Feeds

India to deploy tethered blimp radars

Worried about Tamil Tiger air force

Remote control for virtualized desktops

The Indian armed forces are using radar-carrying static balloons to provide an early warning of terrorist air strikes, according to reports.

Much interest has been aroused in defence circles during recent months by the air raids mounted in Sri Lanka by the Liberation Tigers of Tamil Eelam (LTTE, or "Tamil Tigers"). The conflict between the Sri Lankan government and the separatist Tigers has normally been seen as a counter-insurgency conflict like many others ongoing around the world, in which relatively well-armed conventional forces battle guerillas who favour tactics such as suicide bombing, ambushes, and assassination.

Many governments, including the US, list the Tigers as a terrorist organisation.

In recent months, however, the Tigers have mounted several bombing raids against targets in Sri Lanka, reportedly using modified light aircraft of Czech manufacture. The Tiger pilots have flown in and out at low altitude, which makes them difficult to detect using ground radars.

India nowadays prefers not to get too involved in the Sri Lankan fighting off its southeastern coast, after suffering a bloody nose during a military intervention and the assassination of former Prime Minister Rajiv Gandhi by the Tigers in 1991.

But the Indians are worried that the fighting could come to them, in particular in the form of Tiger air attacks. Lacking a big fleet of AWACS planes or similar conventional-type airborne radar platforms, Indian military planners are thinking outside the box.

India Defence reports that the Indian Air Force will deploy aerostat radars on the southeastern Tamil Nadu coast. The aerostats are tethered blimp-like balloons carrying phased-array radars which can detect approaching aircraft from afar, even if they fly at low level. The IAF purchased two of the EL/M-2083 systems from Israel in 2004, and apparently has been sufficiently pleased with the balloon-borne eyes-in-the-sky that a further four have been ordered.

The aerostats aren't as vulnerable as they might seem; they aren't highly pressurised. This means that they won't burst, and leak only slowly if penetrated. An aerostat will stay up for hours even with its envelope pierced by hostile fire. Filled with helium rather than hydrogen, there's no risk of a Hindenburg style explosion.

Reportedly, small Russian-made ground radars have also been deployed, in particular at the Kalpakkam nuclear plant. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?