Acoustic Cloaking Device & Metamaterials

The acoustic cloaking device works in all three dimensions, no matter which direction the sound is coming from or where the observer is located. By placing this cloak around an object, the sound waves behave like there is nothing more than a flat surface in their path. 


Turning to Nature: METAMATERIALS

To achieve this new trick, Cummer and his colleagues turned to the developing field of metamaterialsthe combination of natural materials in repeating patterns to achieve unnatural properties. In the case of the new acoustic cloak, the materials manipulating the behavior of sound waves are simply plastic and air. Once constructed, the device looks like several plastic plates with a repeating pattern of holes poked through them stacked on top of one another to form a sort of pyramid.

To give the illusion that it isn’t there, the cloak must alter the waves’ trajectory to match what they would look like had they had reflected off a flat surface. Because the sound is not reaching the surface beneath, it is traveling a shorter distance and its speed must be slowed to compensate.

Acoustic cloaking device hides objects from sound — ScienceDaily.


Surveillance and detection concepts [Additional Post]

Surveillance and detection concepts already in operation, or under development:

  • A group of smaller surveillance drones called NAV (nano air vehicles) or MAV (micro air vehicles) already have been commissioned:  mapleseed drones; sparrow drones by 2015, dragonfly drones to fly in swarms by 2030, and eventually a housefly drone.  And if the reconstruction of nature doesn’t pan out, nature itself can be hijacked using electrical impulses to create cyborg surveillance insects being studied at major universities.
  • Nano sensors for use in agriculture that measure crops and environmental conditions.
  • Bomb-sniffing plants using rewired DNA to detect explosives and biological agents.
  • “Smart Dust” motes that wirelessly transmit data on temperature, light, and movement (this can also be used in currency to track cash).
  • Nano-based RFID barcodes that can be embedded into any material for tracking of all products . . . and people.


Hybrid Insect Micro-Electro-Mechanical Systems

Hybrid Insect Micro-Electro-Mechanical Systems is a project of DARPA, a unit of the United States Department of Defense, with the goal of developing tightly coupled machineinsectinterfaces by placing micro-mechanical systems inside the insects during the early stages of metamorphosis. The primary application is surveillance.

Remote controllable insects and their artificial robotic imitations are currently being promoted as covert spies. The development of tiny electronic control systems and miniature cameras has opened up a world of stealthy insect drones capable of slipping unobserved into military command and control centers

DARPA Minds Eye Program

The program’s focus is the development of smart cameras that can actually think for themselves.  These systems will not just watch us but will also be able to analyze visual data-sets and assign significance to that data.  The program’s focus is the development of smart cameras that can actually think for themselves.  These systems will not just watch us but will also be able to analyze visual data-sets and assign significance to that data. via » DARPA Kicks Off Mind’s Eye Program Alex Jones’ Infowars: There’s a war on for your mind!.



Surveillance state: Concluded video

The ‘so-far’ finished product of surveillance video in the future city. My intention was to  illustrate the convergence of all harvested information from the mesh network into the towers database and analytics program. What I would like to do next is include some of the glitches in the network and how the city workers are attempting to disconnect or protect themselves against the pervasion of the towers surveillance systems.

Surveillance State: Work In Progress

An extract from a video I’m currently working on illustrating a potential city where ‘tags’ of personal information are collected and stored in a converged infrastructure. The footage is my own which I recorded on a visit to London. To develop this further, I would like to include the possible methods of protection and glitches in the system where people have sought to protect themselves from the surveillance state.