Skip to comments.Black Surprises (USAF can take control of enemy missile launchers, radars, etc.)
Posted on 01/24/2007 6:54:09 PM PST by steve86
Other, more contemporary Senior programs named by Arkin reveal and track the Air Force's growing interest in and development of the new field of computer network warfare and electronic attack, which include Senior Keystone (related to classified information warfare) and Senior Suter. However, the Air Force's theme remains the same--penetrating the enemy's defenses.
Senior Suter is a Big Safari-managed special access program. Big Safari itself is a shadowy Air Force unit that has developed small numbers of specialized reconnaissance systems, including drones, in what are often classified programs. The Suter technology was developed during the last several years by BAE Systems and involves invading enemy communications networks and computer systems, particularly those associated with integrated air defense systems (AW&ST Aug. 16, 2004, p. 24; Nov. 4, 2002, p. 30). Suter 1 allowed U.S. operators to monitor what enemy radars could see. The capability enables U.S. forces to assess the effectiveness of their stealth systems or terrain-masking tactics. Suter 2 permits U.S. operators to take control of enemy networks as system managers and actually manipulate the sensors, steering them away from penetrating U.S. aircraft. Suter 3 was tested last summer to add the ability to invade the links to time-critical targets, such as battlefield ballistic missile launchers or mobile surface-to-air missile launchers. Aircraft involved in the Suter programs include the EC-130 Compass Call, RC-135 Rivet Joint and F-16CJ strike aircraft specialized for suppression of enemy air defenses.
Information operations and computer network attack programs are now considered the military's most closely guarded projects, surpassing even new stealth advances.
(Excerpt) Read more at aviationnow.com ...
Eh, an intelligent person can often piece together assorted open-source information on classified stuff and come up with a reasonably good picture of it without having had a leak or Pentagon approval.
Thanks for the ping. Very interesting article.
The Suter aircraft evidently project multiple digital signal beams into the antennas and other electronic components of the enemy platform to probe and then set up an ad-hoc network, similar to what a "hacker" would do to a target computer on the Internet using ordinary TCP and IP data packets. The nature of the signal beams, however, is a highly guarded secret,Smoke ... but no mirrors yet ...
I agree with your comment.
they were also talking about projecting contrived images, IIRC, presumably onto radar screens or the modern equivalent.The creation of 'false (RADAR) returns' is an already well-known 'trick' ...
It would be terrible, for example, if the N. Koreans tested a ballistic missile and it somehow went off course and hit Peking. Or of the Iranians did likewise and it somehow hit Damascus.
I think it builds upon that earlier "positional disparity" to create an entirely new virtual view, with fake aircraft, others missing, etc. I am making an educated guess here.
I have VietNam era F-4 (Navy Phantom) pilot friend that tells of flying in the same space with an EA-6B (or maybe it was an E-2 Hawkeye?) and they were joking about cababilities.
The 6B jock asked my friend his call sign....and immediately his radar screen went blank as his callsign was spelled out on its face.
For instance, first, raise the noise 'floor' to hide your own hopefully LO (Low Observable 'platform'), second, delay, advance and reposition in time and even space 'stronger' timed and synchronized with the original RADAR pulse returns back to the emitter ... this works well with pulse trains that aren't randomized, in which case it becomes a LOT more difficult ... although broadband WN can still be used to 'blind' an OPFOR RADAR receiver ...
I'm continually pissed that our military and intelligence secrets get outed to the media just to make some bureaucratic pukes can feel important.
If elected Hillary Roddon Clinton will insure the safety of our technology.sarc/
Capabilities published are capabilities lost. There are two bugs that need fixing now.
"Who's doing the "guarding"? That would be A1C Sandy Burglar."
Since we're in a "discovery" mode here, where is he filing the data - right sock or left sock?
Under these circumstances Berger needs to moved to a more secure location. I recommend Fort Leavenworth, KS for about 15 to 20 years.
Damascus? That would be Syria's...