Feeds

Cig-lighter electropulse cannons offered to US plods

Cold dead turkey strangely incapable of flight

Secure remote control for conventional and virtual desktops

Electromagnetic weapons designed to zap circuitry have long been a favourite speculation of war-tech buffs. Consensus opinion suggests that the only energy source capable of powering a useful pulse strike is a nuclear explosion, or perhaps in the near future a largish conventional bomb. But a recent report in MIT Tech Review suggests that actually it can be done with a car alternator.

The Tech Review piece introduces us to Eureka Aerospace and its High power Electromagnetic System (HPEMS) tech, now being touted as a good idea for police in high speed chases. Apparently, a 200lb, six by three foot HPEMS module can "be attached to an automobile or aircraft carrier" (though the aircraft-carrier option might be a tad unwieldy on the freeway). It works like this:

The car's alternator serves as the system's power source [cool! You just plug it into the cigarette lighter socket, presumably]... pulses are amplified to 640 kilovolts using a 16-stage Marx generator... then converted into microwaves using... a pair of coupled transmission lines and several spark-gap switches. Finally, a specially designed antenna beams the microwave energy toward an opposing vehicle...

The microwaves get into the fleeing villains' engine compartment through some kind of unspecified gap in the metal that would typically surround it, and zap all the microcircuitry, so shutting the motor down.

Tech Review notes that this might cause some snags by frying innocent people's stuff in a crowded urban environment, but otherwise it seems to assume that the idea is a flyer.

In fact, all the signs of a tech turkey are there. The obvious customer - the US military* - funded initial research and then gave up some time ago. Even the company doesn't claim effective range greater than 15 metres, so a pursuing cop would have to get well inside safe stopping distance behind a fleeing car - just before forcing it to stop suddenly. All tests thus far have been on stationary target vehicles. The only way of aiming the directional beam is by aiming the car. Years have gone by and nothing much has changed.

Nope - this thing's a gobbler, and a cold dead one at that. The MIT tech scribes seem to have slipped up here. ®

*A mysterious outfit called the "U.S. Marine Corp [sic]" is referred to twice.

Remote control for virtualized desktops

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.