the rules of stealth - iris independent research

6
1 The Rules of Stealth The B-2 bomber first flew on July 17, 1989. Thirty years on, America counts on low observable stealth more than ever. Every day, the B-2s provide nuclear deterrence and conventional bomber presence for the United States. The B-2 has also proved itself in combat in five separate air campaigns. Yet the rise of great power competition requires the US military to prepare for facing off with Russia, China – and the military hardware they sell. In the past five years, Russia has sold its advanced S-400 surface-to-air missile systems to China and other nations, and begun tests of its next-generation S-500 missile system. Both Russia and China have increased fighter and bomber flights in Asia and other areas. Some say the value of stealth is fading in the face of these threats. It’s fair to ask: can American stealth still rule air warfare? Stealth and the Electromagnetic Spectrum The rules of stealth begin with low observable shaping to elude radar tracking. Every combat airplane is a group of geometric shapes, thinks the stealth bomber designer. Wings, vertical tails, engine inlets, weapons hanging under the wing, cockpit bubble, fuselage: all these are shapes that reflect radar waves back to enemy air defenses on the ground or in the air. Radar came into widespread use in World War II when command and control centers on land and aboard ships used it to detect incoming formations of attacking aircraft. By the 1960s, radar-guided surface-to-air missiles guarded targets from Moscow to Hanoi. Electronic warfare

Upload: others

Post on 23-Nov-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

1

TheRulesofStealthTheB-2bomberfirstflewonJuly17,1989.Thirtyyearson,Americacountsonlowobservablestealthmorethanever. Everyday,theB-2sprovidenucleardeterrenceandconventionalbomberpresencefortheUnitedStates.TheB-2hasalsoproveditselfincombatinfiveseparateaircampaigns.YettheriseofgreatpowercompetitionrequirestheUSmilitarytoprepareforfacingoffwithRussia,China–andthemilitaryhardwaretheysell.Inthepastfiveyears,RussiahassolditsadvancedS-400surface-to-airmissilesystemstoChinaandothernations,andbeguntestsofitsnext-generationS-500missilesystem.BothRussiaandChinahaveincreasedfighterandbomberflightsinAsiaandotherareas.Somesaythevalueofstealthisfadinginthefaceofthesethreats.

It’sfairtoask:canAmericanstealthstillruleairwarfare? StealthandtheElectromagneticSpectrumTherulesofstealthbeginwithlowobservableshapingtoeluderadartracking.Everycombatairplaneisagroupofgeometricshapes,thinksthestealthbomberdesigner.Wings,verticaltails,engineinlets,weaponshangingunderthewing,cockpitbubble,fuselage:alltheseareshapesthatreflectradarwavesbacktoenemyairdefensesonthegroundorintheair.

RadarcameintowidespreaduseinWorldWarIIwhencommandandcontrolcentersonlandandaboardshipsusedittodetectincomingformationsofattackingaircraft.Bythe1960s,radar-guidedsurface-to-airmissilesguardedtargetsfromMoscowtoHanoi.Electronicwarfare

2

attemptedtoartfullyblastbackenergytofuzzuptrackingradarsorturntheirsignalsagainstthem.ButVietnamlossratesshowedtheedgeshiftingtothedefenders.

Then,inthe1970s,researchonlowobservableshapesforaircraftyieldedthefirststealthfighterdesigns.Stealthworksonamarveloussetofprinciples.Radar“sees”thereturnedwaves.Theareareflectedbyradarcanbemuchlargerorsmallerthanthephysicaldimensionsoftheaircraftitself.Specialequationspredicthowradarwavesbehave.Analyzeacombatplaneasagroupofshapesandthesumistheradarcrosssection.

Astealthaircraft’sdesignreducestheradarcrosssection.It’snoteasy.Radarwavesmirrorbackfromverticalsurfaces,bounceofftails,travelalongedges,scatteraroundcavitiesanddiffractfromwingtips.Anglethesurface,andtheradarwavereflectsoffandawayfromthetrackingradar.Putalltheseprinciples–andmore–intoplaceandwithenoughmathematicsandsimulation,engineerscancalculate,predictandcontrolradarreturn.

Thenetresultis“lowobservables”orstealth.Alowobservableaircraftrendersradardetectionandtrackingmuchlessefficient.Thefirstpurpose-builtstealthaircraftwastheF-117.Theflatplatesandanglesshowedclearlytheideasdrivingfirst-generationstealth.Toimproveitsstealth,theF-117carriedweaponsinsideabombbayinsteadofunderthewings.

In1981,theAirForcecommissionedtheB-2bomber.Withrevolutionarylowobservabletechnology,theB-2couldeludetheSovietUnion’sairdefensebatteriesandoutfoxfighterinterceptors.

Lowobservablesareoptimizedtoworkagainstthemostdangerouselementofenemyairdefenses:thefire-controlradars.Theseradarsemitalowfrequencyradarwave,thekindwithabigwavelengththatflowsoveranyshape.Thelowfrequencywavecandetectsomethingoutthere,briefly,thenit’sgone.Trackingfastcombataircraftonanattackprofilerequiresmorefrequent,shorterwavelengthpingsoperatingatcloserranges.

TheB-2bombertookstealthtoanewlevelbyintroducinglarge,curvedsurfacesassistedbycomplexcomputer-aideddesign.Anditaddedrangeandpayload.DefeatingIntegratedAirDefensesStealthdeliverssurprise.PicturetheB-2sattackingtargetsinSerbianairspacein1999.Pilotsreportedtheeeriequiet.Lightswerestillonincitiesbelow,withflashesofothercombatengagementsvisibleatloweraltitudes.NeitherintegratedairdefensesnortheSerbianairforceMiG-29sandotherfightersinterruptedthestealthB-2sontheirbombingruns. Lowobservablesdeliversurvivabilitybydrasticallyloweringthenumberofaccurateshotstakenbyenemysurface-to-airmissiles.Steponeisreducingdetectionrange.As

3

discussed,thelowerradarcrosssectioncutsdownthedistanceatwhichenemyradarscandetect,trackandengagetheaircraft.Reducetheradarcrosssectionbyafactoroftenandthedetectionrangeofaradariscutby44%,accordingtotheradarrangeequation.

Thefirstchartshowsadetectionrangeforfournotionalaircraft,startingwitha1-metersquareradarcrosssectionandreducingdowntoverylowobservablelevels.Verylowobservableradarcrosssectiontruncatestheenemyairdefenseradar’seffectiverange.Atthelowestshapedisplayed,thestealthaircrafttakesawaymostoftherangetrackingadvantage.Hereiswheresurvivabilityincreasessignificantly.

Asdetectionrangedrops,thenumberofaccurateshotstakenbyenemyairdefensesalsogoesdown.Thishappensinpartbecausethestealthaircraftspendmuchlesstimeinsidetheeffectivethreatradiusofthesurface-to-airmissilesystem.Thisnextchartassumeseachofthefournotionalaircraftisflyingat400mphandwilllaunchaJDAMatadistanceof15nmawayfromthetarget.Thestealthiestshapeasdepictedingreenwillbedetectedonlyat18milesaway.Asaresult,theaircraftmustflyjustthreemilesintotheeffectivethreatring,whichtakesless

4

thanoneminuteatthegivenspeed.Incontrast,theaircraftwiththelargestcrosssectioninredisdetectedearlierandspendmoretimeinazoneofvulnerability.Lessshotsequalsmoresurvivability.

Stealthincludesmorethanshapingforlowobservablesagainstradar.TheB-2designalsoworkedtocontrolelectronic,infrared,acousticandvisualsignatures.Forexample,theB-2’sfourenginesarenestedinsidethebomberwithspecialductingthatreducesdetectionofengineexhaustheat.ThesawtoothtrailingedgeoftheB-2helpscreateshedvorticestomixhotandcoolair.TheB-2’sdesignalsominimizesmajorsourcesofsoundfromtheenginesandairframe.UpdatestoStealthStealthisnotstatic.Whiletherulesofstealthapply,thereisnoquestionthatthethreatenvironmenthaschanged.Today’smilitarydoctrinecentersonmulti-domainoperationsandtacticsforgainingtemporaryairsuperioritytocarryoutmissionsindeniedairspace. Stealthismoreimportantthanever.Thesinglebestproofcomesfromthenationalinvestmentintwomajorfighterprograms,theF-22andF-35.Bothaircraftdesignscenteronlowobservablesandradarcrosssectionreduction.In2015,theAirForce’sdecisiontobuildtheB-21Raiderstealthbomberforthemid-2020sshowedagainthatstealthisexpectedtobeadominantforceinaircombatfordecadestocome. However,inthesametimeperiod,RussianandChineseairdefensesystemshaveimprovedinqualityandnumberssincetheoriginaldesignoftheB-2.Regionalconflictscenariosoncepicturedpunchingthroughairdefenses.Now,theAirForcethinksofpenetratingcorridorsamongdensethreatsthatmayremainactive.Adversaryfighterswithlong-rangemissilesandsophisticatedradarswillbeintheair.Stealthinthisenvironmentreliesmorethaneverontactics,andinparticular,onnewtechnologiesforthreatemitterlocation.

TheB-2fleetisintheprocessofreceivingamajorDefensiveManagementSystemupgradetoimprovethethreatemitterlocationsystemsonthebomber.Active,electronically-scannedradarscanassistwithfindingenemysurface-to-airmissilebatteriesandotherthreats.Forpilotsinthecockpit,knowingthethreatpictureletsthemadjustcourseandtactics,employelectronicwarfarewhenneeded,andimproveradarcrosssectionmanagement.CounterstoStealthTheresurgenceofRussianandChinesemilitarymodernizationhasalsotouchedoffanewroundofdebateonhowtocounterstealth.Notmuchhaschangedwithphysics.But,asitturnsout,thecounterstealthtalkisfueledbyhotrivalryamongaircraftcompanies,bothdomesticandforeign.

Russianmilitarysalesbrochuresaccountformuchofthecounter-stealthliterature.Here’sanexample.“Withauniquewideband“Kharchenko”squareringelementradiatorarrangedinadiamondlatticepattern,theVostokEradarisdesignedtoimproveitsfrequencyagilityagainstearliergenerationstealthfighters,”readthisone.“Evenwhenfacingmoreadvancedstealthaircraft,theVostokEcandetecttargetsfrom57kilometersawayandshootthemdownwiththeS-300surface-to-airmissile.ItisanewdesigntochallengetheaerialdominationofAmericanstealthaircraft,”orsothesalespitchsaid.

5

ThisRussianwentontobragthat“VietnamwillprobablybecomethefirstnationtousetheradarsysteminanasymmetricwarfarestrategyagainststealthfightersfromChinaincludingtheJ-20andJ-31overthedisputedSouthChinaSea.”i

Counterstostealthtrytorestoresomeofthedetectionrangedeniedbylowobservableshaping.Sincelowobservablesconcentrateoncounteringtheshortwavelengthsforfirecontrolradar,onecounter-stealthtacticistoimprovelow-frequencydetection.Improvedcorrelationandanalysisoflong-range,low-frequencyearlywarningsignalsmightintheoryyieldbetterearlytracksofstealthaircraft.Networkedradarsandbettercomputingpoweraresupposedtohelpcompensateforwhatthelowfrequencysignalscan’tdeliver.

Thesecondapproachistoseparatetheradartransmitterandreceiverintoabistaticradarsystem.Mostradarsystemstransmitandreceivesignalsbackatasinglepoint.Thebistaticsystemtransmitsradarenergytoareceiverinasecondlocation,makingalineorbarrierforattackaircrafttoflythrough,likethelaserbeamscenesinMission:Impossible. Thenthereistheoldrivalrybetweenstealthandelectronicwarfare.Thisone’sreallyanantique,forthebesttacticsnowcombineboth.However,evenafewyearsagostealthwasgettingroughtreatmentinthehyper-competitiveworldofinternationalfightersales.Atonepublicevent,Boeingmarketeditsnon-stealthyF/A-18GGrowlerelectronicwarfarefighterwiththeadvertisementphrase“stealthisperishable;onlyaGrowlerprovidesfullspectrumprotection.”RecentlyBoeinghasadvertiseditsupgradedF-15shave“everythingbutstealth.”

Thiscritiqueisavariationonthelow-frequencyapproach.SAM(Surface-to-AirMissile)radarsareshiftingtheirfrequenciesintolowerfrequencybandswhereU.S.stealthislesseffective,”saidoneexecutive.ii

6

Bomber,NotFighterYetanothersubcategoryofthecounter-stealthdebatespunofffromcriticism(byotheraircraftmanufacturers)oftheF-35JointStrikeFighter.AssertingthattheF-35focusedonfront-aspectsignaturereduction,rivalmarketerssuggestedagainthatonlyelectronicwarfarecouldhandlethethreat.Theydidn’tseemtonoticethatofficialDepartmentofDefensestrategyincludedadvancedelectronicwarfarecapabilitiesfortheF-35thataretestedandperformingwell.iii

Buriedinthemixisavalidpoint.RussianandChineseadvancedsystemshaveimprovedtheirlow-frequency,longwavelength.Advancedsystemscansharenetworkedinformationtohelprefineearlydetection.

Buttherulesofstealthstillapply.Stealthdegradessurveillanceradardetectionandshrinkstheeffectivecoverageoffire-controlradars.Thehand-offfromsurveillancetofirecontroltomissileshotsbreaksdown.Mostimportant,stealthstartswithlowobservablesandcombinestactics,electronicwarfare,networkedinformationflows,andreductionsininfraredtocreatethepackageofsurvivability.

Also,thefighterdebatedoesn’tapplytoassessingstealthfortheB-2.It’simportanttoremembertheB-2wasdesignedwithall-aspectsignaturereduction:meaning,specifically,thatit’snotlimitedtohead-onattack.AprimerequirementintheB-2designwasminimizingradarreturnfrom360degreesaroundtheaircraft.Successinall-aspectsignaturereductionwasoneofthereasonsNorthropwonthecontractoriginally.SignaturereductionisperhapsnotidenticalfromeveryanglebuttheholisticdesigngivestheB-2lowobservableswhetherflyingtowards,aroundorawayfromtargetareas.

TacticsoftheFutureBeginningwithOperationAlliedForcein1999,AmericanB-2crewslearnedtoflythe“blueline,”carefullyplanningandupdatingtheroutetotargets.Tacticsofthebluelinepointthebomber’sstealthiestsignatureaspecttowardthethreat.Byflyingtheblueline,thebomberstaysoutofdetectionrange.Altitudeaddsanotheradvantage.Flyinghighcanworkaroundthestrongestzonesofradarcoverage. TheB-2’sstealthreliesonmorethanonetypeoftechnology.Oneenemybreakthroughdoesn’tshatterstealth.

TheB-2andsoontheB-21canplayuniquerolesincampaignsofthefuture.Thestealthbombercandegradeenemyairdefensesandstrikeotherhigh-valuetargets.Byextension,thestealthbomber’sabilitytoattackanytarget,anywhere,isthefoundationofdeterrence.All-aspectsignaturereductiongivesbomberstheadvantageintheduelwithdefendingIADSandfighters.Onlystealthaircraftcanattackwithmaximumefficiencyagainstthemostimportanttargets.

“TheB-2bomber,imaginehavingthatcomeatyou,”remarkedAirForceChiefofStaffGeneralDavidGoldfein.iv

i“VietnamwillbuytheBelarus-madesurveillanceradarVostokEabletodetectstealthfighter,”armyrecognitioncom,July18,2013.iiDaveMajumdar“StealthVS.ElectronicAttack,”USNI,April21,2014iiiHouseArmedServicesCommittee,AirandLandSubcommittee,“MilitaryServicesFifthGenerationTacticalAircraftChallengesandF-35Program,”February16,2017.ivGen.DavidGoldfein,Remarks,RetirementCeremonyforSecretaryoftheAirForceHeatherWilson