Search This Blog

Friday, February 10, 2012

UK Report Suggests Soldiers Could One Day Plug Their Weapons Right Into Their Brains



Dangerous-sounding neuroscience
Where the Metal Meets the Mind A new report from the UK's Royal Society suggest several ways neuroscience can be leveraged to enhance defense technologies--including via weapons that meld with the mind. JanneM via Flickr
A group of forward-thinking military scientists want to plug soldiers’ weapons directly into their brains, and this time DARPA is nowhere to be found. The Royal Society, the UK’s national academy of scientific thought, issued a report today on the applications of neuroscience in the military and law enforcement contexts. Discussed therein: new performance-enhancing designer drugs, brain stimulation to boost brain function, and weapons systems that plug directly into the brain.
The wide-ranging document reportedly covers a lot of ground, including the ethical issues surrounding the use of neuroscience in defense. It seems to focus less on ways to impact the enemy directly, and more on the enhancement of soldiers’ fighting abilities--though neurological drugs that make enemy captives more talkative or perhaps cause enemy troops fall asleep or become disoriented also get a mention.

Of particular interest in the document: transcranial direct current stimulation, or tDCS. The idea of passing electrical signals through the skull to the brain to boost performance isn’t new to U.S. defense dreamers, as the U.S. military has already done tests on the technology (and found it helpful in improving soldiers’ abilities to detect threats). A battle helmet that can pass weak electrical pulses through the brain could sharpen a soldier’s mind, the report suggests, upping attention spans and memory as well as attention to detail.
Similarly, electroencephalogram (EEG) could work to turn the human brain into a more efficient tool, although in a somewhat backwards fashion from tDCS. Using an array of electrodes, EEG can record brainwaves through the skull, detecting things that may not be conscious but that the brain nonetheless registers. For instance, the report cites DARPA research in which subjects looking at satellite photos were monitored with EEG. Even when the subjects missed some of the targets they were looking for in the images, the brain detected them, and that was evident in their brain waves even though it was never converted to conscious thought.
Such tools could also be used to screen recruits and identify certain mental traits, helping fighting forces more efficiently organize their ranks into fast learners, decision-makers, peacekeepers, and hardened, battle-ready special ops types. But none of these ideas is as far-out as using brain-machine interfaces (BMIs) to plug soldiers’ brains directly into weapons systems.
This is based on the same kind of research that has shown that disabled individuals can move prostheses with nerve signals from the brain, but in this context such BMI technology would be used to plug the fast processing power of the brain into drone technology and other weapons technologies for faster target identification and, presumably, termination. Let’s hope the soldiers mind-melding with the killer drones aced their EEG decision-making exams.

Doctors Grow Parkinsonian Human Brain Cells In Vitro, Shedding Light on the Genetics of the Disease



Parkinson's Disease in the Brain The brownish area is a Lewy body, an abnormal protein chunk that develops inside brain cells in Parkinson's disease. Wikipedia
For the first time, Parkinson’s researchers have made human brain cells derived from the skin cells of patients who carry a mutated gene related to Parkinson’s disease. This means researchers can now track exactly how this mutation, in a gene called parkin, causes the disease in about 10 percent of Parkinson’s patients.
This is a major breakthrough because it will allow researchers to study brain cells affected by Parkinson’s in real time. Animals that do not have this gene cannot readily develop Parkinson’s-like symptoms, so researchers must use human neurons, but it’s generally difficult if not impossible to get live human brain cells to study.

Instead, Jian Feng and colleagues at the State University of New York-Buffalo took skin cells from four patients, including two healthy patients and two patients carrying the Parkin mutation. They induced the skin cells to become pluripotent stem cells, and then differentiated them into neurons — specifically, mid-brain neurons that create dopamine, called dopaminergic neurons. The loss of these neurons, which are the brain’s primary source of dopamine, causes Parkinson’s symptoms like loss of motor control.
The parkin gene indirectly harms those neurons. Here’s how it works: parkin regulates the production of an enzyme, monamine oxidase, which in turn keeps dopamine at bay. Parkin mutations do not control this MAO, and the MAO essentially runs amok, causing harm to the dopamine-producing neurons.
The Parkin gene mutation was present in the donors’ DNA, so the lab-created brain cells had the same traits that the patients’ real brain cells would have. This allowed the researchers to watch the gene mutation at work.
The neurons showed all the signs of MAO-related stress and a drop in dopamine uptake. But here’s the interesting part — when the researchers injected the normal version of Parkin, they could reverse the defects.
So this research is useful for two reasons — the cells themselves could be used to better study Parkinson’s disease itself, and they could also help screen new drugs or gene therapies that could be used to treat Parkinson’s disease, the researchers say.
The paper was published Tuesday in Nature Communications.

Attacks on Android Devices Intensify



COMMUNICATIONS


Rising security incidents and poorly defended phones suggest 2012 could be a risky year for smart-phone users.

  • BY DAVID TALBOT
A recent rise in Android malware—combined with increased efforts to combat the threat—highlight the fact that, just like tech companies, app makers, and users, hackers are fast turning their attention to mobile devices. What's more, experts say, such devices are often configured in ways that make it easier for malware to thrive.
Several new types of Android malware have been spotted "in the wild" in recent weeks, and they demonstrate growing sophistication. One specimen, dubbed Opfake, is a bogus Web browser that automatically makes calls to premium phone lines. Opfake exhibits a powerful trick previously seen only in desktop malware, whereby the code repeatedly mutates to make anti-virus detection more difficult.
To counter the rising tide of threats, Google last week announced it had launched an app prescreening tool called Bouncer that runs a server-based simulation to check apps for malicious behavior—such as attempts to access or send personal data, or simply send out pricey text messages. Google blocks them before they get into the official Android Market. 
Bouncer has been used quietly for several months; in the second half of 2011, the Android market saw a 40 percent decrease in malware apps identified as potentially malicious, compared to the first half of the year, wrote Hiroshi Lockheimer, Google's Android engineering vice president, in a blog post.

In a similar move, the mobile security firmLookout says it is testing new methods for Android users that quarantine and scan downloaded apps. Whereas many existing tools screen the phone for already installed malware, a new tool would allow users to delay installation of a downloaded app until a check was complete. "For many users who install apps outside of Android Market, there is a need for pre-installation detection," says Derek Halliday, senior security manager at Lookout.
Lookout found, at the end of 2011, that 4 percent of Android users were likely to encounter malware over the course of the year—up from 1 percent of users a year ago, though part of the increase may be a function of improved detection, Halliday says.
Android is the most popular smart-phone operating system in the world, with 52.5 percent of the global market at the end of 2011, according to Gartner.
Don’t click it: The app button at bottom left—which arrived with a free game from a Chinese Android marketplace— steals data if clicked. Roughly translated, the Chinese characters mean “system setting shortcut.”
Xuxian Jiang
Google and Lookout's moves are a reaction to the relatively recent trend of malware writers intensively focusing on the official Android Market, and not just third-party app-dealing sites. "Since the vast majority of users rely on the official Android Market, it's understandable that there's increased focus there. At the same time, there are all kinds of other places where users can potentially acquire malware," says Halliday.
Meanwhile, new research is finding that Android phones themselves are often vulnerable out of the box. At the Network and Distributed System Security Symposium in San Diego this week, one research paper painted a bleak picture, reporting that many major brands come with factory settings that amount to a preweakened immune system, with various settings fixed to allow apps to access personal data, such as GPS position or stored contacts.
Xuxian Jiang, a computer scientist at North Carolina State University, said that his group studied eight mass-market phones—the HTC Legend, Evo 4G and Wildfire S, the Motorola Droid and Droid X, the Samsung Epic 4G, and the Google Nexus One and Nexus 4S.  All but the two Google phones came out of the box with permissions pregranted for apps to access data that isn't needed for those apps to function, undercutting a pillar of Android's permission-based security model. The researchers say they have notified the phone makers about the findings.     
 "There is a trend where malware is going to grow, and is going to evolve," Jiang says. "Google's Bouncer will be helpful to move in the right direction, but more work needs to be done to contain the malware growth." And part of that should include making phones more conservative in what they allow apps to do by default, he adds. The effort also requires more and better screening tools; his group is working on one tool called Droid Ranger.
Permissive factory settings on phones are no accident, says Radu Sion, a computer scientist and security researcher at Stony Brook University. The hotly competitive commercial landscape rewards makers of devices that are easiest for average consumers to use. "The usability of devices becomes more and more important. Most vendors will err on the side of usability—then they will sell more."
But creating an easy plug-and-play experience means not making the user individually authorize various data releases—which makes the devices more vulnerable to malware.  
So far, the malware problem has been an annoyance rather than a major threat, but the pieces are in place for the situation to grow worse quickly, Sion says: "Android is not going to be safe anytime soon until we have some high-profile attacks. Right now, the malware is not a huge problem. Guys in Ukraine have not zoomed in on Android yet, but it's very easy to come in there. It's going to become a big problem."

Charge Your Phone (and Your Car) from Afar


Over the air: Witricity’s CEO Eric Giler holds a light that is powered remotely by the pad behind it.
Witricity



Charging systems that send power farther through the air will soon be on sale.

  • BY KEVIN BULLIS
Eric Giler points a remote control at a small black pad leaned up against a wall, and three lamps instantly light up and a tablet computer starts charging. The funny thing is, the devices all sit several feet away from the black pad, which provides power, and aren't plugged in.
Giler is the CEO of Witricity, a startup that hopes to revolutionize electronics by replacing wireless charging systems with ones that send power safely through the air. The nearly five-year-old company uses technology developed at MIT that extends the range of inductive wireless charging.
Witricity says its first products—for charging portable electronics—could be on the market later this year. Within a year or two, similar technology could allow electric-vehicle owners to charge their cars without plugging them in. This could be followed by wireless power for heart pumps and other medical implants.
The idea of wireless power transfer is hardly new. Nikola Tesla demonstrated a version of it a hundred years ago, and inductive chargers for electric toothbrushes and video game controllers are now widespread. But the inductive chargers available today work over only very short distances and require physical contact between the charger and electronic device, which isn't much more convenient than plugging a device in.

Inductive charging systems work by passing a current through a coil to generate a magnetic field, which creates another electric current in a similarly sized and oriented coil in the other device. Move these coils apart, and the efficiency of energy transfer drops off quickly. To increase the distance at which the power is transferred efficiently, Witricity tunes the sending and receiving coils to resonate with each other at a specific frequency with very little energy loss within each resonator.
The distance that power can be transferred in this way depends on the size of the coils. If both the sending and receiving coils are small, as may be the case with a system for mobile phones, the charger and the phone need to be placed within several centimeters to charge efficiently. But Witricity has also shown prototypes with larger coils that can send power at distances of about a meter. (Power can also be beamed with lasers and microwaves, but this requires a direct line of sight and can raise safety concerns.)
Park and charge: These pads transmit power wirelessly from the floor of a garage to the bottom of a car.
Witricity
It's also possible to boost the signal with coils called repeaters. In the demonstration Giler gave, coils installed under carpet squares allow power to leapfrog from a wall outlet to anywhere in the room.
Witricity is one of a handful of companies working to extend the range of electric chargers.  The company has developed a prototype table that charges devices placed anywhere on its surface—even if they remain inside a backpack or purse—and a wireless keyboard and mouse that can be powered from a computer monitor, eliminating the need for batteries. (Apple has patented a similar idea.) The company has also developed a charger for electric cars. It's a half-meter-wide pad that sits on the floor of a garage—just drive over it, and the car starts to charge.
Witricity is partnering with several companies to bring the technology to market. It has a multimillion-dollar contract with Toyota to develop charging for battery-powered vehicles (soon it might not make sense to call them plug-in electric vehicles), and has also announced a partnership with Taiwanese electronics manufacturer Mediatek to develop products for charging portable electronics.
Katie Hall, Witricity's chief technology officer, says the company is working on components that will add the necessary electronics to a portable device. It's also working to make charging sleeves for mobile phones that are no larger than the covers people typically use to protect their phones. The company isn't certain how much these will cost, but Hall says the system for charging cars wouldn't cost much more to make than the chargers that electric-vehicle owners often install in their garages anyway.
Several other companies are developing inductive chargers that can send power efficiently through the air. Siemens and BMW are developing chargers for electric cars, and Qualcomm recently bought a startup that had developed its own wireless electric-car chargers. A company called Fulton Technologies has technology that sends wireless power through a few centimeters of marble, as well as from the floor of a garage to an electric vehicle.
A handful of researchers are even working to extend the concept to allow charging of electric vehicles while they are out on the road. Researchers at Oak Ridge and Stanford recently developed detailed concepts for such a system. In a $2.7 million federally funded project, researchers at Utah State University are installing a system to charge buses as they stop along a route in Salt Lake City.
In the Oak Ridge model, 200 coils would be embedded in a section of the roadway and controlled by a single roadside device; successive coils would be energized as electric vehicles pass over them, providing enough power for the vehicle to reach the next series of coils a mile down the road.
John Miller, a research scientist at Oak Ridge, estimates that each series of coils plus the controller would cost less than a million dollars. "Wireless chargers for electric vehicles are so convenient. You don't have to mess with plug cables. You don't care what the weather is. You don't even have to think about it. I think it's going to catch on superfast," Miller says.

How the Zebra Got Its Stripes



Zebra. If there was a 'Just So' story for how the zebra got its stripes, I'm sure that Rudyard Kipling would have come up with an amusing and entertaining camouflage explanation. But would he have come up with the explanation that Gábor Horváth and colleagues from Hungary and Sweden have: that zebra's stripes stave off blood-sucking insects? (Credit: © davy liger / Fotolia)

Science Daily  — If there was a 'Just So' story for how the zebra got its stripes, I'm sure that Rudyard Kipling would have come up with an amusing and entertaining camouflage explanation. But would he have come up with the explanation that Gábor Horváth and colleagues from Hungary and Sweden have: that zebra's stripes stave off blood-sucking insects?



The team publishes their discovery that zebra stripes is the least attractive hide pattern for voracious horsefiles in the Journal of Experimental Biology athttp://jeb.biologists.org/.
Horseflies (tabanids) deliver nasty bites, carry disease and distract grazing animals from feeding. According to Horváth, these insects are attracted to horizontally polarized light because reflections from water are horizontally polarized and aquatic insects use this phenomenon to identify stretches of water where they can mate and lay eggs. However, blood-sucking female tabanids are also guided to victims by linearly polarized light reflected from their hides. Explaining that horseflies are more attracted to dark horses than to white horses, the team also points out that developing zebra embryos start out with a dark skin, but go on to develop white stripes before birth. The team wondered whether the zebra's stripy hide might have evolved to disrupt their attractive dark skins and make them less appealing to voracious bloodsuckers, such as tabanids.
Travelling to a horsefly-infested horse farm near Budapest, the team tested how attractive these blood-sucking insects found black and white striped patterns by varying the width, density and angle of the stripes and the direction of polarization of the light that they reflected. Trapping attracted insects with oil and glue, the team found that the patterns attracted fewer flies as the stripes became narrower, with the narrowest stripes attracting the fewest tabanids.
The team then tested the attractiveness of white, dark and striped horse models. Suspecting that the striped horse would attract an intermediate number of flies between the white and dark models, the team was surprised to find that the striped model was the least attractive of all.
Finally, when the team measured the stripe widths and polarization patterns of light reflected from real zebra hides, they found that the zebra's pattern correlated well with the patterns that were least attractive to horseflies.
"We conclude that zebras have evolved a coat pattern in which the stripes are narrow enough to ensure minimum attractiveness to tabanid flies," says the team and they add, "The selection pressure for striped coat patterns as a response to blood-sucking dipteran parasites is probably high in this region [Africa]."