The three satellites were designated Kosmos-2496, -2497, -2498. However, as in the previous launch on December 25, 2013, the fourth unidentified object was detected orbiting the Earth a few kilometers away from “routine” Rodnik satellites.
Moreover, an analysis of orbital elements from a US radar by observers showed that the “ghost” spacecraft had made a maneuver between May 29 and May 31, 2014, despite being identified as “debris” (or Object 2014-028E) in the official US catalog at the time. On June 24, the mysterious spacecraft started maneuvering again, lowering its perigee (lowest point) by four kilometers and lifting its apogee by 3.5 kilometers. Object E then continued its relentless maneuvers in July and its perigee was lowered sharply, bringing it suspiciously close to the Briz upper stage, which had originally delivered all four payloads into orbit in May.
This is the second time a Russian piece of orbital junk has suddenly started to do maneuvers. The first time, in early 2014, the Russians finally admitted five months after launch that the “junk” was actually a satellite. In both cases, the Russians have not told anyone what these satellites are designed to do, though based on the second satellite’s maneuvers as well as its small size (about a foot in diameter) it is likely they are testing new cubesat capabilities, as most cubesats do not have the ability to do these kinds of orbital maneuvers.
Once you have that capability, you can then apply it to cubesats with any kind of purpose, from military anti-satellite technology to commercial applications.
2600—named for the frequency that allowed early hackers and “phreakers” to gain control of land-line phones—is the photocopier to Snowden’s microprocessor. Its articles aren’t pasted up on a flashy Web site but, rather, come out in print. The magazine—which started as a three-page leaflet sent out in the mail, and became a digest-sized publication in the late nineteen-eighties—just celebrated its thirtieth anniversary. It still arrives with the turning of the seasons, in brown envelopes just a bit smaller than a 401k mailer.
“There’s been now, by any stretch of the imagination, three generations of hackers who have read 2600 magazine,” Jason Scott, a historian and Web archivist who recently reorganized a set of 2600’s legal files, said. Referring to Goldstein, whose real name is Eric Corley, he continued: “Eric really believes in the power of print, words on paper. It’s obvious for him that his heart is in the paper.”
2600 provides an important forum for hackers to discuss the most pressing issues of the day—whether it be surveillance, Internet freedom, or the security of the nation’s nuclear weapons—while sharing new code in languages like Python and C.* For example, the most recent issue of the magazine addresses how the hacking community can approach Snowden’s disclosures. After lampooning one of the leaked N.S.A. PowerPoint slides (“whoever wrote this clearly didn’t know that there are no zombies in ‘1984’ ”) and discussing how U.S. government is eroding civil rights, the piece points out the contradictions that everyone in the hacking community currently faces. “Hackers are the ones who reveal the inconvenient truths, point out security holes, and offer solutions,” it concludes. “And this is why hackers are the enemy in a world where surveillance and the status quo are the keys to power.”
Memory fault -- brain fried