Toggle light / dark theme

Humanity is under threat. At least according to Sir Martin Rees, one of Britain’s most esteemed astronomers.


These two kinds of technologies enable just a few people to have a hugely wide-ranging and maybe even global cascading effect. This leads to big problems of governance because you’d like to regulate the use of these things, but enforcing regulations worldwide is very, very difficult. Think how hopeless it is to enforce the drug laws globally or the tax laws globally. To actually ensure that no one misuses these new technologies is just as difficult. I worry that we are going to have to minimize this risk by actions which lead to a great tension between privacy, liberty and security.

Do you see ways that we can use and develop these technologies in a responsible way?

We’ve got to try. We can’t put the genie back in the bottle. We’ve just got to make sure that we can derive benefits and minimize risks. When I say we have a bumpy ride, I think it is hard to imagine that there won’t be occasions when there are quite serious disruptions caused by either error or by design using these new powerful technologies.

Rapid comprehension of world events is critical to informing national security efforts. These noteworthy changes in the natural world or human society can create significant impact on their own, or may form part of a causal chain that produces broader impact. Many events are not simple occurrences but complex phenomena composed of a web of numerous subsidiary elements – from actors to timelines. The growing volume of unstructured, multimedia information available, however, hampers uncovering and understanding these events and their underlying elements.

“The process of uncovering relevant connections across mountains of information and the static elements that they underlie requires temporal information and event patterns, which can be difficult to capture at scale with currently available tools and systems,” said Dr. Boyan Onyshkevych, a program manager in DARPA’s Information Innovation Office (I2O).

The use of schemas to help draw correlations across information isn’t a new concept. First defined by cognitive scientist Jean Piaget in 1923, schemas are units of knowledge that humans reference to make sense of events by organizing them into commonly occurring narrative structures. For example, a trip to the grocery store typically involves a purchase transaction schema, which is defined by a set of actions (payment), roles (buyer, seller), and temporal constraints (items are scanned and then payment is exchanged).

Read more

FRIB) will be a scientific user facility for the Office of Nuclear Physics in the U.S. Department of Energy Office of Science (DOE-SC). FRIB is funded by the DOE-SC, MSU and the State of Michigan. Supporting the mission of the Office of Nuclear Physics in DOE-SC, FRIB will enable scientists to make discoveries about the properties of rare isotopes (that is, short-lived nuclei not normally found on Earth), nuclear astrophysics, fundamental interactions, and applications for society, including in medicine, homeland security, and industry.

This video — The Facility for Rare Isotope Beams at MSU — explains the history of FRIB, its role in research and education, and its future in rare-isotope discoveries. It includes an animated sequence to help viewers understand what FRIB is about.

Employment opportunities: FRIB is looking for engineers, physicists, and other talented professionals to build the world’s leading rare isotope facility.

Read more

The international mobile communications system is built on top of several layers of technology, parts of which are more than 40 years old. Some of these old technologies are insecure, others have never had a proper audit and many simply haven’t received the attention needed to secure them properly. The protocols that form the underpinnings of the mobile system weren’t built with security in mind.


Security flaws threaten our privacy and bank accounts. So why aren’t we fixing them?

Read more

Quantum computing will break most of the encryption schemes on which we rely today. These five tips will help you get ready.

Search on the phrase “quantum computing,” and you’ll find a furious debate. On the one hand, you’ll read breathless articles predicting groundbreaking advances in artificial intelligence, genomics, economics, and pretty much every field under the sun. On the other, you’ll find the naysayers: It’s all hype. Large-scale quantum computers are still decades away — if they’re possible at all. Even if they arrive, they won’t be much faster than standard computers except for a tiny subset of problems.

There’s one area, however, where you’ll find all sides agree: Quantum computing will break most of the encryption schemes on which we rely today. If you’re responsible for your organization’s IT or security systems, and that sentence made the hair on the back of your neck stand up, good. To get ready for a post-quantum world, you should be thinking about the problem now.

Read more

Water scarcity is a global security risk. Researchers are developing ways to forecast risks to prevent conflicts.

A plant grows between cracked mud at the Theewaterskloof dam near Cape Town, South Africa, on Jan. 21, 2018. The dam, which supplies most of Cape Town’s potable water, is currently dangerously low as the city faces “Day Zero”, the point at which taps will be shut down across the city. Mike Hutchings / Reuters file.

Read more

For its 2018 finale, A SpaceX Falcon 9 rocket will launch the U.S. Air Force’s first third-generation navigation satellite for the Global Positioning System (GPS 3–01) from Cape Canaveral Air Force Station in Florida.

Liftoff window begins at 8:51 a.m. EST (1351 GMT).

▰ Get Live Alerts: (Rocket Launches & Webcasts)
https://goo.gl/9RFfhT

▰ Upcoming launch events: