Blog Feed Post

Israel’s Iron Dome

Iron Dome

The politics of the conflict between Hamas and the State of Israel are well documented, and I’m sure you have already formed an opinion about who is at fault and what must be done. This article is not about any of that. It’s not about right or wrong, good or bad, politics or religion … it’s about a remarkable technology that is serving both a strategic and tactical purpose in an untenable, unsustainable situation.

In Arthur C. Clarke’s famous essay, “Hazards of Prophecy: The Failure of Imagination” he offers a “law” of prediction that posits, “Any sufficiently advanced technology is indistinguishable from magic.” If our imaginations don’t fail us, we can predict a defense system “so advanced” that enemy fire cannot penetrate it. Think of common arrows vs. suits of armor, or bombs vs. concrete-reinforced underground bunkers. That is the strategic idea behind Israel’s Iron Dome technology – protect Israel’s citizens and property by destroying enemy missiles in the air. Can Iron Dome technology really do that?

A Brief History

Developed by Rafael Advanced Defense Systems and first deployed by the Israeli Air Force in March 2011, the Iron Dome is a truck-towed mobile air defense system that counters short-range rockets and artillery shell threats. Able to work in any weather condition (including fog, dust, clouds and rain), the Iron Dome protects Israel’s northern and southern borders against rockets aimed at the country’s populated areas. Right now, it’s able to counter threats from about 40 miles away, but Israel wants to bump that up to about 160 miles – and also make it possible to take down missiles coming from two directions at once.

The Iron Dome was developed in the mid-2000s, after nearly 4,000 rockets landed in North Israel during the country’s second war with Lebanon in 2006. More than 4,000 additional rockets fired from Gaza landed in southern Israel between 2000 and 2007. After first coming up with the idea of an air defense system in February 2007, the first version was successfully tested in March 2009. In July 2010, the United States provided $205 million to help expand the effectiveness of the Iron Dome.

How it Works

The Iron Dome is built around three basic elements: radar, a missile firing unit and a battle management/weapon control system. After initially detecting a rocket launch, the Iron Dome monitors the rocket’s path, analyzes the threat and calculates the point of impact. If the rocket is headed for a congested area, the Iron Dome then launches an interceptor to try to detonate the threat over a neutral area.

How the Iron Dome Works

The Iron Dome is made up of “batteries,” which are trucks featuring radar and three launchers. By the end of 2012, Israel had five batteries. In September 2013, the country added a sixth. There are currently eight batteries protecting the country, but weapons scientist Richard Lloyd recently pointed to this number as one of the system’s major flaws – there just aren’t enough batteries to protect all of Israel.

The Iron Dome’s Shortcomings

It’s also unclear just how effective the Iron Dome actually is. In December 2011, The Jerusalem Post said the Iron Dome was successful in downing rockets from Gaza 75 percent of the time. Later, the Jerusalem Post reported that the system had improved to become 90 percent effective.

But then, in November 2012, the Israel Defense Forces (IDF) tweeted that it had stopped 302 of the 846 rockets fired from Gaza; this figure far lower than 50 percent, but still effective in keeping out hundreds of missiles. This month, however, the IDF said it had intercepted just 27 percent of the 180 rockets fired at Israel from July 7-9.

Then again, those numbers may not necessarily be accurate. Bloomberg reports that Lloyd and “a handful of other outside experts, including Theodore Postol of Massachusetts Institute of Technology, have been challenging the IDF’s assertions on Iron Dome’s success rate since at least 2012.” Even if the Iron Dome “intercepts” the missile, Lloyd says it may not manage to detonate its warhead in mid-air, meaning it’ll still cause major damage once it lands.

Other Forms of Missile Defense

While the Iron Dome has plenty of room for improvement, Israel has other systems in place to protect its citizens from rocket strikes. The country has a tremendous early-warning system to alert its citizens to incoming missile strikes, and it’s also constructed a network of shelters for its citizens to take cover in. These factors are major reasons why so few Israelis have died from missile strikes (at least, in comparison to the number of rockets Hamas has fired).

It’s this warning system and network of shelters that are saving most Israelis’ lives, according to Theodore Postol, a professor of science technology and national security policy at MIT. Postol estimates the Iron Dome’s success rate is less than 5 percent – far lower than just about every other estimate.

The Iron Dome’s true success rate probably lies somewhere between Postol’s 5 percent estimate and the IDF’s 90 percent figure – but at the time of this writing, statistics are fluid.

Technology, Strategy and Tactics

Today, Hamas is firing relatively unsophisticated short-range missiles at Israel. The strategy is to intercept them in the air. The tactics are to deploy eight mobile defensive Iron Dome batteries along the front and keep the enemy guessing as to their locations while neutralizing as many incoming missiles as possible. In practice, this will work until Hamas obtains more sophisticated weaponry.

One day, a more advanced version of Iron Dome technology may be capable of destroying every single incoming missile. While that day cannot come soon enough, it is sufficiently far enough in the future for us to need a quick, peaceful resolution. For everyone’s sake, I hope that peace finds a way.

Read the original blog entry...

More Stories By Shelly Palmer

Shelly Palmer is the host of Fox Television’s "Shelly Palmer Digital Living" television show about living and working in a digital world. He is Fox 5′s (WNYW-TV New York) Tech Expert and the host of United Stations Radio Network’s, MediaBytes, a daily syndicated radio report that features insightful commentary and a unique insiders take on the biggest stories in technology, media, and entertainment.

Latest Stories
The Open Connectivity Foundation (OCF), sponsor of the IoTivity open source project, and AllSeen Alliance, which provides the AllJoyn® open source IoT framework, today announced that the two organizations’ boards have approved a merger under the OCF name and bylaws. This merger will advance interoperability between connected devices from both groups, enabling the full operating potential of IoT and representing a significant step towards a connected ecosystem.
Kubernetes, Docker and containers are changing the world, and how companies are deploying their software and running their infrastructure. With the shift in how applications are built and deployed, new challenges must be solved. In his session at @DevOpsSummit at19th Cloud Expo, Sebastian Scheele, co-founder of Loodse, will discuss the implications of containerized applications/infrastructures and their impact on the enterprise. In a real world example based on Kubernetes, he will show how to ...
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Governments around the world are adopting Safe Harbor privacy provisions to protect customer data from leaving sovereign territories. Increasingly, global companies are required to create new instances of their server clusters in multiple countries to keep abreast of these new Safe Harbor laws. Is it worth it? In his session at 19th Cloud Expo, Adam Rogers, Managing Director of Anexia, Inc., will discuss how to keep your data legal and still stay in business.
In his session at 19th Cloud Expo, Nick Son, Vice President of Cyber Risk & Public Sector at Coalfire, will discuss the latest information on the FedRAMP Program. Topics will cover: FedRAMP Readiness Assessment Report (RAR). This new process is designed to streamline and accelerate the FedRAMP process from the traditional timeline by initially focusing on technical capability instead of documentation preparedness. FedRAMP for High-impact level systems. Early in 2016 FedRAMP officially publishe...
SYS-CON Events announced today that Impiger Technologies will exhibit in Booth #109 at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Impiger Technologies is a world-class, enterprise software product engineering company specializing in Mobile Application Development, Cloud Applications, Microsoft Technology Solutions, Web Technology and Telecom Services. Impiger Technologies helps enterprises improve busi...
Qosmos, the market leader for IP traffic classification and network intelligence technology, has announced that it will launch the Launch L7 Viewer at CloudExpo | @ThingsExpo Silicon Valley, being held November 1 – 3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The L7 Viewer is a traffic analysis tool that provides complete visibility of all network traffic that crosses a virtualized infrastructure, up to Layer 7. It facilitates and accelerates common IT tasks such as VM migra...
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
As companies adopt the cloud-to-streamline workflow, deployment hasn’t been very seamless because of IT concerns surrounding security risks. The cloud offers many benefits, but protecting and securing information can be tricky across multiple cloud providers and remains IT’s overall responsibility. In his session at 19th Cloud Expo, Simon Bain, CEO of SearchYourCloud, will address security compliance issues associated with cloud applications and how document-level encryption is critical for sup...