-
Browser Tool Helps Researchers ID Malicious Websites, Code
Researchers from North Carolina State University have developed an open-source tool that allows users to track and record the behavior of JavaScript programs without alerting the websites that run those programs. The tool, called VisibleV8, runs in the Chrome browser and is designed to detect malicious programs that are capable of evading existing malware detection systems.
-
-
Bio-Inspired Theoretical Research May Improve Robots’ Effectiveness on Battlefield
In an effort to make robots more effective and versatile teammates for soldiers in combat, Army researchers are on a mission to understand the value of the molecular living functionality of muscle, and the fundamental mechanics that would need to be replicated in order to artificially achieve the capabilities arising from the proteins responsible for muscle contraction.
-
-
First Statewide Testing of ShakeAlert in the United States
Earlier this month, the U.S. Geological Survey and the State of California pressed the “go” button to allow the first-ever statewide public testing of the California Early Earthquake Warning System, which is powered by USGS’s earthquake early warning alerts, called ShakeAlerts. Alerts will be delivered by two independent methods, first over the federal Wireless Emergency Alert (WEA) system and second through the University of California Berkeley’s MyShake smartphone app.
-
-
Techno-Fix Futures Will Only Accelerate Climate Chaos – Don’t Believe the Hype
Thanks to the efforts of climate activists, the climate and ecological emergency has never been more prominent. But acknowledging the problem is just a starting point. Now this momentum must be harnessed to dramatically reduce greenhouse gas emissions and reverse habitat destruction.
-
-
Why Did Microsoft Fund an Israeli Firm that Surveils West Bank Palestinians?
Microsoft has invested in AnyVision, an Israeli startup which has developed a facial recognition technology used by Israel’s military and intelligence services to surveil Palestinians throughout the West Bank, in spite of the tech giant’s public pledge to avoid using the technology if it encroaches on democratic freedoms. The surveillance technology lets customers identify individuals and objects in any live camera feed, such as a security camera or a smartphone, and then track targets as they move between different feeds. The Israeli surveillance project is similar to China’s surveillance of its Uighur minority population. China is using artificial intelligence and facial recognition technology for a pervasive, intrusive monitoring of the Uighurs, a Muslim group living in western China.
-
-
Israeli Solution Prevents Bridge and Tunnel Disasters
People responsible for the health of bridges, tunnels and elevated highways can now see a real-time, cloud-based, 3D “medical report” thanks to technology invented at Israeli startup Dynamic Infrastructure. The company’s proprietary deep-learning image analysis compares daily images of the structure with older images extracted from past periodic inspections.
-
-
The Hidden Politics of Climate Engineering
At this point, the greatest danger of climate engineering may be how little is known about where countries stand on these potentially planet-altering technologies. Who is moving forward? Who is funding research? And who is being left out of the conversation?
-
-
Artificial Intelligence Research Needs Responsible Publication Norms
After nearly a year of suspense and controversy, any day now the team of artificial intelligence (AI) researchers at OpenAI will release the full and final version of GPT-2, a language model that can “generate coherent paragraphs and perform rudimentary reading comprehension, machine translation, question answering, and summarization—all without task-specific training.” Rebecca Crootof writes in Lawfare that when OpenAI first unveiled the program in February, it was capable of impressive feats: Given a two-sentence prompt about unicorns living in the Andes Mountains, for example, the program produced a coherent nine-paragraph news article. At the time, the technical achievement was newsworthy—but it was how OpenAI chose to release the new technology that really caused a firestorm.
-
-
Why America Isn’t Equipped for the New Rules of War
Sean McFate is a former paratrooper in the U.S. Army’s 82nd Airborne Division; he’s also worked as a private military contractor in West Africa. Today he’s a professor at the National Defense University and Georgetown’s School of Foreign Service. His book The New Rules of War, published earlier this year, dissects the ways warfare must change in order for America to succeed. MIT Technology Review’s war reporter Janine di Giovanni sat down to ask him about his vision for the future of conflict.
-
-
AI Could Be a Disaster for Humanity. A Top Computer Scientist Thinks He Has the Solution.
Stuart Russell is a leading AI researcher who co-authored the top textbook on the topic. He has also, for the last several years, been warning that his field has the potential to go catastrophically wrong. In a new book, Human Compatible, he explains how. AI systems, he notes, are evaluated by how good they are at achieving their objective: winning video games, writing humanlike text, solving puzzles. If they hit on a strategy that fits that objective, they will run with it, without explicit human instruction to do so.
-
-
Deflecting Massive Asteroids With a Nuclear Impulse
Researchers have completed the first ever in-depth investigation into how an asteroid would respond to a nuclear deflection attempt. “The whole purpose of studies like this is to help us shorten the response timeline if we were to see something coming at us,” said one researcher. “We don’t want to have to scramble to figure out whether to use an impactor or a nuclear device on a particular asteroid. These studies help us define those thresholds.”
-
-
Cryptography without Using Secret Keys
Most security applications, for instance access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: who will guarantee that the key doesn’t get stolen or hacked? Researchers, using a physical unclonable key (PUK) and the quantum properties of light, researchers present a new type of data security that does away with secret keys.
-
-
Patching Legacy Software Vulnerabilities Rapidly in Mission-Critical Systems
There are a vast number of diverse computing devices used to run the critical infrastructure our national security depends on – from transportation systems to electric grids to industrial equipment. While the amount of deployed vulnerable software is growing exponentially, the effective means of addressing known vulnerabilities at scale are limited. DARPA seeks to develop targeted software patches to rapidly repair legacy binaries in mission-critical systems, while assuring system functionality is not affected.
-
-
Engineered Viruses Could Fight Antibiotic Resistance
Antibiotic resistance is a one of the world’s most pressing public health problems. Scientists working on an Army project have developed a new weapon to combat super-bugs, which could protect Soldiers and fight resistance.
-
-
In the Deepfake Era, Counterterrorism Is Harder
For many U.S. intelligence officials, memories of that 9/11 terrorist attacks remain fresh, searing, and personal. Still hanging over the entrance to the CIA’s Counterterrorism Center is a sign that reads, “Today is September 12, 2001.” It’s a daily reminder of the agency’s determination to prevent future attacks—but also of the horrifying costs when intelligence agencies adapt too slowly to emerging threats. For a decade after the Soviet Union’s collapse, the CIA and the FBI were mired in Cold War structures, priorities, processes, and cultures even as the danger of terrorism grew. The shock of 9/11 finally forced a reckoning—one that led to a string of counterterrorism successes, from foiled plots to the operation against Osama bin Laden. But now, nearly two decades later, America’s 17 intelligence agencies need to reinvent themselves once more, this time in response to an unprecedented number of breakthrough technologies that are transforming societies, politics, commerce, and the very nature of international conflict.
-
More headlines
The long view
New Technology is Keeping the Skies Safe
DHS S&T Baggage, Cargo, and People Screening (BCP) Program develops state-of-the-art screening solutions to help secure airspace, communities, and borders
Factories First: Winning the Drone War Before It Starts
Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”
How Artificial General Intelligence Could Affect the Rise and Fall of Nations
By Barry Pavel et al.
Visions for potential AGI futures: A new report from RAND aims to stimulate thinking among policymakers about possible impacts of the development of artificial general intelligence (AGI) on geopolitics and the world order.
Keeping the Lights on with Nuclear Waste: Radiochemistry Transforms Nuclear Waste into Strategic Materials
By John Domol
How UNLV radiochemistry is pioneering the future of energy in the Southwest by salvaging strategic materials from nuclear dumps –and making it safe.
Model Predicts Long-Term Effects of Nuclear Waste on Underground Disposal Systems
By Zach Winn
The simulations matched results from an underground lab experiment in Switzerland, suggesting modeling could be used to validate the safety of nuclear disposal sites.