Stealth aircraft are designed to avoid detection using a variety of advanced technologies that reduce reflection/emission of radar, infrared, visible light, radio-frequency (RF) spectrum, and audio, collectively known as stealth technology.Development of stealth technology likely began in Germany during World War II, the planned Horten Ho 229 being described as the first stealth aircraft. Well-known modern examples of stealth of U.S aircraft include the United States' F-117 Nighthawk (1981–2008), the B-2 Spirit, the F-22 Raptor, and the F-35 Lightning II.
While no aircraft is totally invisible to radar, stealth aircraft make it difficult for conventional radar to detect or track the aircraft effectively, increasing the odds of a successful attack. Stealth is the combination of passive low observable (LO) features and active emitters such as Low Probability of Intercept Radars, radios and laser designators. These are usually combined with active defenses such as chaff, flares, and ECM. It is accomplished by using a complex design philosophy to reduce the ability of an opponent's sensors to detect, track, or attack the stealth aircraft. This philosophy also takes into account the heat, sound, and other emissions of the aircraft as these can also be used to locate it.
Full-size stealth combat aircraft demonstrators have been flown by the United States (in 1977), Russia (in 2010) and China (in 2011). The US military has adopted three stealth designs, and is preparing to adopt the Lockheed Martin F-35 Lightning II.
Most recent fighter designs will claim to have some sort of stealth, low observable, reduced RCS or radar jamming capability, but there has been no air to air combat experience against stealth aircraft.
Limitations
- Instability of design
- Early stealth aircraft were designed with a focus on minimal radar cross section (RCS) rather than aerodynamic performance. Highly-stealth aircraft like the F-117 Nighthawk are aerodynamically unstable in all three axes and require constant flight corrections from a fly-by-wire (FBW) flight system to maintain controlled flight. As for the B-2 Spirit, which was based on the development of the flying wing aircraft by Jack Northrop in 1940, this design allowed for a stable aircraft with sufficient yaw control, even without vertical surfaces such as rudders.
- Aerodynamic limitations
- Earlier stealth aircraft (such as the F-117 and B-2) lack afterburners, because the hot exhaust would increase their infrared footprint, and breaking the sound barrier would produce an obvious sonic boom, as well as surface heating of the aircraft skin which also increased the infrared footprint. As a result their performance in air combat maneuvering required in a dogfight would never match that of a dedicated fighter aircraft. This was unimportant in the case of these two aircraft since both were designed to be bombers. More recent design techniques allow for stealthy designs such as the F-22 without compromising aerodynamic performance. Newer stealth aircraft, like the F-22, F-35 and the Sukhoi T-50, have performance characteristics that meet or exceed those of current front-line jet fighters due to advances in other technologies such as flight control systems, engines, airframe construction and materials.
- Electromagnetic emissions
- The high level of computerization and large amount of electronic equipment found inside stealth aircraft are often claimed to make them vulnerable to passive detection. This is highly unlikely and certainly systems such as Tamara and Kolchuga, which are often described as counter-stealth radars, are not designed to detect stray electromagnetic fields of this type. Such systems are designed to detect intentional, higher power emissions such as radar and communication signals. Stealth aircraft are deliberately operated to avoid or reduce such emissions.[citation needed]
- Vulnerable modes of flight
- Stealth aircraft are still vulnerable to detection during, and immediately after using their weaponry. Since stealth payload (reduced RCS bombs and cruise missiles) are not yet generally available, and ordnance mount points create a significant radar return, stealth aircraft carry all armament internally. As soon as weapons bay doors are opened, the plane's RCS will be multiplied and even older generation radar systems will be able to locate the stealth aircraft. While the aircraft will reacquire its stealth as soon as the bay doors are closed, a fast response defensive weapons system has a short opportunity to engage the aircraft.
- Also, such aircraft as the F-22 Raptor and F-35 Lightning II Joint Strike Fighter can also carry additional weapons and fuel on hardpoints below their wings. When operating in this mode the planes will not be nearly as stealthy, as the hardpoints and the weapons mounted on those hardpoints will show up on radar systems. This option therefore represents a trade off between stealth or range and payload. External stores allow those aircraft to attack more targets further away, but will not allow for stealth during that mission as compared to a shorter range mission flying on just internal fuel and using only the more limited space of the internal weapon bays for armaments.
Reduced payload
In a 1994 live fire exercise near Point Mugu, California, a B-2 Spirit dropped forty-seven 500 lb (230 kg) class Mark 82 bombs, which represents about half of a B-2's total ordnance payload in Block 30 configuration
Fully stealth aircraft carry all fuel and armament internally, which limits the payload. By way of comparison, the F-117 carries only two laser or GPS guided bombs, while a non-stealth attack aircraft can carry several times more. This requires the deployment of additional aircraft to engage targets that would normally require a single non-stealth attack aircraft. This apparent disadvantage however is offset by the reduction in fewer supporting aircraft that are required to provide air cover, air-defense suppression and electronic counter measures, making stealth aircraft "force multipliers".
- Sensitive skin
- Stealth aircraft often have skins made with Radar-absorbent materials or RAMs. Some of these contain Carbon black particles, some contain tiny iron spheres. There are many materials used in RAMs, and some are classified, particularly the materials that specific aircraft use.
- Cost of operations
- Stealth aircraft are typically more expensive to develop and manufacture. An example is the B-2 Spirit that is many times more expensive to manufacture and support than conventional bomber aircraft. The B-2 program cost the U.S. Air Force almost $45 billion.
- Reflected waves
- Passive (multistatic) radar, bistatic radar and especially multistatic radar systems detect some stealth aircraft better than conventional monostatic radars, since first-generation stealth technology (such as the F117) reflects energy away from the transmitter's line of sight, effectively increasing the radar cross section (RCS) in other directions, which the passive radars monitor. Such a system typically uses either low frequency broadcast TV and FM radio signals (at which frequencies controlling the aircraft's signature is more difficult). Later stealth approaches do not rely on controlling the specular reflections of radar energy and so the geometrical benefits are unlikely to be significant.
- Researchers at the University of Illinois at Urbana-Champaign with support of DARPA, have shown that it is possible to build a synthetic aperture radar image of an aircraft target using passive multistatic radar, possibly detailed enough to enable automatic target recognition (ATR).
- In December 2007, SAAB researchers revealed details for a system called Associative Aperture Synthesis Radar (AASR) that would employ a large array of inexpensive and redundant transmitters and a few intelligent receivers to exploit forward scatter to detect low observable targets.The system was originally designed to detect stealthy cruise missiles and should be just as effective against aircraft. The large array of inexpensive transmitters provides a degree of protection against anti-radar (or anti-radiation) missiles or attacks.
Schlieren photograph of T-38 shock waves
Schlieren-Soldering-Iron-Heat. Note that the soldering iron tip itself is not glowing because it is not Infrared photography. Had the photograph been a composite ofSchlieren and infrared, the soldering iron tip would show as a source of illumination and the atmospheric disturbance caused by the heating would show as well. The infrared point of origin or target would be unambiguous.
Photography of bow shock waves around a brass bullet, 1888
Schlieren Signature Schlieren is the German plural of schliere, which is German for the English word streak. Schlieren are visible streaks produced in a transparent medium as a result of variations in the medium's density leading to variations in refractive index.Anything that disturbs the atmosphere may be detected (Schlieren Photography) because of the Schlieren effect caused by that atmospheric disturbance. This type of Measurement and signature intelligence (MASINT) detection falls under the category of Electro-optical MASINT. A telephoto or telescopic picture of a jet passing between the photographer and a full moon will sometimes show the outline of the aircraft as well as the atmospheric distortions of the exhaust plumes. This passive principle can be used at all wavelengths of the electromagnetic spectrum. Passive signature intelligence has captured stealth aircraft in flight by accident, when such aircraft fly between Google Maps satellites and ground. Once a stealth signature has been captured, it may be loaded into a database library for an active and live satellite search at any point in the future. Ground at past versus ground at present differential comparisons can be made to determine flight paths and altitudes of stealth aircraft. This disturbance and disturbing influence method has been used for finding ships at sea through wake generation tracking and even in Wilson cloud chambers for particle discovery and tracking. The key principle is that the disturbance is much more visible in area and volume than the disturbing point source and converges attention to the much smaller disturbing source.
Infrared (heat)Some analysts claim Infra-red search and track systems (IRSTs) can be deployed against stealth aircraft, because any aircraft surface heats up due to air friction and with a two channel IRST is a CO2 (4.3 µm absorption maxima) detection possible, through difference comparing between the low and high channel.These analysts point to the resurgence in such systems in Russian designs in the 1980s, such as those fitted to the MiG-29 and Su-27. The latest version of the MiG-29, the MiG-35, is equipped with a new Optical Locator System that includes more advanced IRST capabilities.
In air combat, the optronic suite allows:
- Detection of non-afterburning targets at 45-kilometre (28 mi) range and more;
- Identification of those targets at 8-to-10-kilometre (5.0 to 6.2 mi) range; and
- Estimates of aerial target range at up to 15 kilometres (9.3 mi).
- A tank-effective detection range up to 15 kilometres (9.3 mi), and aircraft carrier detection at 60 to 80 kilometres (37 to 50 mi);
- Identification of the tank type on the 8-to-10-kilometre (5.0 to 6.2 mi) range, and of an aircraft carrier at 40 to 60 kilometres (25 to 37 mi); and
- Estimates of ground target range of up to 20 kilometres (12 mi).
OTH radar (over-the-horizon radar)Over-the-horizon radar is a concept increasing radar's effective range over conventional radar. The Australian JORN Jindalee Operational Radar Network can overcome certain stealth characteristics. It is claimed that the HF frequency used and the method of bouncing radar from ionosphere overcomes the stealth characteristics of the F-117A. In other words, stealth aircraft are optimized for defeating much higher-frequency radar from front-on rather than low-frequency radars from above.
Advancements in computational powerThe stealth platforms may have slower advances in materials technology and physical limits so that further advances in stealth become either impossible or unaffordable. This may force future stealth platforms to stand off from their targets and use active countermeasures and long range weaponry to strike targets.However if the stealth aircraft are constantly upgraded they can hope to jam or evade emerging threats better than similarly equipped non-stealthy platforms could.
- Operational usage of stealth aircraft
The F-117 Nighthawk stealth attack aircraft.
The B-2 Spirit strategic stealth bomber
The U.S. is the only country to have used stealth aircraft in combat. These deployments include the United States invasion of Panama, the first Gulf War, the Kosovo Conflict, the War in Afghanistan the War in Iraq and the 2011 military intervention in Libya. The first use of stealth aircraft was in the U.S. invasion of Panama, where F-117 Nighthawk stealth attack aircraft were used to drop bombs on enemy airfields and positions while evading enemy radar.
In 1990 the F-117 Nighthawk was used in the First Gulf War, where F-117s flew 1,300 sorties and scored direct hits on 1,600 high-value targets in Iraq while accumulating 6,905 flight hours.Only 2.5% of the American aircraft in Iraq were F-117s, yet they struck 40% of the strategic targets, dropping 2,000 tons of precision-guided munitions and striking their targets with an 80% success rate.
In the 1999 NATO bombing of Yugoslavia two stealth aircraft were used by the United States, the veteran F-117 Nighthawk, and the newly introduced B-2 Spirit strategic stealth bomber. The F-117 performed its usual role of striking precision high-value targets and performed well, although one F-117 was shot down by a Serbian Isayev S-125 'Neva-M' missile commanded by Colonel Zoltán Dani. The, then new, B-2 Spirit was highly successful, destroying 33% of selected Serbian bombing targets in the first eight weeks of U.S. involvement in the War. During this war, B-2s flew non-stop to Kosovo from their home base in Missouri and back.
In the 2003 invasion of Iraq, F-117 Nighthawks and B-2 Spirits were used, and this was the last time the F-117 would see combat. F-117s dropped satellite-guided strike munitions on selected targets, with high success. B-2 Spirits conducted 49 sorties in the invasion, releasing 1.5 million pounds of munitions.
During the May 2011 operation to kill Osama bin Laden, one of the helicopters used to clandestinely insert US troops into Pakistan crashed in the bin Laden compound. From the wreckage it was revealed this helicopter had stealth characteristics, making this the first publicly known operational use of a stealth helicopter.
A recent use of stealth aircraft was in the 2011 military intervention in Libya, where B-2 Spirits dropped 40 bombs on a Libyan airfield with concentrated air defenses in support of the UN no-fly zone.
The F-22 Raptor fifth generation stealth air superiority fighter
Naval variant of the F-35 Lightning II fifth-generation stealth multi-role fighter
A Sukhoi PAK FA fifth-generation stealth multirole fighter
Stealth aircraft will continue to play a valuable role in air combat with the United States using the F-22 Raptor, B-2 Spirit, and the F-35 Lightning II to perform a variety of operations.
The Russian Sukhoi PAK FA stealth multi-role fighter is scheduled to be introduced from 2015, to perform various missions.
The Sukhoi/HAL FGFA, the Indian version of the PAK FA is scheduled to be introduced from 2017 in higher numbers, also to perform various missions.
The People's Republic of China plans to introduce the Chengdu J-20 stealth multi-role fighter round 2018. A prototype was flown in early 2011.
- Stealth aircraft lost
Main articles: F-117 Nighthawk#Combat loss, Andersen Air Force Base B-2 accident , and RQ-170 Sentinel
The first time that a stealth aircraft was shot down was on 27 March 1999, during Operation Allied Force when an American F-117 Nighthawk was brought down by an Isayev S-125 'Neva-M' missile launched by a Serbian Air Defense crew who were operating their radars on unusually long wavelengths.The pilot ejected and was rescued and the aircraft remained relatively intact due to slowly striking the ground, inverted.
In December 2011, Iranian sources showed videos of a captured US RQ-170 stealth drone in a good shape with intact central controlling unit.The information was later confirmed by US sources. The analysts say that the drone might have been captured by electronic cyber attack or jamming. There are reports that China and Russia asked Iran to inspect the drone less than a week after the Iranian video was released.
A B-2 crashed on 23 February 2008 shortly after takeoff from Andersen Air Force Base in Guam. The investigation stated the B-2 crashed after "heavy, lashing rains" caused water to enter skin-flush air-data sensors, which feed angle of attack and yaw data to the computerized flight-control system. The water distorted pre-flight readings in three of the plane's 24 sensors, causing the flight-control system to send an erroneous correction to the B-2 on takeoff. The B-2 quickly stalled, became unrecoverable, and crashed. The sensors measure environmental factors including air pressure and density, for data to calculate airspeed, altitude and attitude. Because of the faulty readings, the flight computers determined inaccurate airspeed readings and incorrectly indicated a downward angle for the aircraft, which contributed to an early rotation and an un-commanded 30-degree pitch up and left yaw, resulting in the stall.
Categories:
Teknologi