Home / Software & Service News / Researchers are breeding fluorescent bacteria to uncover landmines

Researchers are breeding fluorescent bacteria to uncover landmines

One of the many tragedies of war are the dangers that persist long after conflicts formally end — dangers like abandoned minefields peppered with active, deadly ordnance. Buried landmines threaten the lives of ordinary people near former battlefields all over the world, and disarming them has always been a dangerous effort. Now, researchers at the Hebrew University of Jerusalem are working on a way to make landmine identification easier and safer. No, the trick isn’t to build a better metal detector, it’s to cultivate bacteria that glows in the presence of deadly explosives.

A paper by researchers at the Hebrew University of Jerusalem describes a system that uses specifically engineered bacteria that respond with a fluorescent signal when it detects the kind of explosive vapors that seep out of old landmines. This signal can be picked up by a laser scanning system that can identify the location of buried mines. Because the laser scanning portion can be operated remotely, the system could potentially remove the human element from a large part of the detection process.

If this method of detection can be proven to work consistently and be successfully deployed, it could help create a safer and more accurate method for clearing old minefields. The project also just sounds kind of cool — what’s better than using genetically engineered microorganisms and lasers to save lives?

Via: Eureka Alert

Click Here For Original Source Of The Article

About Ms. A. C. Kennedy

Ms. A. C. Kennedy
My name is Ms A C Kennedy and I am a Health practitioner and Consultant by day and a serial blogger by night. I luv family, life and learning new things. I especially luv learning how to improve my business. I also luv helping and sharing my information with others. Don't forget to ask me anything!

Check Also

Windows 10 included password manager with huge security hole

There's a good reason why security analysts get nervous about bundled third-party software: it can introduce vulnerabilities that the companies can't control. And Microsoft, unfortunately, has learned that the hard way. Google researcher Tavis Ormandy discovered that a Windows 10 image came bundled with a third-party password manager, Keeper, which came with a glaring browser plugin flaw -- a malicious website could steal passwords. Ormandy's copy was an MSDN image meant for developers, but Reddit users noted that they received the vulnerable copy of Keeper after clean reinstalls of regular copies and even a brand new laptop.

A Microsoft spokesperson told Ars Technica that the Keeper team had patched the exploit (in response to Ormandy's private disclosure), so it shouldn't be an issue if your software is up to date. Also, you were only exposed if you enabled the plugin.

However, the very existence of the hole has still raised a concern: are Microsoft's security tests as thorough for third-party apps as its own software? The company has declined to comment, but that kind of screening may prove crucial if Microsoft is going to maintain the trust of Windows users. It doesn't matter how secure Microsoft's code is if a bundled app undermines everything.

Source: Monorail, Tavis Ormandy (Twitter)