FREE ELECTRONIC LIBRARY - Books, dissertations, abstract

Pages:     | 1 |   ...   | 4 | 5 || 7 |

«Deeply Buried Facilities Implications for Military Operations Deeply Buried Facilities: Implications for Military Operations Deeply Buried ...»

-- [ Page 6 ] --

military will have a promising instrument for attacking deeply buried facilities. For example, one concept is to integrate HPM into cruise missiles 39 As evidenced from the level of development of HPM weapons, there is great potential for attacking the electronic infrastructure in a deeply buried facility. For the foreseeable future, successfully disrupting the electrical power, or the electrical circuits that depend on it, is an effective means for disabling a deeply buried facility.

Neutralize Computer and Communications Equipment

The effects of HPM weapons described above have the potential to disable or destroy all the electronics that are located in a deeply buried facility, including computer and communications equipment. Attacks with destructive software viruses that are launched through the internet or directly loaded into the computer network that supports a deeply buried.

facility, or manipulating an enemy's databases, also provide an effective means for degrading a facility's capability to perform its mission.

Environmental control, security, databases and certain manufacturing processes are likely to be controlled by computer systems that are located inside an Underground facility. While it is unclear whether computers provide entry points for information operations to manipulate the information, if these computer networks are designed for maximum security and survivability it is likely that these would be designed with a minimum of external connections.

An attack that focuses on destroying the external communication links and computer controls, including antennas, satellite dishes, and hardwire connections, provides another means for neutralizing an underground facility.

However, it is not easy to locate the external communication connections because the designers of deeply buried facility will adopt many of the external deception and camouflage schemes, as discussed earlier, including low reflectivity, the integration of manmade structures with natural surroundings, and the use of decoys. Furthermore, since external communication connections are a vulnerable aspect of deeply buried facilities, it is likely that the facility will use redundant communication links in order to avoid the vulnerabilities that are associated with external antennas. Lastly, it may be better to leave external antennas intact and undisturbed, rather than destroy these, because these could be used as conduits for an attack with high power microwaves against the equipment that is attached to the antennas. As discussed earlier, antenna arrays are an ideal entry point for using HPMs to destroy the electrical circuits that supports a deeply buried facility.


A reasonable assumption is that with a carefully planned campaign, it is possible to destroy or neutralize deeply buried facilities. The concepts that are discussed in this section range from the use of existing technologies to the development of new ideas and technologies that require further analysis. The broader point is that as states realize that the United States is committed to neutralizing deeply buried facilities, those governments are likely to respond by digging deeper, building harder facilities, and developing mobile facilities, as the Libyans are suspected of doing at Tarhunah. As rogue nations are forced to take increasingly expensive actions to counter U S military capabilities, this represents a success for the United States. The enormous expense that is associated with constructing these facilities will only increase as these states attempt to develop more robust and survivable facilities. Finally, it should be evident that neutralizing deeply buried facilities represents a formidable challenge for the U S military.

V. Conclusions

While deeply buried facilities have existed for decades, these facilities have emerged as an important challenge for the U S military in the early years of the twenty-first century. Their significance reflects the dangers associated with the proliferation of nuclear, chemical, and biological weapons, and the prospect that rogue states could use these facilities for the manufacture and storage of weapons of mass destruction, as well as housing critical command and control function for the government and the military.

The immediate problem is that, short of the use of nuclear weapons, the current generation of technologies for locating and neutralizing these types of facilities are not sufficient for holding deeply buried facilities at risk. This means that the United States should direct its research and development organizations to develop weapons that will allow U.S. forces to locate, characterize, and neutralize underground facilities. One must also consider that a military response to these facilities may involve more than brute force attacks against the facility or its contents. The use of advanced conventional penetrating weapons may not be sufficient to ensure complete success because if a weapon misses an underground facility by a mere 50 feet, the facility may survive. Furthermore, if it is desirable to preserve the contents of the facility or if collateral damage is politically unacceptable, the use of overwhelming force simply may not be a realistic military option. The implication is that alternative means of neutralizing deeply buried facilities must be vigorously pursued so that the United States and its allies will have the widest range of capabilities and options for destroying these facilities.

The ability to locate, characterize, and neutralize deeply buried facilities is critical to the successful conduct of future military operations. Some of the concepts that will contribute to this capability have been presented in this study, as shown in Table 3.

Table 3. Summary of Responses to Deeply Buried Facilities In terms of posing a military threat to deeply buried facilities, it will be necessary to coordinate advances in sensor technologies in the geophysical, submariner, and intelligence collection communities.

In fact, many of the major U.S intelligence collection systems must be re-evaluated in terms of their ability to solve the problem that is created by the existence of deeply buried facilities.

If the United States is to solve this problem, then its approach must rest on three fundamental realities about deeply buried facilities. The first is that the threat is real and continues to increase. The consequences for U S.

national security can be devastating if this problem is not addressed Second, the United States must make a long-term commitment to develop the necessary technologies and equipment to locate, characterize, and neutralize deeply buried facilities. For example, the U S. Air Force armament laboratory at Eglin AFB has initiated a call for concepts from industry for developing options for neutralizing deeply buried targets. Third, it is essential to develop programs that will integrate all of the relevant technology, equipment, and strategies that are necessary for defeating deeply buried facilities, which includes all of the military services and the intelligence community.

If this strategy is successful, it should influence the decision making process in states that are considering the construction of such facilities, and perhaps may persuade these governments that deeply buried facilities are not as secure and invulnerable as they once thought. Those governments that are committed to constructing deeply buried facilities will eventually realize that the United States will acquire the technological means for finding and destroying these facilities in the event of war. Finally, the U S. defense establishment must contemplate how the development of deeply buried facilities will affect national security in the twenty-first century.40 Bibliography Adams, James. The Next World War. Computers Are the Weapons and The Front Line Is Everywhere. New York, NY: Simon and Schuster, 1998 Attridgc, W S., and W.D. Gaunter The Deep Underground COC The MITRE Corporation Technical Memorandum TM-3097. Bedford, MA, June 19, 1961 Beach, H.D. and R.A. Lucas. Individual and Group Behavior in a Coal Mine Disaster National Academy of Sciences–National Research Council, Publication 834, Washington D C., 1960.

Bermudez, Joseph S. Jr. North Korean Special Forces Annapolis, MD: Naval institute Press, 199S Busvine, James. Insects and Hygiene London: Methuan & Co. Ltd., 1951.

Cerniglia, Jamcs A., Dave B. Carr, Teresa L Dicks, Edward M Griffn, James M.

Maxwell, and Duane R Schatle. "The DIM MAK Response of Special Operations Forces to the World of 2025: "Zero Tolerance/Zero Error " A Research Paper Presented to Air Force 2025, August 1996 See http://www au.af.mil/au 2025/volume3/chapl1/v3cll-1.htm, February 10, 1999.

Conyers, Lawrence B., and Dean Goodman Ground-Penetrating Radar. An Introduction for Archaeologists. Walnut Creek, CA: Alta Mira Press, 1997 Hough, Harold Satellite Surveillance Port Townsend, WA: Loompanics Unlimited, 1991.

Howell, Benjamin F Jr. Introduction to Geophysics. New York, NY: McGraw-Hill Book Co, 1959.

Laurie, Peter. Beneath the City Streets, A Private Inquiry into the Nuclear Preoccupations of Government London: Northumberland Press Ltd., 1970 Smith, Fred L., and Thomas R Young. Nuclear Explosives and Mining Costs. Livermore, CA: University of California Lawrence Radiation Laboratory, Contract W-7405cng-48, July 1960.

Telford, W.M., L P Geldart, and R E. Sheriff. Applied Geophysics, Second Edition. New York, NY: Cambridge University Press, 1990 "The Threats Go Deep." Air Force Magazine, October 1997, pp. 47-49

Toffler, Alvin and Heidi War and Anti-War, Making Sense of Global Chaos. New York:

Warner Books, 1993 Deeply Buried Facilities… 38 US Department of Defense Final Report to Congress Conduct of the Persian Gulf War Washington, D C., April l992, Warden, John A. III. The Air Campaign. New York: Pergamon-Brassey's International Defense Publishers,1989.

Warden, John A. III. "The Enemy as a System." Airpower Journal, Vol9, (Spring1995), pp.


Won, I.J. Diagnoslng the Earth, Ground Water Monitoring Review, Summer 1990, Volume 10, no. 3.

Young, Roger, and Lynn Helms. Applied Geophysics and The Detection of Buried Munitions. U S. Army Corps of Engineers, Geotechnical Branch, no date See http://www.hnd.usace.army.mil/oew/tech/rogpprl.html, December 17, 1998.


1. See Gary Curtin, "The Threats Go Deep," Air Force Magazine, October 1997, p. 47, for the argument that, "Hardened and deeply buries targets have evolved over the years as one of the lessons of Desert Storm. The old 'cut-and-cover' of targets in Desert Storm (i e, dig a hole, build a concrete bunker, and cover it with dirt) arc no long perceived as hard enough, so building things into mountains has become the way to perceived the things that are most important to you. We have witnessed this in Korea for many years…and in a lot of other places in the world."

2. William E Loose, Air Force Research Lab Proposal for Research on Alternatives to Conventional Destruction of Hard, Deeply Buried Targets, Fall 1998.

3. Raymond Bonner, "Mysterious Libyan Pipeline Could Be Conduit for Troops," New York Times, Tuesday, December 2, 1997.

4. See Joseph S Bermudez, Jr, North Korean Special Forces (Annapolis, MD: Naval Institute Press, 1998, Appendix B, DMZ Tunnels, p.251.

5. Susanne M. Schafer,"B-2sareCombat Ready, "Air Force Times, April 14, 1997, Vol 57, Issue 37, p 16.

6. Patrick J. Sloyan, "A Policy Change Undone; U.S., Says Nuclear Threat Not Needed" Newsday, February 26,1998.See www.newsday.com/mainnews/rnmi021n.htm.

7. There is an important distinction between finding underground facilities and characterizing their functions. The former tasks of funding facilities is considerably simpler than discerning what is contained in those facilities and what military and governmental functions are performed within an underground facility. The principal focus of this study is on the problems associated with locating and neutralizing these facilities.

8. See Hard Target Smart Fuze Program Office, Eglin Air Force Base, Florida, http://vww.wlmn.eglin.af mil/ public/mnmf/htsf html.

9. "The Threats Go Deep," Air Force Magazine, October 1997, p. 47.

10. For information on the English Channel digging rates, see Drew Fetherston, The

Channel, The Amazing Story of the Undersea Crossing of the English Channel " (New York:

Pages:     | 1 |   ...   | 4 | 5 || 7 |

Similar works:

«Discussion Paper No. 04-32 Are IPOs of Different VCs Different? Tereza Tykvová and Uwe Walz Discussion Paper No. 04-32 Are IPOs of Different VCs Different? Tereza Tykvová and Uwe Walz Download this ZEW Discussion Paper from our ftp server: ftp://ftp.zew.de/pub/zew-docs/dp/dp0432.pdf Die Discussion Papers dienen einer möglichst schnellen Verbreitung von neueren Forschungsarbeiten des ZEW. Die Beiträge liegen in alleiniger Verantwortung der Autoren und stellen nicht notwendigerweise die...»

«These statements/stories have been taken from Facebook and have not been evaluated by the Food and Drug Administration. The personal testimonials shared reflect individual experiences and are not necessarily typical of the results you may obtain. Reliv products are not intended to diagnose, treat, cure or prevent any disease. Be sure to visit the FAQ web page for clarification and general information on these products. We recommend you consult with your physician before using any products...»

«Ministerium für Landwirtschaft, Umwelt und Verbraucherschutz des Landes Mecklenburg-Vorpommern Informationsund Publizitätsvorschrift für die Umsetzung von Vorhaben aus dem Entwicklungsprogramm für den ländlichen Raum Mecklenburg-Vorpommern 2007 – 2013 Stand: 01.Februar 2013 Europäischer Landwirtschaftsfonds für die Entwicklung des ländlichen Raums: Hier investiert Europa in die ländlichen Gebiete Inhaltsverzeichnis 1. Vorbemerkung 1.1 Dieses Merkblatt richtet sich an 1.2...»

«Deutsche Real Estate Aktiengesellschaft Berlin Jahresabschluss zum Geschäftsjahr vom 01.01.2013 bis zum 31.12.2013 Bilanz zum 31. Dezember 2013 Aktiva 31.12.2013 31.12.2012 EUR EUR A. Anlagevermögen I. Immaterielle Vermögensgegenstände Entgeltlich erworbene gewerbliche Schutzrechte und ähnliche Rechte und Werte 2,00 245,00 II. Sachanlagen Andere Anlagen, Betriebsund Geschäftsausstattung 190,00 11.191,00 III. Finanzanlagen 1. Anteile an verbundenen Unternehmen 29.953.664,25 25.937.652,81...»

«Findbuch zum Nachlass von Franz Mockrauer Bearbeitet von Klaus Heuer und Tim Kiparski Deutsches Institut für Erwachsenenbildung, Bonn 2005 Inhaltsverzeichnis Einleitung Findbuch zum Bestand A Briefwechsel aus dem schwedischen Exil B Briefwechsel zur schwedischen Erwachsenenbildung C Briefwechsel zum Wiederaufbau der deutschen Erwachsenenbildung 1 mit eigenen Manuskripten 2 mit Materialsammlungen Anhang Bibliographie der Veröffentlichungen von Franz Mockrauer. 22 Besonderheiten des Nachlasses...»

«daiwa exist daiwa exist Daiwa Exist Vergleiche finde günstige Preise. Vergleiche finde günstige Preise. Mit unserem Preisvergleich sparen! Multirolle Daiwa Preisvergleich Multirolle Daiwa. Preisvergleich Multirolle Daiwa. idealo Preisvergleich! Exist Daiwa Info über Exist Daiwa. Info über Exist Daiwa. Suchen in 6 Suchmaschinen Zugleich! Daiwa Exist Japanimporte und AM Anglerboard.de 12.02.2013· Daiwa Exist Japanimporte und AM Günstig kaufen! Tipps! [QUOTE=ulfisch;3821790]Hallo...»

«Social Commerce Emerges As Big Brands Position Themselves to Turn “Follows”, “Likes” and “Pins” into Sales Nora Ganim Barnes University of Massachusetts Dartmouth The use of social networking sites has exploded. Consumers now share information online (eWOM) through recommendations, reviews, ratings and referrals in what has led to purchases as a result of social interactions via these platforms. This consumer-mediated purchasing is called social commerce, a sub-set of e-commerce. A...»

«Roberto Simanowski | Salon Roberto Simanowski Einleitung. Der Salon als dreifache Vermittlungsinstanz in: Europa ein Salon? Beiträge zur Internationalität des literarischen Salons, hg. v. Roberto Simanowski, Horst Turk und Thomas Schmidt, Göttingen: Wallstein Verlag 1999., S. 6-40. Es mag ein Zufall sein, daß eine der ersten Internet-Zeitungen sich Salon nannte. 1 Die Fragen, die sich daran anknüpfen lassen, sind indes über die Titelwahl hinaus relevant: Ist der neue Ort des Salons das...»

«Dekker, S. W. A., Mooij, M., & Woods, D. D. (2002). Envisioned practice, enhanced performance: The riddle of future (ATM) systems. International Journal of Applied Aviation Studies, 2(1), 23-32.Envisioned practice, enhanced performance: The riddle of future (ATM) systems Sidney Dekker Linköping Institute of Technology, Sweden David Woods The Ohio State University, USA Martijn Mooij San José State University, USA Abstract Future ATM (Air Traffic Management) systems are like envisioned...»

«Quantitative estimation of aerobic diagenetic overprint of palaeoproductivity signals Dissertation zur Erlagung des Doktorgrades der Naturwissenschaften -Dr. rer. nat.im Fachbereich Geowissenschaften der Universität Bremen vorgelegt von Monika Kodrans-Nsiah Bremen April 2008 Tag des Kolloquiums: 13. Juni 2008 Gutachter: Dr. Karin Zonneveld Dr. Sabine Kasten Table of contents Zusammenfassung 5 Abstract 8 1 Introduction 10 1.1 Objectives 10 1.2 Organic Carbon and preservation 14 1.2.1 Organic...»

<<  HOME   |    CONTACTS
2016 www.book.dislib.info - Free e-library - Books, dissertations, abstract

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.