Premium Essay

Air Raid Smart Bombs

Submitted By
Words 1401
Pages 6
Smart bombs
Colonel Phillip Meilinger, the commander of the US Air Force’s School of Advanced Airpower Studies once stated: Precision air weapons have redefined the meaning of mass ..... The result of the trend towards ‘airshaft accuracy’ in air war is a denigration in the importance of mass. PGMs (i.e. precision Guided munitions) provide density, mass per unit volume, which is a more efficient measurement of force. In another words, recent targets became small, similarly, the bombs became even smaller. Now a days there is no room to waste ammo around specific target, every explosive charge should hit predesignated target.6 One of the greatest …show more content…
Those procedures required enormous number of bombers, aircrew and excessive amount of explosives.in contrast, two modern jets, two pilots and two smart bombs could easily hit their target with hundred percent chances of destruction. According to these facts, smart bombs showed undeniable increased lethality against adversaries.
For example, in the summer of 1944, 47 B–29s attacked the Yawata steel works; only one bomber made it to the target area, carrying only one of its bombs. This single 500 lb general purpose bomb hit a powerhouse located 3,700 feet from the far more important coke houses that originally was the raid’s point of interest which was one of the 376 bombs dropped over Yawata on that day.7 In the fall of 1944, only seven per cent of all bombs dropped by the Eighth Air Force hit within 1,000 feet of their aim point; even a ‘precision’ weapon such as a fighter-bomber in a 40 degree dive releasing a bomb at 7,000 feet could have a circular error of as much as 1,000 feet.8 It took 108 B-17 bombers, crewed by 1,080 airmen, dropping 648 bombs to guarantee a 96 per cent chance of getting just two hits inside a 400 x 500 feet German power-generation plant. Conversely, in the operation inherent resolve, one f-16 fighter with one JDAM could easily hit DAESH caging facility and kill all the terrorists within that building. Smart bombs have proved without a shadow of doubt that it’s one of the deadliest weapons of this era.

Similar Documents

Premium Essay

Blitzkrieg

...lives would be further demonstrated by both sides throughout the duration of World War II. For example, Hitler utilized the "Blitzkrieg", a German term for lightning war, against Europe in an effort to force their surrender. The idea was to relentlessly bomb a single target until they submitted, a tactic which shortened campaigns and preserved the lives of soldiers, but the collateral damage was great; the German "blitz" killed over 40,000 civilians in the space of about 9 months and destroyed over a million homes. The German people, or at least Hitler, their leader, deemed the German soldiers' lives more important than the...

Words: 739 - Pages: 3

Premium Essay

How Long Is Survival Selfish

...Is survival selfish? Or is it smart? People can live through “the impossible”. How? That is a great question. People will survive if they act with a calm and prepared mind. When people have a calm mind they can think faster and more clear. Also when people stay calm things often naturally work in their direction. To start out, people with a calm and prepared mind will think not only faster, but clearer too. According to Laurence Gonzales, who wrote “From Deep Survival”, says this when recounting how a girl responded to a plane crash: “In thinking of herself, Juliane wasn't even particularly brave. Survival is not about bravery and heroics. Heroes can be perfect heroes and wind up dead. By definition, heroes must live” (Gonzales 327)....

Words: 611 - Pages: 3

Free Essay

James Doolittle

...James Harold Doolittle Edmond Pukaj Spartan College of Aeronautics Abstract James Doolittle was a man with an outstanding resume in the American Air Force and one of Americas most well-known aviation pilots whose contributions in the Second World War was extremely crucial to increasing American morale. Doolittle also played a major role in creating new instrumentations to improve night flying and flying in hazardous weather. Doolittle broke and set many records in the aviation world and made the impossible possible with his extraordinary flying skills. Made himself a role model for upcoming generations of pilots. General James “Jimmy” Harold Doolittle was a very important individual in American aviation history. Many recognize Jimmy Doolittle as the individual responsible for coordinating the planes that took off on the aircraft carrier The Hornet, for the raid on Japan in the Second World War. James Doolittle was placed in charge of defining which plane to use for this mission. He decided on the B-25 plane determining that it had the highest potential to make the short take-off of the Hornet. Doolittle was known as being a daredevil, scholar, pilot and General. Doolittle’s particular expertise and passion was for flying. He is considered to be the American aviation pioneer. Although his flying expertise is what he is most commonly credited for his accomplishments far exceed this criterion (Daso, 2003) James Doolittle was born on December 14, 1896 in Alameda, California...

Words: 1579 - Pages: 7

Free Essay

World War 2

...How World War II Changed Warfare How World War II Changed Warfare A man wearing olive drab pants and jacket slowly props the muzzle of his Thompson .45 Caliber Sub Machine Gun on a window seal of a half decimated apartment building. He lines up his sights and waits for the signal. He wears the “Screaming Eagle” patch of the United States Army’s 101st Airborne Division. Inserted into Bastogne, France via aerial assault from a C-47 Sky Train, in December 1944. Barrels pointed downward onto the rubble covered road. Passing over the road is a German Panzer Tank followed by a platoon of German soldiers carrying MP-40 Machine Pistols. As, the 101st nervously prepares to engage a Panzer Tank, which has them outmanned and outgunned, they hear a whistling sound in the distance believed to be an aircraft. Before they know a P-51 Mustang fighter plane, also known as a “Tank Killer” swoops in and knocks the Panzer out. Unexpectedly, the airborne troops open fire. A few long seconds later, the Panzer Tank sits smoldering in flames and a platoon of Nazis lays dead all around. Never before has the world, scene such a vast arsenal of weapons and tactics used. This will be reflected on the amount of lives, military and civilian, lost in the short span of 1939-1945. The devastation that took place would not just be repaired and forgotten. There is still evidence all over the Europe, North America, and Asia, of World War II and the lives that were lost. Not only was this the...

Words: 2620 - Pages: 11

Premium Essay

Compare And Contrast 9/11 And Pearl Harbor Bombing

...loved ones on that day. Everyday, safety and security is strictly enforced, especially when travelling to prevent a tragedy like this from occurring again. On December 7th, 1941, Pearl Harbor was bombed by Japan. The attack sunk and damaged 18 ships, destroyed over 300 army and navy planes, and killed over 2,400 Americans. President Roosevelt had Congress declare war and it was a nearly unanimous vote of 435-1. Of all the ships that were damaged, 11 of them were recovered and fixed later on. This day was horrific because the raids of attack would last 30 minutes. Kamikazes, bombs, and torpedos were used for suicide attacks. This left many Americans to be angry and hurt, which is why most were in favor of the war. The bombing of Pearl Harbor led to a violent, bloody war. Nazi Germany and Italy were backing Japan and things were getting chaotic all over the world. This led to World War II. The U.S ended up bombing Hiroshima and Nagasaki using nuclear bombs in 1945, during the final stage of the World War. The severity and the many innocent lives lost are probably why it was the first and last time America used a nuclear weapon. Eventually, the Allied leaders defeated the Axis leaders and the Japanese and Italian Empires fell. It’s clear that the historic events of 9/11 and the bombing of Pearl Harbor have various similarities; they both ended up in violent wars, innocent lives were lost, and they changed the way we live our lives. However, they differed in that 9/11 was more religious...

Words: 1496 - Pages: 6

Free Essay

The Attack on Pearl Harbor

...The Attack on Pearl Harbor There were many reasons leading to the attack at Pearl Harbor. One main reason for it was the economic issues (Anderson). The trade routes between America and Japan were cut off. The Japanese ships were not accepted in America either (Taylor 5), because of the two countries’ political differences (Taylor 6). On November 1, 1941 a ship came into the Honolulu Harbor. It had a Japanese flag on it. It was a forbidden Japanese ship. “The name of the ship was Taiyo Maru.”(Taylor 4) This ship was not welcomed with the original Hawaiian customs. Normally the hula girls would be out at the dock welcoming the passengers with their friendliness and dancing in their grass skirts. This was a way of saying “aloha,” which means both hello and also good-bye in the Hawaiian Islands. This ship carried a few important Japanese men. These men were actually Japanese spies (Taylor 6). One of these spies was a man named Otojiro Okuda. Okuda was one of the most important of Japanese spies. He had an agent. His agent was Kohichi Seki. Seki had to stay in Japan for a few months to train to become a spy for Japan. Seki was a key man in Okuda’s success as a spy. He helped him get the important information that was needed most by Okuda. Seki took a taxi to Pearl Harbor every day. He did this so he could get the names of the ships in port and the ships that were out and away from port. He wrote letters to Okuda which had this information he learned in it...

Words: 2870 - Pages: 12

Free Essay

Aircraft Carriers in Wwii

...Since most World War II aircraft had a range of just a few hundred miles, it was necessary to bring the aircraft to the battlefront, and using a ship to do so made a lot of sense in the Pacific, where much of the fighting took place on islands and along coastal areas. The first true aircraft carriers were built by the Japanese in the 1920’s. Japan remained an innovator in aircraft carrier design and construction during the years leading to World War II, operating nine aircraft carriers by 1941. Their largest carriers of the war were the Akagi and Kaga, each capable of launching over 90 aircraft (doc. Navy), only 25% of these planes were fighters, which intercepted enemy search planes and air strikes and escorted the dive bombers and torpedo bombers on strike missions. The remaining 75% of the air wing were dive bombers and torpedo bombers (doc. Hughes 102). The Allies, however, also had extremely effective carriers. British ships, such as the Ark Royal and the Eagle, and American ships, such as Yorktown and...

Words: 3085 - Pages: 13

Premium Essay

Windows Fundamentals

...CompTIA SY0-301 CompTIA Security+ Version: 20.2 QUESTION NO: 1 A password history value of three means which of the following? A. Three different passwords are used before one can be reused. B. A password cannot be reused once changed for three years. C. After three hours a password must be re-entered to continue. D. The server stores passwords in the database for three days. Answer: A Explanation: QUESTION NO: 2 In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO). A. Subnetting B. NAT C. Firewall D. NAC E. VPN Answer: C,E Explanation: QUESTION NO: 3 Which of the following is the BEST approach to perform risk mitigation of user access control rights? A. Conduct surveys and rank the results. B. Perform routine user permission reviews. C. Implement periodic vulnerability scanning. D. Disable user accounts that have not been used within the last two weeks. Answer: B Explanation: 2 QUESTION NO: 4 Which of the following devices is BEST suited for servers that need to store private keys? A. Hardware security module B. Hardened network firewall C. Solid state disk drive D. Hardened host firewall Answer: A Explanation: QUESTION NO: 5 All of the following are valid cryptographic hash functions...

Words: 14377 - Pages: 58

Premium Essay

Test Paper

...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...

Words: 125224 - Pages: 501

Free Essay

English Patient

...of Skip and Mary Dickinson For Quintin and Griffin And for Louise Dennys, with thanks ‘Most of you, I am sure, remember the tragic circumstances of the death of Geoffrey Clifton at Gilf Kebir, followed later by the disappearance of his wife, Katharine Clifton, which took place during the 1939 desert expedition in search of Zerzura. “I cannot begin this meeting tonight without referring very sympathetically to those tragic occurrences. “The lecture this evening ...” From the minutes of the Geographical Society meeting of November 194-, London I The Villa SHE STANDS UP in the garden where she has been working and looks into the distance. She has sensed a shift in the weather. There is another gust of wind, a buckle of noise in the air, and the tall cypresses sway. She turns and moves uphill towards the house, climbing over a low wall, feeling the first drops of rain on her bare arms. She crosses the loggia and quickly enters the house. In the kitchen she doesn’t pause but goes through it and climbs the stairs which are in darkness and then continues along the long hall, at the end of which is a wedge of light from an open door. She turns into the room which is another garden—this one made up of trees and bowers painted over its walls and ceiling. The man lies on the bed, his body exposed to the breeze, and he turns his head slowly towards her as she enters. Every four days she washes his black body, beginning at the destroyed feet. She wets a washcloth and holding...

Words: 83532 - Pages: 335

Free Essay

Nintendo Game Genie

...Nintendo Game Genie Game Codes Page i # 1942 1943 3D Worldrunner 720 Degrees 8 Eyes …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. 1 2 3 4 5 A Addams Family Adventures in the Magic Kingdom Adventures of Dino-Riki Adventures of Lolo Adventures of Lolo 2 Adventures of Lolo 3 Adventures of Tom Sawyer Adventure Island 2 Adventure Island 3 Adventures of Bayou Billy Adventures of Rocky & Bullwinkle Airwolf Air Fortress Alfred Chicken Alien Syndrome Alpha Mission Amagon American Gladiators Anticipation Archon Arch Rivals Arkanoid Arkista's Ring Astyanax Athena …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. …………………………………. 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Nintendo Game Genie Game Codes Page ii B Back to the Future Back to the Future 2 Back to the Future 3 Bad Dudes Bad Street Brawler Balloon Fight Barbie Baseball Simulator 1000 Baseball Stars 2 Bases Loaded 2 Bases Loaded 3 Bases Loaded 4 Batman Batman: Return of the Joker Batman Returns Battleship Battletank Battletoads Battletoads and Double Dragon Battle of Olympus Beetlejuice Bee 52 Best of the Best Championship Karate Bigfoot...

Words: 44940 - Pages: 180

Free Essay

Essay

...GENEROLO JONO ŽEMAIČIO LIETUVOS KARO AKADEMIJA Genovaitė LAUGALIENĖ Milda MIRONAITĖ MOKOMASIS ANGLŲ – LIETUVIŲ IR LIETUVIŲ – ANGLŲ KALBŲ KARYBOS ŽODYNAS Eksperimentinis leidinys Vilnius 2008 UDK 355(03)=20=882 La-458 Mokomąjį anglų – lietuvių ir lietuvių – anglų kalbų karybos žodyną parengė Generolo Jono Žemaičio Lietuvos karo akademijos Užsienio kalbų instituto direktorė Genovaitė Laugalienė ir Užsienio kalbų instituto Užsienio kalbų katedros lektorė Milda Mironaitė. Atsakingoji redaktorė Užsienio kalbų instituto Užsienio kalbų katedros lektorė Aušra Bučaitė. Recenzavo Generolo Jono Žemaičio Lietuvos karo akademijos viršininko pavaduotojas doc. dr. Pranas Jankauskas, Užsienio kalbų instituto Anglų kalbos mokymo centro viršininkas vyr. ltn. Andrius Kiesas ir Lietuvos kariuomenės Mokymo ir doktrinų valdybos Individualiojo rengimo skyriaus Anglų kalbos mokymo poskyrio vedėja Aušra Narbutienė. © Genovaitė Laugalienė, 2008 © Milda Mironaitė, 2008 © Generolo Jono Žemaičio Lietuvos karo akademija, 2008 Turinys Pratarmė......................................................................................................................... 4 . Angliški ir lietuviški sutrumpinimai ............................................................................ 5 Anglų – lietuvių kalbų karybos žodynas........................................................................ 7 Lietuvių – anglų kalbų karybos žodynas ....................................

Words: 111618 - Pages: 447

Free Essay

Comps

...Intelligence for the Twenty-First Century ALAN DUPONT Strategic discourse over the past decade has been dominated by a debate over the nature of future warfare and whether or not there is a ‘revolution in military affairs’ (RMA). Supporters contend that developments in military technology, especially precision guidance and high-speed data processing, in conjunction with advances in doctrine and strategy, will fundamentally transform the way in which future wars will be fought and privilege RMAcapable forces in the contest to achieve battlefield dominance.1 Sceptics, on the other hand, regard the RMA as being more evolutionary than revolutionary, and argue that many of the technical advances associated with the RMA do not necessarily presage a paradigm shift in warfare.2 However, all agree that timely, accurate and useable intelligence will be critical to the successful conduct of war in the twenty-first century, perhaps more so than in any previous era. It is surprising, therefore, how little academic attention has been devoted to the changes that are taking place in the technology, management and integration of the intelligence systems that will underpin any RMA. It is the contention of this article that the transformation of intelligence architectures, particularly in the West, is no less profound than that of the weapons, platforms and warfighting systems they are designed to support and enhance. Moreover, the cumulative weight of the changes in prospect will redefine the...

Words: 11896 - Pages: 48

Free Essay

An Overview of Computer Viruses in a Research Environment

...An Overview of Computer Viruses in a Research Environment Matt Bishop Department of Mathematics and Computer Science Dartmouth College Hanover, NH 03755 ABSTRACT The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically attacks aimed at subverting computer security. This paper examines computer viruses as malicious logic in a research and development environment, relates them to various models of security and integrity, and examines current research techniques aimed at controlling the threats viruses in particular, and malicious logic in general, pose to computer systems. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken. 1. Introduction A computer virus is a sequence of instructions that copies itself into other programs in such a way that executing the program also executes that sequence of instructions. Rarely has something seemingly so esoteric captured the imagination of so many people; magazines from Business Week to the New England Journal of Medicine [39][48][60][72][135], books [20][22][31][40][50][67][83][90][108][124], and newspaper articles [85][91][92][94][114][128] have discussed viruses, applying the name to various types of malicious programs. As a result, the term “computer virus” is often misunderstood. Worse, many who do understand it do not understand protection in computer systems, for example...

Words: 12539 - Pages: 51

Free Essay

As It Goes

...Contents Preface to the First Edition Introduction Part 1. Thought Control: The Case of the Middle East Part 2. Middle East Terrorism and the American Ideological System Part 3. Libya in U.S. Demonology Part 4. The U.S. Role in the Middle East Part 5. International Terrorism: Image and Reality Part 6. The World after September 11 Part 7. U.S./Israel-Palestine Notes Preface to the First Edition (1986) St. Augustine tells the story of a pirate captured by Alexander the Great, who asked him "how he dares molest the sea." "How dare you molest the whole world?" the pirate replied: "Because I do it with a little ship only, I am called a thief; you, doing it with a great navy, are called an Emperor." The pirate's answer was "elegant and excellent," St. Augustine relates. It captures with some accuracy the current relations between the United States and various minor actors on the stage of international terrorism: Libya, factions of the PLO, and others. More generally, St. Augustine's tale illuminates the meaning of the concept of international terrorism in contemporary Western usage, and reaches to the heart of the frenzy over selected incidents of terrorism currently being orchestrated, with supreme cynicism, as a cover for Western violence. The term "terrorism" came into use at the end of the eighteenth century, primarily to refer to violent acts of governments designed to ensure popular submission. That concept plainly is of little benefit to the practitioners of state terrorism...

Words: 93777 - Pages: 376