All the major powers stealth bombers, attack weapons, and attack and stealth surveillance drones are now able to be tracked because of a new method of "seeing" them has been developed, they say.
Actually it was observed as a phenomena in the 1950's first.
For those who remember the rabbit-ears style of TV antenna
History - The low frequency radio waves for "Channel 2" for instance were in the 54 megahertz radio band, quite below the FM radio band (88 megahertz) and above the "Citizens-band Radio" band (27 megahertz).My GPS equations were tested at that time and designed to locate with a precision of 1/16 of an inch. (of course what the military launched in space was grossly inaccurate, only good to a few inches in the best of conditions..)
In watching the black and white TV using Rabbit Ears style antenna mounted on the back of the TV, one would have to carefully position them so that the picture was clear, without "snow", and without "ghosting" (multiple images).
One could walk around the room, or if a car or large vehicle outside traveled on the street, the picture would "wiggle", or multiple "ghost-images" would appear, and as the vehicle got closer, the warp or shift of the ghost would get greater.
Since my concepts of "time of arrival" location determination (see ** Note below) were created in the late 1960's, one could PASSIVELY use 3 or 4 wideband-receivers monitoring a few fixed low frequency communications transmitters, such as TV or FM radio and with ease, determine either a transmitter's location when the mic was clicked on, or when an object moved.
One looks for any "ghosting" (time shifts in signals picked up in the 3 or 4 monitoring receivers), listening to the radio wave signals coming in, and with some quick computer processing, can locate the source of the distortion. (either a moving vehicle or vehicles, or a transmitter mic clicked on).
How Stealth works
The stealthy vehicles were designed to reflect RADAR (Microwave) signals up and away from a ground based radar, or absorb a portion of them. (A bomber then may have a reflection signature of a small bird for instance)So the militaries have turned to what they think is a better method:
But, the stealthy vehicles are though, unable to deflect the lower frequency regular radio waves upwards. The lower frequency waves do come back to the ground.
They become visible with precise detail allowing missiles from the ground or from other vehicles in the air.
The military solution to that has been to use the flying jammer airplanes. Of course the location of the jammer aircraft become obvious by time-of-arrival monitoring of their locations..
The logic this time is to go HIGHER in frequency, but not in the visible bands, such as what visible lasers would operate in, they want to go in the LONG-WAVE infra-red band (longwave infra-red is like heat).Here is a quote:
So pour more hundreds of millions of dollars into defence contractor's pockets is their solution.WASHINGTON – Once either China or Russia manages to put together a long-wave infrared search and track (IRST), high-speed data links, and the computers and algorithms for multi-ship sensor fusion, the ability of U.S. fifth-generation fighters to operate independently will diminish.
With Boeing and the U.S. Navy explaining in detail how a combination of longwave IRST combined with high-speed multi-ship data networking and advanced sensor fusion algorithms can generate a weapons quality track on enemy stealth fighters, it is only a matter of time before adversaries such as Russia and China develop similar capabilities.
Moscow and Beijing have most of the elements needed to develop and field counter-stealth technologies similar to that demonstrated by the Navy and Boeing during Fleet Exercise 2017 on-board a pair of modified F/A-18E/F Super Hornets using a combination of the powerful DTP-N processor, TTNT high-speed IP-based data-network and the long-wave Block II IRST pod.
The Navy will be fielding its new counter-stealth capabilities in the coming years as the Block III Super Hornet enters service in 2022.
Given that the Russians and the Chinese possess the individual elements of all the required technologies to replicate the U.S. Navy’s capabilities, it is only a matter of time before Moscow and Beijing start to field similar counter-stealth abilities.
The point is stealth was cracked the moment I came up with the GPS equations and we had higher speed dedicated microchip computers - back then, chips similar to the Z-80B was a good enough microprocessor... A Z-80 even ran the Radio-Shack desktop computers of the day. And that was enough processing power. We didn't need the IBM 360 and 370's to do this - it was plain vanilla simple easy and clean. I built my own Z-80 microcomputer dedicated boards back then, able to process in parallel way before the linux clusters of today.
Today our computer processing ability is staggering.. A network of such systems as I described (using the ghost signal time-shift monitoring and my GPS equations for "time-of-arrival" determination blocks their billion $ weapons stealthiness for pennies) will do the job very well.
So where is the military mind in Russia and China?
Very simple, fly FASTER than any attacking missile (or torpedo) can go. Fly faster, and use faster aircraft.
It is called HYPERSONIC transport.
That is where the behind the scenes developments really are focused, with China, Russia and of course the US mindset resides.
references:
"Ghosting" = https://www.revolvy.com/page/Ghosting-%28television%29
see the extra image present in the TV picture below
Ghosting (multipath distortion) caused by an object in the Sky:
The abbreviation TX stands for TRANSMITTER, and RX stands for receiver
By the way, just in-case anyone missed when I pointed out when the microphone or radio transmitter, any transmitter on any frequency (it works from audio thru light-wave and higher bands), and it doesn't matter if it is "spread spectrum", or analog or digital - the moment it turns ON, because receivers are monitoring and if using my GPS equations (a minimum of 3, or 4 receivers are needed), the location of the transmitter can be computed PASSIVELY and pretty instantly and very accurately.
This time-of-arrival method is used to passively locate gunshots for instance too..
Even natural sources such as lightning, or a meteor storm can be monitored in a passive way. Or any thing else up there moving around..
(** Note: PS - I was never paid for any of that, the GPS tech was stolen by the US government in the early 1970's from me.. GPS was designed to help people who could be in emergencies, or lost needing assistance, and the military weaponized it (sigh)..
And 'they' are trying it again, to steal my underground location and determination surveying technology, trying to create a hostile "duress" forced "take it or die" threat.. we will do a thread and article on that threat shortly.. and who it exposes doing it, their names and associations.)