Tuesday, April 13, 2021

Detecting The Ultra-High Energy Cosmic Rays With Smartphones

This article is by

Share this article

Article Contributor(s)

Pujitha Suribhatla

Article Title

Detecting The Ultra-High Energy Cosmic Rays With Smartphones

Publisher

Global Views 360

Publication Date

April 13, 2021

URL

How Cosmic Rays Travel

How Cosmic Rays Travel | Source: NASA

Smartphones have become the most commonplace objects in our daily lives. The unimaginable power that we hold in our hands is unrealized by most of us and, more importantly, untapped. Its creativity often gets misused but one can only hope that it’s fascinating abilities would be utilized. For example, did you know that the millions of phones around the globe can be connected to form a particle detector? The following article covers the CRAYFIS (Cosmic RAYs Found in Smartphones) phone-based application developed by the physicists from the University of California—Daniel Whiteson, Michael Mulhearn, and their team. CRAYFIS aims to take advantage of the large network of smartphones around the world and detect the cosmic or gamma rays bursts which enter the Earth’s atmosphere almost constantly.

What Are Cosmic Rays?

Cosmic rays are high velocity subatomic particles bombarding the Earth’s upper atmosphere continuously. Cosmic ray bursts have the highest energy compared to all forms of electro-magnetic radiation. When we say ultra-high energy particles (energy more than 10<sup>18</sup> eV), we mean two million times more energetic than the ones that can be produced by the particle colliders on Earth.  These rays are thought to be more powerful than typical supernovae and can release trillions of times more energy than the Sun. They are also highly unpredictable as they can enter Earth’s atmosphere from any direction and the bursts can last for any period of time ranging from a few thousand seconds to several minutes.

Despite many theoretical hypotheses, the sources of these ultra-high energy cosmic rays are still a mystery to us even after many decades of their discovery. These rays were initially discovered in the 1960’s by the U.S. military when they were doing background checks for gamma rays after nuclear weapon testing. Cosmologists suggest that these bursts could be the result of super massive stars collapsing - leading to hypernova; or can be retraced to collisions of black holes with other black holes or neutron stars.

How Do We Detect Them?

When the high-energy particles collide with the Earth’s atmosphere, the air and the gas molecules cause them to break apart and create massive showers of relatively low-energy particles. Aurora borealis i.e., the Northern and the Southern lights are the lights that are emitted when these cosmic rays interact with the Earth’s magnetic field. Currently, these particles are hitting the Earth at a rate of about one per square meter per second. The showers get scattered to a radius of one or two kilometers consisting mostly of high-energy photons, electrons, positrons and muons. But the fact that these particles can hit the Earth anytime and anywhere is where the problem arises. Since the Earth has a massive area, it is not possible to place a detector everywhere and catch them at the exact moment.

Energetic charged particles known as cosmic rays hit our atmosphere, where they collide with air molecules to produce a shower of secondary particle | Source: CERN

Detecting such a shower requires a very big telescope, which logically means a network of individual particle detectors distributed over a mile or two-wide radius and connected to each other. The Pierre Auger Observatory in South America is the only such arrangement where 1,600 particle detectors have been scattered on 3,000 square kilometers of land. But the construction cost of the same was about $100 million. Yet, only a few cosmic ray particles could be detected using this arrangement. How do we spread this network around the Earth?

In addition to being cost-effective, such a setup must also be feasible. The Earth’s surface cannot possibly be dotted with particle detectors which cost huge fortunes. This is where smartphones come into the picture.

Detecting The Particles Using Smartphones

Smartphones are the most appropriate devices required to solve the problem. They have planet wide coverage, are affordable by most people and are being actively used by more than 1.5 billion users around the planet. Individually, these devices are low and inefficient; but a considerably dense network of such devices can give us a chance to detect cosmic ray showers belonging to the highest energy range.

Previous research has shown that smartphones have the capability of detecting ionizing radiation. The camera is the most sensitive part of the smartphone and is just the device required to meet our expectations. A CMOS (Complementary Metal Oxide Semiconductor) device is present in the camera- in which silicon photodiode pixels produce electron-hole pairs when struck by visible photons (when photons are detected by the CMOS device, it leaves traces of weakly activated pixels). The incoming rays are also laced with other noises and interference from the surroundings.  Although these devices are made to detect visible light, they still have the capability of detecting higher-energy photons and also low-ionizing particles such as the muons.

A screenshot from the app which shows the exposure time, the events- the number of particles recorded and other properties

To avoid normal light, the CRAYFIS application is to be run during nighttime with the camera facing down. As the phone processor runs the application it collects data from its surroundings using a camera as its detector element. The megapixel images (i.e., the incoming particles) are scanned at a speed of 5 to 15 frames per second, depending on the frame-processing speed of the device. Scientists expect that signals from the cosmic rays would occur rarely, i.e., around one in 500 frames. Also, there is the job of removing background data. An algorithm was created to tune the incoming particle shower by setting a threshold frequency at around 0.1 frames per second. Frames containing pixels above the threshold are stored and passed to the second stage which examines the stored frames, saving only the pixels above a second, lower threshold.

The CRAYFIS app is designed to run when the phone is not being used and when it is connected to a power source. The actual performance would be widely affected by the geometry of the smartphone’s camera and the conditions in which the data is being collected. Further, once the application is installed and is in the operating mode, no participation is required from the user, which is required to achieve wide-scale participation. When a Wifi connection is available the collected data would be uploaded to the central server so that it could be interpreted.

There is much complicated math used to trace back the information collected from the application. The most important parameters for the app are the local density of incoming particles, the detection area of the phone and the particle identification efficiency. These parameters are used to find the mean number of candidates (photons or muons) being detected. Further, the probability that a phone will detect no candidates or the probability that a phone will detect one or more candidates is given by Poisson distribution. The density of the shower is directly proportional to the incident particle energy with a distribution in x and y sensitive to the direction in which the particle came from. An Unbinned Likelihood (it is the probability of obtaining a certain data- in this case the distribution of the cosmic rays including their energy and direction, the obtained data is arranged into bins which are very, very small) analysis is used to determine the incident particle energy and direction. To eliminate background interference, a benchmark requirement has been set that at least 5 phones must detect and register a hit to be considered as a candidate.

It is impossible to express just how mind-blowing this innovation is. As the days pass, Science and Technology around us keep on surprising us and challenge us to rack our brains for more and more unique ways to deal with complex problems. The CRAYFIS app is simply beautiful and it would be a dream-come-true to the scientists if the project works out and we are able to detect these high energy, super intimidating cosmic rays with smartphones from our backyard.

Further Reading

The paper by Daniel Whiteson and team can be found here.

An exciting book “We Have No Idea” by Daniel Whiteson and cartoonist Jorge Cham can be found here.

The CRAYFIS app can be found here.

Support us to bring the world closer

To keep our content accessible we don't charge anything from our readers and rely on donations to continue working. Your support is critical in keeping Global Views 360 independent and helps us to present a well-rounded world view on different international issues for you. Every contribution, however big or small, is valuable for us to keep on delivering in future as well.

Support Us

Share this article

Read More

February 25, 2021 12:44 PM

Constructing Panopticon: Israeli Surveillance Technology and its Implications for the Palestinians

Jeremy Bentham, an English philosopher and social theorist designed ‘Panopticon’ in the late 18th century. The panopticon is an institutional building which Bentham describes as “a new mode of obtaining power of mind over mind in a quantity hitherto without example”. The structure's central observation tower, placed within a circle of prison cells, allows a watchman to monitor the inmates of the building without the dwellers knowing whether or not they are being watched. Although it is physically impossible for a single watchman to observe all the occupants at once, the fact that the inmates cannot know when they are being watched means that they are motivated to act as though they are being watched at all times. Thus, compelling the inmates to regulate their own behaviour.

Michel Foucoault, a French Philosopher, uses panopticon as a metaphor to explore relations between systems of social control and people in a disciplinary situation. For Foucault, the real danger was not that the individuals are repressed by the social order but the fact that when only certain people or groups of people control knowledge, oppression is a possibility. Contemporary society uses technology for the deployment of panoptic structures ‘invisibly’ throughout society.

This article gives an overview of the massive panopticon that is built and operated by Israel in Occupied Palestine.

Israel’s unaccountable military rule over its Palestinian citizens in east Jeruselum, West Bank and Gaza Strip have kept the Palestinians under constant surveillance and control. As per a report by Amitai Ziv on Haaretz, Israel’s surveillance operation against Palestinians is (as of 2019) “among the largest of its kind in the world. It includes monitoring the media, social media and the population as a whole.”

Among various mechanisms of surveillance, the technological mechanisms of surveillance and control deployed or proposed in the region of Gaza Strip is most empowering to Israel in terms of gathering ‘intelligence’. This includes use of biometric identity cards, Israeli access to Palestinian census data, almost complete access to and control of the telecommunication infrastructure in the Gaza Strip, the ability to track individuals via cell phone, large surveillance zeppelins which monitor the entire electromagnetic spectrum and which can usurp control of these from Palestinian operators (for instance sending text messages to subscribers targeting different demographics) as well as optical surveillance, facial recognition technology, remote controlled and robotic machine gun towers guarding the border that are capable of identifying a target and opening fire automatically—without human intervention.

In the context of occupation, the use of biometric ID cards of Israeli citizens is the sharpest seepage of control technologies.  For a long time, Israel has used a system of differentiated ID cards to distinguish between Jewish and Non-Jewish, citizens and residents of Israel, and citizens and residents of the occupied territories.

These ID cards also have a record of ethnic/religious affiliation of the person, and the ID numbers themselves are coded so as to reflect this information. One’s status of whether they are an Israeli or Palestinian, whether they are a citizen or a resident determines their freedom to travel, their ability to find jobs, and even their ability to get married and avail social benefits.  The Palestinians in East Jerusalem—which was annexed after the 1967 war—are considered as “conditional residents” and not citizens. According to a Human Rights Watch report, a resident of Palestine occupied Israel reported that the Israeli authorities refused to issue birth certificates to his five children, all born in Jerusalem. Other Jerusalem residents without residency status, in their testimonials, described being unable to legally work; obtain social welfare benefits; attend weddings and funerals; or visit gravely ill relatives abroad, for fear Israeli authorities would refuse to allow them to return home.

Another significant technological mechanism is the Facial recognition technology which has found its way into use by Israeli police. Facial recognition system, a globally controversial and scientifically flawed system is being used by the police force in Israel to identify protestors and is also implemented at airports and border crossings.

Israel has also ratcheted its social media surveillance, especially Facebook, Palestinians’ preferred platform. In October 2015, Israeli invasion at the Al-Aqsa Mosque angered several Palestinians. Many teenagers who didn’t belong to military wing or the Palestinian political faction orchestrated the attacks. The Israeli government blamed the social media for instigating the attacks and the military intelligence increased the monitoring of Palestinian social media accounts. Consequently, over 800 Palestinians were arrested for their posts on social media, particularly Facebook. It was later revealed that these arrests were a result of a policing system which uses algorithms to build profiles of supposed Palestinian attackers. This system proctors thousands of Palestinian Facebook accounts sifting for words like shaheed (martyr), Zionist state, Al Quds (Jerusalem), or Al Aqsa. Further, the algorithm identifies a “suspect” based on ‘prediction’ of violence. These targets are marked suspicious and are a potential target for arrest on the grounds of “incitement to violence”. The term incitement refers to all types of resistance to Israeli practices. The Israeli Army declared Military order 1651 in 2010, according to which, anyone who “attempts, orally or otherwise, to influence public opinion in the West Bank area in a manner which may harm public peace or public order” or “publishes words of praise, sympathy or support for a hostile organization, its actions or objectives,” will serve a jail time of 10 years. The order defines this as “incitement”. One notable instance has been the poetry of Dareen Tatour. She is a Palestinian citizen of Israel. She expressed her call to “resist” the occupiers through a poem she posted online in October 2015. The video had less than 300 views. But it resulted in nearly three years of house arrest and five months imprisonment. The Israeli government charged Tatour with inciting violence and terrorism while her poem was a call for a non-violent resistance. This incident is a classic demonstration of how Israel uses vague terminology to criminalize online activity when it serves its discriminatory interests.  

Israel’s military industrial complex is a profound enabler of the digital surveillance of Palestinians. The nation not only implements surveillance and control but also manufactures and exports a massive amount of military and cyber security technologies. A report published by Privacy International—an NGO that investigates government surveillance and companies—in 2016—stated that Israel has about 27 surveillance companies which is the highest per capita in terms of surveillance that any country has in the world.

The Guardian collected testimonies from people who worked in the Israeli Intelligence Corps to understand the big brother surveillance of the Palestinians. One of the testimonies revealed that commoners and even completely innocent people were under the radar of surveillance. The attestor stated “As a soldier in Unit 8200, I collected information on people accused of either attacking Israelis, trying to attack Israelis, desiring to harm Israelis, and considering attacking Israelis. I also collected information on people who were completely innocent, and whose only crime was that they interested the Israeli security system for various reasons. For reasons they had absolutely no way of knowing. All Palestinians are exposed to non-stop monitoring without any legal protection. Junior soldiers can decide when someone is a target for the collection of information. There is no procedure in place to determine whether the violation of the individual’s rights is necessarily justifiable. The notion of rights for Palestinians does not exist at all. Not even as an idea to be disregarded.”

Another testimonial exposed that the data collected was hardly in accordance with the security needs. The testimony stated, “Throughout my service, I discovered that many Israeli initiatives within the Palestinian arena are directed at things that are not related to intelligence. I worked a lot on gathering information on political issues. Some could be seen as related to objectives that serve security needs, such as the suppression of Hamas institutions, while others could not. Some were political objectives that did not even fall within the Israeli consensus, such as strengthening Israel’s stance at the expense of the Palestinian position. Such objectives do not serve the security system but rather agendas of certain politicians. One project in particular, was shocking to many of us as we were exposed to it. The information was almost directly transferred to political players and not to other sections of the security system. This made it clear to me that we were dealing with information that was hardly connected to security needs. We knew the detailed medical conditions of some of our targets, and our goals developed around them. I’m not sure what was done with this information. I felt bad knowing each of their precise problems, and that we would talk and laugh about this information freely. Or, for instance, that we knew exactly who was cheating on their wife, with whom, and how often.”

While hidden and unknown surveillance is prominent, Israel has also imposed explicit panopticon surveillance and restrictions on Palestinians in numerous cases. In the village of Beit Ijza, northwest of Jerusalem, the house of Gharib’s family has been enclosed by a 6-meter-high fence, cutting them off from their olive gardens and rest of the village as Israel claimed ownership of the land surrounding the Gharib family's house and created a West Bank settlement over there. The house was built in 1979 on land the family says has belonged to them from as far back as the Ottoman era. “Ever since Israel occupied the West Bank, Jews have been offering my father to sell the house,” Gharib says. “They even brought him a suitcase of money. He refused.” Now, their every move is filmed as cameras have been set up on the bars of the fence. Along with loss of privacy, the panopticon internalized omniscience prevents the Gharib family from taking radical steps to protect their rights. In Israeli military language this is called an “indicative fence” which is also equipped with sensors.  When the fence was built, the family had to negotiate by phone with the police at the nearby Atarot industrial zone every time they wanted to go out and or they had to get the Red Cross to help out. “Sometimes we waited for several hours for them to come and open it” Gharib said.

Constant surveillance in real life as well as digital space is definitely a critical human rights violation. While the case of Palestinians is unique given the Israeli military occupation, the fight for their rights is global. World leaders, governments, civil societies, social media giants and all internet users have an essential role in the battle for a surveillance and censorship free state.

Read More