weapon aboard the B-1 fired a focused beam of high-energy light that could burn a hole through most materials known to man, assuming it stayed focused on its target long enough.
And that was the rub. Both Boomer and its airborne targets were moving at high rates of speed, and while there might be some circumstances under which the B-1B/L could count on getting off a sustained blast of ten or more seconds, dogfight conditions meant that blast length would often be measured in microseconds.
For the laser to be a practical air-to-air weapon, its enemyâs specific vulnerabilities had to be targeted and then hit repeatedly. That was where the computer did most of its number crunching. It was able to assess the typical vulnerabilities of its opponent, prepare what was called a âshooting planâ to exploit those vulnerabilities, and then direct the laser fire as both aircraft moved at the speed of sound. And it could change that plan as the battle progressed.
For example, if the B-1 was tangling with a MiG-27, the computer would realize that the motors the MiG used to adjust its wings in flight were extremely heat sensitive. Depending on the orientation of the two planes, the computer would target those motors, crippling his enemy. As the MiG slowed down to cope with the malfunction, the computer would then fire a series of blasts on the port wing fuel tank, aiming not to punch holes in the wing, but to create a series of hot spots in the tank, which would disrupt the fuel flow, slowing the plane down. For the coup de grace, the computer would ignite the antiair missile on the planeâs right wing spar, in effect having the MiG destroy itself.
This would all happen in a span of seconds. While the human controlling the weapon could approve each individual targeting stage, ideally he would simply tell the computer to take down the bandit, and he could then worry about something else.
A MiG-27, though relatively fast, was an easy target, since it was big, conventionally flown, and most important of all, well-known. The Flighthawks, by contrast, were much more difficult opponents. Not only had they been designed to minimize some of the traditional vulnerabilities, but their lack of a pilot removed one of the laser weaponâs neatest tricksâblasting the cockpit with heat and making the enemy pilot extremely uncomfortable.
âWeâre ready,â declared Sleek Top as they finished the first battery of tests. âClear computer to engage in encounter.â
âYou feeling lucky yet?â Dog asked Starship.
âDonât need luck, Colonel.â
âLetâs do it.â
The Flighthawks swung east, preparing to make their attack. The Flighthawksâofficially, U/MF-2/c, which stood for âunmanned fighter 2, block cââwere about the size of a Honda Civic and were equipped with cannons. They were slower than the B-1B/L but more maneuverable.
On the first test, everyone followed a prepared script. The two Flighthawks passed a quarter mile to the east. The computer picked them up without trouble, adjusted Boomer âs speed to get longer shots on their engines, and then recorded a simulated hit.
âTwo birds down,â reported the copilot.
âHear that, Starship?â said Dog. âYouâre walking home.â
âI always walk home, Colonel. Ready for test two?â
âHave at it.â
The Flighthawks banked behind Boomer and began to close, aiming to shoot their cannons at the fat radar dome at the planeâs tail. This was a more realistic attack scenario, and was further complicated by Starshipâs handling of the planesâhe kept them jinking and jiving as they approached, making it difficult for Boomer to lock its laser. The fact that there were two targets made things even more complicated, as the computer had trouble deciding which of the two aircraft provided a better target and kept reordering its plan of attack.
âIâm
Beryl Matthews
Audrey Claire
Jennifer Comeaux
M. R. Mathias
Renée Knight
Jay Merson
Bathroom Readers’ Institute
L.N. Pearl, S.K. Lee
Crystal Jordan
Kij Johnson