Category Archives: Sukhoi Su-33

Intellegent Warfare: Electronic Support Measures and Application of HARM Missile

USS KITTY HAWK (CV 63), At Sea (November 9, 2005) – Aviation Ordnanceman prepare to load a CATM-88 Harm missile onboard the USS Kitty Hawk (CV-63). While at sea, Kitty Hawk and Carrier Strike Group 5 will be participating in an annual exercise with the Japanese Maritime Self Defense Force. Currently underway in the western Pacific Ocean, Kitty Hawk Carrier Strike Group demonstrates power projection and sea control as the Navy's only permanently forward-deployed aircraft carrier strike group, operating from Yokosuka, Japan. U.S. Navy photo by Photographer’s Mate 3rd Class (AW) Jonathan Chandler.

After writing few posts discussing the technological influence on defence stratagies of different nation, this time I thought to go slightly technical. A reader may use this information as an extension of my discussion on Electronic Warfare – Electronic Warfare Operations Warfare has always been conducted by adversaries who have been at great pains to understand their enemy’s strengths and weaknesses in order to minimise the risk to their own forces and territory. The detection and interception of messages and the efforts to deceive the enemy have long been the task of the ‘secret service. As methods of communication developed, so too did methods of interception become more effective. Radar has developed from a mere detection mechanism to a means of surveillance and guidance. This post is focuses on gathering information on immediate threats which is performed by Electronic Support Measures (ECM)

MH-53 Pave Low helicopters prepare to take off for their final combat mission on Sept. 27, 2008, in Iraq. The MH-53, the largest and most technologically advanced helicopter in the Air Force with a record dating back to the Vietnam War, was retired from the Air Force inventory on Sept. 30, 2008

Electronic Warfare (EW) planning requires a broad understanding of enemy and friendly capabilities, tactics, and objectives. Employment of EW assets must be closely integrated into, and supportive of, the commander’s overall planning effort. This planning requires a multidisciplined approach with expertise from operations (ground, airborne, space), intelligence, logistics, weather, and information. Application of this sort of EW planning and employment was seen in Operation Desert Storm in 1991. three US Air Force MH-53J PAVE LOW helicopters (shown above) led nine US Army AH-64 Apache helicopters across the Saudi Arabia-Iraq border to attack two Iraqi early warning radar sites. Taking down these two sites opened the door for attacks across Iraq by F-117s, other coalition aircraft and Tomahawk missiles (shown below).

Block IV Cutaway - Raytheon

After the F-117s and cruise missiles came conventional aircraft. From 0355L to 0420L (H+55 to H+1:20) large numbers of USAF, USN, USMC, RSAF, and RAF aircraft smashed Iraqi air defenses and fields from H-3, an airfield located in western Iraq, to Ahmed Al Jaber, an airfield in occupied Kuwait. Two packages of aircraft, one a USN package from the Red Sea carriers and the other a USAF package from the south pointed directly at Baghdad. These “gorilla” packages were intended to seem threatening enough to force the Iraqis to hurl their air resources in defense. Air Force ground-launched BQM-34 and Navy tactical air-launched decoys (TALD) mimicked the radar return of conventional aircraft to further arouse Iraqi radar operators, many already confused by the absence of central control from Kari. Finally, radar-jamming aircraft radiated blanketing electronic emissions that drove the Iraqi radar operators to go to full power in an attempt to break through the interference. Then, the two incoming coalition flights revealed their true nature and pounced in a shrewd and devastating ruse.

The newest upgrade is a joint venture by the Italian Ministry of Defense and the US Department of Defense: the AGM-88E Advanced Anti Radiation Guided Missile (AARGM), produced by Alliant Techsystems.

What was unique here that, instead of bomb-carrying fighter-bombers, they were radar-killing electronic warriors carrying AGM-88 high-speed antiradiation missiles (HARMS) designed to home in on SAM and AAA radar (shown above). The AGM-88 High-speed Anti-Radiation Missile (HARM) is a tactical, air-to-surface missile designed to home in on electronic transmissions coming from surface-to-air radar systems. Originally developed by Texas Instruments (TI) as a replacement for the AGM-45 Shrike and AGM-78 Standard ARM system. Production was later taken over by Raytheon Corporation (RAYCO) when they purchased TI’s defense business. The AGM-88 can detect, attack and destroy a radar antenna or transmitter with minimal aircrew input. The proportional guidance system that homes in on enemy radar emissions has a fixed antenna and seeker head in the missile’s nose. A smokeless, solid-propellant, dual-thrust rocket motor propels the missile at speeds over Mach 2. HARM, a Navy-led program, was initially integrated onto the A-6E, A-7 and F/A-18 and later onto the EA-6B. USAF F-4G Wild Weasels alone expended dozens of HARMS in twenty minutes, while USN/USMC F/A-18s fired one hundred for the night. HARMS filled the air over Baghdad, the site of over one-half of Iraq’s SAM and AAA batteries. Foolishly, the Iraqis did not turn off their radars, even when the HARMS fireballed in their midst; as one USAF flight leader averred, ‘the emitters came on and stayed on for the entire flight of the missiles.’ This deadly surprise not only destroyed many Iraqi radars, it also terrified their operators. For the rest of the war, they showed great reluctance to use radar and often chose to launch their SAMs with optical or even no guidance.

High-speed Anti-Radiation Missile (HARM) – A Little Overview

The initial HARM attack and the F-117 bombings of the Kari system left Iraq’s integrated air defense system shattered, opening up the country so completely that, within days, coalition air-to-air tankers regularly operated in Iraqi airspace. Other non-stealthy aircraft pummeled Iraqi airfields. An anti-radiation missile (ARM) is a missile which is designed to detect and home in on an enemy radio emission source. Typically these are designed for use against an enemy radar, although jammers and even radios used for communication can also be targeted in this manner. This sort of weapons are key to EW inventory. The word “Radiation” here refers to Electromegnetic radiation, not nuclear. The missile is the direct descendant of the Shrike and Standard ARM missiles used in Vietnam. Most ARM designs to date have been intended for use against ground-based radars. Commonly carried by specialist aircraft in the SEAD (Suppression of Enemy Air Defense) role (known to the USAF as “Wild Weasels”), the primary purpose of this type of missile is to degrade enemy air defenses in the first period of a conflict in order to increase the chances of survival for the following waves of strike aircraft. They can also be used to quickly shut down unexpected SAM sites during a raid. Aircraft which fly with strike aircraft to protect them from enemy air defences often also carry cluster bombs and are known as a SEAD escort. The cluster bombs can be used to ensure that after the ARM disables the SAM system’s radar, the command post, missile launchers, and other components or equipment are also destroyed to guarantee the SAM site stays down.

The R-27 is manufactured in infrared-homing (R-27T), semi-active-radar-homing (R-27R), and active-radar-homing (R-27AE) versions, in both Russia and the Ukraine. The R-27 missile is carried by the Mikoyan MiG-29 and Sukhoi Su-27 fighters, and some of the later-model MiG-23MLD fighters have also been adapted to carry it.

The above account of the First Night of Operation Desert Storm was taken from the Decisive Force: Strategic Bombing in the Gulf War by Richard G. Davis. More recently, air-to-air ARM designs have begun to appear, notably the Russian Vympel R-27P. Such missiles have several advantages over other missile guidance techniques; they do not trigger radar warning receivers (conferring a measure of surprise), and they can have a longer range (since battery life of the seeker head is the limiting factor on the range of most active radar homing systems).

Electronic Support Measures

Technically ESM consists of a collection of senstive antennas designed to detect signals in different frequency bands. Often these antennas are grouped at aircraft’s wing tip pod, which allows a wide angle view without causing too much obstruction as well as to enable a fix on the signal source to obtain an accurate Dircection of Arrival (DoA) of the signal. An effective ESM system rapidly identifies the signal band and location, and determines the signal characteristics. A signal analyser then examines the signal characteristics to identify the type of transmitter and the level of threat posed. Even the most cursory of analysis can establish whether the emitter is associated with surveillance, target tracking or target engagement. This analysis can compare the signal with known emitter characteristics obtained from an intelligence database or threat library and known signal types confirmed and new emissions identified and categorised. Every signal identification is logged with date, time and intercept coordinates, along with the known or suspected platform type, and the results are stored.

ESm Pods on Nimrod: As well as providing threat information, ESM is used by maritime and battlefield surveillance aircraft as a passive or listening sensor which adds important information to other sensors. It is especially useful when tracking submarines

Signals received by the electronic support measures system may in some cases be analysed instantaneously to produce an identity for the transmitter of each signal received. Pulse width, Pulse amplitude and carrier frequency are few important parameters. The nature of the pulse shape is used to determine the particular type of transmitter. The scan rate and the pattern of the scan also provide invaluable information about the mode of the transmitter. It is possible to detect the antennas changing from scanning mode to lock-on to tracking and hence determine the threat that the transmitting station poses. As well as providing threat information, ESM is used by maritime and battlefield surveillance aircraft as a passive or listening sensor which adds important information to other sensors.

The salient signal characteristics or discriminators identified during the ESM collection and identification process includes: Signal Frequency (this is to detect the radar type), Blip/Scan ratio (to get the estimate for scan rate, sector scan width and radar bandwidth), Scan Rate, Scan Pattern (Search, track, track-while-scan (TWS) and ground-mapping (GM) modes will exhibit particular characteristics), Signal Modulation (Pulse, pulse compression, pulsed Doppler (PD), a continuous wave (CW) and other more sophisticated forms of modulation are indicative of the emitter mode(s) of operation and likely threat level) and finally Pulse Repetition Frequency (PRF).

Technical details as well as the schemetic of the ESM system can found in any dedicated military systems book, however, those who are Interested to explore more, I will strongly recommend Military Avionics Systems by Ion Mior and Allen Seabridge.

The combination of analysis of all these modes of operation and when they are employed either singly or in combination is vital to establishing the likely capabilities and intentions of a threat platform, especially when used in combination with other intelligence information. Electronic Support Measures may be employed at a strategic intelligence-gathering level using an AWACS (airborne early warning and command system) or MPA aircraft to build the overall intelligence picture and electronic order of battle (EOB). Alternatively, such information may be gathered and utilised at a tactical level using radar warning receivers (RWR), whereby information is gathered and used at the strike platform level to enable strike aircraft to avoid the most heavily defended enemy complexes during the mission.

As I mentioned earlier, this (ESM) is one element of Electronic Warfare. This is because the nature of EW warfare and devices used. The operating frequency ranges for radars are usually very broad, and no single system can cover the whole range for transmission or reception. Hence, most communications and radar systems are designed for use in specific bands. These bands are usually designated by international convention. The main role of electronic warfare is to search these radio-frequency bands in order to gather information that can be used by intelligence analysts or by front-line operators. The information gained may be put to immediate effect to gain a tactical advantage on the battlefield; it may be used to picture the strategic scenario in peace time, in transition to war, or during a conflict. It may also be used to devise countermeasures to avoid a direct threat or to deny communications to an enemy. It must also be observed that such tactics are deployed by all sides in a conflict – in other words, the listeners are themselves being listened to.

1 Comment

Filed under AAR Corporation, AARGM, Afghanistan, AGm-113 Hellfire, AGM-154 JSOW, Agusta Westland, Air Defence, Anti-Radiation Missiles, ASN Technology, ASN-229A UAV, Asymmetric Weapons, AWACS, Black Hawk, BQm-34, CIA, Cold War, Direct Energy Warfare, Direct Energy Weapons, Electromagnectic Pulses, Electromagnetic Spectrum, F-117, F/A-18, HARM, Lockheed Martin, Lockheed martin F-16, MH-53, MH-53 Pave, NATO, Navy tactical air-launched decoys, Northrop-Grumman, Operation Desert Storm, People Liberation Army, R-27, RAF Nimrod, RSAF, S-400 missiles, Sea King, SEAD, Sukhoi, Sukhoi PAK-FA, Sukhoi Su-33, surface-to-air missile, TALD, Tommahawk missiles, U.S Marines, US Department of Defense, US Navy, USMC, USS Kitty Hawk, Vietnam War, Wild Weasels

Russia Sells; China Clones

Today, Russia's military bonanza is over, and China's is just beginning.

China and America are bound to be rivals, but they do not have to be antagonists, Is that really the case? In many ways China has made efforts to try to reassure an anxious world. Leaving politics aside, the rise of chinese millitary power is obvious to all, not only millitary, china is making its way in Civil aviation market as well. But what is interesting in all is, a “Cloning Factor”. After decades of importing and reverse-engineering Russian arms, China has reached a tipping point: It now can produce many of its own advanced weapons—including high-tech fighter jets like the Su-27—and is on the verge of building an aircraft carrier. Not only have Chinese engineers cloned the prized Su-27’s avionics and radar but they are fitting it with the last piece in the technological puzzle, a Chinese jet engine.

At Zhuhai 2010 one thing was clear: China is starting to export much of this weaponry, undercutting Russia in the developing world, and potentially altering the military balance in several of the world’s flash points. China, here laid on its biggest commercial display of military technology—almost all based on Russian know-how. The star guests were the “Sherdils,” a Pakistani aerobatic team flying fighter jets that are Russian in origin but are now being produced by Pakistan and China. Russia’s predicament mirrors that of many foreign companies as China starts to compete in global markets with advanced trains, power-generating equipment and other civilian products based on technology obtained from the West. This is not all, there is an additional security dimension, however: China is developing weapons systems, including aircraft carriers and carrier-based fighters, that could threaten Taiwan and test U.S. control of the Western Pacific. According to West, Chinese exports of fighters and other advanced weapons also “threaten” to alter the military balance in South Asia, Sudan and Iran. But if I am sitting in Iran or Pakistan, the story is otherway round. Interestingly China accounted for 2% of global arms transfers between 2005-2009, putting it in ninth place among exporters, according to the Stockholm International Peace Research Institute (SIPRI). But no other Asian country has sought to project military power—and had the indigenous capability to do so—since Japan’s defeat in 1945.

As the Chinese leaders’ history lesson will have told them, the relationship that determines whether the world is at peace or at war is that between pairs of great powers. Sometimes, as with Britain and America, it goes well. Sometimes, as between Britain and Germany, it does not. There are also implications for U.S. weapons programs. Last year the Pentagon decided to cut funding for the F-22—currently the most advanced fighter deployed in the world—partly on the grounds that China wouldn’t have many similar aircraft for at least 15 years. But then Gen. He Weirong, deputy head of China’s Air Force, announced that Chinese versions of such jets were about to undergo test flights, and would be deployed in “eight or 10 years.” The Defense Intelligence Agency now says it will take China “about 10 years” to deploy stealth fighters in “meaningful numbers.”

J-11: many aviation experts believe AVIC is having problems developing an indigenous engine for the J-11B with the same thrust and durability as the original Russian ones.

Few things illustrate this more clearly than the J-11B (shown below), a Chinese fighter that Russian officials allege is a direct copy of the Su-27, a one-seat fighter that was developed by the Soviets through the 1970s and 1980s as a match for the U.S. F-15 and F-16. Before the early 1990s, Moscow hadn’t provided major arms to Beijing since an ideological split in 1956, which led to a brief border clash in 1969. In 1992 (after collapse of Soviet Union), China became the first country outside the former Soviet Union to buy the Su-27, paying $1 billion for 24. Beijing’s breakthrough came in 1996, when it paid Russia $2.5 billion for a license to assemble another 200 Su-27s at the Shenyang Aircraft Company. The agreement stipulated that the aircraft—to be called the J-11—would include imported Russian avionics, radars and engines and couldn’t be exported. The J-11B looked almost identical to the Su-27, but China said it was 90% indigenous and included more advanced Chinese avionics and radars. Only the engine was still Russian, China said.

Sukhoi 27: The J-11B looked almost identical to the Su-27, but China said it was 90% indigenous and included more advanced Chinese avionics and radars. Only the engine was still Russian

The J-11B presented Russia with a stark choice—to continue selling China weapons, and risk having them cloned, too, or to stop, and miss out on its still lucrative market.many aviation experts believe AVIC is having problems developing an indigenous engine for the J-11B with the same thrust and durability as the original Russian ones. Photographs published recently on Chinese military websites appear to show engines fitted on the J-11B and a modified version—called the J-15—for use on aircraft carriers. The birth of J-15 can be read on my previous post Here Its not just Su-27 that concerns Russians, but also Su-33, a more advanced version of Su-27. The J-11B is expected to be used by the Chinese navy as its frontline fighter, capable of sustained combat over the entire East China Sea and South China Sea. Aircraft carriers and J-15 fighters would further enhance its ability to stop the U.S. intervening in a conflict over Taiwan, and test its control of the Western Pacific. China’s arms exports could have repercussions on regions in conflict around the world. Pakistan inducted its first squadron of Chinese-made fighter jets in February, potentially altering the military balance with India.The potential customer of greatest concern to the U.S. for JF-17 sale, is Iran, which purchased about $260 million of weapons from China between 2002-2009, according to Russia’s Centre for Analysis of the Global Arms Trade. Economist cites, that China and America have one advantage over history’s great-power pairings: they saw the 20th century go disastrously wrong. It is up to them to ensure that the 21st is different.

Detail about china’s rise and Russian arm deal, can be read on this extensive report published in Wall Street Journal, HERE

3 Comments

Filed under Air Show China 2010, Asia's New SAMs, ASN-206/207, ATAK, Aviation, Chengdu Aircraft, China, China Air Force, China Defence, Chinese Defence, CIA, F-22 raptor, Foreign Office Pakistan, Germany, Gulf War, India, Islamabad, J-10, J-11B, JF-17, JF-17 Thunder, Pakistan, Pakistan Air Force JF 17, Pakistan Defence, People Liberation Army, Shenyang J-15, Sherdil, Su-27, Sudan, Sukhoi, Sukhoi Su-33, Taiwan, Xianglong UAV, Zhuhai 2010, Zhuhai Air Show

E-Bomb – Direct Energy Warfare

6th Generation Aircraft - Airforces to End the Desire for Pilots

The rules of battle have changed over the entirety of military history. Tools such as technology, strategy, tactics and weapons have been the principal elements determining what kind of rules apply to the battlefield. What can consititute to a sixth generation fighter jets – Thats the question I am asking myself since past week. Although it might be too early to think of these questions, when even planes like JSf, PAK-FA or F-22 are not even fully opertional. The contemporary military rivalry is driven mostly by the ongoing military technical revolution. In particular, the weapons used on the future battlefield will play an important role in military affairs. Which weapons can play a key role in the future? I will try not to be too technical, such that the article is applicable to general public as well, however, I have included the research papers and appropriate links for those intending to explore more about E-Bombs or Electromagnetic Weapon Systems.

Sixth generation jet fighters are currently conceptual and expected to enter service in the United States Air Force and United States Navy in 2025-2030 timeframe. The technological characteristics may include the combination of fifth generation aircraft capabilities with unmanned capibility, unrefueled combat radius greater than 1000 nm and Direct Energy Weapon. It is latter which is a subject of this article. One form of this energy is Electronic Bomb (E-Bomb). This article aim to explore the technical aspects and potential capabilities of this type of bomb, target measurements and its comparison with other form of electromagnectic weaponry.

Research has shown that it is possible to develop such kind of device. Directed Energy research originated with research work done to determine the impact to important military systems operating in harsh electromagnetic environments. One of the most threatening and pervasive of all electromagnetic threats is that due to electromagnetic pulse.

These pulses can burst of electromagnetic radiation that results from an explosion (usually from the detonation of a nuclear weapon) and/or a suddenly fluctuating magnetic field. However, its not only the nuclear weapon who generates these pulses, Non-nuclear electromagnetic pulse (NNEMP) is an electromagnetic pulse generated without use of nuclear weapons. There are a number of devices that can achieve this objective, ranging from a large low-inductance capacitor bank discharged into a single-loop antenna or a microwave generator to an explosively pumped flux compression generator. To achieve the frequency characteristics of the pulse needed for optimal coupling into the target, wave-shaping circuits and/or microwave generators are added between the pulse source and the antenna. A vacuum tube particularly suitable for microwave conversion of high energy pulses is the vircator. These HEMP induced stresses can damage or severely disrupt some electronic systems, which are sensitive to transient disturbance. Significant potential damaging effects can occur at long ranges to virtually all systems located within line-of-sight of the detonation point. Thus it is feasible to say, that NNEMP generators can be carried as a payload of bombs and cruise missiles, allowing construction of electromagnetic bombs with diminished mechanical, thermal and ionizing radiation effects and without the political consequences of deploying nuclear weapons.

The fact that an electromagnetic pulse is produced by a nuclear explosion was known since the earliest days of nuclear weapons testing, but the magnitude of the EMP and the significance of its effects were not realized for some time. As a result of the test, a very short but extremely intense electromagnetic pulse was observed. This pulse propagated away from its source with a decreasing intensity, which is also to be expected according to the theory of electromagnetism.

According to the CBS reports dated March 2003 stated the application of experimental EM Pulse:

The U.S. Air Force hit Iraqi TV with an experimental electromagnetic pulse device called the “E-Bomb” in an attempt to knock it off the air and shut down Saddam Hussein’s propaganda machine. The highly classified bomb created a brief pulse of microwaves powerful enough to fry computers, blind radar, silence radios, trigger crippling power outages and disable the electronic ignitions in vehicles and aircraft. Officially, the Pentagon does not acknowledge the weapon’s existence.

Direct Energy Warfare

Military action involving the use of directed-energy weapons, devices, and countermeasures to either cause direct damage or destruction of enemy equipment, facilities, and personnel, or to determine, exploit, reduce, or prevent hostile use of the electromagnetic spectrum through damage, destruction, and disruption. The defensive part of Electronic Warfare includes the offensive actions such as preventing the enemy’s use of the electromagnetic spectrum through counter measures such as damaging, disrupting, or destructing the enemy’s electromagnetic capability. Such weaponry (DEW) is an evolving addition to the EW.

Characteristics of Direct Energy Weapons

The most common characteristics of the direct energy weapons is that they attack at the Speed of Light. This pose some advantage over conventional weaponry, This helps in defeating targets
such as theater and ballistic missiles before they can deploy defense-saturating sub-munitions. Another advantage of such weapons is that they can be used against multiple targets at the same time. The direct energy weapons are classified into four catagories; High Power Microwave (HPM), Charged Particle Beams (CPB), Neutral Particle Beams (NPB) and High Energy Laser (HEL). It is the latter which is highly potential for military applications (both stratagic and tactical missions). However, for E-Bomb it is HPM is a base. But offcourse when compared to Laser technology, the microwave technology lags in terms of research. HPM – use electromagnetic radiation to deliver heat, mechanical, or electrical energy to a target to cause various, sometimes very subtle, effects. When used against equipment, directed electromagnetic energy weapons can operate similarly to omnidirectional electromagnetic pulse (EMP) devices, by inducing destructive voltage within electronic wiring. The difference is that they are directional and can be focused on a specific target using a parabolic reflector. High-energy radio frequency weapons (HERF) or high-power radio frequency weapons (HPRF) use high intensity radio waves to disrupt electronics. However, High and low power, Pulsed Microwave devices use low-frequency microwave radiation which can be made to closely mimic and interact with normal human brain waves having similar frequencies. Although belong to the same family of technology, the E-Bomb deployment differes from that of HPM.

Potential for Aircraft Operations

Scleher, D. Curtis in Electronic warfare in the information age, has defined the potential of these kind of weapons for Aircraft Operations. DEWs have great potential for aircraft operations since crews can enhance their own survivability in the battlefield, where the aircrafts are susceptible and vulnerable to missile threats, by protecting themselves with electromagnetic shields. In such environment, DEW systems may prevent the aircraft from threats by decreasing the detection and targeting capability of enemy. They may also aid in hit avoidance by deflecting, blinding, or causing the incoming missile to break lock and finally, where necessary, to destroy the missile itself before it reaches its target. An additional approach might be to defeat the fusing system of the incoming missile. However, when deploying these bombs, getting the projectile successfully right is the key, such that useful damage can be produced. Further information about the deployment of these DEWs can be accessed from Electronic warfare in the information age. By this stage one difference between HPM and E-bomb is apparanet, despite belonging to same technological family, and this difference is their deployment. HEMP – High Altitude Electromagnetic Pulse is not a directed energy weapon. The reason why HEMP is defined as an electromagnetic weapon is that it produces similar effects in electromagnetic spectrum and can cause similar impacts on electronic devices. The potential effects of a designed HPM weapon strongly depends on the electromagnetic properties of the target. Since it is difficult to get the required intelligence, the complexity of real systems poses technical difficulties. A typical HPM weapon system basically includes a prime source that generates the intended power, an RF generator, a system that shapes and forms the wave into the intended form, a waveguide through which the generated wave travel, an antenna that propagated the wave, and the control unit that manages all the steps.

AGM-154 Joint Standoff Weapon l

Delivery system considerations for E-bombs are very important. The massed application of such electromagnetic weapons in the opening phase of an electronic battle delivered at the proper instant or location can quickly lead the superiority in the electromagnetic spectrum. This package might mean a major shift from physically lethal weaponry to electronically lethal attacks (via e-bombs) as a preferred mode of operation. Potential platforms for such weapons delivery systems are AGM-154 JSOW (Joint Stand Off Weapon) glidebomb (shown above) and the B-2 bomber (shown below). The attractiveness of glidebombs delivering HPM warheads is that the weapon can be released from outside the effective radius of target air defenses, minimizing the risk to the launch aircraft, which can stay clear of the bomb’s electromagnetic effects.

B2-Bomber refueling

Another delivery method of e-bomb may be the use of UAVs. The technology of UAVs is still developing and partly immature; however, improvements can be expected in the next decade.

The e-bomb targets mission essential electronic systems such as the computers used in data processing systems, communications systems, displays, industrial control applications, including road and rail signaling, and those embedded in military equipment, such as signal processors, electronic flight controls and digital engine control systems. I must point out that when e-bomb outputs are too weak to destroy these systems but strong enough to disrupt their operations, system performance can be degraded. The relation between the altitude (shown below) where the e-bomb is detonated and a representation of the lethality range. Target information (to include location and vulnerability) becomes an important issue.

E-Bomb Footprint: Source <a href="http://cryptome.org/ebomb.htm/">Carlo Kopp</a>

E-Bomb – Science Fiction or a Fact?

Sor, can this hypothetical e-bomb be a significant weapon for the future battlefield? Theoratically, the military advantage obtainable with e-bombs is related mostly to their operational significance. Will future battlefields will be won by the countries that best manage the revolution in military affairs or technological revolution? If latter is the case, then one has to remind himself that technology is not a winner on its own, but it has been, and it will continue to be, a critical enabler. If everything else is equal, the side with better technology will win. Finally, can the country that first develops this new weapon have a significant and exploitable military advantage against other powers? Is is feasible for a nation to invest in this kind of bomb ? – The Debate Continues

As I have mentioned earlier, this piece is not research but infact just collection of some work, to explore the potential of EM technology in modern warfare as well as extending our previous discussion of Electronic Warfare For further reading about the subject I strongly suggest to read the following researches

References
Kopp, C. 1993. A doctrine for the use of electromagnetic pulse bombs. Air Power Studies Centre. Paper No. 15.
Kopp, C. 1996. An introduction to the technical and operational aspects of the electromagnetic bomb. Air Power Studies Centre. Paper No. 50.
Kopp, C. 2006. Directed Energy Weapons-Part 1. Defense Today May/June Publication.
Mazarr, Michael J. 1993. Military Technical Revolution-A Structural Framework. Center for Strategic and International Studies. Washington, D.C.
Scleher, D. Curtis. 1999. Electronic warfare in the information age. Boston: Artech House.

Leave a comment

Filed under 20th Tactical Fighter Wing, Aerobatics, AGm-113 Hellfire, AGM-154 JSOW, Air Defence, ALQ-214 Radio Frequency Countermeasures, Anti Aircraft Artillery, Apache AH-64, Artificial Intelligence, ASN Technology, ASN Technology, ASN-229A UAV, ATAK, B2-Bomber, Black Ops, Boeing, Charged Particle Beams, Cold War, Dassault Mirage, Direct Energy Warfare, Direct Energy Weapons, Drone Technology, Drones, EB-66 Bomber, EF-111 Ravens, Electromagnectic Pulses, Electromagnetic Spectrum, Electronic Bomb, Electronic Support measures, Electronic Warfare, Eurofighter Typhoon, Fifth Generation Combat Aircraft, glidebomb, Global Aviation, High Energy Laser, High Power Microwave, HPM, Improvised Explosive Device, Information Operations, Joint Stand Off Weapon, Lasers Technology, Milimeter Wave Radar, NASA, NATO, Non-nuclear electromagnetic pulse, omnidirectional electromagnetic pulse, Predator, Radars, Radio Frequency, raytheon, Robotic Wars, Robotic Weapons, Robots, SD-10 Missile, Secretary of State, Sixth Generation Fighter Jet, Sniper Elite, Sukhoi PAK-FA, Sukhoi Su-33, surface-to-air missile, Terror Free Tomorrow, U.S Drone Technology, U.S Marines, UAV, Vietnam War, War on Terror, WMD

J-15: An Alleged Flying Shark

Shenyang J-15 Flying Shark

Although it’s been a long time since this alleged shark was revealed, it is still worth talking about specifically because of one reason that will be apparent by the end of this article. Photographs of the jet emerged a few months later, confirming a long-held suspicion that China was developing a copy of the Su-33. The first clear view of J-15 (shown above) prototype was leaked in July 2010 revealing a retracted IFR probe behind the port side of the nose and an arresting hook beneath the shortened tailcone. J-15 is the first generation of Chinese shipborne fighter aircraft being developed by both 601 Institute and SAC for PLAN’s first aircraft carrier. According to the aviation sources Beijing unsuccessfully tried to buy Su-33s (shown below) from Russia early this decade. Undeterred, it bought a Su-33 prototype from Ukraine in 2001 and used that to develop its version, designated the Shenyang J-15. Similar to Su-33, J-15 features enlarged folding wings, strengthened landing gears with twin nosewheels, an arresting hook, a pair of small canard foreplanes and a larger wing area to improve its low speed handling and shortened tailcone to avoid tail-strike during high AoA landing. Some key shipborne aircraft technologies such as landing/navigational systems are believed to have been obtained from Russia and Ukraine. One Su-33 prototype (T-10K-3) was acquired from Ukraine around 2001 and has been studied extensively. Many components onboard J-15 are based on those onboard J-11B, such as a similar radar, improved FBW, the same glass cockpit as well as the improved WS-10 turbofan engine. It can also fire a variety of Chinese designed weapons, including PL-8, PL-12 AAMs and YJ-83K AShM. Overall J-15 is believed to be in the same class of American F/A-18C.

China’s factories are infamous for making relatively high-quality reproductions of branded Western consumer goods as well as military. This move was part of China’s plan to build a naval fighter fleet to operate on its forthcoming indigenous aircraft carrier fleet, as China sought to acquire a deep-sea capability. The aircraft is expected first to be stationed onboard the Varyag aircraft carrier currently being fitted in Dalian. China bought the unfinished Admiral Kuznetsov class aircraft carrier from Ukraine in 1998.

Russiam military analysts claim that China’s J-15 carrier-based fighter will not be able to compete with Russia’s Su-33 fighter on global markets because it is inferior to the Russian aircraft:

“The Chinese J-15 clone is unlikely to achieve the same performance characteristics of the Russian Su-33 carrier-based fighter, and I do not rule out the possibility that China could return to negotiations with Russia on the purchase of a substantial batch of Su-33s,” said Col. (Ret.) Igor Korotchenko, a member of the Defense Ministry’s Public Council. According to Russian Defense Ministry sources, the earlier refusal of Su-33 Flanker-D fighters sale to China, was due to findings that China had produced its own copycat version of the Su-27SK fighter jet in violation of intellectual property agreements. In 1995, China secured a $2.5-billion production license from Russia to build 200 Su-27SKs, dubbed J-11A, at the Shenyang Aircraft Corp.

Sukhoi Su-33

The Sukhoi Su-33 is a carrier-based multi-role fighter aircraft produced by Russian firm Sukhoi beginning in 1982. It is a derivative of the Su-27 ‘Flanker’ and was initially known as the Su-27K. The main differences from the Su-27 are that the Su-33 can operate from aircraft carriers and is capable of aerial refueling. The Su-33 carries guided missiles such as the Kh-25MP, Kh-31 and Kh-41. The plane can be used in both night and day operations at sea. It can operate under assistance of the command center ship, or in conjunction with a Kamov Ka-31 (a variant of the Ka-27) early-warning helicopter. The R-27EM missiles provide it the capability to intercept antiship missiles. Other than air defence, the duties of the Su-33 include destruction of enemy ASW, AWACS, and transport aircraft, anti-shipping strike, support of amphibious landing, escort, reconnaissance, and laying of minefields.

China harbours ambitions aplenty to become a powerful force in aerospace as well as being a rapidly growing marketplace for the global industry’s products and services. China’s air forces are no longer those of a third-world country. The J-15 is credited by the Chinese as indigenous development, but the Russians consider it a rip-off of a Sukhoi Su-33. I would however go with the former, the differences will be apparent in my next post. One thing however, I would point out here is, J-15 project is one of chinease dream projects, other includes J-11A/SU-27, J-11B, J-10A/J-10B and JH-7A/B

4 Comments

Filed under Aviation, China, Pakistan, Russia, Shenyang J-15, Sukhoi Su-33