MYSEC.TV

Home   /   RESOURCES   /   MYSEC.TV   / DART Scores 30 minute change to Asteroid orbit

DART Scores 30 minute change to Asteroid orbit

Tech & Sec Weekly
SHARE:

IN THIS VIDEO

On September 26, after a nine-month journey through the Solar System, NASA’s Double Asteroid Redirection Test (DART) mission impacted an asteroid called Dimorphos.

NASA scored a bullseye, with DART – roughly the size of a vending machine – hitting Dimorphos within 10% of the 160-metre asteroid’s centre. The hit changed the orbit of Dimorphos around its bigger companion asteroid Didymos by more than 30 minutes, far exceeding the original goal.

This is the first time humans have deliberately changed the motion of a significant Solar System object. The test shows it’s plausible to protect Earth from asteroid impacts using similar future missions, if needed.

We speak with Steven Tingay, John Curtin Distinguished Professor (Radio Astronomy), Curtin University about this astonishing feat of science and engineering.

To read Professor Tingay’s article visit https://theconversation.com/nasas-ast…

Read more about the DART mission https://dart.jhuapl.edu/

#space #dart #curtinuniversity #radioastronomy #nasa #asteroid

OTHER VIDEOS IN THIS SERIES

Astronomers
April 18, 2024
An international team of astronomers has discovered 49 new gas-rich galaxies using the MeerKAT radio telescope in South Africa. Watch Now
apsm_03
April 8, 2024
What are the strategic directions for AI in homeland security. Attending Milipol APAC and TechX Summit 2024, we speak with Physicist and former Yale University Professor, Dimitri Kusnezov, Under Secretary for S&T, US Department of Homeland Security. Watch Now
apsm_01
April 8, 2024
With the rapidly evolving challenges in global travel, trade, and security, we speak to Australian Border Force Commissioner, Michael Outram APM at the Milipol APAC and TechX Summit 2024 in Singapore. Watch Now
apsm
April 2, 2024
Pentera is an automated pentesting platform. Validate every attack surface in your network, and test continuously to maintain control over your true security posture. Be proactive in fixing vulnerabilities, misconfigurations, leaked credentials, and privileges before they are exploited. Watch Now