Wearing the Future

a patch of haptic actuators shown on a user's neck

Worn on the neck, and paired with a smartphone, these haptic actuators designed in Matt Flavin's lab can help people with vision loss navigate their environment. (Photo: Chris McKenney)

If you walked through the Smithsonian American History Museum in the mid-2000s, you might have seen the “Smart Shirt,” the very first garment to seamlessly combine textiles and electronics.

Dubbed a “wearable motherboard,” it acted as a hub for sensors that could collect a range of biometric data.

That shirt foretold a future where health and biometric data could be collected unobtrusively through wearable technology. And it was created by engineers at Georgia Tech.

“What we have is all these nice data buses that are the fabric threads. And we can connect any kind of sensors to them,” said Professor Sundaresan Jayaraman, the shirt’s co-creator. “We were able to route information in a fabric for the first time, just like a typical computer motherboard. That’s why we called it the ‘wearable motherboard.’”

Jayaraman and Sungmee Park created the shirt in response to a Defense Advanced Research Projects Agency (DARPA) call for ideas to protect soldiers in battle. They envisioned a comfortable, flexible garment infused with fiber optics to detect gunshot wounds and vital signs. The data would help medics rapidly triage battlefield injuries in the critical minutes when emergency care is the difference between life and death.

Creating a shirt made it easy: no bulky electronics to add to the gear soldiers carried. Just a piece of clothing to wear under their fatigues. Park and Jayaraman developed a way to weave the garment on a loom, making mass production and consistency far easier.

The original sleeveless shirt is tucked into the Smithsonian archives now. But it’s possible to follow the thread of that first smart textile to the work happening in the pair’s School of Materials Science and Engineering (MSE) lab today. 

Read the full story in Helluva Engineer magazine.

 
News Contact

Joshua Stewart
College of Engineering

Hacking the Grid: How Digital Sabotage Turns Infrastructure Into a Weapon

Today’s power grid equipment incorporates internet-connected – and therefore hackable – computers. Joe Raedle/Getty Images

Today’s power grid equipment incorporates internet-connected – and therefore hackable – computers. Joe Raedle/Getty Images

The darkness that swept over the Venezuelan capital in the predawn hours of Jan. 3, 2026, signaled a profound shift in the nature of modern conflict: the convergence of physical and cyber warfare. While U.S. special operations forces carried out the dramatic seizure of Venezuelan President Nicolás Maduro, a far quieter but equally devastating offensive was taking place in the unseen digital networks that help operate Caracas.

The blackout was not the result of bombed transmission towers or severed power lines but rather a precise and invisible manipulation of the industrial control systems that manage the flow of electricity. This synchronization of traditional military action with advanced cyber warfare represents a new chapter in international conflict, one where lines of computer code that manipulate critical infrastructure are among the most potent weapons.

To understand how a nation can turn an adversary’s lights out without firing a shot, you have to look inside the controllers that regulate modern infrastructure. They are the digital brains responsible for opening valves, spinning turbines and routing power.

For decades, controller devices were considered simple and isolated. Grid modernization, however, has transformed them into sophisticated internet-connected computers. As a cybersecurity researcher, I track how advanced cyber forces exploit this modernization by using digital techniques to control the machinery’s physical behavior.

Hijacked Machines

My colleagues and I have demonstrated how malware can compromise a controller to create a split reality. The malware intercepts legitimate commands sent by grid operators and replaces them with malicious instructions designed to destabilize the system.

For example, malware could send commands to rapidly open and close circuit breakers, a technique known as flapping. This action can physically damage massive transformers or generators by causing them to overheat or go out of sync with the grid. These actions can cause fires or explosions that take months to repair.

Simultaneously, the malware calculates what the sensor readings should look like if the grid were operating normally and feeds these fabricated values back to the control room. The operators likely see green lights and stable voltage readings on their screens even as transformers are overloading and breakers are tripping in the physical world. This decoupling of the digital image from physical reality leaves defenders blind, unable to diagnose or respond to the failure until it is too late.

people wearing hardhats in front of electrical equipment the size of a small house

Today’s electrical transformers are accessible to hackers. GAO

Historical examples of this kind of attack include the Stuxnet malware that targeted Iranian nuclear enrichment plants. The malware destroyed centrifuges in 2009 by causing them to spin at dangerous speeds while feeding false “normal” data to operators.

Another example is the Industroyer attack by Russia against Ukraine’s energy sector in 2016. Industroyer malware targeted Ukraine’s power grid, using the grid’s own industrial communication protocols to directly open circuit breakers and cut power to Kyiv.

More recently, the Volt Typhoon attack by China against the United States’ critical infrastructure, exposed in 2023, was a campaign focused on pre-positioning. Unlike traditional sabotage, these hackers infiltrated networks to remain dormant and undetected, gaining the ability to disrupt the United States’ communications and power systems during a future crisis.

To defend against these types of attacks, the U.S. military’s Cyber Command has adopted a “defend forward” strategy, actively hunting for threats in foreign networks before they reach U.S. soil.

Domestically, the Cybersecurity and Infrastructure Security Agency promotes “secure by design” principles, urging manufacturers to eliminate default passwords and utilities to implement “zero trust” architectures that assume networks are already compromised.

Supply Chain Vulnerability

Nowadays, there is a vulnerability lurking within the supply chain of the controllers themselves. A dissection of firmware from major international vendors reveals a significant reliance on third-party software components to support modern features such as encryption and cloud connectivity.

This modernization comes at a cost. Many of these critical devices run on outdated software libraries, some of which are years past their end-of-life support, meaning they’re no longer supported by the manufacturer. This creates a shared fragility across the industry. A vulnerability in a single, ubiquitous library like OpenSSL – an open-source software toolkit used worldwide by nearly every web server and connected device to encrypt communications – can expose controllers from multiple manufacturers to the same method of attack.

Modern controllers have become web-enabled devices that often host their own administrative websites. These embedded web servers present an often overlooked point of entry for adversaries.

Attackers can infect the web application of a controller, allowing the malware to execute within the web browser of any engineer or operator who logs in to manage the plant. This execution enables malicious code to piggyback on legitimate user sessions, bypassing firewalls and issuing commands to the physical machinery without requiring the device’s password to be cracked.

The scale of this vulnerability is vast, and the potential for damage extends far beyond the power grid, including transportation, manufacturing and water treatment systems.

Using automated scanning tools, my colleagues and I have discovered that the number of industrial controllers exposed to the public internet is significantly higher than industry estimates suggest. Thousands of critical devices, from hospital equipment to substation relays, are visible to anyone with the right search criteria. This exposure provides a rich hunting ground for adversaries to conduct reconnaissance and identify vulnerable targets that serve as entry points into deeper, more protected networks.

The success of recent U.S. cyber operations forces a difficult conversation about the vulnerability of the United States. The uncomfortable truth is that the American power grid relies on the same technologies, protocols and supply chains as the systems compromised abroad.

The U.S. power grid is vulnerable to hackers.

Regulatory Misalignment

The domestic risk, however, is compounded by regulatory frameworks that struggle to address the realities of the grid. A comprehensive investigation into the U.S. electric power sector my colleagues and I conducted revealed significant misalignment between compliance with regulations and actual security. Our study found that while regulations establish a baseline, they often foster a checklist mentality. Utilities are burdened with excessive documentation requirements that divert resources away from effective security measures.

This regulatory lag is particularly concerning given the rapid evolution of the technologies that connect customers to the power grid. The widespread adoption of distributed energy resources, such as residential solar inverters, has created a large, decentralized vulnerability that current regulations barely touch.

Analysis supported by the Department of Energy has shown that these devices are often insecure. By compromising a relatively small percentage of these inverters, my colleagues and I found that an attacker could manipulate their power output to cause severe instabilities across the distribution network. Unlike centralized power plants protected by guards and security systems, these devices sit in private homes and businesses.

Accounting for the Physical

Defending American infrastructure requires moving beyond the compliance checklists that currently dominate the industry. Defense strategies now require a level of sophistication that matches the attacks. This implies a fundamental shift toward security measures that take into account how attackers could manipulate physical machinery.

The integration of internet-connected computers into power grids, factories and transportation networks is creating a world where the line between code and physical destruction is irrevocably blurred.

Ensuring the resilience of critical infrastructure requires accepting this new reality and building defenses that verify every component, rather than unquestioningly trusting the software and hardware – or the green lights on a control panel.The Conversation

 

This article is republished from The Conversation under a Creative Commons license. Read the original article.

 
News Contact
Author:

Saman Zonouz, Associate Professor of Cybersecurity and Privacy and Electrical and Computer Engineering, Georgia Institute of Technology

Media Contact:

Shelley Wunder-Smith
shelley.wunder-smith@research.gatech.edu

New Cryogenic Vacuum Chamber Cuts Noise for Quantum Ion Trapping

Researcher tests improved vacuum chamber

GTRI Research Scientist Darian Hartsell makes adjustments to an improved cryogenic vacuum chamber that helps reduce some common noise sources by isolating ions from vibrations and shielding them from magnetic field fluctuations. (Credit: Sean McNeil, GTRI)

Even very slight environmental noise, such as microscopic vibrations or magnetic field fluctuations a hundred times smaller than the Earth’s magnetic field, can be catastrophic for quantum computing experiments with trapped ions.
 

To address that challenge, researchers at the Georgia Tech Research Institute (GTRI) have developed an improved cryogenic vacuum chamber that helps reduce some common noise sources by isolating ions from vibrations and shielding them from magnetic field fluctuations. The new chamber also incorporates an improved imaging system and a radio frequency (RF) coil that can be used to drive ion transitions from within the chamber. 
 

“There’s a lot of excitement around quantum computing today, and trapped ions are just one of the research platforms available, each with their own benefits and drawbacks,” explained Darian Hartsell, a GTRI research scientist who leads the project. “We are trying to mitigate multiple sources of noise in this chamber and make other improvements with one robust new design.”
 

The chamber design is described in a paper published January 20, 2026 in the journal Applied Physics Letters. Some of the technical improvements developed for the project are already being applied at GTRI and collaborating organizations. This work was done in collaboration with Los Alamos National Laboratory.
 

The goal of the vibration isolation is to reduce the laser amplitude and phase noise when addressing the ions, increasing operation fidelity. The goal of the magnetic field noise reduction is to preserve the coherence of qubits for longer periods of time so researchers can use them for more complex algorithms.

See the complete article on the GTRI news site


 

 

All-Powerful AI Isn’t an Existential Threat, According to New Georgia Tech Research

Milton at podium

Milton Mueller speaking at the AI Governance and Global Economic Development, an official pre-summit event of the AI Impact Summit 2026.

Ever since ChatGPT’s debut in 2023, concerns about artificial intelligence (AI) potentially wiping out humanity have dominated headlines. New research from Georgia Tech suggests that those anxieties are misplaced.

“Computer scientists often aren’t good judges of the social and political implications of technology,” said Milton Mueller, a professor in the Jimmy and Rosalynn Carter School of Public Policy. “They are so focused on the AI’s mechanisms and are overwhelmed by its success, but they are not very good at placing it into a social and historical context.”

In the four decades Mueller has studied information technology policy, he has never seen any technology hailed as a harbinger of doom — until now. So, in a Journal of Cyber Policy paper published late last year, he researched whether the existential AI threat was a real possibility. 

What Mueller found is that deciding how far AI can go, and its limitations, is something society shapes. How policymakers get involved depends on the specific AI application. 

Defining Intelligence

The AI sparking all this alarm is called artificial general intelligence (AGI) — a “superintelligence” that would be all-powerful and fully autonomous. Part of the debate, Mueller realized, is that no one could agree on the definition of what artificial general intelligence is. 

Some computer scientists claim AGI would match human intelligence, while others argue it could surpass it. Both assumptions hinge on what “human intelligence” really means. Today’s AI is already better than humans at performing thousands of calculations in an instant, but that doesn’t make it creative or capable of complex problem-solving. 

Understanding Independence 

Deciding on the definition isn’t the only issue. Many computer scientists assume that as computing power grows, AI could eventually overtake humans and act autonomously.

Mueller argued that this assumption is misguided. AI is always directed or trained toward a goal and doesn’t act autonomously right now. Think of the prompt you type into ChatGPT to start a conversation. 

When AI seems to disregard instructions, it’s caused by inconsistencies in its instructions, not by the machine coming alive. For example, in a boat race video game Mueller studied, the AI discovered it could get more points by circling the course instead of winning the race against other challengers. This was a glitch in the system’s reward structure, not AGI autonomy.

“Alignment gaps happen in all kinds of contexts, not just AI,” Mueller said. “I've studied so many regulatory systems where we try to regulate an industry, and some clever people discover ways that they can fulfill the rules but also do bad things. But if the machine is doing something wrong, computer scientists can reprogram it to fix the problem.”

Relying on Regulation

In its current form, even misaligned AI can be corrected. Misalignment also doesn’t mean the AI would snowball past the point where humans lose control of its outcomes. To do that, AI would need to have a physical capability, like robots, to do its bidding, and the power source and infrastructure to maintain itself. A mere data center couldn’t do that and would need human intervention to become omnipotent. Basic laws of physics — how big a machine can be, how much it can compute — would also prevent a super AI. 

More importantly, AI is not one homogenous being. Mueller argued that different applications involve different laws, regulations, and social institutions. For example, the data scraping AI does is a copyright issue subject to copyright laws. AI used in medicine can be overseen by the Food and Drug Administration, regulated drug companies, and medical professionals. These are just a few areas where policymakers could intervene from a specific expertise level instead of trying to create universal AI regulations. 

The real challenge isn’t stopping an AI apocalypse — it’s crafting smart, sector-specific policies that keep technology aligned with human values. To avoid being a victim of AI, humans can, and should, put up focused guardrails. 

 
News Contact

Tess Malone, Senior Research Writer/Editor

tess.malone@gatech.edu

Apple Vision Pro Powers New Wave of Immersive Education

Georgia Tech student Yash Rajgure using an Apple Vision Pro headset device to demo his team's project.

Georgia Tech student Yash Rajgure using an Apple Vision Pro headset device to demo his team's project in ECE 6001 Technology Entrepreneurship: Teaming, Ideation, and Entrepreneurship. Photo: Allison Carter, Georgia Tech

Learning electrical and computer engineering has always come with a unique challenge: many of its foundational concepts — electric fields, magnetic forces, semiconductor behavior — are invisible to the naked eye and difficult to visualize.  

To make these invisible principles tangible, students in the School of Electrical and Computer Engineering have long used specialized tools and software. Circuit simulators model voltage and current, electromagnetic tools visualize fields, and semiconductor design platforms reveal transistor behavior. These tools turn abstract theory into interactive experiences that prepare students for real-world engineering challenges.

Now, Apple Vision Pro is joining this ecosystem.

The technology introduces spatial computing to learning environments, blending digital content with the physical world.

At the Institute for Microelectronics and Systems, infrastructure lead Alex Gallmon, is collaborating with students and industry partners to create immersive digital twins—virtual models that replicate real-world systems—of semiconductor cleanroom equipment.  

“These machines are complex and costly, with parts that can run tens of thousands of dollars,” he said. “Even minor mistakes during operation can lead to expensive damage or downtime.” 

Gallmon's team built a virtual replica of a cleanroom vacuum training system. The project serves as a prototype for a workforce development program aimed at high school and college students interested in careers in the semiconductor or vacuum technology fields. 

Read the full story from the School of Electrical and Computer Engineering

Alex Gallmon showing how Apple Vision Pro can be utilized

Gallmon showing how Apple Vision Pro can be utilized to train students and workers on sensitive and expensive technical equipment, in this case a cleanroom vacuum system.

 
News Contact

Dan Watson | School of Electrical and Computer Engineering

Researchers Discover How Worms Clean Their Environment Without a Brain

A real worm in a Petri dish (top left) and a robot worm (bottom right) clean their environments of tiny particles in a very similar manner.

A real worm in a Petri dish (top left) and a robot worm (bottom right) clean their environments of tiny particles in a very similar manner.

When centimeter-long aquatic worms, such as T. tubifex or Lumbriculus variegatus, are placed in a Petri dish filled with sub-millimeter sized sand particles, something surprising happens. Over time, the worms begin to spontaneously clean up their surroundings. They sweep particles into compact clusters, gradually reshaping and organizing their environment.

In a study recently published in Physical Review X, a team of researchers show that this remarkable sweeping behavior does not require a brain, or any kind of complex interaction between the worms and the particles. Instead, it emerges from the natural undulating motion and flexibility that the worms possess.

The study was co-led by Saad Bhamla, associate professor in Georgia Tech’s School of Chemical and Biomolecular Engineering, and Antoine Deblais of the University of Amsterdam.

Deblais said: “It is fascinating to see how living worms can organize their surroundings just by moving.” Bhamla added: “Their activity and flexibility alone are enough to collect particles and reshape their environment.”

By building simple robotic and computer models that mimic the living worms, the researchers discovered that only these two ingredients – activity and flexibility – are sufficient to reproduce the sweeping and collecting effects. The result is a self-organized, dynamic form of environmental restructuring driven purely by motion and shape.

Order emerges

The results do not just teach us a surprising lesson about worms. Understanding how these organisms spontaneously collect particles has much broader implications. On the technological side, what the researchers have learned could inspire the design of soft robots that clean or sort materials without needing sensors or pre-programmed intelligence. 

Such robots, like the worms, would simply move and let order emerge from motion. “Brainless” machines of this sort could perhaps one day help remove microplastics or sediments from aquatic environments, or perform complex tasks in unpredictable terrains. 

From a biological perspective, the results also offer insights into how elongated living organisms – not just worms, but also filamentous bacteria, or cytoskeletal filaments – can structure and modify their own habitats through simple physical interactions. Understanding this structuring and modifying behaviour has been a central question for, e.g., earthworms in their role in soil aeration.

From a biological perspective, the results also offer insights into how elongated living organisms – not just worms, but also filamentous bacteria, or cytoskeletal filaments – can structure and modify their own habitats through simple physical interactions. Understanding this structuring and modifying behaviour has been a central question for, e.g., earthworms in their role in soil aeration.

Team effort

This project grew out of curiosity about how living systems shape their environment without centralized control. Initial experiments with worms, conducted by Harry Tuazon (Bioengineering PhD 2024) at Georgia Tech, showed the unexpected particle collection patterns. This led the team to attempt to reproduce the behavior using robotic and simulated counterparts – something that worked surprisingly well. In the project, experimentalists and theorists worked side by side, allowing the team to uncover the physical principles behind this seemingly purposeful behavior. 

Co-first author Rosa Sinaasappel conducted the robot experiments at the University of Amsterdam. “By mimicking the worms’ motion with simple brainless robots connected by flexible rubber links, we could pinpoint the two ingredients that are essential for the sweeping mechanism,” she said.

Co-first author Prathyusha Kokkoorakunnel Ramankutty, a research scientist in the Bhamla Lab at Georgia Tech, performed the computer simulations of the behavior. “Our computational model, built on simple ingredients like propulsion and flexibility, shows that this principle works across different scales and can be adapted for new designs, as demonstrated by a soft robotic sweeper that autonomously ‘cleans’ and reorganizes particles without programmed intelligence,” she explained.

The researchers will continue to investigate this type of behaviour in the future. While a mathematical model of active sweeping is now presented in a simple form, many challenging questions raised by this complex system remain open for theoreticians.

Multiple groups of students helped greatly with the robot experiments, doing projects in the lab. Their efforts ranged from performing the experiments to replacing the in total about 200 batteries, after perhaps one of the most difficult tasks: wrestling them free from the child-proof packaging.

CITATION:

Particle Sweeping and Collection by Active and Living Filaments, Sinaasappel, R., Prathyusha, K. R., Tuazon, Harry, Mirzahossein, E., Illien, P., Bhamla, Saad, and A. Deblais. Physical Review X (2026)

 
News Contact

Brad Dixon, braddixon@gatech.edu

Georgia Tech Names Mike Gazarik Director of Georgia Tech Research Institute

GTRI Welcomes New Director Mike Gazarik

Georgia Institute of Technology has named Michael “Mike” Gazarik as the new director of the Georgia Tech Research Institute (GTRI) and a Georgia Tech senior vice president, effective February 16. 

A nationally respected aerospace and research leader, Gazarik has led large, complex research organizations across government, industry, and academia, shaping strategy, driving growth, and building institutions that deliver mission-critical innovation. With more than three decades of experience, his career reflects a deep ability to align technology with national priorities and guide organizations through periods of change and opportunity. 

A Georgia Tech alumnus, Gazarik currently serves as faculty director of the Engineering Management Program at the University of Colorado Boulder and as a part‑time staff member at the Johns Hopkins Applied Physics Laboratory. He previously held senior leadership roles at NASA, including director of engineering at NASA Langley Research Center and inaugural associate administrator for the Space Technology Mission Directorate (STMD). In industry, he spent eight years as vice president of engineering at Ball Aerospace, leading its strategic growth from an elite science contractor into a strategic national security asset that doubled in size.

“Mike Gazarik brings a rare combination of technical depth, executive leadership, and deep government experience,” said Tim Lieuwen, Georgia Tech’s executive vice president for Research. “He knows large research enterprises operate within the realities of policy and budget and has a proven ability to align technology with mission priorities while earning trust across stakeholders. We are excited to welcome Mike back to Georgia Tech to lead GTRI at a pivotal moment for research and innovation.”

GTRI employs more than 3,000 employees, conducting nearly $1 billion in annual research in areas such as autonomous systems, cybersecurity, electromagnetics, electronic warfare, modeling and simulation, sensors, systems engineering, and threat systems. GTRI’s renowned researchers combine science, engineering, economics, and policy to address challenges facing national security, industry, and society.

For nearly a century, GTRI has partnered with government and industry to deliver solutions to the most mission-critical challenges facing our nation,” said Georgia Tech President Ángel Cabrera. “We are proud to welcome Mike Gazarik to lead a crown jewel of our research enterprise and a crucial component of our nation’s science and technology fabric. His experience and leadership will strengthen GTRI’s ability to deliver on its mission and help make our nation safer, healthier, and more competitive.”

Gazarik is widely recognized for leading complex research enterprises with a focus on stability, strategic alignment, and mission impact. At NASA, he helped shape the agency’s science and technology enterprise during periods of fiscal constraint and technical risk, maintaining balance across broad mission areas and forming STMD to consolidate technology development. At Ball Aerospace, he guided significant growth and aligned strategy with evolving national security and civil space needs. His academic work has focused on preparing engineering leaders for mission-driven organizations — experience that aligns closely with GTRI’s role as a trusted partner to government and industry.

He earned a B.S. in electrical engineering from the University of Pittsburgh and an M.S. and Ph.D. in electrical engineering from Georgia Tech. Gazarik is a fellow of the American Institute of Aeronautics and Astronautics (AIAA), a former chair of AIAA’s Corporate Strategic Committee, and was elected to the AIAA Board of Trustees in 2025. His honors include NASA’s Outstanding Leadership Medal, the Silver Snoopy Award, the 2023 AIAA Rocky Mountain Section Educator of the Year, and recognition as Engineering Manager of the Year by the American Society of Engineering Management.

“GTRI has a remarkable legacy of delivering solutions that matter for the nation,” said Gazarik. “I’m honored to return to Georgia Tech and lead an organization that combines deep technical expertise with a mission-driven culture. My focus will be on listening, building on GTRI’s strengths, and ensuring we continue to advance research that makes a real difference for our partners and society.”

As director, Gazarik will lead GTRI’s multidisciplinary research enterprise, advancing its mission to deliver high‑impact science and technology solutions in support of national security, space systems, and critical societal needs.

 
News Contact

Angela Ayers

Assistant Vice President of Research Communications

Iran’s Latest Internet Blackout Extends to Phones and Starlink

Protesters have filled the streets in Iranian cities, but the regime’s internet shutdown means little news gets in or out of the country. MAHSA/Middle East Images/AFP via Getty Images

Protesters have filled the streets in Iranian cities, but the regime’s internet shutdown means little news gets in or out of the country. MAHSA/Middle East Images/AFP via Getty Images

The Iranian regime’s internet shutdown, initiated on Jan. 8, 2026, has severely diminished the flow of information out of the country. Without internet access, little news about the national protests that flared between Dec. 30, 2025, and Jan. 13, 2026, and the regime’s violent crackdown has reached the world. Many digital rights and internet monitoring groups have assessed the current shutdown to be the most sophisticated and most severe in Iran’s history.

We are a social scientist and two computer scientists at the Georgia Institute of Technology’s Internet Intelligence Lab who study internet connectivity.

Through the Internet Outage Detection and Analysis project, we have been measuring internet connectivity globally since 2011. The project was motivated by the internet shutdowns during the Arab Spring mass protests that began in December 2010 against Middle Eastern and North African regimes.

The project provides a public dashboard of internet connectivity measurements. Its long view of global internet connectivity offers insight into the Iranian regime’s developing sophistication in controlling information and shutting down the internet in the country.

Our measurements show that Iran has been in a complete internet shutdown since Jan. 8. This is longer than the 48½-hour shutdown in June 2025 during the Israel-Iran war and surpasses the duration of the November 2019 shutdown that lasted almost seven days. Compared to the two weeks of nightly mobile phone network shutdowns in September to October of 2022 during the Women, Life, Freedom protests, this shutdown is more complete by also closing down fixed-line connectivity.

Measuring Internet Connectivity

The Internet Outage Detection and Analysis project measures global internet connectivity through three signals related to internet infrastructure: routing announcements, active probing and internet background noise.

Core routers, unlike the router in your home, are responsible for directing traffic to and from networks. Routing announcements are how they communicate with each other. If a nation’s network of routers stop making these announcements, the network will disappear from the global internet.

We also measure the responsiveness of networks through probing. To create the probing signal, we continuously ping devices in millions of networks around the globe. Most devices are designed to automatically respond to these pings by echoing them back to the sender. We collect these responses and label networks as “connected/active.”

A tool we use dubbed “network telescope” captures internet background noise – traffic generated by hundreds of thousands of internet hosts worldwide. A drop in this signal can indicate an outage.

A History of Shutdowns

The first nationwide shutdown that the Internet Outage Detection and Analysis project observed in Iran was during the “Bloody November” uprising that happened in 2019. During that shutdown, the primary method the regime used was turning off routing announcements, which stopped all traffic between routers. This is a blunt force tool that makes the internet essentially go dark; no connectivity is possible for affected networks.

However, our measurement reporting showed differences in signal-drop patterns among the three data sources we track. These patterns demonstrate the regime’s adoption of diverse disconnection mechanisms and large differences in the timing of disconnection by various Iranian internet service providers (ISPs).

This reporting also showed evidence that the 2019 blackout was not complete and some people were able to circumvent it. Nevertheless, as documented by Amnesty International, the internet darkness created a “web of impunity” that allowed the regime to violate international human rights law without any accountability.

In September 2022, the Women, Life, Freedom protests erupted after the killing of Mahsa Amini in state custody. To suppress the nationwide mobilization without exacting a high cost, the Iranian regime implemented nightly shutdowns affecting only mobile networks. Keeping fixed-line internet connections online limited the impact of these shutdowns to mitigate the economic, political and social costs.

These nightly internet curfews lasted about two weeks. During this time the regime implemented other forms of censorship, specifically blocking applications to further control the information environment and to prevent access to technologies for circumventing censorship.

In June 2025, the Israel-Iran war began and we observed initial degradation in internet connectivity, which often occurs during times of conflict, when internet and power infrastructure are affected by missile attacks. The Iranian regime shut down the internet over four days, citing national security as its rationale.

That time, the regime did not use routing announcements to implement the shutdown. Our measurement data shows that routing announcements were largely unaffected. Instead, the Iranian regime implemented the shutdown by interfering with key protocols that allow the internet to function, including transport layer security and the domain name system.

The regime used these techniques to shut off Iran’s connectivity with the global internet while allowing specific, sanctioned access in a policy called whitelisting. This strategy shows an increased sophistication in how the Iranian regime implements shutdowns and controls the flow of information.

Organizations that support digital human rights in Iran report that some Iranians were able to circumvent the shutdown using virtual private networks and various censorship-resilient technologies such as peer-to-peer networks.

The Iranian regime has targeted Starlink satellite internet service in its internet shutdown.

Jan. 8, 2026

On Dec. 30, 2025, the Internet Outage Detection and Analysis project team received reports of internet disruptions amid the start of nationwide protests. At 8 p.m. Iran Standard Time on Jan. 8, 2026, the Iranian regime shut down the internet. Our measurements show a nominal amount of responsiveness to our active probing, about 3%. This small amount could be an artifact of our measurements or lingering connectivity for whitelisted access, for example for Iranian government officials and services.

Outside of very limited whitelisted connectivity, digital human rights groups reported severely limited access to the internet both internationally and domestically. According to digital rights group Project Ainita, the Iranian regime implemented the shutdown by interfering with transport layer security and the domain name system. In addition, landline phone calls have been only intermittently available.

Aside from these more sophisticated techniques, this shutdown evokes the Bloody November shutdown of 2019 in that it has been ordered during a time of protest with mass civilian casualties.

Jammed Satellites

Since Russia’s full-scale invasion of Ukraine in 2022, low Earth orbit satellite services, such as Starlink, can help people maintain internet connectivity during outages and government-ordered shutdowns. These satellite services can allow users to bypass damaged or state-censored terrestrial internet infrastructure.

However, accessing the internet via satellite services during a shutdown is not without risk. User terminals communicate with satellites via radio frequency links that can be detected through surveillance, for example from planes or drones, potentially exposing users’ locations and putting them at risk of being identified. Currently, the Iranian regime is using jammers to degrade the Starlink connection.

One of the most significant barriers to connecting users in Iran to satellite services is a logistical one. Providing connectivity via Starlink’s service would require distributing a large number of user terminals within the country, a feat that would be difficult because the devices are likely to be considered illegal contraband by the government. This severely limits the scale at which such services can be adopted.

Recent technological developments, however, may partially mitigate this challenge. Starlink’s direct-to-cell capability, which aims to provide LTE cellular connectivity directly to ordinary cellphones, could reduce dependence on specialized hardware. If they become widely available, such systems would allow users to connect using common devices already in circulation, sidestepping one of the most difficult barriers to providing connectivity.

Like other radio-based communications, however, direct-to-cell connectivity would remain vulnerable to signal jamming and other forms of electronic interference by the government.

For the time being, the Iranian regime controls the country’s internet infrastructure, which means it still has a virtual off switch.The Conversation

 

This article is republished from The Conversation under a Creative Commons license. Read the original article.

 
News Contact
Authors:

Amanda Meng, Senior Research Scientist, College of Computing, Georgia Institute of Technology

Alberto Dainotti, Associate Professor of Computer Science, Georgia Institute of Technology

Zachary Bischof, Senior Research Scientist, College of Computing, Georgia Institute of Technology

Media Contact:

Shelley Wunder-Smith
shelley.wunder-smith@research.gatech.edu

Sleepless Tutor Turns Midnight Panic Into Progress

Illustration of an AI tutor helping a student

Illustration of an AI tutor assisting a student.

It’s 1:47 a.m. in a Georgia Tech dorm room. A bleary-eyed student is staring down a homework problem that refuses to make sense. The professor is asleep. Classmates aren’t texting back. Even the caffeine has lost its jolt.

It’s the kind of late-night dead end that pushed the instructors of one particularly tough class to build their own backup: a custom artificial intelligence (AI) tutor created specifically for that course.

They call it the SMART Tutor, short for Scaffolded, Modular, Accessible, Relevant, and Targeted. It guides students through each problem step by step, checks their reasoning, references class notes, and flags mistakes. Instead of handing over solutions, it shows students how to work through them.

That distinction matters most to Ying Zhang, senior associate chair in the School of Electrical and Computer Engineering, who created the tool.

“Unlike ChatGPT, the tutor doesn’t just give answers,” Zhang said. “We want to teach students how to approach the problem, think critically, and become self-regulated learners.”

Born From One Infamously Tough Class

The idea for the SMART Tutor came from a course that had challenged students for years: Circuit Analysis (ECE 2040). It’s a foundational class for electrical engineering undergraduates and historically one of the most difficult in the curriculum.

Zhang saw the same pattern semester after semester. Students often needed help at the exact moment it wasn’t available.

“Many students study late into the evening,” she said. “They cannot really attend office hours during the day because of either class or work schedules. So, basically, when students work at night on their homework and get stuck, they have no one to go for help.”

Students were working late into the night; support wasn’t. Zhang and her colleagues set out to change that.

Office Hours, Upgraded

Their solution: The SMART Tutor which relies solely on course materials, NOT the open internet. When students upload their completed work, the tutor checks the calculations, the reasoning, and whether the solution holds up in practice, not just on paper. It also provides constructive feedback and shares insights with instructors, helping them identify common misconceptions and adjust in-class instruction.

Students select a homework problem and watch the system break it down step by step. It also answers broader conceptual questions using lectures and notes.

“The students, the SMART Tutor, and the instructor work as a team to help students learn,” Zhang said.

Student-Tested, Professor-Approved

During a semester-long pilot with 50 students, Zhang did not require anyone to use the tutor. But nearly everyone did.

“Most students felt the AI tutor helped them learn more effectively and at their own pace,” she said. “They valued the immediate feedback and the chance to learn from mistakes in real time.”

Nidhi Krishna, a computer engineering major, used the tutor as a sounding board when she got stuck.

“What helped most was being able to show my work and ask, ‘Where did I go wrong?’” Krishna said.

She approached it like she would a teaching assistant, working through problems independently and asking for guidance rather than solutions. Students also valued something else: help that showed up at the right moment.

Teaching Students to Think

What stood out to Zhang wasn’t improved grades. It was what the tutor revealed about how students learn.

By analyzing interaction data, she saw two patterns: students who asked questions to understand, and those who used the system to confirm answers. The difference revealed a deeper gap in learning strategies.

“Some students, especially those who need help most, lack strong learning skills,” Zhang said. “Students with lower academic preparation were more likely to ask guess-and-check questions instead of seeking deeper explanations.”

That insight is already shaping the next version of the tutor.

The SMART Tutor is now part of a broader vision called NEAT: Next-Generation Engineering Education with AI Tutoring. Zhang plans to expand the NEAT framework across Georgia Tech’s College of Engineering and eventually to partner institutions.

One factor fueling that growth is affordability. The system costs about $300 per semester for a class of 50 students, a price Zhang believes most programs can absorb. The academic return, she said, far outweighs the cost.

Always Awake, Always Ready

There will always be a 1:47 a.m. somewhere on campus.

When everything stops making sense, students won’t have to give up or wait for the next day’s office hours. The SMART Tutor won’t solve the problem for them, but it will remind them they can solve it themselves.

After midnight, that may be far more useful than another cup of coffee.

 
News Contact

Michelle Azriel, Sr. Writer Editor
mazriel3@gatech.edu

Coastal Resilience Project Secures Nearly $1 Million to Restore Wetlands

Degraded marsh on Cumberland Island, Georgia.

Degraded marsh on Cumberland Island, Georgia.

The National Fish and Wildlife Foundation (NFWF) has awarded an interdisciplinary team nearly $1 million in funding through the National Coastal Resilience Fund to restore coastal wetlands in Georgia. It was the only project in Georgia to be selected for funding from the program's 2025 call for proposals.

The award will support the design of nature-based solutions including living shorelines and marsh restoration in flood-prone areas of Camden County, Georgia, adjacent to Naval Submarine Base Kings Bay, Cumberland Island National Seashore, and the city of St. Marys. 

“Restoring wetlands in Camden County is not just an environmental priority — it’s a resilience strategy for the entire region,” says principal investigator (PI) Joel Kostka, Tom and Marie Patton Distinguished Professor, associate chair for Research in the School of Biological Sciences, and faculty director of Georgia Tech for Georgia’s Tomorrow. “Each acre of restored marshland protects coastal communities from natural hazards like storms and flooding, provides essential marine habitat, and has the potential to aid the Navy and the Army Corps of Engineers in developing management alternatives for dredged materials. When our wetlands flourish, our whole coastline does.”

In addition to Kostka, co-PI’s include University of Georgia (UGA) Skidaway Institute of Oceanography Director Clark Alexander, UGA Associate Professor Matt Bilskie and Professor Brian BledsoeThe Nature Conservancy Coastal Climate Adaptation Director Ashby Worley, and Georgia Tech alumnus Nolan Williams of Robinson Design Engineers, a firm dedicated to the engineering of natural infrastructure in the Southeast that is owned and operated by Georgia Tech alumnus Joshua Robinson.

A coastal collaboration

The new project, known as a “pipeline project” by NFWF,  builds on multiple resilience plans and years of previous research conducted by the established team. “This is a testament to the value of the long-term collaborations and partnerships that enable coastal resilience work,” Kostka says. “We’re working closely with local communities and a range of city, state, and federal stakeholders to ensure these solutions align with local priorities and protect what matters most.”

It’s not the first time that the team has brought this type of collaboration to the coastline. Since 2019, Kostka has worked alongside the South Carolina Department of Natural Resources, the South Carolina Aquarium, and Robinson Design Engineers in a $2.6 million effort to restore degraded salt marshes in historic Charleston, also funded by NFWF. Now in the implementation phase, much of the marsh restoration in Charleston involves planting salt-tolerant grasses, restoring oyster reefs, and excavating new tidal creeks — work that is being spearheaded by local volunteers.

“Coastal resilience isn’t something one group can tackle alone,” Kostka adds. “That shared, community-driven vision is what makes these projects possible.”

Kostka sampling transects of marshland on Cumberland Island, Georgia.

Kostka sampling transects of marshland on Cumberland Island, Georgia.

Erosion around the historic property “Dungeness” on Cumberland Island, Georgia.

Erosion around the historic property “Dungeness” on Cumberland Island, Georgia.

Flooding in the town of St. Marys, a town in Camden County, Georgia.

Flooding in the town of St. Marys, a town in Camden County, Georgia.

 
News Contact

Written by Selena Langner