How to effectively use the fish to win the war Arexis jamming box can use the DRFM-based interference technology (such as smart noise, coherent false targets and various saturation technologies) to protect the entire strike formation approach and departure point from low-frequency radar equipment . But the service still retains MAPS in the background. The goal is to develop an open architecture-the modular APS framework (MAF), which can be used in any current or future armored vehicle to insert the best radar from various manufacturers, cheap GPS jammers, and killer hard. Install and play. In this way, the military can easily update vehicle protection using any new technology provided by any provider.
When the trajectory is many miles away, it can be slightly more difficult to interfere with GPS. US missile ballistic missiles usually have a long understanding of the target before approaching it. They also have a very beautiful way to calculate the distance to the target, when they are close, they do not rely on GPS. Even so, large-scale gps jammer are still very difficult. However, making minor changes is not too difficult, as long as it is enough to disable high-precision weapons. When you know someone will operate in a very specific area, such as the ships we send around the world. In other words, we are one of the stealth drones performing the same reconnaissance mission (witnessing Iran) at a time. It’s easier to fuck with it. Because you know very well where they work, you can focus on that particular area. Through training operations, you can easily fuck.
Therefore, low radar cross-section and low radar absorption materials are necessary but insufficient features of the sixth generation fighter. Some theorists believe that the stealth body may be repaired with advanced sensor technology-the stealth body cannot be upgraded as easily as avionics and weapons. Therefore, jamming signals, electronic warfare and infrared screening will also become more and more important. However, sensor fusion and optional personnel mean that sixth-generation jets rely heavily on data connections and networks that may be blocked or even hacked. Ground logistics networks such as the F-35’s ALIS are expected to significantly improve efficiency, but will also subject landing aircraft to potential cyber attacks. The B-52 weapon developer added that in the second step (which should be completed in 2022), more modern or more modern weapons will be integrated, such as air-to-ground defense combined missiles or JASSM, JASSM extended range ( ER) and a technical miniature air-launched bait or MALD. The variant of the MALD-J jammer, also integrated in the B-52, can also be used to disrupt enemy radar technology.