Risk
6/20/2012
02:41 PM
John Foley
John Foley
Slideshows
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Secret Spy Satellite Takes Off: Stunning Images

The National Reconnaissance Office provides satellite imagery for intelligence operations and national defense. Here's a look at the agency's most recent rocket launches.
Previous
1 of 15
Next


The U.S. government's newest spy satellite launched Wednesday from Cape Canaveral, Fla., the second of four launches planned this year by the National Reconnaissance Office. NRO called the launch "flawless."

The NRO, which serves the Department of Defense and the U.S. Intelligence Community, hasn't actually acknowledged that a satellite is on board the Atlas V rocket, built by United Launch Alliance, a joint venture between Lockheed Martin and Boeing. The partners refer only to the mission's "national security payload."

The launch of NROL-38 (the current mission number) had been scheduled for June 16 but was scrubbed at the launch pad when a problem with the rocket's environment control system duct was discovered. The rescheduled launch, pictured here, went without a hitch at 8:28 a.m. at Cape Canaveral.

On April 3, the NRO launched another intelligence payload aboard a United Launch Alliance Delta IV rocket from Vandenberg Air Force Base in California. Two more missions are slated for the next six weeks. Last year, the NRO funded six launches.

The NRO provides satellite imagery to the DOD and U.S. intelligence agencies, as well as to the departments of State and Justice and other civilian agencies. According to Congressional testimony in March by Betty Sapp, principal deputy director of the NRO, the agency last year provided intelligence that aided in the killing or capture of "high-value targets" in more than a dozen operations and supported counterterrorism and anti-piracy efforts, among other scenarios. Its images are also used by scientists to study the environment, oil spills, and natural disasters.

The agency's next mission, NROL-15, is designed to carry a bigger payload than NROL-38. It will be hoisted by a Delta IV rocket, which United Launch Alliance co-developed with the Air Force, in a "heavy configuration" for payloads of up to 25 tons. NROL-15 is scheduled to launch June 28 from Cape Canaveral.

United Launch Alliance, formed in 2005, provides rockets and launch services to other government customers, as well. Over the past 12 months, it has sent rockets aloft for the Air Force, Navy, and NASA.

The Lockheed-Boeing partnership is getting into the commercial space transportation business as well. In April, it announced the formation of a Human Launch Services Organization, which has a mandate of carrying astronauts into low-Earth orbit and deeper into space.

Last year marked the 50th anniversary of the NRO, and details of the agency's secretive operations have gradually emerged. Last week, the agency released a previously top secret report on the nineteen-year history of its earliest satellite system, the so-called Poppy system. That program concluded in 1977.

Photo credit: United Launch Alliance

Previous
1 of 15
Next
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Leo Regulus
50%
50%
Leo Regulus,
User Rank: Apprentice
6/22/2012 | 7:45:23 PM
re: Secret Spy Satellite Takes Off: Stunning Images
Please, I need a standard article format, or, at worst, a .pdf for this. Please Help!
D. Henschen
50%
50%
D. Henschen,
User Rank: Apprentice
7/21/2012 | 11:07:34 AM
re: Secret Spy Satellite Takes Off: Stunning Images
I guess it's a not-so-secret spy satellite!
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4594
Published: 2014-10-25
The Payment for Webform module 7.x-1.x before 7.x-1.5 for Drupal does not restrict access by anonymous users, which allows remote anonymous users to use the payment of other anonymous users when submitting a form that requires payment.

CVE-2014-0476
Published: 2014-10-25
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

CVE-2014-1927
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928....

CVE-2014-1928
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulner...

CVE-2014-1929
Published: 2014-10-25
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.