Feeds

US Navy boffins invent aircraft-to-sub laser phone

Beam the noise

Secure remote control for conventional and virtual desktops

US Navy boffins say they have developed a method which could allow aircraft to communicate with submarines using frickin' laser beams.

Dr Ted Jones of the Naval Research Laboratory has developed methods of generating acoustic effects in water by firing laser pulses into it. According to the lab:

Optical properties of water can be manipulated with very intense laser light to act like a focusing lens... In addition, the slightly different colors of the laser can be arranged so that the pulse also compresses in time as it travels through water, further concentrating the light. Controlled underwater compression of optical pulses can be attained.

Apparently the NRL's cunning self-generated water lens and colour time-compression tech allows a laser beam to generate a tailored underwater "explosion of steam" which can emit a sonic pulse at 220 decibels - all without any hardware actually in the water at all. Jones and his fellow maritime boffins think that the laser beam could travel "many hundreds of meters through air" before generating its acoustic effects in the water.

This would allow a aircraft high above the sea to fire a laser downwards, generating sound pulses which could be received by underwater telephone gear aboard a submerged submarine. At present, communication with subs at depth generally requires the use of a floating buoy*.

Another possible application would be the generation of sonar pulses without the need to put active equipment into the water. Receivers would still need to be put into the sea to pick up the echoes - either lowered from a hovering helicopter or in dropped buoys - but such kit would be less complex and expensive than present-day gear which contains an emitter as well. It would also be harder for hostile sub commanders to locate their enemies.

According to the NRL, the new laser acoustics could also enhance the effectiveness of underwater active sonar. ®

*There is the option of very low-frequency radio sent from a large shore station, but this requires the sub to come fairly shallow and stream an antenna.

Next gen security for virtualised datacentres

More from The Register

next story
Vulture 2 takes a battering in 100km/h test run
Still in one piece, but we're going to need MORE POWER
TRIANGULAR orbits will help Rosetta to get up close with Comet 67P
Probe will be just 10km from Space Duck in October
Gigantic toothless 'DRAGONS' dominated Earth's early skies
Gummy pterosaurs outlived toothy competitors
Boffins ID freakish spine-smothered prehistoric critter: The CLAW gave it away
Bizarre-looking creature actually related to velvet worms
CRR-CRRRK, beep, beep: Mars space truck backs out of slippery sand trap
Curiosity finds new drilling target after course correction
'Leccy racer whacks petrols in Oz race
ELMOFO rakes in two wins in sanctioned race
What does a flashmob of 1,024 robots look like? Just like this
Sorry, Harvard, did you say kilobots or KILLER BOTS?
NASA's rock'n'roll shock: ROLLING STONE FOUND ON MARS
No sign of Ziggy Stardust and his band
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.