Return-Path: <sentto-279987-4373-1011853938-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 23 Jan 2002 22:38:10 -0800 (PST) Received: (qmail 16207 invoked by uid 510); 24 Jan 2002 06:36:36 -0000 Received: from n32.groups.yahoo.com (216.115.96.82) by all.net with SMTP; 24 Jan 2002 06:36:36 -0000 X-eGroups-Return: sentto-279987-4373-1011853938-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.191] by n32.groups.yahoo.com with NNFMP; 24 Jan 2002 06:32:18 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_1_3); 24 Jan 2002 06:32:18 -0000 Received: (qmail 64658 invoked from network); 24 Jan 2002 06:32:17 -0000 Received: from unknown (216.115.97.171) by m5.grp.snv.yahoo.com with QMQP; 24 Jan 2002 06:32:17 -0000 Received: from unknown (HELO red.all.net) (12.232.72.98) by mta3.grp.snv.yahoo.com with SMTP; 24 Jan 2002 06:32:17 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g0O6Wph28492 for iwar@onelist.com; Wed, 23 Jan 2002 22:32:51 -0800 Message-Id: <200201240632.g0O6Wph28492@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 23 Jan 2002 22:32:50 -0800 (PST) Subject: [iwar] [fc:Check.out.Popular.Science:.Stealth.Threat] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit <A HREF="http://www.popsci.com/popsci/aviation/article/0,12543,188700,00.html">Click here: Popular Science | Stealth Threat</A> <a href="http://www.popsci.com/popsci/aviation/article/0,12543,188700,00.html">http://www.popsci.com/popsci/aviation/article/0,12543,188700,00.html> Whoops! Phone signals may unmask a $40 billion flying secret by Bill Sweetman Driving home from work, you suddenly remember that a few of the T-ball kids are supposed to come over after the game. Should you pick up a couple of pizzas on your way? You pull out your cellular phone and call home to check. Eight miles above you, unseen and unheard, a B-2 stealth bomber is cruising along on a practice run. The pilot believes that even radar can't detect his plane, but he's wrong. That call you're making, along with thousands of other innocent cellphone conversations taking place all over town, has inadvertently unmasked the bomber-defeating stealth technology that cost $40 billion to develop. At least, that is the claim recently made by Roke Manor Research, a small research institute housed in an 1850s manor house in a quiet English town. Roke Manor, a subsidiary of the German electronics industry giant Siemens, announced earlier this year that its engineers had "rendered stealth aircraft useless." By listening for the echoes of cellphone signals bouncing off a stealth plane, the engineers say, it's possible not only to detect the plane but also to determine its exact location. Conventional radar works by pointing a powerful radio beam at the sky and listening for the reflections from flying objects. But today we live in a sea of radio waves that are continuously broadcast from cellphone towers, television transmitters, and other sources. With this wireless revolution has come a potential new spy tool: a radar system that exploits existing radio signals rather than generating its own. The Roke engineers came up with the idea for their cellphone-based radar as something of a lark. "We were brainstorming blue-sky ideas," recalls managing director Paul Stine. Can the system that emerged from the brainstorming session prove better than traditional radar at detecting stealth planes? Possibly, but the researchers haven't yet built a working model, and some experts question the system's practical military value, since analyzing cellphone echoes accurately is a very tricky business. Modern warfare has been shaped to a large extent by radar. Before radar, there was no way to detect bombers until they were already overhead. But in the 1930s, British researchers began experiments that changed all that -- and the course of World War II. When the Luftwaffe bombed London in 1940, the British saw them coming, thanks to radar beams that swept the skies and bounced off any incoming planes. It was the start of a decades-long cat-and-mouse game between airplanes and radar. Early on, engineers tried to camouflage airplanes using special paints and coatings. It didn't work. In 1958, the CIA sent a camouflaged U-2 on a spy flight across Russia. Attached to the subsequent protest note from Moscow was a detailed radar plot of the airplane's flight path. Seventeen years later, teams at Lockheed's Skunk Works and Northrop cracked the problem. There was no point trying to camouflage a conventional airplane. Instead, the engineers realized, they had to come up with an entirely new type of airplane that would not reflect radio signals. The secret, Lockheed engineer Alan Brown would later say, "was to design a very bad antenna and make it fly." In the eyes of an aerodynamicist, the first successful stealth airplane, Lockheed's Have Blue prototype, was a misshapen monster. The multifaceted plane had no curved surfaces, even on the wing, which was angled back so sharply that the craft could barely get off the ground. But all that really mattered was that to a radar system, the 6-ton jet looked no bigger than a small bird. Have Blue took advantage of the fact that the radar systems of the time were monostatic, meaning that they employed a single antenna both to transmit radar signals and to listen for their echoes. The airplane's odd shape caused radar signals to scatter, instead of bouncing back toward the antenna. The first operational stealth planes -- the F-117 Nighthawk and the B-2 Spirit, both introduced in the 1980s -- relied on the same principle. Their sloped upper and lower surfaces deflect radar energy upward or downward, away from the radar antenna. The F-117 and B-2 also have long, straight edges that focus radar reflections into single, concentrated beams. The way the plane's edges are angled, the beams shoot off to the side, rather than directly back at the antenna that sent the signal. But though stealth aircraft can fool monostatic radars, they may not be as good at fooling so-called bistatic radar, a system in which the transmitter and receiver are placed in separate locations. Because a bistatic system does not rely on a single antenna, it may be able to pick up some of the radio signals that are scattered by a stealth plane. And when a stealth plane ventures between a bistatic system's receiver and transmitter, the system may even detect the "shadow" created when the airplane blocks the radar beam. Most experts agree that conventional stealth aircraft will look different and possibly larger on a bistatic radar screen. More...go to: <a href="http://www.popsci.com/popsci/aviation/article/0,12543,188700,00.html">http://www.popsci.com/popsci/aviation/article/0,12543,188700,00.html> ------------------------ Yahoo! Groups Sponsor ---------------------~--> Tiny Wireless Camera under $80! Order Now! FREE VCR Commander! Click Here - Only 1 Day Left! http://us.click.yahoo.com/nuyOHD/7.PDAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST