6 April 2021–Comparison of coda waves, the scattered waves that arrive after the direct waves of a seismic event, can be used to determine the relative locations of two underground explosions, according to a new study published in the open-access journal The Seismic Record. The technique, called coda wave interferometry, … Continue Reading »
22 March 2021—Seismological Research Letters papers on the 2019 Ridgecrest, California earthquake sequence and papers on seismological tools and instrumentation were among the top-cited papers from the journal published in 2020. The ranking of all papers noted below reflect citation and download numbers through 31 January 2021: D.R. Shelly “A … Continue Reading »
17 March 2021–The NASA-funded Seismometer to Investigate Ice and Ocean Structure (SIIOS) performed well in seismic experiments conducted in snowy summer Greenland, according to a new study by the SIIOS team led by the University of Arizona published this week in Seismological Research Letters. SIIOS could be a part of … Continue Reading »
4 March 2021–the first half of 2020, the U.S. Intermountain West region of the United States experienced four significant earthquake sequences, spanning multiple states. In the new issue of SRL, 15 papers characterize these major earthquakes and discuss how they are helping seismologists gain new insights into the tectonics of … Continue Reading »
1 March 2021–Five papers from BSSA’s special section on the 2019 Ridgecrest, California earthquake sequence were the top-cited papers from the journal published in 2020. The ranking of all papers noted below reflect citation and download numbers through 31 January 2021: 1.DuRoss. et al. “Surface Displacement Distributions for the July … Continue Reading »
10 February 2021–Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt data collection and processing, say researchers who have probed the devices for weak points. Common security issues such as non-encrypted data, insecure protocols, and poor user authentication mechanisms are among the biggest culprits that … Continue Reading »