Feeds

Dark matter: Good news, everyone! We've found ... NOTHING AT ALL

But that too is knowledge, grasshopper

High performance access to file storage

The most sensitive dark-matter detector ever built has failed to detect any dark matter.

It's not yet a problem for the instrument, the LUX Dark Matter Collaboration that The Register described here and here. What it might mean is, in an echo of the kind of iterative narrowing-down that characterised the hunt for the Higgs-boson, a re-drawing of the boundaries around where to seek the stuff.

Over at Nature, the scientists explain that after running the LUX experiment for 110 days, no statistically significants were detected. The 160 events that were spotted are well within the level that would be generated by background radiation not screened out by the rock and water that surrounds the detector.

LUX's 300 kg of liquid Xenon is supposed to detect hypothesised WIMPs – weakly interacting massive particles – using 122 photmultiplier tubes to spot the tiny flashes of light that theory predicts would be given off if a WIMP strikes a Xenon nucleus.

So far, however, that just hasn't happened. However, according to Brown University physics professor and LUX co-founder Rick Gaitskell: “This first run demonstrates a sensitivity that is better than any previous experiment looking to detect dark matter particles directly”.

The first run gives the LUX operators a baseline from which they can adjust the instrument for a 300-day detection run due to start in 2014. The no-show also suggests that WIMPs might have lower mass than predicted, or might interact even more weakly than expected.

As noted at Phys.org: “In the upcoming 300-day run, the LUX researchers hope either to detect dark matter definitively or to rule out a vast swath of parameter space where it might be found.”

The experiment's paper suggests that the LUX data eliminates low-mass WIMP models in the 33 GeV range.

Gaitskell says new models of dark matter need to be probed (and if necessary ruled out), “because we don't yet understand the universe well enough to know which of the models is actually the correct one. LUX is helping to pin that down.”

The researchers also hope that their work to date will help them secure further Department of Energy funding to scale up LUX from its current 300 kg of Xenon to seven tonnes of the stuff. ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.