|Innovating The Next Big Thing||March 8, 2014|
• Strategy & Strategists
• Network & Information Security
• Terrorism & Counterterrorism
• Insurgency & Counterinsurgency
• Weapons of Mass Destruction
• Homeland Security & Defense
• Energy, Infrastructure & Environment
• Remembering 9/11
Next Innovator Group
Feedjit Live Web Stats
Terror Alert Level
• The Clausewitz Home Page
• Ghost City
Books on Terrorism
Books on Network Security
Books on WMD
THAAD System Intercepts Target in Successful Missile Defense Flight Test
Jun 29, 2010 – Missile Defense Agency
The Missile Defense Agency and U.S. Army soldiers of the 6th Air Defense Artillery Brigade from Fort Bliss, Texas, successfully conducted an intercept test for the Terminal High Altitude Area Defense (THAAD) missile defense element of the nation’s Ballistic Missile Defense System today. A target missile was launched at approximately 9:32 p.m. Hawaii time, June 28 (3:32 a.m. EDT, June 29), and about five minutes later a THAAD interceptor missile was launched from the Pacific Missile Range Facility (PMRF) off the island of Kauai, Hawaii. Preliminary indications are that planned flight test objectives were achieved.
The test involved the intercept of a short-range unitary target in the endoatmosphere (inside the earth’s atmosphere). The target, representing a short-range ballistic missile threat, was launched from an at-sea mobile launch platform located in the Pacific Ocean west of Hawaii. Upon acquiring and tracking the target, the THAAD system developed a fire control solution and launched an interceptor missile, which acquired and successfully intercepted the target missile. The intercept occurred at the lowest altitude to date for the THAAD interceptor missile, which has the capability to engage targets both inside and outside the earth’s atmosphere.
Soldiers of the 6th Air Defense Artillery Brigade of Fort Bliss, Texas, conducted launcher, fire control and radar operations, using tactics, techniques, and procedures developed by the U.S. Army Air Defense School. Soldiers operating the equipment were not aware of actual target launch time. Also following the engagement, test personnel used the Simulation-Over-Live Driver (SOLD) software system to inject multiple simulated threat scenarios into the THAAD radar. This exercised THAAD’s capability to track and engage a mass raid of enemy ballistic missiles.
Several missile defense assets and emerging technologies observed the launch and gathered data for future analysis. Participants included the Command and Control, Battle Management and Communications (C2BMC) system and elements of the U.S. Army’s PATRIOT system. The PATRIOT system, located at PMRF, conducted engagement coordination with THAAD and conducted upper tier debris mitigation exercises during the intercept engagement.
This was the seventh successful intercept in seven attempts for the operationally-configured THAAD system. Operational elements of the Ballistic Missile Defense System are currently deployed, protecting the nation, our allies and friends against limited ballistic missile attack. The system continues to undergo development and testing to provide a robust layered defense against ballistic missiles of all ranges in all phases of flight.
The THAAD Program is managed by the Missile Defense Agency in Washington, D.C., and executed by the THAAD Project Office in Huntsville, Ala.
» Send this article to a friend...
» Comments? Tell us what you think...
» More Weapons of Mass Destruction articles...
Commentsblog comments powered by Disqus
Support This Site
• 2/25 Eco Travel Guide: Review of The Fast Changing Arctic
• 2/19 Polar Research: Review of The Fast Changing Arctic
• 2/7 Gartner Says Reports of Mobile Device Cybersecurity Threats in Sochi Olympics Are Not Unique; It Could Happen to You at Your Local Coffee Shop
• 2/6 By 2016, 25 Percent of Large Global Companies Will Have Adopted Big Data Analytics For At Least One Security or Fraud Detection Use Case
• 2/5 The Next Big Thing Blog: Is the Internet-of-Things really on the brink of enabling a major shift in business value?
• 2/5 McAfee Blogs: Plasma HTTP Botnet Steals Passwords From Chrome, FileZilla
• 2/4 McAfee Blogs: ‘Whisper’ App: Teens Are Having a Blast but Parents May Gasp
• 2/4 McAfee Blogs: Trust and Relationships in the Mobile Era
• 2/4 McAfee Blogs: Stop! Do You Really Want to Send That Photo?
• 2/4 McAfee Blogs: Choice and Control are Key to Thwarting Shadow IT
• 2/4 McAfee Blogs: Is Encryption Becoming Ubiquitous in Business?
• 2/3 The Next Big Thing Blog: The shifting view of security required today
• 2/3 McAfee Blogs: Yahoo! Mail Hacked: Secure Your Account Now
• 1/31 McAfee Blogs: Vietnamese ‘Adult’ Apps on Google Play Open Gate to SMS Trojans
• 1/30 McAfee Blogs: Chat Friend Finder Apps on Google Play Leak Personal Information
• 1/29 McAfee Blogs: Hackers Pull off a Crafty Attack on Michaels
• 1/29 McAfee Blogs: New Year’s Sales; Big Discounts on Stolen Data
• 1/29 McAfee Blogs: Stolen Data: Network Security Can Ensure You’re Not a Target
• 1/28 McAfee Blogs: One-Click Scammers Still Targeting Japanese Smartphone Users
• 1/27 McAfee Blogs: 99.999% and 5 Essential Elements for Server Security
• 1/27 HP Security Lab Blog: 8 things your boss wants you to know about 'Big Data Security'
• 1/27 HP Security Lab Blog: 1 in 4 Security Operations Organizations Are Ineffective
• 1/27 McAfee Blogs: Winning The Wrong Race: Android Leads In Vulnerabilities Thanks To Apps
• 1/27 McAfee Blogs: Selling The Next Generation Firewall – January 3
• 1/27 McAfee Blogs: The Two Faces of Your Favorite Apps
• 1/24 HP Security Lab Blog: Could Behavioral Analytics Have Stopped Edward Snowden?
• 1/23 HP Security Lab Blog: Malware from a universe far, far away
• 1/23 McAfee Blogs: Share Your 2014 Predictions: January #SecChat
• 1/23 McAfee Blogs: Driving Disruptive Growth with Intel Security in 2014
• 1/22 McAfee Blogs: McAfee Mobile Security: Now Available for iOS Devices
• 1/22 McAfee Blogs: Smart TVs, Refrigerators Used in Internet-of-Things Cyberattack
• 1/22 Announcing: Culture, Conflict and Counterinsurgency (Stanford University Press, 2014)
• 1/22 McAfee Blogs: How to Protect Your Cash Register from Cyber Criminals
• 1/21 HP Security Lab Blog: Security trends for 2014
• 1/21 McAfee Blogs: The Secret Tumblr Craze and What Parents Need to Know
• 1/20 HP Security Lab Blog: Insider Threat--Does it really affect my organization?
• 1/20 RSIS Report: Defining Iranian Nuclear Programs in a Comprehensive Solution under the Joint Plan of Action
• 1/16 HP Security Lab Blog: What to expect from HP Enterprise Security for RSA Security Conference 2014
• 1/16 McAfee Blogs: Analyzing the Target Point-of-Sale Malware
• 1/16 McAfee Blogs: 2014 Threats Predictions: Malware to Take Advantage of Hotspots, Gaming Consoles
• 1/16 McAfee Blogs: A Leader again! McAfee is positioned highest for completeness of vision in the new Gartner Endpoint Magic Quadrant
• 1/15 McAfee Blogs: 2014 Threats Predictions: HTML5, Exploit Kits, ‘Free’ Software Require Web Safeguards
• 1/14 McAfee Blogs: 2014 Threats Predictions: Botnets, Spam Explore New Avenues to Steal Data, Money
• 1/13 RSIS Report: Update on Fordow Centrifuge Site: Future Uncertain
• 1/13 McAfee Blogs: 2014 Threats Predictions: Network and Host Attacks Will Again Target Adobe and Microsoft Apps, Java
• 1/10 HP Security Lab Blog: Rethink your enterprise security and learn how to protect what matters
• 1/10 HP Security Lab Blog: Webinar on 1/23: Stay out of the headlines for breaches or non-compliance
• 1/9 HP Security Lab Blog: Reducing Hacker Operational Freedom and Capability
• 1/9 HP Security Lab Blog: A day in a life of a hacked organization
• 3/7 Soldiers Face Climb in Four-Man Bobsled Race
• 3/7 Alexander: U.S. Must Address Media Leaks, Cyber Legislation
• 3/7 Pentagon Official Expresses Concerns Over Budget Instability
• 3/7 DOD Official Discusses Nuclear Deterrence in Congress
• 3/7 Commander Encouraged After Year in Afghanistan
• 3/7 DOD Official: Quadrennial Review's Focus is Protecting Homeland
• 3/7 Face of Defense: Airman Overcomes Setbacks to Complete Training
• 3/7 Hagel, Israeli Defense Minister Discuss Red Sea Operation
• 3/6 DOD's Top Doc Outlines Medical Advances
• 3/6 Transition, Progress Mark Commander's Year in Afghanistan
• 3/6 Official: DOD Strives for Middle East Stability, Security
• 3/6 Africom Commander: Terror Threat Remains Across Africa
• 3/6 Hagel Outlines Compensation Reform Proposals in Budget Request
• 3/6 DOD Supports U.S., Allied Response to Russia-Ukraine Crisis
• 3/6 DOD Budget Request Adapts to Fiscal Realities, Hagel Says
• 3/6 Report: Some Military Consumers Not Seeing Earned Protections
• 3/6 Face of Defense: Enlisted Leader Offers Insight, Motivation
• 3/6 Program Executive Officer Describes F-35 Progress
• 3/6 Austin: Afghan Government 'At Risk' Without International Forces
• 3/5 Official Provides Details on U.S. Augmentation in Baltics
• 3/5 Locklear Warns of Growing Challenges in Asia-Pacific Region
• 3/5 Hagel: Severe Budget Cuts Will Compromise National Security
• 3/5 Official Encourages Dialogue Between Pentagon, Industry
• 3/5 Dempsey: Budget Cuts, Global Challenges Raise Risk to Nation
• 3/5 Hagel, Dempsey Outline U.S., Partner Approach to Ukraine
• 3/5 Air Force Official: Budget Request Repositions Force
• 3/5 Navy Budget Request Involved Tough Choices, Official Says
• 3/5 Officials Detail Army's Fiscal 2015 Budget Request
• 3/5 Face of Defense: Navy Relatives Reunite at Sea
• 3/4 Soldier Olympians Bring Home Five Medals From Sochi