-
Digital Twins Could Protect Manufacturers from Cyberattacks
Detailed virtual copies of physical objects, called digital twins, hold the promise of better products across automotive, health care, aerospace and other industries. According to a new study, cybersecurity may also fit neatly into the digital twin portfolio.
-
-
Can a Cyber shuffle Stop Hackers from Taking Over a Military Aircraft?
A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers to take control of a military jet, commercial airliner or spacecraft. Sandia, Purdue team up to test cyberdefense against an algorithm trained to break it.
-
-
Artificial Intelligence Reframes Nuclear Material Studies
The future of nuclear energy, which can produce electricity without harmful emissions, depends on discovery of new materials. A scientist at Argonne is using computer vision to separate the best candidates from a crowded field.
-
-
Chip War: The Fight for the World’s Most Critical Technology
Forget the “Malacca dilemma,” that is, how China protects the narrow strait linking the Indian and Pacific oceans, which is the conduit for around 60% of China’s oil imports. These days, Chris Miller writes in his new book, China’s leaders are more concerned about a blockade “measured in bytes rather than barrels.”
-
-
Improving the Speed and Safety of Airport Security Screening
For decades, airports around the nation have employed sensitive canine noses to detect concealed explosives. While this four-legged fleet has been effective and efficient, researchers have yet to build a mechanical method that can mimic their abilities. Researchers seek ways to build non-contact screening methods that can detect concealed explosives at airports.
-
-
How One of the World's Most Popular Open-Source Security Monitoring Platforms Was Developed
A tool from the internet’s early days keeps Microsoft’s users secure while supporting the open-source paradigm.
-
-
2023 Border Security & Intelligence Summit
Defense Strategies Institute announced its 11th Annual Border Security & Intelligence Summit. This forum will bring together DHS, IC, Federal Agencies, and Industry to discuss the protection of U.S borders through enhanced technology and intelligence solutions.
-
-
The Most Advanced Bay Area Earthquake Simulations to Be Publicly Available
Accurately modeling the effects of an earthquake is possible, but it requires intricate physics-based models that can only be run on advanced supercomputers. The data from such models are invaluable for the earthquake research community and engineers seeking to build and retrofit earthquake-resilient homes, businesses, and infrastructure. Supercomputer-generated simulations will soon be accessible on an open-access website.
-
-
Can Space Dust Slow Global Warming?
Scientists believe dust launched from the moon could reduce solar radiation enough to lessen the impact of climate change.
-
-
Breakthrough Alert Messaging for a Mobile Public
It is in the Wildland Urban Interface (WUI) that the danger and damage from the growing risk of wildfires is most prevalent. Of paramount importance is alerting people in the path of fires and enabling their safe evacuation from the area.
-
-
NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
The algorithms are designed to protect data created and transmitted by the Internet of Things and other small electronics.
-
-
Looking for Critical Minerals in Mine Waste
Mine waste is the material left over after mining. It consists of tailings, the material that remains after mined ore is milled and concentrated, as well as the topsoil, waste rock and other materials that were removed to get to the ore. Some critical-mineral commodities, like rare earth elements, are known to occur alongside more commonly mined minerals like iron or nickel. Because of this, mine-waste sites are now being revisited.
-
-
Stoking Wildfire Resilience in Oregon
Monitoring allows all the moving pieces of an emergency response to launch into action and for decision makers to have as much time as possible to assess and mitigate the threat. This is certainly true when it comes to wildfires. S&T is piloting smoke detection sensors ahead of the 2023 wildfire season.
-
-
Foolproof: A Psychological Vaccine Against Fake News
Even an optimistic account of our ability to spot fake news has to come to grips with the fact that not everyone needs to be fooled in order for misinformation to be highly influential and dangerous. After all, major elections are often decided on small margins, and cyber propaganda is playing an increasingly important role in tearing down the fabric of our democracy.
-
-
Securing Supply Chains with Quantum Computing
The Russo-Ukrainian conflict and the COVID-19 pandemic have shown how vulnerable global supply chains can be. International events can disrupt manufacturing, delay shipping, induce panic buying and send energy costs soaring. Programming technique could help solve massive optimization problems.
-
More headlines
The long view
U.S. Reliance on Chinese Drones: A Sector for the Next CHIPS Act?
More and more lawmakers from both parties are beginning to pay attention to the issue of drones and national security. Different bills seek to regulate federal agency procurement and use of certain foreign-made unmanned aircraft systems (UASs), or drones. Annie I. Antón and Olivia C. Mauger write that “Building on the bipartisan consensus to enact the 2022 Creating Helpful Incentives to Produce Semiconductors and Science (CHIPS) Act, there is a compelling case that UASs should be a next sector for similar action.”
Helping the U.S. Fast-track Hypersonic Conventional Weapons
Hypersonic weapons have been a top priority for modernizing the armed forces, with ultrafast, long-range and maneuverable munitions being touted as a revolutionary advance in modern warfare. The U.S. has fast-tracked their development and announced plans to field the first conventional hypersonic missile battery this year. Sandia National Lab is helping the U.S. achieve this goal.
Quantum Cryptography Applications
The development of quantum computing means that the use of classic cryptography for secure communications is in danger of becoming obsolete. Quantum cryptography, on the other hand, uses the laws of quantum mechanics to ensure total security. One example of this is quantum key distribution, which enables two parties to secure a message via a random secret key.
Using Quantum Physics to Secure Wireless Devices
From access cards and key fobs to Bluetooth speakers, the security of communication between wireless devices is critical to maintaining privacy and preventing theft. Unfortunately, these tools are not foolproof and information on how to hack, clone and bypass these systems is becoming easier to find.
Enhanced Community Safety by Reimagining Gunshot Detection
A new gunshot detection system delivers new capabilities that significantly improve the response and management of outdoor shootings. The portable system employs two methods of detection for increased accuracy and reduced false positives.
Outsmarting Superbugs, One Germ at a Time
It’s an old story: Pathogen sickens humans. Humans create medicine. Pathogen evolves a way around the medicine. Humans are back to square one.