Surveillance and Stealth
Explore the technologies used by the military to covertly acquire intelligence and infiltrate enemy lines. Learn how sophisticated listening devices and invisible aircraft enable military forces to get right up to the enemy's doorstep.
F-35As Put to the Test in First-ever 'Elephant Walk'
Recovered 'Lost Squadron' Plane Leads to New Mystery
How do they deice airplanes?
What does an Army combat engineer do?
Does Army experience help your civilian career?
How Army Reconnaissance Jobs Work
Why Nerve Agent Novichok Is So Deadly
How Tear Gas Works
How Agent Orange Worked
U.S. Military Dogs Usually Outrank Their Handlers
Coast Guard Rescue Swimmers Risk All to Save Lives
Why Smoking Rates in the Military Are So High
What Is a Vacuum Bomb and Is Russia Using Them in Ukraine?
How Israel's Iron Dome Defense System Works
Tsar Bomba: The Most Powerful Nuclear Weapon Ever Built
What Are Ghost Guns and Why Are They So Dangerous?
How Bulletproof Are Bulletproof Vests?
Half the World's Gun-related Deaths Occur in Just 6 Countries, Including the U.S.
What Are the Mysterious 'Havana Syndrome' Attacks in D.C.?
Hypersonic Missiles Fuel New Global Arms Race
What Are 'Low-yield' Nuclear Weapons?
You've Seen 'Top Gun.' But What's the Real TOPGUN Program Like?
Ridiculous History: The U.S. Navy Used Dirigibles as Flying Aircraft Carriers
Submarine Pictures
10 Financial Tips for Preparing for Deployment
How Military Video Conferencing Works
What Does Russia's Partial Military Mobilization Mean?
Want to Fight for Ukraine? Here's What You Need to Know
Why a Draft Would Weaken the U.S. Military
YOU Can Drive a Tank!
Do we still need nuclear submarines?
Type 61 Main Battle Tank
Learn More
Underwater military bases sound super-cool, but what are the odds they truly exist?
By Diana Brown
We're not talking about one of those laughable get-ups that celebs don when they want to go incognito for a latte. Nope, we're talking elaborate disguises -- from operatic to scientific.
Code breakers use logic and intuition to uncover secret information. From ciphers in ancient Greece to modern computer encryption schemes, codes are becoming more complex and harder to solve. Who are the people breaking codes and how do they do it?
Advertisement
There is some serious technology and ingenuity involved in making a 172-foot-wide, bomb-carrying aircraft "disappear." Find out how the B-2 bomber deals with enemy radar.
By Tom Harris
Gathering reconnaissance during battle typically puts small teams of soldiers in harm's way. Tiny robotic flyers, called micro air vehicles (MAVs), could do away with this danger. Learn all about spy flies.
By Kevin Bonsor
I've heard about small planes that help the United States military gather information. How do these remotely operated spy planes work?
On a television drama last week, the plot involved photos taken of a Russian missile silo, and the characters mentioned a "keyhole satellite." What is a keyhole satellite and what can it really spy on?
Advertisement
When an airplane is described as a "stealth" aircraft, what does that mean? What is "stealth technology" and how does it work?