Feeds

Dark matter researchers think they've got a signal

Little WIMPs, is this your life?

Protecting against web application threats using SSL

Three Weakly Interacting Massive Particles – WIMPs to physicists – may not sound like many, but they're enough for excitement.

That's because if they exist, WIMPs would solve the “dark matter” puzzle. They are, however, exceedingly difficult to detect because of the first two words of their name. They're “weakly interacting”, so much so that if they do exist, you're under bombardment from WIMPs but never notice.

The researchers claiming the three WIMPs are working at the Super Cryogenic Dark Matter Search (CDMS) in their underground facility at Minnesota's Soudan Mine. In a paper at Arxiv, the researchers believe say they have identified three events that might be WIMP interactions with their detectors.

At this point, they're nowhere near the level of confidence that denotes a “discovery”. They're claiming a three-sigma level of confidence that what they've seen are WIMP signals rather than random fluctuations, but that only gets them to 99.81 percent certainty.

The detectors are trying to spot the “recoil” of atomic nuclei that have just encountered a passing WIMP. Their silicon instruments are cooled to 40 milli-Kelvin* to cut down on thermal noise. Since the detectors pick up plenty of other noise signals – Earth's background radiation, cosmic radiation and so on – it's still necessary to discriminate between these events and the signals they want.

If they're right, however, there'll be plenty of work for physicists explaining a key detail of the “discovery”: these WIMPs seem lighter than has been predicted, at 8.6 GeV (giga-electron volts).

WIMP signal

The possible WIMP signal. Source: Enectali Figueroa-Feliciano, Super CDMS

The researchers' presentation to the Light Dark Matter 2013 conference can be found here. ®

Update

* I stand corrected. Lesson: Google can't convert very low Farenheit temperatures to Kelvin.

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
PORTAL TO ELSEWHERE scried in small galaxy far, far away
Supermassive black hole dominates titchy star formation
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Edge Research Lab to tackle chilly LOHAN's final test flight
Our US allies to probe potential Vulture 2 servo freeze
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
Cracked it - Vulture 2 power podule fires servos for 4 HOURS
Pixhawk avionics juice issue sorted, onwards to Spaceport America
Archaeologists and robots on hunt for more Antikythera pieces
How much of the world's oldest computer can they find?
Who wants to be there as history is made at the launch of our LOHAN space project?
Two places available in the chase plane above the desert
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.