Feeds

Game developer's lost electric buggy FOUND ON MOON

Vintage 1973 vehicle discovered by NASA orbiter

High performance access to file storage

Auctioned, purchased by a space tourist ... now found at last

In June last year, that recommendation was followed when the Lunar Reconnaissance Orbiter (LRO) blasted off from Cape Canaveral. Its year-long mission, sweeping along in orbit just 30 miles above the airless lunar surface, will see it scan the entire Moon in unprecedented detail as the Earth's satellite rotates under the orbiter's polar circuit.

NASA released a fresh batch of LRO imagery this week, and Ontario based moon-map boffin Phil Stooke was on it like a rat up a drainpipe looking for the lost Lunokhod. He soon sniffed out the machine's 37-year-old signature.

“The tracks were visible at once,” says Stooke. “Knowing the history of the mission, it’s possible to trace the rover’s activities in fine detail. We can see where it measured the magnetic field, driving back and forth over the same route to improve the data. And we can also see where it drove into a small crater, and accidentally covered its heat radiator with soil as it struggled to get out again. That ultimately caused it to overheat and stop working. And the rover itself shows up as a dark spot right where it stopped.”

Lunokhod-2 is no longer Russian property, having been sold off at auction by Sotheby's in the hard times (for the former Soviet nations) of the early 1990s. The defunct rover was purchased by multimillionaire games developer Richard Garriott (sometimes aka "Lord British") of Ultima fame.

Garriott, the son of a NASA astronaut who served aboard the "Skylab" space station in Earth orbit just months after Lunokhod-2's radiator blew, has continued to pursue his enthusiasm for space in latter years, visiting today's International Space Station as a paying tourist in 2008.

Following this week's LRO imagery, Garriott will now know with some accuracy where his expensive, broken, radioactive Soviet moon-car actually is - even if he remains no closer to being actually able to take possession. Inaccurate Russian charts, according to Stooke, can now be corrected.

There's more on the new LRO imagery from NASA here, and on the Lunokhod find courtesy of the University of Western Ontario here. ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.