Feeds

Boffins develop greenhouse invisible to night-vision goggles

'Glass cloak' would show up on thermal imagers, though

SANS - Survey on application security programs

Boffins in the States say they have designed a "glass cloak" which renders objects within it invisible in the infrared spectrum.

Prof Elena Semouchkina and her colleagues developed the "cloak", which reportedly bends micron wavelengths around its interior. Micron-length waves are in the near infrared, the part of the electromagnetic spectrum used by ordinary night-vision goggles.

Previous invisibility cloak research has tended to focus on metallic "metamaterials", but Semouchkina and her colleagues' design calls for magnetic resonator metamaterial made of chalcogenide dielectric glass.

Regular metallic "cloaks", according to heavyweight invisibility prof Sir John Pendry, are not - or rather, will not be when visible-light versions are developed - actually flexible cloaks. Rather, they would be hefty rigid structures or cladding, more like a shed than any type of garment.

It appears that Semouchkina's chalcogenide glass is pretty rigid, too, so in fact here we're talking more about an invisible greenhouse or glass house than a cloak.

The invisible glass dwelling - doubtless featuring a glass ceiling of the type known to impede upwardly-mobile lady biz execs - would of course be perfectly perceptible to the naked eye. However it would be an ideal hiding place for people needing to elude enemies wearing regular near-infrared night-vision goggles, whether passive or active.

Sadly more up-to-date opponents using thermal imagers working in longer infrared wavelengths could detect it without too much difficulty: though one should note that human body heat can't normally penetrate glass, so the thermal-imager user would need to distinguish the invisible greenhouse by differentiating it from its background.

For now, though, the disappearing glass abode doesn't exist in the real world. Semouchkina and her colleagues verified the theory of in vitro vanishment in silico - that is, they ran some computer simulations rather than actually building their machine.

Their paper, An infrared invisibility cloak composed of glass, can be read here (abstract free, payment/subscription required for the full article). ®

Top three mobile application threats

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
Melting permafrost switches to nasty, high-gear methane release
Result? 'Way more carbon being released into the atmosphere as methane'
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.