Wednesday, November 05, 2025

 

California surface water costs triple during drought



Study shows need for joint groundwater and surface water management



University of California - Davis





California often swings between climate extremes — from powerful storms to punishing droughts. As climate change drives more intense and frequent dry and wet cycles, pressure on California’s water supplies grows.

A new University of California, Davis, economic study finds that drought in California pushes the price of water from rivers, lakes and reservoirs up by $487 per acre-foot, more than triple the cost during an average wet year. The research appears in Nature Sustainability.

Groundwater prices stable

“The extreme volatility in prices surprised me,” said lead author Madeline Turland, a former graduate student in the UC Davis Agricultural and Resource Economics Department and now an assistant professor of resource economics at the University of Alberta. “During dry years we have really high surface water prices and during wet years we have really low water prices, but we found that groundwater seems to have stable prices over time, despite precipitation swings.”

California groundwater basins can store eight to 12 times more water than all the state’s reservoirs combined yet are not widely used to store surplus surface water. The study suggests that managing groundwater and surface water together could keep water prices steady and support the state’s economy.

“This study shows why coordinating both sources matters — it can lower costs now and help communities and farmers better weather future climate swings,” Turland said.

Surface water prices volatile

Researchers looked at water transaction data from 2010 to 2022, which spanned both drought and deluge in California. During that time, surface water prices varied with precipitation, while groundwater prices remained stable.

The study also found that more water storage could help protect California from climate-driven price swings. But researchers said building new reservoirs, raising dams and removing sediment from existing reservoirs also come with high fiscal, environmental and social costs and may bring only marginal or temporary increases in storage capacity.

Legal and policy challenges

Turland noted that California’s system of water rights makes joint management challenging. Surface water is allocated based on seniority of water rights. Except for adjudicated groundwater basins, where courts assign rights in response to legal disputes, there are no formal rights to groundwater. 

That could change as groundwater agencies comply with California’s Sustainable Groundwater Management Act, which requires that groundwater basins reach sustainability targets by 2040. Courts could play a major role in many of those plans, Turland said. 

Other authors of the study include Colin A. Carter, Bulat Gafarov, Jens Hilscher and Katrina Jessoe with UC Davis. The study was supported by the United States Department of Agriculture National Institute of Food and Agriculture and the Giannini Foundation of Agricultural Economics.

 

University of Houston reaffirmed as National Center of Cybersecurity Excellence



NSA redesignation recognizes UH’s expanding role in strengthening U.S. cyber defense, research and workforce development



University of Houston

stephen-huang-university-of-houston 

image: 

Stephen Huang is a professor of computer science at the University of Houston and point of contact for the federal CAE-R program.

view more 

Credit: University of Houston





The University of Houston has been redesignated by the National Security Agency (NSA) as a Center for Academic Excellence in Cyber Research (CAE-R) through 2029, reaffirming UH’s national leadership in advancing cybersecurity innovation, education and workforce development to help protect America’s critical infrastructure.

The federal redesignation — part of the NSA’s National Centers of Academic Excellence in Cybersecurity (NCAE-C) program — recognizes institutions that demonstrate excellence in cyber defense education, research or operations.

With Houston serving as an epicenter of the nation’s energy, health care and transportation networks — all frequent targets of cyberattacks — this redesignation underscores UH’s growing role as a national partner in advancing research and workforce training that strengthen U.S. resilience against evolving threats.

“Cybersecurity is essential to protecting our nation’s economy and infrastructure, and universities like ours play a vital role in advancing both the science and the workforce needed to meet these challenges,” said Claudia Neuhauser, vice president of research at UH. “This recognition reflects the collaborative excellence of our faculty across colleges and their commitment to innovation in this critical field.”

The University has held this national CAE-R distinction since 2014, demonstrating a long-standing commitment to advancing cybersecurity innovation and national defense. UH currently holds two NCAE-C designations:

  • Cyber Research (CAE-R): In effect through the 2028-29 academic year, recognizing excellence in advancing cybersecurity research and innovation.
  • Cyber Defense (CAE-CD): Valid through the 2027-28 academic year, highlighting UH’s role in preparing the cybersecurity workforce through education and training. Professor Emeritus Arthur Conklin serves as the point of contact for the CAE-CD designation in the College of Technology at UH's Sugar Land campus.

UH’s cybersecurity programs combine advanced research with hands-on education to prepare students for the nation’s most in-demand cyber careers. On average, more than 90% of UH cybersecurity graduates are working in the field after graduation, supporting industries and agencies facing rapidly evolving digital threats.

The CAE-R redesignation reflects the collaborative efforts of cybersecurity faculty in the Department of Computer Science within UH’s College of Natural Sciences and Mathematics. It provides networking and training opportunities for faculty and students through workshops, conferences and agency briefings.

The designation also preserves UH’s eligibility for competitive federal grants and scholarships that support the research of faculty and students, said Stephen Huang, professor of computer science and UH’s point of contact for the CAE-R program. 

Huang recently completed an NSA-funded project on automated intrusion detection. His research focuses on real-time identification of cyber attackers using anonymity networks such as VPNs. The techniques can be used to detect geolocation spoofing — when users falsify their location for deceptive or illegal purposes.

The University’s two NCAE-C designations add to UH’s expanding footprint in cybersecurity. In a separate effort, UH launched the Transportation Cybersecurity Center for Advanced Research and Education (CYBER-CARE) in 2023, dedicated to strengthening the resilience of transportation systems against cyber threats.

Huang said cybersecurity is a constant, evolving challenge that requires continuous vigilance.

“We never know how we are going to be attacked next, and attackers can always come up with new methods of doing it,” Huang said. “That’s why we must be very vigilant in predicting how they may be able to do that and analyzing their attacks to prevent them. It’s a never-ending battle.”

 

New environmental DNA test could help rare hammerhead sharks fight extinction




Florida International University
Scalloped Bonnethead shark in Uramba/Bahía Málaga National Natural Park, Colombia 

image: 

Scalloped Bonnethead shark in Uramba/Bahía Málaga National Natural Park, Colombia.

view more 

Credit: Diego Cardeñosa




A groundbreaking test developed by an FIU scientist can detect small, elusive hammerheads without ever setting eyes on them — a critical new tool for species fighting for survival.

This first-of-its-kind test can detect traces of the sharks without ever catching or disturbing them. Like faint biological echoes lingering in the current, the test reveals where the sharks have been by identifying fragments of genetic material left behind in the water. In a recent study published in Frontiers in Marine Science, FIU marine biologist Diego Cardeñosa, who is affiliated with FIU's Institute of Environment and the Global Forensic and Justice Center, demonstrates the test’s effectiveness, showing how it can help scientists locate and protect these endangered species.

Small-bodied hammerhead sharks like the scalloped bonnethead, scoophead and Pacific bonnethead have been pushed to the brink by overfishing, leaving so few that scientists have struggled to study them. With their lives and habitats largely unknown, conservation efforts have fallen behind — until now. Cardeñosa’s new environmental DNA (eDNA) test could change the fate of these critically endangered sharks.

“Just by screening different locations along their distribution range from Mexico to Northern Peru, we can identify high-priority areas where conservation resources might be needed,” Cardeñosa said. “The short-term goal is to find these three species, as they’re likely among the most critically endangered coastal sharks in the world.”

Cardeñosa believes these hammerhead sharks were once abundant — long before overfishing depleted their numbers. They inhabit shallow, remote coastal habitats where scientific monitoring is limited and fisheries management is weak. Colombia’s Uramba/Bahía Málaga National Natural Park, the site of his research, may be one of the last refuges where researchers can still find them.

“You can drop a hook and line there and, within 10 minutes, catch one or two of these species,” he said. Elsewhere, sightings are nearly nonexistent: the scalloped bonnethead was last recorded in Mexico in 1994, and the scoophead in 2007. In Honduras, one of these species was only recently discovered after decades without a trace.

“That’s how hard it is to find them,” Cardeñosa said. “It’s on us if we want to act to protect them or if we just let them slip away.” 


For Cardeñosa, the urgency goes beyond ecosystem roles.

“A lot of these are some of the most derived or newest shark species on the evolutionary scale,” he said. “If they disappear, we’re also losing a piece of our planet’s evolutionary history. Extinction is forever, and that’s enough reason for me to do something.”

He hopes his research not only raises awareness of these overlooked species but also sparks curiosity about how powerful this new method can be.

“It’s fascinating that you can take a simple water sample and know whether a species was there or not,” he said.

With such a vast range to cover, the data provides critical information on where to focus protection efforts and how to maximize impact. The science can also help more than just hammerheads. Once the water sample is collected and its DNA extracted, that information can be stored in a lab for years for future scientists who wish to study another species that might have lingered in the area.

 

How to identify and prevent fraudulent participants in health research



A new study presents a comprehensive checklist of manual methods that researchers can implement to detect suspicious behavior during the pre-screening, screening, and enrollment process for clinical trials




Boston University School of Public Health






The rise in virtual research since the COVID-19 pandemic has created opportunities for researchers to expand and diversify clinical trials, but it has also opened up avenues for fraudulent participation in these studies. A new study led by Boston University School of Public Health (BUSPH) researchers directed by Michael Stein, chair and professor of the Department of Health Law, Policy & Management (HLPM) at BUSPH, provides a comprehensive checklist of indicators that researchers can utilize to quickly identify suspicious behavior and prevent fraudulent actors from enrolling in online studies and compromising valuable data.

The most effective way to prevent this fraudulent activity is to implement a combination of automated and manual actions during the prescreening, screening, and enrollment process, according to the report published in the Journal of Medical Internet Research

In addition to automated fraud detection methods, the study suggests that researchers should utilize a checklist of precautions to spot, along with videoconferencing and photo identification requests from participants during the screening process. These actions can reveal fraudulent actors—who are largely driven by financial gain from research compensation—before the actual enrollment process begins.

“Modest financial remuneration is a cornerstone of most studies, important for recognizing participants’ time and effort, while also helping to boost engagement and retention,” says study corresponding author Kara Magane, senior director of research operations in HLPM at BUSPH. “However, as compensated research opportunities expand in the online setting, so too do opportunities for fraudulent participation, from participants misrepresenting their eligibility or enrolling multiple times, to automated bots attempting to complete online surveys. As online research becomes more prevalent, it is essential for investigators to be vigilant and design their digital studies with fraud prevention in mind.”

Digital recruitment is especially valuable because it allows researchers to collect data among populations that are underrepresented or difficult to reach through traditional in-person methods.

“Online research has lowered barriers to participating in research, particularly for people with stigmatized diagnoses, such as HIV,” says study lead author Robert Siebers, an HLPM research coordinator at BUSPH at the time of the study. “Allowing participants to remain in their own home ensures higher levels of privacy and comfort that in-person research cannot. Without proper guardrails, fraudulent participation can arise due to the ability to more easily misrepresent one’s identity online.”

In the study, the researchers and colleagues from BU’s College of Arts and Sciences, Tufts Medical Center, and the Warren Alpert Medical School of Brown University describe the team’s own experience with fraudulent participants when screening and enrolling people with HIV into two linked online trials: “Integrated Telehealth Intervention to Reduce Chronic Pain” and “Unhealthy Drinking Among People Living With HIV.” The randomized trials were conducted through the Boston ARCH Comorbidity Center in 2023 and 2024. After a research assistant noticed during a videoconference screening that a participant appeared to be wearing a wig and resembled another person who had been interviewed days prior, the team discovered that 10 fraudulent participants had enrolled in the trials, and they quickly disenrolled them at an early stage. The team created a checklist of precautions to refer to during each stage of the selection process moving forward, and was able to detect 37 additional fraudulent participants during the screening process. They evaluated their enrollment protection methods six months later and found no new fraudulent actors participating in their trials.   

Some of the suspicious behavior that researchers should look for during the prescreening process include similar patterns in email addresses (such as those that use multiple numbers), zip codes that do not correspond to the participant’s home state, or other details that seem unusually similar, such as the same level of physical activity among multiple participants. During the screening portion, the team says researchers should also investigate participants who enroll multiple times, provide predictable responses or swift answers to questions that typically require thought, or have similar accents or patterns of speech to participants previously identified as fraudulent. In their trials, the team modified the study protocol to allow phone screenings to take place on camera so that they could monitor participants’ appearance and other suspicious behavior, such as muting their microphone frequently after each question. 

During baseline interviews on video, the team recommends that researchers ask—but not mandate—that participants show photo identification on the screen.

“Ensuring participant comfort and privacy is of utmost importance for all researchers, but particularly in research that involves stigmatized populations or diagnoses,” Siebers says. “Requesting, but not requiring, a photo ID in our study was a key flexibility that allowed us to be respectful of participant privacy concerns while ensuring we had the opportunity to verify someone’s true identity when needed.” They also did not request electronic copies of IDs, he adds. 

Automated methods, such as IP address identification systems and bot detection tools, can also be effective at identifying fraudulent activity in the earliest stages of the selection process, but these methods often require financial or technological resources that may not be available to all researchers.

The team also recommends that researchers coordinate with their institution’s Institutional Review Board (IRB), committees that ensure that human research is ethical and compliant with regulations.

“IRBs and funding agencies can play an important role by recognizing fraud prevention as an integral part of research workflows, particularly for online studies,” Magane says. “They can encourage researchers to include fraud detection and prevention plans in their study protocols, and allocate appropriate resources for these efforts within study budgets. They can also provide clear guidance and support around recognizing and responding to research participation fraud.”

Ultimately, there is no one-size-fits-all approach, and all precautions should be tailored to each study design, the researchers say.

“As a community of researchers, I’m not sure we have a grip on how much virtual research involves fraudulent participants and therefore how much published data might be tainted,” says Stein, senior author author of the study. “What we unexpectedly and unfortunately learned as researchers was that from the moment of planning an online study through the participant recruitment phase, researchers need to be alert to the possibility that bad actors—and I mean that literally—can ruin the reliability of their findings. Fraud protection may need to be described in all published fully virtual studies going forward.”

** 

About Boston University School of Public Health 

Founded in 1976, Boston University School of Public Health is one of the top ten ranked schools of public health in the world. It offers master's- and doctoral-level education in public health. The faculty in six departments conduct policy-changing public health research around the world, with the mission of improving the health of populations—especially the disadvantaged, underserved, and vulnerable—locally and globally.