Posted on 01/24/2007 6:54:09 PM PST by steve86
Other, more contemporary Senior programs named by Arkin reveal and track the Air Force's growing interest in and development of the new field of computer network warfare and electronic attack, which include Senior Keystone (related to classified information warfare) and Senior Suter. However, the Air Force's theme remains the same--penetrating the enemy's defenses.
Senior Suter is a Big Safari-managed special access program. Big Safari itself is a shadowy Air Force unit that has developed small numbers of specialized reconnaissance systems, including drones, in what are often classified programs. The Suter technology was developed during the last several years by BAE Systems and involves invading enemy communications networks and computer systems, particularly those associated with integrated air defense systems (AW&ST Aug. 16, 2004, p. 24; Nov. 4, 2002, p. 30). Suter 1 allowed U.S. operators to monitor what enemy radars could see. The capability enables U.S. forces to assess the effectiveness of their stealth systems or terrain-masking tactics. Suter 2 permits U.S. operators to take control of enemy networks as system managers and actually manipulate the sensors, steering them away from penetrating U.S. aircraft. Suter 3 was tested last summer to add the ability to invade the links to time-critical targets, such as battlefield ballistic missile launchers or mobile surface-to-air missile launchers. Aircraft involved in the Suter programs include the EC-130 Compass Call, RC-135 Rivet Joint and F-16CJ strike aircraft specialized for suppression of enemy air defenses.
Information operations and computer network attack programs are now considered the military's most closely guarded projects, surpassing even new stealth advances.
(Excerpt) Read more at aviationnow.com ...
Various types of Electronic Warfare have always been an option. Specifics should not be discussed, no matter who leaked it.
Ballistic missiles, of course, aren't physically capable of doing that but the technique might apply handily to cruise missiles, RPVs, etc.
You got that right.
If the story wasn't openly available at your local library (where I read it), I would agree.
You were only able to read what they want you to read.
BTTT
Now just exactly how much enemy radar and sophisticated battlefield management computing do you think we are facing in Iraq?
You didn't read it at MY local library, because is is rarely open! LOL!
All Your Radar Are Belong To Us
They don't call it Aviation Leak for nothing!
this story was timed to tell China et al to be warned WHILE WE DO IRAN.
I don't have the magazine in front of me now but they were also talking about projecting contrived images, IIRC, presumably onto radar screens or the modern equivalent.
I wonder if there will ever again be a war where this kind of gadgetry can bring it to a defined end. Are we fighting a war that might have occurred 40 years ago?
Seems all wars these days end in insurgencies. This kind of stuff is of little value against un-uniformed personnel. And it seems no one on our side has the will to effectively put down an insurgency.
Please convince me that I'm too pessimistic. :(
And it doesn't help much against a nuke hidden and shielded in a fishing boat, either.
I think Clancy put something like that in one of his books.
Read between the lines "with some data acquisition components already employed in Iraq. " who is next to Iran.
'"are now considered the military's most closely guarded projects"
Who's doing the "guarding"?'
~~~
That would be A1C Sandy Burglar.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.