Feeds

US Navy cuts ELF radio transmissions

Environmentalists welcome decision

  • alert
  • submit to reddit

Intelligent flash storage arrays

The US Navy has called time on all its Extremely Low Frequency transmissions, saying that improvements in technology means that the communications system is now unneccessary.

The Navy used ELF transmissions - defined as the band of frequencies between 0Hz and 300Hz - for secure communications with submarines. The very low frequencies mean that the signal can penetrate far below the surface of the sea, reaching the deeply submerged vessels. The thought behind the project was that in the event of a nuclear attack by the USSR the US would be able to instruct its nuclear fleet to retaliate, without having to wait for the submarines to surface.

First proposed in 1968, the original specifications for ELF transmitters called for the antennae to cover an area of 22,500 miles - bigger than Belgium and the Netherlands combined. This was scaled down considerably, thanks to advances in technology and an assemement of the impact such a large electric field could have on local animal, and human, populations.

The Navy ran two transmission sites: one in Wisconsin, the other in Michigan. The ELF transmitters are huge structures, composed of power lines that stretch through the forests for up to 28 miles each. Big, but still small fry compared to the original plans.

The project was almost cancelled in the late 70s, but President Reagan revived it and it became operational in 1989. It is widely regarded as a relic of the Cold War. Philip Coyle, former under secretary of defense, now with the Centre for Defence Information told Michigan Public Radio: "This is a Cold War system, and the Cold War is over."

The Navy says new technology means the ELF system is no longer neccessary, and that it will switch to using a combination of satellites and Very Low Frequency (3-30kHz) transmitters instead.

Local residents say the closure of the centres will mean the loss of around 60 jobs, but environmentalists and anit-nuclear campaigners have welcomed the decision. ®

Related stories

US Emergency Alert System open to hack attack
UK scientists roll out Wi-Fi proof wallpaper
Dutch downplay 3G health scare study
Magnetic fields may cause childhood cancer

Providing a secure and efficient Helpdesk

More from The Register

next story
GRAV WAVE DRAMA: 'Big Bang echo' may have been grit on the scanner – boffins
Exit Planet Dust on faster-than-light expansion of universe
Mine Bitcoins with PENCIL and PAPER
Forget Sudoku, crunch SHA-256 algos
SpaceX Dragon cargo truck flies 3D printer to ISS: Clawdown in 3, 2...
Craft berths at space station with supplies, experiments, toys
NASA rover Curiosity drills HOLE in MARS 'GOLF COURSE'
Joins 'traffic light' and perfect stony sphere on the Red Planet
'This BITE MARK is a SMOKING GUN': Boffins probe ancient assault
Tooth embedded in thigh bone may tell who pulled the trigger
DOLPHINS SMELL MAGNETS – did we hear that right, boffins?
Xavier's School for Gifted Magnetotaceans
Big dinosaur wowed females with its ENORMOUS HOOTER
That's right, Doris, I've got biggest snout in the prehistoric world
Japanese volcano eruption reportedly leaves 31 people presumed dead
Hopes fade of finding survivors on Mount Ontake
That glass of water you just drank? It was OLDER than the SUN
One MEELLION years older. Some of it anyway
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.