U.S. media said the PLA layers or forcing the U.S. aircraft carriers deployed hundreds of miles back
Data for: missile launch instantly. Xuji She Data Figure: U.S. CVN73 USS Washington
Author: Tom – Shankar
United States, “New York Times” reported that problem: the Pentagon tried to deal with low cost but deadly weapon
President Obama’s new military strategy ever growing concern of a serious threat: mines or network attacks such as low-cost weapon in use, is not intended to defeat the U.S. military in combat , but exclusion from a distance.
president and his national security team predicted that the threat is the security challenges the next 10 years, the past 10 years is terrorism and insurgency.
worse than the U.S. national military forces have started to use these weapons, because the latter can delay, interfere with or even prevent the U.S. military offensive. Modern war planning may be suffering from anti-aircraft, mines, missiles, electronic jamming, and the troubled computer network attacks, and these means to weaken the U.S. in technology and hardware advantages.
with the cost of roadside bombs to destroy armored vehicles and lead to costly U.S. military casualties, the American public support for the war in Iraq and Afghanistan declined sharply. Learn from the experience of potential enemies.
new strategy documents, China and Iran lead the fight against the U.S. military’s search for “asymmetric means” at the same time cautioned that these costs are relatively inexpensive means of promotion to terrorist groups and guerrilla organizations.
President Obama last week, the Pentagon announced a new strategy that the United States should invest “in the path of the opponent trying to block our ability to take action.”
clear that new strategies to cope with this threat – the military called “anti-access” “area denial” – the U.S. military will become one of the priorities of 10. This will help determine how the four arms of the competition for shrinking Pentagon budgets.
the strategy document said: “We must maintain access and freedom in action challenges the ability to project power in the region.”
example, the Iranian Revolutionary Guard naval exercises were held in recent to practice by a group of small boats launched an intensive attack. These boats can be loaded high explosives; succeed as long as a boat, you can in a large U.S. warships blasted a hole in the ship body.
Washington Institute for Near East Policy Michael Singh recently, “Foreign Policy” magazine, when the author wrote: “The Iranian Navy – especially the Revolutionary Guards navy – to invest in well suited for asymmetric warfare vessels and weapons, not Iran will be lost the ship conflict. “
Singh said that Iran has deployed advanced mines, mini-submarines and mobile anti-ship cruise missiles.
analysts say, China poses a potential challenge is even greater. China has a number of diesel-powered attack submarines, in China’s coastal waters quietly taking action, a threat to foreign warships. China also can threaten coastal warships deployed short-range, medium-and long-range missiles, and multiple radar and surface to air missile.
find, identify and attack U.S. warships is a complex military operation. However, China’s layers of defenses may force the U.S. aircraft carrier and its battle group to initiate action where pushed back hundreds of miles, to reduce its aircraft can reach the day of attack sorties, reducing its effectiveness.
Perhaps most worrying is that the Chinese emphasis on electronic warfare and computer network attacks, and this may weaken the United States by the advanced satellite-guided weapon accuracy.
In response to these threats, the U.S. Air Force and the Navy set up a specialized agency, they developed the so-called “empty war” tactics and weapons added.
a concept is the use of F-35 Joint Strike Fighter to fight against the outer ring of enemy air defense systems, sensitive surveillance systems for the loading of F-22 stealth fighter jet open access, let deep enemy territory. There, it can guide the ship-launched cruise missiles powerful attack move or hide the target.
Air Force deputy chief of staff Lieutenant General Herbert Carlisle said, the U.S. cyber-warfare techniques can be used to destroy the enemy’s decision-making process. He said: “We can give them an error message, or they suspect that the right information at their disposal.”
navy deputy chief of staff Lieutenant General Bruce Franklin, said the root, being careful study of anti-military intervention and regional refuse only the skills to identify and determine the enemy’s ability to attack U.S. targets, what are the potential weaknesses.
Joint Chiefs 席马丁登普西 soon will be published in the area refused to intervene and stop the anti-environment, the principles for action. The 65 documents will confirm the instructions on the battlefield armed forces to carry out actions required of the 30 kinds of capabilities.share: