Military Embedded Systems

Articles 41 - 60
Radar/EW

Fire and finish: The middle of the kill chain - Blog

December 22, 2017
WARFARE EVOLUTION BLOG: As stated in previous articles, we need to reduce the complete kill chain down to 10 minutes or less, according to General John Jumper. So, all new systems and weapons must fit inside the kill chain somewhere (find, fix, fire, finish, feedback). And, they must speed things up significantly. We also established that the latest radar, sonar, SIGINT, IMINT, and other sensor systems fit in the find and fix phases. Now, it?s time to take a look at some of the latest developments going into the fire and finish phases.
A.I.

Artificial intelligence (AI) and artificial stupidity (AS) - Blog

October 31, 2017
WARFARE EVOLUTION BLOG: Isaac Asimov first published the three laws for super-intelligent robots in 1942, and we are ignoring them. Although Department of Defense (DoD) directive 3000.09, dated November 2012, says that a human must always pull the trigger or press the button on our weapons, we violated that when we created the Phalanx CIWS and the Aegis missile defense system, although those weapons are defensive. Now, everybody with a lot of money, or a lot of education, is claiming that Artificial General Intelligence (AGI) will take us to a ?singularity,? sometime between 2020 and 2040, where machines become exponentially smarter than humans. At that point, the machines and killer robots will eliminate humans and take over the world.
Radar/EW

Find and fix: The front-end of the kill chain - Blog

August 31, 2017
WARFARE EVOLUTION BLOG. I can speak to this topic with some level of experience. My old military intelligence unit, Army Security Agency (ASA) was the military arm of the National Security Agency (NSA). Our primary mission was to find, identify, fix, and track every significant military unit on the planet, including both our enemies and our allies. As Sun Tzu is credited with saying (or maybe it was Machiavelli, or Petrarch, or Michael Corleone): "Keep your friends close, and your enemies closer."
Comms

A quick update on activity in North Korea - Blog

July 26, 2017
WARFARE EVOLUTION BLOG: In our last episode, I promised that my next article would be on the ?find and fix? phases of the kill chain. The recent news coming out of North Korea compels me to interrupt that plan. However, these new developments seem to fit the proposed topic well, especially at the tactical level. So, let?s throw-in a quick update on Kim Jung Un?s (KJU) latest malfeasance and how our intelligence systems and people are involved.
Unmanned

Shrinking the kill chain - Blog

June 28, 2017
WARFARE EVOLUTION BLOG: When I first started researching this topic, I thought writing this article would be straight-forward and easy. As with many other subjects in this series, that was not the case. Targeting models are integrated into kill chains, or vice-versa, and that creates some confusion. The available stream of information about this subject is both narrow and shallow. However, we are seeing a sequence of evolving kill chain models, at the strategic and tactical levels.
Radar/EW

And then there's submarines - Blog

May 30, 2017
WARFARE EVOLUTION BLOG: Submarines were harder to count than aircraft carriers in my previous blog. According to scattered web information, there are about 533 submarines in the oceans today, operated by 40 countries. But that number moves around, mostly because (1) there are a number of new submarines coming into service and (2) it?s hard to say how many antiquated Russian, Chinese, Iranian, and North Korean submarines are still operational.
Avionics

Aircraft carriers are just big fat targets - Blog

April 28, 2017
WARFARE EVOLUTION BLOG: During World War II in the Pacific, aircraft carriers were primarily used to defeat enemy carriers and battleships at sea. The whole point of island-hopping was to gain airstrips on land, to launch bomber attacks on the enemy troops on other islands. That was the plan until the Doolittle Raid in 1942, where the USS Hornet launched sixteen long range B-25 bombers to hit Tokyo.
Radar/EW

Radar cross section: The measure of stealth - Blog

March 31, 2017
WARFARE EVOLUTION BLOG: The primary measure of stealth, or low observability (LO), is the radar cross section (RCS) of the target, whether it?s aircraft, missiles, or ships. The radar pulse goes out from the transmitter, hits the target, and bounces back. The radar receiver measures the energy in the return signal in decibel (db) units, but that?s a hard way for normal people to visualize the size of a target. So, we must convert db to square meters (m2) to get the picture.
Avionics

Generations of fighter aircraft and the F-35 vs F/A-18 arguments - Blog

February 28, 2017
WARFARE EVOLUTION BLOG: When some writer talks about 4th, 5th, or 6th generation fighter aircraft, what do they mean? Like the previous articles in this series on the generations of warfare, there are multiple definitions by multiple authors. For fighter aircraft generations, there?s Hallion (1990), Aerospaceweb (2004), Air Force Magazine (2009), Jim Winchester (2011), and Air Power Development Center (Royal Australian Air Force, 2012).
Comms

Domains of warfare and strategic offsets - Blog

January 31, 2017
WARFARE EVOLUTION BLOG:It?s 2017, and I?m back. After enduring uncomfortably-deep probing and evaluation of my literary skills and technical analysis capabilities, along with a comprehensive DNA test, my masters here at OpenSystems Media have decided to keep me on as a writer, to ply you with another year of fascinating and intriguing next-generation warfare articles. For 2017 I will write with an emphasis on present capabilities of the U.S. and our enemies, as well as new platforms and strategies under development.
Comms

War in space - Blog

December 20, 2016
WARFARE EVOLUTION BLOG: Speculating a war in space is a perplexing subject, so let?s wade into it with a heathy level of trepidation, looking at treaties, space courts, and potential battle scenarios.
Cyber

In a cyberwar - Blog

October 30, 2016
WARFARE EVOLUTION BLOG: This is another broad, sticky, and complex topic, much like the previous article on cryptology. So, let?s get started by offering some definitions.
Comms

Cloud, fog, mist, fluid, blockchain, and other things that irritate me - Blog

September 28, 2016
We are being inundated with new computing and networking models for all the wrong reasons -- from cloud computing to blockchain. This is a topic that distorts my normally congenial and pleasant demeanor, so let?s take a look at what is really going on and clear the air.
Comms

ARPA, DARPA, and Jason - Blog

August 24, 2016
WARFARE EVOLUTION BLOG: After the success of the Manhattan Project, that ended World War II in the Pacific, the Pentagon significantly reduced expenditures on research and development of weapons as the world enjoyed peace. That was a mistake considering the actions taken by the Russians in the following decade.
Comms

In a nuclear war... - Blog

July 28, 2016
WARFARE EVOLUTION BLOG: In this space we have discussed different generations of warfare, potential warfare against countries such as Iran, Russia, China, and North Korea, as well as the war on terror, but there is one are we haven't touched on until now -- nuclear warfare.
Comms

War on terrorism - Blog

June 29, 2016
WARFARE EVOLUTION BLOG: Previously, we took a cursory look at the warfare capabilities of Russia, China, North Korea, and Iran in a potential war with the U.S. All these enemies would wage conventional third generation warfare (3GW) conflicts for the most part. Now, let?s take a look at the war against terrorism, or GWOT (Global War On Terrorism), a term first coined by President George W. Bush in 2001.
Comms

War with Iran - Blog

May 28, 2016
WARFARE EVOLUTION BLOG: Previously, we looked at the military capabilities of our primary conventional enemies: Russia, China, and North Korea. Now, let?s take a look at our final conventional enemy, Iran. Iran stands accused of being the state sponsor of terrorism in the Middle East, through their support of terrorist groups in Iraq (Taliban), Afghanistan (al Qaeda), Yemen (Houthis), Lebanon (Hezbollah), and the Palestinians (Hamas).
Comms

War with North Korea - Blog

April 27, 2016
WARFARE EVOLUTION BLOG: Previously we've looked at what wars with Russia and China might look like. Now, let?s look at a war with North Korea.
Comms

War with China - Blog

March 29, 2016
EVOLUTION OF WARFARE Blog. In the last installment, we looked at how we stood in a war with Russia. Now, let?s take a look at China, from publicly available information.
Comms

In a war with Russia - Blog

February 26, 2016
EVOLUTION OF WARFARE Blog. In my previous posts I've discussed the different generations of warfare and where the U.S. military falls today and how it clearly is still the most powerful military. That said Russia has been flexing its muscle in Eastern Europe the last couple years and I thought it would be good to do an analysis of their military capability and see which generation of warfare their capability falls under. We will start by looking at the basic stats.
Articles 41 - 60