Stealth aircraft

An F-117 Nighthawk stealth strike aircraft flying over Nevada in August 2002.

Stealth aircraft are designed to avoid detection using a variety of technologies that reduce reflection/emission of radar, infrared,[1] visible light, radio-frequency (RF) spectrum, and audio, collectively known as stealth technology.[2] Development of stealth technology likely began in Germany during World War II, the prototyped Horten Ho 229 was designed for twin BMW 003 jet engines but finally powered by twin Junkers Jumo 004 jet engines being described as the first stealth aircraft.[3] Well-known modern examples of stealth of U.S. aircraft include the United States' F-117 Nighthawk (1981–2008), the B-2 Spirit, the F-22 Raptor,[4] and the F-35 Lightning II.[5]

While no aircraft is totally invisible to radar, stealth aircraft make it more difficult for conventional radar to detect or track the aircraft effectively, increasing the odds of an aircraft successfully avoiding detection by enemy radar and/or avoiding being successfully targeted by radar guided weapons. Stealth is the combination of passive low observable (LO) features and active emitters such as Low Probability of Intercept Radars, radios and laser designators. These are usually combined with active measures such as carefully planning all mission maneuvers in order to minimize the aircraft's radar cross section, since common actions such as hard turns or opening bomb bay doors can more than double an otherwise stealthy aircraft's radar return.[6] It is accomplished by using a complex design philosophy to reduce the ability of an opponent's sensors to detect, track, or attack the stealth aircraft.[7] This philosophy also takes into account the heat, sound, and other emissions of the aircraft as these can also be used to locate it.

Full-size stealth combat aircraft demonstrators have been flown by the United States (in 1977), Russia (in 2010) and China (in 2011).[8] The U.S. military has adopted three stealth designs, and is preparing to adopt the Lockheed Martin F-35 Lightning II.

Most recent fighter designs will claim to have some sort of stealth, low observable, reduced RCS or radar-jamming capability, but there has been no air-to-air combat experience against stealth aircraft.[9]


World War I and World War II

The Linke-Hofmann R.I prototype. An experimental, German World War 1 bomber, covered with transparent covering material (1917-1918)

During World War I, the Germans experimented with the use of Cellon (Cellulose acetate), a transparent covering material, in an attempt to reduce the visibility of military aircraft. Single examples of the Fokker E.III Eindecker fighter monoplane, the Albatros C.I two-seat observation biplane, and the Linke-Hofmann R.I prototype heavy bomber were covered with Cellon. In fact, sunlight glinting from the material made the aircraft even more visible. Celon was also found to be quickly degraded both by sunlight and in-flight temperature changes so the attempt to make transparent aircraft was not proceeded with.[10]

In 1916, the British modified a small SS class airship for the purpose of night-time aerial reconnaissance over German Empire lines on the Western Front. Fitted with a silenced engine and a black gas bag, the craft was both invisible and inaudible from the ground, but several night-time flights over German-held territory produced little useful intelligence, and the idea was dropped.[11]

Nearly three decades later, a more serious attempt at radar "invisibility" was tried with the Horten Ho 229 flying wing fighter-bomber, developed in Nazi Germany during the last years of World War II. In addition to the aircraft's shape, the majority of the Ho 229's wooden skin was bonded together using carbon-impregnated plywood resins designed with the purported intention of absorbing radar waves. Testing performed in early 2009 by the Northrop-Grumman Corporation established that this compound, along with the aircraft's shape, would have rendered the Ho 229 virtually invisible to the top-end HF-band, 20-30 MHz primary signals of Britain's Chain Home early warning radar, provided the aircraft was traveling at high speed (approximately 550 mph (890 km/h)) at extremely low altitude - 50–100 feet (15–30 m).[3]

In the closing weeks of World War II, the US military initiated "Operation Paperclip", an effort by the US Army to capture as much advanced German Wunderwaffe weapons research as possible, and also to deny that research to the advancing Red Army.

The nearly complete Ho 229 V3 (Ho IX V3, Go 229) prototype airframe was captured at the Gotha factory at Friederichsrodaon April 14, 1945. It was assigned the number T2-490 and was shipped to the United States. where it ended up in the H.H. "Hap: Arnold collection of the Air Force Technical Museum as intentions to bring it to flying status at Park Ridge, Illinois were thwarted by budgetary considerations.[12] It was later transferred to the Smithsonian National Air and Space Museum. During design of the B-2A some Northrop engineers visited the NASM and viewed the Ho 229 V3 but there was no connection between the design of the Ho 229 V3 or Northrop's previous flying wings and that of the B-2A.[13]

Modern era

Modern stealth aircraft first became possible when Denys Overholser, a mathematician working for Lockheed Aircraft during the 1970s, adopted a mathematical model developed by Petr Ufimtsev, a Soviet scientist, to develop a computer program called Echo 1. Echo made it possible to predict the radar signature of an aircraft made with flat panels, called facets. In 1975, engineers at Lockheed Skunk Works found that an aircraft made with faceted surfaces could have a very low radar signature because the surfaces would radiate almost all of the radar energy away from the receiver. Lockheed built a model called "the Hopeless Diamond", a reference to the famous Hope Diamond and the design's predicted instability. Because advanced computers were available to control the flight of even a Hopeless Diamond, for the first time designers realized that it might be possible to make an aircraft that was virtually invisible to radar.[14][15]

Reduced radar cross section is only one of five factors the designers addressed to create a truly stealthy design such as the F-22. The F-22 has also been designed to disguise its infrared emissions to make it harder to detect by infrared homing ("heat seeking") surface-to-air or air-to-air missiles. Designers also addressed making the aircraft less visible to the naked eye, controlling radio transmissions, and noise abatement.[4]

The first combat use of purpose-designed stealth aircraft was in December 1989 during Operation Just Cause in Panama. On 20 December 1989, two United States Air Force F-117s bombed a Panamanian Defense Force barracks in Rio Hato, Panama. In 1991, F-117s were tasked with attacking the most heavily fortified targets in Iraq in the opening phase of Operation Desert Storm and were the only jets allowed to operate inside Baghdad's city limits.[16]

General design

The general design of a stealth aircraft is always aimed at reducing radar and thermal detection. It is the designer's top priority to satisfy the following conditions, which ultimately decide the success of the aircraft:-


B-2 Spirit stealth bomber of the U.S Air Force

Instability of design

Early stealth aircraft were designed with a focus on minimal radar cross section (RCS) rather than aerodynamic performance. Highly-stealth aircraft like the F-117 Nighthawk are aerodynamically unstable in all three axes and require constant flight corrections from a fly-by-wire (FBW) flight system to maintain controlled flight.[17] As for the B-2 Spirit, which was based on the development of the flying wing aircraft[18] by Jack Northrop in 1940, this design allowed for a stable aircraft with sufficient yaw control, even without vertical surfaces such as rudders.

Aerodynamic limitations

Earlier stealth aircraft (such as the F-117 and B-2) lack afterburners, because the hot exhaust would increase their infrared footprint, and flying faster than the speed of sound would produce an obvious sonic boom, as well as surface heating of the aircraft skin which also increases the infrared footprint. As a result, their performance in air combat maneuvering required in a dogfight would never match that of a dedicated fighter aircraft. This was unimportant in the case of these two aircraft since both were designed to be bombers. More recent design techniques allow for stealthy designs such as the F-22 without compromising aerodynamic performance. Newer stealth aircraft, like the F-22, F-35 and the Sukhoi T-50, have performance characteristics that meet or exceed those of current front-line jet fighters due to advances in other technologies such as flight control systems, engines, airframe construction and materials.[4][19]

Electromagnetic emissions

The high level of computerization and large amount of electronic equipment found inside stealth aircraft are often claimed to make them vulnerable to passive detection. This is highly unlikely and certainly systems such as Tamara and Kolchuga, which are often described as counter-stealth radars, are not designed to detect stray electromagnetic fields of this type. Such systems are designed to detect intentional, higher power emissions such as radar and communication signals. Stealth aircraft are deliberately operated to avoid or reduce such emissions.

Current Radar Warning Receivers look for the regular pings of energy from mechanically swept radars while fifth generation jet fighters use Low Probability of Intercept Radars with no regular repeat pattern.[20]

Vulnerable modes of flight

Stealth aircraft are still vulnerable to detection during, and immediately after using their weaponry. Since stealth payload (reduced RCS bombs and cruise missiles) are not yet generally available, and ordnance mount points create a significant radar return, stealth aircraft carry all armaments internally. As soon as weapons bay doors are opened, the plane's RCS will be multiplied and even older generation radar systems will be able to locate the stealth aircraft. While the aircraft will reacquire its stealth as soon as the bay doors are closed, a fast response defensive weapons system has a short opportunity to engage the aircraft.

This vulnerability is addressed by operating in a manner that reduces the risk and consequences of temporary acquisition. The B-2's operational altitude imposes a flight time for defensive weapons that makes it virtually impossible to engage the aircraft during its weapons deployment. New stealth aircraft designs such as the F-22 and F-35 can open their bays, release munitions and return to stealthy flight in less than a second.

Some weapons require that the weapon's guidance system acquire the target while the weapon is still attached to the aircraft. This forces relatively extended operations with the bay doors open.

Also, such aircraft as the F-22 Raptor and F-35 Lightning II Joint Strike Fighter can also carry additional weapons and fuel on hardpoints below their wings. When operating in this mode the planes will not be nearly as stealthy, as the hardpoints and the weapons mounted on those hardpoints will show up on radar systems. This option therefore represents a trade off between stealth or range and payload. External stores allow those aircraft to attack more targets further away, but will not allow for stealth during that mission as compared to a shorter range mission flying on just internal fuel and using only the more limited space of the internal weapon bays for armaments.

Reduced payload

In a 1994 live fire exercise near Point Mugu, California, a B-2 Spirit dropped forty-seven 500 lb (230 kg) class Mark 82 bombs, which represents about half of a B-2's total ordnance payload in Block 30 configuration

Fully stealth aircraft carry all fuel and armament internally, which limits the payload. By way of comparison, the F-117 carries only two laser- or GPS-guided bombs, while a non-stealth attack aircraft can carry several times more. This requires the deployment of additional aircraft to engage targets that would normally require a single non-stealth attack aircraft. This apparent disadvantage however is offset by the reduction in fewer supporting aircraft that are required to provide air cover, air-defense suppression and electronic counter measures, making stealth aircraft "force multipliers".

Sensitive skin

Main article: Skin (aeronautics)

Stealth aircraft often have skins made with Radar-absorbent materials or RAMs. Some of these contain Carbon black particles, some contain tiny iron spheres. There are many materials used in RAMs, and some are classified, particularly the materials that specific aircraft use.[21]

Cost of operations

Stealth aircraft are typically more expensive to develop and manufacture. An example is the B-2 Spirit that is many times more expensive to manufacture and support than conventional bomber aircraft. The B-2 program cost the U.S. Air Force almost $105 billion.[22]

Reflected waves

Main articles: Radar and Radio wave

Passive (multistatic) radar, bistatic radar[23] and especially multistatic radar systems detect some stealth aircraft better than conventional monostatic radars, since first-generation stealth technology (such as the F117) reflects energy away from the transmitter's line of sight, effectively increasing the radar cross section (RCS) in other directions, which the passive radars monitor. Such a system typically uses either low frequency broadcast TV and FM radio signals (at which frequencies controlling the aircraft's signature is more difficult). Later stealth approaches do not rely on controlling the specular reflections of radar energy and so the geometrical benefits are unlikely to be significant.

Researchers at the University of Illinois at Urbana-Champaign with support of DARPA, have shown that it is possible to build a synthetic aperture radar image of an aircraft target using passive multistatic radar, possibly detailed enough to enable automatic target recognition (ATR).

In December 2007, SAAB researchers revealed details for a system called Associative Aperture Synthesis Radar (AASR) that would employ a large array of inexpensive and redundant transmitters and a few intelligent receivers to exploit forward scatter to detect low observable targets.[24] The system was originally designed to detect stealthy cruise missiles and should be just as effective against aircraft. The large array of inexpensive transmitters provides a degree of protection against anti-radar (or anti-radiation) missiles or attacks.

Schlieren Signature

Schlieren photograph of T-38 shock waves
Schlieren-Soldering-Iron-Heat. Note that the soldering iron tip itself is not glowing because it is not Infrared photography. Had the photograph been a composite of Schlieren and infrared, the soldering iron tip would show as a source of illumination and the atmospheric disturbance caused by the heating would show as well. The infrared point of origin or target would be unambiguous.
Photography of bow shock waves around a brass bullet, 1888

Schlieren is the German plural of schliere, which is German for the English word streak. Schlieren are visible streaks produced in a transparent medium as a result of variations in the medium's density leading to variations in refractive index.[25] Anything that disturbs the atmosphere may be detected (Schlieren Photography) because of the Schlieren effect caused by that atmospheric disturbance. This type of Measurement and signature intelligence (MASINT) detection falls under the category of Electro-optical MASINT. A telephoto or telescopic picture of a jet passing between the photographer and a full moon will sometimes show the outline of the aircraft as well as the atmospheric distortions of the exhaust plumes. This passive principle can be used at all wavelengths of the electromagnetic spectrum. Passive signature intelligence has captured stealth aircraft in flight by accident, when such aircraft fly between Earth imaging satellites and ground (can be seen in products like Google Earth). Once a stealth signature has been captured, it may be loaded into a database library for an active and live satellite search at any point in the future. Ground at past versus ground at present differential comparisons can be made to determine flight paths and altitudes of stealth aircraft. This disturbance and disturbing influence method has been used for finding ships at sea through wake generation tracking and even in Wilson cloud chambers for particle discovery and tracking. The key principle is that the disturbance is much more visible in area and volume than the disturbing point source and converges attention to the much smaller disturbing source.

Infrared (heat)

Main article: Infrared signature

Some analysts claim Infra-red search and track systems (IRSTs) can be deployed against stealth aircraft, because any aircraft surface heats up due to air friction and with a two channel IRST is a CO2 (4.3 µm absorption maxima) detection possible, through difference comparing between the low and high channel.[26][27] These analysts point to the resurgence in such systems in Russian designs in the 1980s, such as those fitted to the MiG-29 and Su-27. The latest version of the MiG-29, the MiG-35, is equipped with a new Optical Locator System that includes more advanced IRST capabilities. The French Rafale and Swedish Gripen also make extensive use of IRST.

In air combat, the optronic suite allows:

For ground targets, the suite allows:

Longer Wavelength Radar

VHF radar systems have wavelengths comparable to aircraft feature sizes and should exhibit scattering in the resonance region rather than the optical region, allowing most stealth aircraft to be detected. This has prompted Nizhny Novgorod Research Institute of Radio Engineering (NNIIRT) to develop VHF AESAs such as the NEBO SVU, which is capable of performing target acquisition for Surface-to-air missile batteries. Despite the advantages offered by VHF radar, their longer wavelengths result in poor resolution compared to comparably sized X band radar array. As a result, these systems must be very large before they can have the resolution for an engagement radar.

The Dutch company Thales Nederland, formerly known as Holland Signaal, developed a naval phased-array radar called SMART-L, which is operated at L Band and has counter-stealth. All ships of the Royal Dutch Navy's De Zeven Provinciën class carry, amongst others, the SMART-L radar.

OTH radar (over-the-horizon radar)

Over-the-horizon radar is a concept increasing radar's effective range over conventional radar. The Australian JORN Jindalee Operational Radar Network can overcome certain stealth characteristics.[28] It is claimed that the HF frequency used and the method of bouncing radar from ionosphere overcomes the stealth characteristics of the F-117A. In other words, stealth aircraft are optimized for defeating much higher-frequency radar from front-on rather than low-frequency radars from above.

Advancements in computational power

The stealth platforms may have slower advances in materials technology and physical limits so that further advances in stealth become either impossible or unaffordable. This may force future stealth platforms to stand off from their targets and use active countermeasures and long range weaponry to strike targets.[29]

However, if the stealth aircraft are constantly upgraded they can hope to jam or evade emerging threats better than similarly equipped non-stealthy platforms could.[30][31]

Operational usage of stealth aircraft

The F-117 Nighthawk stealth attack aircraft.
The B-2 Spirit strategic stealth bomber
The F-22 Raptor fifth generation stealth air superiority fighter
A Sukhoi PAK FA fifth-generation stealth multirole fighter
A Chengdu J-20 fifth-generation stealth long-range combat aircraft
A Shenyang J-31 fifth-generation stealth multirole fighter

The U.S. is the only country to have used stealth aircraft in combat. These deployments include the United States invasion of Panama, the first Gulf War, the Kosovo Conflict, the War in Afghanistan the War in Iraq and the 2011 military intervention in Libya. The first use of stealth aircraft was in the U.S. invasion of Panama, where F-117 Nighthawk stealth attack aircraft were used to drop bombs on enemy airfields and positions while evading enemy radar.[32]

In 1990 the F-117 Nighthawk was used in the First Gulf War, where F-117s flew 1,300 sorties and scored direct hits on 1,600 high-value targets in Iraq[33] while accumulating 6,905 flight hours.[34] Only 2.5% of the American aircraft in Iraq were F-117s, yet they struck 40% of the strategic targets, dropping 2,000 tons of precision-guided munitions and striking their targets with an 80% success rate.[34][35]

In the 1999 NATO bombing of Yugoslavia two stealth aircraft were used by the United States, the veteran F-117 Nighthawk, and the newly introduced B-2 Spirit strategic stealth bomber. The F-117 performed its usual role of striking precision high-value targets and performed well, although one F-117 was shot down by a Serbian Isayev S-125 'Neva-M' missile commanded by Colonel Zoltán Dani. The, then new, B-2 Spirit was highly successful, destroying 33% of selected Serbian bombing targets in the first eight weeks of U.S. involvement in the War. During this war, B-2s flew non-stop to Kosovo from their home base in Missouri and back.[36]

In the 2003 invasion of Iraq, F-117 Nighthawks and B-2 Spirits were used, and this was the last time the F-117 would see combat. F-117s dropped satellite-guided strike munitions on selected targets, with high success. B-2 Spirits conducted 49 sorties in the invasion, releasing 1.5 million pounds of munitions.[36]

During the May 2011 operation to kill Osama bin Laden, one of the helicopters used to clandestinely insert US troops into Pakistan crashed in the bin Laden compound. From the wreckage it was revealed this helicopter had stealth characteristics, making this the first publicly known operational use of a stealth helicopter.

Stealth aircraft were used in the 2011 military intervention in Libya, whe B-2 Spirits dropped 40 bombs on a Libyan airfield with concentrated air defenses in support of the UN no-fly zone.[37]

Stealth aircraft will continue to play a valuable role in air combat with the United States using the F-22 Raptor, B-2 Spirit, and the F-35 Lightning II to perform a variety of operations. The F-22 made its combat debut over Syria in September 2014 as part of the US-led coalition to defeat ISIS.

The Russian Sukhoi PAK FA stealth multi-role fighter is scheduled to be introduced from 2018, to perform various missions. The Sukhoi/HAL FGFA, the Indian version of the PAK FA, is scheduled to be introduced from 2017 in higher numbers, also to perform various missions.

The People's Republic of China plans to introduce the Chengdu J-20 stealth multirole fighter around 2018. Another fifth-generation stealth multirole fighter, the Shenyang J-31 is also under flight testing.

Stealth aircraft lost

The first time that a stealth aircraft was shot down was on 27 March 1999, during Operation Allied Force when an American F-117 Nighthawk was brought down by an Isayev S-125 'Neva-M' missile launched by a Serbian Air Defense crew who were operating their radars on unusually long wavelengths.[38][39] The pilot ejected and was rescued and the aircraft remained relatively intact due to slowly striking the ground, inverted.[38]

In December 2011, Iranian sources showed videos of a captured US RQ-170 stealth drone in a good shape with intact central controlling unit.[40] The information was later confirmed by US sources. The analysts say that the drone might have been captured by electronic cyber attack or jamming.[41] There are reports that China and Russia asked Iran to inspect the drone less than a week after the Iranian video was released.[42]

A B-2 crashed on 23 February 2008 shortly after takeoff from Andersen Air Force Base in Guam.[43] The investigation stated the B-2 crashed after "heavy, lashing rains" caused water to enter skin-flush air-data sensors, which feed angle of attack and yaw data to the computerized flight-control system. The water distorted pre-flight readings in three of the plane's 24 sensors, causing the flight-control system to send an erroneous correction to the B-2 on takeoff. The B-2 quickly stalled, became unrecoverable, and crashed.[44][45][46] The sensors measure environmental factors including air pressure and density, for data to calculate airspeed, altitude and attitude. Because of the faulty readings, the flight computers determined inaccurate airspeed readings and incorrectly indicated a downward angle for the aircraft, which contributed to an early rotation and an un-commanded 30-degree pitch up and left yaw, resulting in the stall.[47]

List of stealth aircraft


Dedicated reduced cross section designs

In service
Under development
Technology demonstrators

Accidental or secondary function reduced cross section designs

Unmanned reduced RCS designs

See also


  1. Mahulikar, S.P., Sonawane, H.R., & Rao, G.A.: (2007) "Infrared signature studies of aerospace vehicles", Progress in Aerospace Sciences, v. 43(7-8): 218-245.
  2. Rao, G.A., & Mahulikar, S.P.: (2002) "Integrated review of stealth technology and its role in airpower", Aeronautical Journal, v. 106(1066): 629-641.
  3. 1 2 Myhra, David (July 2009). "Northrop Tests Hitler's 'Stealth' Fighter". Aviation History. 19 (6): 11.
  4. 1 2 3 John Pike (2008-01-21). "Global F-22". Retrieved 2010-12-16.
  5. Global F-35.
  6. Radar versus Stealth: Passive Radar and the Future of U.S. Military Power Archived 20 September 2009 at the Wayback Machine.
  7. "". Retrieved 2010-12-16.
  8. Robinson, Tim. "Not so hidden dragon – China’s J-20 assessed." Aerospace Insight, 14 January 2011.
  9. "Iran to equip fighter aircraft with new stealth systems."
  10. Haddow, G.W.; Peter M. Grosz (1988). The German Giants - The German R-Planes 1914-1918 (3rd ed.). London: Putnam. ISBN 0-85177-812-7.
  11. Abbott, Patrick (1989). The British Airship at War, 1914-1918. Terence Dalton. pp. 31–33. ISBN 0861380738.
  12. Dabrowski, H.P., The Horten Flying Wings in World War II, Schiffer Publishing Ltd., Atglen, PA., 1991, ISBN 0-88740-357-3, page 37
  13. Pape, Garry R., Campbell, John M., Northrop Flying Wings A History of Jack Northrop's Visionary Aircraft, Schiffer Publishing Ltd., Atglen, PA., 1995, ISBN 0-88740-689-0, page 202
  14. "Centennial of Flight". Retrieved 2010-12-16.
  15. See Rich and Janos, Skunk Works; Little Brown & Co., 1994 passim chapters 1 and 2.
  16. John Pike. "Global F-117". Retrieved 2010-12-16.
  17. Rich and Janos, Skunk Works, pgs 30-31, 46.
  18. Jack Northrop: The Development of All-Wing Aircraft
  19. John Pike (2001-10-26). "Global F-35". Retrieved 2010-12-16.
  20. "Raptor … or Turkey?". 2006-08-14. Retrieved 2010-12-16.
  21. Weiner, Tim (1997-08-23). "The $2 Billion Stealth Bomber Can't Go Out in the Rain". The New York Times. Retrieved 2007-12-18.
  22. United States General Accounting Office (GAO) B-2 Bomber: Cost and Operational Issues (Letter Report, 08/14/97, GAO/NSIAD-97-181).
  23. "Bistatic Radar Sets". Retrieved 2010-12-16.
  24. "Radical and Cheap Anti-Stealth Radar". 2007-12-07.
  25. "Schlieren (physics)". Collins English Dictionary (in English and German). HarperCollins Publishers. Retrieved 3 June 2013.
  26. Radar, Cordless. "RAND Report Page 37". Flight International. Retrieved 2010-12-16.
  27. "VI - STEALTH AIRCRAFT: EAGLES AMONG SPARROWS?". Federation of American Scientist. Retrieved 2008-02-21.
  28. "de beste bron van informatie over Aerospace. Deze website is te koop!". Archived from the original on 26 July 2010. Retrieved 2010-12-16.
  29. Ewing, Philip. "Did CNO just take a big swipe at F-35?" DoD Buzz, 3 July 2012.
  30. "Israel, U.S. Agree To $450 Million In F-35 EW Work." Aviation Week, 6 August 2012.
  31. "Will Stealth Survive As Sensors Improve? F-35, Jammers At Stake."
  32. Crocker 2006, p. 382.
  33. Lockheed F-117A NighthawkNational Museum of the United States Air Force
  34. 1 2 Weapons - F-117a Stealth | The Gulf War | FRONTLINE | PBS
  35. Schmitt, Eric (1991-06-17). "Navy Looks On With Envy At Air Force Stealth Display". The New York Times.
  36. 1 2 Factsheets : B-2 Spirit
  37. "Crisis in Libya: U.S. bombs Qaddafi's airfields". CBS News. 2011-03-19.
  38. 1 2 Logan, Don. Lockheed F-117 Nighthawks: A Stealth Fighter Roll Call. Atglen, Pennsylvania: Schiffer Publishing, 2009. ISBN 978-0-7643-3242-5.
  39. Retrieved 28 April 2011. Missing or empty |title= (help)
  40. "Iran releases video of downed U.S. spy drone–looking intact | The Envoy - Yahoo! News". 2011-12-08. Retrieved 2012-09-29.
  41. "Officials Confirm Authenticity of Iranian TV Images Showing Lost U.S. Drone". Fox News. 8 December 2011.
  42. "Iran displays purported US drone - Middle East". Al Jazeera English. Retrieved 2012-09-29.
  43. Lavitt, Michael O. "B-2 Crashes on Takeoff From Guam." Aviation Week, 23 February 2008.
  44. "Air Force: Sensor moisture caused 1st B-2 crash", MSNBC, 5 June 2008'
  45. "Moisture confused sensors in B-2 crash", AirForceTimes, 6 June 2008.
  46. Shachtman, Noah (6 June 2008). "Video: Stealth Bomber Crashes". Wired.
  47. "Air Force World: B-2 Crash Cause Identified", AIR FORCE Magazine, July 2008, Vol. 91, No.7, pp. 16-17.
  48. "Lampyridae". 1995-03-14. Retrieved 2010-12-16.
  49. "Hitler's Stealth Fighter Re-created". 2010-10-28. Retrieved 2010-12-16.
  50. 1 2 3 4 "Situation Awareness". Retrieved 2010-12-16.
  51. 1 2 "EADS Knows LO, Aviationweek May 23, 2007". 2007-05-23. Retrieved 2010-12-16.
  52. John Pike. "MiG-29 FULCRUM". Retrieved 2010-12-16.
  53. "Tu-160 Put On Hold."
  54. Stüwe, Botho., p. 258 Das Ortungsignal der Me 163 B war relativ schwach ... difficult Radar target, absence of dihedral reflector (tailless). Peenemünde West (in German). Augsburg, Germany: Bechtermünz Verlag, 1999. ISBN 3-8289-0294-4.
  55. "The German Army's KZO system". Archived from the original on 19 February 2009. Retrieved 2010-12-16.
  56. "'Sofreh Mahi': The Radar Evading UAV from Iran". Retrieved 2012-09-29.
  57. "First Look At MiG Skat UCAV". Aviation Week. 2007-08-23. Retrieved 2010-12-16.
  58. "Photo Release - Northrop Grumman Reveals First Navy Unmanned Combat Aircraft (NYSE:NOC)". 2008-12-16. Retrieved 2010-12-16.
This article is issued from Wikipedia - version of the 11/21/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.