Search results

Jump to navigation Jump to search
  • {{r|Electronic attack||**}}
    2 KB (195 words) - 14:18, 22 March 2024
  • '''Electronic attack''', also called '''electronic countermeasures''', is part of [[information Electronic attack may attempt to "burn out" and permanently destroy its targets, but it is mo
    5 KB (724 words) - 22:42, 29 September 2010
  • ...S. and Coalition tactical air, surface, and special operations forces. Its electronic attack is now directed at communications, but will be upgraded to be capable again
    2 KB (315 words) - 05:01, 14 March 2024
  • {{r|Electronic attack}}
    369 bytes (49 words) - 16:20, 8 July 2009
  • ...., electro-optical) guidance assist usable when heavy [[electronic warfare#electronic attack|electronic countermeasures]] are directed against this system.
    2 KB (276 words) - 01:33, 22 September 2013
  • ...er]] IFF ([[identification friend or foe]]). The EB-66B/E versions were [[electronic attack]] versions used to jam enemy electronics with greater power than could the
    2 KB (310 words) - 12:10, 20 March 2024
  • In [[electronic warfare]], a '''deceptive jammer''' [[electronic attack|electronically attacks]] a hostile tracking or fire control sensor, by givi
    1 KB (161 words) - 15:13, 27 November 2010
  • In electronic warfare terms, this is a attack on the electronic warfare#electronic attack|missile's guidance system. That the attack is being done to protect the air
    3 KB (502 words) - 07:28, 18 March 2024
  • ...ern classification, usually combines features of [[electronic support]], [[electronic attack]], and [[electronic protection]]. Practical implementations usually contain ...ground, satellite, or [[unmanned aerial vehicle]] sensors or cooperating [[electronic attack]] equipment.
    3 KB (471 words) - 05:01, 14 March 2024
  • ...lity|frequency-hopping]] as a means to interfere with [[electronic warfare#electronic attack|jamming]] and interception for [[electronic intelligence]], as they rapidly ...rovide some communications privacy, and, more importantly, resistance to [[electronic attack]] from their [[frequency agility]]. For more serious security, many units c
    3 KB (476 words) - 12:59, 10 February 2011
  • | title =EA-18G Airborne Electronic Attack Aircraft F/A-18G "Growler" | title = EA-18G Growler Electronic Attack Aircraft, USA
    5 KB (789 words) - 16:56, 12 August 2010
  • ...ic support comes from antennas on the aircraft, but the electronic warfare#electronic attack|jamming of the threat sensor can come either from aircraft or towed decoy.
    4 KB (574 words) - 07:30, 18 March 2024
  • ...ete system of detection, passive and deceptive countermeasures, and active electronic attack. It can, however, be controlled by a more extensive electronic warfare comp
    2 KB (253 words) - 07:28, 18 March 2024
  • ...tions with jamming resistance, although they are not as hardened against [[electronic attack|jamming]] or the effects of nuclear weapons as are the present [[MILSTAR]]
    932 bytes (127 words) - 17:02, 22 March 2024
  • ...re emerging. Some would be vulnerable to [[information operations]], using electronic attack or intrusion into computer centers. Specialized weapons may be useful for c
    3 KB (494 words) - 07:37, 28 March 2024
  • {{r|Electronic attack}}
    2 KB (308 words) - 04:52, 14 March 2024
  • ...cator (MTI)]] reatures, and better protection against [[Electronic warfare#electronic attack|electronic deception]].
    2 KB (319 words) - 05:19, 13 August 2010
  • ...side is gaining [[signals intelligence]] from it, or [[electronic warfare#electronic attack|jamming]] to deny its use for [[command and control]].
    3 KB (372 words) - 21:14, 23 October 2020
  • Electronic attack on missile in this stage try to break track: to force a maneuvering missile Final electronic attack can try to destroy the terminal seeker (e.g., with directed infrared conter
    8 KB (1,165 words) - 10:58, 2 March 2024
  • ...[[electronic warfare|electronic support]] for active [[electronic warfare|electronic attack]]. All other upgraded and new U.S. fighters are moving to AESA designs, inc
    6 KB (817 words) - 16:14, 14 February 2011
  • | title =EA-18G Airborne Electronic Attack Aircraft F/A-18G "Growler" ...e" references to the Predator actually discuss signals intelligence, not [[electronic attack]] payloads.
    6 KB (815 words) - 23:58, 7 February 2011
  • ...estricted to [[signals intelligence]] collection and the coordination of [[electronic attack]] by other services.<ref>{{citation
    4 KB (584 words) - 08:07, 20 March 2024
  • ...lity|frequency-hopping]] as a means to interfere with [[electronic warfare#electronic attack|jamming]] and interception for [[signals intelligence]], as they rapidly ch
    5 KB (694 words) - 12:58, 10 February 2011
  • ...gnal from frieldly sources. This cartridge holds either electronic warfare#electronic attack|self-protection jammers or the AN-|AN/ALE-55 Fiber Optic Towed Decoy (FOTD) ...ic support comes from antennas on the aircraft, but the electronic warfare#electronic attack|jamming of the threat sensor can come either from aircraft or towed decoy.
    9 KB (1,289 words) - 07:28, 18 March 2024
  • :*Interfering with the opponent's systems, called either '''electronic attack''' or. more traditionally, '''electronic countermeasures''' (ECM). Purely e
    10 KB (1,449 words) - 07:30, 18 March 2024
  • ...A radar has a secondary role of electronic support, and may also have some electronic attack capability.
    6 KB (982 words) - 07:30, 18 March 2024
  • ...that of the AN/APS-139, and resistant to clutter and [[electronic warfare#electronic attack|jamming]]. It used an ingenious scheme by which target altitude was determi
    8 KB (1,121 words) - 10:05, 10 February 2023
  • ...ortant than [[electronic warfare]], most specifically [[electronic warfare|electronic attack]] on the German navigational aids, such as [[Knickebein]], [[X-Geraet]] and
    5 KB (745 words) - 07:57, 28 March 2024
  • ...ecific context of tactical warfare. ESM give the information needed for '''Electronic Attack (EA)''' such as jamming. EA is also called '''Electronic Counter-Measures''
    14 KB (2,151 words) - 07:29, 18 March 2024
  • ...situation began to resemble the military minuet of [[electronic warfare]]: electronic attack, countermeasure, and response by counter-countermeasures. It is noteworthy
    9 KB (1,351 words) - 11:52, 17 April 2010
  • ...go to ground, satellite, or unmanned aerial vehicle sensors or cooperating electronic attack equipment. :*Interfering with the opponent's systems, called either '''electronic attack (EA)''' or, traditionally, '''electronic countermeasures''' (ECM).
    30 KB (4,571 words) - 12:10, 20 March 2024
  • | ELINT and COMINT in support of [[electronic attack]] (e.g., jamming)
    8 KB (1,217 words) - 17:04, 31 January 2011
  • ...ntelligence fusion, including from UAV-carried sensor, and coordinate with electronic attack. ...t-M is mentioned in Russian literature as a portable direction-finding and electronic attack system
    32 KB (4,633 words) - 00:02, 8 February 2011
  • ...noise of a combat environment, as well as deliberate [[electronic warfare|electronic attack]], JTIDS has [[error control#forward error correction|forward error correct
    14 KB (2,115 words) - 08:07, 19 September 2013
  • ...ctrically noisy environments, but may be under active [[electronic warfare|electronic attack]]. The edge networks will not only not be fixed, but may be moving at high
    13 KB (1,857 words) - 10:07, 10 February 2023
  • ...ptical guidance mode was an unpleasant surprise to the Israelis, who found electronic attack|jamming useless against it, and had to make the launchers a high priority o
    5 KB (845 words) - 07:28, 18 March 2024
  • ...f the operations branch, to make sure electronic warfare#electronic attack|electronic attack does not damage friendly communications, and to define the electronic warfa
    29 KB (4,252 words) - 07:36, 18 March 2024
  • ...dination of other service actions, collection of signals intelligence, and electronic attack specific to counter-improvised explosive devices.<ref>{{citation
    34 KB (5,015 words) - 08:09, 20 March 2024
  • ...se penetration aids, such as [[radar]] reflectors and [[electronic warfare#electronic attack|jammers]].
    11 KB (1,614 words) - 09:54, 5 September 2009
  • | Recommendations for kinetic and electronic attack | Recommendations for kinetic and electronic attack
    33 KB (4,818 words) - 12:10, 20 March 2024
  • ...ed munition]]s, up-close-and-personal action by special operations forces, electronic attack, etc., all offer the potential of defeating an enemy without having to beat
    17 KB (2,557 words) - 13:20, 8 February 2011
  • ...ed [[proximity fuze|proximity fuzed]] ammunition, [[information operations#electronic attack|electronic countermeasures]] may be able to predetonate the rounds. The lat
    19 KB (2,826 words) - 17:53, 12 March 2024
  • ...e some of the roles air power can play in nonkinetic response? ISR is one. Electronic attack, and information warfare from air platforms, are others. Historically, kine ...ansmission of information that will cause computer systems to fail. Basic electronic attack starts with jamming, and moves to more subtle MIJI (Meaconing, Intrusion, J
    56 KB (8,441 words) - 10:10, 23 March 2024
  • | Recommendations for kinetic and electronic attack | Recommendations for kinetic and electronic attack
    42 KB (6,092 words) - 04:31, 21 March 2024
  • *[[Cyberterrorism]] – the electronic attack on critical computer infrastructure
    42 KB (6,275 words) - 04:34, 21 March 2024
  • *[[Cyberterrorism]] – the electronic attack on critical computer infrastructure
    42 KB (6,278 words) - 04:34, 21 March 2024
  • ...on all models of the [[F-35 Joint Strike Fighter]] can also be used for [[electronic attack]] with the antennas transmitting to interfere with an enemy radar, or using
    59 KB (9,074 words) - 06:06, 7 April 2014
View ( | next 500) (20 | 50 | 100 | 250 | 500)