-
The Pandemic: Implications for Terrorist Interest in Biological Weapons
What if the IS or al-Qaeda obtained and spread a highly contagious virus in a community or country that they sought to punish? With the pandemic highlighting weaknesses in response efforts, will these groups now seek to obtain infectious viruses to achieve these same deadly results?
-
-
Secure Communication with Light Particles
Quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Researchers have developed a new, tap-proof communication network.
-
-
Bolstering Security by Detecting Hidden Anomalies
The ability to assess deviations from expected movement requires a deep characterization of normal activity across times of day, days of the week, weeks of the year as well as across different types of people. Current human mobility modeling techniques can provide high-level insight into human movement for the study of disease spread or population migration, but they don’t provide the complex, fine-grained modeling the Intelligence Community (IC) needs to identify more subtle anomalies with confidence.
-
-
Operational Protection of Water Infrastructure Against Cyber-Physical Threats
As the water supply system becomes more digitalized, cyberthreats are increasing. It is time for an all-hazard risk management and mitigation system.
-
-
The Wall of Wind Can Blow Away Buildings at Category 5 Hurricane Strength to Help Engineers Design Safer Homes – but Even That Isn’t Powerful Enough
When engineers built the Wall of Wind test facility 10 years ago at Florida International University, it was inspired by Hurricane Andrew, a monster of a storm that devastated South Florida in 1992. Tropical storms are ramping up in intensity as the climate changes and ocean and air temperatures rise. Designing homes and infrastructure to withstand future storms will require new test facilities that go well beyond today’s capabilities.
-
-
Making hardware and software Quantum-Safe
Quantum computers are thought to have the potential to perform specialized calculations beyond the reach of any supercomputers in existence and will be able to break current public key cryptosystems used today.
-
-
Reforming DHS’s Biodefense Operations and Governance
Today’s biological threats show no signs of desisting any time soon. Naturally occurring outbreaks, epidemics and pandemics, and laboratory accidents pose a growing challenge – while the number of high-containment laboratories and amount of dangerous research continues to increase unabated. “DHS, as chief among those federal departments and agencies responsible for securing the homeland, must overcome its current state of fractionation and demonstrate to the rest of the government, country, and world that it is capable of coordinating and leading efforts in biodefense and other arenas,” Carrie Cordero and Asha M. George write.
-
-
S&T Hackathon: Thwarting Emerging Threats to Critical Infrastructure
Threats against the U.S. critical infrastructure are not new—physical threats and natural disasters have challenged the U.S. critical infrastructure and their support systems time and time again. But the rapid development of new information and communication technologies, and their inevitable integration the into the U.S. critical infrastructure, bring with them the possibility of digital attacks and other new challenges that the United States must be ready to face.
-
-
Next-Generation Search & Rescue: Body Cameras, Live Streaming
Typically, search and rescue teams in the wilderness use radio, in-person briefings, text messaging, drones and paper forms to communicate and coordinate their efforts. New digital tools have the potential to revolutionize wilderness search and rescue efforts.
-
-
Local, Temporary 5G Network to Help Fight Forest Fires
When it comes to activities such as fighting forest fires, monitoring construction sites or providing multimedia services at sports and other mass events, a reliable, secure 5G campus network is often needed locally and temporarily to ensure maximum network coverage on the entire site.
-
-
Hydropower’s Future Is Clouded by Droughts, Floods and Climate Change – It’s Also Essential to the U.S. Electric Grid
The United States has over 2,100 operational hydroelectric dams, with locations in nearly every state. They play essential roles in their regional power grids. But most were built in the past century under a different climate than they face today. As global temperatures rise and the climate continues to change, competition for water will increase, and the way hydropower supply is managed within regions and across the power grid in the U.S. will have to evolve.
-
-
New Method Kills Cyberattacks in Less Than a Second
Researchers, using artificial intelligence, new method that could automatically detect and kill cyberattacks on our laptops, computers and smart devices in under a second.
-
-
Computer Code to Speed Up Airport Security
Imagine moving through airport security without having to take off your shoes or belt or getting pulled aside. Researchers are working on the Open Threat Assessment Platform, which allows the Transportation Security Administration to respond more quickly and easily to threats to air travel safety.
-
-
SWAT Team Members as Amateur Inventors Who Make a Difference
SWAT teams routinely enter dangerous situations where they need to make difficult, potentially life-and-death decisions. Such challenging circumstances present opportunities for innovation, and these first responders are often amateur inventors as well.
-
-
The Civil-Military Divide over Artificial Intelligence
What factors influence how comfortable and uncomfortable software engineers feel with potential applications of AI for the U.S. military? Is there a correlation between the degree of trust that software engineers have in societal institutions—specifically, in DoD—and their perception of the acceptability of building AI applications for DoD? Do software engineers perceive the countries that DoD has identified as strategic competitors as a meaningful threat to the United States? What types of news media and other sources of information are software engineers relying on to inform them about events related to DoD?
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare
Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.
AI and the Future of the U.S. Electric Grid
Despite its age, the U.S. electric grid remains one of the great workhorses of modern life. Whether it can maintain that performance over the next few years may determine how well the U.S. competes in an AI-driven world.
Using Liquid Air for Grid-Scale Energy Storage
New research finds liquid air energy storage could be the lowest-cost option for ensuring a continuous power supply on a future grid dominated by carbon-free but intermittent sources of electricity.
Enhanced Geothermal Systems: A Promising Source of Round-the-Clock Energy
With its capacity to provide 24/7 power, many are warming up to the prospect of geothermal energy. Scientists are currently working to advance human-made reservoirs in Earth’s deep subsurface to stimulate the activity that exists within natural geothermal systems.
Experts Discuss Geothermal Potential
Geothermal energy harnesses the heat from within Earth—the term comes from the Greek words geo (earth) and therme (heat). It is an energy source that has the potential to power all our energy needs for billions of years.
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”