Search results

Jump to navigation Jump to search
  • {{r|Electronic attack}}
    369 bytes (49 words) - 16:20, 8 July 2009
  • ...er]] IFF ([[identification friend or foe]]). The EB-66B/E versions were [[electronic attack]] versions used to jam enemy electronics with greater power than could the
    2 KB (309 words) - 17:57, 1 April 2024
  • In [[electronic warfare]], a '''deceptive jammer''' [[electronic attack|electronically attacks]] a hostile tracking or fire control sensor, by givi
    1 KB (161 words) - 15:13, 27 November 2010
  • ...ern classification, usually combines features of [[electronic support]], [[electronic attack]], and [[electronic protection]]. Practical implementations usually contain ...ground, satellite, or [[unmanned aerial vehicle]] sensors or cooperating [[electronic attack]] equipment.
    3 KB (472 words) - 10:44, 8 April 2024
  • ...agility|frequency-hopping as a means to interfere with electronic warfare#electronic attack|jamming and interception for electronic intelligence, as they rapidly chang ...provide some communications privacy, and, more importantly, resistance to electronic attack from their frequency agility. For more serious security, many units can con
    3 KB (476 words) - 16:23, 30 March 2024
  • | title =EA-18G Airborne Electronic Attack Aircraft F/A-18G "Growler" | title = EA-18G Growler Electronic Attack Aircraft, USA
    5 KB (788 words) - 16:23, 30 March 2024
  • {{r|Electronic attack}}
    2 KB (305 words) - 14:13, 6 April 2024
  • ...tions with jamming resistance, although they are not as hardened against [[electronic attack|jamming]] or the effects of nuclear weapons as are the present [[MILSTAR]]
    951 bytes (130 words) - 10:20, 8 April 2024
  • ...indicator (MTI) reatures, and better protection against Electronic warfare#electronic attack|electronic deception.
    2 KB (309 words) - 16:23, 30 March 2024
  • ...cs are emerging. Some would be vulnerable to information operations, using electronic attack or intrusion into computer centers. Specialized weapons may be useful for c
    3 KB (499 words) - 14:13, 6 April 2024
  • ...side is gaining [[signals intelligence]] from it, or [[electronic warfare#electronic attack|jamming]] to deny its use for [[command and control]].
    3 KB (372 words) - 10:35, 4 April 2024
  • Electronic attack on missile in this stage try to break track: to force a maneuvering missile Final electronic attack can try to destroy the terminal seeker (e.g., with directed infrared conter
    8 KB (1,160 words) - 06:56, 4 April 2024
  • | title =EA-18G Airborne Electronic Attack Aircraft F/A-18G "Growler" ...e" references to the Predator actually discuss signals intelligence, not [[electronic attack]] payloads.
    6 KB (820 words) - 12:05, 31 March 2024
  • ...agility|frequency-hopping as a means to interfere with electronic warfare#electronic attack|jamming and interception for signals intelligence, as they rapidly change t
    4 KB (694 words) - 16:22, 30 March 2024
  • ...estricted to [[signals intelligence]] collection and the coordination of [[electronic attack]] by other services.<ref>{{citation
    4 KB (586 words) - 15:37, 8 April 2024
  • :*Interfering with the opponent's systems, called either '''electronic attack''' or. more traditionally, '''electronic countermeasures''' (ECM). Purely e
    10 KB (1,449 words) - 07:30, 18 March 2024
  • ...not technically correct other than in a subset of cases. Jamming is the [[electronic attack]] subset of [[electronic warfare]], and "barrage" jamming with power alone
    4 KB (581 words) - 03:58, 22 November 2023
  • ...ecific context of tactical warfare. ESM give the information needed for '''Electronic Attack (EA)''' such as jamming. EA is also called '''Electronic Counter-Measures''
    14 KB (2,151 words) - 07:29, 18 March 2024
  • ...situation began to resemble the military minuet of [[electronic warfare]]: electronic attack, countermeasure, and response by counter-countermeasures. It is noteworthy
    9 KB (1,351 words) - 14:13, 6 April 2024
  • ...go to ground, satellite, or unmanned aerial vehicle sensors or cooperating electronic attack equipment. :*Interfering with the opponent's systems, called either '''electronic attack (EA)''' or, traditionally, '''electronic countermeasures''' (ECM).
    30 KB (4,571 words) - 06:56, 4 April 2024
  • ...ntelligence fusion, including from UAV-carried sensor, and coordinate with electronic attack. ...t-M is mentioned in Russian literature as a portable direction-finding and electronic attack system
    32 KB (4,630 words) - 06:04, 8 April 2024
  • ...le noise of a combat environment, as well as deliberate electronic warfare|electronic attack, JTIDS has error control#forward error correction|forward error correction.
    14 KB (2,111 words) - 16:23, 30 March 2024
  • ...lectrically noisy environments, but may be under active electronic warfare|electronic attack. The edge networks will not only not be fixed, but may be moving at high sp
    13 KB (1,859 words) - 16:22, 30 March 2024
  • ...f the operations branch, to make sure electronic warfare#electronic attack|electronic attack does not damage friendly communications, and to define the electronic warfa
    29 KB (4,252 words) - 07:36, 18 March 2024
  • ...dination of other service actions, collection of signals intelligence, and electronic attack specific to counter-improvised explosive devices.<ref>{{citation
    34 KB (5,015 words) - 08:09, 20 March 2024
  • ...release penetration aids, such as radar reflectors and electronic warfare#electronic attack|jammers.
    11 KB (1,605 words) - 09:12, 22 April 2024
  • | Recommendations for kinetic and electronic attack | Recommendations for kinetic and electronic attack
    33 KB (4,818 words) - 12:10, 20 March 2024
  • ...ided munitions, up-close-and-personal action by special operations forces, electronic attack, etc., all offer the potential of defeating an enemy without having to beat
    17 KB (2,545 words) - 05:11, 31 March 2024
  • ...ar-based proximity fuze|proximity fuzed ammunition, information operations#electronic attack|electronic countermeasures may be able to predetonate the rounds. The lates
    19 KB (2,822 words) - 16:21, 30 March 2024
  • * [[Electronic attack||**]]
    29 KB (3,247 words) - 09:06, 28 April 2024
  • | Recommendations for kinetic and electronic attack | Recommendations for kinetic and electronic attack
    42 KB (6,092 words) - 04:31, 21 March 2024
  • *[[Cyberterrorism]] – the electronic attack on critical computer infrastructure
    42 KB (6,277 words) - 07:33, 20 April 2024
  • *[[Cyberterrorism]] – the electronic attack on critical computer infrastructure
    42 KB (6,280 words) - 07:33, 20 April 2024
  • * [[Electronic attack]]
    54 KB (5,811 words) - 09:06, 28 April 2024
  • ...as a political and historical matter. The changes in flight patterns and [[electronic attack]] used to neutralize Soviet [[S-75 Dvina]] [[surface-to-air missile]]s (NAT
    151 KB (24,900 words) - 06:56, 4 April 2024
View ( | next 250) (20 | 50 | 100 | 250 | 500)