The confluence of computer science, robotics and communication advances has led to developments in defense technology that were science fiction only a few decades ago.
These developments fall into four basic categories:
• Stealth — These techniques are primarily designed to reduce radar visibility, although they also apply to the full electromagnetic spectrum, including visible light, infrared and sound. The best known examples are the F-117 fighter and the B-2 bomber. Today, the military is applying advanced stealth techniques to almost anything that moves, including ships, ground vehicles and humans.
• Unmanned vehicles — This category includes aircraft (UAV), ground vehicles (UGV) and undersea craft. The most famous examples are probably the Predator and Reaper "drones" used to assassinate terrorist leaders in Afghanistan, Pakistan and other areas. Most drones are designed for aerial surveillance and include vehicles such as the Global Hawk, a high-altitude, long-range successor to the U-2. At the opposite extreme are small, hand-launched UAVs used by ground troops at the squad level. UGVs entered service primarily in explosives disposal, but they have rapidly assumed other roles such as sentry and forward observer duty. It is estimated that UAVs make up more than 40 percent of all U.S. military aircraft and that there are now more than 15,000 UGVs in service.
• Directed energy — Truly the stuff of "Star Wars," these techniques use lasers, high-frequency sound and energy bursts to disrupt or damage opposing military equipment.
• Cyberwarfare — It is not clear yet whether software can serve as a weapon in the traditional sense, but it is clear that cybertools will increasingly be used to augment and enhance other weapons systems.
There is no doubt that these high-tech weapons are exciting and have a "Wow!" factor that engages the general public.
However, they also raise important questions: