A significant part of stealth strategy is concerned with exploiting the environment in every way possible, consistent with the mission requirements. This consists of exploiting not only the natural environment (atmospheric attenuation, clutter, etc.) but also the man-made environment (such things as the electronic order of battle (EOB) and electronic countermeasures (ECM)). In the last part of this chapter, an example low probability of interceptor (LPI) scenario analysis will be performed. This analysis will show the essential elements of most LPI mission assessments. In the fourth chapter, there was a survey of the performance and parameters of current intercept receivers. This chapter will show among other things that the environment limits passive and active detection of stealth platforms, not raw sensitivity.
Exploitation of the environment, Page 1 of 2
< Previous page Next page > /docserver/preview/fulltext/books/ra/sbra540e/SBRA540E_ch5-1.gif /docserver/preview/fulltext/books/ra/sbra540e/SBRA540E_ch5-2.gif