Skip to comments.Black Surprises (USAF can take control of enemy missile launchers, radars, etc.)
Posted on 01/24/2007 6:54:09 PM PST by steve86
Other, more contemporary Senior programs named by Arkin reveal and track the Air Force's growing interest in and development of the new field of computer network warfare and electronic attack, which include Senior Keystone (related to classified information warfare) and Senior Suter. However, the Air Force's theme remains the same--penetrating the enemy's defenses.
Senior Suter is a Big Safari-managed special access program. Big Safari itself is a shadowy Air Force unit that has developed small numbers of specialized reconnaissance systems, including drones, in what are often classified programs. The Suter technology was developed during the last several years by BAE Systems and involves invading enemy communications networks and computer systems, particularly those associated with integrated air defense systems (AW&ST Aug. 16, 2004, p. 24; Nov. 4, 2002, p. 30). Suter 1 allowed U.S. operators to monitor what enemy radars could see. The capability enables U.S. forces to assess the effectiveness of their stealth systems or terrain-masking tactics. Suter 2 permits U.S. operators to take control of enemy networks as system managers and actually manipulate the sensors, steering them away from penetrating U.S. aircraft. Suter 3 was tested last summer to add the ability to invade the links to time-critical targets, such as battlefield ballistic missile launchers or mobile surface-to-air missile launchers. Aircraft involved in the Suter programs include the EC-130 Compass Call, RC-135 Rivet Joint and F-16CJ strike aircraft specialized for suppression of enemy air defenses.
Information operations and computer network attack programs are now considered the military's most closely guarded projects, surpassing even new stealth advances.
(Excerpt) Read more at aviationnow.com ...
The "how" of the program is highly classified but the "what" is known in general terms -- break into an enemy's air, land, or sea deployed sigint and weapons systems, monitor, and in later versions, take control of equipment as an active "system manager".
The magazine article mentions a metaphor of making the enemy radar think it's a wash machine and putting it into rinse mode!
These capabilities apparently are tested in realistic flight situations, utilizing multiple specialized aircraft, although deployment is in the early stages with some data acquisition components already employed in Iraq.
The Suter aircraft evidently project multiple digital signal beams into the antennas and other electronic components of the enemy platform to probe and then set up an ad-hoc network, similar to what a "hacker" would do to a target computer on the Internet using ordinary TCP and IP data packets. The nature of the signal beams, however, is a highly guarded secret, but apparently involves some kind of synthesis of the different signals and dynamic adjustment to deal with changing conditions and countermeasures.
Ping. Familiar with this?
Another "No Comment" thread.
Well, now...is that why that magazine is often known as 'Aviation Leak'?
This article was published to tell the Chinese that not only do we know exactly what they are doing, but we overfly their airspace regularly and turn off their radars without their knowing it.
The Chicom ASAT test that has everybody scared is dimestore stuff, if what is in this article is true.
AW&ST shouldn't have run this story, imho.
Now, imagine what we can do to the Iranians.
Be Seeing You,
Glad we could keep it a secret.
Who's doing the "guarding"?
Then again, for how long can you keep a spoof secret?
Loose lips sink ships.
That we can read enemy radar screens was revealed by the govt as long ago as the Korean airliner shootdown.
Yea, just try to keep a secret
impossible in todays world. In the grand old days of yesteryear, these types of secrets were leaked via lesser-known channels and taken into consideration without the world knowing about them. Advantage
problems solved without the panic of the general population and the general population getting involved.
Was this good or bad not for me to judge history will be the judge.
Is everyone here tired from The State of the Union last night? I expected a Skynet joke within the first ten posts.
As long as the enemy sees what they expect to see, indefinitely. Think Maskirovka.
I had no direct or indirect knowledge of this project but it doesn't surprise me in the least. It is my believe that the US is intending to dominate every part of the electromagnetic spectrum on the battlefield from 3Hz up. That means complete freedom of usage for us and complete denial to the enemy unless we choose to let them use it.
Garde la Foi, mes amis! Nous nous sommes les sauveurs de la République! Maintenant et Toujours!
(Keep the Faith, my friends! We are the saviors of the Republic! Now and Forever!)
LonePalm, le Républicain du verre cassé (The Broken Glass Republican)
Very lucid point Sect, and totally agreed. They know what they are doing by letting this out. Th Chinese have long stated they are fearful of our technological advantage on them, this will help further the paranoia
I hope it's, as you say, a tactical leak. It will certainly make the bad guys wonder, won't it?
Various types of Electronic Warfare have always been an option. Specifics should not be discussed, no matter who leaked it.
Ballistic missiles, of course, aren't physically capable of doing that but the technique might apply handily to cruise missiles, RPVs, etc.
You got that right.
If the story wasn't openly available at your local library (where I read it), I would agree.
You were only able to read what they want you to read.
Now just exactly how much enemy radar and sophisticated battlefield management computing do you think we are facing in Iraq?
You didn't read it at MY local library, because is is rarely open! LOL!
All Your Radar Are Belong To Us
They don't call it Aviation Leak for nothing!
this story was timed to tell China et al to be warned WHILE WE DO IRAN.
I don't have the magazine in front of me now but they were also talking about projecting contrived images, IIRC, presumably onto radar screens or the modern equivalent.
I wonder if there will ever again be a war where this kind of gadgetry can bring it to a defined end. Are we fighting a war that might have occurred 40 years ago?
Seems all wars these days end in insurgencies. This kind of stuff is of little value against un-uniformed personnel. And it seems no one on our side has the will to effectively put down an insurgency.
Please convince me that I'm too pessimistic. :(
And it doesn't help much against a nuke hidden and shielded in a fishing boat, either.
I think Clancy put something like that in one of his books.
Read between the lines "with some data acquisition components already employed in Iraq. " who is next to Iran.
'"are now considered the military's most closely guarded projects"
Who's doing the "guarding"?'
That would be A1C Sandy Burglar.
Eh, an intelligent person can often piece together assorted open-source information on classified stuff and come up with a reasonably good picture of it without having had a leak or Pentagon approval.
Thanks for the ping. Very interesting article.
The Suter aircraft evidently project multiple digital signal beams into the antennas and other electronic components of the enemy platform to probe and then set up an ad-hoc network, similar to what a "hacker" would do to a target computer on the Internet using ordinary TCP and IP data packets. The nature of the signal beams, however, is a highly guarded secret,Smoke ... but no mirrors yet ...
I agree with your comment.
they were also talking about projecting contrived images, IIRC, presumably onto radar screens or the modern equivalent.The creation of 'false (RADAR) returns' is an already well-known 'trick' ...
It would be terrible, for example, if the N. Koreans tested a ballistic missile and it somehow went off course and hit Peking. Or of the Iranians did likewise and it somehow hit Damascus.
I think it builds upon that earlier "positional disparity" to create an entirely new virtual view, with fake aircraft, others missing, etc. I am making an educated guess here.
I have VietNam era F-4 (Navy Phantom) pilot friend that tells of flying in the same space with an EA-6B (or maybe it was an E-2 Hawkeye?) and they were joking about cababilities.
The 6B jock asked my friend his call sign....and immediately his radar screen went blank as his callsign was spelled out on its face.