainfall model that engineers use to help design critical infrastructure such as large dams and nuclear power plants need to be updated to account for climate change.

  • ENCRYPTIONTop Prosecutors in CA, NY and DC Are Speaking Up for End-to-End Encryption

    We all should have the ability to have a private conversation, and it follows that we need ways to communicate privately online as well. In the digital world, end-to-end encryption is our best chance to maintain our privacy and security.

  • ELECTRIC-GRID SECURITYSimple Hardware to Defend Against Microgrid Attacks

    An inexpensive piece of hardware integrated with solar panel controllers can protect isolated power networks from cyberattacks.

  • R&D SECURITY“Safeguarding Science” Toolkit to Help U.S. Research Enterprise Guard Against Threats

    The National Counterintelligence and Security Center (NCSC) and its partners announced a unique collaboration between elements of the U.S. intelligence and scientific communities to help the U.S. research enterprise mitigate the broad spectrum of risk it faces from nation-state, criminal, and other threat actors.

  • DISASTER INSURANCEWith Climate Impacts Growing, Insurance Companies Face Big Challenges

    By Renee Cho

    The impacts of climate change are all around us: sea level rise, severe heat waves, drought, extreme rainfall, more powerful storms. These impacts are making natural disasters more intense and more frequent. Losses from each disaster—drought and wildfires in the southwest, severe storms in the Midwest, flooding in Kentucky and Missouri, and hurricanes in the southeast—have exceeded $1 billion, with the cumulative cost of disasters over the last five years reaching $788.4 billion.

  • BIOTHREATSA Growing Threat: Deliberate, Simultaneous Release of Pandemic Viruses Across Travel Hubs

    COVID-19 demonstrated how the world is clearly vulnerable to the introduction of a single pandemic virus with a comparatively low case fatality rate. The deliberate and simultaneous release of many pandemic viruses across travel hubs could threaten the stability of civilization. Current trends suggest that within a decade, tens of thousands of skilled individuals will be able to access the information required for them single-handedly to cause new pandemics.

  • INFRASTRUCTURE PROTECTIONExamining Vulnerabilities of Electric Vehicle Charging Infrastructure

    With electric vehicles becoming more common, the risks and hazards of a cyberattack on electric vehicle charging equipment and systems also increases. Reviewing the vulnerabilities of EV charging infrastructure would help prioritize grid protections and informs policy makers.

  • WATER SECURITYMaintaining Mountain Snowpacks Essential for Preserving Valuable Freshwater Resource

    Snowcapped mountains generate mountain water runoff and snowmelt, which flow down to streams, rivers, lakes, and oceans. Around a quarter of the world depends on these natural “water towers” to replenish downstream reservoirs and groundwater aquifers for urban water supplies, agricultural irrigation, and ecosystem support. Carbon mitigation strategies are needed to maintain snowpack throughout the Americas. 

  • CHINA WATCHGermany’s China Policy: Has It Learned from Its Dependency on Russia?

    By Liana Fix

    The German economy remains heavily dependent on China, its largest trading partner, despite mounting geopolitical tensions between the West and Beijing.

  • SURVEILLANCEEFF's Atlas of Surveillance Database Now Documents 10,000+ Police Tech Programs

    By Dave Maass

    The EFF has created a searchable and mappable repository of which law enforcement agencies in the U.S. use surveillance technologies such as body-worn cameras, drones, automated license plate readers, and face recognition.

  • WAR IN UKRAINEDrones Employed in the Ukraine War

    By Amos Chapple

    Unmanned systems have revolutionized modern warfare – and pilotless aircraft have had a significant impact in the war in Ukraine.