Peter Heine, senior advisor in the Strategic Threat Analysis group at PNNL, recently travelled to Brussels, Belgium, to support the World Customs Organization's Operation Stingray.
A team of researchers at PNNL has received the 2025 National Nuclear Security Administration CIO Award for developing an innovative solution to enhance secure communications.
Staff at PNNL recently traveled to Cyprus to facilitate a multilateral workshop on chemical forensics investigations hosted by the U.S. Department of State, Office of Weapons of Mass Destruction Terrorism.
Staff at PNNL recently visited the University of Texas at San Antonio to deliver lectures on international law, arms control, and nuclear nonproliferation during Nuclear Policy Week.
PNNL staff scientist selected as a guest editor for a special issue titled “Ligand-Metal Complementarity in Rare Earth and Actinide Chemistry,” in the well-known journal Inorganic Chemistry.
Researchers at PNNL leveraged their experiences to connect with attendees at the 2022 SACNAS National Diversity in STEM Conference, October 27–29, 2022, in San Juan, Puerto Rico.
PNNL Chief Scientist for Computing Jim Ang will be part of a DOE Office of Science virtual discussion regarding industry collaborations on AI hardware.
Anika Halappanavar’s research into COVID-19 misinformation earned her recognition by the Washington State Academy of Sciences as one of the state’s top high school researchers.
PNNL data scientists Svitlana Volkova and Emily Saldanha, along with former PNNL intern Pamela Bilo Thomas, will publish their research on online information spread in Nature's Scientific Reports.
PNNL researchers Leo Fifield, Mike Larche, and Bishnu Bhattarai were recently elected to the board of the Institute of Electrical and Electronics Engineers Richland, Washington section.
As a member of the NAM board of directors, Brett Jefferson, PNNL data scientist, will help lead the professional association’s mission to advance mathematical excellence of underrepresented minorities.
Red teaming for CPS, the process of challenging systems, involves a group of cybersecurity experts to emulate end-to-end cyberattacks following a set of realistic tactics, techniques, and procedures.