The F8U was several years ahead of the F4H in the development / deployment process and the F4 was intended to extend the carrier's reach in both range and performance beyond what the F8 could do. The F8 was a contemporary of the F100 and F101 in the J57 family, while the F4H was brethren to the F104 and the A3J in the J79 clan.I was under the impression that the decision to use the F8U for close in combat was more of a decision based on the limits of the F4H? Regardless, I remember being told that the idea was to have the F4H's used (even in that case) to blow away a whole bunch of aircraft; then let the F8U's go in with their missiles and guns and cut-apart whatever was left?
That is in fact exactly the scenario for fleet defense against a saturation attack by standoff equipped high speed bombers. In the theoretical battle scenarios of the 1950s there was a sort of arms race going on between standoff range and speed vs interceptor speed, range, and search capability. The interceptors quickly got out to ranges beyond surface radar support, and had to be able to function without it, a concept entirely alien to the SAGE environment.I remember being told that the idea was to have the F4H's used (even in that case) to blow away a whole bunch of aircraft; then let the F8U's go in with their missiles and guns and cut-apart whatever was left?
Yup, they call that reverse engineering, and most nations with technological shortcomings get pretty good at it.Like how if I didn't know the exact details how something worked but if I knew that "if I do this, then that and this -- this happens?"
Back in my day, crews tended to take the data link with "a grain of salt", viewing it as a troubled technology. Though it was supposed to replace voice communication, it was still an emitter, subject to analysis, replication, disruption, and deceit by the opposition.there was the USC-2 Datalink, which allowed the ability to remotely signal and maneuver an aircraft into a firing position
No, there's no "stealth value" in jamming. That's like flashing a beacon and sounding a siren. You suppress the the airliner's transponder by slaving a signal to it, which cancels it out at the ground radar site. Since you (the bomber) are closer to the radar site, your transponder replies are both earlier and stronger than the airliner's, whose weaker signal, partially suppressed by your out of phase aping signal, is rejected by the radar's discriminator and yours is displayed on the scope. Neat trick, huh? A devious society creates devious minds which conjure up devious ways of deceiving simple minded westerners.So they were jamming the airliner, then duplicating it and rebroadcasting it as their own?
Cheers,
Wes