Feeds

NASA: Full details on our manned ASTEROID SNATCH mission

If Congress will fund it, that is

Beginner's guide to SSL certificates

Video NASA is pressing ahead with plans to capture an asteroid, pack it in an orbit around the Moon, and then send up a two-person crew to investigate and take samples, and it has released a video showing how it plans to achieve all this.

Orion asteroid capture mission

The two craft involved in capturing a shard of the Solar System

Over the last few months, NASA has been taking submissions for ideas on how to accomplish its goal of bringing an asteroid close to Earth for study – although not too close. Now it has released the plans for how it will go about bringing the shards of the Solar System in for inspection.

The space agency is planning a two-vehicle mission. The first launch will be an unmanned asteroid catcher, which will nuzzle up to a small asteroid and encase it in a "capture bag." Two solar-powered ion thrusters using xenon fuel will then maneuver the asteroid into a parking orbit around the Moon.

In the second stage of the mission, two astronauts in an Orion Multi-Purpose Crew Vehicle will be launched on the as-yet unbuilt Space Launch System (SLS) heavy-lift rocket to rendezvous with the space rock. The astronauts will head in towards the Moon and get a gravity assist from the planetoid, enabling them to reach the captured asteroid within nine days.

Once there, the astronauts will exit the Orion capsule and crawl up the outside of the capture craft and onto the asteroid bag, which will be rigged with handholds. After filming the rock's form, drilling into its core, and taking samples for six days, the crew will reboard the Orion for the ten-day trip home, again using a lunar flyby to gain speed without using fuel.

NASA has released a bunch of pretty pictures and a video showing how it will all be done, but it's going to take cold, hard, cash – and a lot of it – to make this mission a reality. Sadly Congress shows little willingness to pony up for it, with the House of Representatives threatening to kill funding for the mission.

That's not to say all is lost. If Elon Musk's predictions about the future Falcon Heavy rocket that SpaceX is developing prove correct, it has the potential to be much cheaper than NASA's SLS design. That could free up some capital, and the mission could possibly use Musk's Dragon capsule, as well. ®

Internet Security Threat Report 2014

More from The Register

next story
GRAV WAVE DRAMA: 'Big Bang echo' may have been grit on the scanner – boffins
Exit Planet Dust on faster-than-light expansion of universe
SpaceX Dragon cargo truck flies 3D printer to ISS: Clawdown in 3, 2...
Craft berths at space station with supplies, experiments, toys
That glass of water you just drank? It was OLDER than the SUN
One MEELLION years older. Some of it anyway
Big dinosaur wowed females with its ENORMOUS HOOTER
That's right, Doris, I've got biggest snout in the prehistoric world
Japanese volcano eruption reportedly leaves 31 people presumed dead
Hopes fade of finding survivors on Mount Ontake
Relive the death of Earth over and over again in Extinction Game
Apocalypse now, and tomorrow, and the next day, and the day after that ...
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.