Feeds

Boffins demo time-warp cloaking device

New tool for hackers

The Power of One Infographic

A team of scientists at Cornell University in the US has demonstrated a way to bend light in such a way that it effectively hides an event from happening – what they call a "spatio-temporal cloaking" scheme.

The team, which is funded by DARPA, has built on work by Imperial College London, which showed that it was theoretically possible to split light and hide actions in the ensuing invisible area.

In a paper published in Nature, the Cornell team demonstrated the principle for the first time – albeit for only 40 trillionths of a second.

“This approach is based on accelerating the front part of a probe light beam and slowing down its rear part to create a well controlled temporal gap – inside which an event occurs – such that the probe beam is not modified in any way by the event,” the team writes. “The probe beam is then restored to its original form by the reverse manipulation of the dispersion. These results are a significant step towards the development of full spatio-temporal cloaking.”

Bending light for time masking

Light bending opens time hole

If the period of time during which the effect can be achieved is extended, the system may provide a new way for computer networks to be monitored and attacked. The team estimates the effect could be stretched to a single second, long enough to allow code injection, most effectively in a quantum-computing system. One catch: the machinery needed to accomplish this feat using their current scheme would have to be 18,600 miles long.

This may well be the case, but the team has taken barely a year after the original 2010 discovery of the phenomenon to come up with a functioning device – much faster than the originators expected. Given the steady progress that technology has made in advancing efficiencies of existing techniques, the time-cloaking device could be in operation a lot sooner than we think. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
MARS NEEDS OCEANS to support life - and so do exoplanets
Just being in the Goldilocks zone doesn't mean there'll be anyone to eat the porridge
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Diary note: Pluto's close-up is a year from … now!
New Horizons is less than a year from the dwarf planet
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.