Risk
6/20/2012
02:41 PM
John Foley
John Foley
Slideshows
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Secret Spy Satellite Takes Off: Stunning Images

The National Reconnaissance Office provides satellite imagery for intelligence operations and national defense. Here's a look at the agency's most recent rocket launches.
Previous
15 of 15
Next


The night-time launch, in April 2011, of an Atlas V rocket from Vandenberg Air Force Base, in support of the National Reconnaissance Office's NROL-34 mission. Credit: United Launch Alliance

RECOMMENDED READING:

NASA, FAA Collaborate On Commercial Space Travel

Military Transformers: 20 Innovative Defense Technologies

DARPA Seeks Satellite Programs That Stick

U.S. Military Robots Of The Future: Visual Tour

DOD Proposes Disposable Satellites To Aid Soldiers

NASA's Blue Marble: 50 Years Of Earth Images

With SpaceX In Flight, What's Next For NASA

NASA's Next Mission: Deep Space

NASA, FAA Collaborate On Commercial Space Travel

Previous
15 of 15
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
D. Henschen
50%
50%
D. Henschen,
User Rank: Apprentice
7/21/2012 | 11:07:34 AM
re: Secret Spy Satellite Takes Off: Stunning Images
I guess it's a not-so-secret spy satellite!
Leo Regulus
50%
50%
Leo Regulus,
User Rank: Apprentice
6/22/2012 | 7:45:23 PM
re: Secret Spy Satellite Takes Off: Stunning Images
Please, I need a standard article format, or, at worst, a .pdf for this. Please Help!
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2027
Published: 2015-03-31
eGroupware before 1.8.006.20140217 allows remote attackers to conduct PHP object injection attacks, delete arbitrary files, and possibly execute arbitrary code via the (1) addr_fields or (2) trans parameter to addressbook/csv_import.php, (3) cal_fields or (4) trans parameter to calendar/csv_import.p...

CVE-2014-2830
Published: 2015-03-31
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.

CVE-2014-7876
Published: 2015-03-31
Unspecified vulnerability in HP Integrated Lights-Out (iLO) firmware 2 before 2.27 and 4 before 2.03 and iLO Chassis Management (CM) firmware before 1.30 allows remote attackers to gain privileges, execute arbitrary code, or cause a denial of service via unknown vectors.

CVE-2014-9462
Published: 2015-03-31
The _validaterepo function in sshpeer in Mercurial before 3.2.4 allows remote attackers to execute arbitrary commands via a crafted repository name in a clone command.

CVE-2014-9706
Published: 2015-03-31
The build_index_from_tree function in index.py in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a commit with a directory path starting with .git/, which is not properly handled when checking out a working tree.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.