Skip to main content

Secrets Behind Area 51

Wiki-Area 51.jpg



One rule to follow in hunting secret Airplanes: Avoid cows. The highways that border Area 51, the U.S. Air Force’s secure flight-test base in Nevada, are fence-free, and cows are poor judges of distance—and they are stealthy. As locals say, “They got tan ones for the day and black for night.” I’m a cautious driver and never had a close call, but it’s easy to see how you could get in trouble there at 70 mph.
Seeing Area 51 today is more difficult than it was before 1994, when the government annexed a 4,000-acre vantage point that had been named Freedom Ridge by the Minister, the Ayatollah, PsychoSpy, Agent X, and Hand—a loose community of volunteers, about as unconventional as the Bellman’s crew in Lewis Carroll’s nonsensical poem “Hunting of the Snark.” The closest open vantage point is now a mile more away, and about nine miles from the base. Moreover, the chances of seeing anything are small. In 2002, when the Air Force declassified the Boeing Bird of Prey, a stealth  demonstrator, it was disclosed that in its three-year test career, it flew only 36 times. Lockheed’s F-117 was easier to spot: Almost 50 were built before the stealth fighter was declassified in 1988.
If you are a lucky snark hunter, there is recorded or confirmed evidence to guide you. I am looking at a photo of an unidentified aircraft over the southwestern United States. I know and trust the source, but the photo is taken at a great distance and all I can say is that it isn’t anything we know about.
Dealing with fragmentary evidence is a common problem. Despite dedicated efforts to learn more, the sighting of a slender triangular aircraft over the North Sea in 1989 and a series of mysterious sonic booms over Los Angeles in 1991 and 1992 remain undebunked. But are they both linked to the same project, the high-speed airplane dubbed Aurora? An Air Force study claimed the booms were caused by F-4 Phantoms. I like both pieces of evidence because they are exactly the kind of thing that would be easily overlooked by an opsec—operational security—team. Would the Air Force expect to encounter an aircraft recognition expert in the middle of the North Sea? Or realize that CalTech geologists had just networked all their seismographs across the Los Angeles basin and thereby inadvertently created a primitive acoustic aircraft-tracker?
If the military clearly needs something but there is no sign of it, the absence could indicate a secret program. Every military has wanted a stealthy drone, since ordinary ones lack the all-round vision system or technology to sense or evade threats. So it was not surprising when in 2009 photos appeared of the RQ-170—a stealthy drone—flying out of Kandahar in Afghanistan.
Reassembling the story of stealthy drones leads the hunter back to a cold war monster code-named Quartz that was cancelled in 1992 when neither the Air Force nor the intelligence community wanted to pay the bill. A mini-Quartz emerged in 1996 as the Lockheed Martin DarkStar. After that was cancelled, a successor was inevitable.
The need for a bigger stealthy spy drone remained unaddressed, which leads to another snark-hunting lesson: During the life cycle of a project, classification levels change. In the early 2000s, Northrop Grumman was positively chatty about the potential versions of the “cranked-kite” shape of its X-47B unmanned aircraft. So when the Air Force announced that money was going into a classified project, and Northrop Grumman announced a spike in restricted earnings, and my colleague at Aviation Week & Space Technology, Amy Butler, heard about a secret project called RQ-180, putting the story together was not hard: The RQ-180 most likely uses an adaptation of the X-47B’s shape, with longer wings.
For the snark hunter, the Internet is invaluable. With Google Earth, you can scan historical imagery with the click of a slider, and measure objects very accurately. Hunters observed that Northrop Grumman had put covers over two little-used engine test pits in Palmdale, California, around 2009, and that each would fit an aircraft with a 130-foot wingspan. So does a new hangar at Area 51. And both the pits and the hangar fit the wingspan of the RQ-180.
It’s not as adventurous as camping out on Freedom Ridge. But it’s cow-free.

Area 51 and the Aliens



dek


We may have Tang thanks to the space program, but who gave us such innovations as the Stealth fighter and Kevlar? Aliens, of course. Conspiracy theorists believe that the remains of crashed UFO spacecrafts are stored at Area 51, an Air Force base about 150 miles from Las Vegas, where government scientists reverse-engineer the aliens' highly advanced technology. Fodder for this has come from a variety of supposed UFO sightings in the area and testimony from a retired Army colonel who says he was given access to extraterrestrial materials gathered from an alien spacecraft that crashed in Roswell, N.M. Some believe that the government studies time travel at Area 51, also known as Groom Lake or Dreamland.
The government has developed advanced aircraft and weapons systems at nearby Nellis Air Force Base, including Stealth bombers and reconnaissance planes. And the government's official line — that the details of Area 51 are classified for purposes of national security — is only seen as further proof that the military is hiding aliens or alien spacecraft.

Comments

Popular posts from this blog

How Secure Are You Online

Think you do enough to secure your passwords, browsing, and networking? Prove it. Not all computer security is about tin foil hats and anonymous browsing. Everyone who uses a computer has a horse in the security race. For the purpose of this post, we're breaking down online security into four essential parts: passwords, browsers, at-home Wi-Fi and networking, and browsing on public Wi-Fi. Within those categories we'll give you a checklist of everything you should do, from the bare minimum to the tin-foil-hat best.Think you've done your due diligence with your security? Jump to any of the four sections below to see how you stack up (and boost your security where you may be lacking): Password Security Checklist Browser Security Checklist Home Network Security Checklist Public Wi-Fi Security Checklist Password Security Checklist Password security has been  popping up   a lot   in the news  recently, but how much you should care is entirely dependent on

How To Use Dark Theme In Windows 10

Windows offers a setting named Dark Mode that applies a dark theme to apps you get from the Windows Store. It doesn’t affect most desktop apps, or tools like File Explorer, but we’ve got some other solutions for those. Here’s how to get your whole desktop (or as much as possible) looking dark. Enable Dark Mode for Windows 10 Settings and Apps To enable Dark Mode, head to Settings > Personalization > Colors. Scroll down and select the “Dark” option under the “Choose your app mode” section. The Settings application itself immediately turns dark, as will many other “Universal Windows Platform” applications (those you get from the Windows Store). However, it’s up to each developer to support Dark Mode, and many do not. And, as we mentioned before, this option doesn’t affect most desktop applications, including Windows 10’s File Explorer. Those remain white. A few desktop applications, including Paint.NET, do respect this setting—but most don’t. Enable Dark Mode in M

Dark Web

 What does  Dark Web  mean? The dark Web is comprised of websites that are visible to the public, but their IP address details are intentionally hidden. These websites can be visited by anyone on Internet, but it is not easy to find the server details on which the corresponding site is running, and it is difficult to track the one hosting the site. The dark Web concept is achievable with the help of anonymity tools. Some popular tools are Tor and I2P. The dark Web is popular for both black market and user protection, so it has both positive and negative aspects. The dark Web ensures one’s privacy by effectively hiding the server or IP details from the public. The dark Web requires special kinds of software to access. This software acts as a gateway to the dark Web. Once the user gains access, then all the dark websites and other services can be accessed in a simple way with help of browsers. The dark Web includes a wide range of networks, from small, friend-to-friend/p