Total Pageviews

Search This Blog

Monday, July 21, 2014

The Rebalance - Deterrence in the Asia-Pacific


Image 1: US-Japan joint exercise with USS George Washington, 2010. 

Deterrence within the context of the rebalance can be examined in two respects: preventing a conventional high-intensity conflict and dissuading Chinese attempts to alter the territorial status quo through low-intensity disputes and paramilitary operations. In both respects the rebalance has encountered major shortcomings. A comprehensive examination of Chinese open source literature, ranging from academia to official PLA military publications, indicates a growing confidence within the People's Liberation Army (PLA) in its ability to defeat the United States in a regional conflict. In his testimony before Congress, Lee Fuell - Technical Director for Force Modernization and Employment with the National Air and Space Intelligence Center, commented on the growing confidence of the PLA:  

"Recent Chinese operational literature describes a more nuanced approach to counter-intervention that seeks to strike a balance between supporting the main campaign and deterring the powerful enemy - that usually means us in the literature - and striking at them if necessary with the need to avoid an expansion of the conflict...This newer literature reflects a departure from past PLA writings which placed more emphasis on preemptive attacks to counter a U.S. intervention. We feel that this demonstrates to some degree a growing confidence within the PLA that they can more readily withstand an initial U.S. involvement than in years past...This isn’t to say the PRC might not still feel compelled to conduct preemptive actions against U.S. intervention, particularly in the cyber domain or other less 'kinetic' ways; however, the PLA appears to be developing a more mature viewpoint on the broad application of military operations against the U.S." 

The following excerpt is from The Science of the Second Artillery Campaigns, the most authoritative Chinese open source publication with respect to China's strategic rocket forces which corroborates Mr. Fuell's testimony: 

"When the powerful enemy uses allied military bases in our periphery and aircraft carriers as aircraft launch platforms to implement various forms of military intervention; and when the powerful enemy's allied military bases around our periphery are beyond our air arm's firing range...conventional missiles can be used to implement harassment strikes against military bases of the enemy's allies around our periphery as well as the carrier battle groups" - Yoshinhara, 2014


Image 2: DF-21 launch site within the 810 Brigade's base near Dalian. DF-21C missiles launched from Dalian would have coverage of US bases in both Korea and Japan. Image credit: Federation of American Scientists 

In addition to preparing for a high-intensity conflict with the United States, China has been proactively changing the status quo in the South China Seas (SCS) through oil rig deployments, island reclamation efforts, establishing a coast guard, and declaring an Air Defense Identification Zone (ADIZ) all within the past two years. While significant US resources have been invested in acquiring platforms and capabilities relevant to a US-China high-intensity conflict such as 2 Virginia-class attack submarines per year or the development of the F-35 fifth generation fighter aircraft, both Congress and the Obama Administration have undertaken minimal efforts to address China's low-intensity efforts to change the status quo:

"China is pursuing in Asia what the United States has in Latin America: regional hegemony. In pursuit of that goal, China keeps trying to take territory, bit by bit, in the East and South China Seas. And the United States doesn't know what to do about it. This practice, known as salami-slicing, involves the slow accumulation of small changes, none of which in isolation amounts to a casus belli, but which add up over time to a substantial change in the strategic picture. By using salami-slicing tactics in the East and South China Seas, China does not have to choose between trade with the rest of the world and the achievement of an expanded security perimeter in the Western Pacific at the expense of China’s neighbors." - Robert Haddick, 2014 

Clearly current US efforts to deter China are insufficient as exemplified by the growing confidence of the PLA and the relative success of China's efforts to claim the SCS. Statements by both the Obama Administration and senior Navy officials such as Chief of Naval Operations (CNO) Admiral Jonathan Greenert have been carefully calibrated as to not antagonize Beijing. Admiral Greenert recently refused to discuss probable US tactics, techniques, and procedures (TTP) with regards to China at a Naval War College event as, "If you talk about it openly, you cross the line and unnecessarily antagonize”. As the status quo power who partly derives acceptance among regional powers by policing the maritime commons and promoting stability, it does not behoove the United States to act belligerent but statements such as CNO Greenert's do not promote effective deterrence.  

James Holmes recently wrote Deterring China = Capability x Resolve x Belief , in which he argues the US shouldn't arbitrarily antagonize Beijing but the US must underscore its capability and resolve to promote an effective military deterrence:  

"Henry Kissinger supplies the best definition of deterrence, depicting it as a product of our capability, our resolve, and — here’s Kissinger’s special ingredient – the opponent’s belief in our capability and our resolve to use it...Teddy Roosevelt sums it up with a pithy frontier maxim: 'don’t bluster, don’t flourish your revolver, and never draw unless you intend to shoot'. In Kissinger’s terms, that’s a statement about communicating one’s intentions frankly but without needlessly giving offense, about clearly outlining the conditions that warrant reaching for the gun, and about actually following through should the opponent defy our terms. Capability, resolve, belief." 

Striking a balance between needlessly antagonizing Beijing and protecting long-held US strategic interests is difficult in and of itself but gets even more troublesome when accounting for the varying interests between the US and its Pacific allies. In broad terms, many US Pacific allies want the US to act as an insurance policy toward their security in a time of national crisis (Zakaria, 2014). Many US pacific allies such as Australia would like a peaceful and stable status quo without a Cold War type military escalation between the United States and China due to extensive trade relations. Stephen Walt recently underscored the logic behind Australia maintaining its robust alliance with the United States despite its extensive trade relations with China. Walt's reasoning applies not only to Australia but also to several countries in South East Asia: 

"You know when states get into trouble, there is no 911 number to call…You can’t call Ban Ki-Moon and get any help. You will get his sympathy, he will put you on the agenda at the Security Council but he’s got nothing else he can do for you. Therefore, nations who think at some point they might face some significant challenge of one form or another, it’s good to have friends…Having the United States as an ally would be a really nice insurance policy”.  

In conclusion, an appropriate US deterrence must address Chinese provocations by underscoring US resolve, US capabilities, and working in consultation with Pacific allies. The US must strike a balance between being minimally aggressive to assuage the concerns of US allies, but the US must also actively deter China and protect key US interests. Preventative measures such as establishing a robust military deterrence in the Asia-Pacific are much less costly than an open war with China over the long-term even if a robust deterrence sours US-China relations. Part II will examine a host of minimally bellicose measures to deter China at the low-intensity level, all of which underscore US resolve through joint Congressional-Presidential action. 


Sources 

  1. China and America: Dancing Around the Containment Question, Joseph A. Bosco, 2014. http://nationalinterest.org/blog/the-buzz/china-america-dancing-around-the-containment-question-10723
  2. America can make Friends in Asia through Trade, Fareed Zakaria, 2014. http://www.washingtonpost.com/opinions/fareed-zakaria-america-can-make-friends-in-asia-through-trade/2014/04/24/bb5db266-cbe0-11e3-93eb-6c0037dde2ad_story.html
  3. Deterring China = Capability x Resolve x Belief, James Holmes, 2014. http://thediplomat.com/2014/06/deterring-china-capability-x-resolve-x-belief/
  4. History's Warning: A U.S.-China War Is Terrifyingly Possible, Michael Vlahos, 2014. http://nationalinterest.org/feature/historys-warning-us-china-war-terrifyingly-possible-10754
  5. America has no Answer to China's Salami Slicing, Robert Haddick, 2014. http://warontherocks.com/2014/02/america-has-no-answer-to-chinas-salami-slicing/
  6. The perils of a foreign policy that leans forward, Fareed Zakaria, 2014. http://www.washingtonpost.com/opinions/fareed-zakaria-the-perils-of-a-foreign-policy-that-leans-forward/2014/06/05/b4cd16f8-ecd8-11e3-9f5c-9075d5508f0a_story.html
  7. Rebalancing U.S. Forces - Japanese Bases and Chinese Missiles, Toshi Yoshihara, 2014. 
  8. China's Military Modernization and its Implications for the United States, 2014. http://origin.www.uscc.gov/sites/default/files/USCC%20Hearing%20Transcript%20-%20January%2030%202014.pdf 
  9. The rise of China and America's Asian allies, Stephen M. Walt, 2014.          https://www.youtube.com/watch?v=eh6K22htlZE

Tuesday, July 8, 2014

The American Approach Part III: Future TTP - Network Centric Warfare & Cyber weapons



Image 1: F-35 weapons bay testing

Author's Note: This article is a continuation of the series Divergent Thinking: How Best to Employ Fighter Aircraft which details the American approach to fielding fighter aircraft. The series is F-35 centric given its key role in the future USN, USMC, and USAF.
Part I
Part II

The F-35 will compose a significant portion of the future USAF, USN, and USMC fighter fleets well into the 2030s and 2040s. Keeping a fleet of combat aircraft relevant to potential national security challenges over the course of their 20 to 30 year service life is achieved both through not only new capabilities via upgrades but also through the development of new techniques, tactics, and procedures (TTP). Leveraging the immense technological capabilities of the F-35 to the fullest extent possible is the responsibility of the USAF's Weapons Test School and various test and evaluation units. The Weapons Test School at Nellis and test and evaluation squadrons (TES) are staffed by some of the most experienced and talented instructor pilots within the USAF.

"The Weapons School cadre also authors tactical doctrine, and conducts tactics validation. Actively collecting tactical knowledge and lessons learned from deployed units, evaluating solutions in exercises, and formally preparing them for application across the force, the Weapons School provides a controlled learning environment and knowledge trust for best practices in air, space and cyber combat techniques." - USAF, 2014

These pilots effectively translate the capabilities of the aircraft into actual tactics or methods of employment to be used on the battlefield. The Weapons School and TES units will have to cope with the following challenges with respect to keeping America's F-35 fleet capable for the next two to three decades:
  • Proliferation of advanced foreign fifth generation aircraft such as the Chengdu J-20, Shenyang J-31, and Sukhoi PAK FA
  • Integration with 4th generation aircraft into the 2020s and 2030s 
  • Expanded air-to-air role as a result of early F-22 production termination and eventual F-15C retirement in the late 2020s to early 2030s
  • Proliferation of Very High Frequency (VHF) radars which have the potential to degrade the stealth characteristics of small low observable aircraft as per the Raleigh scattering regime
  • Increasingly capable surface-to-air missile (SAM) systems such as the S-400 and the HQ-19
  •  Increasingly capable Digital Radio Frequency Memory (DRFM) jammers will degrade the effectiveness of beyond visual range radar guided missiles such as the AIM-120
  • Proliferation of Infrared Search and Track (IRST) systems among 4.5 generation and 5th generation aircraft will increased likelihood of detection within short to medium range 
  • Operating within contested anti-access/area denial (A2/AD) environments
  • Integration within combined arms approach and compatibility with allied forces 

These developments collectively represent a significant challenge toward keeping the F-35 relevant. Technological upgrades alone would be insufficient to maintain a force capable of countering these emerging national security threats. Historically, the innovative methods devised by of the Weapons Test school and TES units have been able to cope with emerging national security challenges and are poised to do so for future decades (e.g. new TTP and concepts developed post-Vietnam in Part II). The process of developing new TTP for the F-35 will likely resemble the process for developing new TTP for the F-22 by the 422nd TES and the Weapons School.

The 422nd TES received its first F-22s in 2004, a year before the first combat F-22s reached IOC status, in order to vet the equipment and systems within the Raptor in terms of both warfighting capabilities and reliability under simulated combat conditions (Majumdar, 2009). The initial work done by TES units usually identifies teething problems with the aircraft. For example, the 422nd identified software reliability issues with the AN/APG-77 radar which have since been rectified as a result of input from the 422nd. After identifying and rectifying potential technological issues, the TES pilots create new methods of employing fighter aircraft. New TTP are strenuously evaluated with aggressor units in large simulated combat exercises such as Red Flag, Red Air, or Northern Edge. The USAF also has access to Su-27s and Mig-29s aircraft to further heighten the realism of combat training which are flown from Groom Lake, these aircraft were obtained as a result of the "Constant Peg" program.

For example, the 2006 exercise Northern Edge provided F-22 pilots an opportunity to evaluate the methods of contributing toward the efforts of Blue Force even after expending their payload of air-to-air missiles:

"After their missiles were fired, the F-22′s active and passive sensor capabilities functioned as the Raptor’s last weapon. Northern Edge 2006′s Raptors remained in the fight, flying as stealthy forward air controllers and guiding their colleagues to enemies sitting behind mountains and other 'Blue Force' AWACS blind spots." - Defense Industry Daily, 2013

The initial process for developing new TTP for the F-35 has already begun as both the 31st and 422nd TES under the 53rd Wing are receiving F-35 aircraft:
"As part of the Joint Operational Test Team, we take the aircraft hardware and software released from developmental test, our training from the 33rd Fighter Wing at Eglin (AFB, Fla.), the administrative and logistics support we get from the Joint Program Office and Lockheed Martin, and we integrate all of these disparate elements with maintenance practices, tactics, techniques and procedures required to create an incredibly lethal weapon system that can go out and win the nation’s wars...'We’ve got a brand new tool with a whole new set of capabilities that has never been used by the combat air forces. We have to take that tool and find out the best way to utilize it, to go out and defeat an enemy on the battlefield,'"- Commander of the 31st TES Lt. Col. Steven J. Tittel, 2013
While the specifics of any new TTP created for the F-35 are likely to remain classified, the following are plausible methods of employment in which the F-35 can be expected to be utilized over the next three decades:

Coordination Between Sensors and Shooters 



Image 2: Allied force networked via ATDL in an A2/AD environment (Image Credit: Northrup Grumman).

Both the USAF and USN are finding new methods of networking assets to facilitate greater situational awareness and coordination between C4ISR, bomber, and fighter aircraft. Data links form the basis for the USN's Naval Integrated Fire Control-Counter Air (NIFC-CA) concept which would allow assets such as the E-2D Hawkeye and F-35C to provide targeting data via the advanced tactical data-link (ATDL) or tactical targeting network technology (TTNT) waveform to cue missile launches from other assets such as the F/A-18E/F and UCLASS.
"...the Rockwell Collins-designed tactical targeting network technology (TTNT) waveform, an individual platform does not necessarily need to generate its own tracks.To eliminate the target once it is located—in the air, on land, or floating on the ocean—the Growlers or the E-2D would relay via Link-16 a 'weapons quality' track to one of the Super Hornets, which would actually destroy the threat. 'That F/A-18E/F and the F-35C out front, they don’t even need to have their radars on,' Manazir said. 'They don’t need to be contributing to the picture themselves, they are just receiving this data.” Moreover, the F/A-18E/F would not even necessary even control the weapon that it launches—other than pulling the trigger. The E-2D, the EA-18G or even another Hornet or F-35C could guide that weapon, Manazir said." - Dave Majumdar and Sam LaGrone, 2014
Coordination between multiple sensors and shooters within NIFC-CA greatly increases the range of a carrier air wing as individual aircraft can engage targets beyond the range of their own individual radars so long as targeting data is provided by other friendly assets. Data links such as TTNT waveform create new opportunities to increase the effectiveness of a mixed 4th and 5th generation fighter force into the 2020s and 2030s. The USAF's service life extension programs (SLEP) will keep more than 200 F-15C/Ds and 300 F-16s in service until around 2030 and the F/A-18E/F is not scheduled to be replaced until the 2030s by a yet to be determined 6th generation design. Due to the internal carriage of weapons, 5th generation aircraft such as the F-35 generally carry fewer air-to-air weapons than equivalent 4th generation aircraft (the small CUDA air-to-air missile will be discussed in Part IV). However, the individual survivability of a 4th generation aircraft is low as they are becoming increasingly vulnerable to long-range radar guided missile exchanges meaning they might not be able to fully make use of a comparatively larger missile load. Coordination between 5th generation and 4th generation aircraft via data-links effectively mitigates the aforementioned shortcomings of both aircraft.




Image 3: F/A-18C with ten AIM-120 and two AIM-9 air-to-air missiles

For example, the F/A-18E/F could act as a missile truck as it can carry up to 12 AIM-120D radar guided missiles and 2 AIM-9X Block II missiles to the F-35C's four (six AIM-120D on Block 4). The F-35C's stealth and enhanced situational awareness would allow it to stay on station within a highly contested anti-access environment and designate targets to the more vulnerable Super Hornets even after expending its internal air-to-air payload. USAF F-35A's and F-22A's could also provide targeting data not only to one another but also friendly F-16s and F-15s in a similar manner.

A major hindrance for the F-22 has been its interoperability with other systems due to its intra-flight datalink (IFTL) which can only transmit and receive data from other Raptors or specialized gateway communication aircraft. Plans to install the F-35's multifunction advanced data link (MADL) in the F-22 have effectively been put on hold due to funding limitations (Defense Industry Daily, 2013). However, increment 3.2A upgrades in conjunction with Project Missouri will allow the Raptor to transmit and receive Link 16 in a minimally detectable low-probability of intercept mode.
"Lockheed Martin, has demonstrated a new data-linking capability it developed for them secretly through 'Project Missouri', a proprietary program. During the demonstration, Lockheed validated the use of a Link 16 transmit capability from the twin-engine F-22 Raptor and showcased an exotic waveform developed by L-3 Communications and optimized for low-probability of intercept/low-probability of detection transmissions (LPI/LPD), says Ron Bessire, vice president of technology and innovation at the company's Skunk Works." - Amy Butler, 2014
Future American fighter aircraft will be able to seamlessly operate as part of a larger networked force across minimally detectable and jam resistant data links. The F-35's integrated avionics suite and sensors are crucial to implementing both the USAF's and USN's vision of a highly coordinated mixed 4th and 5th generation fighter force.

Cyber and Electronic Warfare 



Image 4: The F-35's integrated avionics and sensor suite

Even in the midst of sequestration, systems and agencies related to cyber warfare have experienced consistent budget growth rates as a result of Congressional prioritization. Concepts and systems such as the Defense Advanced Research Projects Agency's (DARPA) "Plan X" program increasingly seek to integrate cyber attacks with conventional kinetic strikes. Although the exact nature of the F-35's cyber capabilities remains classified, the F-35 has immense potential for use as a cyber weapon delivery platform as a result of its AN/APG-81 AESA radar and AN/ASQ-139 electronic warfare system:
"An enemy’s radios and radars are run by computers, so you can transmit signals to hack them. If the enemy’s computers are linked together then your virus can spread throughout that network. The enemy does not have to be connected to the Internet. You just need the enemy’s radios and radar to receive incoming signals...the AESA radar’s beams can throw out those zeros and ones to ANY sort of receiver. And an enemy’s radar is a receiver. His radios are receivers. Some of his electronic warfare sensors are also receivers." -Colin Clark, 2014
The effects of a future F-35 deployed cyber weapon are likely to be similar to BAE system's "Suter" which has already been deployed by US aircraft in coordination with L-3 Communications.
"[Suter] allows users to invade communications networks, see what enemy sensors see, and even take over as systems administrator so sensors can be manipulated into positions so that approaching aircraft can't be seen...The process involves locating enemy emitters with great precision and then directing data streams into them that can include false targets and misleading message algorithms." - Aviation Week, 2007
The US has deployed Suter via the EC-130 in both Iraq and Afghanistan to neutralize insurgent IEDs linked to wireless telephone systems. Plans to integrate air deliverable cyber weapons into the Miniature Air Launched Decoy (MALD) system have also been discussed. Israel is also suspected of utilizing Suter or a similar weapon to infiltrate and disable the Syrian integrated air defense system (IADS) surrounding a Syrian nuclear reactor site during "Operation Orchard" in 2007. Given the success of Suter in a SEAD role, its plausible future F-35 deployed cyber weapons could mask incoming radar contacts or display false signals to enemy fighter pilots which would greatly degrade the enemy's situational awareness (Clark, 2014). 

The United States is not unique in terms of possessing an air deliverable cyber weapon, both the Russian and Chinese militaries have been developing similar capabilities to target high priority US aircraft such as the E-3 and E-8 (Aviation Week, 2012). However, the F-35 is comparatively less vulnerable to similar cyber attacks as the AN/APG-81 radar features a low probability of intercept (LPI) mode. Successful delivery of systems like Suter requires a robust emitter locating capability which LPI modes make significantly more difficult via emission control principles. LPI software governs the duration, intensity, and space of signals to ensure a pilot maintains a high degree of situational awareness while mitigating the probability of detection by emitter locator systems. (Bill Sweetman, 2000). Equivalent Russian and Chinese aircraft are likely to be comparatively more vulnerable to US cyber weapons as a result of less mature LPI technology.

Russian AESA radars such as the Phazotron Zhuk AE/ASE are a generation behind their US equivalents in the areas of TR module packaging and cooling technology (Kopp, 2012). Although information on the state of Russian LPI software is scarce within the public domain, it is plausible to assume Russian LPI software is also comparatively less mature compared to current Western designs given the performance of the Phazotron Zhuk AE/ASE in all other non-LPI areas resembles primitive US AESAs. Similarly, Chinese AESA technology is less technologically mature than their Russian equivalents with no confirmed fighter mounted AESAs designs as of July 2014 outside of dubious internet leaks on various Chinese aviation forums. Although, most US intelligence officials believe the J-20 will be equipped with an AESA when it reaches initial operating capability (IOC) in 2018.


Conclusion 



Image 5: A pair of Northrup Grumman E-2D Hawkeye aircraft. The E-2D along with the F-35C forms the linchpin of the USN's NIFC-CA concept. Current carrier air wings typically include 4 E-2C aircraft.

A significant outstanding issue with relation to the current adoption of network centric warfare and cyber weapons is the vulnerability of allied AWACS aircraft. Given the US focus on network centric warfare, where AWACS aircraft such as the E-3 and E-2 act as the central node of a network, a cyber weapon infecting an E-3 or E-2 remains a potential vulnerability from which the larger networked force could become compromised. Even if the F-35 is a reduced risk from becoming the initial point from which an enemy cyber weapon infects an allied network due to LPI, Chinese or Russian forces could still indirectly infect F-35 units as a result of the cyber weapon proliferating throughout the network from the AWACS aircraft.

The maximum effective range of an enemy air launched cyber weapon is likely dependent upon the range and accuracy of enemy emitter locator systems. However, given the intensity and volume of signals emitted, AWACS aircraft are comparatively more vulnerable to detection via emitter locator systems than other types of aircraft. The US Military is already in the process of enacting measures to mitigate the damage resulting from high intensity electronic jamming on its networks but publicly available information on measures to protect networks from air launched cyber attacks is understandably limited. Successful protection of AWACS aircraft against enemy cyber weapons is crucial to implementing network centric warfare. Potential methods to reduce the vulnerability of AWACS aircraft might include measures to reduce electronic emissions of AWACS aircraft or network diversification not dependent upon a "central node" based system. Both the USAF and USN should work in consultation with USCYBERCOM, DARPA, and other relevant agencies to develop appropriate countermeasures to protect US networks.

Developments in network centric warfare and cyber weapons have the potential to maintain US superiority in air-to-air combat and enable SEAD missions within contested A2/AD environments. The combination of the two techniques leverages the United States' existing competitive advantage in the fields of avionics and software relative to potential strategic competitors. As discussed in Part II, the US doctrines such as information dominance seek to attain situational awareness while degrading or denying the enemy's situational awareness. The combination of cyber weapon such as Suter and network centric warfare achieves both these objectives.

Author's Note: Stay tuned for the next article in the series, "The American Approach Part IV: Future TTP -  Countering Foreign 5th Generation Threats". If you have any questions or feedback, feel free to message me on the F-16.net forum (ID: "mangler-muldoon"), send me an email, or leave a comment.


Sources (In addition to Parts I and II)



  1. Israel suspected of 'hacking' Syrian air defences, John Leyden, 2007. http://www.theregister.co.uk/2007/10/04/radar_hack_raid/
  2. Five years on, new details emerge about Israeli strike on Syrian reactor, Amos Harel, 2012. http://www.haaretz.com/news/diplomacy-defense/five-years-on-new-details-emerge-about-israeli-strike-on-syrian-reactor-1.464033
  3. New details of Israel’s 2007 attack on the Syrian Nuclear reactor emerge, Richard Clements, 2012. http://theaviationist.com/2012/09/10/op-orchard/
  4. China, U.S. Chase Air-to-Air Cyber Weapon, David A. Fulghum, 2012. http://aviationweek.com/defense/china-us-chase-air-air-cyber-weapon
  5. The E-2D Advanced Hawkeye Stays On-Track, Jan Tegler, 2011. http://www.defensemedianetwork.com/stories/the-e-2d-advanced-hawkeye-stays-on-track/
  6. Active Electronically Steered Arrays A Maturing Technology, Carlo Kopp, 2002. 
  7. http://www.ausairpower.net/aesa-intro.html 
  8. Aerospace System Improvements Enabled by Modern Phased Array Radar, Northrop Grumman Electronic Systems, 2002.  http://www.northropgrumman.com/Capabilities/MESA/Documents/aesa_techpaper.pdf
  9. Phazotron Zhuk AE/ASE Assessing Russia's First Fighter AESA, Carlo Kopp, 2012.  http://www.ausairpower.net/APA-Zhuk-AE-Analysis.html#mozTocId563567
  10. ‘A God’s Eye View Of The Battlefield:’ Gen. Hostage On The F-35, Colin Clark, 2014.  http://breakingdefense.com/2014/06/a-gods-eye-view-of-the-battlefield-gen-hostage-on-the-f-35/3/
  11. Lockheed’s Secret ‘Project Missouri’ Links F-22, F-35, Amy Butler, 2014. http://aviationweek.com/awin/lockheed-s-secret-project-missouri-links-f-22-f-35
  12. Talking Stealth: USAF Pushes for 5th to 4th 'Gateway', Amy Butler, 2013.  http://aviationweek.com/blog/talking-stealth-usaf-pushes-5th-4th-gateway
  13. JSF: Integrated Avionics Par Excellence, Charlotte Adams, 2003.  http://www.aviationtoday.com/av/issue/feature/JSF-Integrated-Avionics-Par-Excellence_1067.html#.U7tVmfldUrX 
  14. F-35 Electronic Warfare Suite: More Than Self-Protection, Ron Sherman, 2006.  http://www.aviationtoday.com/av/military/F-35-Electronic-Warfare-Suite-More-Than-Self-Protection_845.html#.U7tVn_ldUrX
  15. FIGHTER EW, Bill Sweetman, 2000.                                                                                   http://www.f-16.net/forum/viewtopic.php?t=9268
  16. F-35 as ISR collector, Dave Majumdar, 2010.  http://www.defensenews.com/article/20101101/C4ISR02/11010309/F-35-ISR-collector
  17. Inside the Navy’s Next Air War, Dave Majumdar and Sam LaGrone, 2014. http://news.usni.org/2014/01/23/navys-next-air-war
  18. ANALYSIS: Northrop, Lockheed vie to connect F-22 to airborne network, Stephen Trimble, 2014. http://www.flightglobal.com/news/articles/analysis-northrop-lockheed-vie-to-connect-f-22-to-airborne-400181/
  19. Navy: F-35C Will Be Eyes and Ears of the Fleet, Dave Majumdar, 2013. http://news.usni.org/2013/12/31/f-35c-will-eyes-ears-fleet 
  20. Introducing the USAF’s airborne networking future, Stephen Trimble, 2008. http://www.flightglobal.com/blogs/the-dewline/2008/09/introducing-the-usafs-airborne/
  21. F-22 Raptor: Capabilities and Controversies, Defense Industry Daily, 2013. http://www.defenseindustrydaily.com/f-22-raptor-capabilities-and-controversies-019069/
  22. F-35 Enters Operational Testing at Edwards and Nellis Air Force Bases, Defense Update, 2013. http://defense-update.com/20130318_edwards-afb-airmen-begin-f-35-operational-testing.html#.U7Svb_ldUrV 
  23. Simulation plays vital role in building F-35 tactics and aircraft development, Dave Majumdar, 2012.  http://www.flightglobal.com/news/articles/simulation-plays-vital-role-in-building-f-35-tactics-and-aircraft-379336/