Risk
11/22/2010
01:52 PM
Connect Directly
RSS
E-Mail
50%
50%

Air Force Launches Enormous Spy Satellite

A Delta IV Heavy rocket lifted off Sunday on a top-secret defense mission, according to the National Reconnaissance Office.




Slideshow: Next Generation Defense Technologies
(click for larger image and for full slideshow)

The Air Force over the weekend launched what is believed to be the largest-ever spy satellite on a top-secret mission for the National Reconnaissance Office (NRO).

A Delta IV Heavy rocket took off from Cape Canaveral Air Force Station in Florida on Sunday in a national defense mission, according to the United Launch Alliance (ULA), a joint venture between Boeing and Lockheed Martin that constructed the satellite.

While the NRO, which is leading the satellite's mission, said little about what it will be doing in space other than commenting on the satellite's size, published reports said it is likely to be eavesdropping for the National Security Agency (NSA).

More specifically, the payload, which includes an array of radio receivers and a massive antenna, is believed to be aimed at intercepting communications for the NSA, reports said.

It was the fourth Delta IV Heavy launch for the ULA; there have been 351 rockets launched so far in the Delta program. The alliance has launched 45 missions in the 48 months since its inception on Dec. 1, 2006.

The mission is ULA's last for this year; the next launch is scheduled for Jan. 11, 2011 from Vandenberg Air Force Station in California.

The satellite launched Sunday features a center common booster core with two strap-on common booster cores, each one powered by the RS-68 cryogenic engine, according to ULA. The second stage of the launch was powered by an RL10B-2 Rocketdyne. ULA built the Delta Heavy launch vehicle in Decatur, Ala., one of its several locations.

ULA program management, engineering, test, and mission support functions are based in Denver. In addition to its location in Decatur, manufacturing, assembly, and integration also happens in Harlingen, Texas, and San Diego. ULA rockets typically launch from either Cape Canaveral or Vandenburg.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2003-1598
Published: 2014-10-01
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.

CVE-2011-4624
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.

CVE-2012-0811
Published: 2014-10-01
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files gene...

CVE-2014-2640
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 7.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2014-2641
Published: 2014-10-01
Cross-site request forgery (CSRF) vulnerability in HP System Management Homepage (SMH) before 7.4 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.