It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
3.9.1. Quantum Science and Technology
Until recently, quantum effects in electronic devices have not exhibited overriding significance. However, quantum effects not only have to be taken into account, but can dominate how devices perform as they shrink to atomic dimensions. DARPA is sponsoring research aimed at technology exploiting quantum effects to achieve revolutionary new capabilities.
DARPA’s Quantum Entanglement Science and Technology (QuEST) program is creating new quantum information science technologies, focusing on loss of information due to quantum decoherence, limited communication distance due to signal attenuation, protocols, and larger numbers of quantum bits (Qubits) and their entanglement.
Key among the program’s challenges is integrating improved single- and entangled-photon and electron sources and detectors into quantum computation and communication networks. Defense applications include highly secure communications, algorithms for optimization in logistics, highly precise measurements of time and position on the earth and in space, and new image and signal processing methods for target tracking
Originally posted by pudgeego
yeh, well i have nothing to hide. just as long as im not caught up in some frame job by putting lying junk on my computer and dont think that they cannot do that.
Originally posted by xman_in_blackx
Very interesting indeed. You put a lot of effort into this. It will be interesting to see what they will be able to do in ten years time.
Wikis have become a great tool for collecting and sharing knowledge in communities. This knowledge is mostly contained within texts and multimedia files, and is thus easily accessible for human readers. But though wikis are very good for storing and retrieving individual facts, they are less useful for getting queried or aggregated information.. As a simple example, consider the following question:
«What are the hundred world-largest cities with a female mayor?»
Wikipedia should be able to provide the answer: it contains all large cities, their mayors, and articles about the mayor that tell us about their gender. Yet the question is almost impossible to answer for a human, since one would have to read all articles about all large cities first! Even if the answer is found, it might not remain valid for very long. Computers can deal with large datasets much easier, yet they are not able to support us very much when seeking answers from a wiki: Even sophisticated programs cannot yet read and «understand» human-language texts unless the topic and language of the text is very restricted. The wiki's keyword search does not help either.
An IBM researcher has solved a thorny mathematical problem that has confounded scientists since the invention of public-key encryption several decades ago. The breakthrough, called 'privacy homomorphism,' or 'fully homomorphic encryption,' makes possible the deep and unlimited analysis of encrypted information — data that has been intentionally scrambled — without sacrificing confidentiality.
might better enable a cloud computing vendor to perform computations on clients' data at their request, such as analyzing sales patterns, without exposing the original data. Other potential applications include enabling filters to identify spam, even in encrypted email, or protecting information contained in electronic medical records.
One of the widely accepted properties of quantum entanglement is secrecy. Since scientists and researchers began working with quantum key distribution, entanglement has been considered an essential part of keeping communications private. What if entanglement didn't always mean secrecy, though? New work is shedding light on the nature of entanglement and quantum key distribution - and possibly proving that a high degree of entanglement does not necessarily lead to complete secrecy.
www.physorg.com...
The Norwegian University of Science and Technology (NTNU) and the University of Erlangen-Nurnberg together with the Max Planck Institute for the Science of Light in Erlangen have recently developed and tested a technique exploiting imperfections in quantum cryptography systems to implement an attack...
Surveillance Technology: Can they really watch everything?
..
For more on this read Suelette Dreyfus's, Ph.D, articles on the 1997 NSA patent or for a more directed search dig around for Julian Assange's 2000 AUCRYPTO mail-group postings.