-
How Artificial Intelligence Can Transform U.S. Energy Infrastructure
Groundbreaking report provides ambitious framework for accelerating clean energy deployment while minimizing risks and costs in the face of climate change.
-
-
Computer Scientists Unveil Novel Attacks on Cybersecurity
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. Intel and AMD issued security alerts based on the findings.
-
-
Assessment of Israeli Strike on Iran near Esfahan
The Israeli attack on the S-300 missile defense system deployed around Iran’s nuclear facility in Esfahan demonstrated the capability of Israeli stand-off weapons to target deep inside Iran, evading detection and air defenses, leaving Iran’s nuclear and military facilities more vulnerable to attack.
-
-
Deep Learning Model Helps in Crime Detection and Crime Hot Spot Prediction
New research has turned to emotional data alongside machine learning (ML) and deep learning (DL) techniques to develop technology that might one day help us better understand the criminal mind and perhaps even predict criminal activity so that it might be prevented.
-
-
This Tiny Chip Can Safeguard User Data While Enabling Efficient Computing on a Smartphone
Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.
-
-
15 Things You Don’t Know About Israel’s Air Defense Systems
Israel has sustained attacks from enemies throughout its history and has invested heavily in high tech defense technologies that are the envy of the world’s military.
-
-
DeFake Tool Protects Voice Recordings from Cybercriminals
In what has become a familiar refrain when discussing AI-enabled technologies, voice cloning is enabling increasingly sophisticated scams and deepfakes. The Federal Trade Commission held a Voice Cloning Challenge to encourage the development of technologies to prevent, monitor and evaluate malicious voice cloning.
-
-
Spyware as Service: What the i-Soon Files Reveal About China’s Targeting of the Tibetan Diaspora
Governments are increasingly incorporating cyber operations into the arsenal of statecraft. This sophisticated integration combines open-source intelligence, geospatial intelligence, human intelligence, and cyber espionage with artificial intelligence, allowing for the gathering and analysis of ever-expanding data sets. Increasingly, such operations are being outsourced.
-
-
Israel’s Cybersecurity Market is Maturing, and Just in Time
As tensions around the world rise and cyber threats multiply like digital rabbits, the Israeli cyber scene’s maturation seems like a saving grace.
-
-
Key Weapons Component Development Milestone
Sandia and the Kansas City National Security Campus completed a crucial weapons component development milestone, prior to full rate production. The Mark 21 Replacement Fuze interfaces with the W87-0 warhead for deployment onto the Minuteman III and, eventually, the Sentinel ICBM.
-
-
Australia’s Leadership Imperatives in Critical Minerals
Australia, like Canada, is well placed to be a global leader in the critical minerals sector. The country has the natural endowment, technical expertise and experience, global mining footprint, and mining capital base to back a claim to worldwide leadership.
-
-
A More Efficient Way to Extract Lithium from Mining Sites, Oil Fields, Used Batteries
Lithium is a lightweight metal commonly used in energy-dense and rechargeable batteries. Electric vehicles, which are needed to achieve net-zero emissions by 2050, rely on lithium-ion batteries. Chemists have invented a more efficient way to extract lithium from waste liquids leached from mining sites, oil fields and used batteries.
-
-
From Florida Floods to Idaho Desert: Understanding Impacts of Flood Damage on Vehicle Batteries
Electric vehicles offer some clear advantages over gasoline-power cars including zero emissions and lower operation and maintenance costs. But they also present some new challenges. Recent storms have revealed that seawater-flooded EVs can pose safety concerns for passengers, emergency responders and recovery personnel.
-
-
Subterranean Storage of Hydrogen
Hydrogen is an important clean fuel: It can be made by splitting water using solar or wind power, it can be used to generate electricity and to power heavy industry, and it could be used to energize fuel-cell-based vehicles. Sandia scientists are using computer simulations and laboratory experiments to see if depleted oil and natural gas reservoirs can be used for storing this carbon-free fuel.
-
-
Accelerating Research and Development for a Secure Water Future
Water and energy are interdependent – water is used to produce nearly every major energy source, and energy is critical to transporting and treating water. A research consortium will continue to lead a DOE desalination hub to drive innovation for sustainable water security.
-
More headlines
The long view
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
Bookshelf: Preserving the U.S. Technological Republic
The United States since its founding has always been a technological republic, one whose place in the world has been made possible and advanced by its capacity for innovation. But our present advantage cannot be taken for granted.
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Ukraine Drone Strikes on Russian Airbase Reveal Any Country Is Vulnerable to the Same Kind of Attack
Air defense systems are built on the assumption that threats come from above and from beyond national borders. But Ukraine’s coordinated drone strike on 1 June on five airbases deep inside Russian territory exposed what happens when states are attacked from below and from within. In low-level airspace, visibility drops, responsibility fragments, and detection tools lose their edge. Drones arrive unannounced, response times lag, coordination breaks.
Shots to the Dome—Why We Can’t Model US Missile Defense on Israel’s “Iron Dome”
Starting an arms race where the costs are stacked against you at a time when debt-to-GDP is approaching an all-time high seems reckless. All in all, the idea behind Golden Dome is still quite undercooked.
Our Online World Relies on Encryption. What Happens If It Fails?
Quantum computers will make traditional data encryption techniques obsolete; BU researchers have turned to physics to come up with better defenses.
Virtual Models Paving the Way for Advanced Nuclear Reactors
Computer models predict how reactors will behave, helping operators make decisions in real time. The digital twin technology using graph-neural networks may boost nuclear reactor efficiency and reliability.
Critical Minerals Don’t Belong in Landfills – Microwave Tech Offers a Cleaner Way to Reclaim Them from E-waste
E-waste recycling focuses on retrieving steel, copper, aluminum, but ignores tiny specks of critical materials. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials.
Microbes That Extract Rare Earth Elements Also Can Capture Carbon
A small but mighty microbe can safely extract the rare earth and other critical elements for building everything from satellites to solar panels – and it has another superpower: capturing carbon dioxide.
Virtual Models Paving the Way for Advanced Nuclear Reactors
Computer models predict how reactors will behave, helping operators make decisions in real time. The digital twin technology using graph-neural networks may boost nuclear reactor efficiency and reliability.
Critical Minerals Don’t Belong in Landfills – Microwave Tech Offers a Cleaner Way to Reclaim Them from E-waste
E-waste recycling focuses on retrieving steel, copper, aluminum, but ignores tiny specks of critical materials. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials.
Microbes That Extract Rare Earth Elements Also Can Capture Carbon
A small but mighty microbe can safely extract the rare earth and other critical elements for building everything from satellites to solar panels – and it has another superpower: capturing carbon dioxide.