SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Tuesday, December 15, 1998

                     ANTI-STEALTH TECHNOLOGY
                                by Cyrus Mehta and Ardeshir Mehta


Summary
      Modern military stealth technology is based on the principle that stealthy craft remain invis-
ible to detecting radar and infrared sensors, especially at long ranges.

      Such technology can be entirely nullified by the detecting radar and/or infrared sensors search-
ing, not for the stealthy craft itself, but for the background behind the stealthy craft. The stealth
craft will then show up in the form of a black or blank silhouette in front of the background.

     This is much like the way one can pinpoint with extreme accuracy the location of the moon
during a solar eclipse, and track its movement with great precision, even though during a solar
eclipse one cannot observe the moon itself.

     (N.B.: The remainder of this document describes the detailed methods one might use to detect
the background behind stealth craft. Thus it is not necessary to read the entire document in order to
grasp the principle of Anti-Stealth Technology, though one may of course do so to dispel all scep-
ticism as to its practicability.)

     ***

Basic Principles of Modern Stealth Technology
      Military stealth technology — such as is used, for example, in the B-2 bomber, the F-117
fighter-bomber and the F-22 fighter, and as is intended for the future Comanche helicopter, and the
next-generation tank which is intended to replace the current M1A2 Abrams tank — is based on the
principle that the stealthy craft remains invisible to detecting radar and infrared sensors, especially
at long ranges.

     With respect to radar, this is accomplished, in basic principle, by the stealthy craft absorbing
almost all the radar waves emanated by detecting radar sources, and/or reflecting or deflecting the
detecting radar in direction(s) other than towards the detecting sensors. With respect to infrared, the
objective of stealth is achieved, in basic principle, by the stealthy craft minimising heat from its
engines and other heat-emitting spots.

      As a result of applying the above principles, detecting sensors searching for a stealthy craft
cannot detect any radar or infrared signal emanating from the craft, except perhaps at very close
distances, when it may already be too late to do anything about it from a military viewpoint. The
craft, therefore, cannot be observed by radar or infrared sensors.
ANTI-STEALTH TECHNOLOGY




                                                                                                             PA
                                                                                                              G
                                                                                                                  E
                                                                                                                  2
Principle of Nullification of Stealth Technology
      This kind of stealth technology can, however, be entirely nullified by the detecting radar and/




                                                                                                                      by Cyrus Mehta and Ardeshir Mehta
or infrared sensors searching, not for the stealthy craft itself, but for the background behind the
stealthy craft!

     This is much like the way one can pinpoint with extreme accuracy the location of the moon
during a solar eclipse, and track its movement with great precision, even though during a solar
eclipse one can’t observe the moon itself.

     If this principle were applied for detecting stealth craft, any observed eclipsing of the back-
ground would indicate that a stealth craft must be located in front of that part of the background
which is being eclipsed. Such an eclipsing would show up on the detecting screen or output device
in the shape of a black or blank silhouette of the stealth craft.

1. Airborne Method
     One way to accomplish the above is for the detecting forces to fly a high-flying aircraft fur-
nished with SLAR (Side-Looking Airborne Radar) and/or FLIR (Front-Looking Infra-Red) equip-
ment to map out the terrain below and to one side, or to the front. If a stealth craft were operating
anywhere above the terrain being mapped, a small patch of terrain, which the stealth craft would
perforce eclipse, would not be observed on the detecting aircraft’s output screen. That particular
spot would appear black or blank, and more or less in the shape of a silhouette of the stealth craft:
thereby pinpointing the stealth craft’s position within the field of vision of the detecting aircraft.

      The initial detection of a distant stealth craft might be slow, since until the craft were detected,
the equipment would have to scan the entire terrain over which the craft might be located. How-
ever, once that location were pinpointed, the craft could be tracked much more swiftly and accu-
rately by zooming in on that location and some of its surrounding area, and scanning only that
relatively small part of the field of vision. This would enable the searching equipment to generate
much more detailed images of the silhouette of the craft in question, perhaps even identifying the
craft by that silhouette.

     If, in addition, the SLAR or FLIR equipment were furnished with rangefinder capability (as
many such are), the exact position of the stealth craft in three dimensions could also be determined.
This would not greatly matter, of course, if the stealth craft were a land vehicle (like a tank); but in
the case of aircraft such data could provide very valuable information from a military point of view.
And with modern computers this position could be calculated very swiftly indeed: almost instanta-
neously.

2. Satellite-Based Method
     The same method may be used looking down on the battlefield from satellites equipped with
radar sensors. Although satellites would be relatively far away from the battlefield — a couple of
hundred miles away, or even more — they would be able to remain out of range of most hostile
weapons, and thus would not run much risk of being shot down, as might aircraft. Also, satellites
ANTI-STEALTH TECHNOLOGY




                                                                                                               PA
                                                                                                                G
                                                                                                                    E
                                                                                                                    3
would be able to cover a much larger area of the battlefield, thus being in a position to locate and
track virtually all hostile stealth craft.




                                                                                                                        by Cyrus Mehta and Ardeshir Mehta
3. Surface-Based Method
      Yet another way of detecting a stealth aircraft would be for surface-based radar installations to
scan the sky at high apertures and with high sensitivity, such as is done with radio telescopes.
(Since such installations would be surface-based, even if they had to be substantially large and/or
heavy to adequately accomplish this task, their size and weight would not be a serious deterrent to
their accomplishing it.) As is well known to radio astronomers, even in daytime or in bad weather,
radio signals from the stars would reach the radar installations uninterrupted. Since the radio map
of the stars is by now very well known, it may be assumed that if any star is not observed on the
detecting screen or output device, that particular star must be eclipsed by some craft flying above
the installation somewhere along the line of sight between the installation and that particular star.

     And with very sensitive radio-astronomical equipment, virtually every part of the sky is ob-
served to be covered with stars! Therefore at almost every instant in time, the stealth aircraft would
be eclipsing one or another known star.

      Even if less sensitive detecting equipment were used, so that the time it took to record the
stellar images was greater than the time it took for an aircraft to entirely eclipse a particular star,
that star would still show up on the detecting screen somewhat fainter than it would otherwise if it
had not been eclipsed by the aircraft for a part of the time it took for the radio waves from it to be
gathered. Thus by calibrating the detecting equipment to search for those stars whose radio images
appear to be fainter than usual (as determined by standard radio maps of the sky), the position of the
eclipsing aircraft could be determined swiftly, even with equipment of less than stellar perform-
ance. Indeed the limit of sensitivity of the equipment as a whole would be determined, not by the
sensitivity of the radio signal gathering device, but by the sensitivity of the equipment which de-
tects the difference in intensity of the actual signals from particular stars compared to their intensity
as indicated by the standard radio map of those same stars.

     And as with the airborne method, although the initial detection of a distant stealth aircraft
might be slow, once its location were pinpointed, the aircraft could be tracked much more swiftly
and accurately by zooming in on that location and some of surrounding area.

      If more than one detecting installation were used, by a process of triangulation the exact loca-
tion in three dimensions of all aircraft — friendly as well as hostile — within the fields of vision of
the relevant installations could be determined with great accuracy. And as mentioned earlier, with
modern computers such a determination could be arrived at almost instantaneously.

     With the passage of time, the specific stars being eclipsed by any particular aircraft would
change in a manner consistent with the aircraft’s trajectory. Thus by accurately observing the time
intervals between sequentially-eclipsed stars, coupled with an exact knowledge of the radio-astro-
nomical map, the aircraft’s trajectory could easily and quickly — almost instantly — be calculated,
especially if powerful computers were utilised to calculate it.

     If, in addition, the locations of all the friendly aircraft within the field of vision of the installa-
ANTI-STEALTH TECHNOLOGY




                                                                                                              PA
                                                                                                               G
                                                                                                                   E
                                                                                                                   4
tion are also known, it may be assumed that hostile aircraft must be eclipsing those stars not show-
ing up on the screen which cannot be accounted for by friendly aircraft. Thus by a process of
elimination, the location of all hostile aircraft, and not just hostile stealth aircraft, could be deter-
mined. This would be an advantage of the surface-based method as opposed to the airborne method




                                                                                                                       by Cyrus Mehta and Ardeshir Mehta
described earlier. And, of course, with modern computers all the above calculations could be per-
formed extremely rapidly: almost instantaneously.

Further Advantages of the Surface-Based Method
     One further advantage of the surface-based method, as opposed to the airborne method de-
scribed earlier, is that the detecting installation(s) need not emit any radio signals themselves. Thus
it would be impossible for hostile aircraft to home in on their radio emissions in order to destroy the
installations, which add to their safety factor: especially if from a visual point of view these instal-
lations were also carefully camouflaged.

     Another advantage of the surface-based installations would be that they could also be equipped
with powerful surface-to-air missiles (SAMs), which could be much larger and possess much greater
range and destructive power than air-based missiles for the destruction of hostile stealth aircraft.
And since these particular SAMs need not themselves emit any radar signals either, but could
merely fly along a narrow beam (say, a laser beam) emanating from the installation which has
detected the stealth aircraft, the latter would get no warning that one or more SAMs have been
launched against it, and thus would not have a chance to take evasive action.

Conclusion
     It is to be appreciated that although several examples have been given above, the main princi-
ple behind this Anti-Stealth Technology may be applied in innumerable other ways also. It is there-
fore not claimed that the above examples are exhaustive, but are only illustrations of the ways the
main principle may be applied.

     The most effective results are likely to be achieved by a combination of several methods, so as
not to rely on only one method of detecting stealth craft.

      In addition, it will be appreciated that computers can only get more and more powerful as time
passes. And in addition, radar technology is also likely to advance with time, enabling more and
more detail from fainter and fainter backgrounds located farther and farther away to be discerned in
less and less time. Thus in five or ten years’ time, it may be possible to detect stealth craft entirely
from satellites and/or light and mobile surface-based installations, making it very hard indeed for
the forces possessing stealth technology to keep their “stealth” craft stealthy any more.
In other words, it may not be possible, by the year 2005 or thereabouts, or at the latest by the year 2010,
for any military force to take advantage of current military stealth technology. Of course if some new and
yet unknown kind of stealth technology, capable of nullifying the effects of the above-described anti-
stealth technology, were developed in the interim, that might be another matter altogether. However, it is
unlikely that such new kinds of stealth technology can be developed in so short a time.
                                                                                          Cyrus Mehta
                                                                                        Ardeshir Mehta

Más contenido relacionado

Destacado

Thin Film Interference Jennifer Whetter
Thin Film Interference Jennifer WhetterThin Film Interference Jennifer Whetter
Thin Film Interference Jennifer WhetterJennifer Whetter
 
Philosophie sur le temps qui passe
Philosophie sur le temps qui passePhilosophie sur le temps qui passe
Philosophie sur le temps qui passesuetens
 
COLOR THEORY | COLOR COMBINATION AND USAGES
COLOR THEORY | COLOR COMBINATION AND USAGESCOLOR THEORY | COLOR COMBINATION AND USAGES
COLOR THEORY | COLOR COMBINATION AND USAGESHem Pokhrel
 
Color concept for professional designers
Color concept for professional designersColor concept for professional designers
Color concept for professional designersShahadath Hossain
 
Color meaning around the world
Color meaning around the worldColor meaning around the world
Color meaning around the worldYi Fang
 
Color Management Workflow
Color Management WorkflowColor Management Workflow
Color Management Workflownttechblog
 
Wave nature of_light
Wave nature of_lightWave nature of_light
Wave nature of_lightVASUDEV03
 
Stealth Technology [Naeem Rezghi]
Stealth Technology [Naeem Rezghi]Stealth Technology [Naeem Rezghi]
Stealth Technology [Naeem Rezghi]Naeem Rezghi
 
Stealth Technology in Naval Warfare Presentation
Stealth Technology in Naval Warfare PresentationStealth Technology in Naval Warfare Presentation
Stealth Technology in Naval Warfare PresentationSiddharth Bhatnagar
 
Stealth technology(supreeth)
Stealth technology(supreeth)Stealth technology(supreeth)
Stealth technology(supreeth)supreethmysore
 
Color: Psychology vs. Perception
Color: Psychology vs. PerceptionColor: Psychology vs. Perception
Color: Psychology vs. PerceptionAyesha Ambreen
 
LO9 - Thin Film Interference
LO9 - Thin Film InterferenceLO9 - Thin Film Interference
LO9 - Thin Film InterferenceRebecca Slater
 
[Report] The Evolution of Social Business: Six Stages of Social Media Transfo...
[Report] The Evolution of Social Business: Six Stages of Social Media Transfo...[Report] The Evolution of Social Business: Six Stages of Social Media Transfo...
[Report] The Evolution of Social Business: Six Stages of Social Media Transfo...Altimeter, a Prophet Company
 
Elements & Principles of Art Design PowerPoint
Elements & Principles of Art Design PowerPointElements & Principles of Art Design PowerPoint
Elements & Principles of Art Design PowerPointemurfield
 

Destacado (20)

Thin Film Interference Jennifer Whetter
Thin Film Interference Jennifer WhetterThin Film Interference Jennifer Whetter
Thin Film Interference Jennifer Whetter
 
Philosophie sur le temps qui passe
Philosophie sur le temps qui passePhilosophie sur le temps qui passe
Philosophie sur le temps qui passe
 
COLOR THEORY | COLOR COMBINATION AND USAGES
COLOR THEORY | COLOR COMBINATION AND USAGESCOLOR THEORY | COLOR COMBINATION AND USAGES
COLOR THEORY | COLOR COMBINATION AND USAGES
 
Color
ColorColor
Color
 
Color concept for professional designers
Color concept for professional designersColor concept for professional designers
Color concept for professional designers
 
Color chart
Color chartColor chart
Color chart
 
Color meaning around the world
Color meaning around the worldColor meaning around the world
Color meaning around the world
 
Colors meaning
Colors meaningColors meaning
Colors meaning
 
Color Management Workflow
Color Management WorkflowColor Management Workflow
Color Management Workflow
 
Colors
ColorsColors
Colors
 
Wave nature of_light
Wave nature of_lightWave nature of_light
Wave nature of_light
 
Stealth Technology [Naeem Rezghi]
Stealth Technology [Naeem Rezghi]Stealth Technology [Naeem Rezghi]
Stealth Technology [Naeem Rezghi]
 
Stealth Technology in Naval Warfare Presentation
Stealth Technology in Naval Warfare PresentationStealth Technology in Naval Warfare Presentation
Stealth Technology in Naval Warfare Presentation
 
Radar stealth technology
Radar  stealth  technologyRadar  stealth  technology
Radar stealth technology
 
Stealth technology(supreeth)
Stealth technology(supreeth)Stealth technology(supreeth)
Stealth technology(supreeth)
 
Color: Psychology vs. Perception
Color: Psychology vs. PerceptionColor: Psychology vs. Perception
Color: Psychology vs. Perception
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
LO9 - Thin Film Interference
LO9 - Thin Film InterferenceLO9 - Thin Film Interference
LO9 - Thin Film Interference
 
[Report] The Evolution of Social Business: Six Stages of Social Media Transfo...
[Report] The Evolution of Social Business: Six Stages of Social Media Transfo...[Report] The Evolution of Social Business: Six Stages of Social Media Transfo...
[Report] The Evolution of Social Business: Six Stages of Social Media Transfo...
 
Elements & Principles of Art Design PowerPoint
Elements & Principles of Art Design PowerPointElements & Principles of Art Design PowerPoint
Elements & Principles of Art Design PowerPoint
 

Similar a Anti stealth technology

Ubp electronics in defence
Ubp electronics in defenceUbp electronics in defence
Ubp electronics in defenceRitesh Kalshetty
 
6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFTIJRISE Journal
 
Report on RADAR stealth technology
Report on RADAR stealth technologyReport on RADAR stealth technology
Report on RADAR stealth technologyPragati Garg
 
Seminar Report on UWB FM -CW RADAR
Seminar Report on UWB FM -CW RADARSeminar Report on UWB FM -CW RADAR
Seminar Report on UWB FM -CW RADARArif Ahmed
 
seminar report content
seminar report contentseminar report content
seminar report contentwardady
 
application of remote sensing in defence forces
application of remote sensing in defence forcesapplication of remote sensing in defence forces
application of remote sensing in defence forcesNEERAJSHARMA814
 
Radar system
Radar systemRadar system
Radar systemSai Teja
 
D0312015019
D0312015019D0312015019
D0312015019inventy
 
Stealth technology 2
Stealth technology 2Stealth technology 2
Stealth technology 2vivek bisht
 
Military radar and satellite switching
Military radar and satellite switchingMilitary radar and satellite switching
Military radar and satellite switchingMDKAWSARAHMEDSAGAR
 
Terminal Part 1
Terminal Part 1Terminal Part 1
Terminal Part 1tomrickard
 
stealth technology (paper presentation )
stealth technology (paper presentation )stealth technology (paper presentation )
stealth technology (paper presentation )PANKAJ YADAV
 
SSTRM - StrategicReviewGroup.ca - Capt. Sylvain Sensors March 2010
SSTRM - StrategicReviewGroup.ca - Capt. Sylvain Sensors March 2010SSTRM - StrategicReviewGroup.ca - Capt. Sylvain Sensors March 2010
SSTRM - StrategicReviewGroup.ca - Capt. Sylvain Sensors March 2010Phil Carr
 
Air Defence Systems And Weapons
Air Defence Systems And WeaponsAir Defence Systems And Weapons
Air Defence Systems And WeaponsAndrew Parish
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 

Similar a Anti stealth technology (20)

Ubp electronics in defence
Ubp electronics in defenceUbp electronics in defence
Ubp electronics in defence
 
6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT
 
Report on RADAR stealth technology
Report on RADAR stealth technologyReport on RADAR stealth technology
Report on RADAR stealth technology
 
STEALTH technology.pptx
STEALTH technology.pptxSTEALTH technology.pptx
STEALTH technology.pptx
 
Seminar Report on UWB FM -CW RADAR
Seminar Report on UWB FM -CW RADARSeminar Report on UWB FM -CW RADAR
Seminar Report on UWB FM -CW RADAR
 
seminar report content
seminar report contentseminar report content
seminar report content
 
Radar.pptx
Radar.pptxRadar.pptx
Radar.pptx
 
application of remote sensing in defence forces
application of remote sensing in defence forcesapplication of remote sensing in defence forces
application of remote sensing in defence forces
 
Missiles control
Missiles controlMissiles control
Missiles control
 
Radar system
Radar systemRadar system
Radar system
 
D0312015019
D0312015019D0312015019
D0312015019
 
Stealth technology 2
Stealth technology 2Stealth technology 2
Stealth technology 2
 
Military radar and satellite switching
Military radar and satellite switchingMilitary radar and satellite switching
Military radar and satellite switching
 
Terminal Part 1
Terminal Part 1Terminal Part 1
Terminal Part 1
 
Stealth Technology
Stealth Technology Stealth Technology
Stealth Technology
 
Space warfare issue 3
Space warfare issue 3Space warfare issue 3
Space warfare issue 3
 
stealth technology (paper presentation )
stealth technology (paper presentation )stealth technology (paper presentation )
stealth technology (paper presentation )
 
SSTRM - StrategicReviewGroup.ca - Capt. Sylvain Sensors March 2010
SSTRM - StrategicReviewGroup.ca - Capt. Sylvain Sensors March 2010SSTRM - StrategicReviewGroup.ca - Capt. Sylvain Sensors March 2010
SSTRM - StrategicReviewGroup.ca - Capt. Sylvain Sensors March 2010
 
Air Defence Systems And Weapons
Air Defence Systems And WeaponsAir Defence Systems And Weapons
Air Defence Systems And Weapons
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 

Más de Hossam Zein

the engins that power the future.
the engins that power the future.the engins that power the future.
the engins that power the future.Hossam Zein
 
Options for optimizing combined cycle plants
Options for optimizing combined cycle plantsOptions for optimizing combined cycle plants
Options for optimizing combined cycle plantsHossam Zein
 
Improve plant heat rate with feedwater heater control
Improve plant heat rate with feedwater heater controlImprove plant heat rate with feedwater heater control
Improve plant heat rate with feedwater heater controlHossam Zein
 
01 nuclear energy_overview
01 nuclear energy_overview01 nuclear energy_overview
01 nuclear energy_overviewHossam Zein
 
00 history of_nuclear_fission_short_vers
00 history of_nuclear_fission_short_vers00 history of_nuclear_fission_short_vers
00 history of_nuclear_fission_short_versHossam Zein
 
LMFBR - Superphenix
LMFBR - SuperphenixLMFBR - Superphenix
LMFBR - SuperphenixHossam Zein
 
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...Hossam Zein
 
امن الطاقة والبني التختيه في ضوء التخديات الخالية
امن الطاقة والبني التختيه في ضوء التخديات الخاليةامن الطاقة والبني التختيه في ضوء التخديات الخالية
امن الطاقة والبني التختيه في ضوء التخديات الخاليةHossam Zein
 
Development of of power plants functionality
Development of of power plants functionality Development of of power plants functionality
Development of of power plants functionality Hossam Zein
 
Estimating appliance and home electronic energy use
Estimating appliance and home electronic energy useEstimating appliance and home electronic energy use
Estimating appliance and home electronic energy useHossam Zein
 
3 things to consider when installing solar power at home
3 things to consider when installing solar power at home3 things to consider when installing solar power at home
3 things to consider when installing solar power at homeHossam Zein
 
Planning and Zoning for Solar in North Carolina - Pandzsolar2014
Planning and Zoning for Solar  in North Carolina - Pandzsolar2014Planning and Zoning for Solar  in North Carolina - Pandzsolar2014
Planning and Zoning for Solar in North Carolina - Pandzsolar2014Hossam Zein
 
sonnen solar tracker 1/2
sonnen solar tracker 1/2sonnen solar tracker 1/2
sonnen solar tracker 1/2Hossam Zein
 
SolTrK_data_sheet solar control
SolTrK_data_sheet solar controlSolTrK_data_sheet solar control
SolTrK_data_sheet solar controlHossam Zein
 
sonnen solar tracker 2
sonnen solar tracker 2sonnen solar tracker 2
sonnen solar tracker 2Hossam Zein
 
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEBSMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEBHossam Zein
 
Solar Power Analysis and Design Specifications Houston solar
Solar Power Analysis and  Design Specifications Houston solarSolar Power Analysis and  Design Specifications Houston solar
Solar Power Analysis and Design Specifications Houston solarHossam Zein
 
Terminal High Altitude Area Defense THAAD
Terminal High Altitude Area Defense THAAD Terminal High Altitude Area Defense THAAD
Terminal High Altitude Area Defense THAAD Hossam Zein
 
multi mission radar (MMR) - EL/M-2084 FOR IRON DOME
multi mission radar (MMR) - EL/M-2084 FOR IRON DOMEmulti mission radar (MMR) - EL/M-2084 FOR IRON DOME
multi mission radar (MMR) - EL/M-2084 FOR IRON DOMEHossam Zein
 
القبـة الحـديديـة | IRon DoMe
القبـة الحـديديـة | IRon DoMeالقبـة الحـديديـة | IRon DoMe
القبـة الحـديديـة | IRon DoMeHossam Zein
 

Más de Hossam Zein (20)

the engins that power the future.
the engins that power the future.the engins that power the future.
the engins that power the future.
 
Options for optimizing combined cycle plants
Options for optimizing combined cycle plantsOptions for optimizing combined cycle plants
Options for optimizing combined cycle plants
 
Improve plant heat rate with feedwater heater control
Improve plant heat rate with feedwater heater controlImprove plant heat rate with feedwater heater control
Improve plant heat rate with feedwater heater control
 
01 nuclear energy_overview
01 nuclear energy_overview01 nuclear energy_overview
01 nuclear energy_overview
 
00 history of_nuclear_fission_short_vers
00 history of_nuclear_fission_short_vers00 history of_nuclear_fission_short_vers
00 history of_nuclear_fission_short_vers
 
LMFBR - Superphenix
LMFBR - SuperphenixLMFBR - Superphenix
LMFBR - Superphenix
 
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
 
امن الطاقة والبني التختيه في ضوء التخديات الخالية
امن الطاقة والبني التختيه في ضوء التخديات الخاليةامن الطاقة والبني التختيه في ضوء التخديات الخالية
امن الطاقة والبني التختيه في ضوء التخديات الخالية
 
Development of of power plants functionality
Development of of power plants functionality Development of of power plants functionality
Development of of power plants functionality
 
Estimating appliance and home electronic energy use
Estimating appliance and home electronic energy useEstimating appliance and home electronic energy use
Estimating appliance and home electronic energy use
 
3 things to consider when installing solar power at home
3 things to consider when installing solar power at home3 things to consider when installing solar power at home
3 things to consider when installing solar power at home
 
Planning and Zoning for Solar in North Carolina - Pandzsolar2014
Planning and Zoning for Solar  in North Carolina - Pandzsolar2014Planning and Zoning for Solar  in North Carolina - Pandzsolar2014
Planning and Zoning for Solar in North Carolina - Pandzsolar2014
 
sonnen solar tracker 1/2
sonnen solar tracker 1/2sonnen solar tracker 1/2
sonnen solar tracker 1/2
 
SolTrK_data_sheet solar control
SolTrK_data_sheet solar controlSolTrK_data_sheet solar control
SolTrK_data_sheet solar control
 
sonnen solar tracker 2
sonnen solar tracker 2sonnen solar tracker 2
sonnen solar tracker 2
 
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEBSMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
 
Solar Power Analysis and Design Specifications Houston solar
Solar Power Analysis and  Design Specifications Houston solarSolar Power Analysis and  Design Specifications Houston solar
Solar Power Analysis and Design Specifications Houston solar
 
Terminal High Altitude Area Defense THAAD
Terminal High Altitude Area Defense THAAD Terminal High Altitude Area Defense THAAD
Terminal High Altitude Area Defense THAAD
 
multi mission radar (MMR) - EL/M-2084 FOR IRON DOME
multi mission radar (MMR) - EL/M-2084 FOR IRON DOMEmulti mission radar (MMR) - EL/M-2084 FOR IRON DOME
multi mission radar (MMR) - EL/M-2084 FOR IRON DOME
 
القبـة الحـديديـة | IRon DoMe
القبـة الحـديديـة | IRon DoMeالقبـة الحـديديـة | IRon DoMe
القبـة الحـديديـة | IRon DoMe
 

Último

Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Último (20)

Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Anti stealth technology

  • 1. Tuesday, December 15, 1998 ANTI-STEALTH TECHNOLOGY by Cyrus Mehta and Ardeshir Mehta Summary Modern military stealth technology is based on the principle that stealthy craft remain invis- ible to detecting radar and infrared sensors, especially at long ranges. Such technology can be entirely nullified by the detecting radar and/or infrared sensors search- ing, not for the stealthy craft itself, but for the background behind the stealthy craft. The stealth craft will then show up in the form of a black or blank silhouette in front of the background. This is much like the way one can pinpoint with extreme accuracy the location of the moon during a solar eclipse, and track its movement with great precision, even though during a solar eclipse one cannot observe the moon itself. (N.B.: The remainder of this document describes the detailed methods one might use to detect the background behind stealth craft. Thus it is not necessary to read the entire document in order to grasp the principle of Anti-Stealth Technology, though one may of course do so to dispel all scep- ticism as to its practicability.) *** Basic Principles of Modern Stealth Technology Military stealth technology — such as is used, for example, in the B-2 bomber, the F-117 fighter-bomber and the F-22 fighter, and as is intended for the future Comanche helicopter, and the next-generation tank which is intended to replace the current M1A2 Abrams tank — is based on the principle that the stealthy craft remains invisible to detecting radar and infrared sensors, especially at long ranges. With respect to radar, this is accomplished, in basic principle, by the stealthy craft absorbing almost all the radar waves emanated by detecting radar sources, and/or reflecting or deflecting the detecting radar in direction(s) other than towards the detecting sensors. With respect to infrared, the objective of stealth is achieved, in basic principle, by the stealthy craft minimising heat from its engines and other heat-emitting spots. As a result of applying the above principles, detecting sensors searching for a stealthy craft cannot detect any radar or infrared signal emanating from the craft, except perhaps at very close distances, when it may already be too late to do anything about it from a military viewpoint. The craft, therefore, cannot be observed by radar or infrared sensors.
  • 2. ANTI-STEALTH TECHNOLOGY PA G E 2 Principle of Nullification of Stealth Technology This kind of stealth technology can, however, be entirely nullified by the detecting radar and/ by Cyrus Mehta and Ardeshir Mehta or infrared sensors searching, not for the stealthy craft itself, but for the background behind the stealthy craft! This is much like the way one can pinpoint with extreme accuracy the location of the moon during a solar eclipse, and track its movement with great precision, even though during a solar eclipse one can’t observe the moon itself. If this principle were applied for detecting stealth craft, any observed eclipsing of the back- ground would indicate that a stealth craft must be located in front of that part of the background which is being eclipsed. Such an eclipsing would show up on the detecting screen or output device in the shape of a black or blank silhouette of the stealth craft. 1. Airborne Method One way to accomplish the above is for the detecting forces to fly a high-flying aircraft fur- nished with SLAR (Side-Looking Airborne Radar) and/or FLIR (Front-Looking Infra-Red) equip- ment to map out the terrain below and to one side, or to the front. If a stealth craft were operating anywhere above the terrain being mapped, a small patch of terrain, which the stealth craft would perforce eclipse, would not be observed on the detecting aircraft’s output screen. That particular spot would appear black or blank, and more or less in the shape of a silhouette of the stealth craft: thereby pinpointing the stealth craft’s position within the field of vision of the detecting aircraft. The initial detection of a distant stealth craft might be slow, since until the craft were detected, the equipment would have to scan the entire terrain over which the craft might be located. How- ever, once that location were pinpointed, the craft could be tracked much more swiftly and accu- rately by zooming in on that location and some of its surrounding area, and scanning only that relatively small part of the field of vision. This would enable the searching equipment to generate much more detailed images of the silhouette of the craft in question, perhaps even identifying the craft by that silhouette. If, in addition, the SLAR or FLIR equipment were furnished with rangefinder capability (as many such are), the exact position of the stealth craft in three dimensions could also be determined. This would not greatly matter, of course, if the stealth craft were a land vehicle (like a tank); but in the case of aircraft such data could provide very valuable information from a military point of view. And with modern computers this position could be calculated very swiftly indeed: almost instanta- neously. 2. Satellite-Based Method The same method may be used looking down on the battlefield from satellites equipped with radar sensors. Although satellites would be relatively far away from the battlefield — a couple of hundred miles away, or even more — they would be able to remain out of range of most hostile weapons, and thus would not run much risk of being shot down, as might aircraft. Also, satellites
  • 3. ANTI-STEALTH TECHNOLOGY PA G E 3 would be able to cover a much larger area of the battlefield, thus being in a position to locate and track virtually all hostile stealth craft. by Cyrus Mehta and Ardeshir Mehta 3. Surface-Based Method Yet another way of detecting a stealth aircraft would be for surface-based radar installations to scan the sky at high apertures and with high sensitivity, such as is done with radio telescopes. (Since such installations would be surface-based, even if they had to be substantially large and/or heavy to adequately accomplish this task, their size and weight would not be a serious deterrent to their accomplishing it.) As is well known to radio astronomers, even in daytime or in bad weather, radio signals from the stars would reach the radar installations uninterrupted. Since the radio map of the stars is by now very well known, it may be assumed that if any star is not observed on the detecting screen or output device, that particular star must be eclipsed by some craft flying above the installation somewhere along the line of sight between the installation and that particular star. And with very sensitive radio-astronomical equipment, virtually every part of the sky is ob- served to be covered with stars! Therefore at almost every instant in time, the stealth aircraft would be eclipsing one or another known star. Even if less sensitive detecting equipment were used, so that the time it took to record the stellar images was greater than the time it took for an aircraft to entirely eclipse a particular star, that star would still show up on the detecting screen somewhat fainter than it would otherwise if it had not been eclipsed by the aircraft for a part of the time it took for the radio waves from it to be gathered. Thus by calibrating the detecting equipment to search for those stars whose radio images appear to be fainter than usual (as determined by standard radio maps of the sky), the position of the eclipsing aircraft could be determined swiftly, even with equipment of less than stellar perform- ance. Indeed the limit of sensitivity of the equipment as a whole would be determined, not by the sensitivity of the radio signal gathering device, but by the sensitivity of the equipment which de- tects the difference in intensity of the actual signals from particular stars compared to their intensity as indicated by the standard radio map of those same stars. And as with the airborne method, although the initial detection of a distant stealth aircraft might be slow, once its location were pinpointed, the aircraft could be tracked much more swiftly and accurately by zooming in on that location and some of surrounding area. If more than one detecting installation were used, by a process of triangulation the exact loca- tion in three dimensions of all aircraft — friendly as well as hostile — within the fields of vision of the relevant installations could be determined with great accuracy. And as mentioned earlier, with modern computers such a determination could be arrived at almost instantaneously. With the passage of time, the specific stars being eclipsed by any particular aircraft would change in a manner consistent with the aircraft’s trajectory. Thus by accurately observing the time intervals between sequentially-eclipsed stars, coupled with an exact knowledge of the radio-astro- nomical map, the aircraft’s trajectory could easily and quickly — almost instantly — be calculated, especially if powerful computers were utilised to calculate it. If, in addition, the locations of all the friendly aircraft within the field of vision of the installa-
  • 4. ANTI-STEALTH TECHNOLOGY PA G E 4 tion are also known, it may be assumed that hostile aircraft must be eclipsing those stars not show- ing up on the screen which cannot be accounted for by friendly aircraft. Thus by a process of elimination, the location of all hostile aircraft, and not just hostile stealth aircraft, could be deter- mined. This would be an advantage of the surface-based method as opposed to the airborne method by Cyrus Mehta and Ardeshir Mehta described earlier. And, of course, with modern computers all the above calculations could be per- formed extremely rapidly: almost instantaneously. Further Advantages of the Surface-Based Method One further advantage of the surface-based method, as opposed to the airborne method de- scribed earlier, is that the detecting installation(s) need not emit any radio signals themselves. Thus it would be impossible for hostile aircraft to home in on their radio emissions in order to destroy the installations, which add to their safety factor: especially if from a visual point of view these instal- lations were also carefully camouflaged. Another advantage of the surface-based installations would be that they could also be equipped with powerful surface-to-air missiles (SAMs), which could be much larger and possess much greater range and destructive power than air-based missiles for the destruction of hostile stealth aircraft. And since these particular SAMs need not themselves emit any radar signals either, but could merely fly along a narrow beam (say, a laser beam) emanating from the installation which has detected the stealth aircraft, the latter would get no warning that one or more SAMs have been launched against it, and thus would not have a chance to take evasive action. Conclusion It is to be appreciated that although several examples have been given above, the main princi- ple behind this Anti-Stealth Technology may be applied in innumerable other ways also. It is there- fore not claimed that the above examples are exhaustive, but are only illustrations of the ways the main principle may be applied. The most effective results are likely to be achieved by a combination of several methods, so as not to rely on only one method of detecting stealth craft. In addition, it will be appreciated that computers can only get more and more powerful as time passes. And in addition, radar technology is also likely to advance with time, enabling more and more detail from fainter and fainter backgrounds located farther and farther away to be discerned in less and less time. Thus in five or ten years’ time, it may be possible to detect stealth craft entirely from satellites and/or light and mobile surface-based installations, making it very hard indeed for the forces possessing stealth technology to keep their “stealth” craft stealthy any more. In other words, it may not be possible, by the year 2005 or thereabouts, or at the latest by the year 2010, for any military force to take advantage of current military stealth technology. Of course if some new and yet unknown kind of stealth technology, capable of nullifying the effects of the above-described anti- stealth technology, were developed in the interim, that might be another matter altogether. However, it is unlikely that such new kinds of stealth technology can be developed in so short a time. Cyrus Mehta Ardeshir Mehta