SlideShare a Scribd company logo
The 'unjammable' quantum radar that could
render ALL stealth planes useless
U.S. researchers have employed the quantum properties of photons to create an unjammable
radar signal.

Conventional radar is vulnerable to a range of technologies, ranging from dropping chaff to
create false reflections to drowning the radar frequency with noise.

More sophisticated radar can deal with such ploys, but the most sophisticated radar jammers are
able to intercept the the signals and send back false information.




A U.S. Air Force B-2A stealth bomber: Researchers have managed to develop a new kind of
radar that is able to see through the counter-measures deployed as a ruse to fool anti-aircraft
systems

However, a team from the University of Rochester, New York have shown how the quantum
properties of photons can be used to outsmart this advanced stealth technology.

The new radar concept relies on the fact that any attempt to measure a photon always destroys its
quantum properties, MIT's Technology Review explains.
Physicists have exploited the quantum properties of photons to create the first imaging system
that is unjammable




Schematic of the quantum-secured radar: If a stealth aircraft attempts to intercept the photons and
resend them in a way that disguises its position, it would inevitably change the photons' quantum
properties




Jamming radar signals is an increasingly sophisticated affair. There are various techniques such
as drowning the radar frequency with noise or dropping chaff to create a false reflection. But the
most advanced radar systems can get around these ruses.

So a more sophisticated idea is to intercept the radar signal and modify it in a way that gives
false information about the target before sending it back. That’s much harder to outsmart.

But today, Mehul Malik and pals at the University of Rochester in New York state demonstrate a
way to do it.

These guys base their technique on the quantum properties of photons and in particular on the
fact that any attempt to measure a photon always destroys its quantum properties.

So their idea is to use polarised photons to detect and image objects. Reflected photons can of
course be used to build up an image of the object. But an adversary could intercept these photons
and resend them in a way that disguises the object’s shape or makes it look as if it is elsewhere.
However, such a process would always change the quantum properties of the photons such as
their polarisation. And so it should always be possible to detect such interference. “In order to
jam our imaging system, the object must disturb the delicate quantum state of the imaging
photons, thus introducing statistical errors that reveal its activity,” say Malik and co.

That’s more or less exactly how quantum key distribution for cryptography works. The idea here
is that any eavesdropper would change the quantum properties of the key and so reveal his or her
presence. The only difference in the quantum imaging scenario is that the “message” is sent and
received by the same person.

Malik and co have tested their idea by bouncing photons off an aeroplane-shaped target and
measuring the polarisation error rate in the return signal. Without any eavesdropping the system
easily imaged the aeroplane.

But when an adversary intercepted the photons and modified them to send back an image of a
bird, the interference was easy to spot, say Malik and co.

That’s an impressive demonstration of the first imaging system that is unjammable thanks to
quantum mechanics.

That’s not to say the technique is perfect. It suffers from the same limitations that plague early
quantum cryptographic systems, which are theoretically secure but crackable in practice.

For example, instead of sending single photons, the quantum imaging system sends photon
pulses which contain several photons. One or more of these can easily be siphoned away and
analysed by an adversary without anybody else being any the wiser.

However, there are an increasingly wide range of fixes for these problems for quantum key
distribution that could help make this quantum imaging system more secure.

Perhaps best of all, this kind of system could easily be put to work now. The techniques are well
known and widely used in optics labs all over the world. So there’s no reason, this security
cannot be added relatively quickly and cheaply to existing imaging systems.

Ref: arxiv.org/abs/1212.2605: Quantum-Secured Imaging

The technology works in a similar way to quantum key distribution for cryptography, where any
eavesdropper would change the quantum properties of the key by listening in, revealing his or
her presence.

Mehul Malik, who led the team that carried out the research at Rochester's Institute of Optics,
tested the concept by bouncing photons off a stealth bomber-shaped target and measuring the
return signal's polarisation error rate.
The system easily imaged the war plane without any eavesdropping, but when the adversary
intercepted the signal and modified it to send back the image of a bird, the radar was easily able
to see through the ruse.




No fooling us: When there is no jamming attack, the received image faithfully reproduces the
actual object, shown left. If the target attempts to send a 'spoof' image like the one on the right,
the imaging system can detect the presence of the jamming attack, because of the large error rate
in the received polarization

However, the researchers admit that their novel radar system is still not perfect. As MIT's
blogger explains, it suffers from the same limitations that plagued early quantum cryptographic
systems.

The quantum radar sends photons in pulses that contain several of the quantum particles, one or
more of which could be easily siphoned away and replicated to tune the signal sent back to the
same state as the one sent.

'Further, a sophisticated jammer may use quantum teleportation to teleport the polarisation state
of our querying photons onto photons carrying false position or time information,' says the study.

However, while the equipment needed to carry out such sophisticated jamming is readily
available in labs worldwide, it is not thought yet to be deployed by the military.

More Related Content

What's hot

Radiation Protection Course For Orthopedic Specialists: Lecture 1 of 4: Intro...
Radiation Protection Course For Orthopedic Specialists: Lecture 1 of 4: Intro...Radiation Protection Course For Orthopedic Specialists: Lecture 1 of 4: Intro...
Radiation Protection Course For Orthopedic Specialists: Lecture 1 of 4: Intro...
Amin Amin
 
fundamentals of optical fiber
fundamentals of optical fiberfundamentals of optical fiber
fundamentals of optical fiber
Praveen Vaidya
 
ICRU 83
ICRU 83ICRU 83
Understanding Radiation Units and Quantities, MDIRT Nchanji Nkeh Keneth
Understanding Radiation Units and Quantities, MDIRT Nchanji Nkeh KenethUnderstanding Radiation Units and Quantities, MDIRT Nchanji Nkeh Keneth
Understanding Radiation Units and Quantities, MDIRT Nchanji Nkeh Keneth
Nchanji Nkeh Keneth
 
radIATION UNITS
radIATION UNITS radIATION UNITS
radIATION UNITS
SAlonii Chawla
 
Icru 71 electrons
Icru 71 electrons Icru 71 electrons
Icru 71 electrons
Ashutosh Mukherji
 
Radiation detection and measurement
Radiation detection and measurement Radiation detection and measurement
Radiation detection and measurement
Shahid Younas
 
OSLD Prsentation
OSLD PrsentationOSLD Prsentation
OSLD Prsentation
sa'ad attwneh
 
Ppt on radiation protection 01 final
Ppt on radiation protection 01 finalPpt on radiation protection 01 final
Ppt on radiation protection 01 final
Kajal Jha
 
Nuclear medicine scan.ppt
Nuclear medicine scan.pptNuclear medicine scan.ppt
Nuclear medicine scan.ppt
عبدالله فهد
 
Spect technology
Spect technologySpect technology
Spect technology
PRADEEP Cheekatla
 
Radiotherapy Equipment
Radiotherapy EquipmentRadiotherapy Equipment
Radiotherapy Equipment
Nik Noor Ashikin Nik Ab Razak
 
Dosimetry
DosimetryDosimetry
Dosimetry
studious girl
 
RT10_EBT3c_GoodPractice_Planning.ppt
RT10_EBT3c_GoodPractice_Planning.pptRT10_EBT3c_GoodPractice_Planning.ppt
RT10_EBT3c_GoodPractice_Planning.ppt
HindElamin
 
Basics And Physics of Brachytherapy
Basics And Physics of BrachytherapyBasics And Physics of Brachytherapy
Basics And Physics of Brachytherapy
Sreekanth Nallam
 
Icrp60
Icrp60Icrp60
Icrp60
Sabari Kumar
 
Measurement of Radiation (Thimble Ionization Chamber, Free air Ionization Cha...
Measurement of Radiation (Thimble Ionization Chamber, Free air Ionization Cha...Measurement of Radiation (Thimble Ionization Chamber, Free air Ionization Cha...
Measurement of Radiation (Thimble Ionization Chamber, Free air Ionization Cha...
Upakar Paudel
 
Positron emission tomography
Positron emission tomographyPositron emission tomography
Positron emission tomography
Dr. Pradeep chaurasia
 
Brachytherapy permanent seed implant
Brachytherapy permanent seed implantBrachytherapy permanent seed implant
Brachytherapy permanent seed implant
althaf jouhar
 
Interaction of radiation with Matter - Dr. Vandana
Interaction of radiation with Matter -  Dr. VandanaInteraction of radiation with Matter -  Dr. Vandana
Interaction of radiation with Matter - Dr. Vandana
Dr Vandana Singh Kushwaha
 

What's hot (20)

Radiation Protection Course For Orthopedic Specialists: Lecture 1 of 4: Intro...
Radiation Protection Course For Orthopedic Specialists: Lecture 1 of 4: Intro...Radiation Protection Course For Orthopedic Specialists: Lecture 1 of 4: Intro...
Radiation Protection Course For Orthopedic Specialists: Lecture 1 of 4: Intro...
 
fundamentals of optical fiber
fundamentals of optical fiberfundamentals of optical fiber
fundamentals of optical fiber
 
ICRU 83
ICRU 83ICRU 83
ICRU 83
 
Understanding Radiation Units and Quantities, MDIRT Nchanji Nkeh Keneth
Understanding Radiation Units and Quantities, MDIRT Nchanji Nkeh KenethUnderstanding Radiation Units and Quantities, MDIRT Nchanji Nkeh Keneth
Understanding Radiation Units and Quantities, MDIRT Nchanji Nkeh Keneth
 
radIATION UNITS
radIATION UNITS radIATION UNITS
radIATION UNITS
 
Icru 71 electrons
Icru 71 electrons Icru 71 electrons
Icru 71 electrons
 
Radiation detection and measurement
Radiation detection and measurement Radiation detection and measurement
Radiation detection and measurement
 
OSLD Prsentation
OSLD PrsentationOSLD Prsentation
OSLD Prsentation
 
Ppt on radiation protection 01 final
Ppt on radiation protection 01 finalPpt on radiation protection 01 final
Ppt on radiation protection 01 final
 
Nuclear medicine scan.ppt
Nuclear medicine scan.pptNuclear medicine scan.ppt
Nuclear medicine scan.ppt
 
Spect technology
Spect technologySpect technology
Spect technology
 
Radiotherapy Equipment
Radiotherapy EquipmentRadiotherapy Equipment
Radiotherapy Equipment
 
Dosimetry
DosimetryDosimetry
Dosimetry
 
RT10_EBT3c_GoodPractice_Planning.ppt
RT10_EBT3c_GoodPractice_Planning.pptRT10_EBT3c_GoodPractice_Planning.ppt
RT10_EBT3c_GoodPractice_Planning.ppt
 
Basics And Physics of Brachytherapy
Basics And Physics of BrachytherapyBasics And Physics of Brachytherapy
Basics And Physics of Brachytherapy
 
Icrp60
Icrp60Icrp60
Icrp60
 
Measurement of Radiation (Thimble Ionization Chamber, Free air Ionization Cha...
Measurement of Radiation (Thimble Ionization Chamber, Free air Ionization Cha...Measurement of Radiation (Thimble Ionization Chamber, Free air Ionization Cha...
Measurement of Radiation (Thimble Ionization Chamber, Free air Ionization Cha...
 
Positron emission tomography
Positron emission tomographyPositron emission tomography
Positron emission tomography
 
Brachytherapy permanent seed implant
Brachytherapy permanent seed implantBrachytherapy permanent seed implant
Brachytherapy permanent seed implant
 
Interaction of radiation with Matter - Dr. Vandana
Interaction of radiation with Matter -  Dr. VandanaInteraction of radiation with Matter -  Dr. Vandana
Interaction of radiation with Matter - Dr. Vandana
 

Viewers also liked

Stealth technology
Stealth technologyStealth technology
Stealth technology
nitin7365
 
Presentation on stealth technology
Presentation on stealth technologyPresentation on stealth technology
Presentation on stealth technology
amtul muneeb
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
Heather Brooks
 
stealth technology
stealth technologystealth technology
stealth technology
Santosh Santu
 
A Lotof Much Many A Little A Few
A Lotof Much Many A Little A FewA Lotof Much Many A Little A Few
A Lotof Much Many A Little A Few
Hasan Ege
 
Stealth aircraft technology ppt
Stealth aircraft technology pptStealth aircraft technology ppt
Stealth aircraft technology ppt
Hanim MS
 
Ece ppt[1]
Ece ppt[1]Ece ppt[1]
Ece ppt[1]
Chirag Agarwal
 
Network Effects
Network EffectsNetwork Effects
Network Effects
a16z
 

Viewers also liked (8)

Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Presentation on stealth technology
Presentation on stealth technologyPresentation on stealth technology
Presentation on stealth technology
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
stealth technology
stealth technologystealth technology
stealth technology
 
A Lotof Much Many A Little A Few
A Lotof Much Many A Little A FewA Lotof Much Many A Little A Few
A Lotof Much Many A Little A Few
 
Stealth aircraft technology ppt
Stealth aircraft technology pptStealth aircraft technology ppt
Stealth aircraft technology ppt
 
Ece ppt[1]
Ece ppt[1]Ece ppt[1]
Ece ppt[1]
 
Network Effects
Network EffectsNetwork Effects
Network Effects
 

Similar to The 'unjammable' quantum radar

AI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in AstrophysicsAI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
IRJET Journal
 
Ai covers space
Ai covers spaceAi covers space
Ai covers space
venkatvajradhar1
 
Few Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the worldFew Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the world
Home
 
上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱
algous
 
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
csandit
 
November 30, Projects
November 30, ProjectsNovember 30, Projects
November 30, Projects
University of Colorado at Boulder
 
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsSelf-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Tahoe Silicon Mountain
 
Artificial intelligence in space exploration venkat vajradhar - medium
Artificial intelligence in space exploration   venkat vajradhar - mediumArtificial intelligence in space exploration   venkat vajradhar - medium
Artificial intelligence in space exploration venkat vajradhar - medium
venkatvajradhar1
 
Quantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUBQuantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUB
Nusrat Mary
 
Quantum-Pi_Cairo-09
Quantum-Pi_Cairo-09Quantum-Pi_Cairo-09
Quantum-Pi_Cairo-09
Marek Michalewicz
 
Jermaine Taylor Presentation
Jermaine Taylor PresentationJermaine Taylor Presentation
1047 bae[1]
1047 bae[1]1047 bae[1]
1047 bae[1]
Clifford Stone
 
637126main stysley presentation
637126main stysley presentation637126main stysley presentation
637126main stysley presentation
Clifford Stone
 
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training AlgorithmsExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
IRJET Journal
 
MRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptxMRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptx
Rohit Bansal
 
1914 1917
1914 19171914 1917
1914 1917
Editor IJARCET
 
1914 1917
1914 19171914 1917
1914 1917
Editor IJARCET
 
Quantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems onesQuantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems ones
Orchidea Maria Lecian
 
Mumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersMumma_Radar_Lab_Posters
Mumma_Radar_Lab_Posters
Dr. Ali Nassib
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Julien33x
 

Similar to The 'unjammable' quantum radar (20)

AI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in AstrophysicsAI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
AI-Enabled Black Hole Detection and Deflection: A New Frontier in Astrophysics
 
Ai covers space
Ai covers spaceAi covers space
Ai covers space
 
Few Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the worldFew Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the world
 
上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱上海必和 Al-tech-mag0808超光谱高光谱多光谱
上海必和 Al-tech-mag0808超光谱高光谱多光谱
 
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
ASTRONOMICAL OBJECTS DETECTION IN CELESTIAL BODIES USING COMPUTER VISION ALGO...
 
November 30, Projects
November 30, ProjectsNovember 30, Projects
November 30, Projects
 
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsSelf-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
 
Artificial intelligence in space exploration venkat vajradhar - medium
Artificial intelligence in space exploration   venkat vajradhar - mediumArtificial intelligence in space exploration   venkat vajradhar - medium
Artificial intelligence in space exploration venkat vajradhar - medium
 
Quantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUBQuantum Dots_MEEE_AIUB
Quantum Dots_MEEE_AIUB
 
Quantum-Pi_Cairo-09
Quantum-Pi_Cairo-09Quantum-Pi_Cairo-09
Quantum-Pi_Cairo-09
 
Jermaine Taylor Presentation
Jermaine Taylor PresentationJermaine Taylor Presentation
Jermaine Taylor Presentation
 
1047 bae[1]
1047 bae[1]1047 bae[1]
1047 bae[1]
 
637126main stysley presentation
637126main stysley presentation637126main stysley presentation
637126main stysley presentation
 
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training AlgorithmsExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
ExoSGAN and ExoACGAN: Exoplanet Detection using Adversarial Training Algorithms
 
MRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptxMRI EQUIPMENTS.pptx
MRI EQUIPMENTS.pptx
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
Quantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems onesQuantum-systems investigations vs optical-systems ones
Quantum-systems investigations vs optical-systems ones
 
Mumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersMumma_Radar_Lab_Posters
Mumma_Radar_Lab_Posters
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 

More from Mustakeem Chaudhri

Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson
Mustakeem Chaudhri
 
13 satanic bloodlines
13 satanic bloodlines13 satanic bloodlines
13 satanic bloodlines
Mustakeem Chaudhri
 
The great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying americaThe great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying america
Mustakeem Chaudhri
 
Doomsday seed vault
Doomsday seed vaultDoomsday seed vault
Doomsday seed vault
Mustakeem Chaudhri
 
Meet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynastyMeet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynasty
Mustakeem Chaudhri
 
Richest monarchs and royals of the world
Richest monarchs and royals of the worldRichest monarchs and royals of the world
Richest monarchs and royals of the world
Mustakeem Chaudhri
 
Clock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecyClock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecy
Mustakeem Chaudhri
 
Two underground nwo bases destroyed
Two underground nwo bases destroyedTwo underground nwo bases destroyed
Two underground nwo bases destroyed
Mustakeem Chaudhri
 
The illuminati explained rothschild family
The illuminati explained rothschild familyThe illuminati explained rothschild family
The illuminati explained rothschild family
Mustakeem Chaudhri
 
15 most impenetrable bank vaults
15 most impenetrable bank vaults15 most impenetrable bank vaults
15 most impenetrable bank vaults
Mustakeem Chaudhri
 
Thirty little known facts about america
Thirty little known facts about americaThirty little known facts about america
Thirty little known facts about america
Mustakeem Chaudhri
 
List of the rothschild owned central banks of the world
List of the rothschild owned central banks of the worldList of the rothschild owned central banks of the world
List of the rothschild owned central banks of the world
Mustakeem Chaudhri
 
The great culling has begun (active since 1974)
The great culling has begun (active since 1974)The great culling has begun (active since 1974)
The great culling has begun (active since 1974)
Mustakeem Chaudhri
 
1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan
Mustakeem Chaudhri
 
Secrets illuminism in the ozarks
Secrets illuminism in the ozarksSecrets illuminism in the ozarks
Secrets illuminism in the ozarks
Mustakeem Chaudhri
 
Where will you be if the world does end on december 21
Where will you be if the world does end on december 21Where will you be if the world does end on december 21
Where will you be if the world does end on december 21
Mustakeem Chaudhri
 
5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...
Mustakeem Chaudhri
 
Meet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all timeMeet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all time
Mustakeem Chaudhri
 
Israel has nuclear weapons
Israel has nuclear weaponsIsrael has nuclear weapons
Israel has nuclear weapons
Mustakeem Chaudhri
 

More from Mustakeem Chaudhri (20)

Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson Why bbc sacked Jeremy Clarkson
Why bbc sacked Jeremy Clarkson
 
13 satanic bloodlines
13 satanic bloodlines13 satanic bloodlines
13 satanic bloodlines
 
The great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying americaThe great bank robbery how the federal reserve is destroying america
The great bank robbery how the federal reserve is destroying america
 
Doomsday seed vault
Doomsday seed vaultDoomsday seed vault
Doomsday seed vault
 
Meet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynastyMeet the remaining heirs of the legendary rothschild dynasty
Meet the remaining heirs of the legendary rothschild dynasty
 
Jews origin (Rothschild)
Jews origin (Rothschild)Jews origin (Rothschild)
Jews origin (Rothschild)
 
Richest monarchs and royals of the world
Richest monarchs and royals of the worldRichest monarchs and royals of the world
Richest monarchs and royals of the world
 
Clock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecyClock ticks on swiss banking secrecy
Clock ticks on swiss banking secrecy
 
Two underground nwo bases destroyed
Two underground nwo bases destroyedTwo underground nwo bases destroyed
Two underground nwo bases destroyed
 
The illuminati explained rothschild family
The illuminati explained rothschild familyThe illuminati explained rothschild family
The illuminati explained rothschild family
 
15 most impenetrable bank vaults
15 most impenetrable bank vaults15 most impenetrable bank vaults
15 most impenetrable bank vaults
 
Thirty little known facts about america
Thirty little known facts about americaThirty little known facts about america
Thirty little known facts about america
 
List of the rothschild owned central banks of the world
List of the rothschild owned central banks of the worldList of the rothschild owned central banks of the world
List of the rothschild owned central banks of the world
 
The great culling has begun (active since 1974)
The great culling has begun (active since 1974)The great culling has begun (active since 1974)
The great culling has begun (active since 1974)
 
1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan1 trillion dollars of lithium in afghanistan
1 trillion dollars of lithium in afghanistan
 
Secrets illuminism in the ozarks
Secrets illuminism in the ozarksSecrets illuminism in the ozarks
Secrets illuminism in the ozarks
 
Where will you be if the world does end on december 21
Where will you be if the world does end on december 21Where will you be if the world does end on december 21
Where will you be if the world does end on december 21
 
5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...5 reasons why gold will unfortunately be worthless after the collapse of the ...
5 reasons why gold will unfortunately be worthless after the collapse of the ...
 
Meet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all timeMeet the 14th century african king who was richest man in the world of all time
Meet the 14th century african king who was richest man in the world of all time
 
Israel has nuclear weapons
Israel has nuclear weaponsIsrael has nuclear weapons
Israel has nuclear weapons
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

The 'unjammable' quantum radar

  • 1. The 'unjammable' quantum radar that could render ALL stealth planes useless U.S. researchers have employed the quantum properties of photons to create an unjammable radar signal. Conventional radar is vulnerable to a range of technologies, ranging from dropping chaff to create false reflections to drowning the radar frequency with noise. More sophisticated radar can deal with such ploys, but the most sophisticated radar jammers are able to intercept the the signals and send back false information. A U.S. Air Force B-2A stealth bomber: Researchers have managed to develop a new kind of radar that is able to see through the counter-measures deployed as a ruse to fool anti-aircraft systems However, a team from the University of Rochester, New York have shown how the quantum properties of photons can be used to outsmart this advanced stealth technology. The new radar concept relies on the fact that any attempt to measure a photon always destroys its quantum properties, MIT's Technology Review explains.
  • 2. Physicists have exploited the quantum properties of photons to create the first imaging system that is unjammable Schematic of the quantum-secured radar: If a stealth aircraft attempts to intercept the photons and resend them in a way that disguises its position, it would inevitably change the photons' quantum properties Jamming radar signals is an increasingly sophisticated affair. There are various techniques such as drowning the radar frequency with noise or dropping chaff to create a false reflection. But the most advanced radar systems can get around these ruses. So a more sophisticated idea is to intercept the radar signal and modify it in a way that gives false information about the target before sending it back. That’s much harder to outsmart. But today, Mehul Malik and pals at the University of Rochester in New York state demonstrate a way to do it. These guys base their technique on the quantum properties of photons and in particular on the fact that any attempt to measure a photon always destroys its quantum properties. So their idea is to use polarised photons to detect and image objects. Reflected photons can of course be used to build up an image of the object. But an adversary could intercept these photons and resend them in a way that disguises the object’s shape or makes it look as if it is elsewhere.
  • 3. However, such a process would always change the quantum properties of the photons such as their polarisation. And so it should always be possible to detect such interference. “In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity,” say Malik and co. That’s more or less exactly how quantum key distribution for cryptography works. The idea here is that any eavesdropper would change the quantum properties of the key and so reveal his or her presence. The only difference in the quantum imaging scenario is that the “message” is sent and received by the same person. Malik and co have tested their idea by bouncing photons off an aeroplane-shaped target and measuring the polarisation error rate in the return signal. Without any eavesdropping the system easily imaged the aeroplane. But when an adversary intercepted the photons and modified them to send back an image of a bird, the interference was easy to spot, say Malik and co. That’s an impressive demonstration of the first imaging system that is unjammable thanks to quantum mechanics. That’s not to say the technique is perfect. It suffers from the same limitations that plague early quantum cryptographic systems, which are theoretically secure but crackable in practice. For example, instead of sending single photons, the quantum imaging system sends photon pulses which contain several photons. One or more of these can easily be siphoned away and analysed by an adversary without anybody else being any the wiser. However, there are an increasingly wide range of fixes for these problems for quantum key distribution that could help make this quantum imaging system more secure. Perhaps best of all, this kind of system could easily be put to work now. The techniques are well known and widely used in optics labs all over the world. So there’s no reason, this security cannot be added relatively quickly and cheaply to existing imaging systems. Ref: arxiv.org/abs/1212.2605: Quantum-Secured Imaging The technology works in a similar way to quantum key distribution for cryptography, where any eavesdropper would change the quantum properties of the key by listening in, revealing his or her presence. Mehul Malik, who led the team that carried out the research at Rochester's Institute of Optics, tested the concept by bouncing photons off a stealth bomber-shaped target and measuring the return signal's polarisation error rate.
  • 4. The system easily imaged the war plane without any eavesdropping, but when the adversary intercepted the signal and modified it to send back the image of a bird, the radar was easily able to see through the ruse. No fooling us: When there is no jamming attack, the received image faithfully reproduces the actual object, shown left. If the target attempts to send a 'spoof' image like the one on the right, the imaging system can detect the presence of the jamming attack, because of the large error rate in the received polarization However, the researchers admit that their novel radar system is still not perfect. As MIT's blogger explains, it suffers from the same limitations that plagued early quantum cryptographic systems. The quantum radar sends photons in pulses that contain several of the quantum particles, one or more of which could be easily siphoned away and replicated to tune the signal sent back to the same state as the one sent. 'Further, a sophisticated jammer may use quantum teleportation to teleport the polarisation state of our querying photons onto photons carrying false position or time information,' says the study. However, while the equipment needed to carry out such sophisticated jamming is readily available in labs worldwide, it is not thought yet to be deployed by the military.