recommended reading

Space Radar Could Predict Massive Sinkholes a Month Before They Collapse

A sinkhole covers a street intersection in downtown Guatemala City, Wednesday, June 2, 2010.

A sinkhole covers a street intersection in downtown Guatemala City, Wednesday, June 2, 2010. // Moises Castillo/AP File Photo

The idea of the ground opening without warning and swallowing you up is nightmare fuel. As populations grow and humans invent new ways to plunder underground resources, sinkholes are only becoming more common—just look at the US sinkhole capital, Florida.

But America’s space agency, NASA, said today it may have developed a way to predict sinkholes up to a month before the ground collapses, saving lives and money. The early warning is provided by interferometric synthetic aperture radar (iSAR), which could be mounted on planes or satellites to scan sinkhole prone areas.

iSAR scans the ground multiple times in multiple wavelengths to put together interferograms, which can show tiny movements of the earth, including the ripples of earthquakes, the effects of flooding on riverbanks, or where the ground is sinking. This interferogram shows the ground sinking near oil wells in California:


Researchers at NASA’s Jet Propulsion Laboratory have been monitoring changing ground conditions along the US Gulf Coast as part of research into iSAR. When a nasty sinkhole formed at Bayou Corne, Louisiana, in 2012, researchers went back and examined radar scans in the same area a month and a year before the cave-in. They found that the ground surface layer had moved as much as 10 inches (26 cm) toward the sinkhole’s center.  The sinkhole was caused by a company owned by Occidental Petroleum mining too closely to a geological feature called a salt dome.

The researchers say this data, published in last month’s issue of the scientific journal Geology, shows that once the technology is more widely used and deployed on satellite platforms, not just airplanes, it can be used to tell when the earth is about to transform into a gaping maw. The US and India are collaborating to launch an iSAR-equipped satellite sometime in the next seven years.

Reprinted with permission from Quartz. The original story can be found here

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.