[iwar] [fc:Check.out.Popular.Science:.Stealth.Threat]

From: Fred Cohen (fc@all.net)
Date: 2002-01-23 22:32:50


Return-Path: <sentto-279987-4373-1011853938-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 23 Jan 2002 22:38:10 -0800 (PST)
Received: (qmail 16207 invoked by uid 510); 24 Jan 2002 06:36:36 -0000
Received: from n32.groups.yahoo.com (216.115.96.82) by all.net with SMTP; 24 Jan 2002 06:36:36 -0000
X-eGroups-Return: sentto-279987-4373-1011853938-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.191] by n32.groups.yahoo.com with NNFMP; 24 Jan 2002 06:32:18 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 24 Jan 2002 06:32:18 -0000
Received: (qmail 64658 invoked from network); 24 Jan 2002 06:32:17 -0000
Received: from unknown (216.115.97.171) by m5.grp.snv.yahoo.com with QMQP; 24 Jan 2002 06:32:17 -0000
Received: from unknown (HELO red.all.net) (12.232.72.98) by mta3.grp.snv.yahoo.com with SMTP; 24 Jan 2002 06:32:17 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g0O6Wph28492 for iwar@onelist.com; Wed, 23 Jan 2002 22:32:51 -0800
Message-Id: <200201240632.g0O6Wph28492@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 23 Jan 2002 22:32:50 -0800 (PST)
Subject: [iwar] [fc:Check.out.Popular.Science:.Stealth.Threat]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

 <A HREF="http://www.popsci.com/popsci/aviation/article/0,12543,188700,00.html">Click 
here: Popular Science | Stealth Threat</A>

<a href="http://www.popsci.com/popsci/aviation/article/0,12543,188700,00.html">http://www.popsci.com/popsci/aviation/article/0,12543,188700,00.html>
Whoops! Phone signals may unmask a $40 billion flying secret
by Bill Sweetman
        
Driving home from work, you suddenly remember that a few of the T-ball kids 
are supposed to come over after the game. Should you pick up a couple of 
pizzas on your way? You pull out your cellular phone and call home to check. 

Eight miles above you, unseen and unheard, a B-2 stealth bomber is cruising 
along on a practice run. The pilot believes that even radar can't detect his 
plane, but he's wrong. That call you're making, along with thousands of other 
innocent cellphone conversations taking place all over town, has 
inadvertently unmasked the bomber-defeating stealth technology that cost $40 
billion to develop. 

At least, that is the claim recently made by Roke Manor Research, a small 
research institute housed in an 1850s manor house in a quiet English town. 
Roke Manor, a subsidiary of the German electronics industry giant Siemens, 
announced earlier this year that its engineers had "rendered stealth aircraft 
useless." By listening for the echoes of cellphone signals bouncing off a 
stealth plane, the engineers say, it's possible not only to detect the plane 
but also to determine its exact location. 

Conventional radar works by pointing a powerful radio beam at the sky and 
listening for the reflections from flying objects. But today we live in a sea 
of radio waves that are continuously broadcast from cellphone towers, 
television transmitters, and other sources. With this wireless revolution has 
come a potential new spy tool: a radar system that exploits existing radio 
signals rather than generating its own. 

The Roke engineers came up with the idea for their cellphone-based radar as 
something of a lark. "We were brainstorming blue-sky ideas," recalls managing 
director Paul Stine. Can the system that emerged from the brainstorming 
session prove better than traditional radar at detecting stealth planes? 
Possibly, but the researchers haven't yet built a working model, and some 
experts question the system's practical military value, since analyzing 
cellphone echoes accurately is a very tricky business. 

Modern warfare has been shaped to a large extent by radar. Before radar, 
there was no way to detect bombers until they were already overhead. But in 
the 1930s, British researchers began experiments that changed all that -- and 
the course of World War II. When the Luftwaffe bombed London in 1940, the 
British saw them coming, thanks to radar beams that swept the skies and 
bounced off any incoming planes. 

It was the start of a decades-long cat-and-mouse game between airplanes and 
radar. Early on, engineers tried to camouflage airplanes using special paints 
and coatings. It didn't work. In 1958, the CIA sent a camouflaged U-2 on a 
spy flight across Russia. Attached to the subsequent protest note from Moscow 
was a detailed radar plot of the airplane's flight path. 

Seventeen years later, teams at Lockheed's Skunk Works and Northrop cracked 
the problem. There was no point trying to camouflage a conventional airplane. 
Instead, the engineers realized, they had to come up with an entirely new 
type of airplane that would not reflect radio signals. The secret, Lockheed 
engineer Alan Brown would later say, "was to design a very bad antenna and 
make it fly." 

In the eyes of an aerodynamicist, the first successful stealth airplane, 
Lockheed's Have Blue prototype, was a misshapen monster. The multifaceted 
plane had no curved surfaces, even on the wing, which was angled back so 
sharply that the craft could barely get off the ground. But all that really 
mattered was that to a radar system, the 6-ton jet looked no bigger than a 
small bird. 

Have Blue took advantage of the fact that the radar systems of the time were 
monostatic, meaning that they employed a single antenna both to transmit 
radar signals and to listen for their echoes. The airplane's odd shape caused 
radar signals to scatter, instead of bouncing back toward the antenna. 

The first operational stealth planes -- the F-117 Nighthawk and the B-2 
Spirit, both introduced in the 1980s -- relied on the same principle. Their 
sloped upper and lower surfaces deflect radar energy upward or downward, away 
from the radar antenna. The F-117 and B-2 also have long, straight edges that 
focus radar reflections into single, concentrated beams. The way the plane's 
edges are angled, the beams shoot off to the side, rather than directly back 
at the antenna that sent the signal. 

But though stealth aircraft can fool monostatic radars, they may not be as 
good at fooling so-called bistatic radar, a system in which the transmitter 
and receiver are placed in separate locations. Because a bistatic system does 
not rely on a single antenna, it may be able to pick up some of the radio 
signals that are scattered by a stealth plane. And when a stealth plane 
ventures between a bistatic system's receiver and transmitter, the system may 
even detect the "shadow" created when the airplane blocks the radar beam. 
Most experts agree that conventional stealth aircraft will look different and 
possibly larger on a bistatic radar screen. 

More...go to: 
<a href="http://www.popsci.com/popsci/aviation/article/0,12543,188700,00.html">http://www.popsci.com/popsci/aviation/article/0,12543,188700,00.html>

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Tiny Wireless Camera under $80!
Order Now! FREE VCR Commander!
Click Here - Only 1 Day Left!
http://us.click.yahoo.com/nuyOHD/7.PDAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST