Feeds

Seagoing Missile Defence tests this week

US cruiser to stand off attack from Hawaii

High performance access to file storage

The US Missile Defence Agency (MDA) claims further success with test interceptions by its mobile land-based protective system, and plans a more complex trial of its seagoing component.

At the end of last month, the Theatre High Altitude Area Defence (THAAD) system successfully shot down (pdf) a non-separating target described by the MDA as "a 'SCUD'-type ballistic missile". THAAD is a lorry-mounted rocket which could defend relatively small areas against probably shorter-ranging ballistic warheads plunging out of the sky. It would be most useful protecting deployed US forces, or perhaps key areas of allied nations.

THAAD-type SCUD shield capability was believed to be in the US armoury as long ago as 1991, in the form of the Patriot air-defence missile of that day. However this turned out not to be the case. It seems that a protection against SCUDs is now, finally, in existence.

In a related development, Aviation Week reports that a further test will take place this week employing sea-based components of the MDA panoply.

The test will involve a single Ticonderoga-class Aegis cruiser, equipped with SM-3 Block 1A missile-busting interceptors. USS Lake Erie will be required to simultaneously detect and shoot down two targets representing fairly basic short-range enemy ballistic missiles, of the type already in service with various nations of interest. The targets will be fired from the missile range at Kauai in the Pacific.

Standard interceptors in their present form will probably never be able to knock down serious intercontinental missiles of the type employed by major world powers, but Aegis-type ships could be a useful defence against the sort of weapons employed by North Korea - or those which make up the majority of the Chinese arsenal. North Korea does have one intercontinental-type design, but when it was tested it blew up less than a minute off the pad.

Unsuprisingly, Japan is buying Aegis ships, and JS Kongo of the Japanese Maritime Self-defence Force will also participate in this week's test. However her missile firing will be simulated only.®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
Get your MOON GEAR: Auction to feature Space Race memorabilia
Keepsakes from early NASA, Soviet programs up for bids
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.