• Home
  • Tom Clancy
  • Fighter Wing: A Guided Tour of an Air Force Combat Wing Page 6

Fighter Wing: A Guided Tour of an Air Force Combat Wing Read online

Page 6


  A horizontal view of the vertical coverage obtained by a typical airborne fighter radar, the APG-63/70. Jack Ryan Enterprises, Ltd., by Laura Alpher

  As good as the APG-63 was, the follow-on radar system for the dual-role F-15E Strike Eagle had to be even better. Hughes engineers used the APG-63 as the basis for the new APG-70 radar. When it was tested in 1983 on a modified two-seat F-15B, it was obvious that the Eagle’s eyes had gotten even sharper. To keep costs and airframe modifications to a minimum, the APG- 70 used the same antenna, power supply, and transmitter as its predecessor. But the brains of the system were all new. A new radar data processor, PSP, and other modules replaced older APG-63 LRUs. The software package was completely new, with greater flexibility, making future modifications even easier. The APG-70 can simultaneously track and engage multiple airborne targets with the new AIM-120 AMRAAM air-to-air missile. To support the F-15E’s ground-attack mission, there is a high-resolution ground-mapping mode (crews tell us it can routinely pick up high-tension power lines), and an even finer synthetic-aperture-radar (SAR) mode, which produces in just seconds a black-and-white photographic-quality picture of the ground for use by the WSO. SARs use a processing technique that uses the aircraft’s horizontal motion to “fool” the radar system into “believing” the antenna is actually much larger than it really is. By overlapping multiple return echoes from several scans, and matching them up with the Doppler shift from the various objects in each individual scan, a very high resolution image can be created. Objects as small as 8.5 feet/2.6 meters can be clearly seen in the SAR mode at a range of around 15 nm./27.4 km. The ability to clearly pick out buildings or even vehicles from the radar image at long ranges and in almost any weather greatly simplifies the targeting problem for an aircrew.

  Another remarkable feature of the APG-70 is called Non-Cooperative Target Recognition (NCTR). “Cooperative” target recognition depends on the transponders carried by friendly aircraft, which return the proper coded reply when they are “interrogated” by an IFF system. The relatively low reliability of this method has led to very restrictive rules of engagement (ROE) that require several independent means of verifying that a target is really, truly an enemy before a pilot is allowed to shoot it. All air commanders live in fear of “fratricide” or “blue-on-blue” accidents, and the tragic shootdown of two Army helicopters in Northern Iraq in 1994 by F-15Cs suggests that this fear is well founded. NCTR, which is quickly becoming standard on many U.S.-designed radars, is the ability to classify a target by type while it is still beyond visual range. How this is done is highly classified; and even mentioning NCTR around an Air Force or contractor site is likely to raise eyebrows and tighten lips. Nevertheless, NCTR was used in Desert Storm. One possible means discussed in open sources is to focus a high-resolution radar beam on a head-on target and count the number of blades in the opposing aircraft’s engine fan or compressor. Knowing the blade count tells you the type of engine and can give you a good idea as to whether the target is hostile.

  The APG-70 also has a Low Probability of Intercept (LPI) mode, designed to defeat the Radar Warning Receivers (RWRs) and Electronic Support Measure (ESM) detectors on enemy aircraft, by using techniques like frequency-hopping and power regulation.

  The key to the APG-70’s capabilities is raw computer power. Compared to earlier F-15s, the Strike Eagle has a five-fold increase in computer processing capability, a ten-fold increase in system memory and storage, and software which is easier to reprogram and use. Troubleshooting is simplified by Built-In Test (BIT) software that routinely checks on the health and well-being of major systems and can isolate a fault to a particular LRU. These capabilities make the F-15E Strike Eagle the most dangerous bird of prey in the air today. Yet even as the “Mud Hen” (as the early crews called the F-15E) was finishing up its testing in 1990, the U.S. Department of Defense was already looking into ways to shorten the time it took to get advanced computer technology into military systems.

  In 1980, the Pave Pillar program was initiated by the USAF, with the goal of developing an advanced avionics architecture that could be built out of standard modules containing next-generation digital integrated circuits. With this approach, all of the sensors, communications, navigation, and weapon systems management subsystems will talk to each other over a local area network (LAN), and processed information will be presented to the crew as needed or requested. This significantly reduces pilot workload, allowing him or her to concentrate on flying the plane—a must if future aircraft are to have only one human on board. The new F-22 is the first aircraft to benefit from the Pave Pillar program, and the increase in computer power will make the avionics system of the F-15E Strike Eagle look like a pocket calculator by comparison.

  The F-22 carries two Hughes Common Integrated Processors (CIPs). They give the new fighter a hundred-fold increase in computer-processing power over the Strike Eagle. When new sensors or other systems become available, there is room for a third CIP, if required. To accommodate this increase in processing capability, the F-22 data bus bandwidth has been increased to 50 Mb/sec. By comparison the F-15E’s data bus carries only 1 Mb/ sec. Since the F-22’s APG-77 radar is no longer a stand-alone system, the radar antenna will be just one of a number of sensor arrays, including the electronic-warfare and the threat-warning systems. Data from all of these sensors will be fused together, processed by the CIPs, and displayed to the pilot on one or more color flat-panel multi-function displays (MFDs). Now let’s take a look at what the F-22’s new APG-77 radar will do.

  The APG-77 is nothing like older radar systems. The antenna is a fixed, elliptical, active array which contains about 1,500 radar Transmit/Receive (T/ R) modules. Each T/R module is about the size of an adult’s finger and is a complete radar system in its own right. The AN/APG-77 T/R module is the result of a massive technology development program by Texas Instruments and the DoD. As planned, each module will cost about $500 per unit (depending on the quantity ordered), a price that was set when the program was first begun almost a decade ago. The APG-77 has no motors or mechanical linkages to aim the antenna. Even though the antenna doesn’t move, the APG-77 is still able to sweep a 120° multiple-bar search pattern. However, instead of taking fourteen seconds to sweep a 120°, six-bar search pattern like the APG-70, the APG-77 will search the equivalent volume almost instantaneously. This is because the active array can form multiple radar beams to rapidly scan an area.

  The most impressive capability of the APG-77 radar is LPI (low probability of intercept) search. LPI radar pulses are very difficult to detect with conventional RWR and ESM systems. This means the F-22 can conduct an active search with its APG-77 radar, and RWR/ESM-equipped aircraft will probably be none the wiser. Conventional radars emit high-energy pulses in a narrow frequency band, then listen for relatively high-energy returns. A good warning set, however, can pick up these high-energy pulses at over two times the radar’s effective range. LPI radars, on the other hand, transmit low-energy pulses over a wide band of frequencies (this is called “spread spectrum” transmission). When the multiple echoes are received from the target, the radar’s signal processor integrates all the individual pulses back together, and the amount of reflected EM energy is about the same as a normal radar’s high-energy pulse. But because each individual LPI pulse has significantly less energy, and since they do not necessarily fit the normal frequency pattern used by air-search radars, an enemy’s warning system will be hard-pressed to detect the pulses long before the LPI radar has detected the target. This will give the F-22 a tremendous advantage in any long-range engagement, as the pilot doesn’t have to establish a lock-on when firing AMRAAM missiles. Thus, the first indication that a hostile aircraft will have of an attack by an F-22 will be the screams from his radar-warning receiver telling him that the AMRAAM’s radar has lit off, locked on, and is in the final stages of intercept. By that time it’s probably too late for him to do anything except eject.

  Finally, the APG-77 has an improved capability t
o conduct NCTR. Since it can form incredibly fine beams, the signal processor can generate a high-resolution radar image of an aircraft through Inverse Synthetic Aperture Radar (ISAR) mode processing. An ISAR-capable radar uses the Doppler shifts caused by rotational changes in the target’s position with respect to the radar antenna to create a 3-D map of its target. Thus, where ISAR processing is used, it is the target that provides the Doppler shift, and not the aircraft that the radar is mounted on, which is the case in SAR processing. With a good 3-D radar image, an integrated aircraft-combat system could conceivably identify the target by comparing the image to a stored database. The computer would then pass its best guess to the pilot, who could, if desired, check for himself by calling up the radar image on one of the multi-function displays. If this sounds like a scene from a Star Trek movie, remember that it’s all done by software in the F-22s CIPs, and additional capabilities are only a software upgrade away.

  Although radar will continue to be the main sensor of combat aircraft for decades to come, infrared sensors are increasingly important for both air superiority and ground-attack missions. In Desert Storm, FLIR-equipped aircraft (such as F-117A, F-111F, F-15E, and F-16C) made precision bombing attacks around the clock. For the air-superiority mission, an aircraft needs an IRST system, while a specialized ground-attack aircraft needs a FLIR system. The differences between these two IR sensors stem from different mission requirements.

  IRSTs are wide field-of-view sensors that look for targets in both the middle and long IR bands. IRSTs use automated detection and track routines, designed to find targets in highly cluttered backgrounds. Modern IRSTs are stabilized, gimbaled staring arrays that can scan large areas and detect aircraft at ranges out to 10 to 15 nm./18.2 to 27.4 km.—although 5 to 8 nm./9.1 to 14.6 km. is a more reasonable range against a non-afterburning, non-IR stealthy aircraft. Stabilized means that the sensor automatically compensates for the motion of the aircraft. Gimbals are the supporting bearings that make this possible by allowing the sensor head to rotate on multiple axes. A staring array is like an insect’s eye—it consists of many independent detector elements arranged more or less hemispherically rather than a single element that must be mechanically driven to sweep the whole field of view.

  FLIRs can be either wide or narrow field-of-view sensors. However, image quality is not particularly good with a wide field-of-view FLIR, and such systems are usually for navigation purposes only. Because FLIRs are designed to provide a higher-resolution picture than an IRST, they have a higher data rate and do not undergo as much signal processing. Essentially, FLIRs are IR television cameras, which must provide a clear image so that an operator can identify the picture with the world’s smartest sensor, a Mark 1 human eyeball. Most ground-attack FLIR systems are mounted in external pods or turrets. The Low-Altitude Navigation and Targeting Infrared Night (LANTIRN) system used on the F-15E and F-16C consists of two such pods. The AAQ-13 navigation pod is equipped with a wide field-of-view FLIR for navigation and a terrain-following radar for all-weather navigation. The AAQ-14 targeting pod has a narrow field-of-view FLIR for precise target recognition, along with a bore-sighted laser designator. The FLIR systems used by F-15Es and F-111s in Desert Storm were the cameras that brought you some of the amazing nighttime footage of laser-guided bombs going down Iraqi command post ventilation shafts.

  Only a few years ago, radar-warning receivers were widely regarded as noisy and unreliable nuisances in the cockpit. Today, however, no sane combat pilot wants to fly in harm’s way without a good RWR/ESM suite. Most combat aircraft have RWRs which are tuned to provide a warning only when an enemy fire control radar has established a lock-on. That means they work about as effectively as smoke alarms do when you are in the same room with the fire. With the greatly increased computer power available to the F-22A, a fully integrated ESM and electronic-warfare (EW) system is now finally possible. ESM is basically a wide frequency band passive radar receiver. It is designed to find radar signals, analyze them, and classify the type of radar that is producing the emissions. This has already been done on specialized EW aircraft such as the EF- 111A Raven, which are packed with so many electronic black boxes and festooned with so many antennas that they have little direct combat capability.

  In addition to the standard ESM package, dedicated missile-warning systems are being investigated for installation on the F-22. Historically, 80% of all aircraft shot down never saw the opponent that killed them. With a missile-warning receiver providing 360° spherical coverage, a pilot will know when an enemy missile has been fired at him. Based on data from the missile-warning receiver, other aircraft systems could automatically deploy expendable countermeasures (chaff and flares) and sound an aural warning to the pilot. This will improve the pilot’s reaction time to an incoming missile, reducing aircraft losses in high-threat environments.

  DISPLAYS

  Human senses set a limit to how much data pilots can handle before they become overloaded. The key to managing this flood of data is to give the pilot only processed information relevant to the current situation. In other words, we need “pilot friendly” cockpits: If you don’t get the message, it doesn’t matter if the computer had the right answer or not. Earlier, we noted the sheer number of gauges, switches, and screens that an early F-15 pilot had to be aware of in order to fly the plane. However, once he went into combat, all he needed to do was put the wide-angle HUD onto the enemy aircraft, which allowed him to keep his eyes out of the cockpit.

  The HUD displays all relevant tactical and aircraft-systems information in a clear and concise manner—once you understand what all the numbers and symbols mean. The HUD is tied to and controlled by a series of switches mounted on the engine throttle and control stick. Called Hands On Throttle and Stick (HOTAS), this system allows a pilot to avoid having to go “head down” into the cockpit while in a combat situation. On the Vietnam-era F-4E Phantom, the pilot had to reach below his seat to find the selector switch for the 20mm cannon! Today, the pilot of an F-15 or F-16 has only to flip a selector switch to control everything from radar modes to weapons selection.

  A drawing of a notional Heads-Up Display (HUD), showing the symbology that a pilot would typically see. Jack Ryan Enterprises, Ltd., by Laura Alpher

  A lot of important data is crammed onto the HUD. For example, a pilot can tell that he is on a course of 191° at an airspeed of 510 knots, that the aircraft is in a 10° climb, and that the target is up and to the left of the plane’s present course. A short range IR-homing missile can be selected to engage the target, once the pilot is in a proper position to shoot. Unfortunately, when pilots take their eyes off the HUD to look around (and a good pilot will do that often to check his “six”—the sky behind him), all that data is lost to them until they look forward again. The HUD is just an image projected onto a glass screen mounted above the instrument panel. Since it is a fixed display, it can’t follow the pilot’s eyes when they look around.

  Or can it? Right now, helmet-mounted HUDs are under development in the U.S. and Great Britain (and Israel and Russia both have operational systems). The helmet-mounted HUD supplements the standard HUD, providing enhanced situational awareness. If the aircraft carries air-to-air missiles with slewable seekers (called high off-boresight seekers), like the Russian AA-11 Archer or the Israeli Python-4, the pilot can attack targets that are offset from the aircraft’s nose. You can attack a crossing target without wasting time or energy maneuvering for position, which gives you a tremendous advantage in a high-speed, multi-aircraft dogfight or “furball.”

  Future possibilities include virtual-reality (VR) displays, voice-command recognition (remember the book and movie Firefox?), VR control gloves, VR bodysuits, or eye motion command controls. In skies filled with stealthy, silent attacks, there is no time to waste.

  THE “EDGE”: COMING USAF AIRCRAFT

  So what about the “edge”? What’s the next step in combat aircraft design?

  Two new combat aircraft will be arriving at USAF ba
ses in the next decade or so; both incorporate elements of the technologies we have talked about. Each is a state-of-the-art solution to some problem that USAF planners identified over the last decade or two, and thus represents the thinking of the late stages of the Cold War. This fact alone has made some folks question their utility and affordability, given the changes in the world scene in the last five years. Nevertheless, given the lessons of the 1991 Persian Gulf War, as well as the general acceptance that the U.S. military in the 21st century will be a “home-based” force, these systems will be vital to maintaining the credibility of the USAF.

  Northrop Grumman B-2A Spirit

  Two B-2s, without escorts or tankers, could have performed the same mission as a package of thirty-two strike aircraft, sixteen fighters, twelve air-defense suppression aircraft, and fifteen tankers.

  —GENERAL CHUCK HORNER, USAF (RET.)

  The most expensive airplane ever built is a hard sell to taxpayers and legislators who are increasingly cynical about defense contractors and increasingly skeptical about military procurement. But to understand the B-2, you have to understand the threat that it was designed to overcome and the almost unimaginable mission it was created to perform. One of the things that helped to bankrupt the Soviet Union was an obsessive, forty-year attempt to build an impenetrable air-defense system. The National Air Defense Force (known by its Russian initials, PVO) was a separate service, co-equal with the Soviet Army, Navy, Air Force, and Strategic Rocket Forces. It was designed to keep the U.S. Air Force and the few strategic bombers of the other Western allies from penetrating the Russian heartland and decapitating the highly centralized Soviet command and control system, as well as their top military and political leadership. Ultimately, the only Western plan for defeating the system was the Doomsday scenario, using nuclear missiles to “roll back” the successive layers of air defense so the bombers could get through to their targets.

 

    Changing of the Guard Read onlineChanging of the GuardClear and Present Danger Read onlineClear and Present DangerHounds of Rome Read onlineHounds of RomeBreaking Point Read onlineBreaking PointTom Clancy's Jack Ryan Books 7-12 Read onlineTom Clancy's Jack Ryan Books 7-12Full Force and Effect Read onlineFull Force and EffectThe Archimedes Effect Read onlineThe Archimedes EffectCombat Ops Read onlineCombat OpsInto the Storm: On the Ground in Iraq Read onlineInto the Storm: On the Ground in IraqUnder Fire Read onlineUnder FirePoint of Impact Read onlinePoint of ImpactRed Rabbit Read onlineRed RabbitRainbow Six Read onlineRainbow SixThe Hunt for Red October Read onlineThe Hunt for Red OctoberThe Teeth of the Tiger Read onlineThe Teeth of the TigerConviction (2009) Read onlineConviction (2009)Battle Ready Read onlineBattle ReadyPatriot Games Read onlinePatriot GamesThe Sum of All Fears Read onlineThe Sum of All FearsFallout (2007) Read onlineFallout (2007)Red Storm Rising Read onlineRed Storm RisingThe Cardinal of the Kremlin Read onlineThe Cardinal of the KremlinExecutive Orders Read onlineExecutive OrdersLincoln, the unknown Read onlineLincoln, the unknownThreat Vector Read onlineThreat VectorThe Hunted Read onlineThe HuntedShadow Warriors: Inside the Special Forces Read onlineShadow Warriors: Inside the Special ForcesEnd Game Read onlineEnd GameSpecial Forces: A Guided Tour of U.S. Army Special Forces Read onlineSpecial Forces: A Guided Tour of U.S. Army Special ForcesLocked On Read onlineLocked OnLine of Sight Read onlineLine of SightTom Clancy Enemy Contact - Mike Maden Read onlineTom Clancy Enemy Contact - Mike MadenFighter Wing: A Guided Tour of an Air Force Combat Wing Read onlineFighter Wing: A Guided Tour of an Air Force Combat WingSpringboard Read onlineSpringboardLine of Sight - Mike Maden Read onlineLine of Sight - Mike MadenEndWar Read onlineEndWarDead or Alive Read onlineDead or AliveTom Clancy Support and Defend Read onlineTom Clancy Support and DefendCheckmate Read onlineCheckmateCommand Authority Read onlineCommand AuthorityCarrier: A Guided Tour of an Aircraft Carrier Read onlineCarrier: A Guided Tour of an Aircraft CarrierBlacklist Aftermath Read onlineBlacklist AftermathMarine: A Guided Tour of a Marine Expeditionary Unit Read onlineMarine: A Guided Tour of a Marine Expeditionary UnitCommander-In-Chief Read onlineCommander-In-ChiefArmored Cav: A Guided Tour of an Armored Cavalry Regiment Read onlineArmored Cav: A Guided Tour of an Armored Cavalry RegimentTom Clancy's Jack Ryan Books 1-6 Read onlineTom Clancy's Jack Ryan Books 1-6The Ultimate Escape Read onlineThe Ultimate EscapeAirborne: A Guided Tour of an Airborne Task Force Read onlineAirborne: A Guided Tour of an Airborne Task ForceDebt of Honor Read onlineDebt of HonorCyberspy Read onlineCyberspyPoint of Contact Read onlinePoint of ContactOperation Barracuda (2005) Read onlineOperation Barracuda (2005)Choke Point Read onlineChoke PointPower and Empire Read onlinePower and EmpireEvery Man a Tiger: The Gulf War Air Campaign Read onlineEvery Man a Tiger: The Gulf War Air CampaignEndgame (1998) Read onlineEndgame (1998)EndWar: The Missing Read onlineEndWar: The MissingSplinter Cell (2004) Read onlineSplinter Cell (2004)The Great Race Read onlineThe Great RaceTrue Faith and Allegiance Read onlineTrue Faith and AllegianceDeathworld Read onlineDeathworldGhost Recon (2008) Read onlineGhost Recon (2008)Duel Identity Read onlineDuel IdentityLine of Control o-8 Read onlineLine of Control o-8The Hunt for Red October jr-3 Read onlineThe Hunt for Red October jr-3Hidden Agendas nf-2 Read onlineHidden Agendas nf-2Acts of War oc-4 Read onlineActs of War oc-4Ruthless.Com pp-2 Read onlineRuthless.Com pp-2Night Moves Read onlineNight MovesThe Hounds of Rome - Mystery of a Fugitive Priest Read onlineThe Hounds of Rome - Mystery of a Fugitive PriestInto the Storm: On the Ground in Iraq sic-1 Read onlineInto the Storm: On the Ground in Iraq sic-1Threat Vector jrj-4 Read onlineThreat Vector jrj-4Combat Ops gr-2 Read onlineCombat Ops gr-2Virtual Vandals nfe-1 Read onlineVirtual Vandals nfe-1Runaways nfe-16 Read onlineRunaways nfe-16Marine: A Guided Tour of a Marine Expeditionary Unit tcml-4 Read onlineMarine: A Guided Tour of a Marine Expeditionary Unit tcml-4Shadow Warriors: Inside the Special Forces sic-3 Read onlineShadow Warriors: Inside the Special Forces sic-3Jack Ryan Books 1-6 Read onlineJack Ryan Books 1-6Cold Case nfe-15 Read onlineCold Case nfe-15Changing of the Guard nf-8 Read onlineChanging of the Guard nf-8Splinter Cell sc-1 Read onlineSplinter Cell sc-1Battle Ready sic-4 Read onlineBattle Ready sic-4The Bear and the Dragon jrao-11 Read onlineThe Bear and the Dragon jrao-11Fighter Wing: A Guided Tour of an Air Force Combat Wing tcml-3 Read onlineFighter Wing: A Guided Tour of an Air Force Combat Wing tcml-3Patriot Games jr-1 Read onlinePatriot Games jr-1Jack Ryan Books 7-12 Read onlineJack Ryan Books 7-12Mission of Honor o-9 Read onlineMission of Honor o-9Private Lives nfe-9 Read onlinePrivate Lives nfe-9Operation Barracuda sc-2 Read onlineOperation Barracuda sc-2Cold War pp-5 Read onlineCold War pp-5Point of Impact nf-5 Read onlinePoint of Impact nf-5Red Rabbit jr-9 Read onlineRed Rabbit jr-9The Deadliest Game nfe-2 Read onlineThe Deadliest Game nfe-2Springboard nf-9 Read onlineSpringboard nf-9Safe House nfe-10 Read onlineSafe House nfe-10EndWar e-1 Read onlineEndWar e-1Duel Identity nfe-12 Read onlineDuel Identity nfe-12Deathworld nfe-13 Read onlineDeathworld nfe-13Politika pp-1 Read onlinePolitika pp-1Rainbow Six jr-9 Read onlineRainbow Six jr-9Tom Clancy's Power Plays 1 - 4 Read onlineTom Clancy's Power Plays 1 - 4Endgame sc-6 Read onlineEndgame sc-6Executive Orders jr-7 Read onlineExecutive Orders jr-7Net Force nf-1 Read onlineNet Force nf-1Call to Treason o-11 Read onlineCall to Treason o-11Locked On jrj-3 Read onlineLocked On jrj-3Against All Enemies Read onlineAgainst All EnemiesThe Sum of All Fears jr-7 Read onlineThe Sum of All Fears jr-7Sea of Fire o-10 Read onlineSea of Fire o-10Fallout sc-4 Read onlineFallout sc-4Balance of Power o-5 Read onlineBalance of Power o-5Shadow Watch pp-3 Read onlineShadow Watch pp-3State of War nf-7 Read onlineState of War nf-7Wild Card pp-8 Read onlineWild Card pp-8Games of State o-3 Read onlineGames of State o-3Death Match nfe-18 Read onlineDeath Match nfe-18Against All Enemies mm-1 Read onlineAgainst All Enemies mm-1Every Man a Tiger: The Gulf War Air Campaign sic-2 Read onlineEvery Man a Tiger: The Gulf War Air Campaign sic-2Cybernation nf-6 Read onlineCybernation nf-6Support and Defend Read onlineSupport and DefendNight Moves nf-3 Read onlineNight Moves nf-3SSN Read onlineSSNCutting Edge pp-6 Read onlineCutting Edge pp-6The Cardinal of the Kremlin jrao-5 Read onlineThe Cardinal of the Kremlin jrao-5War of Eagles o-12 Read onlineWar of Eagles o-12Op-Center o-1 Read onlineOp-Center o-1Mirror Image o-2 Read onlineMirror Image o-2The Archimedes Effect nf-10 Read onlineThe Archimedes Effect nf-10Teeth of the Tiger jrj-1 Read onlineTeeth of the Tiger jrj-1Bio-Strike pp-4 Read onlineBio-Strike pp-4State of Siege o-6 Read onlineState of Siege o-6Debt of Honor jr-6 Read onlineDebt of Honor jr-6Zero Hour pp-7 Read onlineZero Hour pp-7Ghost Recon gr-1 Read onlineGhost Recon gr-1Command Authority jr-10 Read onlineCommand Authority jr-10Tom Clancy's Power Plays 5 - 8 Read onlineTom Clancy's Power Plays 5 - 8Checkmate sc-3 Read onlineCheckmate sc-3Breaking Point nf-4 Read onlineBreaking Point nf-4Gameprey nfe-11 Read onlineGameprey nfe-11The Hunted e-2 Read onlineThe Hunted e-2Hidden Agendas Read onlineHidden AgendasDivide and Conquer o-7 Read onlineDivide and Conquer o-7