This website uses Cookies, and by using the website, you accept our Terms of Service, Privacy Policy, and other applicable policies set by our Legal Department.

You agree to stay up to date on any changes to our legal policies, as they are posted, by visiting our Legal Department. For your viewing convenience, we are not required to notify you again.

MCE123 - Technology Development

Overcoming Stealth Signatures of Nuclear Weapons

 

Stealth technology in conjunction with nuclear warheads is really a useless combination, because the nuclear warheads can be detected based on their radiation patterns by friendly aircraft and satellites. It is possible to determine if a missile (cruise missile, ICBM, SCBM) contains any nuclear weapons simply by scanning the missile for nuclear signatures. The stealth technology only helps to deter the abilities of missile intercepts systems, but if missile intercept systems use technology that can detect nuclear signatures, then the stealth really doesn’t help the ability of the missile to strike its target.

 

 

Technology to detect nuclear signatures in components of missiles needs to be integrated into all levels of the intercepts technology and systems, including radar, readiness, launch control, target acquisition, and destruction. The technology needs to be minimized to its smallest possible size to fit in miniature interceptors used in large interceptor rockets carrying the smaller and more prolific interceptors (multiple interceptors per interceptor missile), and it needs to be integrated into the circuitry that controls the navigation of all of the different components of the interceptors. This way the multiple interceptor parts (miniature interceptor missiles inside larger interceptor system missiles) all work together to bypass chaff, decoys, and the multiple maneuverable independent targeting warheads inside a MIRV unit, even after the MIRV separates its components.

 

Stealth may exist in the ICBM rocket components, in both signal loss and redirection technology, as well as aero-dynamical stealth technology, the hiding of heat signatures, decoy communications signatures, decoy missiles, decoy MIRV components, access denial technologies such as technologies that jam radar systems, the jamming of communication systems, and the jamming of target acquisition systems, all in contested communication environments. For this reason, multitudes of technologies need to be employed on the interceptors to compromise all of the different levels of security on the new generations of nuclear missiles, including ICBMs, SCBMs, and Cruise Missiles.

 

To be continued.

 

TOP SECRET

 

4/18/2016 3:35:12 PM


DMCA.com Protection Status Site Protected by SiteLock