ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

America's 5 New Future Weapons (That we used to kill Osama)

Updated on April 15, 2014
Now if only it were literally invisible.
Now if only it were literally invisible. | Source

Number Five: RQ-170 Sentinel Drone

It's about time, weapon designers. Finally a Stealth Drone.

Unmanned drones have skyrocketed in popularity within the armed forces since the Predator was introduced in 1995. Until now the fleet of about 200 Predators in the United States have only lost about four to combat. Many more have been lost to equipment failures, weather, or operator error according to Wikipedia. Then again, they have been flying over not-so-technologically advanced enemies. While most unmanned drones on typical missions cannot be seen with the naked eye, especially the new Reapers, almost all can be detected by radar systems. So what does the United States do when it wants to fly secret missions over an advanced modern Pakistani military (ranked 15th in the world by these guys)?

The quick answer: Satellites. But when even they can't get close enough to gather enough intelligence, the U.S. will send in the RQ-170 Sentinel Drone. Public, we probably shouldn't even know about this. However, a couple of sightings and a resulting acknowledgment in Dec. 2009 made the RQ-170 Sentinel Drone exposed. It is the next logical step in drone technology, and pretty good looking to boot. It is very hard to shoot down any stealth aircraft without extreme luck and perhaps errors in command planning like what happened in Serbia in 1999.

The result is that now the U.S. can spy on just about anyone anywhere and not just with satellites. They had enough confidence in the Sentinel that they repeatedly made appearances in Pakistani airspace. I feel like I haven't been able to hide from the government before, but now I'm sure.  


Number 4: Listening Laser Beams

You're a dangerous terrorist sitting in your house with your good friend. You have just turned the T.V. off and you're on your laptop reading some random guy named Cydro's hub. All the while you two are chatting about the weather, the new Corvette you just bought, and the upcoming terrorist attack that you are planning. Cars are going by, a dog is barking, and someone is listening to your conversation with a laser beam.

Wait, what??

That's not possible, laser beams are intense concentrated forms of light waves. They can't "hear" my conversation.

Well despite what us people who think cell phones are advanced listening devices, lasers can detect minute vibrations in the glass of windows in order to "hear" what is going on inside. The patterns of the laser reacting to the vibrations is put through a computer which amplifies it in a certain way that makes it audible for the savvy person shining the laser to hear. The CIA people at the advanced operating base spying on Bin Laden used this trick to get closer and help identify the family within the compound. By analyzing the vibrations, says John Pike, analysts could tease out the number of distinct voices. "I can do voice identification to count how many people I'm listening to. If I count 22 people inside the building and 21 outside the building, I know I've got somebody who never goes outdoors." John Pike is the director of the private national security group GlobalSecurity.org.

I guess if Osama was bumming around his house all day he had plenty of time to come up with devastating terrorist attacks. With no internet or cell phone, that's about all that he had to do besides run Al Qaeda and satisfy all those wives of his.

Like this, only probably invisible
Like this, only probably invisible | Source
Hide ya kids, Hide ya Wife
Hide ya kids, Hide ya Wife | Source

Number 3: Incredibly trained war dogs

First of all, there is already an awesome hub about this subject (the particular dog involved) here. I don't want to steal mslizzee's thunder, so I definitely recommend you read that article.

But I have to give this hub some content, and I'd like to point out now we found out from an information leak that the dog's name was Cairo. Cairo also had a pretty cool outfit, and no that doesn't serve the same purpose as your dog's Christmas outfit. If you take a look at that picture to the right, that's some crazy looking body armor (It can stop 9mm rounds). I feel like it came straight out of Terminator or I, Robot.

The gist is that dogs (especially German Shepherds) provide some useful advantages in a high-profile assassination. One, they are able to move around in stealthy ways. Two, they can detect explosives. Considering Osama's pad had many false doors and was constructed almost like a maze, there was a high probability of rigged explosives inside. Three, they are "highly trained." What does that mean? Well, according to mslizzee, they can wear oxygen masks to jump out of planes with. They can receive orders through ear buds, and use infrared cameras. I wouldn't call that highly trained, I would call that highly educated (I think I can only do about one of those things).

Anyway, I would like to give a quick response to the typical "this is atrocious, dogs don't deserve to be put on the front lines" argument. The typical rebuttal is that these dogs save human lives (and that should be enough). I can offer a little more congealment to that argument. These dogs are offered constant attention and companionship in order to keep them highly trained. They live good lives where they are exercised, fed right, and mentally exercised. All of these things are not always present in the life of a house dog (I'm looking at you, Michael Vick). Plus, its not like we're training them to suicidally detonate the explosives that they find. I guess I'm done with my little rant.


Number 2: Cell Phone Monitoring

All it took to find Bin Laden was a very brief phone call 90 miles away from Bin Laden's compound from a courier. Abu Ahmed al-Kuwaiti, the main courier for Osama bin Laden, placed a battery in his cell phone and called a friend (who happened to be on our watch list anyway). At the time we were unsure that al-Kuwaiti was even his real name or if he even existed. Most of the information on this guy came from Guantanamo Bay from mixed accounts and purposeful lies.

So let's put this in perspective. I don't know much about the technology of cell phone monitoring, however to me this is impressive. We know the conversation was very brief. It took place on foreign soil and in remote locations. It probably did not contain any key words that would immediately flag it for surveillance. The only way it could possibly have been pre-targeted for monitoring is because it was with a U.S. targeted terrorist. How the U.S. identified the call as useful, recorded it, determined the location and appearance of al-Kuwaiti, followed al-Kuwaiti back to Bin Laden's compound, all within a matter of minutes, I'm baffled. Correct me on any of this in the comments section, please. In the meantime, I'm going to read Orwell's 1984 and deliberately not piss off the United States government.

Almost as sexy as the RQ-170
Almost as sexy as the RQ-170 | Source

Number 1: Stealth Helicopter(s?)

Once again, someone has beaten me to writing a hub on this subject. Check out a nice article by perrya right here.

The gist is that the U.S. had a top secret black hawk helicopter that no one knew about. Its main feature: stealth. The only reason why we know now that it wasn't a conventional helicopter used in the raid is because one crash landed and was blown to bits by our own Navy Seals. To me, the first deployed stealth helicopter (that we know of) is just about as exciting news as when we found out about the F-117 Nighthawk.

After researching a fairly large amount on the subject, I can say that Special Operations units at least in the United States have a one-up on their capabilities world-wide. Once again, Pakistan has an impressive military (they have to have it as much as they piss off India). In order to elude the Pakistani military fairly deep into their own territory, one has to have an impressive stealth regiment to simply fly through radar zones and conduct clandestine operation. Suggestions for further reading: here is a great article on wired.com on the subject.

I'm no conspiracy theorist, but readers, after researching I personally am almost positive of something. The released story goes that typical Chinooks were flown in to support the raid. Why have everything else (RQ-170, MH-XX) be stealth-ed up when you're flying in huge helicopters alongside them? Readers, I believe that there is a military helicopter out there that is basically a stealth Chinook. I'm not the only one who thinks that, either. Maybe the low-flying route taken by the helicopters is enough to conceal them, but I think the Chinook would have been a huge risk to the mission because it has such a large radar cross section. Plus Boeing (the makers of the Chinook) has been apart of stealth helicopter research before. I can understand this is very disputable, but why would the government have any reason to inform us of a top secret helicopter if they don't have to? The Chinooks obviously did not crash in Osama's front yard.

Not so far-fetched, is it?
Not so far-fetched, is it? | Source

UPDATE: June 28, 2011

It appears that there are rumors that the Navy Seals also used night vision contact lenses in the raid. Read more here:

http://kitup.military.com/2011/06/hi-tech-night-vision-on-bin-laden-raid.html

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)