-
Identifying a fake picture online is harder than you might think
Research has shown that manipulated images can distort viewers’ memory and even influence their decision-making. So the harm that can be done by fake images is real and significant. Our findings suggest that to reduce the potential harm of fake images, the most effective strategy is to offer more people experiences with online media and digital image editing – including by investing in education. Then they’ll know more about how to evaluate online images and be less likely to fall for a fake.
-
-
International community unprepared to deal with catastrophic biological event
The risks of a global catastrophic biological event are growing, intensified by an increasingly interconnected world, terrorist and state interest in weapons of mass destruction, global political instability, and rapid advances in biotechnology. International leaders and organizations today are unprepared to react with the kind of effective, coordinated response needed to investigate and identify the pathogen, prevent the spread of disease, and, most importantly, save lives.
-
-
“Vaccinating” algorithms against attacks on machine learning
Algorithms “learn” from the data they are trained on to create a machine learning model that can perform a given task effectively without needing specific instructions, such as making predictions or accurately classifying images and emails. Researchers have developed a world-first set of techniques to effectively “vaccinate” algorithms against adversarial attacks, a significant advancement in machine learning research.
-
-
Mass surveillance is coming to a city near you
The tech entrepreneur Ross McNutt wants to spend three years recording outdoor human movements in a major U.S. city, KMOX news radio reports. Conor Friedersdorf writes in The Atlantic that if that sounds too dystopian to be real, you’re behind the times. McNutt, who runs Persistent Surveillance Systems, was inspired by his stint in the Air Force tracking Iraqi insurgents. He tested mass-surveillance technology over Compton, California, in 2012. In 2016, the company flew over Baltimore, feeding information to police for months (without telling city leaders or residents) while demonstrating how the technology works to the FBI and Secret Service.
-
-
NIST updates to help defend sensitive information from cyberattack
An update to one of the National Institute of Standards and Technology’s (NIST) information security documents offers strategies to help protect sensitive information that is stored in computers supporting critical government programs and high value assets. The new companion publication offers enhanced security for information stored in critical programs and assets.
-
-
Shoe scanner may improve airport security
The types of shoes you wear when flying matter. And not just shoe types. Size, material, soles and heels are also very important. Why? Shoes can become dangerous vehicles for terrorists’ plots. DHS wants to prevent future incidents, and this is why S&T is working on a millimeter wave technology for screening shoes as part of the larger Screening at Speed Program.
-
-
New technology to measures WMD threat exposures
Researchers are looking to find molecular signatures in blood that identify previous exposures and time of exposure to materials that could be associated with weapons of mass destruction (including infectious agents, chemicals, and radiation). The epigenome is biology’s record keeper, and Epigenetic technology will provide a new tool in the fight against the proliferation of weapons of mass destruction.
-
-
Optimizing use of future wave electricity generators during disaster
When hurricanes strike, loss of electricity ranks as one of the top concerns for relief workers. Blackouts lasting a week or more can hamper recovery efforts, shutter hospitals, threaten public health and disrupt transportation. The months-long effort to restore power to Puerto Rico following the 2017 hurricane season has led to renewed interest in finding innovative ways to get affected power grids back online. Researchers look to develop a strategy for how floating devices that harness the energy of the oceans’ waves might be able to provide this much needed aid.
-
-
Satellite observations help in earthquake monitoring, response
Researchers have found that data gathered from orbiting satellites can provide more accurate information on the impact of large earthquakes, which, in turn, can help provide more effective emergency response.
-
-
Cyber protection technology moves from the lab to the marketplace
MIT Lincoln Laboratory’s technique to protect commodity software from cyberattacks has transitioned to industry and will soon be available as part of a security suite.
-
-
Deepfake myths: Common misconceptions about synthetic media
There is finally some momentum to “do something” about deepfakes, but crucial misconceptions about deepfakes and their effect on our society may complicate efforts to develop a strategic approach to mitigating their negative impacts.
-
-
With floods and droughts increasing, communities take a new look at storing water underground
Groundwater recharging – that is, actively moving water underground, a practice known as managed aquifer recharge (MAR) — is the latest wave in water security. There are about 1,200 managed aquifer recharge projects in 62 countries. MAR can be used to restore depleted aquifers, rehabilitate ecosystems and cleanse polluted water. But there are challenges as well.
-
-
Lawmakers grapple with deepfake threat at hearing
The House Intelligence Committee heard alarming testimony Thursday that deepfake videos could be weaponized by foreign adversaries to sow divisions in the United States. Olivia Beavers and Maggie Miller write in The Hill that Clint Watts, a former FBI special agent and senior fellow for Alliance for Securing Democracy at the German Marshall Fund, warned lawmakers that Russia and China will likely both work to develop “synthetic media capabilities” for use against the U.S. and other adversaries. “China’s artificial intelligence capabilities rival the U.S., are powered by enormous data troves to include vast amounts of information stolen from the U.S., and the country has already shown a propensity to employ synthetic media in television broadcast journalism,” he said.
-
-
Eliminating infamous security threats
Meltdown and Spectre are speculative side-channel attacks exploit a fundamental functionality in microprocessors to expose security vulnerabilities. No efficient protection against such attacks has been found. Until now.
-
-
Hawk’s pursuit technique can help counter-drone defenses
Hawks steer their pursuit of evasive prey using a feedback system that differs fundamentally from the missile-like interception system of falcons.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare
Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.
AI and the Future of the U.S. Electric Grid
Despite its age, the U.S. electric grid remains one of the great workhorses of modern life. Whether it can maintain that performance over the next few years may determine how well the U.S. competes in an AI-driven world.
Using Liquid Air for Grid-Scale Energy Storage
New research finds liquid air energy storage could be the lowest-cost option for ensuring a continuous power supply on a future grid dominated by carbon-free but intermittent sources of electricity.
Enhanced Geothermal Systems: A Promising Source of Round-the-Clock Energy
With its capacity to provide 24/7 power, many are warming up to the prospect of geothermal energy. Scientists are currently working to advance human-made reservoirs in Earth’s deep subsurface to stimulate the activity that exists within natural geothermal systems.
Experts Discuss Geothermal Potential
Geothermal energy harnesses the heat from within Earth—the term comes from the Greek words geo (earth) and therme (heat). It is an energy source that has the potential to power all our energy needs for billions of years.
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”