Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • ...vides greater immunity to noise and [[electronic warfare#electronic attack|electronic attack]], makes it harder to intercept, and can increase capacity of a shared medi
    404 bytes (57 words) - 11:10, 5 September 2008
  • ...terferes with the operation of hostile systems; the more recent term is [[electronic attack]] although the original is still used, as in [[electronic countermeasures s
    272 bytes (36 words) - 16:57, 6 March 2010
  • ..., over targets in the [[United Kingdom]]; defeated by [[electronic warfare#electronic attack|British electronic countermeasures]] in the [[Battle of the Beams]]
    320 bytes (43 words) - 18:51, 27 September 2008
  • #redirect [[electronic attack]]
    31 bytes (3 words) - 11:37, 26 June 2008
  • #REDIRECT [[Electronic attack]]
    31 bytes (3 words) - 11:32, 8 July 2010
  • Military '''combat aircraft''' directly harm enemy forces, with kinetic or electronic attack, or deliberately go into range of enemy weapons. While the current trend is *[[Electronic attack]]
    828 bytes (116 words) - 15:53, 4 April 2024
  • ...ft that either directly attack the enemy by kinetic or nonkinetic (e.g., [[electronic attack]]) means, or have a mission that takes them into the battle area (e.g., [[c
    255 bytes (39 words) - 13:01, 22 August 2010
  • A specific form of deceptive [[electronic attack|jamming]] directed at navigational systems
    91 bytes (12 words) - 11:33, 8 July 2010
  • {{r|Electronic attack}}
    973 bytes (121 words) - 18:00, 1 April 2024
  • {{r|Electronic attack}}
    672 bytes (86 words) - 14:14, 6 April 2024
  • {{r|Electronic attack||**}}
    506 bytes (60 words) - 11:41, 2 January 2014
  • ...fare]], '''electronic protection''' measures can be used to defend against electronic attack. They may be passive, such as shielding one's own equipment, using highly d
    2 KB (256 words) - 10:44, 8 April 2024
  • ...ronic warfare]] includes a wide range of concealment methods, including [[electronic attack|jamming]] sensors so they cannot detect the object of interest, or using [[
    667 bytes (96 words) - 16:17, 8 July 2009
  • ...ft provides a wide range of electronic warfare functions. It can carry out electronic attack such as jamming or deceptive signal generation. It can gather tactical and On both the EA-6B and the EF-18, the primary electronic attack system is the ALQ-99|AN/ALQ-99, receivers and antennas for which are mounte
    1 KB (214 words) - 16:22, 30 March 2024
  • ...ble low to medium data rate communications under conditions of nuclear and electronic attack
    242 bytes (31 words) - 14:48, 11 April 2009
  • {{r|Electronic attack||**}}
    362 bytes (54 words) - 03:58, 27 June 2009
  • ...ermeasures (i.e., its electronic warfare#electronic attack|self-protection electronic attack capabilty
    2 KB (241 words) - 16:24, 30 March 2024
  • '''Electronic attack''', also called '''electronic countermeasures''', is part of [[information Electronic attack may attempt to "burn out" and permanently destroy its targets, but it is mo
    5 KB (727 words) - 10:44, 8 April 2024
  • {{r|Electronic attack}}
    369 bytes (49 words) - 16:20, 8 July 2009
  • ...er]] IFF ([[identification friend or foe]]). The EB-66B/E versions were [[electronic attack]] versions used to jam enemy electronics with greater power than could the
    2 KB (309 words) - 17:57, 1 April 2024
  • In [[electronic warfare]], a '''deceptive jammer''' [[electronic attack|electronically attacks]] a hostile tracking or fire control sensor, by givi
    1 KB (161 words) - 15:13, 27 November 2010
  • ...ern classification, usually combines features of [[electronic support]], [[electronic attack]], and [[electronic protection]]. Practical implementations usually contain ...ground, satellite, or [[unmanned aerial vehicle]] sensors or cooperating [[electronic attack]] equipment.
    3 KB (472 words) - 10:44, 8 April 2024
  • ...agility|frequency-hopping as a means to interfere with electronic warfare#electronic attack|jamming and interception for electronic intelligence, as they rapidly chang ...provide some communications privacy, and, more importantly, resistance to electronic attack from their frequency agility. For more serious security, many units can con
    3 KB (476 words) - 16:23, 30 March 2024
  • | title =EA-18G Airborne Electronic Attack Aircraft F/A-18G "Growler" | title = EA-18G Growler Electronic Attack Aircraft, USA
    5 KB (788 words) - 16:23, 30 March 2024
  • {{r|Electronic attack}}
    2 KB (305 words) - 14:13, 6 April 2024
  • ...tions with jamming resistance, although they are not as hardened against [[electronic attack|jamming]] or the effects of nuclear weapons as are the present [[MILSTAR]]
    951 bytes (130 words) - 10:20, 8 April 2024
  • ...indicator (MTI) reatures, and better protection against Electronic warfare#electronic attack|electronic deception.
    2 KB (309 words) - 16:23, 30 March 2024
  • ...cs are emerging. Some would be vulnerable to information operations, using electronic attack or intrusion into computer centers. Specialized weapons may be useful for c
    3 KB (499 words) - 14:13, 6 April 2024
  • ...side is gaining [[signals intelligence]] from it, or [[electronic warfare#electronic attack|jamming]] to deny its use for [[command and control]].
    3 KB (372 words) - 10:35, 4 April 2024
  • Electronic attack on missile in this stage try to break track: to force a maneuvering missile Final electronic attack can try to destroy the terminal seeker (e.g., with directed infrared conter
    8 KB (1,160 words) - 06:56, 4 April 2024
  • | title =EA-18G Airborne Electronic Attack Aircraft F/A-18G "Growler" ...e" references to the Predator actually discuss signals intelligence, not [[electronic attack]] payloads.
    6 KB (820 words) - 12:05, 31 March 2024
  • ...agility|frequency-hopping as a means to interfere with electronic warfare#electronic attack|jamming and interception for signals intelligence, as they rapidly change t
    4 KB (694 words) - 16:22, 30 March 2024
  • ...estricted to [[signals intelligence]] collection and the coordination of [[electronic attack]] by other services.<ref>{{citation
    4 KB (586 words) - 15:37, 8 April 2024
  • :*Interfering with the opponent's systems, called either '''electronic attack''' or. more traditionally, '''electronic countermeasures''' (ECM). Purely e
    10 KB (1,449 words) - 07:30, 18 March 2024
  • ...an that of the AN/APS-139, and resistant to clutter and electronic warfare#electronic attack|jamming. It used an ingenious scheme by which target altitude was determine
    8 KB (1,122 words) - 02:18, 7 April 2024
  • ...ecific context of tactical warfare. ESM give the information needed for '''Electronic Attack (EA)''' such as jamming. EA is also called '''Electronic Counter-Measures''
    14 KB (2,151 words) - 07:29, 18 March 2024
  • ...situation began to resemble the military minuet of [[electronic warfare]]: electronic attack, countermeasure, and response by counter-countermeasures. It is noteworthy
    9 KB (1,351 words) - 14:13, 6 April 2024
  • ...go to ground, satellite, or unmanned aerial vehicle sensors or cooperating electronic attack equipment. :*Interfering with the opponent's systems, called either '''electronic attack (EA)''' or, traditionally, '''electronic countermeasures''' (ECM).
    30 KB (4,571 words) - 06:56, 4 April 2024
  • ...ntelligence fusion, including from UAV-carried sensor, and coordinate with electronic attack. ...t-M is mentioned in Russian literature as a portable direction-finding and electronic attack system
    32 KB (4,630 words) - 06:04, 8 April 2024
  • ...le noise of a combat environment, as well as deliberate electronic warfare|electronic attack, JTIDS has error control#forward error correction|forward error correction.
    14 KB (2,111 words) - 16:23, 30 March 2024
  • ...lectrically noisy environments, but may be under active electronic warfare|electronic attack. The edge networks will not only not be fixed, but may be moving at high sp
    13 KB (1,859 words) - 16:22, 30 March 2024
  • ...f the operations branch, to make sure electronic warfare#electronic attack|electronic attack does not damage friendly communications, and to define the electronic warfa
    29 KB (4,252 words) - 07:36, 18 March 2024
  • ...dination of other service actions, collection of signals intelligence, and electronic attack specific to counter-improvised explosive devices.<ref>{{citation
    34 KB (5,015 words) - 08:09, 20 March 2024
  • ...release penetration aids, such as radar reflectors and electronic warfare#electronic attack|jammers.
    11 KB (1,608 words) - 16:22, 30 March 2024
  • | Recommendations for kinetic and electronic attack | Recommendations for kinetic and electronic attack
    33 KB (4,818 words) - 12:10, 20 March 2024
  • ...ided munitions, up-close-and-personal action by special operations forces, electronic attack, etc., all offer the potential of defeating an enemy without having to beat
    17 KB (2,545 words) - 05:11, 31 March 2024
  • ...ar-based proximity fuze|proximity fuzed ammunition, information operations#electronic attack|electronic countermeasures may be able to predetonate the rounds. The lates
    19 KB (2,822 words) - 16:21, 30 March 2024
  • ...e some of the roles air power can play in nonkinetic response? ISR is one. Electronic attack, and information warfare from air platforms, are others. Historically, kine ...ansmission of information that will cause computer systems to fail. Basic electronic attack starts with jamming, and moves to more subtle MIJI (Meaconing, Intrusion, J
    56 KB (8,444 words) - 07:02, 4 April 2024
  • | Recommendations for kinetic and electronic attack | Recommendations for kinetic and electronic attack
    42 KB (6,092 words) - 04:31, 21 March 2024
  • *[[Cyberterrorism]] – the electronic attack on critical computer infrastructure
    42 KB (6,275 words) - 04:34, 21 March 2024
  • *[[Cyberterrorism]] – the electronic attack on critical computer infrastructure
    42 KB (6,278 words) - 04:34, 21 March 2024