• Machine learning masters the fingerprint to fool biometric systems

    Fingerprint authentication systems are a widely trusted, ubiquitous form of biometric authentication, deployed on billions of smartphones and other devices worldwide. Yet a new study reveals a surprising level of vulnerability in these systems.

  • Is anybody out there?

    The question of whether we’re alone in the universe has haunted humankind for thousands of years, and it’s one astronomer Jill Tarter has tried to answer for much of her life. Tarter, chair emeritus of the Center for SETI Research, worked as a project scientist for NASA’s SETI program, which aimed to detect transmissions from alien intelligence.

  • New “deception consistency” method could thwart computer hackers

    Can you deceive a deceiver? That’s the question that computer scientists have recently been exploring. They are looking at how to make cyber deception a more effective tool against malicious hackers. “The main objective of our work is to ensure deception consistency: when the attackers are trapped, they can only make observations that are consistent with what they have seen already so that they cannot recognize the deceptive environment,” the researchers say.

  • AI could help crack unsolvable murder cases

    Some of history’s most notorious unsolved murder crimes could be laid bare thanks to new forensic research. Researches have shown that machine learning – a field of artificial intelligence – could be used to determine which ammunition, and ultimately which firearm, was responsible for a particular gunshot from the residue it left behind.

  • The dusty desert air as a source of drinking water

    A simple device that can capture its own weight in water from fresh air and then release that water when warmed by sunlight could provide a secure new source of drinking water in remote arid regions, new research suggests.

  • Anti-global warming atmospheric spraying program: Could it work?

    A program to reduce Earth’s heat capture by injecting aerosols into the atmosphere from high-altitude aircraft is possible, but unreasonably costly with current technology, and would be unlikely to remain secret. Those are the key findings of new research which looked at the capabilities and costs of various methods of delivering sulphates into the lower stratosphere, known as stratospheric aerosol injection (SAI).

  • Revolutionizing cybersecurity through quantum research

    Scientists have found a novel way to safeguard quantum information during transmission, opening the door for more secure and reliable communication for warfighters on the battlefield. Recent advancements of cutting-edge technologies in lasers and nanophysics, quantum optics and photonics have given researchers the necessary tools to control and manipulate miniature quantum systems, such as individual atoms or photons - the smallest particles of light.

  • Quick, precise method for detecting chemical warfare agents

    Sarin is a man-made nerve agent that can spread as a gas or liquid. According to the Center for Disease control, exposure to large doses will over-stimulate glands and muscles, and can lead to loss of consciousness or respiratory failure. Even small doses can cause a long list of distressing and dangerous symptoms. “Low-level nerve agent exposure leads to ambiguous signs and symptoms that cannot be easily discriminated from other conditions, which may result in a delay in treatment and permanent damage,” says an expert. “If trace amounts can be detected quickly, you can prevent permanent damage to human health.”

  • Levitating particles could lift nuclear detective work

    Laser-based ‘optical tweezers’ could levitate uranium and plutonium particles, thus allowing the measurement of nuclear recoil during radioactive decay. This technique, proposed by scientists at Los Alamos National Laboratory, provides a new method for conducting the radioactive particle analysis essential to nuclear forensics.

  • Better drone detection through machine learning, cameras

    Visual detection of drones has never been considered as effective as its thermal, radio or acoustic counterparts. The trouble is always discriminating between different moving objects in view. Typically, a bird or even a plastic bag caught in the wind might be mistaken for a drone, which is why most discrimination methods have primarily focused on heat and acoustic signatures in the past (though acoustic signatures also tend to become less useful in urban areas with higher levels of background noise). Combined with machine learning, however, a camera can tell a different story.

  • He got mugged, then revamped 911 for the next generation

    Israeli company Carbyne has re-engineered the infrastructure for 911 services from the ground up, to take advantage of all the innovations that have come along in the 20 to 30 years since most emergency systems were built. Those innovations include the ability to see the location of a caller on a map, to chat by text if a voice call is not possible, to use VoIP (Voice over IP) services like WhatsApp and Skype, and to stream video so the 911 operator can see what’s happening in real time.

  • AI systems: Understanding and controlling religious conflict

    Artificial intelligence can help us to better understand the causes of religious violence and to potentially control it, according to a new research. The study is one of the first to be published that uses psychologically realistic AI – as opposed to machine learning.

  • Technologies to remove CO2 from air and sequester it key to climate change mitigation

    To achieve goals for climate and economic growth, “negative emissions technologies” (NETs) that remove and sequester carbon dioxide from the air will need to play a significant role in mitigating climate change, says a new report from the National Academies of Sciences.

  • Unhackable computer relying on firmware security rather than software patches

    By turning computer circuits into unsolvable puzzles, researchers aim to create an unhackable computer. The MORPHEUS project’s cybersecurity approach is dramatically different from today’s, which relies on software—specifically software patches to vulnerabilities that have already been identified. It’s been called the “patch and pray” model, and it’s not ideal. “Instead of relying on software Band-Aids to hardware-based security issues, we are aiming to remove those hardware vulnerabilities in ways that will disarm a large proportion of today’s software attacks,” says Linton Salmon, manager of DARPA’s System Security Integrated Through Hardware and Firmware program.

  • Fleets of drones could aid searches for lost hikers

    Finding lost hikers in forests can be a difficult and lengthy process, as helicopters and drones can’t get a glimpse through the thick tree canopy. Recently, it’s been proposed that autonomous drones, which can bob and weave through trees, could aid these searches. But the GPS signals used to guide the aircraft can be unreliable or nonexistent in forest environments. New system allows drones to cooperatively explore terrain under thick forest canopies where GPS signals are unreliable.