• Chemical Fingerprint for Explosives in Forensic Research

    The police frequently encounter explosives in their forensic investigations related to criminal and terrorist activities. Chemical analysis of explosives can yield valuable tactical information for police and counterterrorist units.

  • Ultrasensitive Measurements Detect Nuclear Explosions

    Imagine being able to detect the faintest of radionuclide signals from hundreds of miles away. Scientists have developed a system which constantly collects and analyzes air samples for signals that would indicate a nuclear explosion, perhaps conducted secretly underground. The system can detect just a small number of atoms from nuclear activity anywhere on the planet. In terms of sensitivity, the capability – in place for decades – is analogous to the ability to detect coronavirus from a single cough anywhere on Earth.

  • New Technique to Prevent Medical Imaging Cyberthreats

    Complex medical devices such as CT (computed tomography), MRI (magnetic resonance imaging) and ultrasound machines are controlled by instructions sent from a host PC. Abnormal or anomalous instructions introduce many potentially harmful threats to patients, such as radiation overexposure, manipulation of device components or functional manipulation of medical images. Researchers at Ben-Gurion University of the Negev have developed a new artificial intelligence technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors.

  • Next-Generation Explosives Trace Detection Technology

    Explosive materials pose a threat whether they are used by domestic bad actors or in a theater of war. Staying ahead of our adversaries is a job that DHS DOD share. The two departments’ research and development work is no different.

  • Thwarting Illicit Cryptocurrency Mining with Artificial Intelligence

    Cryptocurrencies, such as Bitcoin, are forms of digital money. Instead of minting it like coins or paper bills, cryptocurrency miners digitally dig for the currency by performing computationally intense calculations. A new artificial intelligence algorithm is designed to detect cryptocurrency miners in the act of stealing computing power from research supercomputers.

  • New Detection Method to Protect Army Networks

    U.S. Army researchers developed a novel algorithm to protect networks by allowing for the detection of adversarial actions that can be missed by current analytical methods. The main idea of this research is to build a higher-order network to look for subtle changes in a stream of data that could point to suspicious activity.

  • One Step Closer to Bomb-Sniffing Cyborg Locusts

    Researchers found that they could direct locust swarms toward areas where suspected explosives are located, and that the locusts’ brain reaction to the smell of explosives can be read remotely. Moreover, a study found locusts can quickly discriminate between different smells or different explosives. “This is not that different from in the old days, when coal miners used canaries,” says a researcher. “People use pigs for finding truffles. It’s a similar approach — using a biological organism — this is just a bit more sophisticated.”

  • China Embraces Bigger Internet with Virtually Unlimited IP Addresses

    China is pushing for the adoption of a new worldwide Internet Protocol that could make the internet bigger and faster, but also potentially less anonymous. The technology, called IPv6, is an upgrade of the internet’s architecture that would allow trillions more electronic devices to have unique addresses online.

  • Lethal Autonomous Weapons May Soon Make Life-and-Death Decisions – on Their Own

    With drone technology, surveillance software, and threat-predicting algorithms, future conflicts could computerize life and death. “It’s a big question – what does it mean to hand over some of the decision making around violence to machines, and everybody on the planet will have a stake in what happens on this front,” says one expert.

  • Schools’ Facial Recognition Technology Problematic, Should Be Banned: Experts

    Facial recognition technology should be banned for use in schools, according to a new study. The research reveals inaccuracy, racial inequity, and increased surveillance are the touchstones of a flawed technology.

  • Might Technology Tip the Global Scales?

    Benjamin Chang, a fourth-year MIT graduate student, is assessing the impacts of artificial intelligence on military power, with a focus on the U.S. and China. “Every issue critical to world order — whether climate change, terrorism, or trade — is clearly and closely intertwined with U.S.-China relations,” says Chang. “Competition between these nations will shape all outcomes anyone cares about in the next 50 years or more.”

  • A Ban on WeChat and TikTok, a Disconnected World and Two Internets

    President Trump’s new executive orders banning Chinese social media apps TikTok and WeChat marked a significant escalation in the ongoing technology tensions between the U.S. and China. Eric Schmidt, former CEO of Google, predicted in 2018 that within the next decade, there would be two distinct Internets: one led by the U.S. and the other one led by China. Only two years after his comments, that prediction seems to have become a reality.

  • Overhauling the Circulatory System of the American West

    It might be tempting to think of cowboys and cattle drives, but the real story of the American West can be summed up in one word: water. While the costs might be daunting, the U.S. Department of Energy’s Water Power Technologies Office (WPTO) has teamed up with the Oregon-based Farmers Conservation Alliance to radically reimagine the role of irrigation systems in the West.

  • Testing Interoperability, Compatibility of Next Generation 911 systems

    Next Generation 911 (NG911) is an updated version of the current nationwide emergency response system operating on an Internet Protocol (IP) platform that will enable voice, video, photographs, text, and future communications technologies to be transmitted to and by the public and first responders for assistance. The Critical Infrastructure Resilience Institute (CIRI), a DHS Center of Excellence led by the University of Illinois at Urbana-Champaign (UIUC), will develop a framework and process for testing the interoperability and compatibility of NG911 systems.

  • Turning Waste into Valuable Critical Minerals

    A new way to treat acid mine drainage (AMD) could help transform the environmental pollution problem into an important domestic source of the critical rare earth elements needed to produce technology ranging from smart phones to fighter jets.