Quantcast
Channel: Popular Science | RSS
Viewing all 20161 articles
Browse latest View live

The Navy's Gremlin Uses Sonic Waves to Find Underground Bombs

$
0
0
A Man, a Robot, and a Mission Courtesy G4

The tools for safely disposing of explosive threats like improvised explosive devices (IEDs) have come a long way over the last decade, but one rule of explosives ordnance disposal (EOD) holds fast regardless of how much technology you throw at it: you can't terminate a threat if you don't know where it is. To that end, the Office of Naval Research is hoping to field a new sensor package that can see bombs buried under the ground or otherwise obscured from view by blasting them with sound waves and seeing what kinds of vibrations come back.

The imperfectly acronymed GREMLIN (for Ground-Based Explosive Ordinance Disposal Mobile Laser Interrogation) is an augmentation for ground robots already employed by EOD units in places like Afghanistan that would--if all goes to plan--allow EOD operators to see beneath the ground before they start digging around looking for a suspected IED. Defense contractor BAE Systems already has $2 million in Navy cash on hand to help it look into possible GREMLIN technologies.

The idea: Using some kind of acoustic source, the robot could blast the ground in front of it with sounds waves and study the way those waves are disrupted in order to form an image. A patch of freshly disturbed dirt--especially a patch of freshly disturbed earth concealing a large plastic jug full of chemical explosive or some such--would return different patterns of waves than a nice solid patch of undisturbed hard-packed earth. And with some clever computing work, GREMLIN could turn those vibrational patterns into an image that would give the robot operator some clue as to what's beneath the surface.

In other words, it allows the robot to see underground--like ground-penetrating radar but with a whole new layer of resolution (GPR can detect inconsistencies in the ground like those described above, but it doesn't paint a nice visual picture like GREMLIN presumably would).

That's not bad, considering IEDs have become the single biggest threat to coalition troops over the past decade of counterinsurgency. With GREMLIN, the robots do the up-close work, and the humans get a clearer picture of what's going on beneath the ground--when and if they finally get GREMLIN. Danger Room reports that the system has at least three years of initial tests in front of it before a prototype even surfaces.

[Danger Room]


Found: The First Ever Saturn-Like Exoplanet Surrounded by Orbital Rings

$
0
0

The hits just keep on coming out of Austin this week as the 219th meeting of the American Astronomical Society rolls on. Researchers there have announced the discovery of the first Saturn-like ringed object outside our solar system, documented when researchers were trying to diagnose the cause of a strange eclipsing effect emanating from a nearby star.

We're using the term "Saturn-like" loosely here. Researchers are confident they are dealing with a ringed astronomical body, but it's unclear right now whether it's a planet, a brown dwarf, or even a star that they are seeing out there in Scorpius-Centaurus, the nearest region of recent large-scale star formation some 420 light-years away. But they are sure they are witnessing some strange eclipsing phenomena as they study light incoming from a nearby star.

Using the International SuperWASP (Wide Angle Search for Planets) and the All Sky Automated Survey instruments, the researchers were searching for exoplanets by analyzing the fluctuations in light coming from sun-like stars (as exoplanets and other bodies pass between us and distant stars, their brightness varies, indicating the presence of an exoplanet). While examining star 1SWASP J140747.93-394542.6 (there are a lot of stars out there) they noticed not the usual steady dimming and brightening associated with an exoplanet, but a long eclipse characterized by a lot of intermittent dimming and brightening. Where the eclipse was most significant, 95 percent of the star's light was being blocked.

Further observation has led the researchers, from Cerro Tololo Inter-American Observatory in Chile and the University of Rochester, to determine that the eclipsing body is some kind of object with several orbiting rings of dust debris, interspersed with gaps (hence the intermittent on-and-off eclipsing). It's the first detection of Saturn-like dust rings outside of our solar system, with the outmost ring stretches some 37 million miles outward from the orbiting body itself.

[SPACE]

New App Downlinks Mars Rover Images Straight to Your Smartphone

$
0
0
Opportunity at Endurance Crater NASA

Amid all the excitement about the new Mars rover, some people (not us) might forget there's a functional one up there already, still driving around craters and snapping new photos. So why not take advantage of it? A new app delivers Mars photos straight from the Opportunity rover's most recent downlink to your smartphone.

The Mars Images app, developed by Mark Powell at the Jet Propulsion Laboratory, sends the most up-to-date images from Opportunity's downlink as soon as they're ready. You can also browse older Mars images from the rover's archive, and NASA is planning to add a photo album from Opportunity's late twin, Spirit. It's available for the iPhone and iPad as well as Android devices.

Opportunity is nestled in for the winter - its fifth cold season on Mars - at a spot called Greeley Haven, which faces south to provide ample solar energy. Meanwhile, the behemoth new rover Curiosity is making its way to Mars, adjusting its course this week on schedule for an August arrival. It will get its own version of the image-downlink app once it lands, according to Wired.

[iTunes / Android via Wired]

What's the Most Efficient Design For a Solar Collector? Shape It Like a Sunflower

$
0
0

Concentrated solar power plants could get an efficiency boost inspired by flowers, according to MIT researchers. Designing solar mirrors in a spiral pattern similar to sunflower heads could reduce the space required for CSP plants and increase the amount of sunlight the mirrors collect.

Concentrated solar plants use an array of mirrors, called heliostats, that move with the sun as it tracks across the sky. They are installed in concentric circles and direct sunlight to a central tower, where heat is converted into electricity. There are only a few operational CSP plants in the world, partly because they require lots of space. Each heliostat must be arranged so it faces the central tower but also the sun, all without blocking another heliostat's face. Current designs stagger the heliostats so that every other circle aligns, much like rows in a movie theater, according to MIT News.

Researchers at MIT and RWTH Aachen University in Germany came up with a better way to arrange them. First they studied efficiency problems in the existing layout, finding each mirror experiences some shading and blocking problems every day. Alexander Mitsos and Corey Noone of MIT developed a computer model to bring the heliostats closer together, and they noticed the suggested patterns looked a lot like spirals found in nature. So they turned to sunflowers for further inspiration.

The head of a sunflower plant is not really a flower, but a group of small flowers (called florets) crowded together. The ones on the outside hold the petals, and the ones on the inside, which are called disc florets, develop into seeds. The disc florets are arranged in a spiral pattern that orients them at 137 degrees (the golden angle) with respect to each other. The angle produces a pattern of interconnected spirals that follow the Fibonacci sequence.

With this in mind, Mitsos and Noone devised a spiral heliostat field wherein each heliostat was oriented 137 degrees relative to its neighbor, MIT News says. This layout takes up 20 percent less space than the typical concentric circles, and there's less shading and blocking. The design could be used to build more efficient CSP plants in less space, the researchers say. They've filed for a patent.

[MIT News]

Next-Generation Surveillance Robots Can Analyze Their Environment

$
0
0
Snakebot Courtesy Special Operations Apps

Manned surveillance missions are critical to obtaining useful intelligence. But sending a soldier into sensitive areas can often be too dangerous. Scientists are developing robots that could do the job. Last spring, the Advanced Technologies Laboratory at Lockheed Martin unveiled a prototype that uses sensors to model its environment, detect potential threats, calculate lines of sight, and locate good hiding places.

Next-generation surveillance robots will probably combine sensors similar to those on the prototype with more-powerful artificial intelligence and a stealthy body. One such device could be the snakebot, developed by a team at the Biorobotics and Biomechanics Lab at the Technion-Israel Institute of Technology. The robot could infiltrate sewage pipes, crawl under floorboards, or coil up and stand upright for a better view. It could even shed one of its segments, dropping off audio bugs or explosive warheads for assassination missions.

NATURAL MOVEMENT

The six-foot snakebot (top) consists of polymer segments connected by flexible joints and is powered by electric motors. Movement control relies on software that determines the best mode of travel-wriggling, rolling, corkscrewing-for each situation. Sidewinding is fastest but requires good traction; inching forward by undulating the body is slower but works in confined spaces; rolling may be easiest on a flat surface. The snakebot can also rise up to climb stairs and other vertical obstacles.

3-D MAPPING

The robot's laser-radar cameras scan the environment to determine the distance to every reflecting surface in 360 degrees, generating a "point cloud" of readings. Software joins the dots, turning them into a 3-D model of the surroundings. From the model, the robot can determine a threat's sight line, assess and navigate toward hiding spots, and steer clear of dangerously exposed areas.

SMARTER SENSORS

A set of four directional microphones enables the robot to detect approaching humans. By comparing the time that sounds reach each mic, the robot can calculate a threat's location, bearing and speed, and use that data to determine if it needs to hide.

Read more about the invisible warriors of the future: The engineering breakthroughs that will make everything from planes to subs to soldiers...disappear.

The Prettiest Space Pics From This Week's Annual American Astronomical Society Meeting

$
0
0
Cygnus X: Star Birth in Vivid Color Captured in infrared by NASA's Spitzer Space Telescope, this image of Cygnus X (part of the constellation Cygnus, or the Swan) is made beautiful by massive stars that have blown huge bubbles in the gas and dust in the region. This rather violent process causes both star birth and star death--and makes for a really nice image. Since the human eye can't see light in these wavelengths, the colors have been assigned to make them visible to us. The shortest wavelengths are blue, the longer red, and the mid-range light is green. NASA/JPL-Caltech/Harvard-Smithsonian CfA
Because who doesn't like a pretty space pic?

It's been a busy week, what with the Consumer Electronics Show and the Detroit Auto Show showering geeks and gearheads alike with enough conceptual eye-candy to keep us all salivating for the next big thing all year.

But for those of us whose eyes are on the heavens more than on little screens, the 219th annual meeting of the American Astronomical Society was the thing to watch this week. Click to launch the photo gallery

For stargazers, armchair cosmologists, and amateur astronomers--as well as for the pros who actually devote their working hours to the study of everything beyond 62 miles up--the annual meeting of AAS is one of those special times of year when scientists and institutions pull out their best papers, their most tantalizing discoveries, and--most importantly for our purposes--their most dazzling visuals.

Nebulae. Massive star nurseries. Black holes. Maybe even a Voorwerpor two. Over the course of an AAS meeting, there are too many good images hitting the Web for us to write about them all. But as the meeting winds to a close in Austin, we've culled the prettiest of the pretty space pics to hit our inboxes this week and collected them one place. You probably won't get another buffet of cosmological wonder like this until next year, so savor it.

The Newest Revolutions in Metamaterials Bring Invisibility Within Reach

$
0
0
Invisibility Chip Reuters/David Moir

The science of stealth has long been a matter of fading into already obscure environments-the night sky, say, or the deep sea. But engineers are now developing materials that could hide anything in plain sight. Instead of bending light inward, like water and glass do, these optical metamaterials bend it outward, guiding photons around an object like river water around a stone.

The metal alloys in metamaterials are arranged in a grid fitted with openings smaller than the wavelengths of visible light (400 to 700 nanometers). Light cannot pass unimpeded through any space smaller than its own wavelength, so it gets trapped in the grid. Captured photons can be stored, manipulated or, in this case, funneled around an object and returned to their original course. An object cloaked by a perfectly made metamaterial would cast no shadow.

Until last year, scientists were able to produce only paper-thick metamaterial sheets just large enough to cloak objects the size of a bacterium. Last June, John Rogers, a materials scientist at the University of Illinois, unveiled a metamaterial printer. "We can now bang out gigantic sheets of this stuff," he says, "though the grid designs need more work before these quantities will be practical." The sheets feel like plastic. For now, objects placed behind one of these sheets would just appear a little faded, since the design is still imperfect. "Losing an invisibility cloak would be a nice problem to have," Rogers says. "But creating one in the first place is the bigger challenge."

Read more about the invisible warriors of the future: The engineering breakthroughs that will make everything from planes to subs to soldiers...disappear.

How Can I Tell if My Phone's Performance Measures Up?

$
0
0
StrongPhone Thilo Rothacker
How to make sure your browser, CPU, and network speeds are keeping up with the iJoneses and Jonesdroids

Without conducting some tests on a smartphone, it's hard to tell whether an upgrade is overdue or just a waste of money. The most important component to benchmark is the CPU, which is most easily done on Android phones-the free application Quadrant generates a graph comparing processor speed with that of other popular phones.

To check the browser's performance, use the SunSpider or V8 JavaScript test tools, which work across any phone platform. The Speedtest.net Mobile application is an easy-to-use tool for testing download speeds (which can vary from phone to phone on the same network) on both Android and iOS.

Battery life can also indicate if it's time to trade up. To show how quickly the phone's battery is draining over time, try Battery Graph, another Android app. Differences in network signal and software make comparing battery life between phones difficult, though. The best method of doing that, if you can get your hands on the phone you're considering upgrading to, is to play the same video on both and measure how long it takes for the battery to die.


The Most Amazing Images of the Week, January 9-13, 2012

$
0
0
Therapeutically Cute A Japanese robot called the Babyloid (a name so close to making sense in English but still falling a touch short) is designed to be cute. That cuteness, which manifests in its appearance, its reactions to stimuli, and its giant button face that's so cute you just want to eat it all up, is supposed to be helpful to depressed elderly folk. Read more at FastCoDesign. Masayoshi Kanoh

This week, in the midst of the Consumer Electronics Show, the Detroit Auto Show, and the 219th annual meeting of the American Astronomical Society, we were inundated with pictures. The most exciting gadgets, the hottest cars, and the most humbling, beautiful space pics all showed up this week. But that doesn't mean we can't also take time and look at adorable Japanese robot...things. Or frogs so tiny they can comfortably hang out on the surface of a dime.


Click to launch this week's Images of the Week gallery.

Camera and Lens Guts

This Week in the Future, January 9-13, 2012

$
0
0
This Week in the Future, January 9-13, 2012 Baarbarian

The PopSci staff has been darting all over the country this week--Las Vegas, Detroit...I guess that's it, but still, those are two places more than we usually go. And at those conventions, surrounded by tens of thousands of people, we often get to wishing we were undetectable, able to drift through the crowds silently and unseen, snapping our photos and then getting the hell out of there. This week's roundup illustration speaks to us.

Want to win this sneaky Baarbarian illustration on a T-shirt? It's easy! The rules: Follow us on Twitter (we're @PopSci) and retweet our This Week in the Future tweet. One of those lucky retweeters will be chosen to receive a custom T-shirt with this week's Baarbarian illustration on it, thus making the winner the envy of their friends, coworkers and everyone else with eyes. (Those who would rather not leave things to chance and just pony up some cash for the t-shirt can do that here.) The stories pictured herein:

And don't forget to check out our other favorite stories of the week:

CES 2012

OTHER STUFF

Borderworld: How the U.S. Is Reengineering Homeland Security

$
0
0
The Crossing The Zaragoza-Ysleta International Bridge in El Paso, Texas, is one of the 300 ports of entry where customs officials inspect the more than 350 million travelers and 100 million vehicles, trains and aircraft entering and exiting the U.S. every year. J. Henry Fair 2011
Patrolled by Predator drones, radar blimps, dogs, and scanners, the U.S./Mexico border is now a state unto itself: Borderworld

1. "YOU TURNED AROUND"

I was visiting my hometown of Del Rio, Texas, when my grandmother told me she had seen a drone flying over El Indio, a tiny village just east of the Mexican border, about 75 miles down the river. The newspapers that summer were filled with stories about the Predator drones poised to patrol the skies above the Rio Grande, but the date of deployment was not yet at hand, and in any case Predators ordinarily fly far too high to be seen from the ground, so I decided to take the afternoon to drive down to El Indio and investigate.

As a lone male in a rented minivan headed south on a remote stretch of border highway, I almost certainly fit some kind of profile. I passed several white pickups bearing the distinctive green stripe of the U.S. Border Patrol, but my first direct encounter with the authorities did not come until I pulled off the road to study with my binoculars a white speck that I had spotted high in the cloudless sky. It was not a Predator or any other UAV that I had ever seen or read about. It looked like a blimp. I put down my binoculars just as another of the green-and-white trucks pulled up. We both lowered our windows and I asked, in my best Texan, what that thing was floating up there in the sky. "It's a weather balloon," the officer said with a smile. I thanked him, and we both waved as I drove off, still headed south.

The borderlands where I came of age had ceased to exist. But I did not yet comprehend what was taking its place.In El Indio, I stopped to buy a Dr Pepper and asked the old lady behind the counter, in my best Spanish, whether she knew anything about that white thing up in the sky. She did not. I decided to inquire at the post office, but it was closed. I was wondering what to do next when a minivan pulled up. I asked the driver if she knew what that white thing was up in the sky.
"It's a satellite for the drugs," she said. "My brother-in-law works for it." A boy chimed in from the backseat that if I kept driving south I'd see "the building that controls it." I thanked the woman and her boy and continued on my way. Border Patrol vehicles continued to pass me coming and going, and, as I neared the base of what I could now see was in fact a tethered blimp, one of those trucks quickly pulled up right behind me and showed no sign of passing. Although I was doing nothing illegal, I began to sweat. Soon I drove by a couple of white buildings, in front of which was a sign: United States Air Force Tethered Aerostat Radar Site.

That settled the question. The tethered radar blimp (I have since learned) is a relatively old surveillance device, part of a system deployed decades ago when drug smugglers were having a grand time flying over the border with their cargo. I've seen another aerostat on the ground in West Texas, near Marfa. Rumor has it that one of them got loose in a high wind and was blown almost to Oklahoma.

Having attained my goal, I was now confronted with the more urgent question of what to do about the Border Patrol vehicle that was so determinedly following me. I had never driven this stretch of highway before, and I feared I might drive for hours before reaching another human settlement. I spotted a place to pull over and decided to turn around. That's when the flashing lights went on behind me. I stopped, several more trucks pulled up, and soon men in green uniforms were peering through all the windows of my vehicle. "What seems to be the trouble, officer?" I asked. "You turned around," came the reply.

The lead agent was friendly enough, but he was insistent in his inquiries. He wanted to know what I was doing out there on a remote stretch of highway not far from Mexico. My explanation, that I had driven south from Del Rio because I was curious about the security infrastructure that had materialized along the border in the 25 years since I loaded up my car and drove off to college, struck him as implausible and weird. I fought the urge to become indignant, to assert my right as an American citizen to go where I pleased on a public highway. Instead I explained again that I was curious about that blimp up there, the aerostat. Eventually, after much discussion, it was determined that I had not committed a detainable offense, and I was permitted to continue on my way, at liberty.

/>

2. "A VIRTUAL FENCE"

Driving back up the line to my grandmother's house, as I passed one curiously discontinuous segment of 18-foot-tall border fence after another, I brooded over the larger meaning of my encounter with the authorities. I had long nursed the belief that the borderlands where I came of age, in which my neighbors and my family and I had crossed the river to Mexico weekly if not daily with a minimum of inconvenience, had ceased to exist. But on that bright summer day in 2010, I realized that I did not yet comprehend what was taking its place. I had only begun to understand the complexities of the modern border and its intricate economies of authority and surveillance. So I decided to investigate, to experience the border complex as a sympathetic journalist rather than a suspect tourist.

My initial question was relatively simple: How does the border work? What devices and systems have we invented to secure a 1,954-mile international boundary-of river valleys and canyons, mountains, deserts and vibrant communities straddling both sides of the line-that people have crossed more or less freely for hundreds of years? What I discovered, over weeks and months of reporting, is that no real agreement exists among policymakers about how to define the border itself. Is it an obstruction or a conduit? A military domain or a civil and commercial one? Is it meant to join communities or keep them apart? I searched in vain among the pronouncements of our political leaders for clarification of such questions.

What was once little more than a line on a map has become a theater of operations.Despite this ambiguity-or perhaps as a result of it-the federal government has since 2003 doubled the flow of funds to Customs and Border Protection, the division of the Department of Homeland Security with primary responsibility for policing the border. CBP, which encompasses the Border Patrol, has in turn deployed increasingly advanced means not only to scrutinize, search out, and seize an immense stream of drugs and bodies (to use CBP parlance), but also to channel a concomitant river of data-electronic manifests, lists of travelers' names, dates of entry, and untold terabytes of video footage-all of which must be analyzed, quantified, indexed, and stored.

Technologies of surveillance and control all aim to achieve a perspectival advantage over some adversary, but the vast quantities of data produced by these devices threaten to overload the system, thus defeating the original goal. Fusing those rivers of data into a comprehensive and intuitively manageable real-time graphical interface, for instance, had been one of the foremost aims of the Secure Border Initiative Network, or SBInet, the federal government's doomed mega-contract with Boeing to build a "virtual fence" along the nation's borders. In January 2011, after five years of effort and more than $1 billion had yielded a mere 53 miles of partially operative tactical infrastructure in southern Arizona, the Department of Homeland Security canceled SBInet. It was not yet clear what would take its place.

Despite the failure of SBInet, the border is increasingly defined not by geography or war or acts of Congress, but innovation. Border-control assets-from radar blimps to Predator drones to virtual fences and other military-grade surveillance machines-are evolving rapidly, if imperfectly, and with them so is the border itself. What was once little more than a line on a map has become a theater of operations.

/>

3. "I NEED TO TALK TO YOU"

My investigation began in Brownsville, Texas, on the front line of what some have taken to calling a border war. Brownsville lies just above the mouth of the Rio Grande, at the southern tip of the largely Spanish-speaking urban sprawl of 1.2 million people that fills the lower Rio Grande Valley. My initial destination was a Border Patrol station, where I would visit a state-of-the-art command-and-control center. When I arrived at the station, just in time for the 4-p.m.-to-midnight shift, I was immediately confronted with one of the reasons they call it a war.

Customs and Border Patrol does not expect, or want, to stop everything that crosses the border.At the daily muster, where Border Patrol agents get their marching orders for the day, much of the talk was about Jaime Zapata, a special agent with Immigration and Customs Enforcement who had been shot dead six days earlier by members of Los Zetas, a Mexican drug cartel, at a roadblock several hundred miles south of the border. Zapata was both a Brownsville native and a former Border Patrol agent, so his murder was a major event. After his funeral, hundreds of law-enforcement vehicles, sirens wailing, would pass through the city as residents lined the streets waving American flags. Some of the agents I spoke to attributed the relative quiet along the border that week to the Zapata killing-the bad guys were waiting to see what the American response would be. The Gulf Cartel, a rival organization whose own war with the Zetas for control of transborder commerce had resulted in more than 1,000 deaths over the past year, denounced Zapata's killing. "It's clear that the federal government should act without delay against these assassins," the cartel said in a statement. "Because the spilling of blood in the country is now drowning society."

I was unable to attend the Zapata funeral, but I would eventually see high-definition video footage of the burial ceremony taken from a CBP helicopter. The video was shot from about three miles out; the mourners were probably not even aware that a helicopter was in the area. I watched playback of that video feed on the Web portal of a system called the Big Pipe, a surveillance network developed by Kenneth Knight, the deputy executive director of national air-security operations for the Office of Air and Marine (OAM), a lesser-known division of CBP that operates the largest law-enforcement air force in the world.

Knight is a physically imposing, ruddy man with a disarming Midwestern accent. When we met in Brownsville, he was dressed in the khaki jumpsuit that all OAM pilots wear, and it turned out that he was a helicopter pilot himself. I had no idea who he was, but he already knew about me. "I need to talk to you," he said, decisively hijacking my tour of the station. Knight was in town to coordinate air support for the Zapata funeral, and he didn't have much time for me right then, but he gave me a quick briefing on the Big Pipe and then invited me to Washington, where he promised to give a more detailed demonstration of his project's capabilities.

What was the Big Pipe? The answer wasn't clear at first, but Knight emphasized the concept of "total domain awareness" and strongly suggested that he possessed the means of attaining that state. Based on the briefing I received in Brownsville, the Big Pipe sounded like it might be the framework for the elusive "common operating picture" that would integrate and rationalize the increasingly unwieldy data streams generated by our high-definition surveillance systems. Perhaps the Big Pipe could succeed where SBInet had failed.

4. "THE MIKE SIDE"

Late that afternoon, when the low angle of the sun was beginning to lengthen the shadows, agent Dan Milian took me down to the Rio Grande to get a closer look at the border itself. Weedy, fast-growing brush often chokes the meandering banks of the Rio Grande as well as the no-man's-land between the river and the border fence. Carrizo river cane, an invasive species that aids and abets the passage of other such species, grows everywhere. Narrow trails snake through the tall grass.

The Brownsville & Matamoros Bridge, the oldest crossing in Brownsville, loomed behind us as we walked along the river. Broken shards of glass twinkled in the dense ground cover, and thick vegetation did a good job of hiding the ubiquitous debris of human civilization: cast-off soft-drink bottles and small articles of clothing, socks, T-shirts, a sneaker. Torn black plastic trash bags rustled in the light breeze, especially along the landing spots worn slick from the passage of illegal bodies who slip out of the oily black nighttime river, briefly pause, quickly pull dry clothing and supplies from the trash bags, and then dress themselves and furtively crawl, scramble, or run toward the black steel pickets. The fence can be climbed, and so they climb.

In 2006, Congress mandated the construction of a new barrier along the southwest border, and since then contractors have built just under 700 miles of such fencing, at an average cost of $2.8 million per mile. Environmentalists and cynical bystanders in the border communities hate it. Farmers who are cut off from their fields resent the inconvenience. People whose homes ended up on the wrong side of the fence feel sacrificed and abandoned. Ocelots and other lovely wild creatures are said to be experiencing disruptions of their migratory wanderings. Smugglers, meanwhile, have used a catapult to hurl drugs into Arizona, as well as a portable ramp that permits vehicles to drive right over the fence.

It's easy to laugh at fencing that abruptly ends in a tangle of brush. But agents here say they love even the intermittent version because it gives them a bit more time to respond to border-crossing attempts, which in Brownsville must be measured in seconds. The fence adds perhaps a minute to the equation, Milian told me, and it also channels the flow of aliens away from populated areas out into the brush, where the response time is measured in hours and days.

A heavily trafficked and well-maintained dirt road ran alongside the border fence. Dust lay thick on the ground and offered up a rich testimony to a tracker versed in the art of sign cutting. Agents drag bundles of tires behind their vehicles along such roads, both here on the line and out in the brush country far from the river, and check back periodically to see if any signs have appeared. The best trackers can tell from a footprint whether the body in question is heavy or light, fit or exhausted, his approximate age and height, how fast he is moving, whether he is carrying a load, and how heavy that load is likely to be. I've been told that at least one agent can cut sign from horseback at a gallop.

We were in the middle of town, right next to a port of entry. The river was perhaps 10 yards across, and the railroad bridge of the port not more than 50 yards away. Even here, they cross. We walked down a trail looking for fresh signs of traffic, and I noticed how much thicker the brush was on the other side. We observed no signs of human activity, but such appearances were deceptive. Matamoros was right there; people lived and worked and performed their daily routines just a few hundred yards away. Down here, the cartels often employ spotters to watch the river. Sometimes they fish, but often they just sit and watch from the bank, staring with impunity and insolence or maybe just boredom. The cartels choose when and where to cross; they control the other side, the "Mike side." They own the monopoly on human traffic just as they do the traffic in drugs. No one freelances anymore.

On our side, a Border Patrol camera tower looked almost pretty against the evening sky as it peered, from a height of 60 feet, up and down this broad bend in the river.

/>

5. "BUGS"

Back at the command-and-control center a few hours later, I found myself on the other side of that camera, studying the same stretch of the river. The shift in perspective was dizzying. Twenty large screens lined the front wall of the control room and flickered from one surveillance camera to another; a television in the middle of the wall had been tuned to Fox News. Agents sat behind desks, scanning the monitors and occasionally speaking on the radio with agents in the field.

Smugglers are often stupid, and sometimes they are greedy. They are just as frequently ingenious, however.The Rio Grande Valley sector employs dozens of Remote Video Surveillance Systems, most of which are on fixed towers. Each RVSS is made up of four cameras, two of which are infrared for night duty. The agents who are assigned to camera duty in the control room zoom and pan the cameras as needed. At night they can manipulate the contrast of the infrared video, shifting from "black hot" to "white hot," rewinding and forwarding through the digital file as needed to identify what is often merely a fleeting glimpse of an unidentified animal, possibly human. Sources of thermal energy abound. Rocks, concrete blocks and even the plants radiate heat, but warm-blooded animals stand out most vividly, and they move.

A seismic sensor buried alongside an active trail detects foot traffic and transmits its radio signal to the command center. Such unmanned ground sensors have been used for decades, but engineers continue to reduce their size and increase their sensitivity. Border Patrol agents have placed some 11,000 sensors along the U.S. border, and they move them constantly in an effort to keep up with the ever-shifting traffic patterns along the infinitely forking paths that radiate outward from the line.

Agent Jose Mancillas demonstrated what happens when he receives a signal from a ground sensor. He glanced left to a small screen displaying the current locations of his "bugs" and quickly typed a few keystrokes. One of three large flat-screen monitors at his desk instantly displayed a river camera's infrared image. Using a joystick controller, he panned the camera and zoomed in. There wasn't much to see just then, so he pulled up a file of a recent incursion. Eight ghostly white bodies sprang out of the brush and sprinted in an awkward hunkered-down posture toward the steel pickets of the border fence. They had activated the sensor about 50 yards south of the levee, three miles away from the Rio Grande. As soon as he had confirmed that there was traffic on the move, Mancillas had hit the radio, alerting a unit he knew was standing by just around the bend. We watched several members of the group perch on the fence; then the agents came into view and the aliens retreated. One leaped all the way from the top of the fence and hit the ground hard. We all winced. But he got up and ran south, back toward Mexico, with the rest of his group.

Suddenly all motion stopped. The file ran backward as Mancillas worked the controls of the NetGuard-EVS video client. He wanted to show me additional footage of recent traffic. Often you get just a flash of white, and it takes an experienced eye to determine whether to respond. The cameras are a good tool, but they can't see everything, and the harsh South Texas weather degrades their performance. In January, during a severe cold snap, the cameras simply froze in place.

6. "A HUGE DIFFERENCE"

Upriver from brownsville lies McAllen, a more affluent community where local conditions, both natural (thick brush) and political (height restrictions), have prevented the deployment of remote video surveillance towers. Here the Border Patrol employs mobile surveillance systems that can be moved to hotspots as needed. Agent Jaime Medina joined us in McAllen and led an excursion into the broad fields that run alongside the levees that crisscross the fertile floodplain next to the Rio Grande.

Driving along a levee in the dark is a disconcerting experience. The land drops away sharply into an abyss of chirping crickets, singing frogs and other loud, gregarious creatures of the subtropical darkness. As I traveled with agents Milian and Medina through a night in which all fields were black, I had to strain my eyes to find some landmark. I tried to imagine what it was like patrolling out here with nothing but flashlights and a good sense of direction. We finally came to a "scope truck," a pickup with a 20-foot retractable camera tower mounted on its bed. As with the stationary tower systems, the scope truck can shift between daylight and infrared viewing. We were parked on a kind of promontory or juncture in the levee. In daylight we no doubt would have been treated to a spectacular view of South Texas's agricultural production. Historically, most of these vast fields have been worked by Mexican migrant workers, many of them undocumented.

Border Patrol officers monitor this area day and night, using scope trucks and also personal night-vision equipment such as the TAM-14, a short-range thermal monocular, and the Recon III Lite, a heavy thermal binocular, often mounted on a tripod, that includes a laser targeting system. The laser can guide agents wearing night-vision goggles to a group by fixing them with a beam invisible to the naked eye but brightly apparent to anyone wearing the proper eyewear. Such equipment, which was in short supply in previous years, is now widely used. After an impressive demonstration of the scope truck's long-range thermal camera, the agents offered to show me the laser; wearing night-vision goggles, I was able to clearly see the red beam as it targeted a spot near the river.

Airplanes, helicopters and drones can highlight targets using similar devices to even greater effect. I later rode in a helicopter equipped with a FLIR Star Safire HD camera that was sensitive enough to detect the heat signature left by a body in high grass long after the body itself had moved on. The Star Safire comes equipped with a laser targeting system and a powerful infrared spotlight that can be slaved to the camera, and thereby bathe groups of aliens in a light they cannot see. As Mancillas had told me in the Brownsville control room, "it makes a huge difference when you can see in the dark."

/>

7. "WE SEE IT"

CBP does not expect, or want, to stop everything that crosses the border. Facilitating the flow of commerce is central to its mission, and as a result Laredo is, on a given day, the busiest commercial "land port" in the U.S. When I visited the World Trade Bridge there, the facility was nearing the end of an expansion project that would double the number of primary lanes used to help process the 1.5 million trucks that pass through the port every year.

The primary question taking shape in my mind was: Where and how would the limits of the border domain be set?Jose Uribe, the port's amiable and efficient assistant director, described his operation as he drove us across and against oncoming truck traffic, dodging and weaving like a veteran player of Grand Theft Auto. To my inexpert eye, the scene was a chaotic riot of monstrous trucks and looming, barn-like scanners. Five thousand trucks a day on average, laden with every conceivable commodity-blue jeans, auto parts destined for just-in-time delivery to a factory in Tennessee-pass through this facility. "I've been in Laredo for 34 years," Uribe told me. "I can remember back in the late '70s we had mostly curios, some heavy steel." Then came Nafta. "Now, you name it and we see it. Everything from laptops to three-piece suits."

As Uribe's tour progressed, patterns began to emerge before my untrained eyes, and I could see that the operation here was a miracle of logistics. Each vehicle, as it passed through the layered enforcement process that began with the submission of an electronic manifest at least one hour prior to its actual arrival, was tracked from station to station. At any point, a customs officer could create an "issue": tagging the shipment for more-intensive scrutiny, which might mean submitting to a higher-resolution x-ray scan or offloading the complete contents of a shipment.

Inspectors at the World Trade Bridge deploy an impressive array of scanning devices, from old-fashioned low-energy x-ray machines to backscatter and high-energy x-ray and gamma-ray scanners. The high-energy x-rays, which inspectors used to scan the most visually challenging commodities, produce marvelous, almost gallery-quality images. One can see the internal structure of a large tractor-trailer rig with hallucinatory clarity-the gears inside a transmission, the pushrods in the engine. Uribe showed me scans of a road roller, the kind used to compress hot asphalt, and inside the large, dense roller wheel were packages of drugs. A load of gypsum board was laden with marijuana, the voids inside the pallets revealed by the scan. Scans of a southbound truck carrying rolls of fabric revealed suspicious areas of density; using software-enhancement tools, the scanning technician was able to detect the presence of $1.2 million in cash, a small fraction of the estimated $18 billion to $39 billion that the cartels smuggle across the border every year (of which $147 million was seized in 2010). Another scan showed packages of cocaine stamped with the logo of the Gulf Cartel.

Smugglers are often stupid, and sometimes they are greedy, as when they attempt to cram one or two more packages into a well-concealed cavity in a vehicle. They are just as frequently ingenious, however, as when they hid a load of drugs inside a large tank of used oil, which scanners can't penetrate. These smugglers were perfectly aware of the limits of the technology. What they were unable to defeat, in that case, was the power of a dog's nose.

Dogs, at border checkpoints as well as traffic checkpoints 70 miles from the line, have found people hidden in the engine compartments of trucks, sewn sitting upright into the backseats of cars, and in one case wedged into a modified console such that when customs officers opened the hatch between the front seats, they saw a man's face staring up.

8. "PASSIVE SECURITY"

At ports serving the general public, such as the much smaller but extremely modern crossing in Del Rio, security measures are directed not only at the endless stream of commodities that pass through these facilities, but at the bodies of the individual people presenting themselves for entry: their facial expressions, postures, affect, clothing and emotional dispositions.

Sharon Ansick, a tactical logistics officer who went to high school with my sister, gave me the grand tour of the Del Rio facility. Video cameras were everywhere, 150 in all. Doors and windows were secured, and passage in and out of facilities, as well as from one area to another within a compound or building, was tightly controlled. Ansick explained that this was called passive security. Everyone who entered this facility, whether they knew it or not, had entered a panopticon. Their every move was registered, recorded, observed, and controlled. No one could leave without permission. Border runners would be met with road spikes that jut up from the pavement at the push of a distress button. Few would ever realize the degree to which their liberty had been constrained.

All incoming and outgoing license plates are photographed, and all drivers too. All recently issued passports, green cards and day-entry cards contain radio-frequency ID chips that broadcast the identify of a traveler at the primary checkpoint, and the Del Rio port is the first to deploy a special RFID lane to speed processing. When I was there, traffic was light and lines were short, but there was a sense of high alertness throughout the facility. Immigration and Customs Enforcement agents armed with M-4 rifles loitered near the secondary station. Supervisory agents, in a glass-encased control room overlooking the traffic lanes, kept watch over the whole proceeding, monitored the video feeds, and maintained radio contact with personnel all over the port.

The port's noncommercial traffic-about two million vehicular travelers and 50,000 pedestrians annually-is not routinely scanned. Instead, CBP officers interview drivers in a primary lane and use special angled mirrors to inspect the underside of all vehicles, and if a dog sniffs something suspicious or something about the car seems unusual, or if the driver seems nervous or simply came from an area of interest, the officer will call for a secondary inspection. At that point, density meters, mirrors, x-ray scanners and the whole repertoire of what CBP terms non-intrusive inspection techniques come into play. Nowadays few cars are dismantled or drilled without evidence derived from one of these methods. One recent seizure came about because an officer manning the primary lane noticed that a vehicle, driven by a lone male, was uncommonly clean. A trip to the VACIS x-ray scanner settled the matter. After some probing and chipping, agents discovered several pounds of heroin and methamphetamine.

As we passed through the port, the routine business of inspection and seizure continued all around us, and it was that routine of passive and all-encompassing surveillance that seemed to offer the most plausible model for what Kenneth Knight's total domain awareness might look like. The primary question taking shape in my mind was: Where and how would the limits of the border domain be set?

As if in answer to my silent wonderment, Ansick pointed out that CBP enforces regulations on behalf of 44 other governmental agencies, including the FDA, the EPA and the USDA. Inspectors go through agricultural loads by hand, searching for tiny insects, egg casings under leaves, and other stowaways on legitimate imports. Palo Verde wood borers show up in stacks of firewood. Cattle must be examined for Rocky Mountain spotted fever ticks. In Del Rio, people arrive with juicy, stinky fermenting cheeses, deer heads, oranges, cowboy boots made from endangered species like sea turtles. The guy with the sea-turtle boots was a recent case, a native of San Luis Potosí, the state where Jaime Zapata was murdered, and the officer interviewing him just happened to notice the boots. The boots went into a freezer, and the poor man, who naively admitted what they were, left in his socks.

/>

9. "DIFFERENT PURPOSE. DIFFERENT MISSION."

Everywhere i traveled along the Rio Grande, when I asked questions about the different devices being used on the border, my companions invoked the name Borkowski-as in, "You'd better ask Borkowski about that." They were talking about Mark Borkowski, CBP's assistant commissioner for the Office of Technology Innovation and Acquisition. All the most advanced equipment, and all the new contracts, flowed through him. So I went to the source, to Washington, D.C. I had many questions. The week before I arrived, Borkowski had testified before Congress about the failure of SBInet, the infamous virtual fence, so I asked him to elaborate. In long, well-punctuated paragraphs, he told me the story of the program's genesis and its fall.

[Technology] would most likely be every bit as transformative for border operations as air power was in military affairs.In his view, the original sin of SBInet was a pervasive naiveté-among the general public, the media and the government-about the ability of technology to solve a vexing political problem. In the years after 9/11, when the border began to be regarded with a new sense of urgency, there was a strong feeling that something dramatic needed to be done and that technology, which everyone agreed was a good thing, would somehow provide an answer. Unfortunately, Borkowski told me, no one had a clear theory of what exactly technology was supposed to accomplish. That rush to find a universal technological solution contributed to the failure of SBInet, which was plagued from the very beginning by cost overruns, delays and poor design on the part of Boeing and bad program management on the part of Homeland Security. Looking forward, the immediate goal was to find specific technological solutions that fit the particular challenges of different stretches of the border. Policy changes, such as comprehensive immigration reform-which, Borkowski hastened to point out, was not the same thing as amnesty-could make a huge difference as well. If Congress would create a rational and orderly system to match immigrants with jobs in a legal manner, and if the laws against hiring undocumented aliens were consistently enforced, "that would cut off a lot of the traffic between the points of entry. In fact, at a certain point, you would only have the really bad people left, the drug smugglers and the terrorists."

At that point, though, technology would continue to play a major role. Indeed, it would most likely be every bit as transformative for border operations as air power was in military affairs. Borkowski singled out the domestic use of unmanned aerial systems as having the most potential for radical operational change. SBInet might have failed, but the idea behind it was sound: watching as much of the border as possible, all the time. A drone has a different, but complementary, mission: targeted surveillance. "A UAV can get somewhere fast, and can stay there," he said-far longer than a conventional aircraft-"but it looks through a soda straw. Different purpose. Different mission."

Leaning forward on his desk, Borkowski was quick to credit his fellow assistant commissioner Michael Kostelnik, the retired Air Force general who runs OAM, for pushing the deployment of drones along the border and elsewhere. OAM has been operating Predators in domestic airspace for six years now and is using them in many situations that have little or nothing to do with border security, notably in disaster-recovery missions after hurricanes, fires and floods, but also in what Kostelnik (at a border summit I later attended in El Paso) called "pop up" missions responding to contingent homeland-security situations. For routine border missions, OAM operates its unmanned aircraft with a certificate of authorization from the FAA that permits it to fly them over the entire southwestern border, as well as the Gulf Coast as far east as New Orleans and the northern border from Spokane, Washington, to the western end of the Great Lakes. The agency also has transit certificates that allow it to fly drones across the country from one area of operations to another.

The FAA will not yet permit OAM drones to fly over large metropolitan areas on a routine basis, but Kostelnik said his agency can now secure an emergency authorization and within a day put a Predator drone in the sky anywhere in the country.

/>

10. "THEY CAN'T DO WHAT WE DO"

When Kenneth Knight was in Brownsville to coordinate air support for the Zapata funeral, one of his prime objectives had been to set up the helicopter video feed, which was transmitted by direct downlink to a microwave antenna he had installed on the roof of the Border Patrol station. While I was there, Knight had pulled up the Big Pipe portal on a Border Patrol PC, logged in, and within a few mouse clicks we had that helicopter feed on the screen. The same feed could be pushed out through the Big Pipe to a local sheriff, the FBI, or any one of the hundreds of other local, state and federal "customers" with whom Knight works regularly. "We're doing some really cool shit," he had explained.

Several weeks later at his spartan office in Washington, Knight gave me the more comprehensive briefing he had promised. As things now stood, sitting at his own desk or at any registered computer (or tablet or smartphone) anywhere in the world, Knight could click from a feed originating from a helicopter or a Predator or a P3 surveillance plane to any other feed, including a new test sight-a DHS camera pointed at a security line inside Hartsfield-Jackson Atlanta International Airport. Click, scroll, click; just like that.

I asked Knight how this might all work in practice, and he described a hypothetical mission in which a Guardian drone (the maritime version of the Predator) encounters an unidentified watercraft in the waters off Miami. The Big Pipe enables all the people from all the agencies who have an interest in the mission to be logged in simultaneously, each one watching the same video feed in real time, along with the same charts and maps and other mission data. The OAM drone operator might not be able to identify the craft, but a Coast Guard analyst could pronounce his take on the matter without having to wait for the pilot to verbalize what he thinks he's seeing on the water.

That all sounded useful and efficient, but the real advantage, Knight continued, was not just being able to see things; it was being able to switch perspectives on the fly. Say the target vessel is approaching Miami, a major metropolitan area and therefore off limits. The drone could hand off the target to a manned Dash 8 aircraft. Then, as the vessel enters the port, it could be handed off again, now to fixed video cameras, whereupon ground personnel could also play a role. One platform can't do it all-the air assets can't stay airborne forever or go wherever you want them; the still cameras can't move-"but if you start putting all these camera systems together, you've functionally closed the gap."

It was becoming clear that the Big Pipe, with its persistent and pervasive surveillance capacity and its ability to archive everything into an easily accessible mission data package for intelligence analysis, could soon outstrip the command-and-control software used by American soldiers in war zones around the world. Knight wasn't just talking about a specific operational zone like the Rio Grande Valley sector or the waters off the coast of Florida. He was targeting a much larger domain: the national air radar picture and the coastal marine surface radar picture, not just the surveillance cameras in the ports and along the border but also the surveillance cameras in metropolitan areas-airports, train stations, on the side of buildings, anywhere-such that the theater of operations was expanded to the widest possible extent. This broad spectrum of surveillance was really what Knight had in mind when he told me about total domain awareness, an operating picture that encompassed pretty much the entire country. Total domain awareness meant the ability to apply these tools, at will and as needed, anywhere in the U.S.

As I listened to Knight describe his vision, I recalled Borkowski's skepticism about the ability of technology, by itself, to solve our border problems. It wasn't clear, for example, that a fully robust Big Pipe could have prevented the gun that was purchased near Dallas and later killed Jaime Zapata from ending up in the Zetas' arsenal-unless, of course, the movement of goods and people inside our borders were managed with the same rigor we apply to the traffic crossing the border. That level of operational control is beyond reach for now, but judging from the logistical expertise I saw demonstrated at the World Trade Bridge, it is far from unattainable. In October, a DHS official named Mariko Silver, testifying before Congress on border security, would make a similar point, explaining that President Obama's border-security policy "requires us to move beyond seeing border management as simply guarding or policing the jurisdictional line between the United States and Mexico. The border and the interior are inextricably linked."

The mission of securing our national borders has thus become indistinguishable from a new and still emerging understanding of what constitutes homeland security. The border has become a laboratory in which new security techniques can be perfected and where military tactics can be adapted for domestic application. Indeed, it is hard to avoid the conclusion that the border is slowly expanding to fill the entire continent.

Knight had tried to explain all of this to me back in Texas, but at that point I hadn't fully understood what he meant. Now I could see. "The military does some of the same stuff, but they can't do what we do. They work in the classified world. We actually cross domains," he had said. "We are paving the way."

Roger D. Hodge is the former editor of Harper's Magazine and the author of The Mendacity of Hope. He lives in Brooklyn.

SpaceX Delays the First Launch of its Dragon Spacecraft to the ISS (Again)

$
0
0
Dragon on Approach to the ISS Artist's rendering NASA/SpaceX

The first launch of SpaceX's Dragon spacecraft to the ISS has been delayed yet again. No new date has been set, but the SpaceX apparently feels its Dragon could benefit from further testing and will not be ready for its scheduled February 7 launch. "We are now working with NASA to establish a new target launch date, but note that we will continue to test and review data," a SpaceX spokeswoman said in a statement today. "We will launch when the vehicle is ready." With the space shuttles retired, the unmanned Dragon is supposed to be NASA's next-gen transport to orbit capability.

[PhysOrg]

Space Telescopes Paint A New View of Eagle Nebula

$
0
0
A New View of the Pillars of Creation Combining almost opposite ends of the electromagnetic spectrum, this composite of far-infrared images from Herschel and X-ray images from XMM-Newton shows how hot young stars are sculpting and interacting with the surrounding ultra-cool gas and dust, which, at only a few degrees above absolute zero, is the critical material for star formation itself. Both wavelengths would be blocked by Earth's atmosphere. ESA

Does the image above look familiar? It shouldn't, because it's brand new. But the subject should certainly ring a bell for any space buff - it's the same vast nebula that became one of the most beloved, coffee-table-booked, computer-wallpapered images in astronomical history. This new image of the Eagle Nebula shows the value of having space observatories that span the light spectrum.

The Eagle Nebula is 6,500 light-years away in the constellation Serpens, and contains a hot young star cluster that illuminates and shapes the surrounding gas and dust clouds. The Hubble Space Telescope captured these sculpted pillars in 1995 in visible light, seen below. The image suggested there was a stellar nursery inside the pillars, but Hubble could not see past the dust.

This new image depicts the nebula across the light spectrum, allowing astronomers to see it from the inside out.

In near-infrared light, the pillars vanish; in far-infrared, captured by the Herschel Space Observatory, the pillars are illuminated by their own light, allowing astronomers to see inside them. A companion image from the XMM-Newton space telescope pinpoints the hot stars. The space telescopes' new images are layered with new near-infrared data from the Very Large Telescope and visible images from the Max Planck Gesellschaft telescope, both in Chile, to make the image at the top of the page.

The result is a new data set to help astronomers understand the life cycles of stars - and a new take on an old favorite.

[ESA Portal]

Wikipedia Joins Legion of Sites Going Dark Wednesday In Protest of SOPA Legislation

$
0
0
Blackout Wikipedia

From social networking sites to megacompanies, tomorrow will be a dark day on the Internet. Wikipedia has joined the list of web giants who plan to shut off temporarily on Wednesday, protesting two bills in Congress that could douse freedom of speech (and freedom of perusal) online.

The English-language version of the online encyclopedia is the latest and arguably most prominent site to go dark in defiance of the legislation, known separately as the Stop Online Piracy Act (SOPA) in the House of Representatives, and PROTECTIP (PIPA) in the Senate. The bills are meant to prevent "rogue" web sites in other countries from ripping off U.S.-created content. They would essentially create an online blacklist, and would require Internet providers and search engines to abide by it, preventing access to the rogues in question.

"If passed, this legislation will harm the free and open Internet and bring about new tools for censorship of international websites inside the United States," Wikipedia administrators said in a collective online statement.

Supporters range from the Motion Picture Association of America to the U.S. Chamber of Commerce, who argue the bills will prevent the illegal copying and sharing of movies, music and other intellectual property online. Foreign entities who pirate American creativity cost money and jobs, they argue. But legions of detractors, from Google to Facebook to independent bloggers, point out that the bills would dampen free expression and require them to police and censor their content.

One of the most insidious aspects of SOPA (which is now apparently on hold, it's worth noting) is its packet surveillance and blocking provision. CNET highlighted this last fall. Under the bill, Internet providers could be required to monitor customers' traffic and shut off access to websites suspected of "rogue" behavior. ISPs could do this using a method called deep packet inspection, which entails intercepting the information exchanged on your computer. This means your ISP could spy on your browsing habits, filtering every piece of information you seek and determining whether the ISP will allow you to view it. It's wiretapping plus information control.

This provision is one reason why some ISPs are opposed to SOPA - they don't have the resources, nor do they want to expend the resources, to listen in on all their customers' behavior.

For the uninitiated, here's an interesting Q&A about how the proposed legislation would affect you, courtesy of CNET. And here's the proponents' take, in which they argue that counterfeit goods from rogue sites can actually kill you.

The White House said Friday it would not support any legislation that reduces freedom of expression or "undermines the dynamic, innovative global Internet." So it's possible President Obama could veto the bills if passed as they stand now. But Internet giants like Wikipedia clearly still view them as a threat.

Now let's see if Facebook or Google follows Wikipedia into the dark.

[via Slashdot]


The Army's Newest Surveillance Drone Can Shoot 80 Years' Worth of Video In a Day

$
0
0

Sometimes the whole is more than the sum of its parts, and the U.S. Army is about to find out if they can create some amazing ISR synthesis by combining two pieces of bleeding-edge technology from its own stores: Boeing's A160 Hummingbird unmanned helo and ARGUS--the Autonomous Real-time Ground Ubiquitous Surveillance Imaging System. Together, the duo will reportedly be able to collect 80 years' worth of HD video each and every day.

That doesn't do much to help out with the military's current ISR (that's intelligence, surveillance, and reconnaissance) data overload, but it's certainly impressive. In places like Afghanistan, where military intelligence needs to surveil huge swaths of territory when scouring for a particular vehicle or looking for the telltale signs of insurgency, the military needs to be able to juggle multiple potential leads at the same time without losing any of them.

Enter ARGUS, developed for U.S. Army Special Forces by none other than DARPA. ARGUS is a 1.8-gigapixel imaging array constructed from 92 individual 5-megapixel sensors. In a given moment, ARGUS can monitor up to 36 square miles, and because different imagers can be pointed in different directions and focused on different objectives, the system can offer at least 65 separate video windows at once, each independently scaleable.

That means ARGUS can follow multiple threats simultaneously, even if they're moving in different directions, but only if it has a good enough vantage point. And that's exactly where the Hummingbird comes into the picture. WIth a ceiling of 15,000 feet and a loiter time of 20 hours, the remotely-piloted Hummingbird can keep ARGUS aloft and recording for almost an entire day uninterrupted. Meaning ARGUS can capture six petabytes of video at a time.

Three of the Hummingbird/ARGUS drones are headed to Afghanistan to begin testing this year, and if all goes to plan there may soon be fewer and fewer places for insurgents to hide. More at Danger Room.

[Danger Room]

Video: Rescuing Disaster Victims With Snake Robots Deployed By Dogs

$
0
0
Snakebot CMU via YouTube

Dogs and robots are both known for their search and rescue abilities, but each has its own flaws. Robots can't sniff, and other than barking, dogs can't relay specific information about survivors. But put them together and you've really got something.

A new project at Carnegie Mellon's Robotics Institute combines two of my favorite things, dogs and robots, to build an animal-machine rescue system that could conceivably improve a trapped victim's survival odds after an earthquake or some other disaster. It would work by strapping a snakebot to a trained search-and-rescue dog, Saint Bernard collar-keg-style, and letting the dog loose to find survivors.

Once the dog finds a person, it's trained to bark. The new system uses this training and programs the snakebot (or another rescue ‘bot) to deploy at the dog's command. The snakebot could maneuver into spots that would be unstable or too small for the dog to reach, and relay video and/or audio of the situation to human rescuers on the other side.

Researchers at Carnegie Mellon University's Biorobotics Lab teamed up with Ryerson University's Network-Centric Applied Research Team (NCART) Lab for a demo of this system at a U.S. Department of Homeland Security demo. A well-trained rescue dog named Freitag found his "victims" and deployed a snakebot, using what CMU calls a Canine Assisted Robot Deployment system. Watch a video below.

[via IEEE Spectrum]

The Northernmost Dish In The World: Tracking Satellites and Dodging Polar Bears

$
0
0
Cold Dish Greg White

Sten-Christian Pedersen oversees the northernmost antenna array on Earth, 25 dishes tracking about 100 satellites on the small archipelago of Svalbard, 500 miles south of the North Pole. Even when the winds are -76°F and visibility is 10 feet, Pedersen drives to the satellite station. When there is a risk of avalanche, he takes a helicopter. When there are polar bears, he carries a firearm.

Pedersen says the antennas are protected by "radomes: close to a drum skin, but made out of plastic." Under the radome is the dish, a lattice of supports with four motors in its base; when the dishes move, it is barely discernable. Svalbard Satellite Station tracks polar orbits-satellites make a complete lengthwise circuit of the globe every 100 minutes, 14 times a day. In 25 days, a polar-orbiting satellite will have seen the whole surface of the Earth.

As a satellite passes overhead, SvalSat's technicians have 12 to 15 minutes to download its data at 300 megabytes a second. The data (images, mostly) is then sent through fiber-optic cables in concrete tubes aboveground (permafrost prevents burial), before it reaches an undersea cable connecting to northern Norway. A new satellite named NNP, a weather satellite, just launched. Pedersen says that the station is in "freeze, to minimize any risk of a problem." His week has been an easy one. The sun recently set for the last time until mid-February. "Then," he says, "you will start to see small light from the south. The blue season, we call it."

Metamaterials Can Exert a Whole New Kind of Force

$
0
0
Gecko Toes and Their Optically Adhering Counterpart via arXiv
Similar to the mysterious clinging ability of geckoes

Today in crazy tricks of physics, a few researchers over at the University of Southampton in the U.K. have theorized that metamaterials ought to be able to generate a wholly new kind of force--something akin to the adhesive force created by gecko toes--that can be turned on and off optically with the throwing of a switch. That force ought to be strong enough to overcome the force of Earth's gravity, opening the door to a range of potential applications--if and when the actual force is found.

The fundamental force here is the same one that powers solar sails in space--the radiation pressure exerted by light on any surface it strikes. If you custom-construct a metamaterial to allow tiny oscillations of electrons--called plasmons--to exist on its surfaces, those plasmons should interact with the electrons in a nearby metal or dielectric surface. The resonant effect created in such a setup should, theoretically at least, pull the metamaterial and the object together.

Moreover, all of this can be controlled by light. Metamaterials--if you haven't been keeping up with this kind of science--are materials that have been engineered to have specific and controlled optical properties. So under such a setup as the Southampton team proposes, the frequency and intensity of a light source would initiate and then control the force of attraction. That basically means this new force can be switched on and off easily and quickly.

Naturally, applications for something like this abound, from the nano-scale up to the possibility of gecko-like adhesion for machinery (and perhaps for humans? is this what they were getting at in the Tom-Cruise-scales-the-Burj scene in Ghost Protocol?). But first, they have to find it. In their paper, the researchers say the force should be "easy to detect." We say get cracking then.

[Technology Review]

Cloud-Based Quantum Computing Will Allow Secure Calculation on Encrypted Bits

$
0
0
Entangled Qubits Clusters of entangled qubits allow remote quantum computing to be performed on a remote server, while keeping the contents and results hidden. EQUINOX GRAPHICS
Double-blinded by the light

When quantum computers eventually reach larger scales, they'll probably remain pretty precious resources, locked away in research institutions just like our classical supercomputers. So anyone who wants to perform quantum calculations will likely have to do it in the cloud, remotely accessing a quantum server somewhere else. A new double-blind cryptography method would ensure that these calculations remain secret. It uses the uncertain, unusual nature of quantum mechanics as a double advantage.

Imagine you're a developer and you have some code you'd like to run on a quantum computer. And imagine there's a quantum computer maker who says you can run your code. But you can't trust each other - you, the developer, don't want the computer maker to rip off your great code, and the computer builder doesn't want you to peep its breakthrough machine. This new system can satisfy both of you.

Stefanie Barz and colleagues at the University of Vienna's Center for Quantum Science and Technology prepared an experimental demonstration of a blind computing technique, and tested it with two well-known quantum computing algorithms.

Here's how it would work: You, the developer, prepare some quantum bits, in this case photons that have a polarity (vertical or horizontal) known only to you. Then you would send these to the remote quantum server. The computer would entangle the qubits with even more qubits, using a quantum entangling gate - but the computer wouldn't know the nature of the entangled states, just that they are in fact entangled. The server is "blind" to the entanglement state, and anyone tapping into the server would be blind, too.

Imagine the computer tries to snoop on the qubits and see their entanglement, which could then be used to extract the information they carry. You'd be able to tell, because of the laws of quantum mechanics. The cat is both dead and alive until you check whether it's dead or alive, and then it's one or the other. If your photon has a specific state, you'd be able to tell that it was spied upon.

Back to the entangled bits. The actual information processing takes place via a sequence of measurements on your qubits. These measurements would be directed by you, based on the particular states of each qubit (which, again, only you know). The quantum server would run the measurements and report the results to you. This is called measurement-based quantum computation. Then you'd be able to interpret the results, based on your knowledge of the qubits' initial states. To the computer - or any interceptor - the whole thing would look utterly random.

Since you know the entangled state on which the measurements were made, you can be certain whether the server really was a quantum computer. And you wouldn't have to disclose your algorithm, the input or even the output - it's perfectly secure, the researchers write in their paper, published online today in Science.

Blind quantum computation is more secure than classical blind computation, which relies on tactics like the backward factoring of prime numbers, said Vlatko Vedral, a researcher at the University of Oxford who wrote a Perspective piece explaining this finding.

"The double blindness is guaranteed by the laws of quantum physics, instead of the assumed difficulty of of computational tasks as in classical physics," Vedral writes.

The Vienna team argues their simulation is a potentially useful technique for future cloud-based quantum computing networks.

"Our experiment is a step toward unconditionally secure quantum computing in a client-server environment where the client's entire computation remains hidden, a functionality not known to be achievable in the classical world," they write.

Viewing all 20161 articles
Browse latest View live




Latest Images