MIT Extracts Power From Temperature Fluctuations

As a civilization, we are proficient with the “boil water, make steam” method of turning various heat sources into power we feed our infrastructure. Away from that, we can use solar panels. But what if direct sunlight is not available either? A team at MIT demonstrated how to extract power from daily temperature swings.

Running on temperature difference between day and night is arguably a very indirect form of solar energy. It could work in shaded areas where solar panels would not. But lacking a time machine, or an equally improbable portal to the other side of the planet, how did they bring thermal gradient between day and night together?

This team called their invention a “thermal resonator”: an assembly of materials tuned to work over a specific range of time and temperature. When successful, the device output temperature is out-of-phase with its input: cold in one section while the other is hot, and vice versa. Energy can then be harvested from the temperature differential via “conventional thermoelectrics”.

Power output of the initial prototype is modest. Given a 10 degree Celsius daily swing in temperature, it could produce 1.3 milliwatt at maximum potential of 350 millivolt. While the Hackaday coin-cell challenge participants and other pioneers of low-power electronics could probably do something interesting, the rest of us will have to wait for thermal resonator designs to evolve and improve on its way out of the lab.

[via Engadget]

DARPA Enlisting Nemo And Dory To Find You

The ocean is a hostile environment for man-made equipment, no matter its purpose. Whether commercial fishing, scientific research, or military operations, salt water is constantly working to break them all down. The ocean is also home to organisms well-adapted to their environment so DARPA is curious if we can leverage their innate ability to survive. The Persistent Aquatic Living Sensors (yes, our ocean PALS) program is asking for creative ideas on how to use sea life to monitor ocean activity.

Its basic idea is simple: everyday business of life in the ocean are occasionally interrupted by a ship, a submarine, or some other human activity. If this interruption can be inferred from sea life response, getting that data could be much less expensive than building sensors to monitor such activity directly. Everyone who applies to this research program will have the chance to present their own ideas on how to turn this idea into reality.

The program announced it will “study natural and modified organisms” (emphasis ours.) Keeping an open mind to bio-engineering ideas will be interesting, but adding biohacking to the equation also adds to the list of potential problems. While PALS will keep its research within contained facilities, any future military deployment obviously will not. Successful developments in this area will certainly raise eyebrows and face resistance against moving beyond the lab.

But such possibilities are still far away in a future that many never arrive, as is common with DARPA initiatives. Very recently we talked about their interest in brain stimulation and we’ve been fascinated by many DARPA initiatives before that. If PALS takes off, their living sensor nodes might end up face to face with the open-source underwater glider project that won this year’s Hackaday prize.

[via Engadget]

Twitter Celebration Of Scientist Hacks For Lab And Field

If you like reading about scientists creatively using household objects for their work, you will enjoy browsing Twitter hashtag #reviewforscience where scientists are sharing stories of repurposing everyday things for their lab and field.

Research papers focus on the scientific hypothesis and the results of testing it. It is very common for such papers to leave out details of tools and techniques as irrelevant. (A solid scientific conclusion should be reproducible no matter what tools and techniques are used.) This sadly meant much of scientists’ ingenuity never see light.

We can thank Amazon user [John Birch] for this event. His son wished to study how ants from different colonies interact. In order to observe how these groups of ants react to each other while still keeping the populations separate, he wanted to keep one group of ants inside a tea strainer. He posted this technique as a review on the tea strainer’s Amazon product page, where it caught the attention of @RobynJWomack and started spreading, taking off when @DaniRabaiotti suggested the tag #reviewforscience.

Sadly, it appears our original scientist (who posted under his dad’s Amazon account) did not succeed with the tea strainer technique. But he has succeeded in drawing attention to creativity in science worldwide, as well as making his dad internet famous.

We love lab hacks here. For scientists who wish there was a place to document their creative lab hacks, might we suggest Hackaday.io?

[via Washington Post]

Opt-Out Fitness Data Sharing Leads To Massive Military Locations Leak

People who exercise with fitness trackers have a digital record of their workouts. They do it for a wide range of reasons, from gathering serious medical data to simply satisfying curiosity. When fitness data includes GPS coordinates, it raises personal privacy concerns. But even with individual data removed, such data was still informative enough to spill the beans on secretive facilities around the world.

Strava is a fitness tracking service that gathers data from several different brands of fitness tracker — think Fitbit. It gives athletes a social media experience built around their fitness data: track progress against personal goals and challenge friends to keep each other fit. As expected of companies with personal data, their privacy policy promised to keep personal data secret. In the same privacy policy, they also reserved the right to use the data shared by users in an “aggregated and de-identified” form, a common practice for social media companies. One such use was to plot the GPS data of all their users in a global heatmap. These visualizations use over 6 trillion data points and can be compiled into a fascinating gallery, but there’s a downside.

This past weekend, [Nathan Ruser] announced on Twitter that Strava’s heatmap also managed to highlight exercise activity by military/intelligence personnel around the world, including some suspected but unannounced facilities. More worryingly, some of the mapped paths imply patrol and supply routes, knowledge security officers would prefer not to be shared with the entire world.

This is an extraordinary blunder which very succinctly illustrates a folly of Internet of Things. Strava’s anonymized data sharing obsfucated individuals, but didn’t manage to do the same for groups of individuals… like the fitness-minded active duty military personnel whose workout habits are clearly defined on these heat maps. The biggest contributor (besides wearing a tracking device in general) to this situation is that the data sharing is enabled by default and must be opted-out:

“You can opt-out of contributing your anonymized public activity data to Strava Metro and the Heatmap by unchecking the box in this section.” —Strava Blog, July 2017

We’ve seen individual fitness trackers hacked and we’ve seen people tracked through controlled domains before, but the global scope of [Nathan]’s discovery puts it in an entirely different class.

[via Washington Post]

Ancient Insect Scales Analyzed With Help Of Nose Hair

Scientists working to advance the frontier of knowledge frequently also need to invent their tools along the way. Sometimes these are interesting little hacks to get a job done. Recently some researchers found ancestors of moths and butterflies older than any previously known by analyzing tiny scales found alongside ancient pollen. They needed a tool to manipulate these scales: separating them from surrounding debris, transferring them to microscope slides. The special tool was a needle tipped with a single human nostril hair.

As ancient insects were the published paper‘s focus, their use of nose hair tipped needle was only given a brief mention in the “Materials and Methods” section. Interviews by press quoted researchers’ claim that nose hair has the right mechanical properties for the job, without further details. Not even a picture of the tool itself. What properties of insect scales made them a good match with the properties of nose hair? Was there a comprehensive evaluation of multiple types of hair for the task? Would we regret asking these questions?

Novel approaches to fine-tipped tools would be interesting to examine under other contexts, like the tweezers we use to build surface-mount electronics. As SMD parts continue to shrink in size, will we reach a point where hair-tipped tools are the best DIY alternative to an expensive pick-and-place machine? It would be another creative approach to deal with the challenges of hand-built SMD. From simple but effective mechanical helpers, to handy 3D printed tools, to building hybrid Manual + CNC pick-and-place more affordable than their fully automated counterparts.

[via Washington Post]

Intel Forms New Security Group To Avoid Future Meltdowns

Intel just moved some high level people around to form a dedicated security group.

When news of Meltdown and Spectre broke, Intel’s public relations department applied maximum power to their damage control press release generators. The initial message was one of defiance, downplaying the impact and implying people are over reacting. This did not go over well. Since then, we’ve started seeing a trickle of information from engineering and even direct microcode updates for people who dare to live on the bleeding edge.

All the technical work to put out the immediate fire is great, but for the sake of Intel’s future they need to figure out how to avoid future fires. The leadership needs to change the company culture away from an attitude where speed is valued over all else. Will the new security group have the necessary impact? We won’t know for quite some time. For now, it is encouraging to see work underway. Fundamental problems in corporate culture require a methodical fix and not a hack.

Editor’s note: We’ve changed the title of this article to better reflect its content: that Intel is making changes to its corporate structure to allow a larger voice for security in the inevitable security versus velocity tradeoff.

You’ll Really Want An “Undo” Button When You Accidentally Send A Ballistic Missile Warning

Hawaiians started their weekend with quite a fright, waking up Saturday morning to a ballistic missile alert that turned out to be a false alarm. In between the public anger, profuse apologies from officials, and geopolitical commentary, it might be hard to find some information for the more technical-minded. For this audience, The Atlantic has compiled a brief history of infrastructure behind emergency alerts.

As a system intended to announce life-critical information when seconds count, all information on the system is prepared ahead of time for immediate delivery. As a large hodgepodge linking together multiple government IT systems, there’s no surprise it is unwieldy to use. These two aspects collided Saturday morning: there was no prepared “Sorry, false alarm” retraction message so one had to be built from scratch using specialized equipment, uploaded across systems, and broadcast 38 minutes after the initial false alarm. In the context of government bureaucracy, that was really fast and must have required hacking through red tape behind the scenes.

However, a single person’s mistake causing such chaos and requiring that much time to correct is unacceptable. This episode has already prompted a lot of questions whose answers will hopefully improve the alert system for everyone’s benefit. At the very least, a retraction is now part of the list of prepared messages. But we’ve also attracted attention of malicious hackers to this system with obvious problems in design, in implementation, and also has access to emergency broadcast channels. The system needs to be fixed before any more chaotic false alarms – either accidental or malicious – erode its credibility.

We’ve covered both the cold-war era CONELRAD and the more recent Emergency Broadcast System. We’ve also seen Dallas’ tornado siren warning system hacked. They weren’t the first, they won’t be the last.

(Image: Test launch of an unarmed Minuteman III ICBM via US Air Force.)