-
The New Water Reuse Consortium Will Address Clean Water Access and Sustainability Challenges
The Water Reuse Consortium, a collaborative efforts of several academic institutions, is a 3-phase, $38 million program to tackle pressing water challenges through innovative research, education, communication, and collaborative efforts between government, local communities, industry, and academia.
-
-
New Tool to Improve Forecasting of Extreme Rain Events
Researchers have identified the factors affecting the likelihood of extreme rain events and have developed a tool that can improve the forecasting of such events. This tool will be made available to the Israel Meteorological Service and its counterpart agencies throughout the world.
-
-
China Extends Its Lead Over U.S. in Key Technologies
Western democracies are losing the global technological competition, including the race for scientific and research breakthroughs, and the ability to retain global talent—crucial ingredients that underpin the development and control of the world’s most important technologies, including those that don’t yet exist.A new report from the Australian Strategic Policy Institute (ASPI) finds that China’s global lead extends to 37 out of 44 technologies that ASPI is now tracking. These findings should be a wake-up call for democratic nations, who must rapidly pursue a strategic critical technology step-up.
-
-
U.S. Battle for Technology Standards
Technology standards have become powerful instruments of geostrategic influence in recent years. Technology standards—which determine how devices, systems and networks operate and interact with each other—influence a nation’s economic competitiveness, national security and military power.
-
-
Needed: Ground Rules for the Age of AI Warfare
The time has arrived form an international agreement on autonomous weapons. Lauren Kahn writes in Foreign Affairs that AI is at an inflection point: the technology is maturing and is increasingly suitable for military use, while the exact outlines of future AI military systems, and the degree of disruption they will cause, remain uncertain and, hence, can be, at least somewhat, shaped.
-
-
The Executive Order on Commercial Spyware: Implications and Prospects
The growing national security threat from misuse of commercial spyware is increasingly being recognized. The US has been taking the lead in addressing the growing menace of unregulated spyware companies and the proliferation of intrusive tools. The Biden administration’s latest Executive Order will ensure that commercial spyware firms will be subjected to unprecedented scrutiny.
-
-
How AI Could Take Over Elections – and Undermine Democracy
Could organizations use artificial intelligence language models such as ChatGPT to induce voters to behave in specific ways? In his 16 May 2023 testimony in a Senate hearings on artificial intelligence OpenAI CEO Sam Altman said that he was concerned that some people might use language models to manipulate, persuade and engage in one-on-one interactions with voters. What would an AI-manipulated election look like?
-
-
AI Can Identify Patterns in Surface Cracking to Assess Damage in Reinforced Concrete Structures
Recent structural collapses, including tragedies in Surfside, Florida, Pittsburgh, New York City and Davenport. Iowa, have centered the need for more frequent and thorough inspections of aging buildings and infrastructure across the country.AI, combined with a classic mathematical method for quantifying web-like networks, help determine how damaged a concrete structure is, based solely on its pattern of cracking.
-
-
Space Tractor Beams May Not Be the Stuff of Sci-fi for Long
Researchers are drawing on one of the oldest tropes in science fiction: tractor beams like the ones the Starship Enterprise uses to safely move asteroids out of the way. Using devices called “electron beams,” these space dumpster trucks would slowly haul that debris to safety without ever having to touch it—all by tapping into the same kind of physics that make your socks stick to your pants in the dryer.
-
-
Quantum Technology for Mobile Phone Encryption Nears
In a few years, protection of communication with quantum encryption may become a permanent fixture in mobile phones and thus protect communication from hacking. The technology has already been demonstrated in large data transfers in the financial sector.
-
-
Wireless Sensor System for Continuous Monitoring of Bridge Deformation
More than 46,000 bridges across the United States are considered to be in poor condition and in need of close monitoring. Researchers have developed a solar-powered, wireless sensor system that can continually monitor bridge deformation and could be used to alert authorities when the bridge performance deteriorates significantly.
-
-
How Can Congress Regulate AI? Erect Guardrails, Ensure Accountability and Address Monopolistic Power
A new federal agency to regulate AI sounds helpful but could become unduly influenced by the tech industry — instead, Congress can legislate accountability.Instead of licensing companies to release advanced AI technologies, the government could license auditors and push for companies to set up institutional review boards. The government hasn’t had great success in curbing technology monopolies, but disclosure requirements and data privacy laws could help check corporate power.
-
-
Can Quantum Computing Protect AI from Cyberattacks?
AI algorithms are everywhere. They underpin nearly all autonomous and robotic systems deployed in security applications. This includes facial recognition, biometrics, drones and autonomous vehicles used in combat surveillance and military targeting applications. Can we prevent malicious attacks and improve the cybersecurity of algorithms powered by artificial intelligence (AI)? Quantum machine learning may hold the key.
-
-
New Nontoxic Powder Uses Sunlight to Disinfect Contaminated Drinking Water
A low-cost, recyclable powder can kill thousands of waterborne bacteria per second when exposed to sunlight. Scientists say the ultrafast disinfectant could be a revolutionary advance for 2 billion people worldwide without access to safe drinking water.
-
-
AI Model Aims to Plug Key Gap in Cybersecurity Readiness
There are more than 213,800 available known “keys”—unofficial entry points into computer systems, better known as vulnerabilities or bugs—and they’re already in the hands of criminals. There are likely many more that are not known. How can all the threats and attacks be tracked, prioritized and prevented? Scientists link resources to improve prioritization, spot attacks more quickly.
-
More headlines
The long view
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.
Prototype Self-Service Screening System Unveiled
TSA and DHS S&T unveiled a prototype checkpoint technology, the self-service screening system, at Harry Reid International Airport (LAS) in Las Vegas, NV. The aim is to provide a near self-sufficient passenger screening process while enabling passengers to directly receive on-person alarm information and allow for the passenger self-resolution of those alarms.
Falling Space Debris: How High Is the Risk I'll Get Hit?
An International Space Station battery fell back to Earth and, luckily, splashed down harmlessly in the Atlantic. Should we have worried? Space debris reenters our atmosphere every week.
Testing Cutting-Edge Counter-Drone Technology
Drones have many positive applications, bad actors can use them for nefarious purposes. Two recent field demonstrations brought government, academia, and industry together to evaluate innovative counter-unmanned aircraft systems.
Strengthening the Grid’s ‘Backbone’ with Hydropower
Argonne-led studies investigate how hydropower could help add more clean energy to the grid, how it generates value as grids add more renewable energy, and how liner technology can improve hydropower efficiency.
The Tech Apocalypse Panic is Driven by AI Boosters, Military Tacticians, and Movies
From popular films like a War Games or The Terminator to a U.S. State Department-commissioned report on the security risk of weaponized AI, there has been a tremendous amount of hand wringing and nervousness about how so-called artificial intelligence might end up destroying the world. There is one easy way to avoid a lot of this and prevent a self-inflicted doomsday: don’t give computers the capability to launch devastating weapons.
The Tech Apocalypse Panic is Driven by AI Boosters, Military Tacticians, and Movies
From popular films like a War Games or The Terminator to a U.S. State Department-commissioned report on the security risk of weaponized AI, there has been a tremendous amount of hand wringing and nervousness about how so-called artificial intelligence might end up destroying the world. There is one easy way to avoid a lot of this and prevent a self-inflicted doomsday: don’t give computers the capability to launch devastating weapons.