-
Golden Dome: An Aerospace Engineer Explains the Proposed Nationwide Missile Defense System
Similar to Iron Dome, Golden Dome will consist of sensors and interceptor missiles but will be deployed over a much wider geographical region and for defense against a broader variety of threats in comparison with Iron Dome.
-
-
Golden Dome: What Trump Should Learn from Reagan’s ‘Star Wars’ Missile Defense System Plan
Golden Dome is reportedly partly inspired by Israel’s Iron Dome system that protects the country from missile attacks, but critics say that it’s much harder to design a defense system to protect a land mass the size of the United States. This is particularly the case in an era characterized by the threat from hypersonic missiles, as well as attacks from space.
-
-
Helping the Grid Keep Pace with a Power-Hungry Economy
After remaining nearly flat for almost two decades, America’s demand for electricity is growing, driven by data centers for AI, electric vehicles, production of electrofuels, and other factors. This rising demand is one of many reasons the U.S. needs to dramatically ramp up the grid’s capacity to move electricity.
-
-
How to Solve a Bottleneck for CO2 Capture and Conversion
Today’s carbon capture systems suffer a tradeoff between efficient capture and release, but a new approach developed at MIT can boost overall efficiency.
-
-
Catch Me If You Can? Check.
Sandia supports milestone hypersonic missile defense test, helping defend deployed troops and the nation against hypersonic threats.
-
-
How We Think About Protecting Data
A new study shows public views on data privacy vary according to how the data are used, who benefits, and other conditions.
-
-
Five Questions: RAND’s Jim Mitre on Artificial General Intelligence and National Security
A recent RAND paper lays out five hard national security problems that will become very real the moment an artificial general intelligence comes online. The researchers made only one prediction: If we ever get to that point, the consequences will be so profound that the U.S. government needs to take steps now to be ready for them.
-
-
The Future of Open Data in the Age of AI: Safeguarding Public Assets Amid Growing Private Sector Demands
AI offers immense potential, but that potential must be realized within a framework that protects the public’s right to its own information. The open data movement must evolve to meet this new challenge—not retreat from it.
-
-
What if Bin Laden Was Killed in the Era of Generative AI?
By leveraging machine learning to produce AI-generated content, adversaries can weaponize synthetic media, making fact and fiction nearly indistinguishable. The death—or not—of combatant leaders is prime example of the magnitude of the challenge this emerging reality poses.
-
-
AI Model Predicts Lightning Wildfires with 90% Accuracy
Israeli researchers use seven years of weather and satellite data to predict future wildfires caused by lightning strikes.
-
-
Low-Power Sensors Could Last 10 Years, Providing Surveillance, Security
Researchers at Sandia have spent the last three years developing an ultra-low-power chemical sensor to detect sarin and other chemical warfare agents or gaseous industrial toxins, aiming to protect the public and warfighters.
-
-
‘The West Will Lead’: Utah, Idaho, Wyoming Team Up on Nuclear Energy Development
Utah state leaders are taking the next steps in their efforts to make Utah a major nuclear energy development hub and a “national leader” in developing next-generation energy technology, reaching beyond state lines to do it.
-
-
From Help to Harm: How the Government Is Quietly Repurposing Everyone’s Data for Surveillance
The data that people provide to U.S. government agencies for public services such as tax filing, health care enrollment, unemployment assistance and education support is increasingly being redirected toward surveillance and law enforcement.
-
-
Decrypting Tomorrow’s Threats: Critical Infrastructure Needs Post-Quantum Protection Today
Some argue we still have time, since quantum computing capable of breaking today’s encryption is a decade or more away. But breakthrough capabilities, especially in domains tied to strategic advantage, rarely follow predictable timelines. The time to act on the quantum computing threat was yesterday. The next best time is now.
-
-
Quantum Computing - How it Changes Encryption as We Know It
All of the current encryption standards were created without the consideration of quantum computing and its capabilities. Classical computing would take thousands of years, or more, to crack encryption standards such as RSA or ECC. Quantum computing has the potential to break RSA and ECC encryption within hours or even minutes. AES encryption remains the most secure standard currently in use, but quantum computers will crack it in a fraction of the time that classical computers can.
-
More headlines
The long view
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
Bookshelf: Preserving the U.S. Technological Republic
The United States since its founding has always been a technological republic, one whose place in the world has been made possible and advanced by its capacity for innovation. But our present advantage cannot be taken for granted.
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Ukraine Drone Strikes on Russian Airbase Reveal Any Country Is Vulnerable to the Same Kind of Attack
Air defense systems are built on the assumption that threats come from above and from beyond national borders. But Ukraine’s coordinated drone strike on 1 June on five airbases deep inside Russian territory exposed what happens when states are attacked from below and from within. In low-level airspace, visibility drops, responsibility fragments, and detection tools lose their edge. Drones arrive unannounced, response times lag, coordination breaks.
Shots to the Dome—Why We Can’t Model US Missile Defense on Israel’s “Iron Dome”
Starting an arms race where the costs are stacked against you at a time when debt-to-GDP is approaching an all-time high seems reckless. All in all, the idea behind Golden Dome is still quite undercooked.
Our Online World Relies on Encryption. What Happens If It Fails?
Quantum computers will make traditional data encryption techniques obsolete; BU researchers have turned to physics to come up with better defenses.
Virtual Models Paving the Way for Advanced Nuclear Reactors
Computer models predict how reactors will behave, helping operators make decisions in real time. The digital twin technology using graph-neural networks may boost nuclear reactor efficiency and reliability.
Critical Minerals Don’t Belong in Landfills – Microwave Tech Offers a Cleaner Way to Reclaim Them from E-waste
E-waste recycling focuses on retrieving steel, copper, aluminum, but ignores tiny specks of critical materials. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials.
Microbes That Extract Rare Earth Elements Also Can Capture Carbon
A small but mighty microbe can safely extract the rare earth and other critical elements for building everything from satellites to solar panels – and it has another superpower: capturing carbon dioxide.
Virtual Models Paving the Way for Advanced Nuclear Reactors
Computer models predict how reactors will behave, helping operators make decisions in real time. The digital twin technology using graph-neural networks may boost nuclear reactor efficiency and reliability.
Critical Minerals Don’t Belong in Landfills – Microwave Tech Offers a Cleaner Way to Reclaim Them from E-waste
E-waste recycling focuses on retrieving steel, copper, aluminum, but ignores tiny specks of critical materials. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials.
Microbes That Extract Rare Earth Elements Also Can Capture Carbon
A small but mighty microbe can safely extract the rare earth and other critical elements for building everything from satellites to solar panels – and it has another superpower: capturing carbon dioxide.