Astronomers have identified a peculiar “moon” that casts a shadow on Earth as it navigates through space. Dubbed quasi-moons, these entities don’t orbit our planet in a traditional manner, yet they maintain proximity as they travel around the sun.
According to a new study published in the American Astronomical Society Research Notes, this space rock may have been a companion to Earth for as long as 60 years.
The object, identified as 2025 PN7, is small enough that it might have evaded earlier detections. While its exact dimensions remain uncertain, researchers estimate it to be around 30 meters (98 feet) in diameter—approximately the wingspan of a typical short-haul airliner—making it the tiniest known quasi-moon associated with Earth.
“With rapid technological progress, we’re identifying near-Earth objects faster than ever,” said Dr. Darren Baskill, an astronomy lecturer at the University of Sussex, in BBC Science Focus. “The sensitivity of digital cameras has improved, allowing us to detect these faint objects, and computers can effectively process vast data sets.”
At its closest approach, this object comes within 300,000 km (186,400 miles) of Earth. Usually, it remains about 384,000 km (238,600 miles) away, but its horseshoe-shaped orbit can take it as far as 297 million km (185 million miles) from our planet.
Consequently, it’s only detectable when nearby, as occurred in August 2025, when researchers from Spain’s Complutense University of Madrid spotted it from the PanSTARRS Observatory in Hawaii.
Upon reviewing historical records, scientists identified it as a potential Earth companion for decades.
“The primary question is, where did 2025 PN7 originate?” Baskill noted. “At its closest, 2025 PN7 will be roughly the same distance from Earth as the Moon, providing insights into the Moon’s possible origin.
“Another clue can be observed on a clear night: the Moon is full of craters. Each impact casts debris into the atmosphere, and some material may escape the Moon’s gravity and be launched into space.”
Moon’s craters offer clues to the origin of space rocks – Photo credit: Getty
Another hypothesis suggests that the space rock originated in the asteroid belt, but Baskill states, “It’s challenging to gather sufficient light from such a moving object to determine its chemical composition and origin.”
He further added, “Astronomers must be patient and wait to observe PN7 when it’s at its brightest, closest to Earth.”
2025 PN7 is just one of seven quasi-satellites currently orbiting near Earth. The other is the space rock Kamooarewa, which is the target of China’s Tianwen-2 mission. Launched in May 2025, Tianwen-2 aims to collect samples from asteroids to understand more about Earth’s origins and asteroid formation.
“These near-Earth objects, due to their occasional close passes, might become prime targets for the inaugural mining operations beyond Earth, or even enter Earth’s atmosphere,” Baskill remarked.
PN7 will remain in existence until 2085 when it will be pulled from orbit by gravitational forces.
Scenario crafted in Hollywood now reflects a genuine threat: the potential for hackers to seize control of vessels remotely and instigate crashes. Yet, in the security operations hub in Oslo, maritime cyber specialists situated mere meters from the luminous fjords and their tourist boats, floating saunas, and wet bathers assert that such occurrences are not only feasible, but imminent.
“We’re certain this will eventually happen, hence our vigilance,” states Øystein Brekke-Sanderud, Senior Analyst at the Nordic Maritime Cyber Resilience Centre (Norma Cyber). Behind him, a dynamic map displays the fleet they monitor, accompanied by a screen brimming with graphs and codes. Two small rubber ducks observe the passing minutes.
In an unstable global landscape, transportation networks, ports, and terminals have garnered heightened strategic significance as potential targets for infrastructure disruption and espionage—especially pertinent in Scandinavian nations that share maritime boundaries with Russia.
Finland and Sweden are NATO members now, with all countries enhancing their defensive postures amid escalating concerns over hybrid threats and warfare.
A digital map that tracks ship locations globally via Norma Cyber. Photo: Sara Aarøen Lien/The Guardian
As ships become increasingly digitalized, the opportunities for cyber breaches expand, indicating an urgent need to mitigate the complexities of AI tools and intricate systems.
Oslo Harbor serves as the command center where maritime cyber specialists assess global ship threats. Photo: Carl Hendon/Getty Images
“These vessel systems are incredibly intricate, making them tough to manipulate. However, AI accelerates everything,” explains Brekke-Sanderud. “How does this part function? Can I locate a password amidst this dense manual?”
Stationed at the Norwegian Shipowner Association’s headquarters along the quay of the Norwegian capital, Norma Cyber collaborates with the Norwegian Shipowner’s Risk Insurance Association (DNK).
Two years ago, these organizations united to create a Maritime Security and Resilience Centre, which surveys global threats ranging from warfare and terrorism to intellectual property violations—both physical and digital. They also conduct this work on behalf of the Norwegian government.
Norma Cyber Staff, featuring Managing Director Lars Benjamin Vold, Analyst Øystein Brekke-Sanderud, and Chief Technology Officer Øyvind Berget. Photo: Sara Aarøen Lien/The Guardian
While it is technically feasible to crash a vessel from afar, hackers aiming to sow chaos don’t necessarily need such extreme measures. According to Norma Cyber Managing Director Lars Benjamin Vold, merely halting the vessel’s operations could result in significant system failures.
Emerging evidence suggests that nations may exploit these vulnerabilities against maritime adversaries.
Oil tanker discharging ballast water is one of the vulnerabilities targeted in cyber attacks. Photo: Island Stock/Aramie
Reports indicate that Iran is investigating methods to deploy cyber assaults to disrupt ballast systems—a threat to both ships and satellite networks. An unprecedented hack occurred in April, targeting 116 Iranian VSAT modems used for satellite communications across vessels.
“When discussing nation-states, it is about their willingness to act,” Vold states. Potential “threat actors” such as Russia and China possess substantial capabilities, though these depend on their strategic objectives, which may shift rapidly.
Consequently, while threat levels remain relatively stable, maritime vulnerabilities are on the rise. “The avenues for potential exploitation are multiplying as the sector grows more digital,” Vold remarks.
Norma Cyber has also pinpointed civilian vessels, including fishing boats, research ships, and cargo carriers, used for espionage within the Baltic, North Atlantic, and Arctic regions. China-linked threat actors are reportedly using USB devices to infiltrate maritime systems, such as those from Mustang Panda.
Last year, Norma Cyber documented 239 significant cyber attacks within the maritime sector, attributing the majority to the pro-Russian group NonAME057 (16).
Svein Ringbakken, managing director of DNK’s Oslo office. Photo: Sara Aarøen Lien/The Guardian
Curiously, the rising dependence on digital technology creates a greater demand for traditional navigation skills. Following disruptions to the Baltic satellite navigation system, Finland accused Russia of being the instigator. “An experienced sailor serves as the best protection,” Vold asserts.
Yet, alongside the unseen threats of the digital realm, the maritime industry grapples with unprecedented physical challenges. Vladimir Putin’s shadow fleet, comprised of hundreds of unregulated vessels, poses a growing risk to environmental safety and the global shipping framework as it transports sanctioned crude oil primarily to China and India.
This Shadow Fleet consists of aging oil tankers obscuring their identities to evade Western sanctions. Estimates of its size range between 600 to 900 vessels according to various sources.
Finnish authorities scrutinized the Russian Shadow Fleet Oil Tanker Eagle in December 2024 due to suspected interference with power cables. Photo: Finland Border Guard/AFP/Getty
Internal threats to ships can also arise from within. Engines, elevators, and water purification systems are all vulnerable targets on board vessels. Moreover, 15% of the global crew consist of either Ukrainian or Russian members. The composition of both crews has taken on new significance since the onset of Russia’s invasion of Ukraine.
“The presence of a Russian captain on a ship delivering aid to Ukraine certainly raises concerns,” says Svein Ringbakken, managing director of DNK. “These are sensitive issues that the industry is currently addressing.”
Rhine Falkenberg Orstad, an advisor to the Norwegian Shipowner Association and an expert on the Russian Shadow Fleet. Photo: Sara Aarøen Lien/The Guardian
Rhine Falkenberg Orstad expresses concern that the increasing presence of the Shadow Fleet could foster a “parallel fleet” comprised of crew members uninformed about the intentions at sea.
If one of these vessels experiences an environmental mishap, it poses a risk to Norway’s coastline, she warns. Some ships noted as sanctioned by the US remain operational, with many being at least 15 years old. “Our apprehension is that the situation is deteriorating.”
Another significant query remains: has the entire situation permanently shifted?
“Is the shadow fleet operating outside of Western jurisdiction a new norm? Or can this trend be reversed?” Ollestad ponders. “The answer remains elusive.”
The rubber ducks maintain a vigilant watch over the security operations room at Norma Cyber. Photo: Sara Aarøen Lien/The Guardian
A demonstration will be held today outside Meta’s London office by authors and other publishing industry experts protesting the organization’s use of copyrighted books for training artificial intelligence.
Notable figures like novelists Kate Moss and Tracy Chevalier, poet Daljit Nagra, and former chairman of the Royal Literature Society, are expected to be present outside Meta’s Kings Cross office.
Protesters will gather at Granary Square at 1:30 pm, with hand-written letters to Meta by the Authors Association (SOA) planned for 1:45 pm, also to be sent to Meta’s US headquarters.
Earlier this year, Meta CEO Mark Zuckerberg allegedly approved the use of Libgen, known as the “Shadow Library,” which contains over 7.5 million books. The Atlantic recently released a searchable database of the titles in Libgen, suggesting that authors’ works may have been used to train Meta’s AI models.
SOA Chair Vanessa Fox O’Loughlin condemned Meta’s actions as “illegal, shocking, and devastating for writers.”
Vanessa added, “Books take years to write, and Meta stealing them for AI replication threatens authors’ livelihoods.”
In response, a Meta spokesperson claimed they respect intellectual property rights and believe their actions comply with the law.
Several prominent authors, including Moss, Richard Osman, Isiguro Kawako, and Val McDermid, signed a letter to Culture Secretary Lisa Nandi asking for Meta executives to appear before Congress. The petition garnered over 7,000 signatures.
Today’s protest is led by novelist AJ West, who expressed dismay at seeing their work in the Libgen database without consent.
A court filing in January revealed a group of authors suing Meta for copyright infringement, noting the impact on authors’ rights by using unauthorized databases like Libgen.
SOA’s chief executive Anna Gunley emphasized the detrimental effect of companies exploiting authors’ copyrighted works.
Protesters are encouraged to create placards and use hashtags like #MetaBookThieves, #DothewRiteThing, #MakeItfair.
The shadow of the laser beam appears as a horizontal line against a blue background.
Abrahao et al. (2024)
Usually light casts shadows on other objects, but with the help of rubies, laser beams themselves can cast shadows.
When two laser beams interact, they don’t collide like the lightsabers in the movies. star warssay Rafael Abrahao At Brookhaven National Laboratory in New York. In real life, they simply pass through each other. But Abrahao and his colleagues discovered a way for one laser beam to block another, causing its shadow to appear.
The key ingredient was ruby cubes. The researchers illuminated the cube with a green laser beam while shining a blue laser from the side. When green light passed through the ruby’s atoms, its properties changed in a unique way, which affected its response to blue light.
Atoms affected by the green light blocked the blue laser light instead of letting it pass, creating a shadow that was exactly the same shape as the green laser beam. Remarkably, the researchers were able to project blue light onto a screen and see this “laser shadow” with the naked eye.
Abrahao says he and his colleagues had a long discussion about whether what they had created was actually worthy of a shadow. Because moving the green laser beam also moved the green laser beam, we were able to see it without special equipment, and we were able to project it onto commonplace objects like markers, so we finally found a positive answer. I made a judgment.
Historically, understanding shadows has been critical to understanding what light can do and how it can be used, and this experiment has added to scientists’ light manipulation toolbox. Add unexpected technology, he says.
thomas kloba Researchers at the University of Erlangen-Nuremberg in Germany say their experiment used a known process to create an impressive visual demonstration of how materials can help control light. . For example, the interaction between lasers and rubies is similar to the interaction of materials used in laser eye surgery, and if the laser light becomes dangerously strong, it must be able to react by blocking the laser light. yeah.
When you search the hashtag “mental health” on TikTok, you’ll come across a plethora of videos discussing “shadow work.” These videos have collectively amassed over a billion views and contributed to the success of The Shadow Work Journal, written by former TikTok employee Kayla Shaheen.
Despite its peculiar nature, the shadow work trend is actually a modern interpretation of a concept introduced by Swiss psychiatrist Carl Jung in the mid-20th century.
Jung, a colleague of Sigmund Freud, shared Freud’s belief in the significance of the unconscious mind in human psychology. One of Jung’s theories about the unconscious posits that everyone has a “shadow” self – a part of us comprised of characteristics we fear or dislike. He referred to it as the “shadow” to signify its dark and undesirable nature that we can’t escape.
Jung suggested that our shadow self is revealed when we speak or act thoughtlessly, and it can also manifest in our dreams.
The purpose of shadow work is to delve deeper into understanding your shadow self, learn from it, and integrate it into your being. By doing so, you can feel more authentic and whole as your shadow is a genuine part of who you are. Jung argued that the shadow possesses valuable attributes like raw power and insight, which can enhance creativity, personal understanding, and resilience when expressed.
Shadow work involves introspective exercises to connect with your shadow. For instance, Shaheen recommends spending time in a quiet, dimly lit space, listening to your inner voice, and reflecting on the words that come to mind.
Visualization exercises are also common in shadow work, such as imagining two doors leading to your ideal self and your shadow self, and envisioning the experience of walking through each door.
While some therapists appreciate the increased interest in self-reflection, others are concerned that the portrayal of shadow work on social media lacks depth and may not fully capture Jungian psychology. Additionally, for individuals with traumatic backgrounds, reflective practices may trigger distressing emotions best addressed in a therapeutic setting.
For skeptics, Jung’s theory, like Freud’s, lacks empirical evidence and may potentially harm individuals by attributing distressing thoughts to a supposed part of themselves.
This article explores the question “What is shadow work, and can embracing your shadow self enhance mental health?” posed by Lina McBride from Norwich.
If you have inquiries, please contact us via the email address provided below. For more details:Facebook, Twitter, or Instagram(include your name and location).
Ultimate Fun Facts:Explore more fascinating science on this page.
The early crescent phase of the moon following the new moon is well located in the early spring evening sky. From February to March, the spring crescent moon looks very beautiful in the evening glow.
If you have binoculars or a small telescope, there are some things to keep in mind. Known as the clair-obscure effect, or trick of the light, this effect causes recognizable shapes to appear within a jumbled area of moonlight and shadow. Two popular examples are known as Moons X and V. These occur simultaneously at different locations along the moon’s terminator (the line that separates night and day).
We spot them in the daytime sky around 12:40 a.m. on February 17th and again at 2:20 p.m. on March 17th. The effect lasts only a few hours.
Another striking Clair Obscure effect is the Jeweled Handle. This occurs a few days after the waxing moon, when the crooked peaks of the Montes Jura (Jura Mountains) are illuminated at dawn.
These Clare Obscure effects, or tricks of light, will be visible over the next month. Go outside on a sunny day and watch them. – Image credit: Pete Lawrence
Its unique arc appears to extend into the lunar night. This can be seen with just a keen eye, but is best seen with optical aids. The jeweled handle is best observed during daylight hours on February 19 at 3:50 p.m.
If the evening of March 13 is clear, the waxing moon will appear near bright Jupiter. If the skies are clear and you can see it with just your eyes, it’s a spectacular sight.
Speaking of eyes, if you have a small telescope, look at the southern part of the moon in a few days, on March 18th. Just before 8 p.m., the oval exterior of Clavius, the large crater, is mostly dark and shrouded in shadow.
Two exceptions are the raised crater rims that are illuminated within them. These form another perspective effect known as the Eye of Clavius.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.