Israel’s Military Occupation: Fighting a weak for far too long

Israel’s growing security needs and recent moves is drawing harsh conclusions and asking difficult questions. Growing security concerns – dealing with Iran nuclear power, growing arsenal of Hamas and hizbollah, recent over throw of Egypt’s hosni Mubarak-1979 peace treaty between Israel and Egypt.

Furthermore, Arrival of Iranian war ships in Mediterranean since 1979, has sowed signs of Tehran’s determination to expand it’s influence within the Mediterranean region.

Recently Israel Air force has ordered 20 American F-35 fighter jets most advanced jets, navy will receive two new submarines, and Israel pouring money into missile defence systems (with Arrow 3 on it’s way) and spurring up the land force capabilities.

In years in israelis the army has lost some of it’s lustre after a string of scandals involving it’s leaders (example of some incidents major of all was the Attack on gaza aid flotilla. Some argue the threat today to israel is not invasion or battlefield defeat instead it’s a long term erosion of Israel legitimacy

Combination of conventional and non conventional warfare, new approach combination of political and military elements has made Israel to think differently which is forcing the nation to think aggressively. Military personnel are constantly engaged in deep thoughts and argument to extend military power within the region to address the nature of war Israel is about to face. So what exactly is in those mind, may be the following:

– Estimate of hizbollah’s rocket arsenal
– their target strength and Israel cities
– fighting a weak for far too long
– what is there to loose and to gain
– IDF room of manoeuvre is shrinking (fighting against weak)

So how effective is this fighter jets and submarines contracts If the threat is to the cities? One thing to look in things contracts and extent of Israel’s military budget is best taken by Comparing the military spending of Israel against it’s neighbours Egypt, Syria, Jordan, Iran lebanon. Best here is too have an Insight into the politics and the military -sheer number of former military leaders in politics, you will be surprised by the inclusion of high profile military officers in what’s called a typical civilian Market.

The Israel Navy is making advanced preparations to absorb two new German-made Dolphin-class submarines, IDF journal Bamachaneh reported in its latest issue. The number of soldiers selected for submarine warfare has grown by 30% in the latest IDF recruitment batches, in order to man the additional submarines.

The Navy currently has three submarines, also of the Dolphin class, so the addition of two subs means that the force is growing 66% bigger. “We are in mid-process and are slowly adding more crews to be trained for service in the submarines,” explained Naval Instruction Base Commander Col. Ronen Nimni. “We are also taking care to add crew commanders who closely mentor the soldiers.”

More officers are being trained for submarine posts as well. The number of cadets who will be trained for submarine command positions is rising by 35%.

“The missiles, part of Israel’s estimated 100-strong nuclear arsenal, reportedly have a range of up to 800 miles. The subs probably cannot hit Iran without passing through the Suez into the Red Sea and ultimately the Indian Ocean. The Red Sea is also the best route to the Gulf of Oman, where Israeli ships and submarines might enforce a blockade of Iran, during wartime.”

In November 2005, it was announced that Germany would allow the sale of two new Dolphin Class submarines to Israel. In July 2006, Israel placed a contract for two additional Dolphin submarines with an option on a third. The new submarines will have air-independent propulsion (AIP) systems, which allow them to stay submerged for a much longer period. Delivery of the first vessel is expected in 2012.

Dolphin Class Submarines

Based at Haifa, the Israeli Navy (IN) currently operates three modern, diesel-electric, Dolphin-class submarines. Two additional Dolphin-class submarines have also been ordered and are scheduled to be delivered before 2012. In December 2003, two of Israel’s three decommissioned Gal-class submarines arrived in Kiel for refits and modernization at Germany’s Howaldtswerke-Deutsche Werft. Although the original plan was to recommission the Gal-class, it was later decided to search for a potential buyer.

Israel in world’s Politics

Israel has never acknowledged publicly that it is a nuclear-weapons state, but it has also never signed the Nuclear Non-Proliferation Treaty (NPT). Now the Arabs, led by Egypt, are demanding that Israel do so or they will sabotage the future of the NPT regime

It is also abundantly clear that Israel’s nuclear capability has not kept its enemies from attacking. Iranian-backed terrorist groups Hezbollah in Lebanon and Hamas in Gaza and the West Bank have both fired rockets into Israel in two recent wars despite the country’s possession of nuclear weapons that could obliterate them all. This too is no surprise. Other atomic-weapons states, including America, have found that their nuclear deterrents do not prevent conventional war or terrorism. But they can prevent massive retaliation.

ISRAEL SEES its nuclear monopoly as a key factor in its security. Successive Israeli governments have thus ensured that no other state in the Middle East becomes nuclear armed.

The only exception to the rule is Pakistan—the one Muslim state which has developed a nuclear arsenal. But in this case we are talking about a geographically distant country, and one that has never participated in military operations against Israel. Islamabad developed its bomb primarily during the era of Mohammad Zia ul-Haq’s dictatorship in the 1980s, when it was closely allied with the United States and fighting the Soviets in Afghanistan. A. Q. Khan, the father of the Pakistani bomb, has claimed that Zia warned Israel that if it tried to interfere with Pakistan’s program he would destroy Tel Aviv. When Islamabad did test its bombs in 1998, it tried to argue that Israel was on the verge of attacking its nuclear facilities and the tests were in self-defense. The charade of blaming Israel fooled no one.

ISRAEL NOW faces the biggest-ever challenge to its monopoly on the bomb in the Middle East from Iran. For Israel, Tehran is a dangerous opponent, close and threatening. There is a virtually unanimous consensus in Israel that Iran cannot be allowed to acquire nuclear weapons. From left to right, Israelis see an existential threat to their very survival. Current Prime Minister Benjamin Netanyahu argued at the Brookings Institution’s Saban Forum in Jerusalem in 2007 that Iran is a “crazy,” even suicidal, state that will be prepared to sacrifice millions of its own citizens in a nuclear exchange with Israel.

It is clear from statements of Israeli military and intelligence officials and numerous press leaks that planning for a military operation to prevent Iran from acquiring nuclear weapons is well under way in Israel

It is certainly a challenging one. Distance alone makes Iran a much more difficult target than Iraq or Syria. The most direct route from Israel to Iran’s Natanz facility is roughly 1,750 kilometers across Jordan and Iraq. The alternatives via Turkish airspace (over 2,200 kilometers) or Saudi airspace (over 2,400 kilometers) would also put the attack force into the skies of American allies equipped with American fighter aircraft. Moreover, unlike Iraq and Syria, but like Pakistan, the Iranian program is dispersed throughout several facilities and sites around the country, some of which are underground and hardened

Iran will almost certainly retaliate against both U.S. and Israeli targets. To demonstrate its retaliatory prowess, Iran has already fired salvos of test missiles (some of which are capable of striking Israel), and Iranian leaders have warned they would respond to an attack by either Israel or the United States with attacks against Tel Aviv, U.S. ships and facilities in the Persian Gulf, and other targets. Even if Iran chooses to retaliate in less risky ways, it could respond indirectly by encouraging Hezbollah attacks against Israel and Shia militia attacks against U.S. forces in Iraq, as well as terrorist attacks against American and Israeli targets in the Middle East and beyond.

America’s greatest vulnerability would be in Afghanistan. Iran could easily increase its assistance to the Taliban and make the already-difficult Afghan mission much more complicated. Western Afghanistan is especially vulnerable to Iranian mischief, and NATO has few troops there to cover a vast area. President Obama would have to send more, not fewer, troops to fight that war.

Making matters worse, considering the likely violent ramifications, even a successful Israeli raid would only delay Iran’s nuclear program, not eliminate it entirely. In fact, some Israeli intelligence officials suspect that delay would only be a year or so. Thus the United States would still need a strategy to deal with the basic problem of Iran’s capabilities after an attack, but in a much more complicated diplomatic context since Tehran would be able to argue it was the victim of aggression and probably would renounce its NPT commitments. Support for the existing sanctions on Iran after a strike would likely evaporate.

Of course, Israel’s own nuclear arsenal should be sufficient to deter Iran, but an American nuclear guarantee would add an extra measure of assurance to Israelis. If the United States guarantees Israel a nuclear umbrella, then Iran knows no matter what damage it may inflict on Israel, Washington will be able to retaliate with overwhelming force. Iran would have no delivery system capable of striking back at the U.S. homeland. It would be the target of both whatever residual capability Israel retained and the vast American nuclear arsenal. That is a deterrent indeed.

Already the United States has been deeply involved in building Israel’s defense against an Iranian missile strike. For almost two decades the Pentagon has been working closely with Israel to perfect the Arrow anti-tactical ballistic-missile (ATBM) system. The two countries have shared extensive technology on the question of ATBMs, including integrating Israel into the most advanced American early-warning radar systems to provide the earliest possible alert of an incoming attack. This defensive cooperation should be continued and enhanced

How active USA needs to be?

The next step would be to ensure Israel has the delivery systems that would safeguard a second-strike capability. The F-15I probably already does so for the immediate future, but it is worth examining the wisdom of providing the F-22 stealth aircraft to the IDF as an even-more-sophisticated attack system that would be able to assure Israel’s deterrence far into the future. Prime Minister Barak raised this issue with President Clinton at the Camp David summit in 2000, and it too should be reexamined. We might look at providing Israel with advanced cruise-missile technology or even nuclear-powered submarines with missile capabilities to enhance its capacity to launch from platforms at sea.

THE ERA of Israel’s monopoly on nuclear weapons in the Middle East is probably coming to an end. Israel will still have a larger arsenal than any of its neighbors, including Iran, for years if not decades. It will face threats of terror and conventional attack, but it already faces those. With American help it can enhance its deterrence capabilities considerably. It has no reason to lose its self-confidence. But to avoid the potential for all-out war not only between Israel and Iran but also between the United States and the Islamic Republic, Washington needs to act now. Only by enhancing Israel’s nuclear capability will America be able to strongly and credibly deter an Israeli attack on Tehran’s facilities.


U.S. Central Intelligence Agency, Special National Intelligence Estimate: Prospects for Further Proliferation of Nuclear Weapons, SNIE Number 4-1-74, August 23, 1974, declassified DocID: 1472492.

This argument was made by the expert the London Sunday Times called in to debrief Vanunu, Frank Barnaby, in his book The Invisible Bomb: The Nuclear Arms Race in the Middle East (London: Taurus, 1989).

See Avi Shlaim, Lion Of Jordan: The Life of King Hussein in War and Peace (London: Penguin, 2007): 508.

Barton Gellman, “Israel Gave Key Help to UN Team in Iraq,” Washington Post, September 29, 1998.

Adaption (Bruce Riedel – a senior fellow in the Saban Center for Middle East Policy at the Brookings Institution. A career CIA officer, he has advised four presidents on Middle East and South Asian issues in the White House on the staff of the NSC.)

Leave a comment

Filed under AARGM, AGm-113 Hellfire, Air Defence, Al-Qaeda, Anti-ship ballistic missile, Asymmetric Weapons, Ballistic missiles, Bulletin of Atomic Scientists, CIA, Cold War, Drones, F-16, F-22, F-22 raptor, F-35, Gulf War, HARM, Iran, Iran's Air Defence and Missile System, Iranian Defense Ministry, Iraq, Islamabad, London, Muslim World, NATO, Navy tactical air-launched decoys, New York Times, Nuclear Doctrine, Nuclear Security Summit 2010, Nuclear Weapon, Pakistan, Saudi Arabia, Seattle Times, Silent War in Pakistan, Sukhoi PAK-FA, UAV, United Nations, US Department of Defense, War on Terror, Wild Weasels

Gulf to Impose No-fly-zone over Libya

Riad Kahwaji, chief executive of INEGMA, quotes retired United Arab Emirates air force chief Maj Gen Khaled Al-Bu Ainnain:

“The UAE Air Force can deploy couple of squadrons – one F-16 Block 60 and another Mirage 2000-9 – the Saudi Air Force can deploy a couple of F-15S squadrons and Egypt a couple of F-16 squadrons out of Mersi Matrouh Air Base in western Egypt,” Al-Bu Ainnain said. “This would provide 120 fighters and attack aircrafts that would be backed with airborne early warning planes like Egyptian E-2C Hawkeye or Saudi AWACS, some unmanned aerial vehicles (UAV) for reconnaissance, and air-refueling tankers from Saudi Arabia and couple of Egyptian or UAE helicopter squadrons composed of Apache Longbow gunships, Blackhawks and Chinook helicopters, for search and rescue missions.”

Crews and troops needed for the operation could be quickly airlifted to western Egypt, and even Algeria, within hours using a large fleet of UAE and Egyptian C-130 and Qatari C-17 transporters.

To some this may be a good idea, but I am certainly sure that there are some out there who see gulf states having no incentive for Libyan rebellion to succeed. To some extent they are right but I am not convinced that west has a positive incentive for this to succeed. NATO for sure is looking beyond and can achieve a lot by imposing no fly zone over Libya. Is Libya next Iraq? Or aren’t gulf state aware if potential threats this uprising can result within it’s own states? So who has most to achieve from this imposition, the west or gulf? Would gulf states like to see Qadafi going down by supporting rebels? It’s dodgy right?


Filed under Gulf War, NATO, US Air Force, US Department of Defense, War on Terror

A Chinese Stealth Challenge? Beginning of Stealth Arms Race

Several experts said the prototype's body appeared to borrow from the F-22 and other U.S. stealth aircraft, but they couldn't tell from the photographs how advanced it was in terms of avionics, composite materials or other key aspects of stealth technology.

I am little busy these days so please hold on a next post in series “Nuclear Power Dilemma” will be up soon. Meanwhile, read the following two pieces appeared in New Scientist and The Wall Street Journal, both making same excuses, and seems to be in highly nervous. China’s J-20, stealth aircraft, is it really stealth or just looked stealthy? One of my posts last year I referenced to one Chinese military source citing the revelation of stealth aircraft and aircraft carrier by China. Though the quoted time I put was around 10 years according to Chinese authorities, but this I don’t really think is applicable. From my opinion, China is still far away in stealth arms race, however, I really do hope that J-20 is in real a handy stealth aircraft and waiting anxiously for more on the issue. Anyway, have a read, I will soon update the blog with my recent post.

Has China’s new jet launched a stealth arms race?

New Scientist

China’s first flight test of its new high-tech J-20 stealth military jet on 11 January has drawn a lot of attention, particularly because it came during the visit of US defense secretary Robert Gates. What it means is another question, and the answers are complex. Military analysts had known China was developing a combat plane in the class of the US F-22 Raptor stealth fighter, but they had not expected it to make its first appearance in December, Aviation Week and Space Technology reported. Several high-speed ground tests, in which the craft’s front wheel rose off the ground, preceded the first flight.

China has released videos of the new jet on the ground, taking off, and landing at Chengdu. The New York Times quoted a Hong Kong analyst as saying the plane flew for 15 minutes over the airfield. With two distinctive angled tail fins like those of the F-22, it’s clearly intended to be stealthy. The Times also reports it is intended carry missiles and fly long distances when refueled in the air. The demonstration worries some analysts because it’s the first aircraft to challenge the performance of the F-22, the top of the US air force’s fleet. “We have become accustomed to a world where our air power is dominant,” Rand Corporation analyst Roger Cliff told Newsweek. “But that dominance is now in question.” Once the J-20 is deployed, in that scenario, US top guns would lose their high-performance stealth advantage and no longer rule the skies. o so fast, says Aviation Week. New, more powerful radars using active electronically scaled arrays can pick up fainter and fainter targets, and are fast catching up to stealth technology. “Anti-stealth will bring into question all stealth designs,” it says, hinting that the US may already have airborne radars able to spot stealth aircraft.

Moreover, perfecting stealth technology takes time. The US started its F-22 programme in the 1980s. To an experienced eye, the stealthy look of the Chinese jet “is just sort of cobbled together,” Teal group analyst Richard Aboulafia told The Wall Street Journal . He thinks China may be able to deploy the new aircraft in a decade, but by then the US should have better technology.

That sounds eerily familiar. We used to call it an arms race.

Actual Article

China’s J-20 Fighter: Stealthy or Just Stealthy-Looking?

The Wall Street Journal

When the First grainy images of China’s J-20 fighter appeared online, they seemed to confirm the fears of some China watchers: Beijing appeared to be on track to develop a “fifth generation” aircraft that featured the radar-eluding properties of advanced U.S. aircraft like the F-22 Raptor. But exactly how stealthy is the J-20? And does it mean that China can challenge the U.S. for control of the skies? In an interview with The Wall Street Journal, Richard Aboulafia, an aviation analyst with the Teal Group, an aerospace and defense consulting firm, said China is still years away from perfecting stealth aircraft. “It’s certainly stealthy-looking,” Mr. Aboulafia said. It looks like it’s got some of the faceting and some of the shaping that characterizes the front of the F-22, for example. “But then you look the details and you realize this thing is just sort of cobbled together,” he added. Take, for instance, the canards: forewings close to the nose of the aircraft that provide maneuverability. According to Mr. Aboulafia, “There’s no better way of guaranteeing a radar reflection and compromise of stealth” than adding canards to the aircraft. The same goes for the engine nozzles, which Mr. Aboulafia said were clearly not designed to be stealthy, as well the large overall size of the aircraft. Still, appearance of the J-20 prototype was a dramatic prelude to Chinese President Hu Jintao’s visit to Washington this week. But Mr. Aboulafia said that China still lacks the command-and-control networks, aerial refueling capabilities and other systems that allow the U.S. to project air power around the globe. What China does seem to be on track to produce, Mr. Aboulafia said, were aircraft that may eventually be on par with fighters like the F-22, which was designed by the U.S. in the 1980s. “It’s quite possible that in 10 years they have a functioning equivalent of the F-22, but by then, the West will have moved on to something far more impressive,” he said.

Actual Article

China’s New Stealth Race

And off-course don’t forget to hit a review of China’s New Stealth Race, first published after appearance of J-20 on TV on Wall Street Journal U.S. officials played down Chinese advances on the plane, which American intelligence agencies believe will likely be operational around 2018. “We are aware that the Chinese have recently been conducting taxi tests and there are photos of it,” said Pentagon spokesman Col. David Lapan. “We know they are working on a fifth-generation fighter but progress appears to be uneven.” China has made rapid progress in developing a capability to produce advanced weapons, also including unmanned aerial vehicles, after decades of importing and reverse engineering Russian arms. The photographs throw a fresh spotlight on the sensitive issue of China’s military modernization just as Washington and Beijing try to improve relations following a series of public disputes in 2010. The Chinese prototype looks like it has “the potential to be a competitor with the F-22 and to be decisively superior to the F-35,” said Mr. Fisher. The J-20 has two engines, like the F-22, and is about the same size, while the F-35 is smaller and has only one engine. China’s stealth-fighter program has implications also for Japan, which is considering buying F-35s, and for India, which last month firmed up a deal with Russia to jointly develop and manufacture a stealth fighter.

Wrap Up

The J-20 currently has two prototypes for test flight. One use the Russian AL-31 engines, and the other use the Chinese WS-10G engines, which are newer and provide more thrust. The Chinese counterpart of the X-37B, named “Shenlong”, did make the maiden flight in 2010. The program is very secretive and rarely known to the outside world. The entire J-20 project were created to defeat the F-22, and chances are, if a common analyst can think of a problem, real aerospace engineers would have thought of it too, and then found a solution. America had a head start, with post war German technology and brainpower transfer taking a large portion of the credit, however head start will only give you the lead for a while, its the smarter ones that’ll lead int he long run. As Professor Keith Hayward, Head of Research, Royal Aeronautical Society, notes in an upcoming analysis of the Chinese aerospace industry for the February issue of Aerospace International magazine: “China’s wider commercial relationships with developing world states are also providing useful leverage in forging deals.” China, then wants to move from just producing aircraft for its own domestic consumption, and a red-hot product like the J-20 could help it achieve this, far more than any slightly overweight A320 lookalike like the C919. Furthermore, with ‘Western-equivalent’ Chinese AAMs missiles to ‘bundle’ it with, any nation buying a J-20 would get an extremely capable weapon system – that will be ‘good enough’ for the majority of air forces and cheap enough to buy in siginficant numbers. Engines, too, are as of the moment an unknown. Previously reliant on Russia for engines any, development in powerplants would signify a greater leap forward than the pure airframe and some analysts have suggested a new Chinese engine, the Shenyang WS 15 may power the J-20. However, notably the J-20 also uses a divertless supersonic intake (DSI) and is only the third aircraft to sport this feature after the F-35 and Pakistan Air Force’s JF-17, suggesting that Chinese experience with this technology has been successful so far and it has brought benefits. armament China is now making great strides in guided weapons of all types. Its AMRAAM-type AAM, the PL-12, reportedly outranges the original US weapon. A short-range dogfight missile, the PL-ASR has been described as ‘very scary’ by one western missile expert. Meanwhile China is reported to be working on a long-range ramjet powered missile – the PL-13 comparable to Europe’s MBDA Meteor which, if introduced today, would outrange anything in the (white) US inventory. In short, Western missile experts in private are noticeably rattled by this progress and maintain that any gap in quality between western and Chinese air-to-air weaponry is fast closing.I sincerely hope best for J-20, by no means argue with Chinese abilities to compete in stealth race.

Leave a comment

Filed under Air Defence, Barak Obama, Chengdu Aircraft, China, China Air Force, China Defence, Chinease Defence, Chinese Defence, F-22, F-22 raptor, F-35, Fifth Generation Combat Aircraft, J-20, PAk-FA, Pakistan Aeronautical Complex, Pakistan Air Force, Pakistan Air Force F16, Pakistan Air Force JF 17, Pakistan Defence, Rao Qamar Suleman, Stealth China, Wall Street

Agile Beams: Active Electronically Scanned Array Radars

AESAs aim their "beam" by broadcasting radio energy that interfere constructively at certain angles in front of the antenna. They improve on the older passive electronically scanned radars by spreading their broadcasts out across a band of frequencies, which makes it very difficult to detect over background noise. AESAs allow ships and aircraft to broadcast powerful radar signals while still remaining stealthy. Above is AESA on F22

The AN/APG-77 is a multifunction radar installed on the F-22 Raptor fighter aircraft. It is one of the most advanced radar today. More than 100 APG-77 AESA radars have been produced to date by Northrop Grumman, and much of the technology developed for the APG-77 is being used in the APG-81 radar for the F-35 Lightning II. The APG-77v1 was installed on F-22 Raptors from Lot 5 and on. This provided full air-to-ground functionality (high-resolution synthetic aperture radar mapping, ground moving target indication and track (GMTI/GMTT), automatic cueing and recognition, combat identification, and many other advanced features).

APG-77 is based on Active Electronically Steered Array (AESA) technology. The AESA includes multiple individual active transmit/receive (T/R) elements within the antenna. Depending upon the precise implementation, there may be anywhere between 1000 and 2000 of these individual T/R elements which, together with the RF feed, comprise the AESA antenna. As for the passive ESA, these elements are highly redundant and the radar can continue to operate with a sizeable percentage of the devices inoperative. This graceful redundancy feature means that the radar antenna is extremely reliable; it has been claimed that an AESA antenna will outlast the host aircraft. The fact that the transmitter elements reside in the antenna itself means there is no standalone transmitter – there is an exciter but that is all. As before, there is clearly a need for a receiver as well as an RDP and signal processor. The active T/R elements are controlled in the same way as the phase shifters on the passive ESA, either by using a beam-steering computer (BSC) or by embedding the beam-steering function in the RDP.

The ability to control many individual T/R modules by software means confers the AESA with immense flexibility of which only a few examples are: First each radiating element may be controlled in terms of amplitude and phase, and this provides superior beam-shaping capabilities for advanced radar modes such as terrainfollowing, synthetic aperture radar (SAR) and inverse SAR (ISAR) modes. Secondly Multiple independently steered beams may be configured using partitioned parts of the multidevice array. Thirdly If suitable care is taken in the design of the T/R module, independent steerable beams operating on different frequencies may be accommodated and Finally The signal losses experienced by the individual T/R cell approach used in the AESA also bring considerable advantages in noise reduction, and this is reflected in improved radar performance.

The AN/APG-80 system is described as "agile beam", and can perform air-to-air, search-and-track, air-to-ground targeting and aircraft terrain-following functions simultaneously and for multiple targets. As a SAR system utilizing NG's fourth-generation transmitter/receiver technologies, it has a higher reliability and twice the range of older, mechanically-scanned AN/APG-68 radar systems. Above is F-16 APG-80 Radar

One dramatic improvement is the noise figure; it is especially significant achieving such an improvement so early in the RF front end. This results in a remarkable range improvement for the AESA radar. A number of US fighter aircraft are being fitted or retrofitted with AESA radars, these are F-22 Raptor, F-18E/F (Upgrade version) fitted with AN/APG-79, F-16E/F (Block 60) fitted with AN/APG-80, F-15 and F-35 fitted with AN/APG-81. Taking for example F-16, it is interesting to see a dofference in performance between two batches (Block 50) and Block 60. Former had target detection radar range of 50 miles, which was improved to 70 miles with AESA radards (for reference F-22 covers 125miles range). The F-16 Block 60 (now the F-16E/F) shows an improvement from 45 to 70 nm (þ55%), while the F-15C range has increased from 60 to 90 nm (þ50%). Apart from the obvious improvement in range, it has been stated by a highly authentic source that AESA radar confers 10–30 times more in radar operational capability compared with a conventional radar (Report of the Defense Science Board Task Force, 2001).

The F-16E (single seat) and F-16F (two seat) are newer F-16 variants. The Block 60 version is based on the F-16C/D Block 50/52 and has been developed especially for the United Arab Emirates (UAE). It features improved AN/APG-80 Active Electronically Scanned Array (AESA) radar, avionics, conformal fuel tanks (CFTs), and the more powerful GE F110-132 engine. However the batch bought by Pakistan Air Force (F-16C/D) is equipped with AN/APG-68 (V)9 Radar Systems. Only the Block 60 aircraft, destined for the UAE, are to be equipped with a more advanced version – the Active Electronically Scanned Array (AESA) radar. The APG-68(V)9 offers 30 percent increase in detection range, improved search-while-track mode (four vs. two tracked targets) and larger search volume and improved track while scan performance. Its single target track performance has also been improved. On air/ground missions, the new radar becomes an effective sensor, utilizing its high-resolution synthetic aperture radar mode, which allows the pilot to locate and recognize tactical ground targets from considerable distances. Although previous radars had some Synthetic Aperture Radar (SAR) capabilities, the new version generates imagery-class (2 feet resolution) high resolutions pictures, comparable to pictures delivered by the most modern commercial satellites. These pictures can be acquired from very long range, at all weather conditions and provide an effective, real-time source for the targeting of long range, precision guided weapons. The radar also has increased detection range in sea surveillance mode, and enhanced ground moving target identification and mappinc capability. The radar features an inertial measurement unit that improves dynamic tracking performance and provides an auto-boresight capability, which increases accuracy.


Filed under AESA, APG-68, APG-80, Electronic Warfare, F-16, F-22, F-22 raptor, F-35, F/A-18, Fifth Generation Combat Aircraft, Flight Simulation, FLIR Systems, Foreign Office Pakistan, Lockheed martin F-16, Pakistan, Pakistan Aeronautical Complex, Pakistan Air Force, Pakistan Air Force F16, Pakistan Air Force JF 17, Pakistan Chief of Army Staff, Pakistan Defence, Pakistan-Afghnistan Border, RADAR, Radars, Radio Frequency, Saudi Arabia, Saudi Aviation, Sixth Generation Fighter Jet, US Department of Defense, US Navy

Air Power Pakistan: Implementations of Network Centric Warfare

'I am well aware of Air developments in other countries and my Government is determined that the Royal Pakistan Air Force will not lag behind. M A Jinnah

This post is an effort to understand and articulate the power of information superiority in warfare from a Joint perspective. War is a product of its age. The tools and tactics of how we fight have always evolved along with technology. Often in the past, military organizations pioneered both the development of technology and its application. Such is not the case today. The advant of Information Technology, has changed the meaning of war. As I highlighted in some of my previous posts War today is no more same as war few decades back – here I am pointing to Electronic Warfare, Network Centric Warfare, Use of Artificial Intelligence in Battlefield, Unmanned Vehicles and so on. This post however, is to see how Network Centric Warfare (NCW) embodies the characteristics of the Information Age; and to identify the challenges in transforming this concept into a real operational capability. For more on Electronic Warfare and Artificial Intelligence see my following posts: Intellegent Warfare Electronic Support Measures and War Toys – Artificial Intelligence on Battlefield. I intend to show that How Well did Pakistan Air Force understands the Network Centric Warfare.

Society has changed. The underlying economics and technologies have changed. So we should be surprised if Global forces’ did not. For nearly 200 years, the tools and tactics of how we fight have evolved with military technologies. Now, fundamental changes are affecting the very character of war. Who can make war is changing as a result of weapons proliferation and the fact that the tools of war increasingly are marketplace commodities. By extension, these affect the where, the when, and the how of war. In 1998, U.S Navy published a report on the origin of Network Centric Warfare and how U.S Society and Business has adapted it. This report pointed out the transition from “platform-centric warfare” to “network-centric warfare”: It further goes on and suggested:

Network-centric warfare and all of its associated revolutions in military affairs grow out of and draw their power from the fundamental changes in American society. These changes have been dominated by the co-evolution of economics, information technology, and business processes and organizations, and they are linked by three themes:

– The shift in focus from the platform to the network
– The shift from viewing actors as independent to viewing them as part of a continuously adapting ecosystem
– The importance of making strategic choices to adapt or even survive in such changing ecosystems

These changes in the dimensions of time and space are increasing the pace of events, or operating tempo, in many different environments. Responsiveness and agility are fast becoming the critical attributes for organizations hoping to survive and prosper in the Information Age. With little observation of what is going around in Business, and civil sectors I don’r think that it is wrong to say that – the changes these affecting these organisations due to the advant of Information Technology are driven by changes in the environments they operate and capabilities they have in their disposal. Similarly, for military battle space has changed and become a case of Information Superiority. So what exactly is NCW and Why networking?

Network Centric Warfare

From a broad perspective the introduction of networking techniques into warfighting systems is the military equivalent of the digitisation and networking drive we observed in Western economies between 1985 and 1995. Military networking, especially between platforms, is far more challenging than industry networking due to the heavy reliance on wireless communications, high demand for security, and the need for resistance to hostile jamming. The demanding environmental requirements for military networking hardware are an issue in their own right.A high speed network permits error free transmission in a fraction of the time required for voice transmission, and permits transfer of a wide range of data formats. In a more technical sense, networking improves operational tempo (optempo) by accelerating the Observation-Orientation phases of Boyd’s Observation-Orientation-Decision-Action (OODA) loop. Identified during the 1970s by US Air Force strategist John Boyd, the OODA is an abstraction which describes the sequence of events whihc must take place in any military engagement. The opponnent must be observed to gather information, the attacker must orient himself to the situation or context, then decide and act accordingly.

Observation-Orientation-Decision are all about gathering information, distributing information, analysing information, understanding information and deciding how to act upon this information. The faster we can gather, distribute, analyse, understand information, the faster we can decide, and arguably the better we can decide how and when to act in combat. Networking is a mechanism via which the Observation-Orientation phases of the loop can be accelerated, and the Decision phase facilitated. Well implemented networking can contribute to improved effectiveness in other ways. One such technique is ‘self synchronisation’ which permits ‘directive control’. Rather than micromanage a warfighting asset with close control via a command link tether, warfighters are given significant autonomy, defined objectives, and allowed to take the initiative in how they meet these objectives.

NCW focuses on the combat power that can be generated from the effective linking or networking of the warfighting enterprise. It is characterized by the ability of geographically dispersed forces (consisting of entities) to create a high level of shared battlespace awareness that can be exploited via self-synchronization. Furthermore, NCW is transparent to mission, force size, and geography. The mathematical bottom line in NCW is a very simple one: networking can permit a significant improvement in operational tempo, where a shortage of targeting information is the bottleneck to achieving a high operational tempo, but networking itself has very little impact on the absolute ability of a force to deliver weapons against targets, that being constrained by the capabilities and number of combat platforms in use.

It can be argued that networking produce its greatest gains in combat effect during battlefied strike and close air support operations, especially against highly mobile and fleeting ground targets. No less interesting are the effects observed in demand for specific types of assets to support networked interdiction and strike operations. Air Power Australia – An Australian Defence THink tank, cites that: Bigger is better in the networked strike game, so much so that a recent discussion piece by US analyst Price Bingham in the ISR Journal predicted the demise of the classical battlefield interdiction tasked fighter-bomber, in favour of larger bombers and UCAVs. This is a direct challenge to the basic rationale for the Joint Strike Fighter family of battlefield interdiction and close air support fighters, and the longer term use of legacy designs like the F-16 and F/A-18 variants. According to those who are in favour of NCW, A key issue for all networking is the Intelligence-Surveillance-Reconnaissance capability supporting it. Networks like all computing systems obey the Garbage-In Garbage-Out rule – without accurate high quality ISR systems feeding the network, it is little more than high speed digital plumbing between platforms, with nothing useful to carry. However, one can equally finds the disadvantage of this In-Out system (i will come on this issue later).

U.S aside, Russia has capitalised on this by aggressively marketing ISR platforms like the A-50 AWACS, digital datalinking products – the Soviets were deeply enamoured of digital air defence networks – and counter ISR systems. The latter include long range AAMs like the R-172, R-37 and Kh-31 variants, as well as airborne and land mobile high power jamming equipment, and very long range SAMs like the S-400 and Imperator series. As the ranges of our sensors and weapons increase and as our ability to move information rapidly improves, we are no longer geographically constrained. Hence, in order to generate a concentrated effect, it is no longer necessary to concentrate forces.

The prerequisite for an NCW capability is the digitisation of combat platforms. A combat aircraft with a digital weapon system can be seamlessly integrated in an NCW environment by providing digital wireless connections to other platforms. Without the digital weapon system, and its internal computers, NCW is not implementable.

The term Network Centric Warfare also carries some baggage. By mistake, some have focused on communication networks, not on warfare or operations where the focus should rightly be.
Networks are merely a means to an end; they convey “stuff” from one place to another and they are the purview of technologists. NCW does not focus on network-centric computing and communications, but
rather focuses on information flows, the nature and characteristics of battlespace entities, and how they need to interact. NCW is all about deriving combat power from distributed interacting entities with significantly improved access to information.

There has been little effort to capitalise on the new technology of ad hoc network protocols, designed for self organising networks of mobile platforms, although the JTRS WNW effort looks promising. The DARPA GLOMO program in the late 1980s saw considerable seed money invested, but did not yield any publicised dramatic breakthroughs. Ad hoc networking remains a yet to be fully explored frontier in the networking domain, one which is apt to provide a decisive technology breakthrough for NCW.

Technological Challegnes

Security and Robustness of transmission, Transmission capacity, Message and signal routing, and Signal format and communications protocol compatibility are some issues concerning NCW. It is essential that dissimilar platforms and systems can communicate in an NCW environment. This problem extends not only to the use of disparate signal modulations and digital protocols, but to the use of partially incompatible implementations of what is ostensibly the same signal modulation or communications protocol.

Global Defence Industry


Most regional nations are now operating, deploying or shopping for Airborne Early Warning & Control (AEW&C) aircraft. Russia is actively marketing digital datalinks, like the TKS-2 and older APD-518, and marketing counter-ISR weapons like the Novator R-172 (KS-172) or Kh-31 series missiles. Russia is also marketing high power jamming equipment, especially pods using Digital RF Memory (DRFM) technology, and there is a good prospect of a Growler-ski based on the Su-32 materialising before the end of the decade.

United States of America

In practical terms, by 2010-2015 regional opponents without AEW&C, long range counter-ISR missiles and jamming pods are likely to be the obliging exception to the rule. US thinking is not surprisingly centred in using F/A-22As to sanitise airspace permitting unhindered use of ISR platforms and networks, and the program to replace the lost capabilities of the EF-111A Raven with the B-52J or EB-52, equipped with high power stand-off jamming equipment to disrupt opposing networks and ISR sensors.

Pakistan Airforce and Network Centric Warfare

NCW must be properly understood before it can be used as a basis for strategic planning decisions. Clearly this was not been the case in many key areas of the Pakistan’s MoD. The situation however changes in 2010.

The Saab 2000 Erieye AEW&C, developed for the Pakistan Air Force, on display

JF-17 operation, new batch of F-16, inclusion of Saab 2000 erieye, and ZDK 03 AWACS aircarfts are all part of step taken by Pakistan Air Force, to meet the NCW and Electronic Warfare requirements, which indeed are less than none. SAAB signed an 8 billion kronor provisional contract to supply 6 Saab 2000 erieye to Pakistan, which was finalized in June 2006 at four aircraft, one of which has been delivered to date. This aircraft (shown above) incorporates the Erieye Radar System, and Airborne Early Warning and Control System (AEWCS) and is based on based on the Active Electronically Scanned Array (AESA) radar.

The Erieye AEW&C mission system radar is an active, phased-array, pulse-Doppler sensor that can feed an onboard operator architecture or downlink data (via an associated datalink subsystem) to a ground-based air defence network. The system employs a large aperture, dual-sided antenna array housed in a dorsal ‘plank’ fairing. The antenna is fixed, and the beam is electronically scanned, which provides for improved detection and significantly enhanced tracking performance compared with radar-dome antenna systems. Erieye detects and tracks air and sea targets out to the horizon, and sometimes beyond this due to anomalous propagation — instrumented range has been measured at 450 km. Typical detection range against fighter-sized targets is approximately 425 km, in a 150° broadside sector, both sides of the aircraft. Outside these sectors, performance is reduced in forward and aft directions. Other system features include: Adaptive waveform generation (including digital, phase-coded pulse compression); Signal processing and target tracking; Track While Scan (TWS); Low sidelobe values (throughout the system’s angular coverage); Low- and medium-pulse repetition frequency operating modes; Frequency agility; Air-to-air and sea surveillance modes; and Target radar cross-section display.

Pakistan Air Force JF-17

JF-17 comprises of two VHF/UHF radios, one of them having capacity for data linking. The data link can be used to exchange data with ground control centres, AWACS/AEW aircraft and other combat aircraft also equipped with compatible data links. The ability to data link with other “nodes” such as aircraft and ground stations allows JF-17 to become part of a network, improving the situational awareness of the pilot as well as other entities in the network.

The JF-17 has a defensive aids system (DAS) made up of various integrated sub-systems. A radar warning receiver (RWR) gives data such as direction and proximity of enemy radars to the pilot and electronic warfare (EW) suite, housed in a fairing at the tip of the tail fin for greater coverage, that interferes with enemy radars. The EW suite is also linked to a missile approach warning (MAW) system to help it defend against radar-guided missiles. The MAW system uses several optical sensors mounted on the airframe (two of which can be seen at the base of the vertical stabiliser) that detect the rocket motors of missiles and gives 360 degree coverage. The DAS systems will also be enhanced by integration of a self-protection radar jamming pod which will be carried externally on one of the aircraft’s hardpoints. Electronic support measures and defensive aids are used extensively to gather information about threats or possible threats. DAS Systems – They can be used to launch devices (in some cases automatically) to counter direct threats against the aircraft. They are also used to determine the state of a threat and identify it. To my knowledge it uses KJ8602A Airborne Radar Warning Receiver. The KJ8602A airborne radar warning receiver (RWR) is designed to detect incoming radar signals; identify and characterise these signals to a specific threat; and alert the aircrew through the cockpit video/audio warning. The KJ8602A features several external antennae mounted on the vertical fin tip, both wingtips, and underneath the forward fuselage. Once the hostile radar signal is detected, the KJ8602A analyses those received signals and identify the signal sources according to the stored emitter identification data (EID), and alerts the pilot. The system can also automatically trigger the chaff/flare dispenser or other onboard ECM systems to counter the incoming threats.

The JF-17s in service with the PAF are fitted with an Italian Grifo S-7 multi-track, multi-mode, pulse Doppler radar radar. The radar has 25 working modes and a non-break-down time of 200 hours, and is capable of “look-down, shoot-down”, as well as for ground strike abilities. Alternatively, the aircraft can be fitted with the Thales RC400, GEC Marconi Blue Hawk, Russian Phazotron Zemchug/Kopyo, and Chinese indigenous KLJ-7 developed by Nanjing Research Institute of Electronics Technology (NRIET). The first 42 production aircraft currently being delivered to the Pakistan Air Force are equipped with the NRIET KLJ-7 radar. In December 2010, Pakistan Air Force’s Air Chief Marshal Rao Qamar Suleman announced that KLJ-7 radar will be built at Pakistan Aeronautical Complex (PAC), in Kamra, north of Islamabad

The KLJ-7 uses a mechanically-steered slotted array antenna and bears similarities with the various Russian radars imported in the 1990s. Russian radar design houses Phazotron and NIIP had worked closely in the past with the Chinese radar design bureaus and provided technical assistance as well as operational models of Russian-made radar sets that were used as benchmarks in the process of these Chinese firms developing their own design. Up to 20 units of the Phazotron Zhemchoug ('Pearl) radar were imported in the mid-1990s for evaluation along with 2 units of Phazotron (NIIR) RP-35, which is the upgraded version of the Zhemchoug

The KLJ-7 has multiple modes, both beyond-visual-range (BVR) and close-in air-to-air modes, ground surveillance modes and a robust anti-jamming capability. The radar can reportedly manage up to 40 targets, monitor up to 10 of them in track-while-scan (TWS) mode and simultaneously fire on two BVR targets. The detection range for targets with a radar cross-section of 5 square meters is stated to be ≥105 km (≥85 km in look-down mode). Surface sea targets can be detected at up to 135 km. It has been reported that KLJ-7 also has modes to support a range of NATO weaponry, including the Raytheon AIM-9 Sidewinder short-range and AIM-7 Sparrow medium-range air-to-air missiles. The RADAR operates at Ground Moving Target Indication/Ground Moving Target Track (GMTI/GMTT), Range While Search (RWS), Sea Single Target Track (SSTT), Synthetic Aperture Radar (SAR), Doppler Beam Sharpening (DBS), Situational Awareness Mode (SAM), Velocity Search (VS) and many other. Pakistan’s move to develop these RADARS at home, and extending their capibility to next level will surely provide them an advantage over its compitators.

Four Chinese ZDK-03 AEW&C aircraft have also been ordered. Which are PAF-specific version of the KJ-200, incorporating a Chinese AESA radar similar to the Erieye mounted on the Shaanxi Y-8F600 transport aircraft. Currently PAF’s No.24 Blinders squadron operates three Dassault Falcon 20 aircraft in the ELINT (Electronic signals intelligence) and ECM (Electronic countermeasures) roles. Former refers to intelligence-gathering by use of electronic sensors. Its primary focus lies on non-communications signals intelligence. The data gathered are typically pertinent to the electronics of an opponent’s defense network, especially the electronic parts such as radars, surface-to-air missile systems, aircraft, etc. ELINT can be used to detect ships and aircraft by their radar and other electromagnetic radiation; commanders have to make choices between not using radar (EMCON), intermittently using it, or using it and expecting to avoid defenses. ELINT can be collected from ground stations near the opponent’s territory, ships off their coast, aircraft near or in their airspace, or by satellite. However, ECM, are a subsection of electronic warfare which includes any sort of electrical or electronic device designed to trick or deceive radar, sonar or other detection systems, like infrared (IR) or lasers. It may be used both offensively and defensively to deny targeting information to an enemy. The system may make many separate targets appear to the enemy, or make the real target appear to disappear or move about randomly. It is used effectively to protect aircraft from guided missiles (refer to my precvious post for ECM and ESM).

The Shaanxi Y-8 or Yunshuji-8 aircraft is a medium size medium range transport aircraft produced by Shaanxi Aircraft Company in China, based on the Soviet Antonov An-12.

KJ-200, incorporates an Active Electronically Scanned Array (AESA) Radar (aka active phased array radar). This radar possess many advantages over conventional passive scanned radar, one is that the different modules can operate on different frequencies. Additionally, the solid-state transmitters are able to broadcast effectively at a much wider range of frequencies, giving AESAs the ability to change their operating frequency with every pulse sent out. AESAs can also produce beams that consist of many different frequencies at once, using post-processing of the combined signal from a number of transmitter-receiver modules (TRMs) to re-create a display as if there was a single powerful beam being sent. AESAs are so much more difficult to detect, and so much more useful in receiving signals from the targets, that they can broadcast continually and still have a very low chance of being detected. This allows the radar system to generate far more data than if it is being used only periodically, greatly improving overall system effectiveness. Similar type is featured on F-22 and F/A 18 Super Hornet.

Concluding Remarks

Critics of NCW argue that system is prone to Chaos, and thus link the system with Chaos Theory – to some extent they are right, but as I have mentioned earlier, system integration in NCW is no easy, and prone to may fatel error if neglected. As far as PAF analysis is concerned, I have treid my best to include what I could and keep it simple. However, I will include the advances from Navy side some other time. Also, if reader is interested to explore more about the Network Centric Warfare, please refer to US DoD Report to Congress and Thought Systems and Network Centric Warfare

Leave a comment

Filed under Chaos Theory, Dopplar Radar, Electronic Counter Measures, EMCON, Erieye radar, F-22, Foreign Office Pakistan, GMTI/GMTT, KJ8602A, KLJ-7, Network Centric Warfare, OODA, Pak-Af, Pakistan, Pakistan Aeronautical Complex, Pakistan Air Force, Pakistan Air Force F16, Pakistan Air Force JF 17, Pakistan Chief of Army Staff, Pakistan Defence, Pakistan Navy, Pakistan-China, Pakistan-India Wars, RADAR, Rao Qamar Suleman, RC400, Russia, S-300 Missiles, S-400 missiles, Saab 2000 Erieye, Saudi Arabia, Saudi Aviation, U.S DoD, ZDK 03

U-480 First Stealth Submarine: The Hunter Becomes the Hunted

“The Navy has both a tradition and a future–and we look with pride and confidence in both directions.” – Admiral George Anderson, CNO, 1 August 1961.

Another U-boat whcih was also coated with Alberich was "The Black Panther" - U-1105. The account of the attack on HMS Redmill and her evasion of her hunters following the attack is worth reading.

The inspiration of this post, comes from a novel published in 1984 (which I read just few years ago) – Tom Clancy’s The Hunt for Red October Red October – a fictitious modified Typhoon class submarine in the Tom Clancy novel who was built with a revolutionary stealth propulsion system called a “caterpillar drive”, which is described as a hydrojet system in the book. In the film (of same name) however, it is shown as being a magnetohydrodynamic drive. The drama of the story partially centers around the dual capabilities of this submarine. As a submarine of the Typhoon class, it carries many ballistic missiles armed with nuclear warheads. With a stealthy propulsion unit, it can no longer be detected by NATO naval vessels. As described in both the book and the film, these capabilities combine to create a horrific weapon, whereby the submarine could easily reach the coastal waters of a city, like Washington DC, fire its missiles, and destroy key targets before any government or military leaders could order a counterattack.

Before, I go into the science of MagnetoHydroDynamics (MHD) I would like to share a story, of what is known as U-480 – believed to be the First stealth submarines participated in World War II. This is how the story goes

The Story – U-480

In August 1944, during World War II, four Allied ships are mysteriously destroyed without warning off the coast of Southern England. Half a century later, off the Isle of Wight in the English Channel, the sea reveals a World War II German submarine with a design unlike any found before. Using cutting edge investigative techniques, a team of underwater detectives discover a story of invention and heroism, and a secret stealth technology. Submarine historian Innes McCartney identifies it as U-480, the first U-boat to go into successful action with a special coating that made it invisible to sonar, but which could not save the submarine from a fatal trap laid by the Allies.

By the end of the First World War the German Navy was one of the largest in the world. However, under the terms of the Versailles Treaty in 1919, the German government was restricted to vessels under 10,000 tons, forbidden to own submarines and allowed only 1,500 officers.  Above: GERMAN TYPE IX U-BOAT, THE U-505

In August 1944, during the 2nd World War, four Allied ships are mysteriously destroyed without warning off the coast of Southern England. Sixty years later, in the English Channel, 20 kilometres south west of the Isle of Wight, 55 metres down, the sea reveals a 2nd World War German submarine unlike any found before. Using revolutionary investigative techniques, a team of underwater detectives discover a story of invention and heroism, and a secret stealth technology. Identified as U-480, it was the first U-boat to go into successful action with a special coating that made it invisible to sonar. But not even this could save the submarine from a fatal trap set by the Allies.

The most effective submarine detection device the wartime Allied Navy develops is ASDIC. It sends out pulses of sound and listens for echoes from the thick steel hull of U-boats. As the war progressed, this and other techniques meant that U-boats from being the hunters became the hunted and the Germans began to lose the submarine war. To regain the upper hand, in August 1944, the Germans dispatch a very special submarine U-480 to lie in wait under the main shipping lanes that cross the English Channel. 4 ships, totalling 14,000 tonnes and including the Canadian warship, HMCS Alberni and the British minesweeper HMS Loyalty were sunk without warning. But how in one of the most heavily-patrolled sectors of the English Channel was the submarine able to make its fatal attacks completely undetected?

Dives down to the submarine 60 years later reveal it is covered in a strange rubber coating. Is this responsible for the submarine remaining undetected? Remarkably a crewmember of the U-480 survived the war and talks about life in the submarine and what he thought was the secret of its success. U480 was sunk by the RN Frigates Duckworth and Rowley who were escorting convoy BTC 78 at position 11 miles South West off Lands end
24 th February 1945

But the Allies had a plan to deal with these troublesome submarines. Only now do previously Top Secret files reveal the devious traps they laid and how they enticed the Germans to fall into them. Close examination of the hull of the U-boat shows how she was sunk – with all hands. The secret history of U-480 is followed from the revolutionary invention of the special coating that rendered her invisible, all the way to her brutal demise 55 metres down – and the only survivor finally hears what happened to his ship and shipmates. The wreck of U 480 was first discovered in 1998. Die Dokumentation von John Ruthven und Peter Bardehle begleitet die erste Tauchexpedition mit dem Berliner U-Boot-Historiker Axel Niestlé und rekonstruiert das Schicksal von Jägern und Gejagten im Winter 1944/1945. The documentation of John and Peter Ruthven Bardehle accompanies the first diving expedition with the Berlin U-boat historian Axel Niestlé and reconstructs the fate of hunter and hunted in the winter of 1944/1945. Der Film ist eine aufwendige internationale Koproduktion für die Sender ARTE, ITV , National Geographic Channel , History Television und SVT . The film is a complex international co-production for ARTE channel, ITV, National Geographic Channel, History Television and SVT.

Anti-Sonar Coating on U-480

To reduce the sonar echo of U-boats, the Germans experimented with sound absorbing synthetic rubber which coated the outer hull of the boats. Radar absorbing materials were also used to coat the snorkel heads. Alberich (rubber coating used on U-480) consisted of synthetic rubber sheets of about 4mm in thickness which had sound absorbing properties. The material was Oppanol which was secured to the outer hull with adhesives, much like an outer skin. Although no conclusive tests were performed, but it was claimed that the echo reflection of a U-boat with Alberich was reduced by about 15 percent. In addition, it also acted as a sound dampener, containing the U-boat’s own engine noise. Although the principle was a sound one, problems were encountered with the adhesive coat which was not strong enough to adhere the rubber sheet to the hull. This resulted in the sheets being partially washed off, which flapped in the wake of the ocean current, causing hydrodynamic resistance and noise. Further research into more reliable adhesives were conducted, but up to the end of the war, only a few U-boats had received this treatment. A further contribution was that treating the hull was a time consuming and laborious task. The first U-boat to receive Alberich was U-11, a Type II coastal boat for trials on its sound absorbing properties. On April 1940, the first operational U-boat was treated, U-67 a Type IXC which was just being laid down. Thereafter, problems with the adhesive prevented further treatments until late 1944, when U-480, a Type VII was tested again using a new adhesive. The results were satisfactory enough and it was decided that all new Type XXIIIs and XXVIs would receive this coating, but ultimately only one Type XXIII, U-4709 had been completed with the coating.

U-Boat Sonar Decoys

Submerged U-boats employed several devices to evade allied pursuers equipped with sonar. These consisted of decoys which resembled a submerged submarine and noise-makers to blackout the pursuer’s listening device. Bold Canisters – was a metal canister about 3.9 inches in diameter, filled with calcium hydride which gave off large quantities of gas when mixed with sea water. It was launched from a special tube and on release, sea water seeped into a special valve which reacted with the chemical. The valve would open and shut, causing the canister to stay at a certain depth until the compound was depleted in about 20 to 25 minutes. To underwater locating devices such as sonar, the resulting bubble cloud could resemble a submerged U-boat, and unless the sonar operator was especially skilled, it was often difficult to distinguish from a real target. The allies called this a “Submarine Bubble Target” (SBT). BOLD was widely used from 1942 onwards, with new and improved versions being developed until the end of the war. The last was BOLD 5, and was intended for use at depths of up to 200 meters. Siegmund was an anti-sonar device which emitted a series of deafening explosions and were intended to blackout the enemy’s listening gear. The U-boat would make its getaway by altering course or running at high speed during this short period.

Legacy of Red October

I will return the Red October, with the application of MagnetoHydroDynamic Drives in next post, so please do check back.

Leave a comment

Filed under Alberich, Anti-SONAR, German Navy, German U-Boat, Hunt For Red October, Sonar Decoys, Stealth Submarines, Typhoon Class, U-480, U-67, World War II Navy

Intellegent Warfare: Electronic Support Measures and Application of HARM Missile

USS KITTY HAWK (CV 63), At Sea (November 9, 2005) – Aviation Ordnanceman prepare to load a CATM-88 Harm missile onboard the USS Kitty Hawk (CV-63). While at sea, Kitty Hawk and Carrier Strike Group 5 will be participating in an annual exercise with the Japanese Maritime Self Defense Force. Currently underway in the western Pacific Ocean, Kitty Hawk Carrier Strike Group demonstrates power projection and sea control as the Navy's only permanently forward-deployed aircraft carrier strike group, operating from Yokosuka, Japan. U.S. Navy photo by Photographer’s Mate 3rd Class (AW) Jonathan Chandler.

After writing few posts discussing the technological influence on defence stratagies of different nation, this time I thought to go slightly technical. A reader may use this information as an extension of my discussion on Electronic Warfare – Electronic Warfare Operations Warfare has always been conducted by adversaries who have been at great pains to understand their enemy’s strengths and weaknesses in order to minimise the risk to their own forces and territory. The detection and interception of messages and the efforts to deceive the enemy have long been the task of the ‘secret service. As methods of communication developed, so too did methods of interception become more effective. Radar has developed from a mere detection mechanism to a means of surveillance and guidance. This post is focuses on gathering information on immediate threats which is performed by Electronic Support Measures (ECM)

MH-53 Pave Low helicopters prepare to take off for their final combat mission on Sept. 27, 2008, in Iraq. The MH-53, the largest and most technologically advanced helicopter in the Air Force with a record dating back to the Vietnam War, was retired from the Air Force inventory on Sept. 30, 2008

Electronic Warfare (EW) planning requires a broad understanding of enemy and friendly capabilities, tactics, and objectives. Employment of EW assets must be closely integrated into, and supportive of, the commander’s overall planning effort. This planning requires a multidisciplined approach with expertise from operations (ground, airborne, space), intelligence, logistics, weather, and information. Application of this sort of EW planning and employment was seen in Operation Desert Storm in 1991. three US Air Force MH-53J PAVE LOW helicopters (shown above) led nine US Army AH-64 Apache helicopters across the Saudi Arabia-Iraq border to attack two Iraqi early warning radar sites. Taking down these two sites opened the door for attacks across Iraq by F-117s, other coalition aircraft and Tomahawk missiles (shown below).

Block IV Cutaway - Raytheon

After the F-117s and cruise missiles came conventional aircraft. From 0355L to 0420L (H+55 to H+1:20) large numbers of USAF, USN, USMC, RSAF, and RAF aircraft smashed Iraqi air defenses and fields from H-3, an airfield located in western Iraq, to Ahmed Al Jaber, an airfield in occupied Kuwait. Two packages of aircraft, one a USN package from the Red Sea carriers and the other a USAF package from the south pointed directly at Baghdad. These “gorilla” packages were intended to seem threatening enough to force the Iraqis to hurl their air resources in defense. Air Force ground-launched BQM-34 and Navy tactical air-launched decoys (TALD) mimicked the radar return of conventional aircraft to further arouse Iraqi radar operators, many already confused by the absence of central control from Kari. Finally, radar-jamming aircraft radiated blanketing electronic emissions that drove the Iraqi radar operators to go to full power in an attempt to break through the interference. Then, the two incoming coalition flights revealed their true nature and pounced in a shrewd and devastating ruse.

The newest upgrade is a joint venture by the Italian Ministry of Defense and the US Department of Defense: the AGM-88E Advanced Anti Radiation Guided Missile (AARGM), produced by Alliant Techsystems.

What was unique here that, instead of bomb-carrying fighter-bombers, they were radar-killing electronic warriors carrying AGM-88 high-speed antiradiation missiles (HARMS) designed to home in on SAM and AAA radar (shown above). The AGM-88 High-speed Anti-Radiation Missile (HARM) is a tactical, air-to-surface missile designed to home in on electronic transmissions coming from surface-to-air radar systems. Originally developed by Texas Instruments (TI) as a replacement for the AGM-45 Shrike and AGM-78 Standard ARM system. Production was later taken over by Raytheon Corporation (RAYCO) when they purchased TI’s defense business. The AGM-88 can detect, attack and destroy a radar antenna or transmitter with minimal aircrew input. The proportional guidance system that homes in on enemy radar emissions has a fixed antenna and seeker head in the missile’s nose. A smokeless, solid-propellant, dual-thrust rocket motor propels the missile at speeds over Mach 2. HARM, a Navy-led program, was initially integrated onto the A-6E, A-7 and F/A-18 and later onto the EA-6B. USAF F-4G Wild Weasels alone expended dozens of HARMS in twenty minutes, while USN/USMC F/A-18s fired one hundred for the night. HARMS filled the air over Baghdad, the site of over one-half of Iraq’s SAM and AAA batteries. Foolishly, the Iraqis did not turn off their radars, even when the HARMS fireballed in their midst; as one USAF flight leader averred, ‘the emitters came on and stayed on for the entire flight of the missiles.’ This deadly surprise not only destroyed many Iraqi radars, it also terrified their operators. For the rest of the war, they showed great reluctance to use radar and often chose to launch their SAMs with optical or even no guidance.

High-speed Anti-Radiation Missile (HARM) – A Little Overview

The initial HARM attack and the F-117 bombings of the Kari system left Iraq’s integrated air defense system shattered, opening up the country so completely that, within days, coalition air-to-air tankers regularly operated in Iraqi airspace. Other non-stealthy aircraft pummeled Iraqi airfields. An anti-radiation missile (ARM) is a missile which is designed to detect and home in on an enemy radio emission source. Typically these are designed for use against an enemy radar, although jammers and even radios used for communication can also be targeted in this manner. This sort of weapons are key to EW inventory. The word “Radiation” here refers to Electromegnetic radiation, not nuclear. The missile is the direct descendant of the Shrike and Standard ARM missiles used in Vietnam. Most ARM designs to date have been intended for use against ground-based radars. Commonly carried by specialist aircraft in the SEAD (Suppression of Enemy Air Defense) role (known to the USAF as “Wild Weasels”), the primary purpose of this type of missile is to degrade enemy air defenses in the first period of a conflict in order to increase the chances of survival for the following waves of strike aircraft. They can also be used to quickly shut down unexpected SAM sites during a raid. Aircraft which fly with strike aircraft to protect them from enemy air defences often also carry cluster bombs and are known as a SEAD escort. The cluster bombs can be used to ensure that after the ARM disables the SAM system’s radar, the command post, missile launchers, and other components or equipment are also destroyed to guarantee the SAM site stays down.

The R-27 is manufactured in infrared-homing (R-27T), semi-active-radar-homing (R-27R), and active-radar-homing (R-27AE) versions, in both Russia and the Ukraine. The R-27 missile is carried by the Mikoyan MiG-29 and Sukhoi Su-27 fighters, and some of the later-model MiG-23MLD fighters have also been adapted to carry it.

The above account of the First Night of Operation Desert Storm was taken from the Decisive Force: Strategic Bombing in the Gulf War by Richard G. Davis. More recently, air-to-air ARM designs have begun to appear, notably the Russian Vympel R-27P. Such missiles have several advantages over other missile guidance techniques; they do not trigger radar warning receivers (conferring a measure of surprise), and they can have a longer range (since battery life of the seeker head is the limiting factor on the range of most active radar homing systems).

Electronic Support Measures

Technically ESM consists of a collection of senstive antennas designed to detect signals in different frequency bands. Often these antennas are grouped at aircraft’s wing tip pod, which allows a wide angle view without causing too much obstruction as well as to enable a fix on the signal source to obtain an accurate Dircection of Arrival (DoA) of the signal. An effective ESM system rapidly identifies the signal band and location, and determines the signal characteristics. A signal analyser then examines the signal characteristics to identify the type of transmitter and the level of threat posed. Even the most cursory of analysis can establish whether the emitter is associated with surveillance, target tracking or target engagement. This analysis can compare the signal with known emitter characteristics obtained from an intelligence database or threat library and known signal types confirmed and new emissions identified and categorised. Every signal identification is logged with date, time and intercept coordinates, along with the known or suspected platform type, and the results are stored.

ESm Pods on Nimrod: As well as providing threat information, ESM is used by maritime and battlefield surveillance aircraft as a passive or listening sensor which adds important information to other sensors. It is especially useful when tracking submarines

Signals received by the electronic support measures system may in some cases be analysed instantaneously to produce an identity for the transmitter of each signal received. Pulse width, Pulse amplitude and carrier frequency are few important parameters. The nature of the pulse shape is used to determine the particular type of transmitter. The scan rate and the pattern of the scan also provide invaluable information about the mode of the transmitter. It is possible to detect the antennas changing from scanning mode to lock-on to tracking and hence determine the threat that the transmitting station poses. As well as providing threat information, ESM is used by maritime and battlefield surveillance aircraft as a passive or listening sensor which adds important information to other sensors.

The salient signal characteristics or discriminators identified during the ESM collection and identification process includes: Signal Frequency (this is to detect the radar type), Blip/Scan ratio (to get the estimate for scan rate, sector scan width and radar bandwidth), Scan Rate, Scan Pattern (Search, track, track-while-scan (TWS) and ground-mapping (GM) modes will exhibit particular characteristics), Signal Modulation (Pulse, pulse compression, pulsed Doppler (PD), a continuous wave (CW) and other more sophisticated forms of modulation are indicative of the emitter mode(s) of operation and likely threat level) and finally Pulse Repetition Frequency (PRF).

Technical details as well as the schemetic of the ESM system can found in any dedicated military systems book, however, those who are Interested to explore more, I will strongly recommend Military Avionics Systems by Ion Mior and Allen Seabridge.

The combination of analysis of all these modes of operation and when they are employed either singly or in combination is vital to establishing the likely capabilities and intentions of a threat platform, especially when used in combination with other intelligence information. Electronic Support Measures may be employed at a strategic intelligence-gathering level using an AWACS (airborne early warning and command system) or MPA aircraft to build the overall intelligence picture and electronic order of battle (EOB). Alternatively, such information may be gathered and utilised at a tactical level using radar warning receivers (RWR), whereby information is gathered and used at the strike platform level to enable strike aircraft to avoid the most heavily defended enemy complexes during the mission.

As I mentioned earlier, this (ESM) is one element of Electronic Warfare. This is because the nature of EW warfare and devices used. The operating frequency ranges for radars are usually very broad, and no single system can cover the whole range for transmission or reception. Hence, most communications and radar systems are designed for use in specific bands. These bands are usually designated by international convention. The main role of electronic warfare is to search these radio-frequency bands in order to gather information that can be used by intelligence analysts or by front-line operators. The information gained may be put to immediate effect to gain a tactical advantage on the battlefield; it may be used to picture the strategic scenario in peace time, in transition to war, or during a conflict. It may also be used to devise countermeasures to avoid a direct threat or to deny communications to an enemy. It must also be observed that such tactics are deployed by all sides in a conflict – in other words, the listeners are themselves being listened to.

1 Comment

Filed under AAR Corporation, AARGM, Afghanistan, AGm-113 Hellfire, AGM-154 JSOW, Agusta Westland, Air Defence, Anti-Radiation Missiles, ASN Technology, ASN-229A UAV, Asymmetric Weapons, AWACS, Black Hawk, BQm-34, CIA, Cold War, Direct Energy Warfare, Direct Energy Weapons, Electromagnectic Pulses, Electromagnetic Spectrum, F-117, F/A-18, HARM, Lockheed Martin, Lockheed martin F-16, MH-53, MH-53 Pave, NATO, Navy tactical air-launched decoys, Northrop-Grumman, Operation Desert Storm, People Liberation Army, R-27, RAF Nimrod, RSAF, S-400 missiles, Sea King, SEAD, Sukhoi, Sukhoi PAK-FA, Sukhoi Su-33, surface-to-air missile, TALD, Tommahawk missiles, U.S Marines, US Department of Defense, US Navy, USMC, USS Kitty Hawk, Vietnam War, Wild Weasels