NOTICE: Citizendium is still being set up on its newer server, treat as a beta for now; please see here for more.
Citizendium - a community developing a quality comprehensive compendium of knowledge, online and free. Click here to join and contribute—free
CZ thanks our previous donors. Donate here. Treasurer's Financial Report -- Thanks to our content contributors. --

Search results

Jump to: navigation, search

Page title matches

  • ...countermeasures''', is part of [[information operations#electronic warfare|electronic warfare]], which uses of electromagnetic energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with
    5 KB (724 words) - 03:42, 30 September 2010
  • ...tively interferes with the operation of hostile systems; previously called electronic countermeasures (ECM)
    185 B (22 words) - 21:54, 6 March 2010
  • {{r|Electronic countermeasures suite controller}}
    344 B (40 words) - 02:32, 7 June 2010

Page text matches

  • immunity to noise and [[electronic warfare#electronic attack|electronic attack]], makes it harder to intercept, and can increase capacity of a shared medi
    404 B (57 words) - 16:10, 5 September 2008
  • ...countermeasures''', is part of [[information operations#electronic warfare|electronic warfare]], which uses of electromagnetic energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with
    5 KB (724 words) - 03:42, 30 September 2010
  • ....e., its [[electronic warfare#electronic attack|self-protection electronic attack capabilty]]
    2 KB (242 words) - 19:52, 12 August 2010
  • ...nic warfare]], a '''deceptive jammer''' [[electronic attack|electronically attacks]] a hostile tracking or fire control sensor, by giving it stronger signals
    1 KB (161 words) - 20:13, 27 November 2010
  • ...attacked does not, in current terminology, make it electronic protection. Electronic protection would, in this example, keep the enemy from confusing the warn ...M can engage during the [[guided missile#flight path|midcourse or terminal attack]] phases of the missile. During these phases, other countermeasures may dec
    3 KB (500 words) - 22:24, 17 February 2010
  • ...e Department was created. The national intelligence organization also runs electronic warfare and SIGINT for the Air Force and Navy. | title = Information Warfare (IW): Signals Intelligence (SIGINT), Electronic Warfare (EW) and Cyber-Warfare. Asia and Cuba
    32 KB (4,633 words) - 05:02, 8 February 2011
  • ...rations]], which includes technical measures such as computer security and attacking hostile computers, but also "soft" disciplines such as psychological war | title = Marine Corps Electronic Warfare--A Combat Power Multiplier
    30 KB (4,580 words) - 16:12, 15 April 2011
  • ...ited Kingdom]]; defeated by [[electronic warfare#electronic attack|British electronic countermeasures]] in the [[Battle of the Beams]]
    320 B (43 words) - 23:51, 27 September 2008
  • #REDIRECT [[Electronic attack]]
    31 B (3 words) - 16:32, 8 July 2010
  • #redirect [[electronic attack]]
    31 B (3 words) - 16:37, 26 June 2008
  • {{r|Electronic warfare}} {{r|Electronic attack||**}}
    2 KB (202 words) - 04:49, 22 January 2010
  •, has his own section, but also oversees intelligence and communications-electronics. ...t fielded enemy units, but they encompass a broad spectrum of targets that attacks all of the enemy's centers of gravity such as: the enemy’s leadership; i
    29 KB (4,256 words) - 08:41, 21 October 2013
  • ...'combat aircraft''' directly harm enemy forces, with kinetic or electronic attack, or deliberately go into range of enemy weapons. While the current trend is *[[Attack helicopter]]
    832 B (116 words) - 18:03, 22 August 2010
  • Auto-populated based on [[Special:WhatLinksHere/Electronic warfare expendables dispenser]]. Needs checking by a human. {{r|Chaff (electronic warfare)}}
    982 B (123 words) - 21:15, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Electronic protection]]. Needs checking by a human. {{r|Chaff (electronic warfare)}}
    700 B (89 words) - 21:15, 11 January 2010
  • {{r|Electronic warfare}} {{r|Electronic attack||**}}
    506 B (60 words) - 16:41, 2 January 2014
  • ...sic electronic warfare function, such as a [[radar warning receiver]] or [[electronic warfare expendables dispenser]]. {{Image|Electronics countermeasures suite controller.png|left|450px|Electronics countermeasures suite with conceptual central controller}}
    3 KB (471 words) - 16:15, 15 April 2011
  • {{r|Electronic warfare}} {{r|Electronic attack||**}}
    362 B (54 words) - 08:58, 27 June 2009
  • An [[electronic warfare|electronic attack]] (i.e., countermeasures) transmitter, the U.S. '''[[AN-|AN/]]ALQ-162''' ja is deployed on transport, special operations, electronic warfare and [[attack helicopter]]s such as the [[AH-64 Apache]]. The 40-pound unit is small for
    908 B (131 words) - 01:37, 21 May 2009
  • [[electronic warfare#electronic attack|jamming]] and interception for [[electronic intelligence]], as they rapidly change the frequency they use, so that th ...communications privacy, and, more importantly, resistance to [[electronic attack]] from their [[frequency agility]]. For more serious security, many units c
    3 KB (476 words) - 17:59, 10 February 2011
  • An active [[electronic warfare|electronic attack]] remote device targeted at [[radar]], spooled out by an [[AN-|AN/]][[ALE-4
    350 B (51 words) - 03:46, 12 February 2009
  • ...the crew in staying aware of the threats, and managing the deployment of [[electronic warfare]] devices that operate externally to the vehicle.<ref name=Symetr ...his context, covers enemy sensors across the [[electromagnetic spectrum]]. Electronic defense includes, as well as receivers and computers that detect and anal
    9 KB (1,290 words) - 21:59, 6 June 2010
  • ...[[electronic warfare]], most specifically [[electronic warfare|electronic attack]] on the German navigational aids, such as [[Knickebein]], [[X-Geraet]] and .... Jones]], determined that the German night bombing attacks were guided by electronic navigation signals sent from occupied Europe. Once the systems were under
    5 KB (744 words) - 21:43, 13 February 2011
  • ...her directly attack the enemy by kinetic or nonkinetic (e.g., [[electronic attack]]) means, or have a mission that takes them into the battle area (e.g., [[c
    255 B (39 words) - 18:01, 22 August 2010
  • ...[EF-18 Growler]], although an Air Force replacement has not been selected; electronic warfare versions of the [[F-22 Raptor]] and possibly [[B-1 Lancer|B-1B La ...n gather tactical and strategic [[electronic intelligence]], also called [[electronic support]] in a tactical context. It can fire [[AGM-88 HARM]] [[anti-radia
    1 KB (212 words) - 21:59, 12 August 2010
  • ==Electronics== ...) guidance assist usable when heavy [[electronic warfare#electronic attack|electronic countermeasures]] are directed against this system.
    2 KB (276 words) - 06:33, 22 September 2013
  • ...ures, and better protection against [[Electronic warfare#electronic attack|electronic deception]].
    2 KB (319 words) - 10:19, 13 August 2010
  • ...term is [[electronic attack]] although the original is still used, as in [[electronic countermeasures suite controller]]
    272 B (36 words) - 21:57, 6 March 2010
  • Auto-populated based on [[Special:WhatLinksHere/Electronic intelligence]]. Needs checking by a human. {{r|Electronic attack}}
    2 KB (310 words) - 21:15, 11 January 2010
  • ...have a crew of 1, while the F model and the [[EF-18 Growler]] dedicated [[electronic warfare]] variant have two crewmembers. ...ic warfare|electronic support]] for active [[electronic warfare|electronic attack]]. All other upgraded and new U.S. fighters are moving to AESA designs, inc
    6 KB (817 words) - 21:14, 14 February 2011
  • ...tle that the [[U.S. Navy]] planned against a serious Soviet Naval Aviation attack against [[carrier battle group]]s, the motto is that it "is better to shoot The key electronic warfare attack on the missile, in this phase, is to attack the search radar of an antiaircraft system, or other sensors that put it in
    8 KB (1,147 words) - 00:48, 13 July 2009
  • A specific form of deceptive [[electronic attack|jamming]] directed at navigational systems
    91 B (12 words) - 16:33, 8 July 2010
  • ...e large entertainment corporations have been extremely aggressive in legal attack, to the extent of creating [[chilling effect]] on legitimate users, demandi ...h includes electronic warfare, but also attack, countermeasure, and counterattack on computers and computer networks.
    9 KB (1,351 words) - 16:52, 17 April 2010
  • ...uniformed military personnel, in a national chain of command, exclusively attacking military targets. ...ilitary targets are difficult to categorize. The [[Irgun]] warned of their attack on the King David Hotel in British Palestine; evacuation would have prevent
    43 KB (6,344 words) - 05:34, 6 October 2013
  • '''EF-18 Growler''' are [[carrier-capable]] [[electronic warfare]] aircraft, built on the [[F-18 Super Hornet]] airframe, which wi ...tirement of the [[EF-111]]. As the Prowlers retire, the Navy and Air Force electronic warfare will again diverge. Where the Navy uses Growlers, the Air Force i
    5 KB (789 words) - 21:56, 12 August 2010
  • When First World War aviators began to attack ground targets, they were principally concerned with the two-dimensional gr ...d the "no man's land" in between. If the aircraft were cooperating with an attack, they might need to be aware of their own side moving into no man's land, b
    57 KB (8,468 words) - 22:51, 17 February 2011
  • ...rations (IO)''' are "The integrated employment of the core capabilities of electronic ===Electronic warfare===
    10 KB (1,459 words) - 15:05, 11 August 2009
  • ...ate one's own electronics in the face of enemy attacks, and to evade those attacks through protection or deception
    319 B (48 words) - 03:52, 1 October 2008
  • ...otecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services<ref>{{cite w | title = Field Manual 34-37: Echelons above Corps (EAC) Intelligence and Electronic Warfare (IEW) Operations
    33 KB (4,818 words) - 21:42, 7 February 2011
  • ...ition tactical air, surface, and special operations forces. Its electronic attack is now directed at communications, but will be upgraded to be capable again ...aircraft are flown by the 55th Electronic Combat Group (41st, 42nd and 43d Electronic Combat Squadrons) at [[Davis-Monthan Air Force Base]], Arizona. They have
    2 KB (317 words) - 22:55, 13 July 2009
  • ...ircraft, and the aircraft side of the cable, which connects to the onboard electronics warfare systems.<ref name=BaE-ALE55>{{citation ...s_fotd_datasheet.pdf//}}</ref> It is part of a three-part architecture for electronic warfare, in which the towed decoy is the final line of defense, using a t
    4 KB (574 words) - 13:41, 14 August 2010
  • *Protected: survivable against [[electronic warfare]] and other attacks, even if bandwidth is sacrificed ...AEHF of earlier MILSTAR satellites, which makes it much less vulnerable to attacks on ground stations. As a geosynchronous satellite over the Equator, it sti
    7 KB (925 words) - 00:00, 12 February 2011
  • ...ining [[signals intelligence]] from it, or [[electronic warfare#electronic attack|jamming]] to deny its use for [[command and control]].
    2 KB (342 words) - 17:15, 11 June 2009
  • ...''F-22 Raptor''' are being planned for attack, electronic intelligence and electronic warfare. A "fifth generation" fighter, it is extremely maneuverable, has ...tronics, especially its [[radar#active electronically scanned array|Active Electronically Scanned Array (AESA)]], the [[AN-|AN/]][[APG-77]]. Since the F-22 is
    2 KB (351 words) - 00:41, 15 August 2010
  • ...called "Predator B", which is roughly twice the size, with aerodynamic and electronic improvements. | title = Predator, Reaper to add electronic warfare payload
    6 KB (815 words) - 04:58, 8 February 2011
  • ...medium data rate communications under conditions of nuclear and electronic attack
    242 B (31 words) - 19:48, 11 April 2009
  •, and experimentally in an [[unmanned aerial vehicle]]-based electronic attack system
    236 B (31 words) - 22:29, 2 February 2009
  • ...''EB-66''', like its prececessor, was an [[electronic intelligence]] and [[electronic warfare]] aircraft built on a bomber airframe. Neither the basic B-66 nor ...t were used primarily for active ECM using high power barrage and tuneable electronic jamming of selected frequencies.
    2 KB (310 words) - 06:18, 6 July 2010
  • ...sures]] against heat-seeking missiles and can also control an [[electronic attack|radar jammer]]
    241 B (29 words) - 19:28, 14 April 2009
  • '''Electronics intelligence (ELINT)''' is a branch of [[signals intelligence]], which t .... Jones]], determined that the German night bombing attacks were guided by electronic navigation signals sent from occupied Europe. Once the systems were under
    14 KB (2,154 words) - 06:15, 14 June 2010
  • ...ountermeasures''', and include making one's signal hard to detect and thus attack ...tely expendable, such as [[chaff (electronic warfare)|chaff]] and [[flare (electronic warfare)|flares]], or can be towed, such as the [[ALE-55|AN/ALE-55]] tow
    2 KB (255 words) - 22:10, 6 June 2010
  • ...t, or using [[deceptive decoy]]s to draw attention from the real object or electronic signal.
    667 B (96 words) - 21:17, 8 July 2009
  • ...with applications in reconnaissance, missile and fighter training, attack, electronic warfare and testing [[integrated air defense system]]s
    275 B (37 words) - 17:34, 27 August 2008
  • ...ncy-hopping]] as a means to interfere with [[electronic warfare#electronic attack|jamming]] and interception for [[signals intelligence]], as they rapidly ch ...Joint STARS]] to send pictures to send information to ground troops, an [[attack helicopter]], and a command post.
    5 KB (694 words) - 17:58, 10 February 2011
  • {{r|Electronic attack}}
    369 B (49 words) - 21:20, 8 July 2009
  • ...olve physical damage, such as [[electronic warfare]], concealing smoke, or attacks on computer network software
    272 B (38 words) - 20:30, 25 December 2010
  • {{r|Electronic warfare}} {{r|Attack helicopter}}
    214 B (27 words) - 21:18, 9 December 2008
  • ...aircraft carrier]] minimize its [[electronic warfare#electronic protection|electronic emissions]]. ...e AN/APS-139, and resistant to clutter and [[electronic warfare#electronic attack|jamming]]. It used an ingenious scheme by which target altitude was determi
    8 KB (1,121 words) - 08:27, 14 October 2013
  • ...tive electronic attack. It can, however, be controlled by a more extensive electronic warfare computer, such as the [[ALQ-213|AN/ALQ-213]], which, in turn, all
    2 KB (252 words) - 04:07, 10 February 2011
  • ...ion aids, such as [[radar]] reflectors and [[electronic warfare#electronic attack|jammers]]. ...e missiles in unmanned, heavily hardened and widely dispersed silos linked electronically to a series of central launch control facilities. Senior Air Force of
    11 KB (1,614 words) - 14:54, 5 September 2009
  • ...d off, mainly because of their defeat in the Battle of Britain, German air attacks continued throughout the war, including later use of the first [[cruise mi ...sile attacks on Britain, would break civilian morale. In retrospect, while attacks on both British and German populations caused much misery, morale never br
    48 KB (7,406 words) - 21:27, 13 February 2011
  • ...oisy environments, but may be under active [[electronic warfare|electronic attack]]. The edge networks will not only not be fixed, but may be moving at high ...adical departure from traditional [[radio]], in which many of the discrete electronic components, and even fundamental techniques such as [[superheterodyne]] o
    13 KB (1,857 words) - 17:53, 10 February 2011
  • | title = Navy Nonresident Training Courses: Electronics Technician, Volume 3, communications systems ==Electronic protection and communications security==
    14 KB (2,115 words) - 13:07, 19 September 2013
  • surprising redesigns of seemingly mundane uniforms, giving individuals electronics worth of ''Starship Troopers'', and providing medical equipment and trai ..."kinetic operations", but builds in [[information operations]] including [[electronic warfare]], civil-military operations, actions on external computer networ
    34 KB (5,030 words) - 12:10, 18 October 2013
  • ...end of the 19th century, and as artillery range increased, the side being attacked, at first, could take no effective counteraction. ...e|proximity fuzed]] ammunition, [[information operations#electronic attack|electronic countermeasures]] may be able to predetonate the rounds. The latest techn
    19 KB (2,840 words) - 21:53, 25 February 2011
  • ...otecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services<ref name=Wis ...adversary's thinking, they may also be most vulnerable to the adversary's attacks on one's own organization. Before trusting an enemy agent, remember that s
    43 KB (6,102 words) - 07:25, 6 October 2013
  • ...f large volumes of [[chaff (electronic warfare)|chaff]] over an area being attacked or overflown, in support of an overall mission rather than the more usual
    300 B (42 words) - 09:11, 2 February 2009
  • ...ed from a first, mechanically scanned version, to the first [[radar#active electronically scanned array|AESA radar]] on an operational fighter, and into the se ...rade for the [[F-15E Strike Eagle]]. This aircraft is principally for deep attack, but retains significant air-to-air capabilities; its radar this needs grou
    6 KB (981 words) - 00:45, 15 August 2010
  • ...ysically destructive) artillery as well as non-kinetic resources such as [[electronic warfare]] to them,<ref>{{citation ...o [[signals intelligence]] collection and the coordination of [[electronic attack]] by other services.<ref>{{citation
    4 KB (584 words) - 19:58, 19 February 2011
  • ...jamming resistance, although they are not as hardened against [[electronic attack|jamming]] or the effects of [[nuclear weapon]]s as are the present [[MILSTA
    986 B (133 words) - 21:08, 11 April 2009
  • ...pollo_cm.jpg|right|310px|Apollo Command Module flying at a high [[angle of attack]] for lifting entry, artistic rendition.}} ...light of Apollo 4 (AS-501)," NASA TN D-5399, (1969).]</ref> This angle-of-attack was achieved by precisely offsetting the vehicle's center-of-mass from its
    56 KB (8,515 words) - 06:19, 10 October 2013
  • {{r|Attack helicopter}} {{r|Electronic warfare expendables dispenser}}
    723 B (93 words) - 21:25, 11 January 2010
  • ...e parent topics [[cryptanalysis]] and [[cryptography]] discuss brute force attacks. ...cure largely because they could resist brute force but which fell to other attacks.
    1 KB (163 words) - 03:27, 27 March 2009
  • ...les do have a [[home-on-jam]] capability so that they will attack an enemy electronic warfare system, or have [[infrared guidance]] for the terminal phase of t
    1 KB (227 words) - 03:39, 18 May 2009
  • {{r|Joint Direct Attack Munition}} ===Electronics===
    835 B (113 words) - 21:38, 14 February 2011
  • ...tems for aircraft with damaged onboard electronics, and also mark areas to attack, relative to an airborne spotter that discovered a new target. While more accurate attack direction systems replaced it in that role, it continued to be used for tra
    1 KB (185 words) - 19:04, 4 July 2010
  • | only [[armed helicopter|armed]] and [[attack helicopter]]s, | only [[armed helicopter|armed]] and [[attack helicopter]]s,
    5 KB (701 words) - 02:13, 11 August 2010
  • '''Cyberterrorism''' includes both terrorist attacks on resources in [[cyberspace]], or use of Internet and other cyberspace to “Cyberterrorism means premeditated, politically motivated attacks by sub national groups or clandestine agents, or individuals against infor
    5 KB (707 words) - 13:48, 30 May 2009
  • ...ded munition]]s. Historically, less precise systems, such as the Japanese attack at the [[Battle of Pearl Harbor]], used "dumb" weapons with varying levels A counterforce attack concentrates on enemy military systems, with several variants depending on
    3 KB (494 words) - 11:06, 8 February 2011
  • ...that enclose the warhead and soon vaporize, or as complex as maneuvering [[electronic warfare]] decoys that deceive [[measurement and signature intelligence]] ...d area or military base, the target nation is more prone to wait to counterattack.
    4 KB (610 words) - 20:05, 13 August 2010
  • {{r|Amplification attack}} {{r|Electronic warfare}}
    420 B (51 words) - 15:13, 12 June 2009
  • '''SA-6 GAINFUL''', is a highly mobile, still very capable platform for attacking aircraft at low to medium altitude. The original system mounted four ''' ==Electronics and Electro-optics==
    6 KB (842 words) - 09:17, 22 March 2014
  • ...use any elements of electronic warfare. SEAD may draw significantly from [[electronic intelligence]] at national or theater level. ...[[unmanned aerial vehicle]]s can either complement or replace conventional attack aircraft.
    14 KB (2,102 words) - 04:14, 10 February 2011
  • | ELINT and COMINT in support of [[electronic attack]] (e.g., jamming) *[[radar# Active electronically scanned array| active electronically scanned arrays (AESA)]]
    8 KB (1,217 words) - 22:04, 31 January 2011
  • ...[[bomber aircraft]], operating independently or with support aircraft, to attack the homeland [[counterforce|military forces]], [[countervalue|industry and well as nonkinetic attacks using [[information operations]] including [[electronic warfare]].
    5 KB (767 words) - 01:14, 26 June 2009
  • ...everal kinds of aircraft: air superiority fighters, electronic and kinetic attack aircraft for [[suppression of enemy air defense]] (SEAD), and [[C3I-ISR|com ===Electronic order of battle===
    15 KB (2,233 words) - 19:14, 24 March 2011
  • ...Army, helicopters are under the [[Army aviation]] branch. A representative attack helicopter is the U.S. Army's [[AH-64 Apache]]. As are all helicopters, it ...than light machine guns and possibly small pods for [[unguided rockets]]. Attack helicopters carry heavy armament such as heavy [[machine gun]]s, [[autocann
    9 KB (1,384 words) - 03:03, 11 February 2010
  • ...and bombings, hijackings, assassinations, kidnappings, cyber-attacks, and attacks using biological, chemical, and — theoretically — nuclear weapons. ==Characteristics of Terrorist attacks==
    18 KB (2,652 words) - 21:23, 23 September 2013
  • ...dversaries, in order to determine what holds them together." CoG-oriented attack is most relevant in a total war. ...ribes that point where the enemy is most vulnerable and the point where an attack will have the best chance of being decisive. The term is borrowed from mech
    17 KB (2,557 words) - 18:20, 8 February 2011
  • ...omechanical devices. In 1956, U.K. COMINT specialists succeeded in such an attack against [[Hagelin machine]]s used by [[Egypt]]. The technique was assigned A defense against such attacks, even with all-electronic workstations and cryptosystems, can involve generating random noise that
    12 KB (1,818 words) - 06:13, 14 June 2010
  • A '''brute force''' or '''exhaustive search''' attack is an attempt to break a [[cipher]] by trying all possible keys. This is a Brute force is by no means the only attack against a cipher; there are many other techniques under the general heading
    11 KB (1,752 words) - 18:47, 22 August 2013
  • A '''brute force''' or '''exhaustive search''' attack is an attempt to break a [[cipher]] by trying all possible [[Key|keys]] in Brute force is by no means the only attack against a cipher; there are many other techniques under the general heading
    11 KB (1,816 words) - 08:25, 20 February 2016
  • ...the morale of the enemy population by what are now called [[countervalue]] attacks. Postwar studies, as well as observations during the most intense bombing In a large-scale nuclear countervalue attack, civilian morale would be irrelevant, for it is hard to have morale when on
    31 KB (4,759 words) - 09:41, 12 November 2013
  • ...]], and track back to their point of origin so the artillery can be counterattacked. Sometimes annoyingly, it can tell when a car is exceeding the speed limi ==Article scope and minimal necessary concepts from electronics==
    59 KB (9,074 words) - 11:06, 7 April 2014
  • ...Obama has said that Gaddafi must go, he distinguished US participation in attacks in support of UN humanitarian goals from military action to force regime c ...Moussa]], Secretary-General of the Arab League, said the intensity of the attacks was far more than the League had expected. ""What happened differs from th
    32 KB (4,801 words) - 11:08, 5 October 2013
  • ...omber roles, as the other major tactical aircraft used by the Air Force to attack North Vietnam, the [[F-105]], lacked the maneuverability for effective air- ...vulnerable rear of an American strike formation, then executing a missile attack and diving away before fighter cover could intervene. Scoring its first kil
    23 KB (3,796 words) - 00:58, 14 November 2010
  • ...posed by geography, by limited electrical power, and by deliberate enemy [[electronic warfare]]. *Defense Message System (DMS): the Defense Department [[electronic mail]] system
    9 KB (1,197 words) - 10:14, 1 October 2013
  • ...idered obsolete; its small key size makes it vulnerable to a [[brute force attack]] | title = "EFF DES Cracker" Machine brings Honesty to Crypto Debate; Electronic Frontier Foundation proves that DES is not secure
    16 KB (2,453 words) - 03:31, 10 June 2011
  • ...warfare]], which covers the entire [[electromagnetic spectrum]] '''chaff (electronic warfare)''' is a mass of [[radar]]-reflective material that acts as a dec ...'seduce''' the final attack. Chaff may be used in conjunction with other [[electronic warfare]], such as deceptive jammers, and final hard-kill defense systems
    5 KB (699 words) - 11:20, 12 September 2013
  • Glider attacks are obsolete, but assault landings using suitable transport aircraft (e.g. was to come in Holland in May, with a brigade-sized jump and airlanding attack under their excellent airborne commander, Gen. Kurt Student. Student himsel
    37 KB (5,685 words) - 21:16, 14 February 2011
  • ...the target hard to find against the background, and systems that directly attack the infrared seeker. ...d missile is using an infrared guidance system and if its functions can be attacked.
    9 KB (1,283 words) - 22:00, 6 June 2010
  • ...ndwidth, which can cause a computer to stop responding, and can also allow attackers to gain unauthorized remote control of one or more computers. The first widespread Internet worm attack took place in 1988.<ref name=MorrisWorm>{{citation
    5 KB (809 words) - 11:36, 31 May 2009
  • [[Image:CESAS Electronic Attack.jpg|left|thumb|400px|CESAS deployed on HMMWVs]] ...cking System (CESAS), is a [[United States Marine Corps]] capability for [[electronic warfare]], which can operate in a fully [[mobile]], on-the-move from plat
    3 KB (398 words) - 02:35, 7 June 2010
  • ...ed for attack is escorted by an [[EF-18 Growler]] or some future dedicated electronic warfare platform, the mission planners may choose not to insert the jamm
    1 KB (166 words) - 01:53, 15 August 2010
  • ...a capability to fight other airplanes, that detracts from their mission of attacking a surface target. ...ttack by fighters, modern bombers carry no defensive guns, but extensive [[electronic warfare]] systems to defeat or hide from enemy [[radar]].
    7 KB (1,143 words) - 23:10, 20 March 2009
  • ...e the first modern [[precision-guided munition]]s. Like the [[Joint Direct Attack Munition]], PAVEWAY is a set of components that attaches to a conventional ...h cost reductions, was responsible for the dramatic "video game" precision attacks of the [[Gulf War]]. [[PAVEWAY III]], however, was a major redesign that,
    7 KB (1,150 words) - 14:21, 4 March 2011
  • ...rong electronic and [[hip-hop]] influences. In 2004, he suffered a [[heart attack]], but later returned to performing. His final album, ''[[Blackstar]]'', wa
    2 KB (329 words) - 22:35, 12 January 2016
  • ...[guided missile]] or [[unmanned aerial vehicle]] capable of flying to, and attacking, several locations. are not intended to do permanent damage of any type. They may conduct [[electronic warfare]] for a short period of time, or be designed to disable electrica
    4 KB (588 words) - 19:30, 1 November 2008
  • ...lectron donor), either an atom or a group, that can undergo [[nucleophilic attack]] of the terminal halogenated carbon(s) to form a cyclic cation ([[phosphon
    6 KB (977 words) - 01:06, 29 January 2011
  • ..., a (usually) mobile transmitting device that will lure an enemy weapon to attack it rather than the real platform it is protecting
    206 B (29 words) - 23:36, 19 January 2009
  • ...ield]] and was effectively written off as a fighting force by Japanese air attacks.<ref name=Hyper6>{{citation }}, pp. 201-218</ref> "The ability to change roles quickly, [from OCA attack, offensive sweep, SEAD, and DCA.] even while airborne on a mission, can com
    8 KB (1,219 words) - 21:28, 14 February 2011
  • The '''Trafalgar-class''' is a type of British [[Submarine#Attack submarine|tactical submarine]], the first of which, ''[[HMS Trafalgar S107| | title = Trafalgar Class Attack Submarines, United Kingdom
    4 KB (604 words) - 06:56, 1 September 2010
  • {{r|Attack helicopter}} {{r|Electronic intelligence}}
    1 KB (155 words) - 21:08, 11 January 2010
  • ...would have a nuclear capability of 3 first-generation SRAM's (Short-Range Attack Missiles). The next designation was RS-71 (Reconnaissance-Strike) when the analog design which, based on pitot-static, pitch, roll, yaw, angle-of-attack inputs, would determine how much movement was required. By moving, the spik
    53 KB (8,382 words) - 04:51, 19 April 2014
  • ...hreat's tracking or guidance mechanism, so it loses the target or fails to attack anything. .... Ideally, it will seem enough like the real submarine that the enemy will attack it.
    1 KB (165 words) - 22:06, 6 June 2010
  • The formal US definition is generic: "An attack to damage or destroy an objective or a capability".<ref <ref name=JP1-02>{{ ...fenses that could interfere with strike aircraft. Air, sea, and land based electronic warfare assets can help the strikers penetrate.
    8 KB (1,226 words) - 11:03, 8 February 2011
  • ...major accidents; the role was to change again after the [[9-11 Attack|9/11 Attacks]]. ...port stating that even the management of civilian consequences of military attack, much less natural disasters, was an individual and local responsibility. <
    16 KB (2,370 words) - 19:55, 19 May 2010
  • ...tion missile|anti-radar]] applications but sometimes home-on-jam against [[electronic warfare]]
    281 B (35 words) - 06:02, 17 February 2011
  • [[Image:Gamma phage.gif|thumb|200 px|Negative stain electron micrograph of the gamma phage from which the PlyG lytic enzyme was cloned f ...other scientists. It was not until the first phage was observed under an [[electron microscope]] by [[Helmut Ruska]] in 1939 that its true nature was establish
    20 KB (3,245 words) - 11:43, 27 August 2013
  • [[Image:Gamma phage.gif|thumb|200 px|Negative stain electron micrograph of the gamma phage from which the PlyG lytic enzyme was cloned f ...other scientists. It was not until the first phage was observed under an [[electron microscope]] by [[Helmut Ruska]] in 1939 that its true nature was establish
    20 KB (3,198 words) - 11:42, 27 August 2013
  • ...diation source, which may be the antenna rather than the harder-to-replace electronics. ...for the basic attack on surface radars, but also have explicitly addressed attacking dedicated C3I aircraft, including airborne warning and control. Some U.S
    6 KB (950 words) - 22:43, 6 June 2010
  • ...f accuracy, balance and impartiality in news reports appearing on print or electronic media was one of the many reasons that evoked the Terai unrest. Dozens of journalists were attacked, manhandled, threatened, their offices wrecked, their vehicle burnt and d
    5 KB (793 words) - 07:14, 11 November 2007
  • ...arget, the helicopters rapidly separate, releasing decoys such as [[chaff (electronic warfare)|chaff]]. ...modern navy, there are multiple concentric rings of defenses through which attackers must pass. During the Cold War, the U.S. Navy believed in starting with
    4 KB (575 words) - 21:29, 10 July 2009
  • ...COMINT or communications intelligence) or between machines (i.e., ELINT or electronic intelligence), or mixtures of the two. As sensitive information is often ...phy]]. A simple encryption system, for example, is the [[Caesar cipher]]. Electronic interception appeared as early as 1900, during the Boer War. The Boers ha
    36 KB (5,237 words) - 15:21, 8 October 2019
  • ...approach than the U.S. [[AGM-88 HARM]] and the French [[Matra Armat]]. All attack enemy [[radar]], often as part of an [[integrated air defense system]]. The ...with Armat, both ALARM and HARM are more for the defense of a general air attack mission than as an independent mission to destroy long-range [[radar]]. Bri
    13 KB (2,179 words) - 02:14, 9 March 2011
  • ...trikes onto them. When air support was delayed, however, the patrols might attack key SCUD system elements with their organic weapons and explosives. See [[# ...mission deals with locating targets, and planning, guiding, and evaluating attacks against them.
    53 KB (8,150 words) - 22:58, 8 February 2011
  • | volume = George Washington University National Security Archive Electronic Briefing Book No. 121 ...s increasingly irrelevant in the face of larger and larger VC conventional attacks. [[Military Assistance Command, Vietnam]] began to refer to the "two wars"
    50 KB (7,729 words) - 11:34, 17 September 2013
  • ...capabilities of the [[United States Coast Guard]] following [[al-Qaeda]]'s attacks in the [[United States|Continental USA]] on September 11th, 2001.<ref> ...rticles/military-aerospace-electronics/volume-14/issue-12/news/coast-guard-electronics-upgrade-program-kicks-into-high-gear.html
    4 KB (564 words) - 05:05, 1 January 2014
  • ...tary)|tanks]], which are a subset of [[armored fighting vehicle]]s (AFV). Attacking a tank factory, or a refinery that makes fuel for tanks, is not part of ...the AFV but limiting its operation. Indirect attacks can threaten kinetic attack (e.g., a minefield in the path of the tanks), or fall into a wide range of
    7 KB (1,075 words) - 09:30, 21 February 2010
  • {{r|Electronic intelligence}} {{r|Flare (electronic warfare)}}
    2 KB (247 words) - 00:27, 15 February 2011
  • ...WMD facilities, may need [[hard target penetrator]]s or other specialized attacks.
    3 KB (378 words) - 01:01, 24 April 2011
  • ...legitimize the insurgents and lead to their lasting defeat. This line will attack the hard-core insurgents. Some may succumb to offers of amnesty, but most w | title =Physical Attack Information Operations in Bosnia: Counterinformation in a Peace Enforcement
    48 KB (7,182 words) - 20:56, 8 February 2011
  • The '''AGM-84 SLAM (Stand-off Land Attack Missile)''' is a land-attack derivative of the [[AGM-84 Harpoon]], an [[anti-shipping missile]].<ref nam ...rrent versions are air-launched, it may be adapted to a shorter-range land attack weapon for submarines, to complement the longer-range Tomahawks, although a
    5 KB (694 words) - 17:06, 16 August 2010
  • ...posed by non-state groups developing more cunning and destructive means to attack and terrorize -- scenarios that transcend the familiar contingencies that d *53 – 55 attack submarines and 4 guided missile submarines (non-nuclear weapons)
    17 KB (2,360 words) - 05:40, 5 October 2013
  • {{r|Joint Direct Attack Munition}} {{r|Full Authority Digital Electronic Control}}
    785 B (110 words) - 19:37, 17 February 2011
  • ...ircraft''' is a fast and maneuverable aircraft, whose capabilities include attacking other aircraft. There are a variety of missions, and many fighters are b have some air combat capability, but generally would concentrate on the attack mission, perhaps relying on speed to avoid interceptors.
    8 KB (1,200 words) - 06:47, 16 September 2009
  • {{r|Attack helicopter}} {{r|Electronic warfare}}
    2 KB (219 words) - 02:20, 12 January 2010
  • ...ed for training, proficiency testing, and similar requirements. All ground attack variants, beginning with the [[F-15E Strike Eagle]], are two seat, with a p ...n informal motto of "not a pound for air to ground", as a high-performance attack aircraft retaining air combat capability, the Strike Eagle has been extreme
    2 KB (372 words) - 11:14, 31 May 2009
  • ...s do converge on a target, not every military action, where multiple units attacked from all sides of a target, constitute swarming. Other conflicts, especi ...another swarm of horse archers would sometimes replace them, and sometimes attack elsewhere. The Scythians eventually cause the [[phalanx]] to break formatio
    7 KB (1,045 words) - 11:22, 8 February 2011
  • {{r|Attack helicopter}} {{r|Flare (electronic warfare)}}
    1 KB (144 words) - 21:29, 11 January 2010
  •, in which major naval campaigns were concerned with coastal defense and attacks on individual or small groups of ships. Maritime activity was therefore ex ...Union blockade of the Confederacy. Nevertheless, there were major tactical attacks on ports and rivers. The [[Battle of Hampton Roads]] was a two-day affair
    9 KB (1,318 words) - 11:47, 18 March 2014
  • [[U.S. Navy]] '''Los Angeles-class''' [[attack submarine]]s have been in three major generations, starting with the 31 boa ...), also called "Improved 688i", have improved under-ice capability, better electronics, and are quieter.
    1 KB (185 words) - 08:08, 14 April 2011
  • ...] and coenzyme A, and the dihydrolipoyl dehydrogenase subunits contain the electron-transferring coenzymes [[FAD]] and [[Nicotinamide adenine dinucleotide|NAD] ...try, as well as [[Benzoin Condensation|benzoin condensation]]). This anion attacks the S1 of the oxidized lipoate species in an Sn2-like mechanism that displ
    5 KB (643 words) - 17:17, 6 April 2009
  • | journal = Journal of Electronic Defense ...lear weapons, there are deeply penetrating precision guided bombs that can attack them. Deep burial, with appropriate concealment during construction, is a w
    74 KB (10,988 words) - 21:31, 25 November 2013
  • ...localize it sufficiently to aim weapons at it. Of course, once a submarine attacks, any surviving enemies now know it is in the general area; submariners cal ..., which was to be attached, by a screw, to the hull. Unfortunately for the attacker, the hull had freshly been covered with sheets of copper, and those sheet
    23 KB (3,543 words) - 23:34, 20 February 2014
  • ...] (his title was First Lord of the Admiralty), where he planned the failed attack on Turkey in the [[Gallipoli Campaign]]. He served in the important roles o ...s, he "crossed the floor" to sit as a member of the [[Liberal Party]]. He attacked his erstwhile Conservative colleagues relentlessly; they bitterly denounc
    39 KB (6,181 words) - 19:43, 7 October 2019
  • {{r|Attack helicopter}} {{r|APR-48|AN/APR-48A Radar Frequency Interferometer Electronic Support}} target acquisition system
    616 B (84 words) - 04:08, 15 September 2009
  • ...t-term objective, rather than either fundamentally disrupting the enemy by attacking a [[centers of gravity (military)|center of gravity]], or using force an ...ya, said "In my view, on 30 December 1972, after eleven days of those B-52 attacks on the Hanoi area, you had won the war. It was over… They and their whol
    10 KB (1,629 words) - 07:05, 15 August 2010
  • ...e technical evolution, and, in August 2005, an upgrade Fire Control Radar Electronics Unit (REU) as part of the US Army's Apache Longbow Block III modernizati
    900 B (131 words) - 20:32, 18 December 2009
  • ...ues that have perfectly valid operational uses can also be preparation for attacks. See [[network reconnaissance]]. ...rified [[fingerprint]], or "something you have", such as a physical key or electronic [[security token]].
    13 KB (2,006 words) - 10:18, 22 May 2010
  • * [[AC-130|AC-130H/U Spectre/Spooky II]] precision night ground attack for special operations ...OMPASS CALL]] [[communications intelligence]] and [[information operations#electronic warfare|jamming]]
    2 KB (279 words) - 02:22, 15 August 2010
  • ...e control and have it follow its current trajectory. Some of its guidance electronics have been used in the [[AGM-84 SLAM]] program. ...missile, might not be used today; guided bombs such as the [[Joint Direct Attack Munition]] or [[PAVEWAY]] do not have identifiers in the powered missile fa
    2 KB (263 words) - 21:14, 14 February 2011
  • ..., regroup, and attack again. "Pulsing", where the units shift the point of attack, is a necessary part of swarming. Swarming is not limited to the pure human''' involves the use of many autonomous forces against an opponent, the attacking forces being highly mobile and in effective communication and being sync
    60 KB (8,926 words) - 07:45, 6 October 2013
  • See also: [[electronic medical record]], [[electronic health record]], [[clinical decision support system]], and [[medical orde ...ocardial infarction|Myocardial Infarction]]…to prevent deaths from heart attack."
    65 KB (9,110 words) - 02:20, 27 October 2013
  • ...'[[Atomic Kitty]]', the cat was [[surgery|surgically]] altered to contain electronic equipment, but the first field test ended in disaster when the would-be a ...<ref>''BBC'': '[ Shark attacks not linked to Mossad says Israel]'. 7th December 2010.</ref>
    7 KB (1,011 words) - 15:33, 10 September 2011
  • On July 4, the DRV announced that RVN guerrillas attacked in Laos on 27 June and the DRV coast on 30 June. General [[Nguyen Cao Ky] ...lan was to consist of "Psychological Operations"; Phase II of "Hit and Run Attacks." The latter included "amphibious raids using Vietnamese
    18 KB (2,711 words) - 20:43, 17 November 2012
  • *[[Air Force Electronic Systems Center]] **Fighter Attack Systems Wing
    5 KB (770 words) - 03:04, 23 December 2009
  • ...dar itself, which would have very substantial power available in the final attack.
    3 KB (418 words) - 00:22, 28 October 2008
  • <center>'''Strategic aircraft capable of attacking the Japanese Home Islands'''</center> ...d physical productive capacity by roughly the following percentages of pre-attack plant capacity: <ref>United States Strategic Bombing Survey, ''Summary Repo
    14 KB (2,138 words) - 12:23, 12 September 2013
  • ...n service. Unauthenticated encryption is vulnerable to [[man-in-the-middle attack]]s . Also note that encryption does not prevent [[traffic analysis]]. ...that all mail passing between a pair or a group of sites is encrypted. An attacker looking only at external traffic, without access to anything on or behind
    40 KB (6,216 words) - 08:26, 17 October 2013
  • A '''fuze''' is an electronic, pyrotechnic or mechanical system that initiates the detonation of a [[wa ...The fuse may act "instantaneously", or with a mechanically, and eventually electronically, set delay.
    6 KB (962 words) - 23:54, 6 March 2011
  • ...ace warfare]], [[anti-air warfare]], [[anti-submarine warfare]] and [[land attack]]. While technically warships, vessels purpose-built for [[mine warfare]] ...t acquisition]], [[fire control (military)|fire control]], and defensive [[electronic warfare]], as well as for [[navigation]] and [[telecommunications network
    1 KB (178 words) - 05:59, 15 April 2010
  • }}</ref>. Both electronics and missiles were constantly upgraded over the system' life. ...elative to the SA-1. It is intended for defeat of manned and pilotless air attack weapons at the heights from 100 m to 30 km, which fly with speeds of up to
    12 KB (1,954 words) - 01:01, 5 July 2010
  • {{r|Joint Direct Attack Munition||**}} ''Variant being developed to allow high-altitude torpedo dr ====Electronic warfare====
    956 B (112 words) - 00:18, 15 February 2011
  • ...e known to be in active research. Charged particle beams, using protons or electrons rather than the photons of lasers, have been of some interest but do not s
    1 KB (174 words) - 13:30, 16 January 2011
  • ...6]] capabilities, Combat Direction Finding, the [[SLQ-32|AN/SLQ-32(V3)]] [[electronic warfare]] suite, and Extended Range (ER) [[surface-to-air missile]]s. ...ional Capability; *Phase II integrated system upgrades including Deceptive Electronic Countermeasures, Track Load Control algorithms, and Track Initiation Proc
    7 KB (1,059 words) - 18:26, 10 February 2011
  • {{r|Chaff (electronic warfare)|Chaff}} {{r|Fast attack craft}}
    1 KB (144 words) - 16:34, 12 October 2009
  • {{r|Electronic health record}} {{r|Transient ischemic attack}}
    1 KB (134 words) - 20:37, 2 March 2010
  • ...000), nearly all such ciphers became more or less breakable by an informed attacker. Such classical ciphers still enjoy popularity today, though mostly as [[ ...crecy of the key should be alone sufficient for confidentiality when it is attacked. This fundamental principle was first explicitly stated in 1883 by [[Augu
    9 KB (1,309 words) - 02:07, 16 August 2011
  • ...orth Vietnamese motor torpedo boats, during their action on 2 August 1964. Attacks by aircraft from USS ''Ticonderoga'' (CVA-14) are also shown.]] the [[Republic of Vietnam]] (South Vietnam). Two attacks by DRV [[fast attack craft]] were described to the Congress, one on the lone destroyer USS ''Mad
    15 KB (2,343 words) - 05:57, 27 February 2013
  • ...itive insight into the circuit and often is easier to derive than a direct attack on the gain. ...ely characterizes feedback amplifiers, including loading effects and the [[Electronic amplifier#Unilateral or bilateral|bilateral]] properties of amplifiers an
    19 KB (3,224 words) - 14:47, 30 June 2011
  • ...eneric terms &mdash; so the '''Su-25''' and its derivatives are, while jet attack planes that first flew in 1979, still are "Shturmoviks".<ref GS-Su-25>{{cit An unusual weapons load found useful for attacking Afghan ground targets in a line (e.g., vehicles on a road) were wing-mou
    3 KB (495 words) - 09:34, 21 March 2014
  • ...ecision bombing and Pathfinder roles, and then in a variety of bombing and attack missions after the war. It remains in service, at RAF Marham, flying [[Pana other Lancaster squadrons. Even he was not told, until just before the attacks, of the exact targets, just that low flying over water was required.
    3 KB (408 words) - 06:22, 17 February 2011
  • ...West. [[Mohammed Atta]] and three others directly involved in the [[9-11 Attacks]] radicalized while in [[Hamburg]], [[Germany]], and then traveled to Paki | title = The Terrorists Among Us: Why an al Qaeda attack on U.S. soil is still a real threat.
    6 KB (912 words) - 07:19, 23 September 2013
  • *[[RIM-161 Standard SM-3]] when equipped with area BMD electronics *Super Rapid Blooming 6-barrelled SRBOC [[chaff (electronic warfare)|chaff]] and infrared decoy launchers;
    5 KB (739 words) - 00:13, 18 August 2010
  • {{r|Electronic warfare}} {{r|Joint Direct Attack Munition}}
    3 KB (358 words) - 21:38, 14 February 2011
  • ...d neutral term for people who interfere with networks, either by technical attacks or deceptive "human engineering". '''[[Hacker]]''', at one time, had no n ...f protest, or a plethora of other reasons, might alter data (e.g., put the electronic equivalent of graffiti on a web page), or force the system to be unusable
    3 KB (445 words) - 15:21, 31 October 2008
  • ...penetration aid, to take out air defenses on the way to the targets to be attacked with [[gravity bomb]]s. ...troops and for missions with conventional weapons, but retaining a nuclear attack capability with cruise missiles. Strategic delivery of nuclear bombs would
    24 KB (3,627 words) - 18:29, 5 March 2013
  • ...s had a much more capable AWACS platform using the Il-76 but more advanced electronics, the [[Beriev A-50]] ...flexibility did emerge.<ref name=Clark2000 /> The Iraqis considered ground attack their most important air warfare mission, and put their best pilots into th
    38 KB (5,873 words) - 09:23, 12 October 2013
  • There was an apparent, mutually reinforcing belief that [[wolf pack]] attacks by groups of submarines were much more deadly than individual operations, ...ans were not declassified until 1975, [[Winston Churchill]] paid homage to electronic warfare, and its companion ELINT, in his series on the Second World War:
    23 KB (3,454 words) - 00:22, 14 September 2010
  • [[Electronic warfare]], in the broad usage, considers all parts of the electromagnetic ...obra]], sensed that a laser designator or rangefinder was "painting" the [[attack helicopter]], and sent a new warning signal that appeared on the cockpit di
    3 KB (494 words) - 06:51, 8 March 2011
  • ..., tend to be under exceptional security, and there may be, for example, no electronic communications that can be intercepted by the [[National Security Agency] interdiction groups) for these meetings. It leads policy development to attack the trade in nuclear materials (nuclear smuggling), and coordinate closely
    68 KB (9,926 words) - 04:25, 1 January 2014
  • ...aval Surface Fire Support (NSFS), [[anti-submarine warfare]] (ASW), [[land attack]] and [[anti-surface warfare]] (ASuW) missions, and, in some cases, [[balli control system. The core radar is an [[SPY-1|AN/SPY-1]] [[radar#passive electronically scanned array|passive phased array]], which can be upgraded with a [[
    8 KB (1,160 words) - 16:04, 16 April 2011
  • | title = National Security Archive Electronic Briefing Book No. 5 | title = National Security Archive Electronic Briefing Book No. 153
    12 KB (1,829 words) - 13:35, 13 September 2009
  • === Electronic Code Book, ECB === In '''Electronic Code Book''' mode, the cipher is just applied to each block of plaintext
    8 KB (1,294 words) - 04:01, 2 March 2010
  • ...tical, indicating that an opponent is not only preparing for war, but will attack in the near term. :* Attacks against the analyst's country and its interests, which can come from state
    69 KB (10,271 words) - 16:45, 6 November 2010
  • ...during the traditional cease-fire of the [[Tet]] holiday, Communist forces attacked 36 of 44 provincial capitals and 5 of 6 major cities is most often called #Major urban attacks in early 1968
    35 KB (5,538 words) - 19:50, 4 July 2010
  • | work = Electronic Briefing Book No. 130 ...that cannot communicate cannot fight, so [[information operations]] and [[electronic warfare]] are additional means that can be decisive, without any physical
    36 KB (5,313 words) - 00:26, 21 November 2010
  • {{r|Electronic intelligence}} {{r|Suicide attack}}
    1 KB (151 words) - 22:11, 11 January 2010
  • In a '''man-in-the-middle''' attack on a communications system, the attacker is the man-in-the-middle.<ref name=Ellison>{{citation ...other but in fact both are talking to him. It is an [[active attack]]; the attacker needs not only the ability to intercept messages, but to insert his own a
    7 KB (1,012 words) - 06:46, 20 February 2016
  • ...high/low mix of fighters, the F-16 took the low role, with a strong ground attack capability, but also having its maneuverability and combat radius (distance It was assumed the aircraft electronics ([[avionics]]) would constantly be updated, so the aircraft has a [[MIL-
    13 KB (1,948 words) - 00:38, 15 August 2010
  • ...xtensive options, than the other main U.S. guided bomb, the [[Joint Direct Attack Munition]] (JDAM). ...cts to standard [[MIL-STD-1553]]/[[MIL-STD-1760]] (also NATO STANAG 3837) electronic interfaces, and could, in principle, be used by any aircraft with them. "
    5 KB (692 words) - 21:41, 24 October 2013
  • ...ion of the European firm [[EADS]], the '''Eurocopter Tiger''' is a light [[attack helicopter]] initially to be used by Australia, France, Germany and Spain.< | title = Tiger Attack Helicopter, Europe
    2 KB (223 words) - 12:15, 24 January 2009
  • ...ers usually use uranyl acetate and phosphotungstate to stain the virus for electron microscopy.<ref>[]</ref> ...s still the number one favorite host of mite and WSMV. Mites and WSMV only attack the other cereal plants when the wheat crops are severe damaged, grown old,
    26 KB (4,353 words) - 09:51, 1 November 2013
  • ...liction]], but allowing a fighter pilot the discretion to pursue the final attack. Soviet doctrine, including that of Iraq, was more centralized and less fle *Find the attackers
    18 KB (2,758 words) - 09:27, 22 March 2014
  • ...i.e., causing physical damage or destruction) or '''nonkinetic''' (e.g., [[electronic warfare]] and interference with computers or networks). similarities and differences to [[ballistic missile defense]]. Both can attack the launcher, but cruise missile launchers are far more likely to be mobile
    4 KB (678 words) - 23:47, 25 January 2009
  • ...on guidance to [[RIM-156 Standard SM-2]] missiles in over-the-horizon ASuW attack. ...d (EO/IR) sensor, the directional infrared countermeasures system, and the electronic support measures system. Northrop Grumman’s Mission Systems sector will
    7 KB (960 words) - 19:47, 17 February 2011
  • ...ash; a character of text in a manual system, a byte or computer word in an electronic version. The receiver has an identical pad to use in decryption. One-time pad is that, properly used, it is provably secure against all [[passive attack]]s. However, the requirement that each part be used only once means the key
    12 KB (1,874 words) - 13:49, 11 October 2013
  • ...edits include "Star Wars: Episode I - The Phantom Menace" and "Episode II: Attack of the Clones", "Galaxy Quest", "Terminator 3", "A.I." and the "Matrix" seq ...cluding Star Wars: Episode 1 - The Phantom Menace, Star Wars: Episode 2 - Attack of the Clones, Starship Troopers, Galaxy Quest, T3, The Matrix, The Matrix
    5 KB (750 words) - 00:06, 5 November 2009
  • {{r|Land attack}} {{r|Electronic warfare}}
    967 B (130 words) - 21:38, 19 March 2011
  • ====Electronic warfare and electronic intelligence==== ...Analyzer]] with [[ALR-66| AN/ALR-66C(V)3]] [[ELINT]]/[[electronic warfare|electronic support]] receiver. The C version incorporates a spinning [[direction-fin
    8 KB (1,183 words) - 08:33, 21 March 2014
  • ...ttleships began, in the early 20th century, with [[torpedo]]es from [[fast attack craft]] and [[mine (naval)|mines]]. These [[#The underwater threat|underwat ...ertiary battery of medium guns for such purposes as defense against [[fast attack craft]]. Some have suggested that the USS ''Monitor'' might have been the p
    29 KB (4,423 words) - 03:45, 22 June 2013
  • | title = Goldwater attacks Johnson's Vietnam policy ...nal waters, Operation PIERCE ARROW was the formal name for the retaliatory attack against naval bases, and an oil refinery at [[Vinh]].
    7 KB (1,103 words) - 17:30, 18 February 2011
  • ...operators trained in the UK in 1990. <ref>Private Eye, 31.8.90; Thorn EMI Electronics entry, BAEE catalogue 1990; Sunday Times, 2.12.90; Jane's Defence Weekly The [[BAE Hawk]] trainer/light attack aircraft is manufactured only for export from Britain. <ref name=FAS-SPP-At
    28 KB (4,221 words) - 12:32, 12 September 2013
  • *[[AC-47 Spooky (ground attack)]], also known as "Puff the Magic Dragon", [[Vietnam War]] gunship Other military variants served in [[electronic warfare]], ski-equipped transport, [[search and rescue]], air ambulance,
    1 KB (213 words) - 15:36, 13 February 2011
  • ...[[torture]], not all coercive interrogation qualifies as torture. It does attack the subject's defenses, causing psychological regression, but it can includ | volume = George Washington University National Security Archive Electronic Briefing Book No. 122
    23 KB (3,348 words) - 16:00, 12 February 2011
  • | title = Plan of Attack | year = 2004 | publisher = George Washington University National Security Archive Electronic Briefing Book No. 198
    3 KB (465 words) - 22:29, 30 June 2009
  • ...endly forces on the ground. These sensors allow the gunship to visually or electronically identify friendly ground forces and targets any place, any time. Both the AC-130s employ the latest technologies and can attack two targets simultaneously.
    5 KB (764 words) - 02:23, 15 August 2010
  • ...mple expendables, such as [[chaff (electronic warfare)|chaff]] or [[flare (electronic warfare)|flares]], a more complex expendable such as the Australian [[Nul ...intelligent and independently moving decoys. Surface ships, under torpedo attack, can fire acoustic decoys from their deck-mounted expendables launchers, or
    2 KB (237 words) - 22:03, 6 June 2010
  • ...dates every 10 seconds, and also allows soldiers and marines to exchange [[electronic mail]] and Microsoft Word documents. BFT2 communicates through the commer ...port.png|right|500px|BFT view of Baghdad International Airport, April 2003 attack]]
    5 KB (694 words) - 18:48, 10 February 2011
  • in Bremen, was transformed in France into an electronic eavesdropping ship between 1976 and 1977. ...rried out significant missions in the Indian Ocean following the 9/11/2001 attacks.
    9 KB (1,235 words) - 22:48, 11 October 2009
  • mainly focused on the R&D of increasingly sophisticated landmines (like electronic mines and mines with remote control activation, with radio crypto-coded s Between 1977 and 1987, Iraq purchased from the Soviet Union eight fast-attack [[Osa class missile boat]]s--each equipped with [[Styx SS-N-2]] [[anti-ship
    14 KB (2,089 words) - 01:59, 1 October 2013
  • | Bomber and attack aircraft ...e oil in the non-Communist world, and, especially when oil facilities were attacked, the war caused worldwide economic disruption
    26 KB (4,099 words) - 00:44, 12 October 2013
  • |uses= coinage, jewelry, electronics ...) [[transition metal]]. Modern industrial uses include [[dentistry]] and [[electronics]]. Gold is the basis for a [[Gold standard|monetary standard]] used by t
    27 KB (4,192 words) - 22:16, 3 May 2011
  • ...ure, human error, weather and other natural causes, and physical and cyber attacks. Addressing these vulnerabilities will necessarily require flexible, evolu but also a high-risk target, through human error rather than deliberate attack.
    7 KB (1,028 words) - 02:38, 16 June 2010
  • ...ionics failed. The pilot turned his jet towards the airport when the jet's electronics returned to working order. During this time Yousefi witnessed the UFO an ...xplained at the time. The term "gremlin" was used to describe, among other electronic phenomena, unexplained readings from World War II radar systems. There ar
    18 KB (2,921 words) - 07:26, 17 November 2013
  • ...ts. Nature 340:467-8</ref> [[Image:Phage S.gif|thumb|200 px|A Transmission Electron Microscope Image of the ''Synechococcus'' Phage S-PM2 by Hans-Wolfgang Acke [[Image:Myoviruses P-SSM2 and P-SSM4.gif|thumb|350 px|Electron micrograph of negatively-stained ''Prochlorococcus'' Myoviruses P-SSM2 and
    25 KB (3,751 words) - 00:57, 9 August 2018
  • ...ts. Nature 340:467-8</ref> [[Image:Phage S.gif|thumb|200 px|A Transmission Electron Microscope Image of the ''Synechococcus'' Phage S-PM2 by Hans-Wolfgang Acke [[Image:Myoviruses P-SSM2 and P-SSM4.gif|thumb|350 px|Electron micrograph of negatively-stained ''Prochlorococcus'' Myoviruses P-SSM2 and
    25 KB (3,807 words) - 04:44, 15 November 2014
  • ...have been affected by other failures. A [[distributed denial of service]] attack on specialized infrastructure provider of [[Domain Name System]] (DNS) serv | title = DDoS attack on UltraDNS affects,,
    57 KB (8,395 words) - 07:15, 24 October 2013
  • ...should be distributed in the formation, so a single less-than-catastrophic attack will not leave the unit leaderless. ...split into lead and trail elements, which must stay in constant visual or electronic contact. While the lead element moves continuously, the trail element mov
    5 KB (841 words) - 17:59, 8 July 2009
  • the book, ''Underground: Tales of hacking, madness and obsession on the electronic frontier''.<ref>{{citation | title = Underground: Tales of hacking, madness and obsession on the electronic frontier
    70 KB (10,269 words) - 23:37, 7 April 2014
  • ...raids of 20-40 aircraft, as might come from Israel or Iran, not a massive attack. While it used Soviet doctrine, there was a huge difference between challen [[Operation DESERT STORM#Suppressing KARI: Poobah's Party|Coalition air attack]] during [[Operation DESERT STORM]].
    6 KB (921 words) - 20:40, 23 August 2009
  • {{r|Attack helicopter}} {{r|APR-48|AN/APR-48A Radar Frequency Interferometer Electronic Support}} target acquisition system
    2 KB (228 words) - 04:09, 15 September 2009
  • ...r a buildup by [[special operations]] forces and an intensification of air attacks under the [[Operation NORTHERN WATCH]] and [[Operation SOUTHERN WATCH]] "n ...e lethality of the U.S. armored vehicles, and aggressively but haphazardly attacked them. <ref>Zucchino, pp. 14-15</ref> Senior Iraqi Army officers seemed t
    62 KB (9,789 words) - 23:35, 31 October 2013
  • ...s that break the rules come down quickly."<ref>{{cite web | title =YouTube attacked by MPs over sex and violence footage|author=| publisher = [[Daily Telegra ...eir [[IP address]]es and login names. The decision was criticized by the [[Electronic Frontier Foundation]], which called the court ruling "a set-back to priva
    53 KB (7,747 words) - 14:25, 9 October 2013
  • ...ial law to carry out massive raids on Buddhist pagodas and portrayed those attacks as the responsibility of the ARVN and the CIA. However, the raids were no | volume = George Washington University Electronic Briefing Book No. 101
    8 KB (1,236 words) - 20:52, 24 September 2013
  • ...Birthday), which fell on May 8, many Buddhists perceived this as a direct attack on their customs., killing several adults and children. The Diem government described the attack as having been arranged by Viet Cong provocateurs, without strong evidence;
    15 KB (2,324 words) - 22:15, 19 October 2012
  • {{r|Attack helicopter}} {{r|Flare (electronic warfare)}}
    5 KB (720 words) - 02:21, 12 January 2010
  • ...are the current [[attack helicopter]] of the [[United States Army]]. U.S. attack helicopters differ from "armed helicopters" in that they have no troop or c ...ack.jpg|thumb|right|300px|AH-64 attack helicopter returning from the first attack of the war]]
    4 KB (580 words) - 01:41, 22 August 2010
  • ...ground combat troops withdrawing between 1968 and 1972, with the last air attacks in 1972. After that, the U.S. provided limited replacements of supplies, a ...enhower]] succeeded Truman as President in 1952, after a campaign that had attacked Truman's "weaknesses" against communism and in Korea, he formulated a str
    56 KB (8,488 words) - 07:39, 5 October 2013
  • #Electronic Systems ==Electronic Systems==
    1 KB (180 words) - 17:16, 14 July 2009
  • ...tive II: retain the sensors and keep the program’s systems that focus on attacking targets more than 20 km away. All manned vehicles, unmanned ground vehic ...[[#Unmanned ground vehicles|unmanned ground vehicles]], non-line-of-sight attack systems, and unattended ground sensors. They will also provide libraries of
    31 KB (4,614 words) - 11:39, 8 April 2011
  • ...n Army SIGINT unit. A large number of personnel were killed in the Israeli attack on the SIGINT ship, ''USS Liberty''. ...minating to the FBI and Secret Service information acquired by you through electronic devices pursuant to requests from the FBI and Secret Service, it is reque
    72 KB (10,683 words) - 13:22, 11 October 2013
  • ...)|key]] and are designed to be hard to read without that key. Of course an attacker's intent is exactly the opposite; he wants to read the material without a ...enough and sufficiently random that searching for the key (a [[brute force attack]]) is effectively impossible, and in any application which encrypts large v
    53 KB (8,368 words) - 20:41, 29 June 2014
  • ...)|key]] and are designed to be hard to read without that key. Of course an attacker's intent is exactly the opposite; he wants to read the material without a ...enough and sufficiently random that searching for the key (a [[brute force attack]]) is effectively impossible, and in any application which encrypts large v
    53 KB (8,395 words) - 18:27, 22 August 2013
  • {{r|Attack helicopter}} {{r|Electronic intelligence}}
    4 KB (533 words) - 02:23, 12 January 2010
  • ...perating signal characteristics of enemy transmitters, antennas, and other electronic equipment. ...research institutions. I was able to watch the DI respond to the terrorist attacks of 11 September 2001 and ramp-up for the war on terrorism.
    37 KB (5,529 words) - 02:14, 27 September 2013
  • ...[[History of cryptography]] for details. With the spread of computers and electronic communication systems in recent decades, cryptography has become much mor ...For instance, the effects of [[Moore's Law]] on the speed of [[brute force attack]]s must be taken into account when specifying [[cryptographic key#key lengt
    55 KB (8,724 words) - 22:37, 25 August 2013
  • ...[[History of cryptography]] for details. With the spread of computers and electronic communication systems in recent decades, cryptography has become much mor ...For instance, the effects of [[Moore's Law]] on the speed of [[brute force attack]]s must be taken into account when specifying [[cryptographic key#key lengt
    56 KB (8,878 words) - 17:44, 10 April 2014
  • ...d ammunition. When a general would make a strategic argument, Hitler would attack his credibility by showing a small point to be incorrect. Speer observed th ...then-new [[explosively formed projectile|shaped charge demolitions]], the attack succeeded more through surprise and speed.
    67 KB (10,623 words) - 05:52, 3 November 2013
  • ...s on January 12, 2002. After Macgregor briefed Franks, Franks responded, "Attack from a cold start. I agree. Straight at Baghdad. Small and fast. I agree. S ...tical matter, the oil facilities were kept under close surveillance as the attack grew closer. <ref>COBRA II, pp. 166-167</ref>
    20 KB (3,013 words) - 14:39, 28 September 2013
  • ...s authentication can use someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable m ...e design process in cryptography; publish your design and invite others to attack it. Nearly all cryptographic algorithms and protocols undergo this process
    32 KB (4,913 words) - 22:33, 25 August 2013
  • ...s authentication can use someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable m ...e design process in cryptography; publish your design and invite others to attack it. Nearly all cryptographic algorithms and protocols undergo this process
    32 KB (4,913 words) - 22:36, 25 August 2013
  • ...important means of defeating modern militaries are "nonkinetic" such as [[electronic warfare]]. "Contact" must be interpreted in an era of long-range systems to time immemorial, but its basic functions of reconnaissance and shock attack have now been given to [[armored fighting vehicle]]s, light ground vehicles
    1 KB (186 words) - 16:56, 11 November 2008
  • ...rmation of NSA. In 1955, ASA took over electronic intelligence (ELINT) and electronic warfare functions previously carried out by the Signal Corps. Since its m ...Underwing fuel tanks were added to this model, and the AQM-34R updated the electronics and had standard underwing tanks.<ref name=RyanDrone />
    74 KB (11,149 words) - 21:13, 23 July 2010
  • ...ate with the distant destination. The only goal is communicating with the electronics in a local '''cell''', which is a relatively small geographic area cente ==Electronic warfare==
    3 KB (525 words) - 23:11, 18 February 2010
  • ...nce community was dealing with aspects of terrorism long before the [[9-11 attack]]. Those aspects included the support of guerrillas against the Soviets, in ...well as sources, had changed, with the greater use of suicide attacks and attacks by women and children. A very significant concern was the possible use, by
    32 KB (4,667 words) - 06:40, 5 October 2013
  • ...q and [[Kuwait]], began on 17 January 1991, at 02:00 local time, with an [[attack helicopter]] strike against an early warning [[radar]] just inside Iraq. D ...adarAttack.jpg|thumb|left|AH-64 attack helicopter returning from the first attack of the war]]
    29 KB (4,491 words) - 07:08, 15 August 2010
  • {{seealso|Fast attack craft}} ...en called "torpedo boat" and exists in new forms generically called [[fast attack craft]].
    50 KB (7,528 words) - 00:55, 16 December 2010
  • ...e decentralized models, sometimes because they are enabled by new forms of electronic communications. ...ine communications personnel may be aware of the direct contact, but newer electronics allow the leader to manage his or her only communications.
    55 KB (8,423 words) - 11:55, 19 October 2013

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)