May 12, 2015 from Mil-Embedded Website
6th generation warfare (6GW), which leverages sophisticated technology to manipulate space and time.
As Arthur C. Clarke said, "any sufficiently advanced technology
is
indistinguishable from magic."
On 7 June 1981, the Israeli Air Force attacked and destroyed the French built Osirak nuclear reactor just outside Bagdad, Iraq during "Operation Opera."
Iraq was in the middle of a war with Iran at the time, and Israeli jets executed undetected reconnaissance runs into Iraqi airspace during the conflict, finding a blind spot in the Iraqi radar coverage on their border with Saudi Arabia.
Using that blind spot, at 18:35 hours on 7 June, eight F-16A Israeli jets entered Iraqi airspace undetected and hit the dome of the reactor with eight of the sixteen 2,000-pound bombs they dropped.
The Iraqi air defenses
saw nothing abnormal on their radar screens. On 6 September 2007, the Israeli Air Force attacked and destroyed the North Korean built nuclear reactor in the Dier ez-Zor region of Syria during "Operation Orchard" (renamed 'Operation Outside the Box'.)
Seven F-15 Israeli fighter jets dropped 500-pound laser-guided bombs on the reactor just after midnight. To avoid Syrian radar, the Israelis used an ELINT (ELectronic INTelligence) system similar to the U.S. Suter airborne network attack system.
The Syrian air defenses saw nothing abnormal on their radar screens. Operation Opera used a flaw in the Iraqi radar coverage to manipulate space and time (as seen by the Iraqi air defenses).
In Operation Orchard, Israeli ELINT systems took control of Syrian air defense radar systems and manipulated space and time (as seen by the Syrian air defenses).
Additionally, both missions compressed time for the Iraqis and the Syrians (they had no time to react), and expanded time for the Israelis (allowing them time to complete their mission unmolested).
These examples show the
future of 6GW. Maybe the definition of space-time manipulation will
help you understand the principles better.
They can secretly invade and control an enemy's air defense radar systems, move their sensors and create a blind spot, and show normal air traffic screens while our fighters, helicopters, unmanned aerial vehicles (UAVs), or bombers are approaching their targets undetected.
We can show them recordings of normal air traffic patterns from last week. We can also show them screens with unidentified aircraft coming at them when none exist in their airspace.
That gives our intelligence people the opportunity to track and record their response to a perceived (but false) attack,
Once we have that
information, we can further manipulate space and time, from our
enemy's perspective, and shroud them in a debilitating "fog of war."
As a purely hypothetical example here, just send in a few SEALS on Zodiac rubber boats from a submerged submarine, to the isolated and lightly-monitored shores of our enemy.
Let the SEALS mill around for a while, and leave a lot of trash - MRE wrappers, spent rounds, and footprints leading off in all directions - and then go back to the sub.
Now, just wait for an enemy patrol to find the bait. They will come up on their radio and report the intrusion to their local commander. He will report it to his commander by radio, and on and on.
The enemy will start sending troops and other assets from other locations to find any remaining intruders.
Our intelligence RF intercept systems then DF, RFP, and record all the links and communications traffic, and Voila! Now, we have a map of their command and control structure.
We can do the same with
our UAVs.
Some EF-105's would fly ahead of the B-52s in Operation Rolling Thunder and act as flypaper, to attract enemy surface-to-air (SAM) radar contact around Hanoi.
When the enemy SAMs locked onto the Weasel, the onboard computer in the back seat (replacing the weapons officer) would compute (DF) the location of the SAM site on the ground, and the aircraft would fly down the enemy radar beam envelope, fire its missiles, and destroy the SAM site before the SAM site could fire their missiles at the EF-105.
The objective of the Weasels was to cleanse the area of threats to the B-52s coming in for their bombing runs behind them.
The Weasel, and its missiles, could close the distance to the SAM site faster than the enemy radar could maintain lock-on and fire at the EF-105, or at least that's the theory.
Wild Weasel pilots were know to be invincible and crazy, so there had to be a better way of neutralizing enemy air defenses.
That's why we have the
Suter systems today.
We can jam radar and communications systems and make our enemy deaf, dumb, and blind. We can deprive the enemy of the information needed to position his assets and carry out an attack, or effectively respond to an attack.
This is called electronic warfare (EW) The first example of this concept took place in April 1904, when the Russians jammed the RF communications between a group of Japanese Navy battleships in the Russo-Japanese war, with spark-gap transmitters.
The Japanese could not
plan and coordinate the shelling of a Russian naval base at Port
Arthur, China.
NERO (Networked Electronic warfare Remotely Operated) systems are being installed on our UAVs. And we have similar systems on our warships and submarines.
The problem with jamming our enemy's radars and communications is that it tells them we are there, and about to do something. That's fine if already in a fight.
However, taking-over
their systems and controlling them before the fight starts, gives
our forces tremendous advantages.
Anyone intercepting that signal would only see a flat-line frequency of light, unless they know how to demodulate the out-of-phase light frequencies and retrieve the data
You can bet that the
National Security Agency (NSA)
and the crypto guys
are interested in this technique of
time manipulation.
Just understand that in
6GW, we are getting inside our enemy's
OODA loop (Observe, Orient,
Decide, and Act). Once inside, we can control what they see and
hear, what they think, what they decide, and what they do, all to
our advantage.
Meanwhile, let's consider what Sun Tzu teaches:
|