-
BIOTHREATSPick Your Poison: The Enduring Threat of Biological Toxins
A summary of the Bipartisan Commission on Biodefense’s “Pick Your Poison: The Enduring Threat of Biological Toxins” at the Atlantic Council.
-
-
GEOENGINEERINGThe U.S. Barely Bothers to Track Geoengineering. What Could Go Wrong?
Whether it’s cloud seeding or covering the Arctic in tiny glass beads, there’s little standing in the way of weather modification.
-
-
CHINA WATCHAI Governance Is not Just Top-Down in China, Research Finds
Political scientist Xuechen Chen said traditional Chinese values and market driven factors have also driven moves to regulate generative AI platforms.
-
-
STEELA New Way to Make Steel Could Reduce America’s Reliance on Imports
America has been making steel from iron ore the same way for hundreds of years. Unfortunately, it hasn’t been making enough of it. Today the U.S. is the world’s largest steel importer, relying on other countries to produce a material that serves as the backbone of our society. Hertha Metals uses natural gas and electricity to produce steel and high-purity iron for magnets.
-
-
TARGETING SCIENCEThe FDA Refused to Review a Flu Vaccine, Contrary to Evidence. Now the Agency Reversed Itself
Strong, predictable, science-based regulation protects the public. A refuse-to-file letter—for a vaccine with no identified safety or efficacy concerns; tested under an FDA-approved trial design; supported by data showing superiority over both standard-dose and high-dose comparators; and submitted through a pathway that prior vaccines used to gain the very approvals Vinay Prasad, Director of the Center for Biologics Evaluation and Research (CBER) now demands as the benchmark—does not meet that standard.
-
-
POWER GRIDInitiative to Improve Power Outage Predictions and Grid Resilience
Researchers are working on a new initiative to better predict storm-related power outages, reduce restoration times, and strengthen the resilience of the electric grid.
-
-
ENCRYPTIONChip-Processing Method Could Assist Cryptography Schemes to Keep Data Secure
By enabling two chips to authenticate each other using a shared fingerprint, this technique can improve privacy and energy efficiency.
-
-
DEEPFAKESHow to Spot AI-generated Images and Online Content During the 2026 Primary Elections
Identifying falsified or digitally enhanced videos, photos and ads takes attention and awareness, but helpful tools are out there.
-
-
DEEPFAKESPeople Are Overconfident About Spotting AI Faces: Study
Most people believe they can spot AI-generated faces, but that confidence is out of date. With AI-generated faces now almost impossible to distinguish from real ones, this misplaced confidence could make individuals and organizations more vulnerable to scammers, fraudsters and bad actors.
-
-
DRONESCounter-Drone Technologies Are Evolving – but There’s No Surefire Way to Defend Against Drone Attacks
Together, these three types of counter-drone technologies – radio frequency, directed energy and kinetic – provide a comprehensive tool kit for addressing the diverse threats posed by unauthorized drones. However, there is no single ideal solution to counter these threats.
-
-
NUCLEAR POWERMomentum Is Building to Meet Electricity Demand in Texas with Small Nuclear Reactors
The first small modular nuclear reactor could be powering an industrial plant in Texas early in the next decade. And the state is pushing to become the leading site for testing and building the technology.
-
-
ENERGY SECURITYGeothermal Could Replace Almost Half of the EU’s Fossil Fuel Power
If you’ve ever been to a hot spring or geyser or volcano, you’ve seen the future of energy. Advances in drilling and subsurface engineering are unlocking a constant, clean power source deep within the Earth.
-
-
RADIATION DETECTIONQuickly and Precisely Localizing Radioactive Material
Radioactive, chemical or biological substances are undetectable to humans in threatening situations and difficult to detect with remote sensing. Researchers at the Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE use specially equipped drones and robots to quickly and precisely localize radioactive sources.
-
-
MILITARY TECHWe’ve Probably Just Seen the USAF’s Secret Electromagnetic Attacker
Another element in the US Air Force’s plans for long-range operations, essential for Asia-Pacific deterrence, may have emerged from under cover of secrecy: a shadowy uncrewed aircraft designed to fly far and slip into an enemy’s defended zone, undetected until it starts jamming radars. Quite likely, it would carry missiles to knock out radars. Put another way, the evidence adds up to an electromagnetic attack aircraft.
-
-
CHINA WATCHAllfare: China’s Whole-of-Nation Strategy
To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.
-
More headlines
The long view
SECURITY TECHNOLOGYEntity Resolution: The Security Technology You Probably Haven’t Heard Of
By Kyle McCurdy
The concept “entity resolution” (ER) is probably unfamiliar, but it underpins much of the world’s security—in telecommunications, banking and national security.
CHINA WATCH“DeepSeek Is in the Driver’s Seat. That’s a Big Security Problem”
By Danielle Cave
Democratic countries have a smart-car problem. For those that don’t act quickly and decisively, it’s about to become a severe national security headache.
SCHOOL SAFETYThere’s Little Evidence Tech Is Much Help Stopping School Shootings
By Emily Greene-Colozzi
Different security technologies appeal to institutions struggling to protect their communities, and are marketed aggressively as the future of school shooting prevention. I’m a criminologist who studies mass shootings and school violence. In my research, I’ve found that there’s a lack of evidence to support the effectiveness of these technological interventions.
