TerraN_EmpirE
Tyrant King
Yes stealth is not invisibility Ultra. It's passive Electronic Camouflage.
If the Russians and PRC were so sold on being able to Kill stealth they wouldn't be building J20 or PAKFA or all there other stealth projects.
Even when dealing with so called Stealth killer radar finding a Stealth platform is not easy. Stealth killer Radar just means that it's producing more energy to try and get a larger return on stealthy targets.
The Closer the Stealth is to the emission source the better the return and that's the trick.
At ranges the Stealth is still stealth If a F22 is flying at the outer ranges of a Radar system it's still pretty much indefinable as a target but the closer it gets the more visible it is. This differs from a conventional non stealthy in that at extended range the radar would get a clean profile and see it.
The Secret of stealth is not just the shaping of the fighter it's the mindset of the user. The next Trick of stealth is detecting enemy Radar transmissions and using them to map a safe course around the perimeter of there detection net. so as to penetrate and conduct operations.
If the Russians and PRC were so sold on being able to Kill stealth they wouldn't be building J20 or PAKFA or all there other stealth projects.
Even when dealing with so called Stealth killer radar finding a Stealth platform is not easy. Stealth killer Radar just means that it's producing more energy to try and get a larger return on stealthy targets.
The Closer the Stealth is to the emission source the better the return and that's the trick.
At ranges the Stealth is still stealth If a F22 is flying at the outer ranges of a Radar system it's still pretty much indefinable as a target but the closer it gets the more visible it is. This differs from a conventional non stealthy in that at extended range the radar would get a clean profile and see it.
The Secret of stealth is not just the shaping of the fighter it's the mindset of the user. The next Trick of stealth is detecting enemy Radar transmissions and using them to map a safe course around the perimeter of there detection net. so as to penetrate and conduct operations.