Trends impacting National Security
It is important to look broadly for disruption. This list includes 386 trends we're following that may shape the future for this industry. You can also click here to search for trends by industry and technology.
- Self-Sovereign Identity
- Web 3.0
- Tokenizing Value
- Tokens For Smart Royalties and Freelancers
- Immutable Content
- Content Provenance and Permanent Archiving
- Distributed Computing For a Cause
- Tech Companies Acting Like Banks
- Financial Inclusion
- The Rise of Quant Funds
- Regulating Open Banking
- Social Payments
- Countries Creating Digital Decentralized Currencies
- Deep Learning for Food Recognition
- Big Tech Gets into Farming
- Big Tech Gets Into Healthcare
- Patient-Generated Health Data
- Antitrust Probes and Lawsuits
- Policy Uncertainty
- Regulating Data Ownership
- Digital Dividends to Fund Universal Basic Income Plans
- Multilateral Science and Technology Acts
- Overhauling Government Tech Infrastructure
- China’s Quest for Global Cybersovereignty
- U.S. and Global Election Security
- Interoperability Initiatives
- Corporate Foreign Policy
- Blockchain
- Digital Citizenship
- Personal Robots and Robot Butlers
- Ethical Manufacturing
- Robot Rights
- Smart Dust
- Automating the Supply Chain
- Sustainability in Supply Chain and Logistics
- Rebuilding the Cold Chain
- Grid Management
- Reversing Environmental Rules and Regulations
- Green Tech
- Renewable Energy
- Charging Stations
- Ultra-High-Voltage Direct Current and Macro Grids
- Better Batteries
- The Anthropocene Epoch
- Unpredictable, Rising Sea Levels
- Extreme Weather Events
- Human Migration Patterns Shift
- Precision Agriculture
- Popup Newsrooms and Limited-Edition News Products
- Demands for Accountability and Trust
- The Proliferation of Splinternets
- Autonomous, Programmable Robot Swarms
- Robotic Process Automation
- Robot Compilers
- Soft Robotics
- Optimizing for New Types of Search
- Investigating the Algorithms
- Journalism as a Service
- One-To-Few Publishing
- The First Amendment in a Digital Age
- Content Moderation in the Name of National Security
- Digitally Retouching History
- 5G Triggers a Surge of New Businesses
- Capturing IIoT Metadata
- Robots as a Service (RaaS)
- Collaborative Robots
- Self-Assembling Robots
- Commercial Quadrupedal Robots
- Platform Switching and Demographic Shifts Threaten Established Social Networks
- Censorship in the Digital Age
- Sports Tech
- Connected Toys
- IRL Geography Reshapes the Virtual World
- Digital Frailty
- Trigger Warnings
- Platform Ownership
- Platforms Forced to Pick a Side
- Detecting Authentic Activity
- Continued Media Consolidation
- The Subscription Economy Matures
- Fuel-Free Space Propulsion Systems
- Mercury Rain
- Galactic Gas Stations
- Space Forces
- China’s Space Ambitions
- Ultra-Long Space Missions
- Automated Credit Risk Modeling
- Crypto-Mining Malware
- Crypto Trading Bots
- Bounty Programs
- Magnetic Tape Supply Shortages
- Biometric Malware
- State-Sponsored Security Breaches
- Critical Infrastructure Targets
- Offensive Government Hacking
- Space
- Imaging Space
- Lots (and Lots) of Satellite Launches
- Crowded Skies
- Internet from Space
- Space-Based Quantum Internet
- Space Junk
- Bigger, Bolder Telescopes
- Asteroid Mining for Resources
- The New Space Economy
- Made in Space
- Space Tourism
- Galactic Ride Sharing
- Seeking a New Life in the Off-World Colonies
- Security
- Zero-Day Exploits on the Rise
- Zero-Knowledge Proofs Go Commercial
- Gaining Access to Backdoors
- Remote Kill Switches
- Insecure Supply Chains
- Data Manipulation Becomes The Greater Threat
- Consumer Device Targeting
- Cyber Risk Insurance
- A.I.-Powered Automated Hacking Systems
- DDoS Attacks on the Rise
- Third-Party Verified Identities
- Ransomware-as-a-Service
- Decentralized Hacktivists
- Targeted Attacks on Voice Interfaces
- Open Source App Vulnerabilities
- Global Cybersecurity Pacts
- Proliferation of Darknets
- Hijacking Internet Traffic
- Weird Glitches
- The End of Biological Privacy
- Public Entities Selling Private Data
- Connected Device Security Loopholes
- Tech Workers Fighting for Privacy
- Encrypted Messaging Networks
- Vanishing Messages
- Digital Eavesdropping Rights
- Data Ownership
- Digital Self-Incrimination
- Differential Privacy
- Promoting Anonymity
- Verification
- Revenge Porn
- Drone Surveillance
- Influencing Future Privacy Laws
- Defining Online Harassment
- Safeguarding and Verifying Leaked Data
- Trolls
- Data Retention Policies
- Compliance Challenges and Unrealistic Budgets
- Head Mounted Displays
- Connected Fabrics
- Smart Belts and Shoes
- Touch-Sensitive Materials
- Home Automation
- Digital Emissions
- Interoperability
- Retrofitting Old Homes with New Tech
- Real Estate and Home Building Powered by Platforms
- Smart Camera News Networks
- Networked Smart Devices
- Interactive Fitness Equipment
- Privacy
- Rings and Bracelets
- Hearables / Earables
- Smart Gloves
- Forced Bundling and Planned Obsolescence
- Smart Cameras
- The End of Remote Control
- Smart Appliance Screens
- DNA Storage
- Microbe-Engineering As a Service
- Microbiome Extinction
- Biointerfaces
- Nanomesh Temporary Tattoos
- Dissolving Bioelectronics
- Smart Threads
- Adaptive Wearable Technologies
- Genetic Screening
- Biological DVRs
- Superbugs, Viruses and Phages
- Building a Comprehensive Human Cell Atlas
- Programmable, Ingestible, and Implantable Microbots
- Skinput
- Wearables
- Cloud-Based Wireless Body Area Networks
- Commercial Full-Body Exoskeletons
- Wearable Air Conditioners
- Brain-Machine Interfaces (BMIs)
- Smartwatches
- Off-Planet Terraforming
- Synthetic Biology
- Super-Fast Molecule Discovery
- Designer Cells
- Molecular Robotics
- Building Full Chromosomes
- Synthetic Age Reversal
- Genomic Editing
- Gene Vandalism
- Prime Editing
- Organoid Development
- Super Pigs
- Unregulated Pet Cloning
- A Shortage of Genome Storage
- Single-Nucleotide Polymorphism (SNP) Profiling
- Creating Synthetic Wombs
- Injecting Clouds with Sea Salt Particles
- Reflecting Sunlight
- Sand for Glacier Melt
- Fertilizing the Oceans
- Enzymes to Eat Ocean Trash
- Corporate Environmental Responsibility
- Sustainability as Corporate Identity
- Corporates Adopt Net-Zero Energy
- Sustainable Shipping
- Aeroponics, Vertical Cultivation and Indoor Plant Factories
- Geoengineering
- Storing Captured Carbon with Algae and Bacteria
- Converting Carbon Dioxide into Building Materials
- Stratospheric Aerosol Scattering with Sulfur Dioxide
- Reducing Corporate Reliance on Plastics
- Autonomous Underwater Vehicles
- Drone Air Lanes
- Follow Me Autonomously
- Drone Swarms
- Transportation Trends
- Cognitive Active Safety Features
- Electric Vehicles Cause Electricity Demand Spikes
- Transportation-as-a-Service
- Forced Updates To Firmware and Software
- Analog Fallbacks
- Exponential Growth in Autonomous Miles Data
- Autonomous Last Mile Logistics
- Mixed-Use Sidewalks and Drone Lanes
- Supersonic Flights
- Autonomous Ships
- Wireless Charging Everywhere
- Energy Trading Platforms for Blockchain
- Zero Carbon Natural Gas
- Floating Nuclear Energy Plants
- Subsea Power Grids
- A.I. at the Edge
- Neuroenhancers
- Near-Real-Time Application Environments
- Hyper-Local Data Centers for Edge Computing
- Quantum Supremacy
- Quantum for the Masses
- Drones
- Medical Supply Drone Delivery
- Drone Operation Centers
- Clandestine, Disappearing Drones
- Vaping and E-cigarettes
- Nootropics
- Quantum and Edge
- Drones-as-a-Service
- Personal Home Drone Surveillance
- Flying Beyond Visual Line of Sight
- Real-Time Mapping
- Drones for Dangerous and Hard-To-Reach Areas
- Flying Taxis
- Synth-Pop Makes a Comeback
- Simulating Human Experiences
- Synthetic Voice Fraud
- Synthetic Sex Tapes
- Synthetic Property Rights and Legal Protections
- Using Synthetic Media to Get Around Copyright Laws
- Synthetic Media Marketplaces
- Truth Decay in an Era of Synthetic Media
- Speech Synthesis
- Modulating Custom Voices
- Deep Behaviors and Predictive Machine Vision
- Generative Algorithms for Voice, Sound and Video
- Mapped Synthetic Environments
- Scaling Cannabis Infusion Techniques
- Specialized Cannabis CRM Platforms
- Vices
- CBD-Infused Products
- Cannabis Supply Chains
- Cannabis Compliance Systems
- Banking for Cannabis Dispensaries
- Two-Factor Biometric-Based Authentication
- Gesture Recognition
- Object Recognition in Computational Photography
- Biometric Camouflage
- Personality Recognition
- Accent Recognition
- Emotional Recognition
- Responsive Recognition Technology
- Affective Computing
- Genetic Recognition
- Universal Genetic Databases
- Persistent Workplace and School Surveillance
- Food Recognition Systems
- Emerging Digital Interfaces
- Mixed Reality
- Virtual Reality
- Augmented Reality
- Synthetic Media and Content
- Holograms
- 360-degree Video
- Scoring
- Persistent Tracking and Scoring
- Scoring Agencies Are On the Rise
- Intentionally Opaque Methodologies
- Recognition
- Faceprints
- Voiceprints
- Bone Recognition
- Proximity Recognition
- A.I. and Digital Dividends
- Vast Differences in Verification Systems
- Behavioral Biometrics
- Scoring Vulnerable Populations
- Surveillance Scoring-as-a-Service (SSaaS)
- Bias in Scoring Systems
- Conflicting Norms, Standards and Regulations for Scoring
- Automatic Voice Transcription
- Bioacoustic Recognition
- WiFi Recognition
- Ambient Computing Expands
- Ubiquitous Digital Assistants
- The New Mil-Tech Industrial Complex
- National A.I. Strategies
- The Race to Establish A.I. Rules
- Algorithmic Warfare
- Making A.I. Explain Itself
- Using A.I. in Critical Systems
- China’s A.I. Rules
- Artificial Emotional Intelligence
- Personal Digital Twins
- The Rise of Undocumented A.I. Accidents
- Problematic Data Sets
- A.I. to Catch Cheaters
- Algorithms Designed to Target Vulnerable Populations
- A.I. Still Has a Bias Problem
- A.I. Systems Intentionally Hiding Data
- Multitask Learning
- New Generative Modeling Techniques
- Hybrid Human-Computer Vision Analysis
- Predictive Machine Vision
- Automated Machine Learning (AutoML)
- Customized Machine Learning
- Graph Neural Networks
- Intelligent Optical Character Recognition
- A.I. for the Creative Process
- Generative Algorithms for Content Production
- Automated Versioning
- Algorithmic Fact Checking
- Datamining Crowds
- Generative Adversarial Networks (GANs)
- Probabilistic Programming Languages
- Machine Image Completion
- Generating Virtual Environments from Short Videos
- Automatic Voice Cloning and Dubbing
- Spotting Machine-Written Text
- Deep Linking
- Global Rush to Fund A.I.
- Algorithm Marketplaces
- Fragmentation
- Neuro-Symbolic A.I. Algorithms and Systems
- Real-Time Machine Learning
- Natural Language Understanding (NLU)
- Machine Reading Comprehension (MRC)
- Natural Language Generation (NLG)
- Real-Time Context in Machine Learning
- General Reinforcement Learning Algorithms
- Deep Learning Scales
- Faster and More Powerful Open Source Frameworks
- Reinforcement Learning and Hierarchical RL
- Continuous Learning
- Corporate Biometric Spoofing
- Bots
- Marketplace Consolidation
- Liability Insurance for A.I.
- Ambient Surveillance
- Creating 3D Models from Flat 2D Images
- Artificial Intelligence
- Using A.I. to Speed the Process of Scientific Discovery
- A.I. in the Cloud
- Robotic Process Automation
- Digital Twins and Cognitive Twins in the Enterprise
- Robots with Cognitive Skills
- Advanced A.I. Chipsets
- Serverless Computing
- Proprietary, Homegrown A.I. Languages
- Proliferation of Franken-Algorithms
- Companies Manipulating A.I. Systems for Competitive Advantage