Professional Documents
Culture Documents
Analogues Stealth
Analogues Stealth
June 2002
Analogues of
Stealth
by
Robert P. Haffa, Jr. and James H. Patton, Jr.1
In Brief
The U.S. Department of Defense plans to invest hundreds of billions of
dollars in stealthy aircraft over the next several decades. Will low-observable
(LO) capabilities incorporated in military aircraft such as the B-2 bomber, the
F-22 air superiority fighter and the F-35 joint strike fighter prove as successful
and enduring as submarine stealth? To address that question, this paper briefly
explores antisubmarine warfare, examines the development and fielding of low-
observable aircraft, and suggests analogues between stealthy platforms in the sea
and in the air.
When those analogies are drawn, many of the same reasons the submarine has
proven so difficult to detect, track, fix, and destroy also pertain to stealthy
aircraft. The friction of combat, the platform operators’ ability to modify their
tactics, the technology of denying more than fleeting contacts, and the problem
of looking for small things in large volumes all apply. The submarine’s long-term
success suggests that properties inherent in low-observable combat platforms
provide an enduring competitive military advantage to those who produce,
maintain and continually improve them. It stands to reason, therefore, that
stealthy aircraft should maintain an enduring edge over anti-aircraft defenses,
providing their sponsors constantly study and exploit the environment, and take
prompt and sustained corrective actions to negate enemy countermeasures.
1
This paper adopts the same title and thesis presented in an article the authors published a decade ago, but explores the issues
quite differently. See “Analogues of Stealth” in Comparative Strategy (Vol. 10, No. 3) pp. 257-271. Copyright 1991, Taylor
and Francis. Now, as then, we acknowledge James G. Roche for encouraging us to examine the similarities between stealthy
submarines and aircraft. We would also like to thank our colleagues in the Northrop Grumman Analysis Center for their
assistance, especially John Backschies, Mary Hubbell and Adam Siegel.
A N A LY S I S CENTER PAPERS
Introduction: Analogues of Stealth With these analogies in mind, this paper explores
similarities between low-observable submarines
Recent claims regarding the detection and vulner- and aircraft with the purpose of examining the
ability of low-observable aircraft like the B-2
staying power of stealth.2 To accomplish that, we
bomber are reminiscent of similar reports issued
first briefly review the history of anti-submarine
over the years postulating the demise of the sub-
warfare (ASW)—a story of the search for coun-
marine’s stealth. Comparing submarines and
aircraft employing stealth—low-observable termeasures against a platform that from the out-
technologies and tactics—results in several analo- set was designed to use the environment to mask
gies useful in refuting these claims: its presence. Yet, ever since submarines entered
military operations, claims have emerged that
• Each system operates in a three-dimensional some new technology will make them obsolete.
environment facilitating low observability: vast
Time and again those claims have proved base-
stretches of sea and sky.
less. With continued modernization and modifi-
• They can use terrain features (ocean trenches, cation, the submarine’s signature has been
mountain ranges) to mask their presence from reduced to the point where the “noisy” nature of
sensors.
its operational environment hides its position and
• They can vary their immersion within the dramatically reduces or neutralizes the effective-
environment (depth, altitude) and use its char- ness of various detection means. Indeed, every
acteristics (i.e., temperature, weather, or dark- nuclear-powered U.S. submarine was quieter, that
ness) to add measures of stealthiness.
is, more stealthy, when decommissioned than
• They can reduce to varying degrees their when it was launched.
observable signatures (through sound-deaden-
ing techniques, infrared shielding, or cooling). It is our contention that low-observable aircraft,
• They can avoid or attack active means of when they reach the end of their service life,
detection (sonar, radar) and make themselves should also be retired in a more stealthy condi-
less detectable by spoofing or jamming those tion than that of their first flight. Seeking to sup-
systems. port that contention, the paper next outlines the
• Finally, owing to these properties stealth pro- development and employment of airborne
vides, they each enjoy the tactical advantage of stealth. Although the story of air defense begins
choosing when to engage the adversary in with observers on the ground and in the air, since
combat. World War II air defenses have relied primarily
190
Merchant Ship
Adapted from Tom Stephanic,
180 Strategic Anti-Submarine Warfare and
High-SpeedS
SSN Nautilus Naval Strategy (New York: Lexington, 1987), p. 278.
(dB re 1 micro Pascal at 1 yd)
170 (571)
ubma SSN
SSBNSkipjack
Permit
Broadband Sound Level
(585)
(594)
160
SSN Permit
SSBN Permit
SSBN George (594) SSBN US Attack Submarines
150 Washington SSN Sturgeon
Sturgeon
(598) (637)
140
SSBN Ethan Allen
130 SSN Los Angeles
Diesel (608)
Dieseal Seawolf and
(688)
120 Submarine SSBN Lafayette Virginia Class
on Battery (616)
110
100 US Ballistic Missile Submarines
SSBN Ohio
90 (726)
1955 1960 1965 1970 1975 1980 1985 1990 1995 2000
Year
Figure 1. This estimate of total radiated sound levels for US nuclear submarines suggests a noise reduction of 60 dB over
45 years. Modern submarines emit about one-millionth of acoustic energy as did their predecessors.
2
There are differences as well, most notably that the submarine achieves its stealth primarily by submerging, while a stealthy aircraft operates in the same medium as non-
stealthy planes. We believe the comparisons far outweigh the contrasts, particularly with regard to the mutual need to counter detection technologies and the operational
advantages that accrue to stealthy combat platforms whether in the sea or in the air.
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
on radar to detect, track, and subsequently survive, must be accorded the attention and the
engage hostile aircraft. That said, optical detec- resources it deserves.
tion is still pursued, as are detection techniques
seeking other aircraft signatures such as heat, Anti-Submarine Warfare: Countering
radio communications, and even turbulent wakes Underwater Stealth
in the atmosphere.
Attempts to degrade the submarine's inherent
Although the atmosphere provides some natural stealthiness through ASW have evolved through
hiding places for aircraft, such as clouds and numerous techniques and technologies. Initially,
darkness, an airplane’s signature must be lowered ASW relied on a submarine compromising its
to survive in a hostile environment. Using stealth stealth by operating in a non-submerged mode or
technology, aeronautical engineers reduce an air- raising its periscope above the ocean’s surface.
craft’s susceptibility to radar detection and miti- Before World War II, technological innovations
gate its observable infrared, electromagnetic, visu- led to active means of detection (e.g., sonar) to
al and acoustic signatures. Indirect or passive search for submerged submarines. During World
measures diminish the contrast between an air- War II, ASW exploited the nonstealthy aspects of
craft’s profile and its physical or electromagnetic a submarine's behavior by employing radar when
surroundings. For example, camouflage paint the sub was required to operate on the surface,
allows ananaircraft
allows to to
aircraft and by using direc-
blend into
intothethe
back-
back- tion-finding equip-
ground, while
whileaircraft
aircraft …stealth, to survive, must be ment when subma-
threat-warning systems
systems accorded the attention and the rine transmissions
enable search radar eva- broke radio silence.
sion. Countermeasures
Countermeasures resources it deserves. Finally, since World
include presenting
presentinganan War II, more sophis-
incoming anti-aircraft
anti-aircraft ticated detection
missile with a false signature to lead it astray, techniques have emphasized passive detection
using focused light, flares or lasers to lure an technologies, such as listening for the sounds of a
infrared seeker, and employing active jamming or submarine, detecting its metallic hull, or picking
deploying a towed decoy to deflect radar terminal up the trail it leaves behind.
guidance. Using these multi-spectral signature
reduction techniques, low-observable aircraft Seeking nonstealthy signatures. Although some
deny current detection methods to a degree com- observers anticipated the submarine’s military
parable to the modern submarine’s ability to potential before World War I, a more typical
counter anti-submarine warfare capabilities. opinion was that the submarine was a cowardly
weapon employed only by weak naval powers.
Finally, we draw analogies between the game of Even after three British cruisers had been torpe-
measure and countermeasure characterizing the doed and sunk in a matter of minutes by a
hunt for stealthy platforms in the air and beneath German U-boat on September 22, 1914, the
the sea, speculate on future challenges, and con- media coverage about the event concluded that
clude with some implications for the long-term the submarine threat was likely to be short lived.
competitive advantage stealth provides. A theme “Mining harbors, torpedo nets, better armor,
throughout the paper implies that those forecast- careful lookouts (including aircraft) and high
ing the impending demise of low-observable speeds and frequent course changes” were seen as
aircraft may be falling into the same sort of traps countermeasures likely to negate any advantages
as those who wrongly predicted the degradation the submarine could achieve by wrapping itself in
of the submarine’s stealth. But we hasten to warn the cloak of the sea.3
that maintaining a combat platform’s stealth is
neither a naturally occurring nor a self-sustaining The 1918 British development of sonar, for
phenomenon. As a proven and essential capability SOund Navigation And Ranging, strengthened
of future U.S. power projection forces, stealth, to the belief that the submarine would become
3
“Modern Submarine Warfare: Methods of Guarding Against the Latest Form of Underwater Attack,” Scientific American, November 1914, pp. 376-77.
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
4
See “Submarine Capabilities and Limitations,” Naval Institute Proceedings, Aug. 1925, pp. 1398-1407.
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
sinking ships, they also suffered major losses from opment of whole new systems based on passive
counterstrikes. This experience influenced U.S. techniques. Sophisticated sonobuoys, bottom
Navy strategy and force planning through the placed sound arrays, towed sonar systems, and
Cold War, generating requirements for large helicopter-dropped arrays were deployed to detect
numbers of surface ships to escort trans-Atlantic submarine-generated noise. Sonar systems grew
convoys.5 larger, longer and more powerful to seek out
increasingly quieter submarines. However, U.S.
The development of nuclear-powered submarines submarines were able to respond to and counter
during the Cold War altered the balance between these threat improvements and retain their
surface and sub-surface combatants. By greatly acoustic advantage by using sonar to provide
limiting their vulnerability through stealthy tac- threat information, reducing equipment-radiated
tics and technologies, nuclear attack submarines noise, and employing various types of hull coat-
(SSNs) gained the initiative against surface ships ings analogous to RAM (inasmuch as they
under almost all circumstances. The U.S. Navy, reduced the strength of a submarine’s sonar
having invested significantly in the fielding and return). Tactics also helped to defeat sonar detec-
practice of ASW, found that SSNs successfully tion, or to break the kill chain linking that detec-
attacked surface ships in exercise after exercise. tion to an effective attack. Thus, the submarine,
Thus, from the 1960s on, it was generally alerted to a momentary breach in its low observ-
acknowledged that the only consistently effective ability, might deploy a noisemaker or launch a
defense against a submarine attack was another decoy to confuse the source trying to track and
submarine defending the force, and submarine engage it.
barriers in the Greenland-Iceland-UK gap
became important additions to the forces defend- While acoustic techniques have remained the
ing Atlantic convoys. dominant means of locating submarines, the
Cold War saw attempts to exploit other phenom-
Acoustic and non-acoustic ASW. Sound and sonar enologies. Airborne magnetic anomaly detection
have been the primary focus of efforts to counter (MAD) equipment was viewed as a great break-
the submarine’s stealth since World War II. through in ASW when it was first used during
Acoustic technology improved the capabilities of World War II. But, with very limited range and
active sound measurement and led to the devel- frequent false readings, MAD proved to be a poor
search mechanism, and
today serves primarily as a
localization device when an
approximate position of a
submarine is already
known. The low altitudes
needed for MAD employ-
ment also result in a cou-
pling of the aircraft's noise
to the water, serving to alert
any submarine around.
Technologists have also
devised a number of
systems in an attempt
to detect the family of
elements or compounds
shed, pumped, activated or
Allied destroyer dropping twin depth charges in World War II.
5
A typical force generation package for the escort mission included 10 surface combatants per convoy. Planning four convoys per month, and adding a carrier battle group
to each task force, could generate total ship requirements of 167 ships, not including submarines, just in the Atlantic.
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
otherwise released
released …"first-look, first-shot, first-kill," Although the
from a modern
a modern mantra chanted by
submarine.
submarine. One One the importance of seeing the opponent supporters of the
detection
detection mode mode stealthy F-22 air
investigated aboard first and completing an attack superiority fighter
ASW aircraft
aircraftwas
was is “first-look, first-
to detect hydrocar- without being detected has long been shot, first-kill,” the
bons released
releasedinto
the atmosphere
into
atmosphere inin
the goal of would-be aerial aces. importance of see-
ing the opponent
the exhaust of a snorkeling diesel-electric subma- first and completing an attack without being
rine. Although expectations mounted after limit- detected has long been the goal of would-be aeri-
ed success under controlled conditions, open- al aces.6 As far back as World War I, air combat
ocean testing saw very high false alarm rates, doctrine recognized that “the deciding element in
especially in areas where other hydrocarbon-emit- air combat is usually surprise.”7 But in those days
ting shipping was present (a likely place for of early combat aviation, when the primary
patrolling submarines). As a result, this “sniffer” means for detecting enemy aircraft was a visual
equipment had minimal operational impact. sighting, there were few, if any, technological aids
to evasion. Rather, airmen of the time placed a
Hydrodynamic principles, such as a Bernoulli premium on tactics to achieve surprise, such as
“hump” or a Kelvin “wake,” offer other detection hiding in clouds or approaching their adversary
means—sensing effects on the sea surface result- from out of the sun’s glare.
ing from a submerged, moving body. Most of
these methods, enabled through radar- or laser- From World War I through the inter-war period,
based scanning of the ocean’s surface, could theo- visual observation—an inherently limited capabil-
retically detect shallow, fast submarines. “Shallow ity—remained the primary means of aircraft
and fast,” however, is a seldom-populated portion detection. During this time, attackers retained,
of the submarine’s total operating envelope. especially in air-to-ground engagements, a signifi-
Although the Navy has expended significant cant competitive advantage over defenders, giving
efforts attempting to exploit these theoretically rise to such absolute assertions of offensive air-
observable phenomena, the “noise” surrounding power’s dominance as, “the bomber will always get
them remains significant in any kind of sea state, through.” But this imbalance did not last. Eight
and there is little promise for future success when years later, radar’s operational debut as a primary
the submarine operates to optimize its stealth. aircraft detection tool marked the beginning of a
Although several of these technologies are cur- pronounced tilt backward to the defender.
rently lacking, the view of the submarine com-
munity is to “expect the unexpected” and to The Radar Game. RAdio Detection And
hedge against the surprise threat that can’t imme- Ranging, or radar, was developed in England in
diately be countered. Such an approach supports the mid-1930s and is credited with giving the
analogous research in non-traditional areas to British an important competitive edge during the
counter emergent threats to airborne stealth. Battle of Britain in 1940. Later in the war, the
Germans also exploited radar to gain a significant
Developing and Employing Airborne Stealth defensive advantage, using it to inflict heavy loss-
es on U.S. and British bomber formations.
Airmen appreciated the value of aircraft surviv- Tactics and techniques applied during World War
ability and tactical surprise—stealth’s primary II opened a new era in air combat in which the
operational benefits—long before the relatively survivability of an airborne force was now domi-
recent advent of low-observable technology. nated by radar in the detection phase.8
6
See, for example, Bill Sweetman, Stealth Aircraft: Secrets of Future Airpower (Osceola, WI: Motorbooks International, 1986), p. 7. The advantage of a stealthy aircraft in
an air-to-air engagement is that it provides an edge in situation awareness, proven to be the single most important factor in fighter duels. For a discussion of that, see
Barry D. Watts, Clausewitzian Friction and Future War (Washington, D.C.: NDU Press, 1994), pp. 96-104.
7
Rebecca Grant, The Radar Game (Arlington, VA:IRIS Independent Research, 1998) quoted William Sherman, “Tentative Manual for Employment of the Air Service,
1919” printed in The U.S. Air Service in World War I, Volume I (Washington, D.C.: Office of Air Force History, 1978), p. 369.
8
Grant, p. 15.
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
9
See Ben Rich, Skunk Works (Boston: Little Brown, 1994), pp. 152-160.
10
Grant, p. 22.
11
Rich, p. 215.
12
Mark A. Lorell and Hugh P. Levaux, The Cutting Edge: A Half Century of U.S. Fighter Aircraft R&D (Santa Monica: RAND, 1998). For an account of early Air Force
research on stealth technology see William F. Bahret, “The Beginnings of Stealth Technology,” IEEE Transactions on Aerospace and Electronic Systems (October 1993).
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
RCS
of a square meter—something like a speck of
What the Radar Sees dust. Thus, while today’s advanced stealthy air-
• Radar “sees” the area defined by
the returned radar waves craft can be detected at close range by the most
• This can be much larger or much
smaller than the physical area
powerful ground radars, continued advancement
• Radar cross section reduction
shrinks the size of return field
in RCS reduction should make future aircraft
• RCS is sum of return vectors even less detectable.14
Seeking other signatures. With emerging radar
advances unlikely to yield near-term, dramatic
improvements in detecting low-RCS aircraft,
those interested in countering stealth must pursue
capabilities detecting other observable phenome-
Source: Adapted from Grant, Rebecca.
The Radar Game (Arlington, VA:IRIS Independent Research, 1998), p. 23
na. Here, the stealthy aircraft and submarine
share several properties susceptible to detection,
Figure 2. Radar Cross-Section: What the Radar Sees including infrared, visual, acoustic, or electro-
magnetic emissions.15 Although, historically, none
of these is as useful as radar for detecting low-
When the “Blackbird” aircraft were designed in observable aircraft, each must be minimized to
the late 1950s, only the gross effects of different ensure that none can be used to obtain a defen-
shapes on radar reflectivity could be assessed. For sive advantage. For example, a stray electronic
example, it was understood that a flat plane or a emission could result in vectoring air interceptors
cavity at right angles to an incoming radar wave to a stealth aircraft’s general vicinity, increasing
would produce a very large return. But the state- the probability of close-in visual, infrared, or
of-the-art in numerical design procedures in the radar detection and tracking.
1960s was not advanced enough to produce a
balanced design, i.e., one in which a certain air- Infrared, or IR, is one of the most difficult signa-
craft part did not produce a dominant (and thus tures for a stealth aircraft to suppress. Aircraft
easily observable) return in one direction. By the generate heat in two basic ways: via the engine
next decade, computer modeling had progressed (both the engine exhaust and internal engine heat
to the extent that it was possible to design an air- coupling to the aircraft skin), and through
craft with a reduced and balanced RCS, and fly- increases in surface area temperatures resulting
by-wire flight systems enabled control of the non- from atmospheric friction. To reduce engine-
aerodynamic configurations mandated by stealth. generated IR signature, subsonic stealthy aircraft
Given these technologies, initial aircraft designs such as the B-2 bury the engines within the air-
for the F-117, B-2 and F-22 featured dramatical- craft fuselage and mix cold ambient air with the
ly reduced radar cross-sections.13 engine exhaust to lower its escape temperature.
High-speed flight’s enhanced IR signatures pose
Despite design tradeoffs between aircraft per- additional challenges to low-observability. To
formance requirements, cost, and radar cross sec- reach supersonic speeds, stealthy fighters such as
tion, there is little evidence of a leveling off in the the JSF must employ afterburning engines,
capability to continue to develop and produce
very low radar signatures on aircraft. Clearly, Square Meters
continued growth in the computing power -.0001 -.001 -.01 -.1 1.0 10 100 1,000 10,000
required for stealthy aircraft design and develop- -40 -30 -20 -10 0 10 20 30 40
ment does not necessarily equate to proportional dB Fighters Bombers Ships
reductions in RCS. However, government and The Stealth Zone Conventional Aircraft
industrial test facilities reportedly now can meas- Source: Grant, The Radar Game, p. 27
ure radar signatures as low as one ten-millionth Figure 3. Radar Cross-Section Size by Platform Type
13
These observations rely on “Fundamentals of Stealth Design,” a 1992 unpublished article by Alan Brown, program manager of the F-117. Brown is credited with the
quote that the secret to stealth “was to design a very bad antenna and make it fly.”
14
Sweetman, Bill, “How LO can you go?” Jane’s International Defense Review, January 2002, pp. 22-23. See also J. Paterson, “Overview of Low Observable Technology and
Its Effects on Combat Aircraft Survivability,” Journal of Aircraft, Vol. 36, No. 2, March-April 1999, pp. 380-388.
15
See John J. Kohout III, “Stealth in Context,” The B-2 Bomber: Air Power for the 21st Century (New York: University Press of America, 1995), pp. 141-144.
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
16
Sweetman, “How LO can you go?” p. 22.
17
See Christopher J. Bowie, “Destroying Mobile Ground Targets in an Anti-Access Environment,” Northrop Grumman Analysis Center Papers (December 2001), p. 9.
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
10
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
• Longer • Shorter
Early Early Early Early
Warning Warning Warning Warning
Radar SAM Site Radar SAM Site
21
Because the Air Force had retired its EF-111s after the Gulf War, the electronic jamming mission fell to the jointly operated EA-6Bs. Those aircraft not only provide
standoff jamming, but also fire anti-radiation (HARM) missiles at any radar attempting to acquire a US aircraft. F-16 fighters equipped with HARM capability also con-
tributed to defense suppression, firing their missiles in both reactive and preemptive modes. Finally, combat air patrol (CAP) air superiority fighters were available to
thwart any enemy fighters.
11
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
was judged by the air war’s commander to be the Drawing Analogies: (1) Future Challenges
“superstar” of the Kosovo campaign.22
What sorts of analogies are useful to draw
What, then, should be made of the Serbs down- between stealthy submarine and aircraft combat
ing an F-117 with a barrage of Russian-made employment and the wide range of countermea-
SA-3 surface-to-air missiles (SAMs)?23 Although sures deployed—or envisioned—to lessen their
an authoritative public accounting of the shoot- combat advantage? Proponents of the military use
down is not available, numerous factors probably of stealthy aircraft would not have wanted to
contributed to the loss. Support assets may not search for analogies with the submarine at the
have been positioned properly, the missile site end of World War I. At that time, the perceived
was either unknown or the SAM had been moved vulnerability of the submerged submarine, given
from a previously known location, the F-117 was an accurate attack on it, was overemphasized.
flying along a route repeatedly used to strike key Overlooked was the fundamental element of the
targets, (thus allowing the enemy to anticipate submarine’s defenses—its stealthy nature—that
the aircraft’s location based on dead reckoning reduced its susceptibility to detection and greatly
from a known point and time), and some opera- diminished the probability of such an attack
tor error or technical malfunction may have kept occurring at all.
the bomb bay doors open longer than planned,
providing a targetable radar return.24 In any case, Simply put, the true operational capabilities of a
the downed F-117 is a dramatic reminder that stealthy platform in any media are not self-evi-
stealth aircraft can be shot down, and that sur- dent when the system first appears, and adversary
vival against sophisticated defenses requires con- and advocate alike misunderstand the technology.
tinual attention to all-aspect low observability The adversaries apply traditional perspectives
and innovative tactics. In this regard, stealthy often mixed with a resistance to change, and fail
aircraft are not much different from stealthy sub- to appreciate the system’s potential. The advo-
marines, which have had their share of losses cates push their innovation, but often overlook
when stealth was compromised, however briefly. the range of applications and technologies likely
to reshape the strategies and tactics of warfare. In
In the air operations supporting Operation the case of the submarine, it first took the
Enduring Freedom over Afghanistan, stealthy air- German snorkel-equipped U-boat during World
craft played a limited role for two reasons. First, War II and, ultimately, nuclear power, before the
the unavailability of land bases to support rela- greatest combat leverage could be gained from
tively short-range fighter aircraft meant that the stealth. Today, low-observable technologies
Air Force fighter contribution to the battle, applied to reduce an airplane’s signature are
including the F-117, was minimal.25 Secondly, already comparable to those of the modern sub-
the very modest air defenses possessed by al Qaeda marine, but the implications of that revolutionary
and the Taliban meant that stealth was not technology are only just beginning to be included
required after a brief “kick down the door” in manuals of air combat.
operation at the start of the air war to destroy
air defenses, fighter aircraft and command and What lessons might a low-observable aircraft
control centers. Those strikes were executed by advocate have drawn from the use of the subma-
B-2s launched from their American bases. After rine during World War II? The first lesson was
this enabling mission, they turned over the that a stealthy platform will perform best in a
ensuing strike missions to the non-stealthy B-52s manner that preserves its low-observable proper-
and B-1s.26 ties—working alone or in very small numbers27,
22
Grant, p. ii.
23
Lambeth, Benjamin S. NATO’S Air War For Kosovo: A Strategic and Operational Assessment (Santa Monica: RAND, 2001), p. 116.
24
Sweetman, “How LO can you go?” p. 21.
25
One report, quoting unpublished Pentagon statistics, stated that USAF bombers dropped 69% of the weapons over Afghanistan, Navy fighters launched from carriers
dropped 24%, and USAF fighters dropped 7% of the ordnance. See “Fly by Night,” Aviation Week and Space Technology, March 18, 2002, p. 23.
26
See John A.Tirpak, “Enduring Freedom,” Air Force Magazine, February 2002, pp. 32-39.
27
Some would argue that being in an environment where there are numerous other targets with strong returns, or when jamming is present, would improve the
survivability of a stealthy aircraft. But all those returns will also result in increased attention to that sector of the sky. See Paterson, p. 386. Submarines operating closely
with surface battle groups in the littorals would also seem more susceptible to detection.
12
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
under mission-type orders, being given consider- blades, creating an axially stable thrust similar to
able latitude in terms of time and space con- exhaust from a jet engine. Other methods of
straints, operating with tactics that may seem to damping acoustically detectable flow noise, such
violate traditional principles of force application, as vortices from hull discontinuities, rely on form
and with absolute attention to all aspects of oper- shaping—analogous to the stealthy design tech-
ational security. A second lesson is that since niques of the F-22 and B-2.
insufficient resources require the pooling of assets
and a subsequent loss of low observability in Taking a lead from Russian innovations, hull
employment, stealthy systems must be acquired coatings have been developed to significantly
in numbers adequate to get the job done.28 reduce a ship’s “target strength”—the acoustic
A third lesson is that a system able to commence analogue to RCS. These not only reduce the echo
an attack unobserved and to disengage at will has returned from an active sonar but also have the
a multiplier effect on required enemy defenses. secondary effect of lessening the amount of struc-
ture-borne vibration noise coupled to the ocean.
Analogies can also be drawn between post-World
War II ASW efforts and the hunting of stealthy Some potential observables from a submarine,
aircraft. The search for a substitute for sonar as such as internal waves, thermal discontinuities or
the dominant ASW detection technique has chemical/nuclear activation by-products, tend to
proved fruitless. Radar enjoys that same domi- stay at the depth at which they were generated,
nant position when it comes to finding airplanes, thus requiring a three- rather than two-dimen-
and other techniques provide only limited assis- sional search. Even with such a search, these sub-
tance under ideal conditions. Nevertheless, an marine “footprints” dissipate quickly. For exam-
important similarity to be illustrated is that nei- ple, owing to the ocean’s immense thermal con-
ther the stealthy submarine nor the low-observ- ductivity, temperatures can be restored to normal
able aircraft can be assured of its future surviv- just a few ship lengths behind a submarine dis-
ability. Each will continue to face challenges to its persing megawatts of heat energy into the water.
successful combat operation. Each must continue On the other hand, internal waves or entrapped
to be improved. chemical/isotopic signatures persisting for days or
even weeks simply indicate that a submarine, at
Future challenges to underwater stealth. Active or one time, passed through those waters.
passive acoustic detection of submarines has long
been the sine qua non of ASW techniques, and Other theories of submarine detection suggest
acoustic engineers continue to develop measures that high-powered acoustic sources operating at
to reduce vulnerabilities in these areas. For years very low frequencies could illuminate thousands
it has been understood that, to minimize acoustic of square miles under the ocean’s surface. Like an
energy coupled to the environment, a submarine’s acoustic tomographic version of an MRI, the
propeller should have an odd number of blades seemingly chaotic echoes from the entire area
to preclude reinforcement of the perturbations could theoretically be collected by a large number
caused when these blades intersect the turbulent of geographically dispersed sensors, processed at a
flow behind an even number of control surfaces central location, and correlated to develop a com-
(rudders and stern planes). It was further under- mon operational subsurface picture. Such a sys-
stood that reducing the range to which such tem is analogous to the bistatic radar challenge to
acoustic events would propagate required more stealthy aircraft discussed below. Submarine pres-
blades rather than fewer. More recently, a British ence could probably be detected by these multi-
innovation called a “propulsor” has been devel- ple sensors and receivers, because it would be
oped to stabilize the flow from the rotating impractical to apply the thick acoustic hull coat-
blades. In this concept, a multi-vaned rotating ings required to reduce reflectivity from the long
device is surrounded by a shroud containing fixed wavelengths associated with the low frequencies
blades which “untwist” the flow from the rotating involved. However, the technologies and resources
28
Proponents of stealth in combat aviation argue that the U.S. has not capitalized on its substantial investment in stealth technology in its acquisition of limited numbers
of aircraft. Only 59 F-117s were produced, and the B-2 buy was cut from a planned 132 to 21. The original plan to acquire 750 F-22s has been pared to less than 300,
and the JSF is also facing program cuts.
13
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
necessary to put such a system in place are to be either very inefficient or very expensive.
presently well beyond the capabilities of credible Some recent solid-state advances have made these
adversaries. lasers more feasible and affordable, prompting the
requirement for hull-borne early warning sensors
Since the late 1950’s Skipjack, single-hull con- to provide advance warning.
struction has long been a characteristic of U.S.
submarines–meaning that the entire pressure hull In sum, there are numerous known detection
isn’t encased within a larger superstructure con- modes for modern submarines, all of which are
taining the main ballast tanks. Proposals to revert kept under very close scrutiny. The submarine
to a double-hull construction, allowing a much force must be the first to note a disruptive tech-
greater payload to be carried, are also being evalu- nology and initiate efforts to counter or mitigate
ated in terms of stealth. An included benefit of its impact. A continuing process of action-reac-
this change in shipbuilding philosophy, for exam- tion has occurred in which potential upgrades in
ple, would be a tripling of surfaces available for threat capabilities are countered by improvements
coatings to further mitigate active/passive in platform stealth. It is through these improve-
acoustic signatures. ments that submarine survivability and effective-
ness have been maintained.
Non-acoustic detection vulnerabilities will also
remain a challenge in the future. Many of these Future challenges to airborne stealth. Stealthy air-
are hydrodynamic in nature, either within the craft such as the F-117 and B-2 have proved
water column or at the air-water interface. The highly successful in combat against current radar
submarine force well understands these potential detection technology, monostatic radar, wherein a
detection phenomena, and applies the tactics of single radar functions as both transmitter and
stealth to meet emerging ASW technologies. receiver. Although the B-2 is considered to be a
Thus, to keep “Bernoulli humps” or “Kelvin generation ahead of the F-117 in RCS reduction,
wakes” from being observable at the surface, the both aircraft rely on the same principle of scatter-
guidance might be: “Don’t go faster than XX ing the reflection of incoming radio frequency
knots if shallower than YYY feet and sea state is waves from the transmitter, thereby reducing the
less than Z.” As sensor and processor capabilities size of their radar return when the transmitter
improve, and smaller signals are recoverable from and receiver are collocated. Theoretically, detec-
noise, a constant review and modification of tion of stealthy aircraft could be enhanced by
detection-free operating envelopes will remain an separating the transmitting radar from the receiv-
essential element of stealth. ing antenna in a configuration known as bistatic
radar. In this concept, the receivers, geographical-
As a rule of thumb, RF energy penetrates seawa- ly separated from the transmitter, must be prop-
ter to only a small fraction of a wavelength. A erly aligned to catch the radio waves scattered by
notable exception to this is at a small sliver of the the low-RCS aircraft.
spectrum in the blue-green visual domain. This
phenomenon has long been a source of specula- While simple in concept, bistatic radar detection
tion and engineering, not only for detection, but faces significant technical and operational chal-
also for communication with submerged sub- lenges. Because stealthy aircraft are observable
marines. However, blue-green lasers have tended only from a very small number of angle combina-
tions, the aircraft will be reflected only if an ideal
alignment exists among transmitter, target and
receiver. Providing conventional radar the cover-
age needed to ensure sufficient reception of the
scattered signals might require placing radar
transmitters every few miles—a cost-prohibitive
The Virginia-class attack sub (SSN-774), above, will approach. Coordinating the interception of mul-
incorporate the latest in submarine stealth, along with a tiple radar beams and collecting and analyzing
wide range of new offensive capabilities, to support the radar return data from a number of transmitters
littoral warfare mission. and receivers would also require massive computing
14
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
power. Therefore, considerable skepticism exists detect surface heating resulting from atmospheric
that a practical, stealth-detecting bistatic radar friction may prove to be more effective, with the
system will be deployed.29 most advanced systems credited with picking up
a conventional target at ranges up to 50 miles.
Increases in computing power and the prolifera- Although IR-suppressing paint, exhaust shielding
tion of commercial radio waves as a by-product and cooling, and heat tolerant fuels will all be
of the information revolution have given rise to used in lowering a stealthy aircraft’s thermal sig-
another challenge to stealthy aircraft. In the days nature, the plane’s surface will always be hotter
before cable, many television viewers could vouch than that of its environment, and a temperature
for the fact that an aircraft flying nearby could differential as low as one degree may be sufficient
momentarily disrupt the antenna-generated to cue other sensors to look more closely.
image on their TV screen. That phenomenon is Nevertheless, the problem of searching large vol-
the basis for a recent series of articles and inter- umes of space for small differences in tempera-
views alleging that “passive coherent location” ture in varying atmospheric conditions still
(PCL) or “passive bistatic” radar systems using applies. According to the Air Force, the F-22 will
TV, radio, or mobile phone transmitters, coupled have a “low-aspect IR signature under sustained
with sensitive receivers, could track stealthy air- supersonic conditions.”32 Infrared detection of
craft. The theory behind this concept is that a stealthy aircraft is sure to remain a game of meas-
radar system could be designed to exploit radio ure and countermeasure.
signals already plentiful in the atmosphere rather
than generating its own targeted beams. Systems Finally, there is the challenge of maintaining
based on cell phone signals as well as radio and stealth logistically once it has been achieved oper-
television waves have recently been touted as ationally. As stealthy air vehicles age, increased
breakthroughs capable of defeating airborne LO maintenance is required to prevent signature
stealth.30 degradation of unique design features. Both the
F-117 and the B-2 have suffered from low “mis-
However, analysis and testing have determined sion capable rates,”—that is, the amount of time
that the performance and capability of such sys- that the aircraft is judged to be combat-ready—
tems are considerably less than that of common owing to excessive down times to replace and
commercial and early warning radars. The U.S. repair LO-related structures and surfaces. Those
Air Force does not regard PCL/passive bistatic problems have been exacerbated by shortages in
systems as possessing a “counter-stealth,” capabili- the skilled labor force needed to do the work and
ty, notes the large number of false tracks these the training demands to fly the limited number
systems generate, and has concluded that jam- of aircraft acquired, thus postponing needed air-
ming or other techniques could degrade the per- craft maintenance.
formance of passive detection systems even fur-
ther.31 On the B-2, the application of alternate high
frequency material (AHFM) now underway will
Perhaps the most problematic of counter-stealth result in more durable and effective low observability,
technologies for airborne targets will be continu- while dramatically reducing labor hours per
ing improvements in infrared search and track maintenance action. Other actions to replace
(IRST) systems. Heat generated by engine and stealth treatments around windows and doors
exhaust systems is one source of detection, and and to deal with hot trailing edges and tailpipes
airborne IRST systems in fighter airplanes have are also essential to keeping the aircraft in a com-
routinely been able to detect afterburning engines bat configuration. Despite these continued
at a range of 30 miles. IRST systems that concen- improvements in stealth technology, it seems cer-
trate in a higher range of the infrared spectrum to tain that the supersonic, aerobatic F-22 and the
29
John Schaeffer, Understanding Stealth (Marietta Scientific: Marietta GA, 1997), p. 15.
30
Bill Sweetman, “Stealth Threat,” Popular Mechanics, February 2002.
31
Office of the Secretary of the Air Force, “USAF Analysis of Passive Coherent Location Systems,” Secretary of the Air Force Public Affairs, Washington, D.C.,
June 15, 2001.
32
Sweetman, “How LO can you go?” p. 22.
15
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
16
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
to read the text. Remove or degrade the opti- frenzied) rate of ordnance expenditure in real
cal system at any level, and the sequence nec- counter-stealth scenarios. For example, the
essary to get to the final solution is broken. Royal Navy, faced with the threat of only one
small coastal defense submarine off the
• For both stealthy submarines and aircraft, the Falklands, expended—fruitlessly—nearly the
synergy in combining tactics and technology entire fleet’s inventory of ASW weapons.
makes defense doubly difficult. Although both Against a stealthy aircraft, plagued by false
platforms must sacrifice their stealth during alarms and unable to precisely locate its adver-
attack—launching torpedoes or opening bomb sary, ground-based air defenses have similarly
bay doors—these events offer limited opportu- fired at extraordinarily high rates, as evidenced
nities for counter-attack. Moreover, additional by CNN’s displays of anti-aircraft artillery in
action can be taken by the stealthy platform the skies over Baghdad during the first nights
during the attack phase to further lower its of Desert Storm.
susceptibility to detection. Submarines, for
example, could launch a decoy, change course Stealth provides a long-term competitive
and run in a silenced mode. Stealthy aircraft advantage.
could launch a defensive missile (such as a
miniature air-launched decoy) or an offensive • The existence of a stealthy force creates an
one (such as an anti-radiation weapon) to con- enormous burden on the defense. Whether or
fuse or suppress the adversary. not the platforms are being employed, there is
a major requirement for a prepared response,
Operational or technical intelligence on new because the defender is never sure where or
anti-submarine and anti-stealth techniques is when the threat will surface. Stealth thus con-
available to submariners and aviators, allowing tributes to virtual attrition of enemy forces by
them to modify their tactics to negate those causing the adversary to maintain a high and
techniques. expensive level of readiness.
• The submarine has shown that stealth has a • The virtual attrition property of stealth sug-
sweeping impact because it goes to one of the gests the opportunity cost of defending against
fundamental success variables of warfare: the low-observable platforms. During World War
ability to see the opponent (be it target or II the allies invested in thousands of ships and
threat) before being seen. In an operational hundreds of thousands of people in defending
context, history has shown that this enabled against U-boat attacks. Theoretically, extreme-
the submarine to evolve an entirely new set of ly high concentrations of air defense systems
operational tactics and doctrine, particularly could provide some capability against stealthy
the ability to operate alone deep within enemy aircraft, but the B-2 was designed to negate
territory for extended periods with minimum that enormous investment made by the former
outside support. Soviet Union in air defenses. Any potential
• Stealth provides the advantage that tactics can U.S. adversary faces an enormous opportunity
be as useful as technology in achieving this all- cost to develop a system to defend itself
aspect low observability. One can detect the against stealthy ships and aircraft while
threat and maneuver around it or one can attempting to engage the U.S. military in
present the platform to the opponent in a way other arenas. Thus the U.S. investment in
that defeats his sensor. stealth (an asymmetric advantage in its own
right) poses a significant allocation dilemma
• A nearly universal truth is that the command- for potential adversaries—invest enormous
er of the stealthier platform always retains the amounts to counter stealth (and neglect other
initiative to attack or not. A corollary to these areas) or spend elsewhere (and remain vulnera-
observations is that a defender’s detection of a ble to stealth).
stealthy platform can be considered prima facie
evidence that an attack is in progress, because The submarine or aircraft, as a stealthy system,
the attacker has obviously made a conscious is a noncooperative target able to manipulate its
decision to risk that detection. Because of this, observables and reduce its signature by constantly
there is an extraordinarily high (and sometimes reviewing and correcting emerging deficiencies.
17
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
• Had the nature of the submarine threat low observability and mission requirements,
remained constant, more might have been but related tactics and operational procedures
expected from ASW efforts over the years. must offset any stealth technology surrendered.
However, stealthy platforms have strong
operational forcing functions to evolve tech- Conclusion
nologies at a rate capable of maintaining their
covert nature in a relative sense, and have an The analogies drawn between the stealthy sub-
intrinsic advantage of being able to “sense the marine and low-observable aircraft suggest the
sensor” (or the platform upon which it is car- following:
ried), and respond accordingly.
• Stealthy airborne platforms will maintain a
• Another lesson is that true stealthiness involves long-term edge over defenses, providing that
all aspects of a platform’s design and opera- its sponsors continue to study and exploit
tion. Decades of evolution, sometimes with environmental phenomena and opponents’
hard lessons learned through losses, have countermeasures, and take prompt and sus-
shown that every potential source of signature tained corrective measures.
must be controlled. Reflections of the adver-
sary’s energy (sonar or radar) have to be • Continued operation of stealthy airborne plat-
reduced; energy radiation from the low- forms will prompt new tactics, techniques and
observable platform (self-generated signature) procedures markedly different from conven-
has to be minimized; and operational practices tional concepts of operations. For example,
(use of active vice passive radio communica- the World War II bomber streams numbered
tions) have to be controlled. in the hundreds of aircraft both for protection
and to muster the firepower necessary to
• In submarine warfare, when complacency was accomplish the mission; it was impossible to
avoided, where counter-stealth R&D pro- conceal such a signature. Similarly, the massive
grams were aggressively maintained, and when strike packages into North Vietnam provided
operational desires were not allowed to a wealth of warning to the opponent, and
encourage nonstealthy behavior, stealth has were structured to smash directly through
prevailed. The implicit issue here is that stealth enemy air defenses rather than to avoid them.
was the only variable judged immune from Single-ship B-2 missions over Serbia and
design and development tradeoffs. The Navy Afghanistan illustrate the value of stealth in
might accept bigger, slower or shallower, but avoiding these costly tactics. Converting the
each new class, or variant, had to have the same B-2 and the SSBN from their strategic nuclear
or less radiated noise characteristics than that roles to providers of long-range, precise con-
of the preceding boat. All of these considera- ventional firepower may be one of the most
tions are transferable to low-observable aircraft. telling analogies of all.
• It was noted earlier that every U.S. military • Stealthy and nonstealthy aircraft will have to
submarine, on decommissioning, left the develop special techniques for operating togeth-
water stealthier than it entered. Indications are er, so that nonstealthy aircraft will benefit while
that owners of stealthy aircraft have not yet stealthy ones will not lose their inherent advan-
learned that lesson. LO modifications to the tage. Working together, however, does not mean
F-117 and B-2 have not been granted priority collocated in space or time. The submarine
in comparison with other upgrades, with an conducting forward offensive operations is
attendant decline in mission-capable rates. working with the approaching carrier battle
Even more troubling is a retreat from main- group by destroying or diverting potential
taining an aircraft’s stealth to enhance other attackers. The stealth aircraft, operating in
capabilities. Proposals to hang external ord- front of a larger, nonstealthy force, defeats air
nance on the JSF or to turn it into a standoff defenses to allow a greater penetration proba-
electronic jammer are illustrative of this trend, bility for the following force, and frees up
as are suggestions to stretch the F-22 and supporting resources (air superiority, escort,
diminish its stealth to give it an air-to-ground and electronic countermeasures aircraft) for
capability. Clearly, tradeoffs will occur between other uses.
18
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
19
ANALOGUES of STEALTH
A N A LY S I S CENTER PAPERS
associates.
Analysis Center Papers are periodic publications of the Northrop Grumman Corporation,
an $18 billion global defense company with its worldwide headquarters in Los Angeles.
Northrop Grumman provides technologically advanced, innovative products, services and
solutions in defense and commercial electronics, systems integration, information technology
and nuclear and non-nuclear shipbuilding and systems. With nearly 100,000 employees and
operations in 44 states and 25 countries, Northrop Grumman serves U.S. and international
military, government and commercial customers.