Feeds

Plasma whirlpools breach Earth's magnetic shield

Cluster reveals how

SANS - Survey on application security programs

Data returned to Earth from ESA's Cluster quartet of satellites has revealed huge swirling pools of electrified gas that are feeding into Earth's magnetosphere.

The magnetosphere protects Earth from huge amounts of plasma from the sun. But some does still leak through. A zone called the plasma sheet, an inner region of our magnetosphere, sometimes fills up with plasma. This can happen in a matter of hours.

But until now, scientists were not sure exactly how the plasma crossed the magnetopause.

It has been known for some time that weak points in the shield occur where magnetic field lines reconnect. In a reconnection event, ESA explains, magnetic field lines spontaneously break and then join up with other nearby lines. This directs solar plasma along new routes.

But this new data from Cluster reveals that reconnection inside whirlpools of plasma also contribute to the process.

"Wondering how the solar wind could get into the plasma sheet is how I became interested in this problem," says Katariina Nykyri, lead author of the results, from the Imperial College, London.

She began studying an event recorded by Cluster back in 2001, when it was on the dawn side of Earth. In this region of space the solar wind blows over the Earth's magnetopause, much like the wind blows over an ocean.

The solar wind can whip up whirlpools of plasma, known as Kelvin-Helmholtz instabilities. Researchers thought these might conceal reconnection activity, which would show up in the data as a sudden change in the direction of the plasma flow and magnetic field, called a rotational discontinuity.

After what she describes as painstaking analysis, Nykyri and her team have confirmed that this does happen inside the whirlpools. She then developed a computer model of the event which revealed that in these reconnections plasma was being fed down magnetic field lines and into the magnetosphere. ®

3 Big data security analytics techniques

More from The Register

next story
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
STEALTHY NANOROBOTS dress up as viruses, prepare to sneak into YOUR BODY
Cloaking techniques nicked from viruses tackle roadblocks on way to medical frontier
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.