<<

From Clubs and Spears to the Invisible Cloak, the Role of Technology in Weaponry Looking at the historical development, usage and technology related to weapons from 3.5 billions years ago till present. ************************************************** Week 1, Nature, the maestro..(3.5 billions years to a few millions years)

Week 2, Pre-historic and Ancient (Up to 500 AD) Week 3, Medieval to WW I (500 AD to 1914)

Week 4, WW I (1914 to 1918)

Week 5, WW II (1939 to 1945)

Week 6, Post war, Present, Future.. (1945 to present and future) Last Week’s Business Question of the week True or False? The Exploratorium is the creation of Oppenheimer, the same person who was the director of Manhattan project.  Dr. Frank Oppenheimer is the person created explotorium.

 His brother, Robert Oppenheimer, was the director of Manhattan project  Like his brother, he was a Physicist.  Worked on Uranium enrichment as well as Manhattan project.  Shortly after WWII, while he was a professor in Colorado, he was forced to resign as a result of actions taken by the House Un- American Activities Committee.  And 10 years as a cattle rancher in Pagosa Springs, Colorado.  He taught in a high school for a while.  In 1959, he was offered an appointment at the University of Colorado.  Frank was invited to plan a new branch of the Smithsonian, but he declined, preferring instead to work on what he called his “San Francisco project”.  in 1969, the doors opened to Frank’s Exploratorium. Frank nurtured and shaped the growing museum until 1985, when he died from lung cancer. What kind of Gyro was in the chip? They are MEMS (Micro- Electro-Mechanical Systems). One type is

 Tuning fork, or Vibrating Structure Gyroscope.  Based on halters

Crane fly How does it Work? Another type uses laser

 Based on Sagnac interference. TVA (Tennessee Valley Authority) connection Advanced Light Source, ALS visit. Built from 1987 to 1993. Formerly Lawrence Berkeley Lab, housing 184 inch Cyclotron.

What was the question again?!

 TVA (Tennessee Valley Authority) connection?  The War Production Board recommended sites around Knoxville, Tennessee, an isolated area where the Tennessee Valley Authority could supply ample electric power and the rivers could provide cooling water for the reactors.  Many residents came home to find eviction notices tacked to their doors.  Most were given six weeks to evacuate  Several had as little as two weeks.  Some were even forced out before they received compensation. A billboard posted in Oak Ridge, Tennessee, on December 31, 1943. Source of heat in U235

Total Mass Total Mass = 235.04U = 234.85 Mass converted to energy= 0.15U E = mC2

C=3x108 m/s Example of Energy (MeV) distribution in fission reactions Energy (Mev) % Gamma, Beta, Neutrino 29 14Escape Kinetic energy of fission fragments 167 81 Kinetic energy of fission neutrons 8 5HEAT Mev ( 81%enrgy) Mev (5%energy) How much is 200 MEV? Energy required to lift a grain of sand by 1 mm! Not impressive? That is just one atom. When 1 KG U235 completes the fission, it looses 0.8 grams of its mass (size of sesame seed). But energy produced is enough to lift the Empire State Building (365000 tons) by 20 miles! Nuclear Fission Confirmed as Source of More than Half of Earth’s Heat.

By: David Biello | July 18, 2011 Hollywood take on Carrier landing

 Sent by Jon Frieseke

 http://www.youtube.com/watch?v=zCK0VQKSfwc Article from Smithsonian

 Feb 2013, “the little bang”  The first rocket was firework made from bamboo tube, early 12th century in .  This is earlier than previous date of 1232.  Nicknamed “ground rat”.  Week 6, Post war, Present, Future.. (1945 to present and future) Will there be another WW? I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones.

Albert Einstein Political climate after the war… Can it be regarded as extended WWIII? :1945 to 1991  (45 years). If we compress 45 years of cold war into 3 to 4 years and specially look at “Proxy Wars” during this period:  Greek , 1946–1949  Malaysian Emergency, 1948–1960  Arab-Israeli Conflict, 1948–Present  , 1950–1953  , 1956–1957  , 1953–1959  , 1959–1973  , 1953–1975  , 1957–1975  , 1960–1996  , 1960–1965  , 1961  , 1962  , 1974–2002  , 1977–1978  Afghan-Soviet War, 1979–1989  Iran Hostage Crisis, 1979  Iran-Iraq war, 1980–1988  Invasion of Grenada, 1983  Nicaraguan Civil War, 1979–1990  Salvadoran Civil War, 1980–1992 For list of 76 wars, go to: http://www.ranker.com/list/a-list-of-all-cold-war- battles/reference?page=4 How close did we come to WWIII?

 Remember Cuban missile crisis? How about:

 1983 Soviet nuclear false alarm incident.  On September 26, 1983, the nuclear early warning system of the twice reported the launch of American Minuteman ICBMs from bases in the .  Stanislav Yevgrafovich Petrov, an officer of the USSR, decided to do nothing!  Only three weeks earlier, the Soviet had shot down a South Korean passenger jet that had strayed into Soviet airspace, killing all 269 people on board.  Many Americans were killed, including U.S. Congressman Larry McDonald.  It was subsequently determined that the false alarms had been created by a rare alignment of sunlight on high-altitude clouds and the satellites' Molniya orbits (highly elliptical orbits). There were other close calls!  Much Much Much bigger atomic and new bombs, submarines, tanks, carriers,…

Even using outer space The H bomb

First tested: Nov 1, 1952 USSR: 1953 By 1970, seven countries had H bomb.

The H bomb

 Thermonuclear bomb.  Edward Teller is considered to be “the father” of H bomb. The “A” versus the “H”

200 Mev

20 Mev

Neutron bomb

 Also called enhanced radiation weapon (ERW)  Is a type of thermonuclear weapon.  Designed to release a large portion of its energy as fast neutrons rather than explosive energy. Theoretically have no destructive advantage over a normal hydrogen bomb. However, the intense pulse of high-energy neutrons that is generated is intended as the principal killing mechanism, not the fallout, heat or blast. Although neutron bombs are commonly believed to "leave the infrastructure intact", current designs have explosive yields in the kiloton range. Explosion Footages

Advanced Weapons Stealth Bomber

 How can you make the plane invisible?  It is invisible to RADAR.  When RADAR does not receive the echo, the object becomes invisible. How to make plane invisible to RADAR?  1- Send an altered echo  2- prevent echo ◦A- geometry of the plane ◦B- Absorbing skin. F117- Nighthawk Downing of F117 Bizarre planes

Bizarre Weapons  Corkscrew Tank Operation Plowshare  It was to develop techniques to use nuclear explosives for peaceful construction purposes.  Program was terminated in 1977, due in large part to public opposition, after $770 million had been spent. Sedan test to prove Plowshare feasibility. Operation Plumbbob  Consisted of 29 explosions.  Twenty-one laboratories and government agencies were involved.  They included 43 military effects tests on civil and military structures, radiation and bio-medical studies, and aircraft structural tests.  Almost 1,200 pigs were subjected to bio-medical experiments and blast-effects studies during Operation Plumbbob.  Approximately 18,000 members of the U.S. Air Force, Army, Navy and Marines participated .  The military was interested in knowing how the average foot-soldier would stand up, physically and psychologically, to the rigors of the tactical nuclear battlefield.  Plumbbob released 58,300 kilocuries of radioiodine (I-131) into the atmosphere.  Statistically speaking, this level of exposure would be expected to eventually cause between 11,000 and 212,000 excess cases of thyroid cancer, leading to between 1,000 and 20,000 deaths Bizarre Bombs  (1994) "gay bomb" are informal names for a theoretical non-lethal chemical weapons.  United States Air Force research laboratory speculated about producing, which involved discharging female sex pheromones over enemy forces in order to make them sexually attracted to each other.  It appears that a 'heavy sweating bomb', 'flatulence bomb' and 'halitosis bomb' were also considered by a committee at the time.  The plan was to make an enemy so smelly they could be quite literally sniffed out of hiding by their opponents.  It was also considered fairly damaging to the enemy's morale. Spying, Secret Communication As old as humanity  Greeks use as well as . ◦Cryptography: hide the meaning of message. ◦Steganography: hide the message.  Hid message under wax of wax table.  Tattooed messages into the shaved scalp of slaves.  Also used torches for signaling.  Polybius (Greek historian )used matrix of 5x5 to code messages.  Caesar Shift method Phaistos Disk

 Disk of fired clay from the Minoan palace of Phaistos on the Greek island of Crete  It is about 5.9 in in diameter and covered on both sides with a spiral of stamped symbols.  Its purpose and meaning, and even its original geographical place of manufacture, remain disputed.  Is it a hoax?  The first recorded method of “frequency analysis” of letters points to Islamic scholars in 750 AD.  For example, in English laguage, “e” occurs most often, 12% of the time. Next are t, a, .. Late 14th century in Europe

 Combining code and cipher, Nomenclator

khDKKJ kj hfkh qdlkhKj djjjj ef Jqehbefhbkbjef kjkef bjfqebbkefbk  The ancient writings of Chinese and Indian military strategists contain information on deception and subversion (Psychological technique similar to 5th column), making use of assassinations, spies and secret agents. Hidden messages

 See: Rosslyn’s secrets Mozart Da Vinci The most mysterious book

 The Voynich manuscript.  dates to the early 15th century (1404– 1438), possibly from northern Italy.  Named after the book dealer Wilfrid Voynich, who purchased it in 1912 The Morse Code

 1844 Charles Babbage (1793-1871)  Standard potage rate  Early Speedometer  Discovered relation between width of tree ring and weather.  Father of mechanical computing. The most famous spy of WWI

 Mata Hari (1876 –1917), was a Dutch exotic dancer, accused spy who was executed by firing squad in France under charges of for Germany during WWI. Enigma Machine Code talker

 United States soldiers (400-500) during the WWII who used their knowledge of Navajo as well as Cherokee, Choctaw, Lakota[1] Meskwaki, and Comanche languages as a basis to transmit coded messages.  The code talkers received no recognition until the declassification of the operation in 1968. Post war espionage, gadgets

James Bond movie do an injustice to the level of sophistication! US embassy in Russia “the Great Transmitter”  Soon after construction began on the embassy in 1979, the State Department discovered that the Russian workers employed for the job were planting listening devices in the structure.  U.S. officials thought that they would be able to render the bugs ineffective before the building was occupied.  But in 1985, when work on the chancery was nearly complete, they realized that hidden microphones embedded in the bricks and building materials were so numerous and so cleverly designed that there was no way to remove or neutralize them without demolishing the structure.  The chancery became known as "the Great Transmitter" and sat unoccupied for more than a decade.  As a gesture of friendship after the 1991 breakup of the Soviet Union, Russian security services handed over the bugging plan for the building to the Americans in Moscow.  The building originally was constructed as part of a deal in which the Soviet Union and the United States built new embassies for each other.  After the revelation of the bugging, U.S. officials refused to let the Russians occupy their new chancery in Washington until 1994, nine years after it was completed. The remodeling work on the chancery will cost $240 million--nearly twice as much as construction of the original building.

 FROM: http://articles.latimes.com/1997/sep/26/news/mn-36452 Espionage technology and techniques   Numbers  Concealment messaging device  Non-official  Covert agent cover  Covert  listening device  One-way voice link  Cut-out  Safe house   Side channel  Dead drop attack   Steganography operations   Honeypot  Surveillance aircraft Also see

 Quantum Cryptography  Cyber espionage (e.g. flame, stuxnet and red October).  “Trade secret” espionage. Is there a silver Lining? Dual use technology •Missile •Nuclear •Chemical •Electronics •Biological Demonstration of GPS in 1990 Product from NASA

 1 Health and medicine •4 Consumer, home, and recreation ◦ (LEDs) •Temper foam ◦ Infrared ear thermometers •Enriched baby food ◦ Ventricular assist device •Portable cordless vacuums ◦ Artificial limbs •Freeze drying ◦ Invisible Braces •5 Environmental and agricultural ◦ Scratch-resistant Lenses resources  2 Transportation •Water purification ◦ Aircraft anti-icing systems •Solar energy ◦ Highway safety •Pollution remediation ◦ Improved radial tires •6 Computer technology ◦ Chemical detection •Structural analysis software  3 Public safety •Remotely controlled ovens ◦ Video enhancing and analysis systems •NASA Visualization Explorer ◦ Fire-resistant reinforcement • Blastoff ◦ Firefighting equipment •7 Industrial productivity •Powdered lubricants • Improved mine safety •Food safety FROM: en.wikipedia.org/wiki/NASA_spin-off_technologies#Notes Topic by request Iron Dome  Also known as “Iron Cap”  It is a mobile all-weather air defense system. It is a missile system designed to intercept and destroy short-range rockets and artillery shells fired from distances of 4 to 70 kilometers away and whose trajectory would take them to a populated area.  Iron Dome was declared operational and initially deployed on 27 March 2011.  It has been reported that the system shot down 90% of rockets launched from Gaza that would have landed in populated areas.  By November 2012, it had intercepted 400+ rockets.  It is considered to be the most effective and most tested missile shield in existence.