BLACKEAGLE
ELITE MEMBER
- Joined
- May 9, 2007
- Messages
- 10,919
- Reaction score
- 2
- Country
- Location
TECHNOLOGY CHANGES the way battles are fought. The rarity of notable air battles
involving dogfights in the post–Vietnam War era can be attributed to the advances in airto-
air missile technology where longer range and better lock-in guidance have continuously
increased the engagement distance between aircrafts. The U.S. Air Force, for
example, has not had an ace (five aerial kills or more) since 1972. In many instances, the
battle is already decided on the radar long before visual contact is made. In recent confl icts
in the Middle East, air superiority was quickly established by the United States and allied
air forces, and the opposing fi ghters were mostly destroyed on the ground after their radar
and communication installations were knocked out in preemptive, stealth strikes or they
simply elected not to engage the U.S. fi ghters. The advances in technology, at least in
aerial battles, quickly made the prior-generation aircraft and armaments obsolete and resulted
in lopsided advantages for the side in possession of the superior technology. The
Israel-Syria confl ict back in 1982 and U.S.-Iraqi confl icts from 1991 onward have shown
that Russian-built MiG-29s and their equivalents were not of much threat to the F-15,
F-16, and other western counterparts. While it is true that a large part of the western superiority
also lies in the preparedness and training of the pilots, the training itself requires
many technological advances in fl ight simulators and battle scene reconstruction using
computers. More advanced Russian Sukhoi Su-30s and MiG-35s, on the other hand, are
viable weapons with potent sets of armaments and are making their way into the air forces
outside of Russia. The United States has in the meantime produced probably the most
advanced aircraft in history in the F-22 Raptor that embodies state-of-the-art technologies
in stealth, armaments, and battlefi eld management electronics. The more compact and
utility-oriented (less expensive) F-35 “Joint Strike Fighter” is also in the works.
To fi nd an example of aerial combats involving U.S. aircraft, one needs to look as far
back as 1989 in the Mediterranean region off the coast of northern Libya, a country in
North Africa next to Egypt. At the time, the Libyan strongman Muammar al-Qadhafi led
a rogue state of anti-American dictatorship. Using oil money, he had equipped his air force
with Russian-made jets including the MiG-23 Flogger. With the advent of long-range antiship
missiles and sophisticated air strike jet fighters, the U.S. aircraft carrier John F. Kennedy
operating in the area was on high alert. The tensions that existed between Libya and
the United States in preceding years, along with the unpredictable nature of Qadhafi , fueled
the prospect of an armed encounter in this region. A naval battle group, while carrying a
tremendous range and punch through its carrier-launched fi ghters (F-14 Tomcats), also is
vulnerable to missile and air attacks. For this reason, a battle group always moves with an
airborne early warning capability, in this case in the form of E-2C Hawkeye surveillance
aircraft. The long-range radar coverage of the E-2C allowed the intercept controller aboard
to detect two Libyan aircraft taking off from the Al-Bumbah air base more than 100 miles
deep in Libya and approaching the two F-14 Tomcats then on patrol in the air space above
the Gulf of Sidra off the Libyan coast. One of the patrol mission objectives was to protect
the air space near and above the carrier, and the F-14s took an air path to intercept the
bogeys from a rear, threat position. Instead of holding their course, the Libyan MiGs made
a counter move to circumvent the F-14s. Apparently the Libyan ground-based radars were
closely monitoring the situation, and instructions were being sent to maneuver against the
Tomcats. This cat-and-mouse jockeying of position repeated, with each side attempting to
gain an advantage by taking a pursuit position from the rear. From this pursuit position, the
forward-looking radars and also the heat-seekers can lock on to the opposing aircrafts without
the possibility of that favor being returned. At twenty miles and closing fast from a
head-on position, it became evident that the Libyan MiGs had no intention of being escorted
out of this air space and every intent of engaging the F-14s. It is unclear whether the
Libyan MiGs were locking on to the F-14 Tomcats, but the WSO (the weapons system offi
cer, also referred to as radar intercept offi cer, RIO, at this time) onboard one of the F-14s
was advising the lead pilot to move the aircraft in position for an optimum launch. At this
distance and speed, the two opposing sides are fair games for the air-to-air missiles and
under intense pressure of oncoming MiGs, one of the F-14s fi red two Sparrow missiles that
did not come close to the target. In the heat of battle, the WSO had the radar in a trackand-
scan mode, which did not provide radar illumination to guide the Sparrow missiles
with passive radar guidance. The Sparrows pursue the target in response to the radar signal
illuminated by the launch aircraft. All of this transpired without the two sides having visual
contact of the other. Now, the MiGs appeared as specks in the sky, and the Tomcats
split up with the wingman heading directly into the MiGs while the lead Tomcat veered to
gain a rear position. The Tomcat approaching the MiGs this time successfully locked the
radar onto one of the bogeys and fi red, resulting in a spectacular explosion. Incredibly, the
pilot escaped in an ejection chute. The lead Tomcat fi nally gained the pursuit angle on the
remaining MiG and fi red a short-range, heat-seeking Sidewinder that tracked the jet exhaust
heat and made contact. The entire sequence lasted approximately four minutes, and
most of the battle was fought in the radar space without visual contact. Not a single shot of
the Vulcan cannon was fi red.
A new era in the use of the air force in highly coordinated, precision attacks was opened
during the Operation Desert Shield in 1991. Although only 5 percent of all the munitions
delivered during this operation was of the guided type, it proved that optimal use of the air
power could debilitate the entire defense infrastructure of the opposing side, starting from
the command and control down to the infantry level dug in foxholes. The lopsided superiority
of the coalition aircraft and pilots were proven at the outset by the fact that thirtynine
of the outdated Iraqi MiGs were promptly shot down. In the next days, some of the
remaining Iraqi aircraft sought refuge in Iran to become permanent properties of Iran, and
the brief phase of the air-to-air encounters ended without much drama. Although there
were some 800 Iraqi aircraft, few of them challenged the coalition air force. U.S. Navy and
Air Force AWACS airplanes located and identifi ed Iraqi threats from the outset, in some
cases alerting the nearby coalition aircraft to fi re their SAM missiles to destroy Iraqi aircrafts
just as they cleared the runway during takeoff. In another instance, a Navy F/A-18
pilot was alerted of an approaching Iraqi fi ghter and using a Sidewinder missile recorded a
beyond-the-visual-range kill forty seconds after the AWACS alert. The overall result was
a complete control of the air space from which coordinated, multidimensional attacks on
the Iraqi targets could be made at will and with minimal losses, human or machine, to the
coalition side. During the second operation against Iraq ten years later, Operation Enduring
Freedom, a similar approach was taken except with much increased size and performance
of the guided munitions delivered either by aircraft or cruise missiles. In both instances,
the fi rst strikes were targeted against radar defenses and command/control sites so that the
air space could be cleared for subsequent operations.
Although the fi rst of the bombings on Baghdad was broadcast live a little before 7 PM
EST on January 17, 1991, the real war had started in the darkness of the southern Iraq-
Saudi Arabia border about two hours before the fi rst wave of F-117 stealth fi ghter-bombers
reached Baghdad. Iraq had built one of the most extensive air defense systems in the world
by this time, following the 1981 Israeli air raids on its nuclear reactor facility. This heavy
air defense network consisted of seventy-three radar sites, 400 observational posts, sixty
surface-to-air (SAM) missile batteries, and close to 2000 anti-aircraft guns, all of them
linked to seventeen regional command posts, four sector operator centers, and the Air
Defense Headquarters in Baghdad. The heavy volume of communication was handled
through microwave relays and fi ber optic cables to and from a central command computer
installed by a French contractor, Thomson-CSF. This modern air defense in principle
would detect any encroachments by foreign aircraft, and appropriate measures could be
quickly deployed to defeat them. As described in Chapter 3, a small gap in this dense network
of radars was identifi ed, and a squadron of AH-64 attack and USAF Pavelow helicopters
slipped in at low altitude to knock out the two forward radar installations forty
miles apart from one another without raising alarm to the rest of the network. This operation
allowed streaming of massive waves of aircrafts through the corridor thus created.
The fi rst wave to follow the helicopter attack was a fl eet of twenty-two F-15E Strike Eagles
along with EF-111 Ravens electronic warfare aircraft. This wave focused on high-priority
targets such as fi xed Scud missile launch sites, while the EF-111 Ravens jammed the Iraqi air
defense radars so that they could not fi nd a fi x on the F-15E’s locations. As the fl yable corridor
was yet quite limited, only the F-117 Nighthawk stealth fi ghter-bombers and Tomahawk
cruise missiles made bombing raids on Baghdad. The primary targets in Baghdad again
were sector operation centers, command bunkers, power grid sites, telecommunication centers,
the Ba’ath Party Headquarters, and the presidential palaces. At 3:45 AM Baghdad time,
a formation of thirteen-ft-long unmanned drone aircrafts was sent over key radar installations,
making themselves appear as heavy bombers making a run to Baghdad. Soon, the Iraqi
radars locked on to guide hundreds of SAM and anti-aircraft artillery (AAA) fi res to fi ll
the sky, except that the only real fl ying objects were the coalition HARM (high-speed
anti-radiation missiles) that locked on to the lit radars and promptly knocked them out. At
one point during this bait-and-hit operation, there were close to 200 Iraqi SAM missiles in
the air jabbing wildly at the drone decoys, and roughly one-quarter of the Iraqi SAMs were
expended in this manner during the fi rst day of combat with minimal effectiveness. This
pattern continued for several days with the F-117s attacking Baghdad during the night, the
Tomahawks during the day, and decoy/HARM combinations at any time.
Modern fi ghter aircraft today are a culmination of many technological breakthroughs in
diverse engineering disciplines ranging from avionics, fl ight control, material, and aerodynamics
to propulsion system. Control of the air space in modern battles gives the army
unprecedented freedom and authority on the ground. The ability to monitor the troop and
weapon movement and deployment, combined with the air-to-ground strike capabilities
to destroy the military and high-priority targets such as command and control sites, essentially
assures a lopsided battle for those who can command the air space. In addition,
movement of aircraft through the air is fast and far-reaching. Aerial refueling allows strategic
bombers to stay in the air for extended periods of time. Ground troop support from
carrier-based aircraft in response to evolving battle situations has become a standard tactics
of the U.S. forces deployed in faraway locations. For this reason, all of the world’s
major powers have invested their technological and ecomore potent jet fi ghters and bombers. In this chapter, we examine the technological advancements
found in some of these aircrafts.
Source:
MILITARY TECHNOLOGY OF THE WORLD.
involving dogfights in the post–Vietnam War era can be attributed to the advances in airto-
air missile technology where longer range and better lock-in guidance have continuously
increased the engagement distance between aircrafts. The U.S. Air Force, for
example, has not had an ace (five aerial kills or more) since 1972. In many instances, the
battle is already decided on the radar long before visual contact is made. In recent confl icts
in the Middle East, air superiority was quickly established by the United States and allied
air forces, and the opposing fi ghters were mostly destroyed on the ground after their radar
and communication installations were knocked out in preemptive, stealth strikes or they
simply elected not to engage the U.S. fi ghters. The advances in technology, at least in
aerial battles, quickly made the prior-generation aircraft and armaments obsolete and resulted
in lopsided advantages for the side in possession of the superior technology. The
Israel-Syria confl ict back in 1982 and U.S.-Iraqi confl icts from 1991 onward have shown
that Russian-built MiG-29s and their equivalents were not of much threat to the F-15,
F-16, and other western counterparts. While it is true that a large part of the western superiority
also lies in the preparedness and training of the pilots, the training itself requires
many technological advances in fl ight simulators and battle scene reconstruction using
computers. More advanced Russian Sukhoi Su-30s and MiG-35s, on the other hand, are
viable weapons with potent sets of armaments and are making their way into the air forces
outside of Russia. The United States has in the meantime produced probably the most
advanced aircraft in history in the F-22 Raptor that embodies state-of-the-art technologies
in stealth, armaments, and battlefi eld management electronics. The more compact and
utility-oriented (less expensive) F-35 “Joint Strike Fighter” is also in the works.
To fi nd an example of aerial combats involving U.S. aircraft, one needs to look as far
back as 1989 in the Mediterranean region off the coast of northern Libya, a country in
North Africa next to Egypt. At the time, the Libyan strongman Muammar al-Qadhafi led
a rogue state of anti-American dictatorship. Using oil money, he had equipped his air force
with Russian-made jets including the MiG-23 Flogger. With the advent of long-range antiship
missiles and sophisticated air strike jet fighters, the U.S. aircraft carrier John F. Kennedy
operating in the area was on high alert. The tensions that existed between Libya and
the United States in preceding years, along with the unpredictable nature of Qadhafi , fueled
the prospect of an armed encounter in this region. A naval battle group, while carrying a
tremendous range and punch through its carrier-launched fi ghters (F-14 Tomcats), also is
vulnerable to missile and air attacks. For this reason, a battle group always moves with an
airborne early warning capability, in this case in the form of E-2C Hawkeye surveillance
aircraft. The long-range radar coverage of the E-2C allowed the intercept controller aboard
to detect two Libyan aircraft taking off from the Al-Bumbah air base more than 100 miles
deep in Libya and approaching the two F-14 Tomcats then on patrol in the air space above
the Gulf of Sidra off the Libyan coast. One of the patrol mission objectives was to protect
the air space near and above the carrier, and the F-14s took an air path to intercept the
bogeys from a rear, threat position. Instead of holding their course, the Libyan MiGs made
a counter move to circumvent the F-14s. Apparently the Libyan ground-based radars were
closely monitoring the situation, and instructions were being sent to maneuver against the
Tomcats. This cat-and-mouse jockeying of position repeated, with each side attempting to
gain an advantage by taking a pursuit position from the rear. From this pursuit position, the
forward-looking radars and also the heat-seekers can lock on to the opposing aircrafts without
the possibility of that favor being returned. At twenty miles and closing fast from a
head-on position, it became evident that the Libyan MiGs had no intention of being escorted
out of this air space and every intent of engaging the F-14s. It is unclear whether the
Libyan MiGs were locking on to the F-14 Tomcats, but the WSO (the weapons system offi
cer, also referred to as radar intercept offi cer, RIO, at this time) onboard one of the F-14s
was advising the lead pilot to move the aircraft in position for an optimum launch. At this
distance and speed, the two opposing sides are fair games for the air-to-air missiles and
under intense pressure of oncoming MiGs, one of the F-14s fi red two Sparrow missiles that
did not come close to the target. In the heat of battle, the WSO had the radar in a trackand-
scan mode, which did not provide radar illumination to guide the Sparrow missiles
with passive radar guidance. The Sparrows pursue the target in response to the radar signal
illuminated by the launch aircraft. All of this transpired without the two sides having visual
contact of the other. Now, the MiGs appeared as specks in the sky, and the Tomcats
split up with the wingman heading directly into the MiGs while the lead Tomcat veered to
gain a rear position. The Tomcat approaching the MiGs this time successfully locked the
radar onto one of the bogeys and fi red, resulting in a spectacular explosion. Incredibly, the
pilot escaped in an ejection chute. The lead Tomcat fi nally gained the pursuit angle on the
remaining MiG and fi red a short-range, heat-seeking Sidewinder that tracked the jet exhaust
heat and made contact. The entire sequence lasted approximately four minutes, and
most of the battle was fought in the radar space without visual contact. Not a single shot of
the Vulcan cannon was fi red.
A new era in the use of the air force in highly coordinated, precision attacks was opened
during the Operation Desert Shield in 1991. Although only 5 percent of all the munitions
delivered during this operation was of the guided type, it proved that optimal use of the air
power could debilitate the entire defense infrastructure of the opposing side, starting from
the command and control down to the infantry level dug in foxholes. The lopsided superiority
of the coalition aircraft and pilots were proven at the outset by the fact that thirtynine
of the outdated Iraqi MiGs were promptly shot down. In the next days, some of the
remaining Iraqi aircraft sought refuge in Iran to become permanent properties of Iran, and
the brief phase of the air-to-air encounters ended without much drama. Although there
were some 800 Iraqi aircraft, few of them challenged the coalition air force. U.S. Navy and
Air Force AWACS airplanes located and identifi ed Iraqi threats from the outset, in some
cases alerting the nearby coalition aircraft to fi re their SAM missiles to destroy Iraqi aircrafts
just as they cleared the runway during takeoff. In another instance, a Navy F/A-18
pilot was alerted of an approaching Iraqi fi ghter and using a Sidewinder missile recorded a
beyond-the-visual-range kill forty seconds after the AWACS alert. The overall result was
a complete control of the air space from which coordinated, multidimensional attacks on
the Iraqi targets could be made at will and with minimal losses, human or machine, to the
coalition side. During the second operation against Iraq ten years later, Operation Enduring
Freedom, a similar approach was taken except with much increased size and performance
of the guided munitions delivered either by aircraft or cruise missiles. In both instances,
the fi rst strikes were targeted against radar defenses and command/control sites so that the
air space could be cleared for subsequent operations.
Although the fi rst of the bombings on Baghdad was broadcast live a little before 7 PM
EST on January 17, 1991, the real war had started in the darkness of the southern Iraq-
Saudi Arabia border about two hours before the fi rst wave of F-117 stealth fi ghter-bombers
reached Baghdad. Iraq had built one of the most extensive air defense systems in the world
by this time, following the 1981 Israeli air raids on its nuclear reactor facility. This heavy
air defense network consisted of seventy-three radar sites, 400 observational posts, sixty
surface-to-air (SAM) missile batteries, and close to 2000 anti-aircraft guns, all of them
linked to seventeen regional command posts, four sector operator centers, and the Air
Defense Headquarters in Baghdad. The heavy volume of communication was handled
through microwave relays and fi ber optic cables to and from a central command computer
installed by a French contractor, Thomson-CSF. This modern air defense in principle
would detect any encroachments by foreign aircraft, and appropriate measures could be
quickly deployed to defeat them. As described in Chapter 3, a small gap in this dense network
of radars was identifi ed, and a squadron of AH-64 attack and USAF Pavelow helicopters
slipped in at low altitude to knock out the two forward radar installations forty
miles apart from one another without raising alarm to the rest of the network. This operation
allowed streaming of massive waves of aircrafts through the corridor thus created.
The fi rst wave to follow the helicopter attack was a fl eet of twenty-two F-15E Strike Eagles
along with EF-111 Ravens electronic warfare aircraft. This wave focused on high-priority
targets such as fi xed Scud missile launch sites, while the EF-111 Ravens jammed the Iraqi air
defense radars so that they could not fi nd a fi x on the F-15E’s locations. As the fl yable corridor
was yet quite limited, only the F-117 Nighthawk stealth fi ghter-bombers and Tomahawk
cruise missiles made bombing raids on Baghdad. The primary targets in Baghdad again
were sector operation centers, command bunkers, power grid sites, telecommunication centers,
the Ba’ath Party Headquarters, and the presidential palaces. At 3:45 AM Baghdad time,
a formation of thirteen-ft-long unmanned drone aircrafts was sent over key radar installations,
making themselves appear as heavy bombers making a run to Baghdad. Soon, the Iraqi
radars locked on to guide hundreds of SAM and anti-aircraft artillery (AAA) fi res to fi ll
the sky, except that the only real fl ying objects were the coalition HARM (high-speed
anti-radiation missiles) that locked on to the lit radars and promptly knocked them out. At
one point during this bait-and-hit operation, there were close to 200 Iraqi SAM missiles in
the air jabbing wildly at the drone decoys, and roughly one-quarter of the Iraqi SAMs were
expended in this manner during the fi rst day of combat with minimal effectiveness. This
pattern continued for several days with the F-117s attacking Baghdad during the night, the
Tomahawks during the day, and decoy/HARM combinations at any time.
Modern fi ghter aircraft today are a culmination of many technological breakthroughs in
diverse engineering disciplines ranging from avionics, fl ight control, material, and aerodynamics
to propulsion system. Control of the air space in modern battles gives the army
unprecedented freedom and authority on the ground. The ability to monitor the troop and
weapon movement and deployment, combined with the air-to-ground strike capabilities
to destroy the military and high-priority targets such as command and control sites, essentially
assures a lopsided battle for those who can command the air space. In addition,
movement of aircraft through the air is fast and far-reaching. Aerial refueling allows strategic
bombers to stay in the air for extended periods of time. Ground troop support from
carrier-based aircraft in response to evolving battle situations has become a standard tactics
of the U.S. forces deployed in faraway locations. For this reason, all of the world’s
major powers have invested their technological and ecomore potent jet fi ghters and bombers. In this chapter, we examine the technological advancements
found in some of these aircrafts.
Source:
MILITARY TECHNOLOGY OF THE WORLD.