Risk
11/22/2010
01:52 PM
Connect Directly
RSS
E-Mail
50%
50%

Air Force Launches Enormous Spy Satellite

A Delta IV Heavy rocket lifted off Sunday on a top-secret defense mission, according to the National Reconnaissance Office.




Slideshow: Next Generation Defense Technologies
(click for larger image and for full slideshow)

The Air Force over the weekend launched what is believed to be the largest-ever spy satellite on a top-secret mission for the National Reconnaissance Office (NRO).

A Delta IV Heavy rocket took off from Cape Canaveral Air Force Station in Florida on Sunday in a national defense mission, according to the United Launch Alliance (ULA), a joint venture between Boeing and Lockheed Martin that constructed the satellite.

While the NRO, which is leading the satellite's mission, said little about what it will be doing in space other than commenting on the satellite's size, published reports said it is likely to be eavesdropping for the National Security Agency (NSA).

More specifically, the payload, which includes an array of radio receivers and a massive antenna, is believed to be aimed at intercepting communications for the NSA, reports said.

It was the fourth Delta IV Heavy launch for the ULA; there have been 351 rockets launched so far in the Delta program. The alliance has launched 45 missions in the 48 months since its inception on Dec. 1, 2006.

The mission is ULA's last for this year; the next launch is scheduled for Jan. 11, 2011 from Vandenberg Air Force Station in California.

The satellite launched Sunday features a center common booster core with two strap-on common booster cores, each one powered by the RS-68 cryogenic engine, according to ULA. The second stage of the launch was powered by an RL10B-2 Rocketdyne. ULA built the Delta Heavy launch vehicle in Decatur, Ala., one of its several locations.

ULA program management, engineering, test, and mission support functions are based in Denver. In addition to its location in Decatur, manufacturing, assembly, and integration also happens in Harlingen, Texas, and San Diego. ULA rockets typically launch from either Cape Canaveral or Vandenburg.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2021
Published: 2014-10-24
Cross-site scripting (XSS) vulnerability in admincp/apilog.php in vBulletin 4.4.2 and earlier, and 5.0.x through 5.0.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted XMLRPC API request, as demonstrated using the client name.

CVE-2014-3604
Published: 2014-10-24
Certificates.java in Not Yet Commons SSL before 0.3.15 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVE-2014-6230
Published: 2014-10-24
WP-Ban plugin before 1.6.4 for WordPress, when running in certain configurations, allows remote attackers to bypass the IP blacklist via a crafted X-Forwarded-For header.

CVE-2014-6251
Published: 2014-10-24
Stack-based buffer overflow in CPUMiner before 2.4.1 allows remote attackers to have an unspecified impact by sending a mining.subscribe response with a large nonce2 length, then triggering the overflow with a mining.notify request.

CVE-2014-7180
Published: 2014-10-24
Electric Cloud ElectricCommander before 4.2.6 and 5.x before 5.0.3 uses world-writable permissions for (1) eccert.pl and (2) ecconfigure.pl, which allows local users to execute arbitrary Perl code by modifying these files.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.