Ew asia cw and ew joint space for comments (14 sep2016)
-
Upload
tbss-group -
Category
Technology
-
view
173 -
download
0
Transcript of Ew asia cw and ew joint space for comments (14 sep2016)
2
Outline
• Outline
• Acknowledgement
• About the Speaker
• Conventional Warfare
• Electronic Warfare
• Cyber Warfare
• Joint Space Defined
• Threats, Seriousness and Significance
3
• The speaker is thankful to AOC Head Quarter and the organizing team for the extension of invitation to speak at this prestigious conference.
Acknowledgement
Terima Kasih
About the Speaker
Contacts Work
Teaching Leader Roles Professional Activities
Publications Voluntary Works
5
Contacts
Name: LEE Kar Heng
Email: [email protected], [email protected]
Mobile: +65 9191 6893, +84 1638 006 000
Facebook: https://www.facebook.com/karheng
(personal interests, thoughts, comments and reflections)
Linkedln: https://www.linkedin.com/in/karheng
(professional profiles and short articles on business and entrepreneurship)
Academia: https://edithcowan.academia.edu/KarHengLee
(technical papers, students’ projects, course materials of academic programs and short courses)
Slideshare: http://www.slideshare.net/karheng1
(company information of TBSS Companies and Partners)
6
• TBSS Group (Current Job)
• Minister of Home Affairs
– Police Technology Department (Maritime)
• Defense Science and Technology Agency
– Sensors
• DSO National Laboratories
– Radar Systems
• Maritime and Port Authority
– Electronics and Communications
Work
7
• Temasek Polytechnic
– Telecommunications
• Republic of Singapore Navy
– Fire Control Systems
Work
8
• TBSS Group (Current Job) – Designed, developed and delivered professional courses:
• Electronic Warfare course for the Republic of Singapore Air Force
• Radar Systems for Operations and Maintenance for Raytheon Anschuetz, Singapore
• Radar System in Aviation, Maritime and Defense for Air Defense Operations Command, Singapore Technologies and Police Technical Department
• LTE with Military Applications for Army Signal Institution
• Understand EMC for Ammunition Command
– Organzied and lectured on Coastal Surveillance System for the Border Defense Force, Vietnam
Work
9
Work
• Ministry of Home Affairs (Police Technology)
– Specified the Coastal Surveillance Radar System for the Police Coast Guard of Singapore
– Installed, commissioned, integrated and tested Raytheon Mark2 Radars and ELTA FMCW Radar with ECM capabilities
– Designed, developed and delivered Radar System course for Police Coast Guard of Singapore
– Designed, developed and delivered System Engineering course for Police Coast Guard of Singapore
– Carried out feasibility study on radar detection of swimmers with Terma Radar, Police Coast Guard and Maritime and Port Authority
10
Work
• Defense Science and Technology Agency
– Specified the Coastal Surveillance Radar System for the Republic of Singapore Navy
– Carried out simulations and study on multi-radar tracking and fusion
– Initiated, Installed, commissioned, integrated and tested Secure and Covert Automatic Identification Transponders for the Republic of Singapore Navy
– Carried out study of electromagnetic waves propagation in wall penetration radars
– Carried critical study on Frequency Modulation Continuous Wave technique and solid-state transmitter technology for radar applications
11
Work
• Defense Science and Technology Agency
– Installed, commissioned, integrated and tested ELTA FMCW Radar with ECM capabilities
– Implementation of ELINT systems
12
Work
• Maritime and Port Authority – Specified and Implemented Vessel Traffic Radars
– Initiated, Installed, commissioned, integrated and tested Automatic Identification System for the Singapore Port
– Managed the Vessel Traffic System
• Temasek Polytechnic – Designed, developed and delivered
• 3D and Airborne Radar for Ministry of Defense
• Radar Tracking for Ministry of Defense
• Radar System Engineering and Phased-Array Radar courses for Republic of Singapore Air Force, Republic of Singapore Navy, DSO National Laboratories and Singapore Armed Forces
– Designed and Fabricated Antennas and Antenna Arrays for detection and Jamming
13
Work
• DSO National Laboratories – Carried out radar tracking algorithms development for
maritime applications
– Installed, commissioned, integrated and tested Radar Tracking System for an air platform
• Republic of Singapore Navy – Maintained Fire Control System
– Conducted Fire Control Radar and Computer Systems courses
– Designed and Developed Gun Alignment Trial for electronic learning platform
– Installed, commissioned, integrated and tested the automatic fire control radar and missile systems alignment facility
14
Teaching Leadership Roles
• Senior Adjunct Lecturer, Bachelor of Engineering, Edith Cowen University, Responsible for the B.Eng Program in Singapore
• Course Chair, Bachelor of Engineering, SIM University, Wireless Communication Systems
• Program Leader, Bachelor of Engineering, Northumbria University, Responsible for the operations of B.Eng Program in Singapore
• Subject Leader, Diploma in Telecommunications, Temasek Polytechnic, Developed and managed the “Integrated Project” module
15
Professional Activities
• Institution of Electrical and Electronics Engineers (IEEE) Member, 1995 – present
Secretary, Education Chapter, IEEE Singapore Section, 2006 – 2007
Chairman, Education Chapter, IEEE Singapore Section, 2008 – 2009
Chairman, Education Chapter, IEEE Singapore Section, 2015 – present
Member, Educational Activities Board, IEEE Region 10
16
Professional Activities
• Association of Old Crows (AOC) Member, 2015 – present
President, AOC Singapore Chapter, 2016 – present
• Vietnamese Association in Singapore (VAS) Senior Advisor, Science and Technology 2015 - present
• Inderscience Publishers Article Reviewer, 2015 – Present
17
Publications
1. K. H. Lee and M. S. Leong, “A Study on Coupling Effect Between Antennas Installed on a Common Structure”, IEEE Asia Pacific Microwave Conference, 1999.
2. K. H. Lee, “Antenna Coupling”, B.Tech(Hons) Project Report, NUS, 1999.
3. K. H. Lee, S. A. Hamilton and M. S. Leong, “A Tri-Band Circular Polarized Microstrip Antenna”, IEEE APS/URSI Intl. Conf., 2002.
4. K. H. Lee, “A Simulation of Tracking Algorithms Used in Radar Data Processing”, M.Sc Dissertation, University of Sheffield, 2001.
5. K. H. Lee, “Design and Development of Broadband and Multiband Antennas”, M.Eng Research Thesis, NUS, 2003.
6. J. W. Teo and K. H. Lee, “The Propagation Properties Of Electromagnetic Waves In The Application Of Through-Wall Radar Sensors”, NUS Science Research Congress, 2003.
18
Publications
7. X. Q. Tan and K. H. Lee, “A Study on Data Fusion Techniques Used in Multiple Radar Tracking”, NUS Science Research Congress, 2004.
8. B. Moh and K. H. Lee, “A Study on the use of Frequency Modulated Continuous Wave Radar in the Detection of Swimmers”, NUS Science Research Congress, 2005.
9. K. Li, T. S. Tan, J. Tan and K. H. Lee, “Taxi on The Way”, ScilabTEC International Conference, 2015.
10. K. H. Lee, “Tutorial on Radar System Engineering”, IEEE Advanced Technologies for Communications, 2015.
11. K. H. Lee, “Engineers can be Good Entrepreneurs Too”, IEEE Education Chapter, Singapore Section, 2016.
19
Voluntary Work
• Volunteer Special Constable, Singapore Police Force, Police Officer in Police Coast Guard, 2010 - 2012
• Founder and Administrator, Tiong Bahru Secondary School Facebook Group, 2008 – 2013
• Corporate Social Responsibility Manager, TBSS Group, 2012 – Present
• Advisor on Science and Technology, Senior Advisor Board, Vietnamese Association in Singapore, 2015 – Present
21
Conventional Warfare
• Political Geography defines conventional warfare as
– Armed conflicted between states and/or nations in which combatants appear in organized military units that are often outfitted with standard uniforms, weapons, and equipment.
– It typically involved combat operations that overtly seize control of territory, inhabitants, and resources.
• Conventional warfare is NOT just about capabilities deployed, it is about equipment too
22
Conventional Warfare
• General John T Chain, the then Commander in Chief, Strategic Air Command once said in an 1987 presentation to the US Senate:
– “…. By combining (our) planned force enhancements with the maintenance of the B-52 force structure, we will be able to provide theater commanders an enormous war fighting capability at an affordable price and increase their flexibility, …”
• The B-52 is a long range heavy bomber built and maintained by Boeing
23
Conventional Warfare
• Built in 1954, B-52 had undergone several major upgrades
• It is STILL being upgraded to meet the present challenges……
25
Conventional Warfare
• According to several sources, there were as many as 31 B-52s were lost in the Vietnam War (18 were shot down over North Vietnam) (www.vietnamwar.net)
B-52s were largely
destroyed by SAM and
AAA during the war
largely due to altitudes
they flew.
Didn’t the command
know that such counter-
measures were present?
26
Conventional Warfare
• The CONECT
– Specifications
• COmbat Network Communications Technology
• One of the most important upgrades
• More communication data links
• Better voice links
• Full-color LCD displays with real-time intelligence feeds overlaid on moving maps
• State-of-the-art computing network
• Retarget a weapon or mission parameters in flight
28
Conventional Warfare
• The CONECT
– Capabilities
• Receive and transmission message (in the form of emails) real time
• Supports nuclear and conventional operations
• Data links and voice communications to improve threat and situational awareness
• Direct feeding of data in weapon systems
• Participation in network centric operations
29
Conventional Warfare
• The CONECT
– Open System Architecture (OSA)
• Utilized Open Mission System (OMS)
• Non-proprietary mission system architectural standard
• Lockheed Martin Sniper Pod has already been integrated into B-25 CONECT for distribution and storage of digital images to CONECT displays
• Security issues with OSA?
30
Conventional Warfare
• Radar
– Northrop Grumman APQ-166 Strategic Radar
• Lt Gen Mike Holmes, Deputy COS for Strategic Plans and Requirements, USAF, had commented that APQ-166 radar to be unreliable.
• “The radar currently flying on the B-52 is limited by its mean time between failure. … if you’re flying long-duration missions and you get to a two-digit mean time between failure, it means you’re flying around with a broken radar a lot.”
– B-52 Radar Modernization Programme (RMP) had received a budge of USD491 million
31
Conventional Warfare
• Radar
– Trials on ASQ-236 were carried out for experimental reasons
– A podded AESA SAR, a very effective high-resolution radar for maritime surveillance, with quick scanning and acquisition
– B-52 to be deployed for South China Sea mission???
33
Electronic Warfare
• EW is an important capability – Part of conventional warfare
– Achieve military, diplomatic and economic objectives
– Resist undesired objectives
• EW counters hostile actions that involve the EM spectrum from beginning through to final battle engagement
• Exploits the EM environment by – sensing and analyzing an enemy's use of the spectrum
– imposing appropriate countermeasures (CMs) to hostile spectrum use
34
Electronic Warfare
• B-52 ECM – Protect itself against a full range of air defense threat
system
– Electronic detection
– Jamming
– IR CM
– Detects and counters missiles engaging the aircraft from the rear
35
Electronic Warfare
• B-52H EW – ALQ-172(V)2 ECM (ITT)
• Defensive ECM
• Multi-band threat recognition and multiple jamming
– ALR-20A (Tasker) • Radar warning receiver (RWR)
• Detects, analyzes and prioritizes multiple threats
– ALR-46(V) (Northrop Grumman) • Digital warning receiver that detects radar emission from 2
to 18 GHz
• Identify up to 16 radar signals
36
Electronic Warfare
• B-52H EW – ALQ-122 (Motorola)
• Multiple False Target Generator
– ALT-32 (Northrop Grumman) • Low and high-band communications jammers
– ALQ-155 (Northrop Grumman) • Jammer Power Management System
• 360 coverage in D to H radar bands
– ALQ-153 (Northrop Grumman) • Pulse-Doppler threat radar warning set
• Active missile approach warning
37
Electronic Warfare
• B-52H EW – ALE-20
• IR flare dispensers
• 12 in total to give 192 flares
– ALE-24 (Lundy) • Chaff dispensers
• 8 launchers in total to give 1125 bundles of chaff
39
Electronic Warfare
• The EW space – SPECTRUM (as long as one can transmit or receive wirelessly, that is the space)
The spectrum is becoming complex and with cyberspace, a war could be lost due to ignorance.
Picture Credit: Forbes
41
Cyber Warfare
• Cyber Warfare – Involves the actions to attack, attempt to damage
enemy’s computer and/or networks
– Virus, denial-of-services, … attacks
– Defense against effect of CW on digital infrastructure
• Cyberspace – Man-made created space when computers, network
switches, routers, fiber optics, wireless devices, satellites, … and all other electronics devices and equipment are CONNECTED
42
Cyber Warfare
• Cyberspace – Has become an arena for modern warfare
– A new dimension where information warfare (IW) is fought and information operation (IO) is carried out
– IW as defined by military theorists • “The main objectives will be to disorganize or disrupt the
functioning of the key enemy military, industrial and administrative facilities, ….. Primarily through the use of the state-of-the-art IT and assets.”
43
Cyber Warfare
• Cyber Defense – Israel is building her own cyber defenses for their F-
35 Fleet • Self developed C4 systems, weaponry and undisclosed EW
system
• To maximise the autonomy of the fighter fleet
• The importance of protecting a cyber space
– PM Singapore: • “Singapore to cut off internet access for government
employees’ work computer to protect government data after some very sophisticated cyber attacks.”
• Lock your doors, it is the best defense?
44
Cyber Warfare
• Cyber Attacks – The 2013 Singapore cyber attacks
• A series of hacks!, believed to have been executed by “The Messiah”
• The attacks include – The PAPCF webpage
– AMKTC official website
– Seletar Airport website
– The ISTANA website
– Some 13 schools websites
• Reason: censorship regulation which “The Messiah” has believed to be NOT ACCEPTABLE in the view of internet freedom
Is “The Messiah”
capable of attacking
the Defense and
Military-related
computers or
network?
45
Conventional Warfare
• The CONECT
– With the establishment of data link, B-52 is now subjected to cyber attack
47
The Convergence
• Cyber and EW similarities – Deny, Disrupt, Destroy, Degrade and Deceive
– EW – spectrum
– Cyber – computers, computer systems, networks, applications
• EW operator
– Fight in the EM spectrum using EW equipment to turn the enemy’s equipment against them
– Ear of the force
48
The Convergence
• CW/IW operator – Expert in cyber security
– Lifecycle of network threats, attack vectors and network vulnerability exploitation
– Behind the keyboard, causing enemy to make wrong decision in their defense or attack
• Cyber EW – The use of EME and networked systems, with
associated infrastructure, to control a domain
– Data exchange between cyber space and spectrum
49
The Convergence
• Cyber EW
– The use of EME and networked systems, with associated infrastructure, to control a domain
– Data exchange between cyber space and spectrum
– A joint operation to coordinate activities
AIR
LAND
MARITIME
SPACE
CYBERSPACE DOMAIN Physical Logical Persons Layer Layer Layer
Cognitive Dimension Information Dimension Physical Dimension
INFORMATION ENVIRONMENT EMS
EM Operational
Environment
50
The Convergence
• The IO Doctrine of November 2003
– “…integrated employment of the core capabilities of EW, CNO, PSYOP, MILDEC and OPSEC, …”
– “…to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own…”
Information Operations:
Doctrine, Tactic, Techniques and
Procedures
Electronic Warfare (EW)
Computer Network Operations (CNO)
Psychrological Operations (PSYOP)
Military Deception (MILDEC)
Operation Security (OPSEC)
51
The Convergence
• Functional view
Cyber
Operations
SIGINT
EW
Eavesdropping
CNO
CNE
ES
Multidiscipline effects
(can achieve EW/CNO
and SIGINT effects)
Combined EW and
CNO effects
Personal
message
delivery
Web, spam,
email Leaflets, false
targets
Traditional
CNO (DOS
attacks, malware,
viruses)
Traditional EW
(directed energy,
force protect,
brute-force
jamming
Spoofing,
telecasts
PSYOP Deception
Protocol-
based
attacks
52
The Convergence
• Issues and problems
– The Open System Interconnection (OSI)
• 7-layer network protocol
• CO and EW begin at the physical layer
• EW does not stop at the physical layer
• Integrating internet protocol into communications system enables intelligent jamming
• Intelligent jamming requires knowledge of OSI layers and overlap to achieve effective convergence and combined effects
Session
Transport
Network
Data Link
Physical
Presentation
Application
53
The Convergence
• Issues and problems
– Integration of IP
• RF communication systems or equipment use IP for data sharing and distribution
• Attackers are able to exploit systems via IP
• Software and applications oversights worsen the situation
NETWORK
RF Systems
enemy
enemy
emulation enemy
destruction
54
The Convergence
• Issues and problems – Confusion
• Cyber operations are now largely operating with the spectrum (wireless)
• EW manipulates the spectrum
• Spectrum – you can’t see it, you can’t touch it,… but you live and fight in it…..
• In the joint space, the spectrum is the fighting space
• One can have very comprehensive cyber defense and attack methodologies
• If you lost your spectrum, a cheap digital jammer can humble your expensive advanced systems and comprehensive methodologies
55
The Convergence
• Issues and problems
– More Confusion
• The convergence cannot be prevented BUT……
• Cyberspace and EMS are different physically, largely speaking AND ……
• They depend on each other in today’s warfare
56
The Convergence
• The only way to ensure seamless and fluid flow of operations in the joint space is that of CLEAR ALL THE RED TAPES! TALK TALK and TALK!
– Define the space clearly
– Define the operations in peace time
• EW and CO as separate entities with information sharing and sense making
– Define the operations during war
• Details on how observations are shared, how information flow seamlessly from physical layers (via EMS) to network and application layers (Cyber)
57
A Chinese Perspective
• An article, with post comments, published on a Chinese website:
– “一位军事专家曾断言:“如果第三次世界大战打
响,获胜的一方必然是善于控制、驾驭电磁空间的一方。”
– It means
• “If there will be a 3rd world war, the winner shall be the one who can control and manage the EMS.”
– The Chinese acknowledge the presence of cyberspace, recognize the importance of joint space and focus on the EMS
58
A Chinese Perspective
• Published on a Chinese military magazine, an article discusses on the warfare concept of the USA – “… 他们认为“电子战主要是通过控制射频频谱进行,以使美军及其盟国能自由操作射频系统,包括雷达和无线电通信,同时干扰对手阻止其使用这种作战方式 …”
– It means • The US military believes that EW is to control the EMS so
that they can control transmitting stations freely with their allies, these include radar and radio transmitters
• It also means that they can interfere the enemy and stop them from using the same tactic …
59
A Chinese Perspective
• Published on a Chinese military magazine, an article discusses on the warfare concept of the USA
– “… 频谱战包括电子战、网络战、光电对抗和导航
战等诸多形式,这些战争形式交织重叠在一起,构成一个频谱战整体 …”
– It means
• The "spectrum war” includes many forms of electronic warfare, network warfare, optoelectronics confrontation and navigation warfare, these overlaps have resulted to a whole new spectrum of warfare …
60
A Chinese Perspective
• Published on a Chinese military magazine, an article discusses on the warfare concept of the USA – “… 美军希望通过进行频谱战,力争控制无线电通信、雷达、光电传感器、GPS卫星导航、精确授时、数据网络和电磁频谱的方方面面,同时阻止对手拥有这些能力 …”
– It means • … US hopes that through the spectrum war, they will be
able to control radio communication, radar, photoelectric sensors, GPS satellite navigation, precision timing, data networks and all aspects of the EMS, while preventing the opponents from these capabilities …
61
A Chinese Perspective
• Published on a Chinese military magazine, an article discusses on the warfare concept of the USA
– “… 频谱战融合了电子战、网络战,光电对抗及其他可以感知环境、通信、导航、目标瞄准的技术…”
– It means
• … The new spectrum converges electronic warfare and network warfare, and other optoelectronic techniques …
64
Serious or Not?
• Many military aircraft or vessels rely and are controlled by software
• Use communication, data link and navigation systems which transmit critical information over the spectrum
• High possibility that enemy to take down receivers, corrupt the software and applications
• Attacks on public utilities, key installations, classified storage via cyber space
65
Serious or Not?
• Taking Over of Air Defense System
– North Koreans were building a nuclear bomb facility in Syrian
– The IAF took over the Syria’s ADS in the 2007 attack
– The Syrian ADS was placed with a logic-bomb such that the radars would not function (went off actually) during the attack
– The radar did not return any attack aircraft, namely, F-15 Eagles and F-16 Falcons
– The facility was bombed
66
Serious or Not? • Cyber attacks on power grid
– Power outage on 23 December 2015 in Western Ukraine
– Attack was launched by skilled and stealthy strategists and hackers by penetrating into the network and destroyed with DOS and malware
– The SCADA systems was compromised by overwritten firmware on critical devices at the substations
• Did not response to remote command from authorized operators
– Was it Russia?
68
Contesting the Spectrum
• South China Sea
– Chinese radar installations have been seen
• Air operations
• Real time awareness
• ISR capabilities over Southern region
• Early warning (OTHR)
• SAM
– Jamming capabilities on enemy radar and sensors
"A Glimpse Into China's Military Presence
in the South China Sea is republished with
permission of Stratfor."
69
Contesting the Spectrum
• South China Sea
– 4 US Navy EA-18G Growler EA aircraft were deployed
• Capable of jamming the radars installed in the South China Sea by the Chinese?
– US and China are in contest for EW supremacy? For EMS?
– Meanwhile (at the time of preparing this set of materials), China and Russia are conducting a 8-day Joint Sea Exercise 2016 …
70
Contesting the Spectrum
• South China Sea
– 2 US aircraft carriers (with B-52S and EA-18G Growler) conducted joint exercise off the Philippine sea in June 2016
71
Contesting the Spectrum
• Back on land…
– A recently released US Defense Department report mentions a focus on cyber warfare
• “China is using its cyber capabilities to support intelligence collection against the U.S. diplomatic, economic, and defense industrial base sectors that support U.S. national defense programs, …”
• Chinese military was said to have conducted cyber probes and intrusions on US computer networks
• The Chinese defense ministry is disputing against the accusation
72
Contesting the Spectrum
• Back on land…
– A recently released US Defense Department report mentions a focus on cyber warfare
• If the Chinese had indeed gotten information via cyber men then they would have access to
– Overall picture of US defense networks and logistics
– Military capabilities in crisis
– Leadership perspective on China issues
• A popular Sun Tzu quote: 知己知彼,百战百胜, if you know your enemy and yourself, you will win all your wars (100%)
– Do you agree that a war has started in various domains?
73
The Mobilization of Civilian System
• Military and defense have the power over the use of civilian systems such as radar systems, communication systems, …
• How reliable are these system in terms of being cyber-attacked unknowingly?
• Is there a need to also have EW and CO covering these critical civilian systems?
74
[1] G. Goebel (2015, May 1), B-51 in the Modern Era [Online], Available: http://www.airvectors.net/avb52_3.html
[2] A. E. Spezio, “Electronic Warfare Systems”, IEEE Trans. Microw. Theory Tech. vol. 50, p. 633-644, March 2002.
[3] P. Swarts (2016, February 2016), Air Force Prolongs the Life of the Venerable B-52 [online], Available: https://www.airforcetimes.com/story/military/2016/02/22/air-force-prolongs-life-venerable-b-52/80570810/
References
75
[4] MG B. Williams (2014, March 13), Cyberspace: What is it, where is it and who cares? [Online], Available: http://armedforcesjournal.com/cyberspace-what-is-it-where-is-it-and-who-cares/
[5] L. Seligam (2016 June 23), Israel Set to Build Its Own Cyber Defense [Online], Available: http://aviationweek.com/defense/israel-set-build-its-own-cyber-defenses-f-35-fleet?utm_content=buffercc22e&utm_medium=social&utm_source=plus.google.com&utm_campaign=buffer
References
76
[6] W. L. Sharp, “Electronic Warfare”, Joint Publication 3-13.1, 25 January 2007.
[7] Maj M. E. Poole (2015 August ), Cyber Electronic Warfare [Online], Available: https://www.mca-marines.org/gazette/2015/08/cyber-electronic-warfare#
[8] J. Loerch (2016, February 1), What We Have is a Failure to Communicate [online], Available: http://www.afcea.org/content/?q=Article-what-we-have-failure-communicate
References
77
[9] 春天的初蕾 (2015 November 24), 电子战与电子战部队:新型作战力量之九 [online], Available: http://bbs.tianya.cn/post-20-615307-1.shtml
[10] 姚远 (2015 November 13), 美空军着手打造仿真频谱战战场,频谱战是什么, 中国国防报, 军事特刊
[11] K. Zetter (2016 March 16), Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid [online], Available: https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/
References
78
[12] B. Thomas-Noone (2016 August 24), Electronic Warfare in the South China Sea [online], Available: http://www.realcleardefense.com/articles/2016/08/24/electronic_warfare_in_the_south_china_sea_109745.html
[13] D. Cenciotti (2016 August 5), Things Heat Up Near South China Sea: Two US Aircraft Carriers, B-52S and EA-18G Growler Detachment [online], Available: https://theaviationist.com/2016/06/19/things-heat-up-near-south-china-sea-two-u-s-aircraft-carriers-b-52s-and-ea-18g-growler-detachment/
References