Sunteți pe pagina 1din 78

EW & Cyber

The Importance of Joint


Space
EW Asia 2016
Kuala Lumpur, Malaysia, 2016

LEE Kar Heng


Outline
• Outline
• Acknowledgement
• About the Speaker
• Conventional Warfare
• Electronic Warfare
• Cyber Warfare
• Joint Space Defined
• Threats, Seriousness and Significance

2
Acknowledgement
• The speaker is thankful to AOC Head Quarter
and the organizing team for the extension of
invitation to speak at this prestigious conference.

Terima
Kasih
3
About the Speaker
Contacts
Work
Teaching Leader Roles
Professional Activities
Publications
Voluntary Works
Contacts
Name: LEE Kar Heng
Email: karheng@tbssc3e.com, lkarheng@gmail.com
Mobile: +65 9191 6893, +84 1638 006 000
Facebook: https://www.facebook.com/karheng
(personal interests, thoughts, comments and reflections)
Linkedln: https://www.linkedin.com/in/karheng
(professional profiles and short articles on business and entrepreneurship)
Academia: https://edithcowan.academia.edu/KarHengLee
(technical papers, students’ projects, course materials of academic
programs and short courses)
Slideshare: http://www.slideshare.net/karheng1
(company information of TBSS Companies and Partners)

5
Work
• TBSS Group (Current Job)
• Minister of Home Affairs
– Police Technology Department (Maritime)
• Defense Science and Technology Agency
– Sensors
• DSO National Laboratories
– Radar Systems
• Maritime and Port Authority
– Electronics and Communications

6
Work
• Temasek Polytechnic
– Telecommunications
• Republic of Singapore Navy
– Fire Control Systems

7
Work
• TBSS Group (Current Job)
– Designed, developed and delivered professional courses:
• Electronic Warfare course for the Republic of Singapore Air Force
• Radar Systems for Operations and Maintenance for Raytheon
Anschuetz, Singapore
• Radar System in Aviation, Maritime and Defense for Air Defense
Operations Command, Singapore Technologies and Police Technical
Department
• LTE with Military Applications for Army Signal Institution
• Understand EMC for Ammunition Command
– Organzied and lectured on Coastal Surveillance System for the
Border Defense Force, Vietnam

8
Work
• Ministry of Home Affairs (Police Technology)
– Specified the Coastal Surveillance Radar System for the
Police Coast Guard of Singapore
– Installed, commissioned, integrated and tested Raytheon
Mark2 Radars and ELTA FMCW Radar with ECM capabilities
– Designed, developed and delivered Radar System course for
Police Coast Guard of Singapore
– Designed, developed and delivered System Engineering
course for Police Coast Guard of Singapore
– Carried out feasibility study on radar detection of swimmers
with Terma Radar, Police Coast Guard and Maritime and Port
Authority

9
Work
• Defense Science and Technology Agency
– Specified the Coastal Surveillance Radar System for the
Republic of Singapore Navy
– Carried out simulations and study on multi-radar tracking and
fusion
– Initiated, Installed, commissioned, integrated and tested
Secure and Covert Automatic Identification Transponders for
the Republic of Singapore Navy
– Carried out study of electromagnetic waves propagation in
wall penetration radars
– Carried critical study on Frequency Modulation Continuous
Wave technique and solid-state transmitter technology for
radar applications
10
Work
• Defense Science and Technology Agency
– Installed, commissioned, integrated and tested ELTA FMCW
Radar with ECM capabilities
– Implementation of ELINT systems

11
Work
• Maritime and Port Authority
– Specified and Implemented Vessel Traffic Radars
– Initiated, Installed, commissioned, integrated and tested
Automatic Identification System for the Singapore Port
– Managed the Vessel Traffic System
• Temasek Polytechnic
– Designed, developed and delivered
• 3D and Airborne Radar for Ministry of Defense
• Radar Tracking for Ministry of Defense
• Radar System Engineering and Phased-Array Radar courses for
Republic of Singapore Air Force, Republic of Singapore Navy, DSO
National Laboratories and Singapore Armed Forces
– Designed and Fabricated Antennas and Antenna Arrays for
detection and Jamming
12
Work
• DSO National Laboratories
– Carried out radar tracking algorithms development for
maritime applications
– Installed, commissioned, integrated and tested Radar Tracking
System for an air platform
• Republic of Singapore Navy
– Maintained Fire Control System
– Conducted Fire Control Radar and Computer Systems courses
– Designed and Developed Gun Alignment Trial for electronic
learning platform
– Installed, commissioned, integrated and tested the automatic
fire control radar and missile systems alignment facility

13
Teaching Leadership Roles
• Senior Adjunct Lecturer, Bachelor of Engineering,
Edith Cowen University, Responsible for the B.Eng
Program in Singapore
• Course Chair, Bachelor of Engineering, SIM
University, Wireless Communication Systems
• Program Leader, Bachelor of Engineering,
Northumbria University, Responsible for the
operations of B.Eng Program in Singapore
• Subject Leader, Diploma in Telecommunications,
Temasek Polytechnic, Developed and managed the
“Integrated Project” module

14
Professional Activities
• Institution of Electrical and Electronics Engineers (IEEE)
 Member, 1995 – present
 Secretary, Education Chapter, IEEE Singapore Section, 2006 –
2007
 Chairman, Education Chapter, IEEE Singapore Section, 2008 –
2009
 Chairman, Education Chapter, IEEE Singapore Section, 2015 –
present
 Member, Educational Activities Board, IEEE Region 10

15
Professional Activities
• Association of Old Crows (AOC)
 Member, 2015 – present
 President, AOC Singapore Chapter, 2016 – present
• Vietnamese Association in Singapore (VAS)
 Senior Advisor, Science and Technology 2015 - present
• Inderscience Publishers
 Article Reviewer, 2015 – Present

16
Publications
1. K. H. Lee and M. S. Leong, “A Study on Coupling Effect Between
Antennas Installed on a Common Structure”, IEEE Asia Pacific
Microwave Conference, 1999.
2. K. H. Lee, “Antenna Coupling”, B.Tech(Hons) Project Report, NUS, 1999.
3. K. H. Lee, S. A. Hamilton and M. S. Leong, “A Tri-Band Circular Polarized
Microstrip Antenna”, IEEE APS/URSI Intl. Conf., 2002.
4. K. H. Lee, “A Simulation of Tracking Algorithms Used in Radar Data
Processing”, M.Sc Dissertation, University of Sheffield, 2001.
5. K. H. Lee, “Design and Development of Broadband and Multiband
Antennas”, M.Eng Research Thesis, NUS, 2003.
6. J. W. Teo and K. H. Lee, “The Propagation Properties Of Electromagnetic
Waves In The Application Of Through-Wall Radar Sensors”, NUS Science
Research Congress, 2003.

17
Publications
7. X. Q. Tan and K. H. Lee, “A Study on Data Fusion Techniques Used in
Multiple Radar Tracking”, NUS Science Research Congress, 2004.
8. B. Moh and K. H. Lee, “A Study on the use of Frequency Modulated
Continuous Wave Radar in the Detection of Swimmers”, NUS Science
Research Congress, 2005.
9. K. Li, T. S. Tan, J. Tan and K. H. Lee, “Taxi on The Way”, ScilabTEC
International Conference, 2015.
10. K. H. Lee, “Tutorial on Radar System Engineering”, IEEE Advanced
Technologies for Communications, 2015.
11. K. H. Lee, “Engineers can be Good Entrepreneurs Too”, IEEE Education
Chapter, Singapore Section, 2016.

18
Voluntary Work
• Volunteer Special Constable, Singapore Police Force, Police
Officer in Police Coast Guard, 2010 - 2012
• Founder and Administrator, Tiong Bahru Secondary School
Facebook Group, 2008 – 2013
• Corporate Social Responsibility Manager, TBSS Group, 2012
– Present
• Advisor on Science and Technology, Senior Advisor Board,
Vietnamese Association in Singapore, 2015 – Present

19
EW & Cyber -
The importance of Joint Space
Conventional Warfare
Conventional Warfare
• Political Geography defines conventional warfare
as
– Armed conflicted between states and/or nations in
which combatants appear in organized military units
that are often outfitted with standard uniforms,
weapons, and equipment.
– It typically involved combat operations that overtly
seize control of territory, inhabitants, and resources.
• Conventional warfare is NOT just about
capabilities deployed, it is about equipment too
21
Conventional Warfare
• General John T Chain, the then Commander in
Chief, Strategic Air Command once said in an
1987 presentation to the US Senate:
– “…. By combining (our) planned force enhancements
with the maintenance of the B-52 force structure, we
will be able to provide theater commanders an
enormous war fighting capability at an affordable
price and increase their flexibility, …”
• The B-52 is a long range heavy bomber built and
maintained by Boeing
22
Conventional Warfare
• Built in 1954, B-52 had undergone several major
upgrades
• It is STILL being upgraded to meet the present
challenges……

23
Conventional Warfare
• B-52H avionics specifications

24
Conventional Warfare
• According to several sources, there were as
many as 31 B-52s were lost in the Vietnam War
(18 were shot down over North Vietnam)
(www.vietnamwar.net)
B-52s were largely
destroyed by SAM and
AAA during the war
largely due to altitudes
they flew.

Didn’t the command


know that such counter-
measures were present?

25
Conventional Warfare
• The CONECT
– Specifications
• COmbat Network Communications Technology
• One of the most important upgrades
• More communication data links
• Better voice links
• Full-color LCD displays with real-time intelligence feeds
overlaid on moving maps
• State-of-the-art computing network
• Retarget a weapon or mission parameters in flight

26
Conventional Warfare
• The CONECT
– Capabilities

Video Source: USAF via Youtube

27
Conventional Warfare
• The CONECT
– Capabilities
• Receive and transmission message (in the form of emails)
real time
• Supports nuclear and conventional operations
• Data links and voice communications to improve threat
and situational awareness
• Direct feeding of data in weapon systems
• Participation in network centric operations

28
Conventional Warfare
• The CONECT
– Open System Architecture (OSA)
• Utilized Open Mission System
(OMS)
• Non-proprietary mission system
architectural standard
• Lockheed Martin Sniper Pod has
already been integrated into B-25
CONECT for distribution and
storage of digital images to
CONECT displays
• Security issues with OSA?
29
Conventional Warfare
• Radar
– Northrop Grumman APQ-166 Strategic Radar
• Lt Gen Mike Holmes, Deputy COS for Strategic Plans and
Requirements, USAF, had commented that APQ-166 radar
to be unreliable.
• “The radar currently flying on the B-52 is limited by its
mean time between failure. … if you’re flying long-duration
missions and you get to a two-digit mean time between
failure, it means you’re flying around with a broken radar a
lot.”
– B-52 Radar Modernization Programme (RMP) had
received a budge of USD491 million
30
Conventional Warfare
• Radar
– Trials on ASQ-236 were carried out for experimental
reasons
– A podded AESA SAR, a very effective high-resolution
radar for maritime surveillance, with quick scanning
and acquisition
– B-52 to be deployed for South China Sea mission???

31
EW & Cyber -
The importance of Joint Space
Electronic Warfare
Electronic Warfare
• EW is an important capability
– Part of conventional warfare
– Achieve military, diplomatic and economic objectives
– Resist undesired objectives
• EW counters hostile actions that involve the EM
spectrum from beginning through to final battle
engagement
• Exploits the EM environment by
– sensing and analyzing an enemy's use of the spectrum
– imposing appropriate countermeasures (CMs) to hostile
spectrum use
33
Electronic Warfare
• B-52 ECM
– Protect itself against a full range of air defense threat
system
– Electronic detection
– Jamming
– IR CM
– Detects and counters missiles engaging the aircraft
from the rear

34
Electronic Warfare
• B-52H EW
– ALQ-172(V)2 ECM (ITT)
• Defensive ECM
• Multi-band threat recognition and multiple jamming
– ALR-20A (Tasker)
• Radar warning receiver (RWR)
• Detects, analyzes and prioritizes multiple threats
– ALR-46(V) (Northrop Grumman)
• Digital warning receiver that detects radar emission from 2
to 18 GHz
• Identify up to 16 radar signals
35
Electronic Warfare
• B-52H EW
– ALQ-122 (Motorola)
• Multiple False Target Generator
– ALT-32 (Northrop Grumman)
• Low and high-band communications jammers
– ALQ-155 (Northrop Grumman)
• Jammer Power Management System
• 360 coverage in D to H radar bands
– ALQ-153 (Northrop Grumman)
• Pulse-Doppler threat radar warning set
• Active missile approach warning
36
Electronic Warfare
• B-52H EW
– ALE-20
• IR flare dispensers
• 12 in total to give 192 flares
– ALE-24 (Lundy)
• Chaff dispensers
• 8 launchers in total to give 1125 bundles of chaff

37
Electronic Warfare
• EW, RADAR and Communications Antennas

38
Electronic Warfare
• The EW space – SPECTRUM (as long as one can
transmit or receive wirelessly, that is the space)

The spectrum is becoming complex and with cyberspace, a war


could be lost due to ignorance.
Picture Credit: Forbes

39
EW & Cyber -
The importance of Joint Space
Cyber Warfare

40
Cyber Warfare
• Cyber Warfare
– Involves the actions to attack, attempt to damage
enemy’s computer and/or networks
– Virus, denial-of-services, … attacks
– Defense against effect of CW on digital infrastructure
• Cyberspace
– Man-made created space when computers, network
switches, routers, fiber optics, wireless devices,
satellites, … and all other electronics devices and
equipment are CONNECTED
41
Cyber Warfare
• Cyberspace
– Has become an arena for modern warfare
– A new dimension where information warfare (IW) is
fought and information operation (IO) is carried out
– IW as defined by military theorists
• “The main objectives will be to disorganize or disrupt the
functioning of the key enemy military, industrial and
administrative facilities, ….. Primarily through the use of
the state-of-the-art IT and assets.”

42
Cyber Warfare
• Cyber Defense
– Israel is building her own cyber defenses for their F-
35 Fleet
• Self developed C4 systems, weaponry and undisclosed EW
system
• To maximise the autonomy of the fighter fleet
• The importance of protecting a cyber space
– PM Singapore:
• “Singapore to cut off internet access for government
employees’ work computer to protect government data
after some very sophisticated cyber attacks.”
• Lock your doors, it is the best defense?
43
Cyber Warfare
• Cyber Attacks
– The 2013 Singapore cyber attacks
• A series of hacks!, believed to have been executed by “The
Messiah”
Is “The Messiah”
• The attacks include
capable of attacking
– The PAPCF webpage the Defense and
– AMKTC official website Military-related
– Seletar Airport website computers or
– The ISTANA website network?
– Some 13 schools websites
• Reason: censorship regulation which “The Messiah” has
believed to be NOT ACCEPTABLE in the view of internet
freedom
44
Conventional Warfare
• The CONECT
– With the establishment of data link, B-52 is now
subjected to cyber attack

45
EW & Cyber -
The importance of Joint Space
Joint Space Defined

46
The Convergence
• Cyber and EW similarities
– Deny, Disrupt, Destroy, Degrade and Deceive
– EW – spectrum
– Cyber – computers, computer systems, networks,
applications
• EW operator
– Fight in the EM spectrum using EW equipment to
turn the enemy’s equipment against them
– Ear of the force

47
The Convergence
• CW/IW operator
– Expert in cyber security
– Lifecycle of network threats, attack vectors and
network vulnerability exploitation
– Behind the keyboard, causing enemy to make wrong
decision in their defense or attack
• Cyber EW
– The use of EME and networked systems, with
associated infrastructure, to control a domain
– Data exchange between cyber space and spectrum

48
The Convergence
• Cyber EW
– The use of EME and networked systems, with
associated infrastructure, to control a domain
– Data exchange between cyber space and spectrum
– A joint operation to coordinate activities
Physical Dimension
Information Dimension Cognitive Dimension
EM Operational
AIR Environment

LAND CYBERSPACE DOMAIN


Physical Logical Persons
MARITIME Layer Layer Layer
SPACE
EMS INFORMATION ENVIRONMENT

49
The Convergence
• The IO Doctrine of November 2003
– “…integrated employment of the core capabilities of
EW, CNO, PSYOP, MILDEC and OPSEC, …”
– “…to influence, disrupt, corrupt or usurp adversarial
human and automated decision making while
protecting our own…”
Electronic Warfare (EW)
Information
Computer Network Operations (CNO) Operations:
Psychrological Operations (PSYOP) Doctrine, Tactic,
Military Deception (MILDEC) Techniques and
Procedures
Operation Security (OPSEC)

50
The Convergence
• Functional view
PSYOP Deception
Leaflets, false Web, spam,
Personal
targets Spoofing, email
message
telecasts delivery
Traditional
Combined EW and CNO (DOS
Traditional EW attacks, malware,
(directed energy, Protocol- CNO effects
based viruses)
force protect,
brute-force attacks
Multidiscipline effects CNO
jamming (can achieve EW/CNO
and SIGINT effects) Cyber
EW CNE Operations
ES
SIGINT

Eavesdropping

51
The Convergence
Application
• Issues and problems Presentation
Session
– The Open System Interconnection (OSI) Transport
• 7-layer network protocol Network
• CO and EW begin at the physical layer Data Link
• EW does not stop at the physical layer Physical

• Integrating internet protocol into communications system


enables intelligent jamming
• Intelligent jamming requires knowledge of OSI layers and
overlap to achieve effective convergence and combined
effects

52
The Convergence
• Issues and problems
– Integration of IP
• RF communication systems or equipment use IP for data
sharing and distribution
• Attackers are able to exploit systems via IP
• Software and applications oversights worsen the situation
enemy enemy
emulation
destruction
NETWORK
RF Systems

enemy
53
The Convergence
• Issues and problems
– Confusion
• Cyber operations are now largely operating with the
spectrum (wireless)
• EW manipulates the spectrum
• Spectrum – you can’t see it, you can’t touch it,… but you
live and fight in it…..
• In the joint space, the spectrum is the fighting space
• One can have very comprehensive cyber defense and
attack methodologies
• If you lost your spectrum, a cheap digital jammer can
humble your expensive advanced systems and
comprehensive methodologies
54
The Convergence
• Issues and problems
– More Confusion
• The convergence cannot be prevented BUT……
• Cyberspace and EMS are different physically, largely
speaking AND ……
• They depend on each other in today’s warfare

55
The Convergence
• The only way to ensure seamless and fluid flow
of operations in the joint space is that of CLEAR
ALL THE RED TAPES! TALK TALK and TALK!
– Define the space clearly
– Define the operations in peace time
• EW and CO as separate entities with information sharing
and sense making
– Define the operations during war
• Details on how observations are shared, how information
flow seamlessly from physical layers (via EMS) to network
and application layers (Cyber)
56
A Chinese Perspective
• An article, with post comments, published on a
Chinese website:
– “一位军事专家曾断言:“如果第三次世界大战打
响,获胜的一方必然是善于控制、驾驭电磁空间
的一方。”
– It means
• “If there will be a 3rd world war, the winner shall be the
one who can control and manage the EMS.”
– The Chinese acknowledge the presence of
cyberspace, recognize the importance of joint space
and focus on the EMS
57
A Chinese Perspective
• Published on a Chinese military magazine, an
article discusses on the warfare concept of the
USA
– “… 他们认为“电子战主要是通过控制射频频谱进
行,以使美军及其盟国能自由操作射频系统,包
括雷达和无线电通信,同时干扰对手阻止其使用
这种作战方式 …”
– It means
• The US military believes that EW is to control the EMS so
that they can control transmitting stations freely with their
allies, these include radar and radio transmitters
• It also means that they can interfere the enemy and stop
them from using the same tactic …
58
A Chinese Perspective
• Published on a Chinese military magazine, an
article discusses on the warfare concept of the
USA
– “… 频谱战包括电子战、网络战、光电对抗和导航
战等诸多形式,这些战争形式交织重叠在一起,
构成一个频谱战整体 …”
– It means
• The "spectrum war” includes many forms of electronic
warfare, network warfare, optoelectronics confrontation
and navigation warfare, these overlaps have resulted to a
whole new spectrum of warfare …

59
A Chinese Perspective
• Published on a Chinese military magazine, an
article discusses on the warfare concept of the
USA
– “… 美军希望通过进行频谱战,力争控制无线电通
信、雷达、光电传感器、GPS卫星导航、精确授时、
数据网络和电磁频谱的方方面面,同时阻止对手
拥有这些能力 …”
– It means
• … US hopes that through the spectrum war, they will be
able to control radio communication, radar, photoelectric
sensors, GPS satellite navigation, precision timing, data
networks and all aspects of the EMS, while preventing the
opponents from these capabilities …
60
A Chinese Perspective
• Published on a Chinese military magazine, an
article discusses on the warfare concept of the
USA
– “… 频谱战融合了电子战、网络战,光电对抗及其
他可以感知环境、通信、导航、目标瞄准的技术…”
– It means
• … The new spectrum converges electronic warfare and
network warfare, and other optoelectronic techniques …

61
A Chinese Perspective
• The implementation of Beidou Navigation
Satellite System (北斗卫星导航系统)

62
EW & Cyber -
The importance of Joint Space
Threats, Seriousness and Significance

63
Serious or Not?
• Many military aircraft or vessels rely and are
controlled by software
• Use communication, data link and navigation
systems which transmit critical information over
the spectrum
• High possibility that enemy to take down
receivers, corrupt the software and applications
• Attacks on public utilities, key installations,
classified storage via cyber space

64
Serious or Not?
• Taking Over of Air Defense System
– North Koreans were building a nuclear bomb facility
in Syrian
– The IAF took over the Syria’s ADS in the 2007 attack
– The Syrian ADS was placed with a logic-bomb such
that the radars would not function (went off actually)
during the attack
– The radar did not return any attack
aircraft, namely, F-15 Eagles and F-
16 Falcons
– The facility was bombed
65
Serious or Not?
• Cyber attacks on power grid
– Power outage on 23 December 2015 in Western
Ukraine
– Attack was launched by skilled and stealthy
strategists and hackers by penetrating into the
network and destroyed with DOS and malware
– The SCADA systems was compromised by
overwritten firmware on critical devices at the
substations
• Did not response to remote command from authorized
operators
– Was it Russia?

66
Serious or Not?
• Cyber attacks on power grid

67
Contesting the Spectrum
• South China Sea
– Chinese radar installations have been seen
• Air operations
• Real time awareness
• ISR capabilities over
Southern region
• Early warning (OTHR)
• SAM
– Jamming capabilities
on enemy radar and
sensors
"A Glimpse Into China's Military Presence
in the South China Sea is republished with
permission of Stratfor." 68
Contesting the Spectrum
• South China Sea
– 4 US Navy EA-18G Growler EA aircraft were deployed
• Capable of jamming the radars installed in the South China
Sea by the Chinese?
– US and China are in contest for
EW supremacy? For EMS?
– Meanwhile (at the time of
preparing this set of materials),
China and Russia are conducting
a 8-day Joint Sea Exercise 2016 …

69
Contesting the Spectrum
• South China Sea
– 2 US aircraft carriers (with B-52S and EA-18G
Growler) conducted joint exercise off the Philippine
sea in June 2016

70
Contesting the Spectrum
• Back on land…
– A recently released US Defense Department report
mentions a focus on cyber warfare
• “China is using its cyber capabilities to support intelligence
collection against the U.S. diplomatic, economic, and
defense industrial base sectors that support U.S. national
defense programs, …”
• Chinese military was said to have conducted cyber probes
and intrusions on US computer networks
• The Chinese defense ministry is disputing against the
accusation

71
Contesting the Spectrum
• Back on land…
– A recently released US Defense Department report
mentions a focus on cyber warfare
• If the Chinese had indeed gotten information via cyber
men then they would have access to
– Overall picture of US defense networks and logistics
– Military capabilities in crisis
– Leadership perspective on China issues
• A popular Sun Tzu quote: 知己知彼,百战百胜, if you
know your enemy and yourself, you will win all your wars
(100%)
– Do you agree that a war has started in various
domains?
72
The Mobilization of Civilian System
• Military and defense have the power over the
use of civilian systems such as radar systems,
communication systems, …
• How reliable are these system in terms of being
cyber-attacked unknowingly?
• Is there a need to also have EW and CO covering
these critical civilian systems?

73
References
[1] G. Goebel (2015, May 1), B-51 in the Modern Era
[Online], Available:
http://www.airvectors.net/avb52_3.html
[2] A. E. Spezio, “Electronic Warfare Systems”, IEEE Trans.
Microw. Theory Tech. vol. 50, p. 633-644, March
2002.
[3] P. Swarts (2016, February 2016), Air Force Prolongs
the Life of the Venerable B-52 [online], Available:
https://www.airforcetimes.com/story/military/2016/
02/22/air-force-prolongs-life-venerable-b-
52/80570810/
74
References
[4] MG B. Williams (2014, March 13), Cyberspace: What
is it, where is it and who cares? [Online], Available:
http://armedforcesjournal.com/cyberspace-what-is-
it-where-is-it-and-who-cares/
[5] L. Seligam (2016 June 23), Israel Set to Build Its Own
Cyber Defense [Online], Available:
http://aviationweek.com/defense/israel-set-build-its-
own-cyber-defenses-f-35-
fleet?utm_content=buffercc22e&utm_medium=socia
l&utm_source=plus.google.com&utm_campaign=buf
fer

75
References
[6] W. L. Sharp, “Electronic Warfare”, Joint Publication
3-13.1, 25 January 2007.
[7] Maj M. E. Poole (2015 August ), Cyber Electronic
Warfare [Online], Available: https://www.mca-
marines.org/gazette/2015/08/cyber-electronic-
warfare#
[8] J. Loerch (2016, February 1), What We Have is a
Failure to Communicate [online], Available:
http://www.afcea.org/content/?q=Article-what-we-
have-failure-communicate

76
References
[9] 春天的初蕾 (2015 November 24), 电子战与电子战
部队:新型作战力量之九 [online], Available:
http://bbs.tianya.cn/post-20-615307-1.shtml
[10] 姚远 (2015 November 13), 美空军着手打造仿真频
谱战战场,频谱战是什么, 中国国防报, 军事特刊
[11] K. Zetter (2016 March 16), Inside the Cunning,
Unprecedented Hack of Ukraine’s Power Grid [online],
Available: https://www.wired.com/2016/03/inside-
cunning-unprecedented-hack-ukraines-power-grid/

77
References
[12] B. Thomas-Noone (2016 August 24), Electronic
Warfare in the South China Sea [online], Available:
http://www.realcleardefense.com/articles/2016/08/
24/electronic_warfare_in_the_south_china_sea_109
745.html
[13] D. Cenciotti (2016 August 5), Things Heat Up Near
South China Sea: Two US Aircraft Carriers, B-52S and
EA-18G Growler Detachment [online], Available:
https://theaviationist.com/2016/06/19/things-heat-
up-near-south-china-sea-two-u-s-aircraft-carriers-b-
52s-and-ea-18g-growler-detachment/

78

S-ar putea să vă placă și