Desolation Wilderness - Access

Access

The following is a list of trailheads that provide access to the wilderness.

The Tahoe Rim Trail and Pacific Crest Trail pass through the wilderness.

  • Loon Lake Trailhead
  • Buck Island Trailhead
  • Van Vleck Trailhead
  • Rockbound Trailhead
  • Twin Lakes Trailhead
  • Lyons Trailhead
  • Twin Bridges Trailhead
  • Ralston Trailhead
  • Echo Trailhead
  • Echo Lakes Trailhead
  • Glen Alpine Trailhead
  • Mount Tallac Trailhead
  • Bayview Trailhead
  • Eagle Falls Trailhead
  • Meeks Bay Trailhead
  • Horsetail Falls Trailhead

Permits are required for both day use and overnight camping. In the summer, a quota system is used to limit the number of visitors on any given day in the wilderness. Desolation Wilderness is one of the most heavily used protected areas in the United States.

Read more about this topic:  Desolation Wilderness

Famous quotes containing the word access:

    A girl must allow others to share the responsibility for care, thus enabling others to care for her. She must learn how to care in ways appropriate to her age, her desires, and her needs; she then acts with authenticity. She must be allowed the freedom not to care; she then has access to a wide range of feelings and is able to care more fully.
    Jeanne Elium (20th century)

    Whilst the rights of all as persons are equal, in virtue of their access to reason, their rights in property are very unequal. One man owns his clothes, and another owns a country.
    Ralph Waldo Emerson (1803–1882)

    The Hacker Ethic: Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total.
    Always yield to the Hands-On Imperative!
    All information should be free.
    Mistrust authority—promote decentralization.
    Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
    You can create art and beauty on a computer.
    Computers can change your life for the better.
    Steven Levy, U.S. writer. Hackers, ch. 2, “The Hacker Ethic,” pp. 27-33, Anchor Press, Doubleday (1984)