US counter-terrorism technology
In the race to prevent similar attacks September 11, 2001, Washington brought the entire US system into action with countless unprecedented studies.
Federal investment for domestic defense research has reached nearly $ 4 million since 2003, but that's just a drop in total spending on security. DHS's budget (Homeland Security) this year alone is $ 40 billion, according to Maureen McCarthy, DHS's Director of Science and Technology Transfer.
The most important thing is the cost of pouring into the program that combines the previous sciences that are separate: software engineers, epidemiologists and biologists work together to develop technologies. protect the atmosphere and food against bioterrorism. Here are some of the most at risk areas of concern for the US to build technology for the next 5 years to protect:
Water, Air, Food reserves
One of the challenges in this area is to develop sensors that can detect risks from plants to climate control systems at every public space. The Environmental Protection Agency, partnering with the Centers for Disease Control and FBI, develops poison detection networks across 30 US cities as part of a $ 300 million program called BioWatch (Observation biological).
The device identifies explosives in seconds and is made of Nitrate.(Photo: CAND)
Special filtration systems will absorb all aerial toxins and then transfer them to the laboratory for analysis. The team of scientific experts at the Lawrence Livermore National Institute pushes the idea to go further with the autonomous pathogen detection system, or APDS for short.
Discovered after the sarin poison attack in the Tokyo subway line in 1995, ARPDS can identify all biochemical toxins without requiring researchers to collect samples every day. wait for the result.
Installed in the ventilation system of a large mall, tram station or crowded location, APDS can collect 178 air samples in a week without human intervention, and Then transfer all to the central lab. APDS has been tested in New York City and can be continued in other cities in 2008.
Border lines and infrastructure
Since 2004, about 60 million visitors to the US have been fingerprinted through optical scanning systems to collate information at the Washington DC Security Agency. According to DHS, US-VISIT Biometric Program worth 1.5 billion USD identified 1,100 people trying to infiltrate the United States with fake papers and over 20,000 suspicious immigrants. Optical scanning system can also scan iris (iris) and record voice.
System for detecting and detecting nuclear weapons in containers.(Photo: CAND)
At 100 US ports and border points are also equipped with a scanner called VACIS (Vehicle and Vehicle Inspection System), designed by the International Applied Science Group, which has the ability to control any Containers without having to open the door. VACIS uses low-energy gamma beams to penetrate both through the packaging and provide an image within 6 seconds. In addition, science is working on developing micron-sized sensors - called 'dust particles' - that are sprinkled around oil pipelines, unsupervised border points and factories to monitor intruders. or the release of biogas, chemical or radioactive.
Transport and Transportation
Sandia National Institute proposed the technology to connect wireless sensors or through optical fibers to a device that is as big as a shoe box called the Intelligent Sensor Module (ISM). The ISM network provides information for facility management or security agencies to alert early threats of terrorism. ISM is equipped for 30 areas, including sports stadiums, subway lines and airports, since 2004. Upcoming versions of ISM will be installed at nuclear and chemical facilities. as well as all transportation centers.
Technology of sniffing pathogens in public transport.(Photo: CAND)
In addition, a special $ 150,000 robot can blow out airflow on object clothing to detect explosive elements - it collects air and sends it to the detector to identify eight types of explosives made from nitrate. It all happens in seconds! Currently the prototyping scientific community detects traces of explosives at a distance of 10 meters.
Internet
A cyberattack attack on every national financial network or remote communication system is very dangerous. In response, a team of computer science experts from the Pacific Northwest National Institute (PNNL) in Richland, Washington, developed a program called Mozart to detect spies and illegal intruders. on every website with the intention of scouring sensitive national security information. Developers call it a 'similar tool to Google' that serves all military and government agencies at the end of 2006.
In the near future, the technology called 'Intrinsically Secure Computing' (ISC) - is basically a tool that helps computers 'understand when they are attacked to take necessary safeguard measures,' said Bryan McMillan, technical expert. in charge of PNNL's cyber security, explained. The implementation of ISC requires 10 years of work. However, according to experts, all technology measures that cost billions of dollars like that cannot reach 100% protection. Because machinery and equipment can be broken, and the top factor is always . people.
Dien San (synthesized)
- Russia develops mouse machines to counter terrorism
- Experimental anti-terrorism techniques
- Things to remember to survive terrorism
- The horrifying truths about the 9/11 terrorist attacks in the United States
- Use smartphone detection terrorism: 'Wolf alone' is about to lose ground
- See the nose to detect terrorism
- The new invention anti-terrorism and medical application
- Reading machine of terrorism
- Security experts warned of the risk of terrorism from the Internet
- Robot against terrorism, playing harp & X-ray detection
- Hazard from GPS jammer
- Counterfeit counterfeit technology