Abstract

Fighting Against the Invisible: WAR TECH SPRING WAR TECH Chemical agents serve as the great “unknown vari- ables” on the battlefield. With the technology of chemical warfare becoming more prevalent, soldiers are experienc- ing an increase in vulnerability to these difficult to detect dangers that often escape the five senses. The increase in security against terrorism has intensified the need for new detection devices that can quickly identify hazardous com- pounds. Therefore, scientists are developing new technolo- gies to improve soldiers’ safety. To be useful on the battle- field, though, these tools must meet certain guidelines for mobility and accessibility. The operating mechanisms of these instruments can range from simple applications on special analysis paper to radiation devices, but develop- ments that allow for the detection of specific compounds require more complex methods. Enzymatic systems The new weapons against chemical warfare by Leana Nguyen anywhere, anytime in a large area and must give repro- ducible readings. That is, the device must display the same results even in different environments. The repro- ducibility of detection allows scientists to confirm or reject results and to find out more about the substance in question in order to develop better detection machinery or to efficiently develop an antidote. Chemical weaponry has been used since the dawn of war itself. Dated methods include tainted arrows and bullets as well as edible poisons. In an article on the use of poisonous gases (New York Times, April 22, 1915), Will Irwin states that modern chemical warfare began in World War I when the Germans dropped asphyxiating bombs in the second battle of Ypres in Belgium. The toxin did not prove extremely deadly, but it often ren- dered its victims injured and unable to participate in com- bat. This effective tactic sparked the race to develop chemical warfare agents. Countries such as Germany, England, and France employed such popular agents as: phosgene, mustard gas, and chlorine gas that decrease pH in the respiratory system and cause skin blistering. Today chemical warfare has come a long way with new com- pounds like osmium tetroxide which cause skin, respirato- ry, and eye burning (National Library of Medicine 2007). According to the Federation of American Scientists, a chemical agent is a substance intended for use in military operations to kill, seriously injure, or inca- pacitate its victims (American Federation of Scientists 2006). These substances must quickly proliferate to cover a large area and must be reproducible in order for the weapon to be effective. To detect these substances, the technology must respond quickly to minute sample sizes M8/M9 is a special, inexpensive paper that enables users to quickly identify concentrations and possible com- pounds present. Its name comes from its “model number” (Astrella 2004). This lightweight and highly sensitive tool tests liquid and aerosol agents that cause blistering and nerve damage. This lightweight and highly sensitive tool tests liquid and aerosol agents that cause blistering and nerve damage. The paper contains two dyes and a pH indicator that reacts with a harmful substance to produce a change in color on the paper. This will indicate the type of sub- stance and the degree of contamination. M8/M9 efficiently gives results in thirty seconds. Users sim- ply remove the paper from its packaging and A booklet of chemical detection allow the paper to come paper showing types of agent: nerve or blister into contact with the potentially contaminated surface. Soldiers put these sheets into windows or on their uniforms to recognize potential threats when entering unfamiliar environments. However, the high sensitivity of the paper reduces its pre- dictive power because it can sense non-hazardous sub- stances as well, preventing certain analysis of the haz- ardous chemical. These low cost sheets of paper can range from around $13 for 12 twelve sheets to up to a lit- tle over $3,000 for large kits, depending on the specificity and the amount of paper. http://www.globalsecurity.org/wmd/library/policy/army/fm /3-4/Fig1-14.gif

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.