• Smiths Detection shows active mm-wave detection system

    Passive mm-wave detection systems pick up the mm-wave heat energy emitted by the body, which is used as a background reference point; active systems transmit mm-wave into the detection area to boost the level of energy overall, give a better return and a more detailed image

  • Kansas wins $450 million biolab

    Kansas State University outlasted four other competitors to win the $450 million DHS National Bio- and Agro-Defense Facility

  • New car-stopper uses squids' tentacle-based approach

    Looking for an answer to stop fleeing cars or suicide trucks hurtling toward their target, an Arizona company developed a tentacle-based device that ensnares the vehicle and brings it to a halt

  • Researchers develop silent UAVs

    UAVs are used more and more in surveillance and operational roles on the battlefield — and by the police; the larger UAVs are very noisy, announcing their presence and allowing the adversary to hide or escape; Georgia Institute of Technology researchers work on equipping UAVs with a “whisper” mode

  • Pair behind Chinese counterfeit computer components arrested

    Two California men arrested for illegally exporting sensitive technology to China; pair also accused of conspiring to purchase counterfeit electronic components for distribution in the U.S.

  • Soft power: CIA funded first Russian edition of Dr. Zhivago

    The Soviet authorities banned Boris Pasternak’s “Dr. Zhivago” because of its critical treatment of the 1917 revolution; the manuscript was smuggled to the West and published — but to be considered for the Noble Prize, a work of fiction must be published in its original language; the CIA steps in to fund publishing the Russian version of the book (in Holland) — allowing the Noble Prize committee to award Pasternak, and embarrass the USSR

  • Experts watch for Conficker superworm to be activated

    Conficker has infected at least 9 million computers; security experts anxiously wait for it to be activated; infection dwarfs the zombie army created by the infamous Storm worm, which reached a mere 1 million at its peak in September 2007

  • ScanEagle offers and example of dual-use technology

    Initially developed to track dolphins and tuna from fishing boats in order to ensure “dolphin-safe” tuna in supermarkets, the ScanEagle UAV system has evolved into a mainstay with the U.S. Navy — and others as well

  • Top 7 alternative technologies to fossil fuel

    Energy expert says that an “all of the above” approach to the world’s energy problem is wrong; study shows wind and solar to be the most promising alternative technologies to fossil fuel; biofuel, clean coal, and nuclear power are do not hold such promise

  • Keeping water clean

    Researchers develop hydrogel material that can detect and remove contaminants in water; the hydrogel shrinks as it absorbs heavy metal pollutants, signaling the presence of cadmium and other toxic ions, even as it absorbs them from the contaminated water

  • U.K. military employs hovering droids in Afghanistan

    Hovering petrol-powered prowler patrols to check Afghan ambush alleys so soldiers do not have to; device may be used by law enforcement in urban areas — and future systems may carry weapons

  • The top 11 contaminants in U.S. drinking water

    U.S. citizens may upset to learn — should be upset to learn — that their drinking water contain disturbing amounts of pharmaceuticals and hormonally active chemicals; the concentrations are small, for now, but individuals with some health conditions should consult their physicians

  • Detecting rusted metal encased in concrete structures

    Many of the problems of aging infrastructure owe to rusting metal; trouble is, much of that metal is encased in concrete — in bridges, tunnels, dams, roads; new technology uses electromagnetic fields to measure corrosion through non-ferrous material

  • Software analyzes news reports to identify terrorists

    Rice University researchers develop artificial intelligence-based computer program which can scan news reports quickly to identify which terrorist group is behind a terrorist attack being covered in the reports

  • Israel uses new ISR systems, ordnance

    Advocates of air power were humbled in the 2006 Israel-Hezbollah war, but they hope to be vindicated in the Israel-Hamas conflict; Israel uses new ISR systems which shrink the sensor-to-shooter loop, and new bunker-busting ordnance