Feeds

US space dirty-tricks spysat spying sat is go for July

Crafty Antipodean orbit shifts now harder to manage

Top three mobile application threats

Important satellite taken out 'by accident'... it's happened already. Doubtless a coincidence

Thus there have been some efforts to fit satellites with subsidiary payloads that might allow them to know if they came under attack, and others intended to endow them with the ability to call home even where no suitable US military ground stations or relay sats are available.

Detail (not much) of the sensor fitted to the SBSS satellite. Credit: Ball Aerospace

As much detail as anyone's willing to let us see of the SBSS sensor.

The SBSS is supposed to go a step further, by placing a dedicated watcher satellite in a high orbit, able to scan the space above much of an entier hemisphere. The SBSS is equipped with "a digital sensor mounted on a high-speed gimbal", allowing it to quickly get a lock on an interesting spacecraft without needing to swivel the whole craft.

The overwatching SBSS could thus alert its Space Superiority controllers if it saw a foreign spy bird changing orbit for an unexpected run above Groom Lake, for instance. It could also track a potential sat-busting weapon as it snuck up on an unsuspecting, critical US asset: for instance a GPS nav-sat, or - just to pluck a situation from the air - an Iridium commercial comms platform of the sort sometimes so important to spooks, submarines, special-forces troops etc*. Funnily enough an Iridium bird was destroyed in a reportedly accidental collision with an old Russian sat just last year.

"The SBSS is ready to perform its mission in space," says Colonel J R Jordan, vice-commander of the Space Superiority Wing.

Deliberate meddling with another nation's satellites is of course totally forbidden by international agreement. Nonetheless it seems that the US intends to be ready for possible surreptitious violations.

There are even some indications that America might not be above a little bit of unattributable orbital naughtiness itself at some point in the future. ®

*The Iridium satcomms constellation is the only one that can be used without a correctly-oriented dish, ie by a small buoy released from a submarine, or a covert agent or spec-ops detachment far from normal comms facilities. Unsurprisingly Iridium was saved from commercial failure by the US government once it became clear that GSM roaming would be easier for ordinary folk to use.

High performance access to file storage

More from The Register

next story
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
R.I.P. LADEE: Probe smashes into lunar surface at 3,600mph
Swan dive signs off successful science mission
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.