Feeds

Secret sub tech hints at spooks' TEMPEST-busting bugs

'Other UK gov parties' wanted details suppressed

Boost IT visibility and business value

Farnborough British boffins have devloped a cunning new method of transmitting high bandwidth data - plus power - through tough solid barriers such as submarine hulls or tank armour. The tech is being touted as a way of adding modifications to subs or armoured vehicles cheaply, but it seems that there are also other, highly secret, government applications.

BAE Systems' wireless through-hull comms demo at Farnborough 2010.

Through glass, submarine hulls... maybe through Faraday cages

The kit is being shown off here at the Farnborough airshow this week - Farnborough being a defence/weapons show as much as it is about aviation. The Reg got the chance to talk to Dr Lionel Kent, co-inventor of the new gear, about his brainchild. He had a demo rig set up, showing a video image being passed through a thick sheet of glass without wires.

"The glass is just to show we aren't cheating," said Kent's colleague Dr David Birkin. "No wires, you see - and it works just as well through a block of solid metal."

Not only does the kit pass data at reasonable-video bandwidth levels, the external end of the connection - the one which would be outside the sub's pressure hull or the tank's armour, or potentially inside a nuclear reactor core - is also powered wirelessly from the human-safe side.

"What's the point in avoiding the need to drill a hole for a data cable if you then have to drill one anyway for power?" asks Kent.

The ability to transmit power wirelessly has also been shown recently by researchers in the States, using magnetic fields oscillating at megahertz frequencies. We mentioned these to Dr Kent, but it seems that his kit is different.

"That approach is limited on bandwidth," he said. His and his colleagues' brainchild was developed at BAE Systems' Advanced Technology Centre beginning in 2006.

So how does it work, then?

"We can't tell you," says Kent. "Other parties have asked us not to make the details public."

Asked who these other parties might be, the two boffins refused to be drawn, though they did confirm that the request for secrecy came from within the UK government.

Seven Steps to Software Security

More from The Register

next story
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Google Nest, ARM, Samsung pull out Thread to strangle ZigBee
But there's a flaw in Google's IP-based IoT system
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.