Scientists have managed to make a copy of a beam of laser light, combining quantum cloning with quantum teleportation. And that sounds mighty cool. But once you get past this article’s Star Trek references, you get to what seems to be the real reason for the research:“Quantum cryptographic protocols are so secure that they can not only discover tapping but also where and how much information is leaking out. Now, using telecloning, the identity and location of the eavesdropper can be concealed.”And that’s a good thing? Related content news analysis FBI/IC3: Vile $5B business e-mail scam continues to breed FBI/IC3 reports over 40,000 worldwide victims and $5 billion in the latest reckoning By Michael Cooney May 08, 2017 5 mins Security news analysis Ultimate geek dream? NASA challenges you to jump on the FORTRAN bandwagon! NASA opens High Performance Fast Computing Challenge By Michael Cooney May 05, 2017 4 mins Government Open Source Enterprise Applications news analysis Fragmented, disorganized IT systems thwart feds ability to track visas DHS OIG says ineffective IT process has contributed to a backlog of more than 1.2 million visa overstay cases. By Michael Cooney May 04, 2017 5 mins Analytics Data Center Security news analysis TSA: “As you can imagine, live anti-tank rounds are strictly prohibited altogether.” TSA finds live anti-tank round in carry-on bag By Michael Cooney Apr 28, 2017 2 mins Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe