NOTICE: Citizendium is still being set up on its newer server, treat as a beta for now; please see here for more.
Citizendium - a community developing a quality comprehensive compendium of knowledge, online and free. Click here to join and contribute—free
CZ thanks our previous donors. Donate here. Treasurer's Financial Report -- Thanks to our content contributors. --

Search results

Jump to: navigation, search

Page title matches

  • ...countermeasures''', is part of [[information operations#electronic warfare|electronic warfare]], which uses of electromagnetic energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with
    5 KB (724 words) - 03:42, 30 September 2010
  • ...tively interferes with the operation of hostile systems; previously called electronic countermeasures (ECM)
    185 B (22 words) - 21:54, 6 March 2010
  • {{r|Electronic countermeasures suite controller}}
    344 B (40 words) - 02:32, 7 June 2010

Page text matches

  • ...er immunity to noise and [[electronic warfare#electronic attack|electronic attack]], makes it harder to intercept, and can increase capacity of a shared medi
    404 B (57 words) - 16:10, 5 September 2008
  • ...countermeasures''', is part of [[information operations#electronic warfare|electronic warfare]], which uses of electromagnetic energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with
    5 KB (724 words) - 03:42, 30 September 2010
  • ....e., its [[electronic warfare#electronic attack|self-protection electronic attack capabilty]]
    2 KB (242 words) - 19:52, 12 August 2010
  • ...nic warfare]], a '''deceptive jammer''' [[electronic attack|electronically attacks]] a hostile tracking or fire control sensor, by giving it stronger signals
    1 KB (161 words) - 20:13, 27 November 2010
  • ...attacked does not, in current terminology, make it electronic protection. Electronic protection would, in this example, keep the enemy from confusing the warn ...M can engage during the [[guided missile#flight path|midcourse or terminal attack]] phases of the missile. During these phases, other countermeasures may dec
    3 KB (500 words) - 22:24, 17 February 2010
  • ...e Department was created. The national intelligence organization also runs electronic warfare and SIGINT for the Air Force and Navy. | title = Information Warfare (IW): Signals Intelligence (SIGINT), Electronic Warfare (EW) and Cyber-Warfare. Asia and Cuba
    32 KB (4,633 words) - 05:02, 8 February 2011
  • ...rations]], which includes technical measures such as computer security and attacking hostile computers, but also "soft" disciplines such as psychological war | title = Marine Corps Electronic Warfare--A Combat Power Multiplier
    30 KB (4,580 words) - 16:12, 15 April 2011
  • ...ited Kingdom]]; defeated by [[electronic warfare#electronic attack|British electronic countermeasures]] in the [[Battle of the Beams]]
    320 B (43 words) - 23:51, 27 September 2008
  • #REDIRECT [[Electronic attack]]
    31 B (3 words) - 16:32, 8 July 2010
  • #redirect [[electronic attack]]
    31 B (3 words) - 16:37, 26 June 2008
  • {{r|Electronic warfare}} {{r|Electronic attack||**}}
    2 KB (202 words) - 04:49, 22 January 2010
  • ...er, has his own section, but also oversees intelligence and communications-electronics. ...t fielded enemy units, but they encompass a broad spectrum of targets that attacks all of the enemy's centers of gravity such as: the enemy’s leadership; i
    29 KB (4,256 words) - 08:41, 21 October 2013
  • ...'combat aircraft''' directly harm enemy forces, with kinetic or electronic attack, or deliberately go into range of enemy weapons. While the current trend is *[[Attack helicopter]]
    832 B (116 words) - 18:03, 22 August 2010
  • Auto-populated based on [[Special:WhatLinksHere/Electronic warfare expendables dispenser]]. Needs checking by a human. {{r|Chaff (electronic warfare)}}
    982 B (123 words) - 21:15, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Electronic protection]]. Needs checking by a human. {{r|Chaff (electronic warfare)}}
    700 B (89 words) - 21:15, 11 January 2010
  • {{r|Electronic warfare}} {{r|Electronic attack||**}}
    506 B (60 words) - 16:41, 2 January 2014
  • ...sic electronic warfare function, such as a [[radar warning receiver]] or [[electronic warfare expendables dispenser]]. {{Image|Electronics countermeasures suite controller.png|left|450px|Electronics countermeasures suite with conceptual central controller}}
    3 KB (471 words) - 16:15, 15 April 2011
  • {{r|Electronic warfare}} {{r|Electronic attack||**}}
    362 B (54 words) - 08:58, 27 June 2009
  • An [[electronic warfare|electronic attack]] (i.e., countermeasures) transmitter, the U.S. '''[[AN-|AN/]]ALQ-162''' ja ...it is deployed on transport, special operations, electronic warfare and [[attack helicopter]]s such as the [[AH-64 Apache]]. The 40-pound unit is small for
    908 B (131 words) - 01:37, 21 May 2009
  • ...th [[electronic warfare#electronic attack|jamming]] and interception for [[electronic intelligence]], as they rapidly change the frequency they use, so that th ...communications privacy, and, more importantly, resistance to [[electronic attack]] from their [[frequency agility]]. For more serious security, many units c
    3 KB (476 words) - 17:59, 10 February 2011
  • An active [[electronic warfare|electronic attack]] remote device targeted at [[radar]], spooled out by an [[AN-|AN/]][[ALE-4
    350 B (51 words) - 03:46, 12 February 2009
  • ...the crew in staying aware of the threats, and managing the deployment of [[electronic warfare]] devices that operate externally to the vehicle.<ref name=Symetr ...his context, covers enemy sensors across the [[electromagnetic spectrum]]. Electronic defense includes, as well as receivers and computers that detect and anal
    9 KB (1,290 words) - 21:59, 6 June 2010
  • ...[[electronic warfare]], most specifically [[electronic warfare|electronic attack]] on the German navigational aids, such as [[Knickebein]], [[X-Geraet]] and .... Jones]], determined that the German night bombing attacks were guided by electronic navigation signals sent from occupied Europe. Once the systems were under
    5 KB (744 words) - 21:43, 13 February 2011
  • ...her directly attack the enemy by kinetic or nonkinetic (e.g., [[electronic attack]]) means, or have a mission that takes them into the battle area (e.g., [[c
    255 B (39 words) - 18:01, 22 August 2010
  • ...[EF-18 Growler]], although an Air Force replacement has not been selected; electronic warfare versions of the [[F-22 Raptor]] and possibly [[B-1 Lancer|B-1B La ...n gather tactical and strategic [[electronic intelligence]], also called [[electronic support]] in a tactical context. It can fire [[AGM-88 HARM]] [[anti-radia
    1 KB (212 words) - 21:59, 12 August 2010
  • ==Electronics== ...) guidance assist usable when heavy [[electronic warfare#electronic attack|electronic countermeasures]] are directed against this system.
    2 KB (276 words) - 06:33, 22 September 2013
  • ...ures, and better protection against [[Electronic warfare#electronic attack|electronic deception]].
    2 KB (319 words) - 10:19, 13 August 2010
  • ...term is [[electronic attack]] although the original is still used, as in [[electronic countermeasures suite controller]]
    272 B (36 words) - 21:57, 6 March 2010
  • Auto-populated based on [[Special:WhatLinksHere/Electronic intelligence]]. Needs checking by a human. {{r|Electronic attack}}
    2 KB (310 words) - 21:15, 11 January 2010
  • ...have a crew of 1, while the F model and the [[EF-18 Growler]] dedicated [[electronic warfare]] variant have two crewmembers. ...ic warfare|electronic support]] for active [[electronic warfare|electronic attack]]. All other upgraded and new U.S. fighters are moving to AESA designs, inc
    6 KB (817 words) - 21:14, 14 February 2011
  • ...tle that the [[U.S. Navy]] planned against a serious Soviet Naval Aviation attack against [[carrier battle group]]s, the motto is that it "is better to shoot The key electronic warfare attack on the missile, in this phase, is to attack the search radar of an antiaircraft system, or other sensors that put it in
    8 KB (1,147 words) - 00:48, 13 July 2009
  • A specific form of deceptive [[electronic attack|jamming]] directed at navigational systems
    91 B (12 words) - 16:33, 8 July 2010
  • ...e large entertainment corporations have been extremely aggressive in legal attack, to the extent of creating [[chilling effect]] on legitimate users, demandi ...h includes electronic warfare, but also attack, countermeasure, and counterattack on computers and computer networks.
    9 KB (1,351 words) - 16:52, 17 April 2010
  • ...uniformed military personnel, in a national chain of command, exclusively attacking military targets. ...ilitary targets are difficult to categorize. The [[Irgun]] warned of their attack on the King David Hotel in British Palestine; evacuation would have prevent
    43 KB (6,344 words) - 05:34, 6 October 2013
  • '''EF-18 Growler''' are [[carrier-capable]] [[electronic warfare]] aircraft, built on the [[F-18 Super Hornet]] airframe, which wi ...tirement of the [[EF-111]]. As the Prowlers retire, the Navy and Air Force electronic warfare will again diverge. Where the Navy uses Growlers, the Air Force i
    5 KB (789 words) - 21:56, 12 August 2010
  • When First World War aviators began to attack ground targets, they were principally concerned with the two-dimensional gr ...d the "no man's land" in between. If the aircraft were cooperating with an attack, they might need to be aware of their own side moving into no man's land, b
    57 KB (8,468 words) - 22:51, 17 February 2011
  • ...rations (IO)''' are "The integrated employment of the core capabilities of electronic ===Electronic warfare===
    10 KB (1,459 words) - 15:05, 11 August 2009
  • ...ate one's own electronics in the face of enemy attacks, and to evade those attacks through protection or deception
    319 B (48 words) - 03:52, 1 October 2008
  • ...otecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services<ref>{{cite w | title = Field Manual 34-37: Echelons above Corps (EAC) Intelligence and Electronic Warfare (IEW) Operations
    33 KB (4,818 words) - 21:42, 7 February 2011
  • ...ition tactical air, surface, and special operations forces. Its electronic attack is now directed at communications, but will be upgraded to be capable again ...aircraft are flown by the 55th Electronic Combat Group (41st, 42nd and 43d Electronic Combat Squadrons) at [[Davis-Monthan Air Force Base]], Arizona. They have
    2 KB (317 words) - 22:55, 13 July 2009
  • ...ircraft, and the aircraft side of the cable, which connects to the onboard electronics warfare systems.<ref name=BaE-ALE55>{{citation ...s_fotd_datasheet.pdf//}}</ref> It is part of a three-part architecture for electronic warfare, in which the towed decoy is the final line of defense, using a t
    4 KB (574 words) - 13:41, 14 August 2010
  • *Protected: survivable against [[electronic warfare]] and other attacks, even if bandwidth is sacrificed ...AEHF of earlier MILSTAR satellites, which makes it much less vulnerable to attacks on ground stations. As a geosynchronous satellite over the Equator, it sti
    7 KB (925 words) - 00:00, 12 February 2011
  • ...ining [[signals intelligence]] from it, or [[electronic warfare#electronic attack|jamming]] to deny its use for [[command and control]].
    2 KB (342 words) - 17:15, 11 June 2009
  • ...''F-22 Raptor''' are being planned for attack, electronic intelligence and electronic warfare. A "fifth generation" fighter, it is extremely maneuverable, has ...tronics, especially its [[radar#active electronically scanned array|Active Electronically Scanned Array (AESA)]], the [[AN-|AN/]][[APG-77]]. Since the F-22 is
    2 KB (351 words) - 00:41, 15 August 2010
  • ...called "Predator B", which is roughly twice the size, with aerodynamic and electronic improvements. | title = Predator, Reaper to add electronic warfare payload
    6 KB (815 words) - 04:58, 8 February 2011
  • ...medium data rate communications under conditions of nuclear and electronic attack
    242 B (31 words) - 19:48, 11 April 2009
  • ...ing, and experimentally in an [[unmanned aerial vehicle]]-based electronic attack system
    236 B (31 words) - 22:29, 2 February 2009
  • ...''EB-66''', like its prececessor, was an [[electronic intelligence]] and [[electronic warfare]] aircraft built on a bomber airframe. Neither the basic B-66 nor ...t were used primarily for active ECM using high power barrage and tuneable electronic jamming of selected frequencies.
    2 KB (310 words) - 06:18, 6 July 2010
  • ...sures]] against heat-seeking missiles and can also control an [[electronic attack|radar jammer]]
    241 B (29 words) - 19:28, 14 April 2009
  • '''Electronics intelligence (ELINT)''' is a branch of [[signals intelligence]], which t .... Jones]], determined that the German night bombing attacks were guided by electronic navigation signals sent from occupied Europe. Once the systems were under
    14 KB (2,154 words) - 06:15, 14 June 2010
  • ...ountermeasures''', and include making one's signal hard to detect and thus attack ...tely expendable, such as [[chaff (electronic warfare)|chaff]] and [[flare (electronic warfare)|flares]], or can be towed, such as the [[ALE-55|AN/ALE-55]] tow
    2 KB (255 words) - 22:10, 6 June 2010
  • ...t, or using [[deceptive decoy]]s to draw attention from the real object or electronic signal.
    667 B (96 words) - 21:17, 8 July 2009
  • ...with applications in reconnaissance, missile and fighter training, attack, electronic warfare and testing [[integrated air defense system]]s
    275 B (37 words) - 17:34, 27 August 2008
  • ...ncy-hopping]] as a means to interfere with [[electronic warfare#electronic attack|jamming]] and interception for [[signals intelligence]], as they rapidly ch ...Joint STARS]] to send pictures to send information to ground troops, an [[attack helicopter]], and a command post.
    5 KB (694 words) - 17:58, 10 February 2011
  • {{r|Electronic attack}}
    369 B (49 words) - 21:20, 8 July 2009
  • ...olve physical damage, such as [[electronic warfare]], concealing smoke, or attacks on computer network software
    272 B (38 words) - 20:30, 25 December 2010
  • {{r|Electronic warfare}} {{r|Attack helicopter}}
    214 B (27 words) - 21:18, 9 December 2008
  • ...aircraft carrier]] minimize its [[electronic warfare#electronic protection|electronic emissions]]. ...e AN/APS-139, and resistant to clutter and [[electronic warfare#electronic attack|jamming]]. It used an ingenious scheme by which target altitude was determi
    8 KB (1,121 words) - 08:27, 14 October 2013
  • ...tive electronic attack. It can, however, be controlled by a more extensive electronic warfare computer, such as the [[ALQ-213|AN/ALQ-213]], which, in turn, all
    2 KB (252 words) - 04:07, 10 February 2011
  • ...ion aids, such as [[radar]] reflectors and [[electronic warfare#electronic attack|jammers]]. ...e missiles in unmanned, heavily hardened and widely dispersed silos linked electronically to a series of central launch control facilities. Senior Air Force of
    11 KB (1,614 words) - 14:54, 5 September 2009
  • ...d off, mainly because of their defeat in the Battle of Britain, German air attacks continued throughout the war, including later use of the first [[cruise mi ...sile attacks on Britain, would break civilian morale. In retrospect, while attacks on both British and German populations caused much misery, morale never br
    48 KB (7,406 words) - 21:27, 13 February 2011
  • ...oisy environments, but may be under active [[electronic warfare|electronic attack]]. The edge networks will not only not be fixed, but may be moving at high ...adical departure from traditional [[radio]], in which many of the discrete electronic components, and even fundamental techniques such as [[superheterodyne]] o
    13 KB (1,857 words) - 17:53, 10 February 2011
  • | title = Navy Nonresident Training Courses: Electronics Technician, Volume 3, communications systems ==Electronic protection and communications security==
    14 KB (2,115 words) - 13:07, 19 September 2013
  • ...ing surprising redesigns of seemingly mundane uniforms, giving individuals electronics worth of ''Starship Troopers'', and providing medical equipment and trai ..."kinetic operations", but builds in [[information operations]] including [[electronic warfare]], civil-military operations, actions on external computer networ
    34 KB (5,030 words) - 12:10, 18 October 2013
  • ...end of the 19th century, and as artillery range increased, the side being attacked, at first, could take no effective counteraction. ...e|proximity fuzed]] ammunition, [[information operations#electronic attack|electronic countermeasures]] may be able to predetonate the rounds. The latest techn
    19 KB (2,840 words) - 21:53, 25 February 2011
  • ...otecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services<ref name=Wis ...adversary's thinking, they may also be most vulnerable to the adversary's attacks on one's own organization. Before trusting an enemy agent, remember that s
    43 KB (6,102 words) - 07:25, 6 October 2013
  • ...f large volumes of [[chaff (electronic warfare)|chaff]] over an area being attacked or overflown, in support of an overall mission rather than the more usual
    300 B (42 words) - 09:11, 2 February 2009
  • ...ed from a first, mechanically scanned version, to the first [[radar#active electronically scanned array|AESA radar]] on an operational fighter, and into the se ...rade for the [[F-15E Strike Eagle]]. This aircraft is principally for deep attack, but retains significant air-to-air capabilities; its radar this needs grou
    6 KB (981 words) - 00:45, 15 August 2010
  • ...ysically destructive) artillery as well as non-kinetic resources such as [[electronic warfare]] to them,<ref>{{citation ...o [[signals intelligence]] collection and the coordination of [[electronic attack]] by other services.<ref>{{citation
    4 KB (584 words) - 19:58, 19 February 2011
  • ...jamming resistance, although they are not as hardened against [[electronic attack|jamming]] or the effects of [[nuclear weapon]]s as are the present [[MILSTA
    986 B (133 words) - 21:08, 11 April 2009
  • ...pollo_cm.jpg|right|310px|Apollo Command Module flying at a high [[angle of attack]] for lifting entry, artistic rendition.}} ...light of Apollo 4 (AS-501)," NASA TN D-5399, (1969).]</ref> This angle-of-attack was achieved by precisely offsetting the vehicle's center-of-mass from its
    56 KB (8,515 words) - 06:19, 10 October 2013
  • {{r|Attack helicopter}} {{r|Electronic warfare expendables dispenser}}
    723 B (93 words) - 21:25, 11 January 2010
  • ...e parent topics [[cryptanalysis]] and [[cryptography]] discuss brute force attacks. ...cure largely because they could resist brute force but which fell to other attacks.
    1 KB (163 words) - 03:27, 27 March 2009
  • ...les do have a [[home-on-jam]] capability so that they will attack an enemy electronic warfare system, or have [[infrared guidance]] for the terminal phase of t
    1 KB (227 words) - 03:39, 18 May 2009
  • {{r|Joint Direct Attack Munition}} ===Electronics===
    835 B (113 words) - 21:38, 14 February 2011
  • ...tems for aircraft with damaged onboard electronics, and also mark areas to attack, relative to an airborne spotter that discovered a new target. While more accurate attack direction systems replaced it in that role, it continued to be used for tra
    1 KB (185 words) - 19:04, 4 July 2010
  • | only [[armed helicopter|armed]] and [[attack helicopter]]s, | only [[armed helicopter|armed]] and [[attack helicopter]]s,
    5 KB (701 words) - 02:13, 11 August 2010
  • '''Cyberterrorism''' includes both terrorist attacks on resources in [[cyberspace]], or use of Internet and other cyberspace to “Cyberterrorism means premeditated, politically motivated attacks by sub national groups or clandestine agents, or individuals against infor
    5 KB (707 words) - 13:48, 30 May 2009
  • ...ded munition]]s. Historically, less precise systems, such as the Japanese attack at the [[Battle of Pearl Harbor]], used "dumb" weapons with varying levels A counterforce attack concentrates on enemy military systems, with several variants depending on
    3 KB (494 words) - 11:06, 8 February 2011
  • ...that enclose the warhead and soon vaporize, or as complex as maneuvering [[electronic warfare]] decoys that deceive [[measurement and signature intelligence]] ...d area or military base, the target nation is more prone to wait to counterattack.
    4 KB (610 words) - 20:05, 13 August 2010
  • {{r|Amplification attack}} {{r|Electronic warfare}}
    420 B (51 words) - 15:13, 12 June 2009
  • ...me '''SA-6 GAINFUL''', is a highly mobile, still very capable platform for attacking aircraft at low to medium altitude. The original system mounted four ''' ==Electronics and Electro-optics==
    6 KB (842 words) - 09:17, 22 March 2014
  • ...use any elements of electronic warfare. SEAD may draw significantly from [[electronic intelligence]] at national or theater level. ...[[unmanned aerial vehicle]]s can either complement or replace conventional attack aircraft.
    14 KB (2,102 words) - 04:14, 10 February 2011
  • | ELINT and COMINT in support of [[electronic attack]] (e.g., jamming) *[[radar# Active electronically scanned array| active electronically scanned arrays (AESA)]]
    8 KB (1,217 words) - 22:04, 31 January 2011
  • ...[[bomber aircraft]], operating independently or with support aircraft, to attack the homeland [[counterforce|military forces]], [[countervalue|industry and ...as well as nonkinetic attacks using [[information operations]] including [[electronic warfare]].
    5 KB (767 words) - 01:14, 26 June 2009
  • ...everal kinds of aircraft: air superiority fighters, electronic and kinetic attack aircraft for [[suppression of enemy air defense]] (SEAD), and [[C3I-ISR|com ===Electronic order of battle===
    15 KB (2,233 words) - 19:14, 24 March 2011
  • ...Army, helicopters are under the [[Army aviation]] branch. A representative attack helicopter is the U.S. Army's [[AH-64 Apache]]. As are all helicopters, it ...than light machine guns and possibly small pods for [[unguided rockets]]. Attack helicopters carry heavy armament such as heavy [[machine gun]]s, [[autocann
    9 KB (1,384 words) - 03:03, 11 February 2010
  • ...and bombings, hijackings, assassinations, kidnappings, cyber-attacks, and attacks using biological, chemical, and — theoretically — nuclear weapons. ==Characteristics of Terrorist attacks==
    18 KB (2,652 words) - 21:23, 23 September 2013
  • ...dversaries, in order to determine what holds them together." CoG-oriented attack is most relevant in a total war. ...ribes that point where the enemy is most vulnerable and the point where an attack will have the best chance of being decisive. The term is borrowed from mech
    17 KB (2,557 words) - 18:20, 8 February 2011
  • ...omechanical devices. In 1956, U.K. COMINT specialists succeeded in such an attack against [[Hagelin machine]]s used by [[Egypt]]. The technique was assigned A defense against such attacks, even with all-electronic workstations and cryptosystems, can involve generating random noise that
    12 KB (1,818 words) - 06:13, 14 June 2010
  • A '''brute force''' or '''exhaustive search''' attack is an attempt to break a [[cipher]] by trying all possible keys. This is a Brute force is by no means the only attack against a cipher; there are many other techniques under the general heading
    11 KB (1,752 words) - 18:47, 22 August 2013
  • A '''brute force''' or '''exhaustive search''' attack is an attempt to break a [[cipher]] by trying all possible [[Key|keys]] in Brute force is by no means the only attack against a cipher; there are many other techniques under the general heading
    11 KB (1,816 words) - 08:25, 20 February 2016
  • ...the morale of the enemy population by what are now called [[countervalue]] attacks. Postwar studies, as well as observations during the most intense bombing In a large-scale nuclear countervalue attack, civilian morale would be irrelevant, for it is hard to have morale when on
    31 KB (4,759 words) - 09:41, 12 November 2013
  • ...]], and track back to their point of origin so the artillery can be counterattacked. Sometimes annoyingly, it can tell when a car is exceeding the speed limi ==Article scope and minimal necessary concepts from electronics==
    59 KB (9,074 words) - 11:06, 7 April 2014
  • ...Obama has said that Gaddafi must go, he distinguished US participation in attacks in support of UN humanitarian goals from military action to force regime c ...Moussa]], Secretary-General of the Arab League, said the intensity of the attacks was far more than the League had expected. ""What happened differs from th
    32 KB (4,801 words) - 11:08, 5 October 2013
  • ...omber roles, as the other major tactical aircraft used by the Air Force to attack North Vietnam, the [[F-105]], lacked the maneuverability for effective air- ...vulnerable rear of an American strike formation, then executing a missile attack and diving away before fighter cover could intervene. Scoring its first kil
    23 KB (3,796 words) - 00:58, 14 November 2010
  • ...posed by geography, by limited electrical power, and by deliberate enemy [[electronic warfare]]. *Defense Message System (DMS): the Defense Department [[electronic mail]] system
    9 KB (1,197 words) - 10:14, 1 October 2013
  • ...idered obsolete; its small key size makes it vulnerable to a [[brute force attack]] | title = "EFF DES Cracker" Machine brings Honesty to Crypto Debate; Electronic Frontier Foundation proves that DES is not secure
    16 KB (2,453 words) - 03:31, 10 June 2011
  • ...warfare]], which covers the entire [[electromagnetic spectrum]] '''chaff (electronic warfare)''' is a mass of [[radar]]-reflective material that acts as a dec ...'seduce''' the final attack. Chaff may be used in conjunction with other [[electronic warfare]], such as deceptive jammers, and final hard-kill defense systems
    5 KB (699 words) - 11:20, 12 September 2013
  • Glider attacks are obsolete, but assault landings using suitable transport aircraft (e.g. ...ss was to come in Holland in May, with a brigade-sized jump and airlanding attack under their excellent airborne commander, Gen. Kurt Student. Student himsel
    37 KB (5,685 words) - 21:16, 14 February 2011

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)