A thought-provoking and imaginative perspective on a scientific discovery. Follow maverick doctors who supercharge killer T cells, creating a breakthrough treatment for cancer.
The archaeological world is fooled for nearly half a century when an ape-like skull that's claimed as solid evidence for Darwin's theory of human evolution is proven fake. Using new research, experts investigate and uncover the identity of the forger. Locked away in a store room at London Science Museum is a genuine 19th century miracle machine, a 180-year-old mechanical engine that solves complex mathematical equations, more than 100 years before the first electronic computer.
'Stangest Things' series examines those hidden gems that have been tucked away in museums, laboratories and storage rooms around the world. Experts use the latest technology to investigate these incredible artifacts of history. A bizarre find called Copper Scroll is one of the famous Dead Sea Scrolls, but it's unlike any of the others; this strange relic might hold clues to a long-lost treasure, and cutting-edge science may finally reveal answers to this billion-dollar mystery.
The way that wars are fought is constantly evolving. In the warfare of today and the future, it's the push of a button rather than the pull of a trigger, bringing disorder without a single soldier setting foot on the ground. The real-world battlefield has morphed from the bloody trenches of the front line into an age of cyber warfare. From collapsing all the infrastructure of a country to changing minds for elections, any threat you can imagine can be done.
The global cyberwar is heating up and the stakes are no longer limited to the virtual world of computers. Now, thanks in part to secret documents released by Edward Snowden, the true scale of the National Security Agency's scope and power is coming to light. Besides spending billions of dollars to ingest and analyze the worlds' electronic communications, the NSA has set out to dominate a new battlefield—cyberspace. We examine the science and technology behind cyber warfare and asks if we are already in the midst of a deadly new arms race". Already, highly sophisticated, stealthy computer programs such as the notorious Stuxnet worm can take over and even destroy the control systems that regulate everything from food factories to gas pipelines, power plants, and chemical facilities—even our cars. While the destruction of Iranian centrifuges may have delayed Iran’s bomb program and forestalled an Israeli attack, the attack has opened a Pandora's Box, and now America's own critical infrastructure is vulnerable to retaliation and attack. With leading defense experts and investigative journalists who have probed the murky realm of criminal and strategic hacking, NOVA examines the chilling new reality of cyberwar in which no nation or individual is safe from attack.
The Allies plan for years how to break through Hitler’s Atlantic Wall in France. The deception operations are some of the most elaborate of the war, including a huge inflatable army in Kent. The D-Day fleet is the biggest assembled in history, with over 160,000 men crossing the channel to land on five Normandy beaches, each with differing success. But landing is just the beginning, what follows is one of the bloodiest and most extraordinary battles of WWII.