Free Republic 3rd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $5,161
6%  
Woo hoo!! And we're now over 6%!! Thank you all very much!! God bless.

Keyword: nonkineticweapons

Brevity: Headers | « Text »
  • New Bomber To Focus Heavily On ISR

    12/18/2009 1:42:48 AM PST · by ErnstStavroBlofeld · 8 replies · 758+ views
    Aviation Week and Space Technology ^ | 12/17/2009 | David A. Fulghum
    The U.S. Air Force’s ISR chief says a new bomber design will be more about intelligence gathering and non-kinetic weapons than about bombing. The arsenal of this “long-range, ISR/Strike” aircraft may eventually include directed energy and network attack, says Lt. Gen. Dave Deptula, deputy chief of staff for intelligence, surveillance and reconnaissance (ISR). Directed energy weapons under development by the Pentagon include a range of lasers and devices that produce pulses of high-power microwaves. Other non-kinetic capabilities include the attack of enemy sensors with very precise, exotic-waveform jamming and the low-power, electronic invasion of networks that link tactical weapon systems...
  • Reports On Nonkinetic Weapons Mixed

    12/12/2009 11:11:18 PM PST · by ErnstStavroBlofeld · 8 replies · 824+ views
    Aviation Week and Space Technology ^ | 11/11/2009 | David A. Fulghum/Douglas Barrie
    The report card is mixed regarding next-generation nonkinetic, or limited effects, weaponry ­developed by the U.S. and its allies. Cyber-warfare turns on three critical aspects--attack, defense and assessment. Information-technology industry officials say attack capabilities are receiving attention and funding. Defenses against cyber-attack have begun attracting support because of persistent adversaries who flourish in the Wild West atmosphere of the Russian and Chinese cyber-worlds. The big shortfall, they agree, is in battle damage assessment (BDA). "I'm trying to render an enemy system nonfunctional with a nonkinetic attack," says John Osterholz, BAE Systems vice president for integrated cyber-warfare and cyber-security. "How do...