Search results
Jump to navigation
Jump to search
- {{r|Electronic attack||**}}2 KB (195 words) - 14:18, 22 March 2024
- '''Electronic attack''', also called '''electronic countermeasures''', is part of [[information Electronic attack may attempt to "burn out" and permanently destroy its targets, but it is mo5 KB (724 words) - 22:42, 29 September 2010
- ...S. and Coalition tactical air, surface, and special operations forces. Its electronic attack is now directed at communications, but will be upgraded to be capable again2 KB (315 words) - 05:01, 14 March 2024
- {{r|Electronic attack}}369 bytes (49 words) - 16:20, 8 July 2009
- ...., electro-optical) guidance assist usable when heavy [[electronic warfare#electronic attack|electronic countermeasures]] are directed against this system.2 KB (276 words) - 01:33, 22 September 2013
- ...er]] IFF ([[identification friend or foe]]). The EB-66B/E versions were [[electronic attack]] versions used to jam enemy electronics with greater power than could the2 KB (310 words) - 12:10, 20 March 2024
- In [[electronic warfare]], a '''deceptive jammer''' [[electronic attack|electronically attacks]] a hostile tracking or fire control sensor, by givi1 KB (161 words) - 15:13, 27 November 2010
- In electronic warfare terms, this is a attack on the electronic warfare#electronic attack|missile's guidance system. That the attack is being done to protect the air3 KB (502 words) - 07:28, 18 March 2024
- ...ern classification, usually combines features of [[electronic support]], [[electronic attack]], and [[electronic protection]]. Practical implementations usually contain ...ground, satellite, or [[unmanned aerial vehicle]] sensors or cooperating [[electronic attack]] equipment.3 KB (471 words) - 05:01, 14 March 2024
- ...lity|frequency-hopping]] as a means to interfere with [[electronic warfare#electronic attack|jamming]] and interception for [[electronic intelligence]], as they rapidly ...rovide some communications privacy, and, more importantly, resistance to [[electronic attack]] from their [[frequency agility]]. For more serious security, many units c3 KB (476 words) - 12:59, 10 February 2011
- | title =EA-18G Airborne Electronic Attack Aircraft F/A-18G "Growler" | title = EA-18G Growler Electronic Attack Aircraft, USA5 KB (789 words) - 16:56, 12 August 2010
- ...ic support comes from antennas on the aircraft, but the electronic warfare#electronic attack|jamming of the threat sensor can come either from aircraft or towed decoy.4 KB (574 words) - 07:30, 18 March 2024
- ...ete system of detection, passive and deceptive countermeasures, and active electronic attack. It can, however, be controlled by a more extensive electronic warfare comp2 KB (253 words) - 07:28, 18 March 2024
- ...tions with jamming resistance, although they are not as hardened against [[electronic attack|jamming]] or the effects of nuclear weapons as are the present [[MILSTAR]]932 bytes (127 words) - 17:02, 22 March 2024
- ...re emerging. Some would be vulnerable to [[information operations]], using electronic attack or intrusion into computer centers. Specialized weapons may be useful for c3 KB (494 words) - 07:37, 28 March 2024
- {{r|Electronic attack}}2 KB (308 words) - 04:52, 14 March 2024
- ...cator (MTI)]] reatures, and better protection against [[Electronic warfare#electronic attack|electronic deception]].2 KB (319 words) - 05:19, 13 August 2010
- ...side is gaining [[signals intelligence]] from it, or [[electronic warfare#electronic attack|jamming]] to deny its use for [[command and control]].3 KB (372 words) - 21:14, 23 October 2020
- Electronic attack on missile in this stage try to break track: to force a maneuvering missile Final electronic attack can try to destroy the terminal seeker (e.g., with directed infrared conter8 KB (1,165 words) - 10:58, 2 March 2024
- ...[[electronic warfare|electronic support]] for active [[electronic warfare|electronic attack]]. All other upgraded and new U.S. fighters are moving to AESA designs, inc6 KB (817 words) - 16:14, 14 February 2011
- | title =EA-18G Airborne Electronic Attack Aircraft F/A-18G "Growler" ...e" references to the Predator actually discuss signals intelligence, not [[electronic attack]] payloads.6 KB (815 words) - 23:58, 7 February 2011
- ...estricted to [[signals intelligence]] collection and the coordination of [[electronic attack]] by other services.<ref>{{citation4 KB (584 words) - 08:07, 20 March 2024
- ...lity|frequency-hopping]] as a means to interfere with [[electronic warfare#electronic attack|jamming]] and interception for [[signals intelligence]], as they rapidly ch5 KB (694 words) - 12:58, 10 February 2011
- ...gnal from frieldly sources. This cartridge holds either electronic warfare#electronic attack|self-protection jammers or the AN-|AN/ALE-55 Fiber Optic Towed Decoy (FOTD) ...ic support comes from antennas on the aircraft, but the electronic warfare#electronic attack|jamming of the threat sensor can come either from aircraft or towed decoy.9 KB (1,289 words) - 07:28, 18 March 2024
- :*Interfering with the opponent's systems, called either '''electronic attack''' or. more traditionally, '''electronic countermeasures''' (ECM). Purely e10 KB (1,449 words) - 07:30, 18 March 2024
- ...A radar has a secondary role of electronic support, and may also have some electronic attack capability.6 KB (982 words) - 07:30, 18 March 2024
- ...that of the AN/APS-139, and resistant to clutter and [[electronic warfare#electronic attack|jamming]]. It used an ingenious scheme by which target altitude was determi8 KB (1,121 words) - 10:05, 10 February 2023
- ...ortant than [[electronic warfare]], most specifically [[electronic warfare|electronic attack]] on the German navigational aids, such as [[Knickebein]], [[X-Geraet]] and5 KB (745 words) - 07:57, 28 March 2024
- ...ecific context of tactical warfare. ESM give the information needed for '''Electronic Attack (EA)''' such as jamming. EA is also called '''Electronic Counter-Measures''14 KB (2,151 words) - 07:29, 18 March 2024
- ...situation began to resemble the military minuet of [[electronic warfare]]: electronic attack, countermeasure, and response by counter-countermeasures. It is noteworthy9 KB (1,351 words) - 11:52, 17 April 2010
- ...go to ground, satellite, or unmanned aerial vehicle sensors or cooperating electronic attack equipment. :*Interfering with the opponent's systems, called either '''electronic attack (EA)''' or, traditionally, '''electronic countermeasures''' (ECM).30 KB (4,571 words) - 12:10, 20 March 2024
- | ELINT and COMINT in support of [[electronic attack]] (e.g., jamming)8 KB (1,217 words) - 17:04, 31 January 2011
- ...ntelligence fusion, including from UAV-carried sensor, and coordinate with electronic attack. ...t-M is mentioned in Russian literature as a portable direction-finding and electronic attack system32 KB (4,633 words) - 00:02, 8 February 2011
- ...noise of a combat environment, as well as deliberate [[electronic warfare|electronic attack]], JTIDS has [[error control#forward error correction|forward error correct14 KB (2,115 words) - 08:07, 19 September 2013
- ...ctrically noisy environments, but may be under active [[electronic warfare|electronic attack]]. The edge networks will not only not be fixed, but may be moving at high13 KB (1,857 words) - 10:07, 10 February 2023
- ...ptical guidance mode was an unpleasant surprise to the Israelis, who found electronic attack|jamming useless against it, and had to make the launchers a high priority o5 KB (845 words) - 07:28, 18 March 2024
- ...f the operations branch, to make sure electronic warfare#electronic attack|electronic attack does not damage friendly communications, and to define the electronic warfa29 KB (4,252 words) - 07:36, 18 March 2024
- ...dination of other service actions, collection of signals intelligence, and electronic attack specific to counter-improvised explosive devices.<ref>{{citation34 KB (5,015 words) - 08:09, 20 March 2024
- ...se penetration aids, such as [[radar]] reflectors and [[electronic warfare#electronic attack|jammers]].11 KB (1,614 words) - 09:54, 5 September 2009
- | Recommendations for kinetic and electronic attack | Recommendations for kinetic and electronic attack33 KB (4,818 words) - 12:10, 20 March 2024
- ...ed munition]]s, up-close-and-personal action by special operations forces, electronic attack, etc., all offer the potential of defeating an enemy without having to beat17 KB (2,557 words) - 13:20, 8 February 2011
- ...ed [[proximity fuze|proximity fuzed]] ammunition, [[information operations#electronic attack|electronic countermeasures]] may be able to predetonate the rounds. The lat19 KB (2,826 words) - 17:53, 12 March 2024
- ...e some of the roles air power can play in nonkinetic response? ISR is one. Electronic attack, and information warfare from air platforms, are others. Historically, kine ...ansmission of information that will cause computer systems to fail. Basic electronic attack starts with jamming, and moves to more subtle MIJI (Meaconing, Intrusion, J56 KB (8,441 words) - 10:10, 23 March 2024
- | Recommendations for kinetic and electronic attack | Recommendations for kinetic and electronic attack42 KB (6,092 words) - 04:31, 21 March 2024
- *[[Cyberterrorism]] – the electronic attack on critical computer infrastructure42 KB (6,275 words) - 04:34, 21 March 2024
- *[[Cyberterrorism]] – the electronic attack on critical computer infrastructure42 KB (6,278 words) - 04:34, 21 March 2024
- ...on all models of the [[F-35 Joint Strike Fighter]] can also be used for [[electronic attack]] with the antennas transmitting to interfere with an enemy radar, or using59 KB (9,074 words) - 06:06, 7 April 2014