Skip to comments.Black Surprises (USAF can take control of enemy missile launchers, radars, etc.)
Posted on 01/24/2007 6:54:09 PM PST by steve86
Other, more contemporary Senior programs named by Arkin reveal and track the Air Force's growing interest in and development of the new field of computer network warfare and electronic attack, which include Senior Keystone (related to classified information warfare) and Senior Suter. However, the Air Force's theme remains the same--penetrating the enemy's defenses.
Senior Suter is a Big Safari-managed special access program. Big Safari itself is a shadowy Air Force unit that has developed small numbers of specialized reconnaissance systems, including drones, in what are often classified programs. The Suter technology was developed during the last several years by BAE Systems and involves invading enemy communications networks and computer systems, particularly those associated with integrated air defense systems (AW&ST Aug. 16, 2004, p. 24; Nov. 4, 2002, p. 30). Suter 1 allowed U.S. operators to monitor what enemy radars could see. The capability enables U.S. forces to assess the effectiveness of their stealth systems or terrain-masking tactics. Suter 2 permits U.S. operators to take control of enemy networks as system managers and actually manipulate the sensors, steering them away from penetrating U.S. aircraft. Suter 3 was tested last summer to add the ability to invade the links to time-critical targets, such as battlefield ballistic missile launchers or mobile surface-to-air missile launchers. Aircraft involved in the Suter programs include the EC-130 Compass Call, RC-135 Rivet Joint and F-16CJ strike aircraft specialized for suppression of enemy air defenses.
Information operations and computer network attack programs are now considered the military's most closely guarded projects, surpassing even new stealth advances.
(Excerpt) Read more at aviationnow.com ...
For instance, first, raise the noise 'floor' to hide your own hopefully LO (Low Observable 'platform'), second, delay, advance and reposition in time and even space 'stronger' timed and synchronized with the original RADAR pulse returns back to the emitter ... this works well with pulse trains that aren't randomized, in which case it becomes a LOT more difficult ... although broadband WN can still be used to 'blind' an OPFOR RADAR receiver ...
I'm continually pissed that our military and intelligence secrets get outed to the media just to make some bureaucratic pukes can feel important.
If elected Hillary Roddon Clinton will insure the safety of our technology.sarc/
Capabilities published are capabilities lost. There are two bugs that need fixing now.
"Who's doing the "guarding"? That would be A1C Sandy Burglar."
Since we're in a "discovery" mode here, where is he filing the data - right sock or left sock?
Under these circumstances Berger needs to moved to a more secure location. I recommend Fort Leavenworth, KS for about 15 to 20 years.
Damascus? That would be Syria's...
That's because they can "neither confirm nor deny".
Those of us who value our clearances know to keep our mouths shut.
You just can't trust anybody these days...
Even if the enemy knew about there is nothing they could possibly do to stop it besides pulling their equipment off the battlefield.
Bump for later reading
"EC-130 Compass Call, RC-135 Rivet Joint "
I flew on both of these airframes from 94-98.
"I have VietNam era F-4 (Navy Phantom) pilot friend that tells of flying in the same space with an EA-6B (or maybe it was an E-2 Hawkeye?) and they were joking about cababilities.
The 6B jock asked my friend his call sign....and immediately his radar screen went blank as his callsign was spelled out on its face."
Make that an EA 3B.
Stupid thing for the op in the AWACS plane to do, but still funny.
Generally, after you've buzzed the tower at the enemy airbase and bombed the crap out of the aircraft parking area, he'll figure out that SOMETHING is going on. :)
The idea behind the Senior Suter program is to get him to press--or not press--the FIRE switch according to our will, not his.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.