Skip to main content

Slashdot: Researchers Quietly Planned a Test to Dim Sunlight Over 3,900 Square Miles

Researchers Quietly Planned a Test to Dim Sunlight Over 3,900 Square Miles
Published on July 28, 2025 at 03:18AM
California researchers planned a multimillion-dollar test of salt water-spraying equipment that could one day be used to dim the sun's rays — over a 3,900-square mile are off the west coasts of North America, Chile or south-central Africa. E&E News calls it part of a "secretive" initiative backed by "wealthy philanthropists with ties to Wall Street and Silicon Valley" — and a piece of the "vast scope of research aimed at finding ways to counter the Earth's warming, work that has often occurred outside public view." "At such scales, meaningful changes in clouds will be readily detectable from space," said a 2023 research plan from the [University of Washington's] Marine Cloud Brightening Program. The massive experiment would have been contingent upon the successful completion of the thwarted pilot test on the carrier deck in Alameda, according to the plan.... Before the setback in Alameda, the team had received some federal funding and hoped to gain access to government ships and planes, the documents show. The university and its partners — a solar geoengineering research advocacy group called SilverLining and the scientific nonprofit SRI International — didn't respond to detailed questions about the status of the larger cloud experiment. But SilverLining's executive director, Kelly Wanser, said in an email that the Marine Cloud Brightening Program aimed to "fill gaps in the information" needed to determine if the technologies are safe and effective.âIn the initial experiment, the researchers appeared to have disregarded past lessons about building community support for studies related to altering the climate, and instead kept their plans from the public and lawmakers until the testing was underway, some solar geoengineering experts told E&E News. The experts also expressed surprise at the size of the planned second experiment.... The program does not "recommend, support or develop plans for the use of marine cloud brightening to alter weather or climate," Sarah Doherty, an atmospheric and climate science professor at the university who leads the program, said in a statement to E&E News. She emphasized that the program remains focused on researching the technology, not deploying it. There are no "plans for conducting large-scale studies that would alter weather or climate," she added. "More than 575 scientists have called for a ban on geoengineering development," according to the article, "because it 'cannot be governed globally in a fair, inclusive, and effective manner.'" But "Some scientists believe that the perils of climate change are too dire to not pursue the technology, which they say can be safely tested in well-designed experiments... " "If we really were serious about the idea that to do any controversial topic needs some kind of large-scale consensus before we can research the topic, I think that means we don't research topics," David Keith, a geophysical sciences professor at the University of Chicago, said at a think tank discussion last month... "The studies that the program is pursuing are scientifically sound and would be unlikely to alter weather patterns — even for the Puerto Rico-sized test, said Daniele Visioni, a professor of atmospheric sciences at Cornell University. Nearly 30 percent of the planet is already covered by clouds, he noted. Thanks to Slashdot reader fjo3 for sharing the news.

Read more of this story at Slashdot.

Comments

Popular posts from this blog

Slashdot: US Army Soldier Arrested In AT&T, Verizon Extortions

US Army Soldier Arrested In AT&T, Verizon Extortions Published on January 01, 2025 at 02:35AM An anonymous reader quotes a report from KrebsOnSecurity: Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As first reported by KrebsOnSecurity last month, the accused is a communications specialist who was recently stationed in South Korea. Cameron John Wagenius was arrested near the Army base in Fort Hood, Texas on Dec. 20, after being indicted on two criminal counts of unlawful transfer of confidential phone records. The sparse, two-page indictment (PDF) doesn't reference specific victims or hacking activity, nor does it include any personal details about the accused. But a conversation with Wagenius' mother -- Minnesota native Alicia Roen -- filled in the gaps. Roen said that prio...

Slashdot: US Army Soldier Pleads Guilty To AT&T and Verizon Hacks

US Army Soldier Pleads Guilty To AT&T and Verizon Hacks Published on February 20, 2025 at 01:31AM Cameron John Wagenius pleaded guilty to hacking AT&T and Verizon and stealing a massive trove of phone records from the companies, according to court records filed on Wednesday. From a report: Wagenius, who was a U.S. Army soldier, pleaded guilty to two counts of "unlawful transfer of confidential phone records information" on an online forum and via an online communications platform. According to a document filed by Wagenius' lawyer, he faces a maximum fine of $250,000 and prison time of up to 10 years for each of the two counts. Wagenius was arrested and indicted last year. In January, U.S. prosecutors confirmed that the charges brought against Wagenius were linked to the indictment of Connor Moucka and John Binns, two alleged hackers whom the U.S. government accused of several data breaches against cloud computing services company Snowflake, which were among the ...

Slashdot: AT&T Now Lets Customers Lock Down Account To Prevent SIM Swapping Attacks

AT&T Now Lets Customers Lock Down Account To Prevent SIM Swapping Attacks Published on July 02, 2025 at 01:30AM AT&T has launched a new Account Lock feature designed to protect customers from SIM swapping attacks. The security tool, available through the myAT&T app, prevents unauthorized changes to customer accounts including phone number transfers, SIM card changes, billing information updates, device upgrades, and modifications to authorized users. SIM swapping attacks occur when criminals obtain a victim's phone number through social engineering techniques, then intercept messages and calls to access two-factor authentication codes for sensitive accounts. The attacks have become increasingly common in recent years. AT&T began gradually rolling out Account Lock earlier this year, joining T-Mobile, Verizon, and Google Fi, which already offer similar fraud prevention features. Read more of this story at Slashdot.