-
Carbon-Hungry Microorganisms to Help Battle Climate Change
Scientists have demonstrated a new technique, modeled after a metabolic process found in some bacteria, for converting carbon dioxide (CO2) into liquid acetate, a key ingredient in “liquid sunlight” or solar fuels produced through artificial photosynthesis. New technique could fast-track future carbon-free solar fuels.
-
-
Using Blockchain to Increase Electric Grid Resiliency
Blockchain is best known for securing digital currency payments, but researchers are using it to track a different kind of exchange: It’s the first time blockchain has ever been used to validate communication among devices on the electric grid.
-
-
Top Prosecutors in CA, NY and DC Are Speaking Up for End-to-End Encryption
We all should have the ability to have a private conversation, and it follows that we need ways to communicate privately online as well. In the digital world, end-to-end encryption is our best chance to maintain our privacy and security.
-
-
Simple Hardware to Defend Against Microgrid Attacks
An inexpensive piece of hardware integrated with solar panel controllers can protect isolated power networks from cyberattacks.
-
-
A Growing Threat: Deliberate, Simultaneous Release of Pandemic Viruses Across Travel Hubs
COVID-19 demonstrated how the world is clearly vulnerable to the introduction of a single pandemic virus with a comparatively low case fatality rate. The deliberate and simultaneous release of many pandemic viruses across travel hubs could threaten the stability of civilization. Current trends suggest that within a decade, tens of thousands of skilled individuals will be able to access the information required for them single-handedly to cause new pandemics.
-
-
Examining Vulnerabilities of Electric Vehicle Charging Infrastructure
With electric vehicles becoming more common, the risks and hazards of a cyberattack on electric vehicle charging equipment and systems also increases. Reviewing the vulnerabilities of EV charging infrastructure would help prioritize grid protections and informs policy makers.
-
-
Maintaining Mountain Snowpacks Essential for Preserving Valuable Freshwater Resource
Snowcapped mountains generate mountain water runoff and snowmelt, which flow down to streams, rivers, lakes, and oceans. Around a quarter of the world depends on these natural “water towers” to replenish downstream reservoirs and groundwater aquifers for urban water supplies, agricultural irrigation, and ecosystem support. Carbon mitigation strategies are needed to maintain snowpack throughout the Americas.
-
-
Germany’s China Policy: Has It Learned from Its Dependency on Russia?
The German economy remains heavily dependent on China, its largest trading partner, despite mounting geopolitical tensions between the West and Beijing.
-
-
EFF's Atlas of Surveillance Database Now Documents 10,000+ Police Tech Programs
The EFF has created a searchable and mappable repository of which law enforcement agencies in the U.S. use surveillance technologies such as body-worn cameras, drones, automated license plate readers, and face recognition.
-
-
Drones Employed in the Ukraine War
Unmanned systems have revolutionized modern warfare – and pilotless aircraft have had a significant impact in the war in Ukraine.
-
-
The Benefits of Integrating Electric Vehicles into Electricity Distribution Systems
As the cost of EVs continues to decrease, the industry matures, incentives grow, and charging infrastructure improves, EVs could make up the vast majority of vehicles on the road in 2050. Many studies have looked at how increased electricity demand will affect the bulk power system in the United States, but public analysis of the impacts on the distribution system has been less prevalent.
-
-
Why Do Self-Driving Cars Crash?
As they traverse the air, land, or sea, encountering one another or other obstacles, these autonomous vehicles will need to talk to each other. Experts say we need to inject cybersecurity at every level of the autonomous vehicle networks of the future.
-
-
Nextgen Cybersecurity: A 5G-Enabled AI-Based Malware Classification System
Researchers develop a 5G-enabled deep learning approach for classifying malware attacks on the Industrial Internet of Things.
-
-
How Foreign Intelligence Services Compromise, Exploit U.S. Technology
Foreign intelligence services have intensified their efforts to compromise or exploit U.S. technology. A new report analyzes foreign collection attempts to obtain unauthorized access to sensitive or classified information and technology.
-
-
As the Planet Warms, Risks of Geoengineering the Climate Mount
Because a climate-disrupted future remains possible, another danger needs our attention. As the impacts of warming become more extreme, countries are more likely to turn to riskier measures to combat them, including geoengineering.
-
More headlines
The long view
New Technology is Keeping the Skies Safe
DHS S&T Baggage, Cargo, and People Screening (BCP) Program develops state-of-the-art screening solutions to help secure airspace, communities, and borders
Factories First: Winning the Drone War Before It Starts
Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”
How Artificial General Intelligence Could Affect the Rise and Fall of Nations
Visions for potential AGI futures: A new report from RAND aims to stimulate thinking among policymakers about possible impacts of the development of artificial general intelligence (AGI) on geopolitics and the world order.
Keeping the Lights on with Nuclear Waste: Radiochemistry Transforms Nuclear Waste into Strategic Materials
How UNLV radiochemistry is pioneering the future of energy in the Southwest by salvaging strategic materials from nuclear dumps –and making it safe.
Model Predicts Long-Term Effects of Nuclear Waste on Underground Disposal Systems
The simulations matched results from an underground lab experiment in Switzerland, suggesting modeling could be used to validate the safety of nuclear disposal sites.