Submissions

Nano-scale Laser Amplifier Could Lead to Ultra-sensitive Radio Wave Detection

by
in science on (#3G7)
A recent Nature Podcast ( Radio Signals ) features a new type of optical amplifier which converts faint radio signals directly into laser light . The novel approach shows promise with greatly reduced noise and improved sensitivity.
Radio waves are used for many measurements and applications, for example, in communication with mobile phones, MRI scans, scientific experiments and cosmic observations. But 'noise' in the detector of the measuring instrument limits how sensitive and precise the measurements can be. Now researchers at the Niels Bohr Institute have developed a new method where they can avoid noise by means of laser light and can therefore achieve extreme precision of measurements.

We have developed a detector that does not need to be cooled down, but which can operate at room temperature and yet hardly has any thermal noise. The only noise that fundamentally remains is so-called quantum noise, which is the minimal fluctuations of the laser light itself. ... This membrane is an extremely good oscillator and that is why it is so ultrasensitive. At room temperature, it works as effectively as if it was cooled down to minus 271 C and we are working to get it even closer to minus 273 degrees C, which is the absolute minimum. In addition, it is a huge advantage to use optical detection, as instead of using ordinary copper wires to transmit the signal, you can use fiber optic cables, where there is no energy loss, explains Eugene Polzik, Professor and Head of the research center Quantop at the Niels Bohr Institute at the University of Copenhagen.
Could this be the start of a new era of ultra-sensitive devices, or low-cost/high energy technology?

NSA Programs for Infecting Millions of Computers with Malware and Targeting Sys Admins

by
in security on (#3FR)
story imageNew Snowden related documents and an article by Glenn Greenwald reveal National Security Agency programs for hacking and infecting computers on a mass scale using automated systems. The attacks are not just targeted against suspects or "persons of interest", but also against third-parties people who maintain network and computing infrastructure.
By hacking an administrator's computer, the agency can gain covert access to communications that are processed by his company. Sys admins are a means to an end, the NSA operative writes.
The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system - codenamed TURBINE - is designed to allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.
1