• With floods and droughts increasing, communities take a new look at storing water underground

    Groundwater recharging – that is, actively moving water underground, a practice known as managed aquifer recharge (MAR) — is the latest wave in water security. There are about 1,200 managed aquifer recharge projects in 62 countries. MAR can be used to restore depleted aquifers, rehabilitate ecosystems and cleanse polluted water. But there are challenges as well.

  • A “Responsibility to Prepare”: A strategy for presidential leadership on the security risks of climate change

    Presidential candidates are offering their plans on climate change, and it’s a competition over who’s the most ambitious. That’s good news, given that it’s a major security threat that requires a major response. Thus far, most of the candidates’ plans understandably focus on reducing greenhouse gas emissions and transitioning to a low-carbon economy. These steps are critically important, not least because the world will likely experience significant security disruptions in the future if the scale and scope of climate change are not reduced. Caitlin Werrell, Francesco Femia, and John Conger write in War in the Rocks that this is only half a strategy. Indeed, if there is a silver lining to climate change and the attendant security risks, it’s that we can see many of these changes coming. American scientists, the U.S. government (see this administration’s National Climate Assessment) and private industry have all shown they are capable of modeling climate change futures with a high degree of certainty compared to other trends. A climate model from 1967 still has a strong predictive capacity. Exxon’s own internal calculations and climate modeling from 1982 about where emissions would likely be in the future, including by 2020, were fairly spot-on. A political scientist in 1967 or 1982 would have had much more difficulty predicting what the political landscape would look like in 2020 than she or he would have making predictions about the climate.

  • Lawmakers grapple with deepfake threat at hearing

    The House Intelligence Committee heard alarming testimony Thursday that deepfake videos could be weaponized by foreign adversaries to sow divisions in the United States. Olivia Beavers and Maggie Miller write in The Hill that Clint Watts, a former FBI special agent and senior fellow for Alliance for Securing Democracy at the German Marshall Fund, warned lawmakers that Russia and China will likely both work to develop “synthetic media capabilities” for use against the U.S. and other adversaries. “China’s artificial intelligence capabilities rival the U.S., are powered by enormous data troves to include vast amounts of information stolen from the U.S., and the country has already shown a propensity to employ synthetic media in television broadcast journalism,” he said.

  • More frequent downpours of torrential rain with global warming

    The frequency of downpours of heavy rain—which can lead to flash floods, devastation, and outbreaks of waterborne disease—has increased across the globe in the past 50 years, a period when global warming also intensified

  • Climate change is destroying a barrier that protects the U.S. East Coast from hurricanes

    Severe hurricanes can cost up to hundreds of billions of dollars in damages. The destruction left in the wake of Atlantic hurricanes has been increasing over time in recent decades. A new study suggests that climate change could soon eliminate an atmospheric barrier that protects much of the U.S. East Coast from powerful hurricanes.

  • How China could shut down America’s defenses

    Advanced U.S. weapons are almost entirely reliant on rare-earth materials only made in China—and they could be a casualty of the trade war. Keith Johnson and Lara Seligman write in Foreign Policy that President Donald Trump has often argued that China has much more to lose than the United States in a trade war, but critics say his administration has failed to address a major U.S. vulnerability: Beijing maintains powerful leverage over the war-making capability of its main strategic rival through its control of critical materials.

  • Eliminating infamous security threats

    Meltdown and Spectre are speculative side-channel attacks exploit a fundamental functionality in microprocessors to expose security vulnerabilities. No efficient protection against such attacks has been found. Until now.

  • Hawk’s pursuit technique can help counter-drone defenses

    Hawks steer their pursuit of evasive prey using a feedback system that differs fundamentally from the missile-like interception system of falcons.

  • Dream of ideal “invisibility” cloaks for stress waves dashed

    Whether Harry Potter’s invisibility cloak, which perfectly steers light waves around objects to make them invisible, will ever become reality remains to be seen, but perfecting a more crucial cloak is impossible, a new study says. It would have perfectly steered stress waves in the ground, like those emanating from a blast, around objects like buildings to make them “untouchable.”

  • Finding and fixing natural gas leaks quickly, economically

    From production to consumption, natural gas leaks claim lives, damage the climate and waste money. Researchers are working on better ways to find and fix gas leaks quickly and inexpensively from one end of the system to the other.

  • Narrowing the search for advanced life in the universe

    Scientists may need to rethink their estimates for how many planets outside our solar system could host a rich diversity of life. Toxic gases limit the types of life we could find on habitable worlds.

  • Secure multiparty computation protecting privacy at the ballot box

    Shortly after the start of the new year, Americans around the nation will start returning to polling stations to vote in presidential primaries. How confident they feel in the voting process could depend on this thing called secure multiparty computation.

  • New computer attack mimics user's keystroke characteristics, evading detection

    Researchers have developed a new attack called “Malboard,” which evades several detection products that are intended to continuously verify the user’s identity based on personalized keystroke characteristics. 

  • Showing emergency responders the fastest, safest path to incident scenes

    Getting to your destination has never been easier, thanks to a number of popular global positioning systems (GPS) -based navigation apps available for download on smart devices. For first responders, there can be drawbacks to using the same apps and following the same routes as everyone else. When every second counts getting to an emergency scene, good enough just won’t cut it.

  • The U.S. needs an industrial policy for cybersecurity

    Industrial policies are appropriate when market failures have led to the under-provision of a good or service. The cybersecurity industry’s growth has been held back for several reasons, including intractable labor shortages. Vinod K. Aggarwal and Andrew W. Reddie write in Defense One that both the United States and United Kingdom suffer from a documented shortage of skilled programmers and computer scientists working on cybersecurity issues, and the U.S. alone is projected to have a shortage of 1.2 million professionals by 2022, according to the Center for Strategic and International Studies. The market has also been hindered by so-called “information problems,” as firms are often not aware of their own vulnerabilities and avoid sharing information about data breaches given the reputation costs associated with disclosure. So what can the government do about it?