Stealth is a form of technology or ability to render anything from planets, space stations, starships, and personnel to small equipment and devices invisible, or at least undetectable to sensors.
Stealth technologyEdit
Enterprise interphase decloakingThe USS Enterprise-D decloaking in front of IRW Terix
Lauro Chartrand, InsurrectionPersonnel in isolation suits

Many spacefaring civilizations used varying forms of stealth technology. Perhaps the epitome of stealth was the cloaking device, which used selective bending of light and emission dampening to render a ship totally invisible and undetectable. This was used by many organizations, including the Romulan Star Empire, the Klingon Defense Force, the Hierarchy, the Sky Spirits, the Aldeans, the Minosians, the Ba'neth, the Sphere Builders and the Suliban Cabal. However, the power consumptions of cloaking technology were high, meaning weapons, shields and transporters could not always be used while a cloak was on, at least in the early stages of the technology. (TOS: "Balance of Terror"; Star Trek III: The Search for Spock; VOY: "Tinker Tenor Doctor Spy", "Tattoo", "Riddles"; TNG: "When The Bough Breaks", "The Arsenal of Freedom"; ENT: "Anomaly", "Shockwave"; DS9: "The Search, Part I"; Star Trek VI: The Undiscovered Country; Star Trek Nemesis)

The holy grail of cloaking technology was a phasing cloak, which allowed a starship to pass through solid matter and made it impervious to conventional weapons. (TNG: "The Pegasus") Other technology could be used to achieve the same effect, such as subspace force fields with adjusted synchronic distortion, interphase generators or other interphase devices. These systems could be used to alter the phase variance of matter and energy to disappear from the perceptual range. (TNG: "The Next Phase", "Time's Arrow"; VOY: "Distant Origin", "Scientific Method")

More primitive versions of stealth were known to be used by many other races, such as the stealth technologies used by the Xyrillians, the Hirogen, and the Kazon-Nistrim (called "masking circuitry"). (ENT: "Unexpected"; VOY: "State of Flux", "Flesh and Blood") The people of Cheron had an unusual yet advanced form of stealth technology. Their ships were perfectly detectable by sensors, but sheathed in special materials that made them completely invisible. (TOS: "Let That Be Your Last Battlefield") Where as Baran's mercenary vessel was sheathed with energy absorbing material that made it virtually undetectable to long range sensors, while the ship itself remained visually detectable. (TNG: "Gambit, Part I")

Deflector shields could be used to produce stealth. They could be modulated to produce an interferometric dispersion to scatter RADAR signals (VOY: "Future's End") and hide from more advanced sensors with refractive and multi-adaptive shielding. (VOY: "Counterpoint", "Dark Frontier") Subspace could be used as a place of concealment. The Dominion used anti-personnel mines that hid in subspace and appeared at random to normal space. (DS9: "The Siege of AR-558") The "Think Tank" could also be absorbed into subspace to hide from detection. (VOY: "Think Tank")

Stealth technology might also include the use of holographic equipment and was not limited to space travel. In 2154, the Romulans deployed two drone-ships that used holographic technology in the form of a multispectral emitter system to disguise themselves as other vessels. (ENT: "Babel One", "United", "The Aenar") The Federation used holographic technology to hide facilities called duck blinds from pre-warp civilizations (TNG: "Who Watches The Watchers") and isolation suits to hide the personnel on these assignments. (Star Trek: Insurrection) Vosk (leader of the Na'kuhl) developed a form of stealth time travel that enabled him to escape Daniels' forces in the 29th century to an alternate 1944 Earth. (ENT: "Storm Front", "Storm Front, Part II") There were were also several methods of stealth transporting, in which it was possible to beam though deflector shields and extremely difficult for others to determine the origin and destination of the transports. These included the inverter used by the Ansata terrorists on Rutia IV, the subspace transporter used by Bok and the ancient Iconian gateway system. (TNG: "The High Ground", "Bloodlines", "Contagion")
Stealth technology also termed LO technology (low observable technology) is a sub-discipline of military tactics and passive electronic countermeasures,[1] which cover a range of techniques used with personnel, aircraft, ships, submarines, and missiles, to make them less visible (ideally invisible) to radar, infrared,[2] sonar and other detection methods. It corresponds to camouflage for these parts of the electromagnetic spectrum.

Development in the United States occurred in 1958,[3][4] where earlier attempts in preventing radar tracking of its U-2 spy planes during the Cold War by the Soviet Union had been unsuccessful.[5] Designers turned to develop a particular shape for planes that tended to reduce detection, by redirecting electromagnetic waves from radars.[6] Radar-absorbent material was also tested and made to reduce or block radar signals that reflect off from the surface of planes. Such changes to shape and surface composition form stealth technology as currently used on the Northrop Grumman B-2 Spirit "Stealth Bomber".[4] The concept of stealth is to operate or hide without giving enemy forces any indications as to the presence of friendly forces. This concept was first explored through camouflage by blending into the background visual clutter. As the potency of detection and interception technologies (radar, IRST, surface-to-air missiles etc.) have increased over time, so too has the extent to which the design and operation of military personnel and vehicles have been affected in response. Some military uniforms are treated with chemicals to reduce their infrared signature. A modern "stealth" vehicle is designed from the outset to have a chosen spectral signature. The degree of stealth embodied in a particular design is chosen according to the predicted threat capabilities.

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License