Академический Документы
Профессиональный Документы
Культура Документы
F
aced with the prospect of aerial
By A r e n d G . W e s t r a stealth proliferation, states in
the 21st century are looking for
antistealth defense options. One
such alternative, passive radar, appears a cost-
effective counter to stealth. Passive radar is a
receive-only system that uses transmitters of
opportunity.1 Integrating a system of netted
receivers, passive radar can detect, track, and
target piloted and unpiloted stealth systems
and provide cuing for antiair weapons
systems. A passive radar system emits no
radio energy and can be well camouflaged in
both urban and rural landscapes. The threat
system produces no indications on friendly
radar warning receivers and is difficult to
locate and target. Faced with a passive radar
threat, the United States may find itself unable
to achieve air superiority at an acceptable cost.
As this article shows, ongoing advances
in passive radar will deny traditional means
to defeat enemy air defenses, make air supe-
riority difficult to achieve against a passive
radar opponent, and require changes in
thinking to maintain U.S. power projection
capability. In developing this central idea,
this article describes the history of the battle
between aircraft and radar, the rise of stealth
and counterstealth, and the ongoing surge in
passive radar and how it relates to advances
in signal processing and sensor fusion. Addi-
tionally, this article assesses the passive radar
threat to stealth, posits implications for future
U.S. military power, and recommends a U.S.
course of action regarding passive radar.
Great War of 19141918 appeared to validate transmitter and receiver via a shared antenna, a always get through. Indeed, stealth aircraft
this idea. In 1921, however, Giulio Douhet configuration known as monostatic, thus creat- have maintained the overwhelming advantage
asserted that the airplane changed warfare ing the conventional radar configuration most in recent conflicts, including Operation Allied
by magnifying the advantages of the offense commonly used thereafter. Force and the invasion of Iraq in 2003.
and at the same time minimizing, if not nul- Historically, radar has been the corner- Despite the overall success of the U.S.
lifying, the advantages of the defensive.3 stone of air defense. For example, during the stealth program, in 1999 an F117 was shot
Douhet did not envision the many sur- Vietnam War, North Vietnamese air defense down in the Balkans by a Serbian SAM
face-to-air threats that would evolve over the radars targeted U.S. aircraft, which, in turn, battery.15 Although some considered the
decades after his work was published. Neither countered with jamming and antiradiation downing an anomaly, the incident created
did airpower critics. As Sir Stanley Baldwin missiles. Due to the success of North Viet- much controversy. While the Air Force
informed the British parliament in 1932, I namese air defenses, the United States was assessed tactical lessons learned, others saw
think it is well also for the man in the street only able to establish temporary air superior- evidence that stealth could be defeated.16 The
to realize that there is no power on earth that ity over local areas of North Vietnam. Over incident illustrated what stealth designers
can protect him from being bombed, what- the course of the war, the North Vietnamese already knew: stealth technology does not
ever people may tell him. The bomber will shot down 190 U.S. aircraft using 1950s-era make an aircraft invisible. As a submariner
always get through.4 Russian surface-to-air missiles (SAMs).10 once aptly noted, Stealth is a zero-sum game.
Yet a few decades earlier in 1904,
German engineer Christian Hlsmeyer had
patented the telemobilskop, an early form of
the overwhelming offensive power of the airplane was largely
radar. But it was not until 1935 that radar first mitigated by the deployment of radar and modern air defenses
showed significant operational promise. In
the now famous Daventry experiment, Sir A third paradigm shift began in the In a given encounter, one platform has it
Robert Watson-Watt used radar to detect a 1970s in the Skunk Works of Lockheed and the other does not. The tactical advan-
British Heyford bomber at a range of 8 miles.5 Martin, where stealth pioneers first created tage accrued by being able to detect, close,
Notably, the Daventry experiment tested a the F117 stealth fighter (more bomber than and attack from a covert stance completely
passive radar system using the BBC Empire fighter in usage).11 Made operational in 1983, dominates all other factors in any encounter
broadcast as a transmitter of opportunity.6 the F117 saw combat in Panama in 1989 and algorithm.17 In Serbia in 1999, a SAM battery
Watson-Watt went on to develop the British again in the Gulf War in 1990.12 During the commander attacked from a covert stance and
Chain Home radar that played a critical role Gulf War, the F117 was employed against won the tactical advantage. It was a missile
in defeating the German Luftwaffe during the Iraqs most heavily defended targets. In spite shot heard around the stealth world.18
Battle of Britain in 1940.7 of Iraqs robust air defenses, not a single F117
World War II served as catalyst for a was lost or damaged during the conflict.13 By The Future of Stealth
second paradigm shift. The overwhelming comparison, 32 nonstealth aircraft were lost If anything, the downing of an F117
offensive power of the airplane was largely to antiaircraft artillery (AAA) and SAMs.14 If over Serbia only highlighted to the United
mitigated by the deployment of radar and Baldwin had witnessed the Gulf War, he might States the importance of stealth. Increasingly,
modern air defenses. Airpower did not prove have concluded, The stealth bomber will the U.S. military has made stealth one of its
Figure 1. Bistatic Geometry
an all-powerful offensive weapon that could
not be countered, and the bomber did not
always get through. Air defenses of both the
Figure 1. Bistatic Geometry
Axis and Allied opponents proved complex
and resilient, and combatants obtained air TA R G E T
superiority only locally and for limited dura-
tions through the costly reduction of enemy
air defenses. This paradigm held firm through
R tx Rrx
World War II and for the duration of the
Cold War. For the time being, it seemed that
Clausewitz had caught up with the airplane.
Despite Watson-Watts breakthrough at
Daventry, the experiment highlighted passive L
radars difficulties, including intermittent signal TRANSMIT TER RECEIVER
strength and, at the time, irresolvable locating
and tracking ambiguities due to the passive Note: L = distance between transmitter and target ("bistatic baseline");
radar geometry.8 Passive radar is bistatic, Rtx = transmitter range to target; Rrx = receiver range to target;
= bistatic angle.
meaning the receiver is located at a distance
from the transmitter.9 Bistatic radar geometry Source: C.J. Baker and H.D. Griffiths, Bistatic and Multistatic Sensors for Homeland Security (London:
University College, 2005), 4, available at <http://nato-asi.org/sensors2005/papers/baker.pdf>.
is shown in figure 1. In 1936, scientists solved
the difficulty of geometry by collocating the
highest priorities, both in terms of new acqui- signature is defined as all the observables on a radars where the receiver is collocated with
sitions and the retrofit of older aircraft. In stealth platform that require external illumina- the transmitter and is less effective against
short, stealth is the centerpiece of the U.S. air tion. . . . The active signature reduction methods bistatic radar geometry.27 Radar-absorbent
superiority strategy. are commonly called low probability of intercept material augments fuselage shaping by
As stealth grows ubiquitous, nonstealth (LPI). . . . Passive signature reduction techniques absorbing radar energy and reducing the
systems will become rare. Stealth principles are are often called low observables (LO).23 strength of the radar echo.28 Future innova-
evident in nearly every newly developed mili- tions may allow stealth aircraft to actively
tary aircraft, ship, and ground combat system. Stealth designers attempt to balance cancel radar echo by retransmitting radar
Nations devote large proportions of their signature techniques.24 For example, efforts energy and/or by ionizing boundary layer air
military budgets to stealth research and devel- to make an aircraft less visible at 5 miles are around the fuselage.29
opment. And with the Air Force having retired somewhat superfluous if it can be acquired by
the F117 in 2008, the United States now has an infrared (IR) sensor at 20. LPI designers Counters to Stealth
a shortage of operational stealth aircraft.19 focus most of their efforts on reducing the Before discussing passive radar, several
Current U.S. stealth aircraft inventory consists emissions produced by the aircrafts radar other radar and sensor systems are worth
of 20 B2 bombers and 187 F22s, with the and IR sensors.25 In designing LO, the main mentioning in terms of counterstealth capa-
Joint Strike Fighter projected to become opera- concern is reducing reflection in the radar bility. One of the most significant counters
tional in 2012.20 Planned U.S. procurement spectrum, also known as the radar cross to stealth, namely conventional very high
for the Joint Strike Fighter is 2,456 aircraft section (RCS). frequency (VHF) and ultra high frequency
delivered over a 28-year period.21 Meanwhile, (UHF) radar, has been around since World
Russia, India, China, Japan, and other coun- stealth is achieved by a broad War II and is still in use today for long-range
tries are attempting to enter the stealth aircraft air surveillance. Most LO techniques are
market.22 In short, stealth is relevant, in much
collection of techniques that designed to defeat acquisition and fire control
demand, and continuously evolving. render a platform difficult to radar in the X band, which uses centimeter
locate and attack wavelength. VHF- and UHF-band radar,
Stealth Techniques however, uses decimeter- to meter-long
Stealth is achieved by a broad collection Designers reduce RCS primarily wavelength. In general, the RCS of an aircraft
of techniques that render a platform difficult through fuselage shaping and radar-absorbent increases as wavelength of the illuminating
to locate and attack. It requires reducing air- material. Fuselage shaping, the more impor- radar increases.30 Furthermore, when the
craft signature, generally categorized as either tant of the two methods, reflects radar energy radar wavelength is in the same order of mag-
active or passive: away from the direction of the emitter.26 nitude as the aircraft or parts of it, the radar
Figure 2 depicts a stealth aircraft RCS versus waves and the aircraft resonate, which signifi-
Active signature is defined as all the observable that of a conventional aircraft. Fuselage cantly increases the RCS of the aircraft.31 It
emissions from a stealth platform. . . . Passive shaping works primarily against conventional is the physics of longer wavelength and reso-
nance that enables VHF and UHF radar to MMW antiair missile seekers, and other off-the-shelf technology makes them attrac-
detect stealth aircraft. Poor resolution in angle countries are following suit.37 tive for nonpeer countries as well.
and range, however, has historically prevented While the aforementioned technologies Passive radars use transmitters of
these radars from providing accurate target- offer important capabilities, they possess opportunity. Potential waveforms include FM
ing and fire control.32 limitations that restrict their effectiveness and AM radio, television, digital audio/video
Since the Gulf War, the Russian defense for air defense. Conventional radar is vulner- broadcast, and cellular phone networks.38
radar industry has put considerable effort into able to detection and attack by electronic Today, passive radar is often configured as
digitizing its VHF and UHF radar systems warfare and air-delivered weapons; listening a multistatic system using three or more
to improve counterstealth capability. Russias systems do not provide tracking information; transmitters and receivers.
older model radars now have improved reso- and IR/EO/MMW is limited in surveillance Passive radar locates and tracks targets
lution and signal processing, and newly devel- capabilities. through a combination of methods, greatly
oped models, such as the Nebo surface vehicle In contrast, passive radar is covert, all simplified here for the sake of discussion.
unit, which is a VHF adaptive electronically weather, and capable of medium- to long- First, the radar measures the time difference
steered array radar, likely present significant range surveillance, and shows strong potential of arrival between the direct signal from the
counterstealth capability.33 in detecting, tracking, and targeting stealth transmitter and the reflected signal from the
Other recently developed conventional aircraft. It is thus emerging as a solid competi- target to determine the bistatic range. Bistatic
radars likely to have counterstealth capabil- tor in the counterstealth game. range, expressed as an ellipse, is shown in
ity include Lockheed Martins theater high-
altitude area defense radar and the Israeli
Green Pine radar (recently sold to India),
a new paradigm is emerging, enabled by advances in
systems with both long range and high networked computing and passive radar technology
resolution in the UHF L-band.34 The Signal
Multi-beam Acquisition Radar for Tracking Passive Radar figure 3. The radar uses the intersection of the
(L) naval radar manufactured by Thales is A new paradigm is emerging, enabled by receiver-to-target bearing and the bistatic range
yet another system with reputed counter- advances in networked computing and passive ellipse to estimate approximate target location.
stealth capability.35 radar technology. Because of their potential to In a multistatic system, the radar refines target
Passive listening systems, such as elec- counter stealth-based airpower advantage, the location based on intersecting bistatic range
tronic support measures (ESM) and direc- use of these technologies by peer competitors ellipses. The radar further measures Doppler
tion finding (DF), attempt to detect stealth is highly likely. That these systems are both shiftwavelength compression or expansion
aircraft radar, radio, and data link emissions low cost and, in part, based on commercial- caused by relative motionto determine target
and pass this information to surveillance
radars. LPI techniques of stealth are designed Figure 3. Bistatic Range
to reduce or deny ESM and DF, but systems Figure 3. Bistatic Range
such as the Russian Kolchuga remain formi-
dable threats that are likely being updated
with digital processing.36 TRANSMIT TER
Another counter to stealth is IR/electro- 0
optical (EO) systems, which include IR search Rtx TA R G E T
and track and high magnification optics. Such
systems, however, are limited in the ability
to scan large volumes of airspace and usually
must be cued by other sensors. In addition,
L Rrx
most of this spectrum is degraded by clouds,
low illumination, and low visibility. Stealth
aircraft counter IR/EO through heat signature
management, stealthy flight profiles, and LO
paint schemes. Constant range 0
Growing in potential as a counterstealth ellipse RECEIVER
technology is millimeter wave (MMW)
imaging, which uses the radiometric signa-
ture naturally emitted by all objects. MMW
penetrates clouds and low visibility. The wave- Note: Rtx = transmitter range to target; Rrx = receiver range to target;
L = distance between transmitter and receiver. Bistatic range, expressed as Rtx + Rrx L,
form can also be transmitted by radar, which
remains constant at all points on the ellipse.
then receives and processes the return echo.
The A64 Apache Longbow/Hellfire system Source: NationMaster Encyclopedia, Bistatic Range, available at <http://www.nationmaster.com/
is an example of operational MMW radar. encyclopedia/Image:BistaticRange.png>.
heading and speed. The radar tracks the target are frequency, bandwidth, and the presence radar. Digital audio broadcast, while a useable
by performing regular updates. of continuous wave, which provides Doppler waveform, emits at low power, offering only a
Advanced signal processing allows shift for measurement of velocity.44 Also short detection range of 36 km.48 Use of more
passive radar to integrate data from multiple important is whether illuminators transmit than one waveform is possible, with existing
receivers, cancel signal interference, differenti- continuously or with significant interruptions systems touting accurate three-dimensional
ate real targets from ghost returns and clutter, (for example, daytime only). surveillance capabilities across multiple wave-
and establish a target track. Although such pro- Several waveforms in the HF, VHF, and forms, to include FM radio and analogue and
cessing requires significant computing power, UHF bands have shown potential for use in digital television.
most passive radar systems operate on com- passive radar and also exhibit counterstealth Most important to this discussion, all of
mercial DOS-based computing technology. properties. In the VHF band, FM radio is the aforementioned waveforms fall between
The recent advances of passive radar broadcast at high relative power and has mul- 3 and 450 megahertz. Based on their decime-
arise from a confluence of digital processing tiple transmitters available in moderately to ter- to meter-wavelengths, these waveforms
technology, cheap, sophisticated hardware, heavily populated regions. Analog television inherently increase RCS and also interact with
and the demand for enhanced surveil- (VHF band) also provides useful illumina- an aircraft to create resonance. RCS induced
lance.39 Moores law describes the doubling tion, as does digital audio broadcast, which is by resonance is largely independent of fuse-
of computer processing speed every 18 growing in usage worldwide. High-definition lage shape. In short, radar in this spectrum is
months. Meanwhile, designers have made (HD) television is spreading globally as well inherently counterstealth.
significant advancements in correspond- and offers a wideband, high-power waveform While passive radar can perform detect-
ing radar software. What was once thought in the low UHF band. In the HF band, Digital ing, locating, and tracking functions, it may
impossiblethat is, integrating signals from Radio Mondiale (DRM), a digital form of also be able to perform target identification
multiple receivers and detecting tiny echoes shortwave AM radio, also has passive radar (ID). Under development are methods to
in high-clutter radar environmentshas now potential. conduct target imaging using multistatic
become feasible.40 These waveforms offer differing levels UHF-band Inverse Synthetic Aperture
As a result of this confluence of of utility. Analog television and FM radio Radar.49 Additionally, existing passive ID
technology, several systems are now either both offer strong illumination and medium measures, such as DF/ESM, will likely
available off the shelf or are in development. detection rangesFM out to roughly 120 augment passive radar.
Such systems include Lockheed Martins kilometers (km).45 Analog television has a If successful at creating a target track
Silent Sentry,41 Roke Manor Researchs strong signal but suffers from interference, and ID, passive radar could provide cueing for
CELLDAR,42 Thales-Raytheons Homeland while FM is marked by interruptions, such as surface-to-air and airborne weapons systems
Alerter,43 and others, including French, pauses during human speech.46 HD television in order to enable acquisition. Weapons system
Swedish, Chinese, and Russian systems. provides an uninterrupted signal with a detec- cueing requires communications infrastruc-
Certain commercial waveforms are tion range of 120 km.47 DRM potentially offers ture; for a covert system, this means a local
more suitable for passive radar illumination over-the-horizon detection ranges; however, area network for ground-based weapons and
than others. The most important parameters low resolution limits its use to early warning an LPI data link for airborne platforms. For
Threat Employment
U.S. Air Force (Andy Dunaway)
its covert stance lends itself to a strategy of Electronic warfare (EW) offers the Building new generations of stealth
striking from concealment. Moreover, our potential to temporarily neutralize passive aircraft may be feasible, but efforts to
most likely future opponentan authoritar- radar. Standoff noise jamming would have improve stealth will eventually reach a point
ian statealready possesses tight control over an effect, but because the location of the of diminishing returns. Advantages will
its commercial media, a situation that requires receivers is unknown, the jammer would grow more difficult and expensive to achieve
a relatively small step to optimize broadcast- need to emit across a wide sector, unavoid- as counterstealth technologies concurrently
ing parameters for passive radar use. ably reducing jamming signal density.51 grow more advanced.
This same adversary will build a passive
multistatic receiver network in the VHF and North Vietnamese surface-to-air missile
UHF bands, blending the system into the crew in front of SA2 launcher
vertical buildup of urban terrain.50 In remote
areas not served by media broadcast, the
adversary may disperse a network of inex-
pensive throw-away transmitters to function
as the surveillance area illuminators. He will
integrate passive radar and other sensors for
rapid, efficient command and control. It is
likely that such an adversary will make efforts
to develop or acquire passive SAMs with low
observable launch signatures and procure and
deploy high- and mid-altitude unmanned
aerial vehiclesmissile trucksto deny
flight at those altitudes.
Basic stealth techniques, however, will planners must recognize the counter to U.S. work hand in hand with key allies to
be much less effective than they once were stealth-based air-superiority that is currently develop shared capabilities
against passive radar systems that benefit from unfolding, of which passive radar forms a core explore enhancing parallel technolo-
bistatic geometry and the use of counterstealth technology. These self-same leaders must take gies (such as disposable transmitters).
waveforms. Increasingly, combatants will use appropriate measures to ensure that the United
passive radar and weapons systems to detect, States is not caught off guard by this impending Develop methods of degrading enemy
acquire, track, and target aerial stealth plat- shift in the technological landscape. The fol- passive radar. In support of this effort:
forms. Against such systems, stealth on its own lowing recommendations are in order.
will likely provide inadequate protection for Endeavor to be a leader in the passive focus on a multilevel EW capability
manned aircraft, UAVs, and missiles. radar field. Arguably, the United States has against passive radar54
This article posits that an ongoing race marginalized the passive radar field due to continue to develop layered defensive
between stealth and counterstealth is emerg- a focus on conventional radar systems. The measures for aircraft and UAVs.
ing, in which technology will provide only U.S. military must gain an understanding
incremental advantage to a combatant until of passive radar, not merely theoretically, or Prepare for military operations without
a new counter is found. This assertion does with minor research and development proj- air superiority. In support of this effort:
not mean that there are no further opportuni- ects, but with a dedicated effort. But why, one
ties to leverage stealth advantages, but that may ask, build a stealth counter when there (again) develop passive radar, but
advances in stealth will be more evolutionary is no immediate stealth peer competitor? The in this case to deny enemy air superior-
than revolutionary. The future of stealth and answer is that would-be competitors in the ityfuture enemy stealth capabilities are
counterstealth will more closely resemble the stealth arena are making a dedicated push to ultimately not a matter of if but when
technological one-upmanship that occurred develop this technology. We cannot afford to continue to integrate complementary
during World War II and the Cold War than spend billions on stealth, only to fail to thor- piloted and unmanned system capabilities
the order of magnitude advantage the United oughly understand and counter rival systems. plan and train to the contingency of
States enjoyed during the Gulf War and the two In support of this effort: military operations with only local air supe-
decades that have followed. Against a passive riority or with air superiority largely denied.
radar adversary, air superiority will likely only build collaboration between key indus-
be achieved at significant cost. Forcible entry try and independent electronic engineers Passive radar will play a critical role
and amphibious operations will accordingly increase prioritization of passive radar in future conflict. Ongoing advances in
prove much more challenging. Once again, the research and development passive radar will deny traditional means
defensive form of warfare asserts itself. develop and field a passive radar of defeating enemy air defenses, make air
system on a U.S. training rangeas a train- superiority difficult to achieve against a
Recommendations ing tool for U.S. stealth pilots and systems to passive radar opponent, and require changes
To best position the United States for test countermeasures and tactics and assess in thinking to maintain U.S. power projec-
the future, military strategists and operational performance53 tion capability.
we cannot afford to
spend billions on stealth,
only to fail to thoroughly
understand and counter
rival systems
U.S. Air Force (Julianne Showalter)