web analytics
November 25, 2014 / 3 Kislev, 5775
At a Glance
InDepth
Sponsored Post
IDC Herzliya Campus A Day on Campus

To mark IDC Herzliya’s 20th anniversary, we spent a day following Prof. Uriel Reichman, IDC’s founder and president, and Jonathan Davis, VP for External Relations, around its delightful campus.



Stealth: Not-So-Secret Secrets

F-117 Nighthawk

F-117 Nighthawk
Photo Credit: U.S. Air Force

The US had been working on radar-evading and heat-signature-suppressing technologies since the late 1950s. There is nothing either very secret or surprising about this. All military forces try to hide their forces and are willing to spend a lot of money and effort on various forms of camouflage and concealment.

Stealth technology as we know it came into being in the 1970s, thanks in part to work by a Russian mathematician, but mostly thanks to advances in US computer technology. Lockheed was able to build a technology demonstration aircraft for the air force called the “Have Blue,” which showed that an aircraft with the new radar-evading technology could penetrate Soviet-style 1970s integrated air defense systems.

“Have Blue” was followed in the early 1980s by the secret F-117 Stealth “Fighter,” which was never actually a fighter but, as it was roughly the size of a fighter, the Air Force choose to call it a fighter, even though it would have been more accurate to call it a light reconnaissance bomber.

Although the F-117 was first used during the overthrow of the Panamanian dictator Manuel Noriega in 1989, it proved itself during the 1991 Gulf War. The Iraq air defense system, which at the time was the best that Saddam’s oil wealth could buy, was unable to shoot down a single F-117, even though they flew dozens of missions over the most heavily defended parts of Iraq, especially over Baghdad. The F-117s were able repeatedly to hit Iraqi headquarters and other critical targets such as bridges and industrial facilities. It was this that crippled Saddam’s ability to continue the war.

At the same time in the early 1990s, the Air Force was introducing its new strategic bomber, the B-2. This was, and is, an extraordinary aircraft that combines stealth with a long range. The B-2 can fly more than 5000 miles on a single fuel load, as well as anywhere in the world with air-to-air refueling, even with a heavy payload. This bomber was first used against targets in Afghanistan in the fall of 2001.

Since its existence was revealed during the 1980 Presidential campaign, “stealth” has become surrounded by an aura of mystery and invincibility that tends to obscure its value in being able to defeat the most advanced air defense systems. Although talk about invisible and invulnerable airplanes was hogwash, normally skeptical journalists and media commentators bought into the myth, and sometimes used it to propagate a dangerously sterile vision of modern war, especially the idea that wars can be fought with no friendly casualties and almost no casualties on the enemies’ side.

In 1999, during the Kosovo operation, an F-117 was shot down over Serbia by an old Soviet SA-3 surface-to-air missile. This seems to have been done by a Serb missile battalion commander who, using basic intelligence methods, analyzed US air operations. Specifically, Serbian intelligence had informers with cell phones around US bases; the informers would phone in the departure times of US aircraft. Using this data the Serbs were able to make educated guesses when and where US aircraft would appear in the skies over their missile launchers.

The pilot ejected and was rescued, but the wreckage of the plane was recovered by the Serbs; it is believed they gave the debris to Russia as a “thank you” for Moscow’s political support.

Whatever the next military technological breakthrough is, if it keeps American troops alive and victorious in war and globally respected in peacetime, it will be worth every penny.

Originally published by Gatestone Institute http://www.gatestoneinstitute.org

About the Author: Taylor Dinerman is an expert on the Military and National Security affairs.


If you don't see your comment after publishing it, refresh the page.

Our comments section is intended for meaningful responses and debates in a civilized manner. We ask that you respect the fact that we are a religious Jewish website and avoid inappropriate language at all cost.

If you promote any foreign religions, gods or messiahs, lies about Israel, anti-Semitism, or advocate violence (except against terrorists), your permission to comment may be revoked.

3 Responses to “Stealth: Not-So-Secret Secrets”

  1. T-50 not T-80. The latter is a Russian main battle tank. It doesn't fly.

  2. Mogul M Mogul says:

    "It has already cost US taxpayers more than $400 billion. " The 390 billion includes 2400 planes so are you saying that taxpayers have already paid LM in advance for undelivered planes?

Comments are closed.

SocialTwist Tell-a-Friend

Current Top Story
Posted to Twitter in Ferguson, MO by St. Louis County Police: "Bricks thrown at police, 2 police cars burned, gun seized by police. Tonight was disappointing."  Their motto is, "To protect and serve."
Pro-ISIS Group Says ‘Use Ferguson Flames to Fuel Terror in America’
Latest Indepth Stories
Red Line Obama

“What’s a line between friends?”

West_Bank_&_Gaza_Map_2007_(Settlements)

Unrest in YESHA and J’m helps Abbas and Abdullah defuse anger, gain politically and appear moderates

Thousands of rabbis pose in front of Chabad-Lubavitch headquarters in Brooklyn on Sunday during the annual International Conference of Chabad-Lubavitch Emissaries.

A “Shliach” means to do acts with complete devotion and dedication in order to help bring Moshiach.

Arabs create opening for terrorists to walk the security wall between Ramallah and Jerusalem and Ramallah.

Here, things seem to get a little hazy, why should a Jewish State “based on freedom, justice and peace as envisaged by the prophets of Israel” confine itself to ensuring “complete equality… irrespective of religion, race, etc.”, especially when this includes “Arab inhabitants” who launched an “onslaught” against the State, months before it even existed? […]

“We don’t just care for the children; we make sure they have the best quality of life.”

“Why do people get complacent with the things they’re told?”

Arab opposition to a Jewish State of any size was made known by word and deed in the form of terror

Operation Moses: First time in history that non-blacks came to Africa to free blacks from oppression

As Arabs murder and maim Jews, Jordan’s leaders bark the blood libel of “Israeli aggression.”

Perhaps attacking a terrorist’s legacy broadly and publicly would dissuade others from terrorism?

R’ Aryeh yelled “Run, I’ll fight!” Using a chair against terrorists to buy time so others could flee

Riot started when Muslim students wore the Pal. kaffiyeh and Druze students demanded them removed

The “Media” didn’t want us to know what a kind, giving, loving young woman Dalia was.

A “Palestine” could become another Lebanon, with many different factions battling for control.

Maimonides himself walked and prayed in the permissible areas when he visited Eretz Yisrael in 1165

Having a strong community presence at the polls shows our elected officials we care about the issues

More Articles from Taylor Dinerman
A nuclear Blast in the Nevada desert

If the Mullahs can simply buy a usable and tested bomb design from North Korea, they could transform their status into a nuclear weapons state overnight.

Rangers

Today, control over all major military spending decisions remain exclusively in the hands of political appointees, and soldiers, sailors and airmen are left with the job of trying to defend their country and themselves with the inferior results of decisions made by politicians.

Since its existence was revealed during the 1980 Presidential campaign, “stealth” has become surrounded by an aura of mystery and invincibility that tends to obscure its value in being able to defeat the most advanced air defense systems.

Printed from: http://www.jewishpress.com/indepth/analysis/stealth-not-so-secret-secrets/2012/07/02/

Scan this QR code to visit this page online: