Ew asia cw and ew joint space for comments (14 sep2016)

78
LEE Kar Heng EW & Cyber The Importance of Joint Space EW Asia 2016 Kuala Lumpur, Malaysia, 2016

Transcript of Ew asia cw and ew joint space for comments (14 sep2016)

LEE Kar Heng

EW & Cyber The Importance of Joint

Space EW Asia 2016

Kuala Lumpur, Malaysia, 2016

2

Outline

• Outline

• Acknowledgement

• About the Speaker

• Conventional Warfare

• Electronic Warfare

• Cyber Warfare

• Joint Space Defined

• Threats, Seriousness and Significance

3

• The speaker is thankful to AOC Head Quarter and the organizing team for the extension of invitation to speak at this prestigious conference.

Acknowledgement

Terima Kasih

About the Speaker

Contacts Work

Teaching Leader Roles Professional Activities

Publications Voluntary Works

5

Contacts

Name: LEE Kar Heng

Email: [email protected], [email protected]

Mobile: +65 9191 6893, +84 1638 006 000

Facebook: https://www.facebook.com/karheng

(personal interests, thoughts, comments and reflections)

Linkedln: https://www.linkedin.com/in/karheng

(professional profiles and short articles on business and entrepreneurship)

Academia: https://edithcowan.academia.edu/KarHengLee

(technical papers, students’ projects, course materials of academic programs and short courses)

Slideshare: http://www.slideshare.net/karheng1

(company information of TBSS Companies and Partners)

6

• TBSS Group (Current Job)

• Minister of Home Affairs

– Police Technology Department (Maritime)

• Defense Science and Technology Agency

– Sensors

• DSO National Laboratories

– Radar Systems

• Maritime and Port Authority

– Electronics and Communications

Work

7

• Temasek Polytechnic

– Telecommunications

• Republic of Singapore Navy

– Fire Control Systems

Work

8

• TBSS Group (Current Job) – Designed, developed and delivered professional courses:

• Electronic Warfare course for the Republic of Singapore Air Force

• Radar Systems for Operations and Maintenance for Raytheon Anschuetz, Singapore

• Radar System in Aviation, Maritime and Defense for Air Defense Operations Command, Singapore Technologies and Police Technical Department

• LTE with Military Applications for Army Signal Institution

• Understand EMC for Ammunition Command

– Organzied and lectured on Coastal Surveillance System for the Border Defense Force, Vietnam

Work

9

Work

• Ministry of Home Affairs (Police Technology)

– Specified the Coastal Surveillance Radar System for the Police Coast Guard of Singapore

– Installed, commissioned, integrated and tested Raytheon Mark2 Radars and ELTA FMCW Radar with ECM capabilities

– Designed, developed and delivered Radar System course for Police Coast Guard of Singapore

– Designed, developed and delivered System Engineering course for Police Coast Guard of Singapore

– Carried out feasibility study on radar detection of swimmers with Terma Radar, Police Coast Guard and Maritime and Port Authority

10

Work

• Defense Science and Technology Agency

– Specified the Coastal Surveillance Radar System for the Republic of Singapore Navy

– Carried out simulations and study on multi-radar tracking and fusion

– Initiated, Installed, commissioned, integrated and tested Secure and Covert Automatic Identification Transponders for the Republic of Singapore Navy

– Carried out study of electromagnetic waves propagation in wall penetration radars

– Carried critical study on Frequency Modulation Continuous Wave technique and solid-state transmitter technology for radar applications

11

Work

• Defense Science and Technology Agency

– Installed, commissioned, integrated and tested ELTA FMCW Radar with ECM capabilities

– Implementation of ELINT systems

12

Work

• Maritime and Port Authority – Specified and Implemented Vessel Traffic Radars

– Initiated, Installed, commissioned, integrated and tested Automatic Identification System for the Singapore Port

– Managed the Vessel Traffic System

• Temasek Polytechnic – Designed, developed and delivered

• 3D and Airborne Radar for Ministry of Defense

• Radar Tracking for Ministry of Defense

• Radar System Engineering and Phased-Array Radar courses for Republic of Singapore Air Force, Republic of Singapore Navy, DSO National Laboratories and Singapore Armed Forces

– Designed and Fabricated Antennas and Antenna Arrays for detection and Jamming

13

Work

• DSO National Laboratories – Carried out radar tracking algorithms development for

maritime applications

– Installed, commissioned, integrated and tested Radar Tracking System for an air platform

• Republic of Singapore Navy – Maintained Fire Control System

– Conducted Fire Control Radar and Computer Systems courses

– Designed and Developed Gun Alignment Trial for electronic learning platform

– Installed, commissioned, integrated and tested the automatic fire control radar and missile systems alignment facility

14

Teaching Leadership Roles

• Senior Adjunct Lecturer, Bachelor of Engineering, Edith Cowen University, Responsible for the B.Eng Program in Singapore

• Course Chair, Bachelor of Engineering, SIM University, Wireless Communication Systems

• Program Leader, Bachelor of Engineering, Northumbria University, Responsible for the operations of B.Eng Program in Singapore

• Subject Leader, Diploma in Telecommunications, Temasek Polytechnic, Developed and managed the “Integrated Project” module

15

Professional Activities

• Institution of Electrical and Electronics Engineers (IEEE) Member, 1995 – present

Secretary, Education Chapter, IEEE Singapore Section, 2006 – 2007

Chairman, Education Chapter, IEEE Singapore Section, 2008 – 2009

Chairman, Education Chapter, IEEE Singapore Section, 2015 – present

Member, Educational Activities Board, IEEE Region 10

16

Professional Activities

• Association of Old Crows (AOC) Member, 2015 – present

President, AOC Singapore Chapter, 2016 – present

• Vietnamese Association in Singapore (VAS) Senior Advisor, Science and Technology 2015 - present

• Inderscience Publishers Article Reviewer, 2015 – Present

17

Publications

1. K. H. Lee and M. S. Leong, “A Study on Coupling Effect Between Antennas Installed on a Common Structure”, IEEE Asia Pacific Microwave Conference, 1999.

2. K. H. Lee, “Antenna Coupling”, B.Tech(Hons) Project Report, NUS, 1999.

3. K. H. Lee, S. A. Hamilton and M. S. Leong, “A Tri-Band Circular Polarized Microstrip Antenna”, IEEE APS/URSI Intl. Conf., 2002.

4. K. H. Lee, “A Simulation of Tracking Algorithms Used in Radar Data Processing”, M.Sc Dissertation, University of Sheffield, 2001.

5. K. H. Lee, “Design and Development of Broadband and Multiband Antennas”, M.Eng Research Thesis, NUS, 2003.

6. J. W. Teo and K. H. Lee, “The Propagation Properties Of Electromagnetic Waves In The Application Of Through-Wall Radar Sensors”, NUS Science Research Congress, 2003.

18

Publications

7. X. Q. Tan and K. H. Lee, “A Study on Data Fusion Techniques Used in Multiple Radar Tracking”, NUS Science Research Congress, 2004.

8. B. Moh and K. H. Lee, “A Study on the use of Frequency Modulated Continuous Wave Radar in the Detection of Swimmers”, NUS Science Research Congress, 2005.

9. K. Li, T. S. Tan, J. Tan and K. H. Lee, “Taxi on The Way”, ScilabTEC International Conference, 2015.

10. K. H. Lee, “Tutorial on Radar System Engineering”, IEEE Advanced Technologies for Communications, 2015.

11. K. H. Lee, “Engineers can be Good Entrepreneurs Too”, IEEE Education Chapter, Singapore Section, 2016.

19

Voluntary Work

• Volunteer Special Constable, Singapore Police Force, Police Officer in Police Coast Guard, 2010 - 2012

• Founder and Administrator, Tiong Bahru Secondary School Facebook Group, 2008 – 2013

• Corporate Social Responsibility Manager, TBSS Group, 2012 – Present

• Advisor on Science and Technology, Senior Advisor Board, Vietnamese Association in Singapore, 2015 – Present

EW & Cyber - The importance of Joint Space

Conventional Warfare

21

Conventional Warfare

• Political Geography defines conventional warfare as

– Armed conflicted between states and/or nations in which combatants appear in organized military units that are often outfitted with standard uniforms, weapons, and equipment.

– It typically involved combat operations that overtly seize control of territory, inhabitants, and resources.

• Conventional warfare is NOT just about capabilities deployed, it is about equipment too

22

Conventional Warfare

• General John T Chain, the then Commander in Chief, Strategic Air Command once said in an 1987 presentation to the US Senate:

– “…. By combining (our) planned force enhancements with the maintenance of the B-52 force structure, we will be able to provide theater commanders an enormous war fighting capability at an affordable price and increase their flexibility, …”

• The B-52 is a long range heavy bomber built and maintained by Boeing

23

Conventional Warfare

• Built in 1954, B-52 had undergone several major upgrades

• It is STILL being upgraded to meet the present challenges……

24

Conventional Warfare

• B-52H avionics specifications

25

Conventional Warfare

• According to several sources, there were as many as 31 B-52s were lost in the Vietnam War (18 were shot down over North Vietnam) (www.vietnamwar.net)

B-52s were largely

destroyed by SAM and

AAA during the war

largely due to altitudes

they flew.

Didn’t the command

know that such counter-

measures were present?

26

Conventional Warfare

• The CONECT

– Specifications

• COmbat Network Communications Technology

• One of the most important upgrades

• More communication data links

• Better voice links

• Full-color LCD displays with real-time intelligence feeds overlaid on moving maps

• State-of-the-art computing network

• Retarget a weapon or mission parameters in flight

27

Conventional Warfare

• The CONECT

– Capabilities

Video Source: USAF via Youtube

28

Conventional Warfare

• The CONECT

– Capabilities

• Receive and transmission message (in the form of emails) real time

• Supports nuclear and conventional operations

• Data links and voice communications to improve threat and situational awareness

• Direct feeding of data in weapon systems

• Participation in network centric operations

29

Conventional Warfare

• The CONECT

– Open System Architecture (OSA)

• Utilized Open Mission System (OMS)

• Non-proprietary mission system architectural standard

• Lockheed Martin Sniper Pod has already been integrated into B-25 CONECT for distribution and storage of digital images to CONECT displays

• Security issues with OSA?

30

Conventional Warfare

• Radar

– Northrop Grumman APQ-166 Strategic Radar

• Lt Gen Mike Holmes, Deputy COS for Strategic Plans and Requirements, USAF, had commented that APQ-166 radar to be unreliable.

• “The radar currently flying on the B-52 is limited by its mean time between failure. … if you’re flying long-duration missions and you get to a two-digit mean time between failure, it means you’re flying around with a broken radar a lot.”

– B-52 Radar Modernization Programme (RMP) had received a budge of USD491 million

31

Conventional Warfare

• Radar

– Trials on ASQ-236 were carried out for experimental reasons

– A podded AESA SAR, a very effective high-resolution radar for maritime surveillance, with quick scanning and acquisition

– B-52 to be deployed for South China Sea mission???

EW & Cyber - The importance of Joint Space

Electronic Warfare

33

Electronic Warfare

• EW is an important capability – Part of conventional warfare

– Achieve military, diplomatic and economic objectives

– Resist undesired objectives

• EW counters hostile actions that involve the EM spectrum from beginning through to final battle engagement

• Exploits the EM environment by – sensing and analyzing an enemy's use of the spectrum

– imposing appropriate countermeasures (CMs) to hostile spectrum use

34

Electronic Warfare

• B-52 ECM – Protect itself against a full range of air defense threat

system

– Electronic detection

– Jamming

– IR CM

– Detects and counters missiles engaging the aircraft from the rear

35

Electronic Warfare

• B-52H EW – ALQ-172(V)2 ECM (ITT)

• Defensive ECM

• Multi-band threat recognition and multiple jamming

– ALR-20A (Tasker) • Radar warning receiver (RWR)

• Detects, analyzes and prioritizes multiple threats

– ALR-46(V) (Northrop Grumman) • Digital warning receiver that detects radar emission from 2

to 18 GHz

• Identify up to 16 radar signals

36

Electronic Warfare

• B-52H EW – ALQ-122 (Motorola)

• Multiple False Target Generator

– ALT-32 (Northrop Grumman) • Low and high-band communications jammers

– ALQ-155 (Northrop Grumman) • Jammer Power Management System

• 360 coverage in D to H radar bands

– ALQ-153 (Northrop Grumman) • Pulse-Doppler threat radar warning set

• Active missile approach warning

37

Electronic Warfare

• B-52H EW – ALE-20

• IR flare dispensers

• 12 in total to give 192 flares

– ALE-24 (Lundy) • Chaff dispensers

• 8 launchers in total to give 1125 bundles of chaff

38

Electronic Warfare

• EW, RADAR and Communications Antennas

39

Electronic Warfare

• The EW space – SPECTRUM (as long as one can transmit or receive wirelessly, that is the space)

The spectrum is becoming complex and with cyberspace, a war could be lost due to ignorance.

Picture Credit: Forbes

40

EW & Cyber - The importance of Joint Space

Cyber Warfare

41

Cyber Warfare

• Cyber Warfare – Involves the actions to attack, attempt to damage

enemy’s computer and/or networks

– Virus, denial-of-services, … attacks

– Defense against effect of CW on digital infrastructure

• Cyberspace – Man-made created space when computers, network

switches, routers, fiber optics, wireless devices, satellites, … and all other electronics devices and equipment are CONNECTED

42

Cyber Warfare

• Cyberspace – Has become an arena for modern warfare

– A new dimension where information warfare (IW) is fought and information operation (IO) is carried out

– IW as defined by military theorists • “The main objectives will be to disorganize or disrupt the

functioning of the key enemy military, industrial and administrative facilities, ….. Primarily through the use of the state-of-the-art IT and assets.”

43

Cyber Warfare

• Cyber Defense – Israel is building her own cyber defenses for their F-

35 Fleet • Self developed C4 systems, weaponry and undisclosed EW

system

• To maximise the autonomy of the fighter fleet

• The importance of protecting a cyber space

– PM Singapore: • “Singapore to cut off internet access for government

employees’ work computer to protect government data after some very sophisticated cyber attacks.”

• Lock your doors, it is the best defense?

44

Cyber Warfare

• Cyber Attacks – The 2013 Singapore cyber attacks

• A series of hacks!, believed to have been executed by “The Messiah”

• The attacks include – The PAPCF webpage

– AMKTC official website

– Seletar Airport website

– The ISTANA website

– Some 13 schools websites

• Reason: censorship regulation which “The Messiah” has believed to be NOT ACCEPTABLE in the view of internet freedom

Is “The Messiah”

capable of attacking

the Defense and

Military-related

computers or

network?

45

Conventional Warfare

• The CONECT

– With the establishment of data link, B-52 is now subjected to cyber attack

46

EW & Cyber - The importance of Joint Space

Joint Space Defined

47

The Convergence

• Cyber and EW similarities – Deny, Disrupt, Destroy, Degrade and Deceive

– EW – spectrum

– Cyber – computers, computer systems, networks, applications

• EW operator

– Fight in the EM spectrum using EW equipment to turn the enemy’s equipment against them

– Ear of the force

48

The Convergence

• CW/IW operator – Expert in cyber security

– Lifecycle of network threats, attack vectors and network vulnerability exploitation

– Behind the keyboard, causing enemy to make wrong decision in their defense or attack

• Cyber EW – The use of EME and networked systems, with

associated infrastructure, to control a domain

– Data exchange between cyber space and spectrum

49

The Convergence

• Cyber EW

– The use of EME and networked systems, with associated infrastructure, to control a domain

– Data exchange between cyber space and spectrum

– A joint operation to coordinate activities

AIR

LAND

MARITIME

SPACE

CYBERSPACE DOMAIN Physical Logical Persons Layer Layer Layer

Cognitive Dimension Information Dimension Physical Dimension

INFORMATION ENVIRONMENT EMS

EM Operational

Environment

50

The Convergence

• The IO Doctrine of November 2003

– “…integrated employment of the core capabilities of EW, CNO, PSYOP, MILDEC and OPSEC, …”

– “…to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own…”

Information Operations:

Doctrine, Tactic, Techniques and

Procedures

Electronic Warfare (EW)

Computer Network Operations (CNO)

Psychrological Operations (PSYOP)

Military Deception (MILDEC)

Operation Security (OPSEC)

51

The Convergence

• Functional view

Cyber

Operations

SIGINT

EW

Eavesdropping

CNO

CNE

ES

Multidiscipline effects

(can achieve EW/CNO

and SIGINT effects)

Combined EW and

CNO effects

Personal

message

delivery

Web, spam,

email Leaflets, false

targets

Traditional

CNO (DOS

attacks, malware,

viruses)

Traditional EW

(directed energy,

force protect,

brute-force

jamming

Spoofing,

telecasts

PSYOP Deception

Protocol-

based

attacks

52

The Convergence

• Issues and problems

– The Open System Interconnection (OSI)

• 7-layer network protocol

• CO and EW begin at the physical layer

• EW does not stop at the physical layer

• Integrating internet protocol into communications system enables intelligent jamming

• Intelligent jamming requires knowledge of OSI layers and overlap to achieve effective convergence and combined effects

Session

Transport

Network

Data Link

Physical

Presentation

Application

53

The Convergence

• Issues and problems

– Integration of IP

• RF communication systems or equipment use IP for data sharing and distribution

• Attackers are able to exploit systems via IP

• Software and applications oversights worsen the situation

NETWORK

RF Systems

enemy

enemy

emulation enemy

destruction

54

The Convergence

• Issues and problems – Confusion

• Cyber operations are now largely operating with the spectrum (wireless)

• EW manipulates the spectrum

• Spectrum – you can’t see it, you can’t touch it,… but you live and fight in it…..

• In the joint space, the spectrum is the fighting space

• One can have very comprehensive cyber defense and attack methodologies

• If you lost your spectrum, a cheap digital jammer can humble your expensive advanced systems and comprehensive methodologies

55

The Convergence

• Issues and problems

– More Confusion

• The convergence cannot be prevented BUT……

• Cyberspace and EMS are different physically, largely speaking AND ……

• They depend on each other in today’s warfare

56

The Convergence

• The only way to ensure seamless and fluid flow of operations in the joint space is that of CLEAR ALL THE RED TAPES! TALK TALK and TALK!

– Define the space clearly

– Define the operations in peace time

• EW and CO as separate entities with information sharing and sense making

– Define the operations during war

• Details on how observations are shared, how information flow seamlessly from physical layers (via EMS) to network and application layers (Cyber)

57

A Chinese Perspective

• An article, with post comments, published on a Chinese website:

– “一位军事专家曾断言:“如果第三次世界大战打

响,获胜的一方必然是善于控制、驾驭电磁空间的一方。”

– It means

• “If there will be a 3rd world war, the winner shall be the one who can control and manage the EMS.”

– The Chinese acknowledge the presence of cyberspace, recognize the importance of joint space and focus on the EMS

58

A Chinese Perspective

• Published on a Chinese military magazine, an article discusses on the warfare concept of the USA – “… 他们认为“电子战主要是通过控制射频频谱进行,以使美军及其盟国能自由操作射频系统,包括雷达和无线电通信,同时干扰对手阻止其使用这种作战方式 …”

– It means • The US military believes that EW is to control the EMS so

that they can control transmitting stations freely with their allies, these include radar and radio transmitters

• It also means that they can interfere the enemy and stop them from using the same tactic …

59

A Chinese Perspective

• Published on a Chinese military magazine, an article discusses on the warfare concept of the USA

– “… 频谱战包括电子战、网络战、光电对抗和导航

战等诸多形式,这些战争形式交织重叠在一起,构成一个频谱战整体 …”

– It means

• The "spectrum war” includes many forms of electronic warfare, network warfare, optoelectronics confrontation and navigation warfare, these overlaps have resulted to a whole new spectrum of warfare …

60

A Chinese Perspective

• Published on a Chinese military magazine, an article discusses on the warfare concept of the USA – “… 美军希望通过进行频谱战,力争控制无线电通信、雷达、光电传感器、GPS卫星导航、精确授时、数据网络和电磁频谱的方方面面,同时阻止对手拥有这些能力 …”

– It means • … US hopes that through the spectrum war, they will be

able to control radio communication, radar, photoelectric sensors, GPS satellite navigation, precision timing, data networks and all aspects of the EMS, while preventing the opponents from these capabilities …

61

A Chinese Perspective

• Published on a Chinese military magazine, an article discusses on the warfare concept of the USA

– “… 频谱战融合了电子战、网络战,光电对抗及其他可以感知环境、通信、导航、目标瞄准的技术…”

– It means

• … The new spectrum converges electronic warfare and network warfare, and other optoelectronic techniques …

62

A Chinese Perspective

• The implementation of Beidou Navigation Satellite System (北斗卫星导航系统)

63

EW & Cyber - The importance of Joint Space

Threats, Seriousness and Significance

64

Serious or Not?

• Many military aircraft or vessels rely and are controlled by software

• Use communication, data link and navigation systems which transmit critical information over the spectrum

• High possibility that enemy to take down receivers, corrupt the software and applications

• Attacks on public utilities, key installations, classified storage via cyber space

65

Serious or Not?

• Taking Over of Air Defense System

– North Koreans were building a nuclear bomb facility in Syrian

– The IAF took over the Syria’s ADS in the 2007 attack

– The Syrian ADS was placed with a logic-bomb such that the radars would not function (went off actually) during the attack

– The radar did not return any attack aircraft, namely, F-15 Eagles and F-16 Falcons

– The facility was bombed

66

Serious or Not? • Cyber attacks on power grid

– Power outage on 23 December 2015 in Western Ukraine

– Attack was launched by skilled and stealthy strategists and hackers by penetrating into the network and destroyed with DOS and malware

– The SCADA systems was compromised by overwritten firmware on critical devices at the substations

• Did not response to remote command from authorized operators

– Was it Russia?

67

Serious or Not?

• Cyber attacks on power grid

68

Contesting the Spectrum

• South China Sea

– Chinese radar installations have been seen

• Air operations

• Real time awareness

• ISR capabilities over Southern region

• Early warning (OTHR)

• SAM

– Jamming capabilities on enemy radar and sensors

"A Glimpse Into China's Military Presence

in the South China Sea is republished with

permission of Stratfor."

69

Contesting the Spectrum

• South China Sea

– 4 US Navy EA-18G Growler EA aircraft were deployed

• Capable of jamming the radars installed in the South China Sea by the Chinese?

– US and China are in contest for EW supremacy? For EMS?

– Meanwhile (at the time of preparing this set of materials), China and Russia are conducting a 8-day Joint Sea Exercise 2016 …

70

Contesting the Spectrum

• South China Sea

– 2 US aircraft carriers (with B-52S and EA-18G Growler) conducted joint exercise off the Philippine sea in June 2016

71

Contesting the Spectrum

• Back on land…

– A recently released US Defense Department report mentions a focus on cyber warfare

• “China is using its cyber capabilities to support intelligence collection against the U.S. diplomatic, economic, and defense industrial base sectors that support U.S. national defense programs, …”

• Chinese military was said to have conducted cyber probes and intrusions on US computer networks

• The Chinese defense ministry is disputing against the accusation

72

Contesting the Spectrum

• Back on land…

– A recently released US Defense Department report mentions a focus on cyber warfare

• If the Chinese had indeed gotten information via cyber men then they would have access to

– Overall picture of US defense networks and logistics

– Military capabilities in crisis

– Leadership perspective on China issues

• A popular Sun Tzu quote: 知己知彼,百战百胜, if you know your enemy and yourself, you will win all your wars (100%)

– Do you agree that a war has started in various domains?

73

The Mobilization of Civilian System

• Military and defense have the power over the use of civilian systems such as radar systems, communication systems, …

• How reliable are these system in terms of being cyber-attacked unknowingly?

• Is there a need to also have EW and CO covering these critical civilian systems?

74

[1] G. Goebel (2015, May 1), B-51 in the Modern Era [Online], Available: http://www.airvectors.net/avb52_3.html

[2] A. E. Spezio, “Electronic Warfare Systems”, IEEE Trans. Microw. Theory Tech. vol. 50, p. 633-644, March 2002.

[3] P. Swarts (2016, February 2016), Air Force Prolongs the Life of the Venerable B-52 [online], Available: https://www.airforcetimes.com/story/military/2016/02/22/air-force-prolongs-life-venerable-b-52/80570810/

References

75

[4] MG B. Williams (2014, March 13), Cyberspace: What is it, where is it and who cares? [Online], Available: http://armedforcesjournal.com/cyberspace-what-is-it-where-is-it-and-who-cares/

[5] L. Seligam (2016 June 23), Israel Set to Build Its Own Cyber Defense [Online], Available: http://aviationweek.com/defense/israel-set-build-its-own-cyber-defenses-f-35-fleet?utm_content=buffercc22e&utm_medium=social&utm_source=plus.google.com&utm_campaign=buffer

References

76

[6] W. L. Sharp, “Electronic Warfare”, Joint Publication 3-13.1, 25 January 2007.

[7] Maj M. E. Poole (2015 August ), Cyber Electronic Warfare [Online], Available: https://www.mca-marines.org/gazette/2015/08/cyber-electronic-warfare#

[8] J. Loerch (2016, February 1), What We Have is a Failure to Communicate [online], Available: http://www.afcea.org/content/?q=Article-what-we-have-failure-communicate

References

77

[9] 春天的初蕾 (2015 November 24), 电子战与电子战部队:新型作战力量之九 [online], Available: http://bbs.tianya.cn/post-20-615307-1.shtml

[10] 姚远 (2015 November 13), 美空军着手打造仿真频谱战战场,频谱战是什么, 中国国防报, 军事特刊

[11] K. Zetter (2016 March 16), Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid [online], Available: https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/

References

78

[12] B. Thomas-Noone (2016 August 24), Electronic Warfare in the South China Sea [online], Available: http://www.realcleardefense.com/articles/2016/08/24/electronic_warfare_in_the_south_china_sea_109745.html

[13] D. Cenciotti (2016 August 5), Things Heat Up Near South China Sea: Two US Aircraft Carriers, B-52S and EA-18G Growler Detachment [online], Available: https://theaviationist.com/2016/06/19/things-heat-up-near-south-china-sea-two-u-s-aircraft-carriers-b-52s-and-ea-18g-growler-detachment/

References