• Bolstering Cybersecurity in Navigation Systems

    Interference such as jamming and spoofing that targets critical infrastructure has the potential to cause widespread delays and cascading failures across multiple modes of transportation including ships, trains, trucks, and cars—and the problem is only getting worse. New project aims to enhance resilience of transportation infrastructure against cyber threats, developing advanced countermeasures for GPS spoofing and jamming.

  • Northwest Region-Wide Effort for the Next Generation Electrical Grid

    Smart grids offer an important defense against climate change: smart devices improve energy efficiency and data and automation help keep grids stable, even if the share of renewable energy increases. They thus address the problem of short-term disruptions to solar and wind power, such as when clouds obscure the sun or winds die down.

  • Self-Repairing Oyster Reefs to Protect Florida’s Coastlines

    By Beatriz Nina Ribeiro Oliveira

    Engineers and scientists are developing oyster-based shoreline protection for U.S. coastlines. The researchers seek to create self-repairing, biological and human-engineered reef-mimicking structures. The reef structures will be used to mitigate coastal flooding, erosion, and storm damage that threaten civilian and DOD infrastructure and personnel.

  • Tech Mandated by U.K. Online Safety Bill “Could Turn Phones into Surveillance Tools”

    By Laura Gallagher and Caroline Brogan

    Tech mandated by the U.K. government’s Online Safety Bill could be used to turn millions of phones into facial recognition tools. It would be possible, for example, for governments to use client-side scanning (CSS) to search people’s private messages, for example performing facial recognition, without their knowledge.

  • New Program Will Harness AI to Bolster Cybersecurity

    Researchers will work across disciplines to develop new approaches to artificial intelligence that is informed by and works with security experts. The AI tools developed by the new program will perform security tasks quickly and accurately while anticipating potential moves made by adversaries. The AI will counteract the possible attacks in a way that protects computer network security and ensures people’s safety.

  • Exploring Feasibility of Using Drones to Survey Sites for Low Levels of Radiation

    By Allan Brettman

    Drones are tools for search and rescue, traffic monitoring, weather monitoring, and perhaps even package hauling. One day, they may work with humans to augment the task of conducting surveys to detect low levels of radiation—information that could contribute to the decommissioning of sites no longer needed for nuclear-related energy production or research.

  • Long-Term Coastal Cliff Loss Due to Climate Change

    By Anne M. Stark

    The dangers of coastal erosion are an all-too-familiar reality for the modern residents of California’s iconic mountainous coastal communities. New tool brings historical perspective to the topic of how to manage these disappearing coastlines.

  • Making the Power Grid More Reliable and Resilient

    By Jake Malooley

    The U.S. power grid comprises nearly 12,000 power plants, 200,000 miles of high-voltage transmission lines, 60,000 substations and 3 million miles of power lines. It may well be the most massive and complex machine ever assembled. Argonne National Labs’ researchers help keep this machine working in the face of daunting challenges.

  • Using AI to Find Rare Minerals

    A machine learning model can predict the locations of minerals on Earth—and potentially other planets—by taking advantage of patterns in mineral associations.

  • DOJ: Charges Related to Efforts by Russia, China, Iran to Steal American Technology

    By Masood Farivar

    DOJ announced five criminal cases exposing the relentless efforts by Russia, China and Iran to steal sensitive U.S. technologies. The cases were brought by a new “strike force” created earlier this year to deter foreign adversaries from obtaining advanced U.S. innovation.

  • Six Pressing Questions We Must Ask About Generative AI

    The past twenty-five years have demonstrated that waiting until after harms occur to implement internet safeguards fails to protect users. The emergence of Generative Artificial Intelligence (GAI) lends an unprecedented urgency to these concerns as this technology outpaces what regulations we have in place to keep the internet safe.

  • Lessons from ‘Star Trek: Picard’ – a Cybersecurity Expert Explains How a Sci-Fi Series Illuminates Today’s Threats

    By Richard Forno

    Sometimes Hollywood gets it right by depicting reality in ways that both entertain and educate. And that’s important, because whether it’s a large company, government or your personal information, we all share many of the same cybersecurity threats and vulnerabilities. As a former cybersecurity industry practitioner and current cybersecurity researcher, I believe the final season of “Star Trek: Picard” is the latest example of entertainment media providing useful lessons about cybersecurity and the nature of the modern world.

  • Making Electric Vehicle Charging Stations Cybersecure

    As more electric vehicles (EVs) hit the road, charging stations are popping up across the United States. The benefits go beyond curbing carbon emissions from road travel. These systems can also link to the electric grid through smart charging, drawing power when overall demand is low and feeding it back to the grid when needed.

  • Quantum Cryptography Applications

    The development of quantum computing means that the use of classic cryptography for secure communications is in danger of becoming obsolete. Quantum cryptography, on the other hand, uses the laws of quantum mechanics to ensure total security. One example of this is quantum key distribution, which enables two parties to secure a message via a random secret key.

  • AI Models Fail to Reproduce Human Judgements About Rule Violations: Study

    By Adam Zewe

    Models trained using common data-collection techniques judge rule violations more harshly than humans would, researchers report.