-
When the Hardware Traps Criminals
Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.
-
-
Making Muons for Scientific Discovery, National Security
The Pentagon and other agencies have sought advanced sources that generate gamma rays, X-rays, neutrons, protons, and electrons to enable a variety of scientific, commercial, and defense applications – from medical diagnostics, to scans of cargo containers for dangerous materials, to non-destructive testing of aircraft and their parts to see internal defects. The problem: None of these sources can image through concrete walls several meters thick, map the core of a volcano from the outside, or peer deep underground to locate chambers and tunnels. Muons — deeply penetrating subatomic particles – can do all those things. DARPA seeks a compact source for muons.
-
-
Drones Approved for Aerial Inspections of Power Facilities
Drones have allowed companies new ways to stretch the boundaries of current regulations. One of the latest wins for drone technology is a waiver from the FAA that gives Dominion Energy, one of the U.S. largest energy companies, permission to use drones to inspect power-generation facilities in seven states.
-
-
A Key Role for Quantum Entanglement
A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists, including ETH physicists, has now demonstrated experimentally, for the first time, an approach to quantum key distribution that uses high-quality quantum entanglement to provide much broader security guarantees than previous schemes.
-
-
Hack Post-Quantum Cryptography Now So That Bad Actors Don’t Do It Later
In February, the cryptography community was stunned when a researcher claimed that an algorithm that might become a cornerstone of the next generation of internet encryption can be cracked mathematically using a single laptop. Edward Parker and Michael Vermeer write that this finding may have averted a massive cybersecurity vulnerability, but it also raises concerns that new encryption methods for securing internet traffic contain other flaws that have not yet been detected.
-
-
Coming Soon: Solar-Powering First Responders?
Fabric woven to harness solar power recently completed weaving trials. The fabric will ultimately be used to design high-functioning gear that can keep responders’ tech charged and ready.
-
-
Secure Cryptography with Real-World Devices Is Now Possible
New research published in Nature explains how an international team of researchers have, for the first time, experimentally implemented a type of quantum cryptography considered to be the ‘ultimate’, ‘bug-proof’ means of communication.
-
-
Tool Estimates Costs of Power Interruptions
Berkeley Lab-led initiative helps electric companies improve grid reliability and resilience. The initiative aims to update and upgrade the Interruption Cost Estimate (ICE) Calculator – a publicly available, online tool – which estimates the economic consequences of power interruptions.
-
-
A Water Strategy for the Parched West: Have Cities Pay Farmers to Install More Efficient Irrigation Systems
Unsustainable water practices, drought and climate change are causing this crisis across the U.S. Southwest. To achieve a meaningful reduction in water use, states need to focus on the region’s biggest water user: agriculture.
-
-
Your Brain Is Better Than You at Busting Deepfakes
Deepfake videos, images, audio, or text appear to be authentic, but in fact are computer generated clones designed to mislead you and sway public opinion. They are the new foot soldiers in the spread of disinformation and are rife – they appear in political, cybersecurity, counterfeiting, and border control realms. While observers can’t consciously recognize the difference between real and fake faces, their brains can.
-
-
Deep Learning Technology for Faster and More Accurate Terahertz Security Inspection
With the strengthening of global anti-terrorist measures, it is increasingly important to conduct security checks in public places to detect concealed objects carried by the human body. A new detection method can be used for accurate and real-time detection of hidden objects in terahertz images.
-
-
'Killer Robots': Will They Be Banned?
A UN panel in Geneva remains split on whether to ban autonomous weapons, which don’t need a human to pull the trigger. Increasingly, these sorts of weapons are the stuff of a manufacturer’s promotional materials rather than science fiction movies. The war in Ukraine is complicating the conversation.
-
-
The World’s Largest Experimental Earthquake Infrastructure Facility
The National Science Foundation (NSF) promotes research investments and technology that help recognize and mitigate the impacts of natural disasters across the U.S.“The ability to test infrastructure under a full range of motion is critical for unleashing new and pioneering research that can lead to effective, economical and innovative infrastructure designs and retrofitting strategies for existing infrastructure,” said NSF director Sethuraman Panchanathan.
-
-
Solution to Encrypted Messages Being Hacked Before Sending or After Receipt
Message applications must do more to keep user data safe from undetected malware or over-the-shoulder eavesdropping that bypasses encryption before a message has been sent. Researchers have created a new end-to-end encryption mechanism that protects users’ communications at a far higher level than currently experienced on popular applications.
-
-
NIST chooses Kyber, Dilithium and SPHINCS+ as Standards for Post-Quantum Cryptography
NIST has selected CRYSTALS-KYBER, CRYSTALS-Dilithium and SPHINCS+, three security algorithms, as one the new standards for post-quantum cryptography. The underlying technology must ensure that the encryption of sensitive communication will continue to be secure in the coming decades.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare
Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.
AI and the Future of the U.S. Electric Grid
Despite its age, the U.S. electric grid remains one of the great workhorses of modern life. Whether it can maintain that performance over the next few years may determine how well the U.S. competes in an AI-driven world.
Using Liquid Air for Grid-Scale Energy Storage
New research finds liquid air energy storage could be the lowest-cost option for ensuring a continuous power supply on a future grid dominated by carbon-free but intermittent sources of electricity.
Enhanced Geothermal Systems: A Promising Source of Round-the-Clock Energy
With its capacity to provide 24/7 power, many are warming up to the prospect of geothermal energy. Scientists are currently working to advance human-made reservoirs in Earth’s deep subsurface to stimulate the activity that exists within natural geothermal systems.
Experts Discuss Geothermal Potential
Geothermal energy harnesses the heat from within Earth—the term comes from the Greek words geo (earth) and therme (heat). It is an energy source that has the potential to power all our energy needs for billions of years.
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”