The use of stealth techniques and technologies to reduce the signatures of intelligence or military satellites a subject that seems to be properly classified, for the most part. But it has also left discernable traces in the public domain.
Those traces were assembled by Allen Thomson in his Stealth Satellite Sourcebook (pdf), which has been recently updated (148 pages, 7 MB PDF file).
See also “Stealth satellites: Cold War myth or operational reality?” by John Croft, C4ISR Journal, October 4, 2006.
The FY2026 National Defense Authorization Act (NDAA) paints a picture of a Congress that is working to both protect and accelerate nuclear modernization programs while simultaneously lacking trust in the Pentagon and the Department of Energy to execute them.
For Impact Fellow John Whitmer, working in public service was natural. “I’ve always been around people who make a living by caring.”
While advanced Chinese language proficiency and cultural familiarity remain irreplaceable skills, they are neither necessary nor sufficient for successful open-source analysis on China’s nuclear forces.
To maximize clean energy deployment, we must address the project development and political barriers that have held us back from smart policymaking and implementation that can withstand political change. Here’s how.