• Caution about emerging technologies is compatible with science

    Precautionary approaches to governance of emerging technology, which call for constraints on the use of technology whose potential harms and other outcomes are highly uncertain, are often criticized for reflecting “risk panics,” but precaution can be consistent with support for science.

  • First large-scale, citywide test of advanced radioactive threat detection system

    Field testing of more than 1,000 networked, mobile radiation sensors in Washington, D.C., yields valuable data for implementing enhanced radiation-detection networks in major U.S. cities. By getting volunteers to walk all day looking for clues, the DARPA-sponsored exercise provided the largest test yet of DARPA’s SIGMA program, which is developing networked sensors that can provide dynamic, real-time radiation detection over large urban areas.

  • Forensic technique to measure mechanical properties of evidence

    You may have seen it on CSI: The star examines hair from a crime scene and concludes its color or texture looks like the defendant’s hair, or maybe his dog’s. Case closed. But looks can be deceiving, as well as vague and subjective. In real life, the FBI is now reviewing thousands of cases involving hair comparisons going back to the 1980s because traditional identifications—often based on looks alone — have been called into question. Instead, what if investigators could precisely measure a hair’s mechanical properties — its stiffness and stickiness? Researchers say that in fact, they can.

  • Using hardware to fight computer viruses

    More than 317 million pieces of new malware — computer viruses, spyware, and other malicious programs — were created in 2014 alone, according to work done by Internet security teams at Symantec and Verizon. Malware is growing in complexity, with crimes such as digital extortion (a hacker steals files or locks a computer and demands a ransom for decryption keys) becoming large avenues of cyberattack. Fighting computer viruses is not just for software anymore, as researchers study how hardware can help protect computers too.

  • Sensors monitor bridges’ health – and tweet the information they gather

    While bridge collapses are rare, there have been enough of them to raise concerns in some parts of the world that their condition is not sufficiently monitored. Sweden is taking a hi-tech approach to its aging infrastructure. Researchers are rigging up the country’s bridges with multiple sensors that allow early detection of wear and tear. The bridges can even tweet throughout the course of a day.

  • Nanobionic spinach plants can detect explosives

    Spinach is no longer just a superfood: By embedding leaves with carbon nanotubes, MIT engineers have transformed spinach plants into sensors that can detect explosives and wirelessly relay that information to a handheld device similar to a smartphone. This is one of the first demonstrations of engineering electronic systems into plants, an approach that the researchers call “plant nanobionics.”

  • Nuclear CSI: Noninvasive procedure could spot criminal nuclear activity

    Determining whether an individual – a terrorist, a smuggler, a criminal — has handled nuclear materials, such as uranium or plutonium, is a challenge national defense agencies currently face. The standard protocol to detect uranium exposure is through a urine sample; however, urine is able only to identify those who have been recently exposed. Scientists have developed a noninvasive procedures that will better identify individuals exposed to uranium within one year.

  • New 3-D crime-scene forensics technology

    Researchers are developing a new type of portable crime-scene forensics technology designed to take precise high-resolution 3-D images of shoeprints and tire tread marks in snow and soil. The system will cost around $5,000, which is about one-tenth the cost of systems commercially available, and represents an alternative to the traditional method of plaster casting.

  • Bolstering energy security with homegrown energy sources

    The U.S. Department of Energy has a goal to develop and demonstrate transformative bioenergy technologies to fuel a more sustainable nation. Reaching that goal will require roughly a billion tons of biomass, so we will need to rely on a variety of resources to get the job done.

  • China’s quantum satellite could make data breaches a thing of the past

    China recently launched a satellite into orbit with a unique feature: it has the ability to send information securely, not with mathematical encryption but by using the fundamental laws of physics. China will be the first country to achieve this feat, and it marks a milestone in the development of quantum technologies. The next revolution in technology promises to embrace fundamental laws of physics to enable devices to perform operations that are beyond the bounds of current electronics. For practical quantum communications we need devices integrated into our computers and smartphones that exchange data in a similar way to the quantum satellite. These devices are thankfully just around the corner. In a few years we may look back on digital eavesdropping and massive information breaches from databases as a problem buried in the past.

  • DHS S&T announces 10 start-ups for first responder technology innovation

    DHS S&T has announced the selection of ten startup companies to be part of EMERGE 2016: Wearable Technology, a program designed to bring startups, accelerators, and other strategic partners together in a common research and development effort. The program is focused on wearable technology that can be modified specifically for first responders.

  • Half of U.S. business R&D concentrated in five states

    Five states accounted for just over half of the $255 billion of research and development (R&D) companies paid for and performed in the United States in 2013. The five states with the highest levels of business R&D performance — California, Massachusetts, Michigan, Texas, and Washington — accounted for $133 billion, or 52 percent, of the total.

  • X-ray vision: Bomb technicians strengthen their hand with Sandia’s XTK software

    X-Ray Toolkit (XTK), an image-processing and analysis software developed at Sandia National Laboratories, has been adopted by the military and emergency response communities in the United States and around he world. “XTK is the standard in the field not only nationally, but internationally. It made the average bomb tech a better bomb tech,” said Craig Greene, a special agent and bomb technician at the Albuquerque, New Mexico FBI. “In the past twenty years, the bomb technician community has progressed from the Stone Age to the twenty-first century in terms of equipment and procedures, and XTK is a major part of that progression.”

  • DHS takes delivery of RadSeeker which identifies threat materials in shielded, masked, or concealed situations

    The first regular shipments of the Smiths Detection RadSeeker featuring Symetrica’s Discovery Technology Sub-System will begin this fall as the first part of a contract with the Department of Homeland Security (DHS). Symetrica’s Discovery Technology at the heart of RadSeeker identifies threat materials in shielded, masked, or concealed situations.

  • New forensic method identifies people using human hair proteins

    In an important breakthrough for the forensic science community, researchers have developed the first-ever biological identification method that exploits the information encoded in proteins of human hair. The new protein identification technique will offer another tool to law enforcement authorities for crime scene investigations and archaeologists, as the method has been able to detect protein in human hair more than 250 years old.