Search results

Jump to navigation Jump to search
  • In [[electronic warfare]], a '''deceptive jammer''' [[electronic attack|electronically attacks]] a hostile tracking or fire control sensor, by givi
    1 KB (161 words) - 15:13, 27 November 2010
  • ...ern classification, usually combines features of [[electronic support]], [[electronic attack]], and [[electronic protection]]. Practical implementations usually contain ...ground, satellite, or [[unmanned aerial vehicle]] sensors or cooperating [[electronic attack]] equipment.
    3 KB (472 words) - 10:44, 8 April 2024
  • ...agility|frequency-hopping as a means to interfere with electronic warfare#electronic attack|jamming and interception for electronic intelligence, as they rapidly chang ...provide some communications privacy, and, more importantly, resistance to electronic attack from their frequency agility. For more serious security, many units can con
    3 KB (476 words) - 16:23, 30 March 2024
  • | title =EA-18G Airborne Electronic Attack Aircraft F/A-18G "Growler" | title = EA-18G Growler Electronic Attack Aircraft, USA
    5 KB (788 words) - 16:23, 30 March 2024
  • {{r|Electronic attack}}
    2 KB (305 words) - 14:13, 6 April 2024
  • ...tions with jamming resistance, although they are not as hardened against [[electronic attack|jamming]] or the effects of nuclear weapons as are the present [[MILSTAR]]
    951 bytes (130 words) - 10:20, 8 April 2024
  • ...indicator (MTI) reatures, and better protection against Electronic warfare#electronic attack|electronic deception.
    2 KB (309 words) - 16:23, 30 March 2024
  • ...cs are emerging. Some would be vulnerable to information operations, using electronic attack or intrusion into computer centers. Specialized weapons may be useful for c
    3 KB (499 words) - 14:13, 6 April 2024
  • ...side is gaining [[signals intelligence]] from it, or [[electronic warfare#electronic attack|jamming]] to deny its use for [[command and control]].
    3 KB (372 words) - 10:35, 4 April 2024
  • Electronic attack on missile in this stage try to break track: to force a maneuvering missile Final electronic attack can try to destroy the terminal seeker (e.g., with directed infrared conter
    8 KB (1,160 words) - 06:56, 4 April 2024
  • | title =EA-18G Airborne Electronic Attack Aircraft F/A-18G "Growler" ...e" references to the Predator actually discuss signals intelligence, not [[electronic attack]] payloads.
    6 KB (820 words) - 12:05, 31 March 2024
  • ...agility|frequency-hopping as a means to interfere with electronic warfare#electronic attack|jamming and interception for signals intelligence, as they rapidly change t
    4 KB (694 words) - 16:22, 30 March 2024
  • ...estricted to [[signals intelligence]] collection and the coordination of [[electronic attack]] by other services.<ref>{{citation
    4 KB (586 words) - 15:37, 8 April 2024
  • :*Interfering with the opponent's systems, called either '''electronic attack''' or. more traditionally, '''electronic countermeasures''' (ECM). Purely e
    10 KB (1,449 words) - 07:30, 18 March 2024
  • ...ecific context of tactical warfare. ESM give the information needed for '''Electronic Attack (EA)''' such as jamming. EA is also called '''Electronic Counter-Measures''
    14 KB (2,151 words) - 07:29, 18 March 2024
  • ...situation began to resemble the military minuet of [[electronic warfare]]: electronic attack, countermeasure, and response by counter-countermeasures. It is noteworthy
    9 KB (1,351 words) - 14:13, 6 April 2024
  • ...go to ground, satellite, or unmanned aerial vehicle sensors or cooperating electronic attack equipment. :*Interfering with the opponent's systems, called either '''electronic attack (EA)''' or, traditionally, '''electronic countermeasures''' (ECM).
    30 KB (4,571 words) - 06:56, 4 April 2024
  • ...ntelligence fusion, including from UAV-carried sensor, and coordinate with electronic attack. ...t-M is mentioned in Russian literature as a portable direction-finding and electronic attack system
    32 KB (4,630 words) - 06:04, 8 April 2024
  • ...le noise of a combat environment, as well as deliberate electronic warfare|electronic attack, JTIDS has error control#forward error correction|forward error correction.
    14 KB (2,111 words) - 16:23, 30 March 2024
  • ...lectrically noisy environments, but may be under active electronic warfare|electronic attack. The edge networks will not only not be fixed, but may be moving at high sp
    13 KB (1,859 words) - 16:22, 30 March 2024
  • ...f the operations branch, to make sure electronic warfare#electronic attack|electronic attack does not damage friendly communications, and to define the electronic warfa
    29 KB (4,252 words) - 07:36, 18 March 2024
  • ...dination of other service actions, collection of signals intelligence, and electronic attack specific to counter-improvised explosive devices.<ref>{{citation
    34 KB (5,015 words) - 08:09, 20 March 2024
  • ...release penetration aids, such as radar reflectors and electronic warfare#electronic attack|jammers.
    11 KB (1,605 words) - 09:12, 22 April 2024
  • | Recommendations for kinetic and electronic attack | Recommendations for kinetic and electronic attack
    33 KB (4,818 words) - 12:10, 20 March 2024
  • ...ided munitions, up-close-and-personal action by special operations forces, electronic attack, etc., all offer the potential of defeating an enemy without having to beat
    17 KB (2,545 words) - 05:11, 31 March 2024
  • ...ar-based proximity fuze|proximity fuzed ammunition, information operations#electronic attack|electronic countermeasures may be able to predetonate the rounds. The lates
    19 KB (2,822 words) - 16:21, 30 March 2024
  • ...e some of the roles air power can play in nonkinetic response? ISR is one. Electronic attack, and information warfare from air platforms, are others. Historically, kine ...ansmission of information that will cause computer systems to fail. Basic electronic attack starts with jamming, and moves to more subtle MIJI (Meaconing, Intrusion, J
    56 KB (8,444 words) - 07:02, 4 April 2024
  • | Recommendations for kinetic and electronic attack | Recommendations for kinetic and electronic attack
    42 KB (6,092 words) - 04:31, 21 March 2024
  • *[[Cyberterrorism]] – the electronic attack on critical computer infrastructure
    42 KB (6,277 words) - 07:33, 20 April 2024
  • *[[Cyberterrorism]] – the electronic attack on critical computer infrastructure
    42 KB (6,280 words) - 07:33, 20 April 2024
View ( | next 50) (20 | 50 | 100 | 250 | 500)