Feeds

Spies in the sky: The leaps and bounds from balloons to spook sats

A brief history of aerial surveillance around the globe

Top three mobile application threats

Before the SR-71 took to the skies, and as the U-2 plied its trade over hostile lands, the US was attempting to get off the ground with its most ambitious aerial reconnaissance programme - a satellite system codenamed "Corona".

Spurred by the Soviet's early lead in space with the launch of Sputnik in 1957, the ultra-secret Corona proposed the use of a Thor ballistic missile first stage and "Agena" second stage to lift a photographic payload into Earth orbit.

The project gained extra urgency following Gary Powers' capture by the Soviets in 1960, which prompted the US to cease U-2 missions over the USSR. After 13 failed mission attempts in 1959-60 - mostly revolving around launch vehicle malfunction - a Corona launch in August 1960 finally returned footage covering 2,655,000 square kilometres of territory.

The KH-4b Corona

To retrieve the precious film, Corona used the same airborne recovery system developed for Genetrix. The US Air Force's "Samos" satellite programme (1960-72), experimented with cameras which could scan and transmit images to Earth via radio, apparently to poor effect.

The considerable effort required to obtain Corona images paid off with results that were of sufficiently high definition to pinpoint key installations:

Corona image of Washington DC, with key buildings identified

US satellites continued to use recoverable film stock until until the development of the KH-11 series of satellites in the 1970s. These were the first to boast electro-optical digital imaging and, accordingly, provide real-time footage of their targets.

In 1984, a former worker at the US's Naval Intelligence Support Center leaked several KH-11 images of the Nikolaiev 444 shipyard in the Black Sea to Jane's Defence Weekly. One, showing construction of a Kiev-class aircraft carrier, demonstrated the impressive capabilities of US spy satellites:

The leaked KH-11 image showing the Nikolaiev 444 shipyard

Satellite imaging continues to advance, both in the military and civilian arenas. As commercial companies offer high-resolution snaps to the public and services such as Google Earth, the spooks are still busy with classified ops, such as last year's NROL-36 launch.

As an example of just how far the technology's come, compare a Corona image of the Sputnik launch pad at Baikonur Cosmodrome, obtained at vast effort and expense on good old-fashioned film back in the 1960s, and the same site today, available free at the click of a mouse to anyone with an internet connection:

The Sputnik launch pad, as seen by Corona and today on Google Earth

High performance access to file storage

More from The Register

next story
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
KILLER ROBOTS, DNA TAMPERING and PEEPING CYBORGS: the future looks bright!
Americans optimistic about technology despite being afraid of EVERYTHING
R.I.P. LADEE: Probe smashes into lunar surface at 3,600mph
Swan dive signs off successful science mission
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.