Feeds

Earthquake-squelching, sonar-invisible 'active cloak' unfurled

Will you just shut up about f*ing Harry Potter, pleads prof

SANS - Survey on application security programs

Boffins in America have violated every rule of Invisibility Club by stating that their astounding new "active cloaking" research has nothing to do with Harry Potter or Star Trek.

"It's a brand new method of cloaking," says Utah Uni maths prof Graeme Milton.

"Real objects could be cloaked. It's called active cloaking, which means it uses devices that actively generate electromagnetic fields rather than being composed of 'metamaterials' [exotic metallic substances] that passively shield objects from passing electromagnetic waves."

Evidently worried about being lumped in with attention-seeking metamaterials boffins, university spokespersons testily (and probably futilely) insist that "This is not a 'Star Trek' or 'Harry Potter' story". They also provide this rather nifty vid showing how the "active cloak" functions.

According to Milton, the method isn't applicable to visible light as it requires the use of unfeasibly small active emitters. Even if these could be built, it would only be possible to cloak very very small things.

"It is very difficult to build antennas the size of light waves," says the prof. "We're so far from cloaking real-sized objects to visible light that it's incredible."

However, he says that with longer wavelengths the technique becomes practical. Microwave active cloaks could hide things from radar; sonic ones could make submarines disappear from active sonar. Destructive ocean waves could perhaps be nullified, even - Milton thinks - to the extent of squelching tsunamis before they hit the beach.

"It would be wonderful if you could cloak buildings against earthquakes," Milton adds. "That's on the borderline of what's possible ... even if it's not going to result in a 'Harry Potter' cloak, it will have spinoffs in other directions."

As ever, there are a few little issues to sort out before the kit goes mainstream. For one, the cloaking machinery would need to know all about the incoming waves before it could nullify them, probably requiring some kind of remote sensors in the case of the tsunamis, earthquakes and so on.

Meanwhile there are scholarly papers for those interested, in the journals Optics Express and Physical Review Letters. ®

3 Big data security analytics techniques

More from The Register

next story
So, just how do you say 'the mutt's nuts' in French?
Vital linguistic question interrupts LOHAN spaceplane mission
95 floors in 43 SECONDS: Hitachi's new ultra-high-speed lift
Guangzhou skyscraper denizens to hold on to hats
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
STEALTHY NANOROBOTS dress up as viruses, prepare to sneak into YOUR BODY
Cloaking techniques nicked from viruses tackle roadblocks on way to medical frontier
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.