Feeds

Spies in the sky: The leaps and bounds from balloons to spook sats

A brief history of aerial surveillance around the globe

Securing Web Applications Made Simple and Scalable

The Soviet menace....

As the dust settled on WW2, the West turned its attention to the Soviet threat. The US obsession with what exactly was going on behind Iron Curtain prompted it to sink huge resources into three lines of surveillance attack.

A Skyhook balloonThe first was an evolution of the balloon platform, which used the US Navy's enormous "Skyhook" meteorological globes (pictured) as a basis for dispatching camera gondolas over the Soviet Union.

In 1956, the resulting "WS-119L" system was ready to fly into enemy airspace, under the codename "Genetrix". The balloon was designed to float at around 16,800m for airborne payload recovery by a converted C-119F cargo aircraft.

For the effort and expense required, the results from Genetrix were modest. Almost 450 balloons were launched, of which around 380 actually reached their target airspace, where 300 were either shot down or came down prematurely due to malfunction.

Simultaneously, work was progressing on the U-2, whose high altitude capability was intended to keep it out of range of Soviet fighters and surface-to-air missiles.

While the WW2 reconnaissance Spitfires and Mosquitos relied largely on speed for safety, the U-2's modest 690km/h cruise speed wasn't though to be an issue at its 70,000 feet operating altitude.

A U-2 'Dragon Lady' takes off from the Osan Air Base, South Korea, flightline Oct. 21, 2009, during the base Air Power Day air show. (U.S. Air Force photo/Staff Sgt. Brian Ferguson)

The first U-2 overflight of the Soviet Union was in July 1956. Notable successes during the aircraft's career included the revelation of Baikonur Cosmodrome to US eyes, and identification of Russian missile sites during the Cuban missile crisis in 1962.

Russian missile site on Cube as seen from a U-2

However, the belief that altitude alone meant immunity from enemy intervention proved erroneous, as pilot Gary Powers found out when he was downed over Sverdlovsk in May 1960 by an S-75 Dvina surface-to-air missile.

The capture of Powers and the remains of his aircraft proved a huge embarrassment to the US. In October 1962, Major Rudolf Anderson was killed when his U-2 was downed over Cuba, again by an S-75 Dvina. To address the U-2's shortcomings, work began on the SR-71.

SR-71 'Blackbird' during testing. Pic: US Air Force

The SR-71's 25,900m ceiling was impressive, but its Mach 3.3 (approx 3,530 km/h) top speed allowed it to simply outrun the opposition, including missiles.

It first flew in December 1964, completing over 3,500 mission sorties (all variants) until its swansong flight in 1999. Of the 32 examples built, 12 were lost to accidents, and none to enemy action.

Like the U-2 over Cuba, the aircraft proved a useful tool in providing evidence of Soviet activity in America's back yard. In 1982, the US released an SR-71 photo of enemy merchant ships in Corinto, Nicaragua, as part of its campaign to demonstrate the USSR's backing of the Sandanista government:

SR-71 image of Corinto, Nicaragua, showing soviet merchant veaasels

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
MARS NEEDS OCEANS to support life - and so do exoplanets
Just being in the Goldilocks zone doesn't mean there'll be anyone to eat the porridge
Diary note: Pluto's close-up is a year from … now!
New Horizons is less than a year from the dwarf planet
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.