-
With floods and droughts increasing, communities take a new look at storing water underground
Groundwater recharging – that is, actively moving water underground, a practice known as managed aquifer recharge (MAR) — is the latest wave in water security. There are about 1,200 managed aquifer recharge projects in 62 countries. MAR can be used to restore depleted aquifers, rehabilitate ecosystems and cleanse polluted water. But there are challenges as well.
-
-
A “Responsibility to Prepare”: A strategy for presidential leadership on the security risks of climate change
Presidential candidates are offering their plans on climate change, and it’s a competition over who’s the most ambitious. That’s good news, given that it’s a major security threat that requires a major response. Thus far, most of the candidates’ plans understandably focus on reducing greenhouse gas emissions and transitioning to a low-carbon economy. These steps are critically important, not least because the world will likely experience significant security disruptions in the future if the scale and scope of climate change are not reduced. Caitlin Werrell, Francesco Femia, and John Conger write in War in the Rocks that this is only half a strategy. Indeed, if there is a silver lining to climate change and the attendant security risks, it’s that we can see many of these changes coming. American scientists, the U.S. government (see this administration’s National Climate Assessment) and private industry have all shown they are capable of modeling climate change futures with a high degree of certainty compared to other trends. A climate model from 1967 still has a strong predictive capacity. Exxon’s own internal calculations and climate modeling from 1982 about where emissions would likely be in the future, including by 2020, were fairly spot-on. A political scientist in 1967 or 1982 would have had much more difficulty predicting what the political landscape would look like in 2020 than she or he would have making predictions about the climate.
-
-
Lawmakers grapple with deepfake threat at hearing
The House Intelligence Committee heard alarming testimony Thursday that deepfake videos could be weaponized by foreign adversaries to sow divisions in the United States. Olivia Beavers and Maggie Miller write in The Hill that Clint Watts, a former FBI special agent and senior fellow for Alliance for Securing Democracy at the German Marshall Fund, warned lawmakers that Russia and China will likely both work to develop “synthetic media capabilities” for use against the U.S. and other adversaries. “China’s artificial intelligence capabilities rival the U.S., are powered by enormous data troves to include vast amounts of information stolen from the U.S., and the country has already shown a propensity to employ synthetic media in television broadcast journalism,” he said.
-
-
More frequent downpours of torrential rain with global warming
The frequency of downpours of heavy rain—which can lead to flash floods, devastation, and outbreaks of waterborne disease—has increased across the globe in the past 50 years, a period when global warming also intensified
-
-
Climate change is destroying a barrier that protects the U.S. East Coast from hurricanes
Severe hurricanes can cost up to hundreds of billions of dollars in damages. The destruction left in the wake of Atlantic hurricanes has been increasing over time in recent decades. A new study suggests that climate change could soon eliminate an atmospheric barrier that protects much of the U.S. East Coast from powerful hurricanes.
-
-
How China could shut down America’s defenses
Advanced U.S. weapons are almost entirely reliant on rare-earth materials only made in China—and they could be a casualty of the trade war. Keith Johnson and Lara Seligman write in Foreign Policy that President Donald Trump has often argued that China has much more to lose than the United States in a trade war, but critics say his administration has failed to address a major U.S. vulnerability: Beijing maintains powerful leverage over the war-making capability of its main strategic rival through its control of critical materials.
-
-
Eliminating infamous security threats
Meltdown and Spectre are speculative side-channel attacks exploit a fundamental functionality in microprocessors to expose security vulnerabilities. No efficient protection against such attacks has been found. Until now.
-
-
Hawk’s pursuit technique can help counter-drone defenses
Hawks steer their pursuit of evasive prey using a feedback system that differs fundamentally from the missile-like interception system of falcons.
-
-
Dream of ideal “invisibility” cloaks for stress waves dashed
Whether Harry Potter’s invisibility cloak, which perfectly steers light waves around objects to make them invisible, will ever become reality remains to be seen, but perfecting a more crucial cloak is impossible, a new study says. It would have perfectly steered stress waves in the ground, like those emanating from a blast, around objects like buildings to make them “untouchable.”
-
-
Finding and fixing natural gas leaks quickly, economically
From production to consumption, natural gas leaks claim lives, damage the climate and waste money. Researchers are working on better ways to find and fix gas leaks quickly and inexpensively from one end of the system to the other.
-
-
Narrowing the search for advanced life in the universe
Scientists may need to rethink their estimates for how many planets outside our solar system could host a rich diversity of life. Toxic gases limit the types of life we could find on habitable worlds.
-
-
Secure multiparty computation protecting privacy at the ballot box
Shortly after the start of the new year, Americans around the nation will start returning to polling stations to vote in presidential primaries. How confident they feel in the voting process could depend on this thing called secure multiparty computation.
-
-
New computer attack mimics user's keystroke characteristics, evading detection
Researchers have developed a new attack called “Malboard,” which evades several detection products that are intended to continuously verify the user’s identity based on personalized keystroke characteristics.
-
-
Showing emergency responders the fastest, safest path to incident scenes
Getting to your destination has never been easier, thanks to a number of popular global positioning systems (GPS) -based navigation apps available for download on smart devices. For first responders, there can be drawbacks to using the same apps and following the same routes as everyone else. When every second counts getting to an emergency scene, good enough just won’t cut it.
-
-
The U.S. needs an industrial policy for cybersecurity
Industrial policies are appropriate when market failures have led to the under-provision of a good or service. The cybersecurity industry’s growth has been held back for several reasons, including intractable labor shortages. Vinod K. Aggarwal and Andrew W. Reddie write in Defense One that both the United States and United Kingdom suffer from a documented shortage of skilled programmers and computer scientists working on cybersecurity issues, and the U.S. alone is projected to have a shortage of 1.2 million professionals by 2022, according to the Center for Strategic and International Studies. The market has also been hindered by so-called “information problems,” as firms are often not aware of their own vulnerabilities and avoid sharing information about data breaches given the reputation costs associated with disclosure. So what can the government do about it?
-
More headlines
The long view
The Future of Open Data in the Age of AI: Safeguarding Public Assets Amid Growing Private Sector Demands
AI offers immense potential, but that potential must be realized within a framework that protects the public’s right to its own information. The open data movement must evolve to meet this new challenge—not retreat from it.
Horses for Courses: Where Quantum Computing Is, and Isn’t, the Answer
Despite the impressive and undeniable strides quantum computing has made in recent years, it’s important to remain cautious about sweeping claims regarding its transformative potential.
Federal R&D Funding Boosts Productivity for the Whole Economy − Making Big Cuts to Such Government Spending Unwise
Large cuts to government-funded research and development can endanger American innovation – and the vital productivity gains it supports. If the government were to abandon its long-standing practice of investing in R&D, it would significantly slow the pace of U.S. innovation and economic growth.
Why Ukraine’s AI Drones Aren’t a Breakthrough Yet
Machine vision, a form of AI, allows drones to identify and strike targets autonomously. The drones can’t be jammed, and they don’t need continuous monitoring by operators. Despite early hopes, the technology has not yet become a game-changing feature of Ukraine’s battlefield drones. But its time will come.
New Tech Will Make Our Airplanes Safer
Odysight.ai’s technology allows for constant monitoring of aircraft, sending alerts in case of malfunctions that could lead to accidents.
New Technology is Keeping the Skies Safe
DHS S&T Baggage, Cargo, and People Screening (BCP) Program develops state-of-the-art screening solutions to help secure airspace, communities, and borders