Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

The New Coffee Room

  1. TNCR
  2. General Discussion
  3. The Phantom Menace

The Phantom Menace

Scheduled Pinned Locked Moved General Discussion
4 Posts 4 Posters 46 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • George KG Offline
    George KG Offline
    George K
    wrote on last edited by
    #1

    China puts phantom space force concept to the test with aim to swamp enemy missile defences

    A team of Chinese military engineers is developing a “phantom space strike” – a new tactic to overwhelm missile defences by creating a swarm of fake target signals from space.

    They revealed the project to the public for the first time this month while announcing they had conducted a proof-of-concept computer simulation.

    The modelling results were positive and the project would move to the next stage to tackle engineering challenges, the team said in a paper published in the Chinese-language Journal of Electronics and Information Technology on February 10.

    In the simulation, a ballistic missile was launched against an enemy protected by a state-of-the-art missile defence system. The missile did not carry a nuclear or conventional warhead.

    After reaching an altitude above the atmosphere, the missile released three small spacecraft.

    Radio interference instruments on the spacecraft picked up enemy radar network signals and sent back phantom signals making the unarmed missile appear to be a much bigger threat than it really was.

    Based on those signals, the simulated enemy forces on the ground then launched an interceptor towards the ghost warhead.

    “Generating phantom tracks in space is extremely difficult,” the team wrote.

    “We solved one of the major challenges … with a clever design,” wrote the team that was led by Zhao Yanli, a senior engineer with the People’s Liberation Army Unit 63891.

    "Now look here, you Baltic gas passer... " - Mik, 6/14/08

    The saying, "Lite is just one damn thing after another," is a gross understatement. The damn things overlap.

    CopperC 1 Reply Last reply
    • George KG George K

      China puts phantom space force concept to the test with aim to swamp enemy missile defences

      A team of Chinese military engineers is developing a “phantom space strike” – a new tactic to overwhelm missile defences by creating a swarm of fake target signals from space.

      They revealed the project to the public for the first time this month while announcing they had conducted a proof-of-concept computer simulation.

      The modelling results were positive and the project would move to the next stage to tackle engineering challenges, the team said in a paper published in the Chinese-language Journal of Electronics and Information Technology on February 10.

      In the simulation, a ballistic missile was launched against an enemy protected by a state-of-the-art missile defence system. The missile did not carry a nuclear or conventional warhead.

      After reaching an altitude above the atmosphere, the missile released three small spacecraft.

      Radio interference instruments on the spacecraft picked up enemy radar network signals and sent back phantom signals making the unarmed missile appear to be a much bigger threat than it really was.

      Based on those signals, the simulated enemy forces on the ground then launched an interceptor towards the ghost warhead.

      “Generating phantom tracks in space is extremely difficult,” the team wrote.

      “We solved one of the major challenges … with a clever design,” wrote the team that was led by Zhao Yanli, a senior engineer with the People’s Liberation Army Unit 63891.

      CopperC Offline
      CopperC Offline
      Copper
      wrote on last edited by
      #2

      @George-K said in The Phantom Menace:

      “We solved one of the major challenges … with a clever design,”

      that they picked up at the US patent office.

      Doctor PhibesD 1 Reply Last reply
      • CopperC Copper

        @George-K said in The Phantom Menace:

        “We solved one of the major challenges … with a clever design,”

        that they picked up at the US patent office.

        Doctor PhibesD Offline
        Doctor PhibesD Offline
        Doctor Phibes
        wrote on last edited by
        #3

        If it was that great they’d have kept it secret

        I was only joking

        1 Reply Last reply
        • AxtremusA Offline
          AxtremusA Offline
          Axtremus
          wrote on last edited by
          #4

          Veracity of this news aside, it looks like it will come down to sensor network and computation power for the defense. Need a comprehensive, sensitive sensor network to take in lots and lots of readings, pretty fast network to gather/transport the readings, then do tons and tons of computation to tell real threats apart from decoys using those readings.

          Reminds me of the submarine tech race. Running “silent” used to be enough, but then given increased computation power, what used to be “silent” also get exposed under intense DSP scrutiny.

          1 Reply Last reply
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Don't have an account? Register

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • Users
          • Groups