NOTICE: Citizendium is still being set up on its newer server, treat as a beta for now; please see here for more.
Citizendium - a community developing a quality comprehensive compendium of knowledge, online and free. Click here to join and contribute—free
CZ thanks our previous donors. Donate here. Treasurer's Financial Report -- Thanks to our content contributors. --

Search results

Jump to: navigation, search

Page title matches

  • ...countermeasures''', is part of [[information operations#electronic warfare|electronic warfare]], which uses of electromagnetic energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with
    5 KB (724 words) - 03:42, 30 September 2010
  • ...tively interferes with the operation of hostile systems; previously called electronic countermeasures (ECM)
    185 B (22 words) - 21:54, 6 March 2010
  • {{r|Electronic countermeasures suite controller}}
    344 B (40 words) - 02:32, 7 June 2010

Page text matches

  • immunity to noise and [[electronic warfare#electronic attack|electronic attack]], makes it harder to intercept, and can increase capacity of a shared medi
    404 B (57 words) - 16:10, 5 September 2008
  • ...countermeasures''', is part of [[information operations#electronic warfare|electronic warfare]], which uses of electromagnetic energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with
    5 KB (724 words) - 03:42, 30 September 2010
  • ....e., its [[electronic warfare#electronic attack|self-protection electronic attack capabilty]]
    2 KB (242 words) - 19:52, 12 August 2010
  • ...nic warfare]], a '''deceptive jammer''' [[electronic attack|electronically attacks]] a hostile tracking or fire control sensor, by giving it stronger signals
    1 KB (161 words) - 20:13, 27 November 2010
  • ...attacked does not, in current terminology, make it electronic protection. Electronic protection would, in this example, keep the enemy from confusing the warn ...M can engage during the [[guided missile#flight path|midcourse or terminal attack]] phases of the missile. During these phases, other countermeasures may dec
    3 KB (500 words) - 22:24, 17 February 2010
  • ...e Department was created. The national intelligence organization also runs electronic warfare and SIGINT for the Air Force and Navy. | title = Information Warfare (IW): Signals Intelligence (SIGINT), Electronic Warfare (EW) and Cyber-Warfare. Asia and Cuba
    32 KB (4,633 words) - 05:02, 8 February 2011
  • ...rations]], which includes technical measures such as computer security and attacking hostile computers, but also "soft" disciplines such as psychological war | title = Marine Corps Electronic Warfare--A Combat Power Multiplier
    30 KB (4,580 words) - 16:12, 15 April 2011
  • ...ited Kingdom]]; defeated by [[electronic warfare#electronic attack|British electronic countermeasures]] in the [[Battle of the Beams]]
    320 B (43 words) - 23:51, 27 September 2008
  • #REDIRECT [[Electronic attack]]
    31 B (3 words) - 16:32, 8 July 2010
  • #redirect [[electronic attack]]
    31 B (3 words) - 16:37, 26 June 2008
  • {{r|Electronic warfare}} {{r|Electronic attack||**}}
    2 KB (202 words) - 04:49, 22 January 2010
  •, has his own section, but also oversees intelligence and communications-electronics. ...t fielded enemy units, but they encompass a broad spectrum of targets that attacks all of the enemy's centers of gravity such as: the enemy’s leadership; i
    29 KB (4,256 words) - 08:41, 21 October 2013
  • ...'combat aircraft''' directly harm enemy forces, with kinetic or electronic attack, or deliberately go into range of enemy weapons. While the current trend is *[[Attack helicopter]]
    832 B (116 words) - 18:03, 22 August 2010
  • Auto-populated based on [[Special:WhatLinksHere/Electronic warfare expendables dispenser]]. Needs checking by a human. {{r|Chaff (electronic warfare)}}
    982 B (123 words) - 21:15, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Electronic protection]]. Needs checking by a human. {{r|Chaff (electronic warfare)}}
    700 B (89 words) - 21:15, 11 January 2010
  • {{r|Electronic warfare}} {{r|Electronic attack||**}}
    506 B (60 words) - 16:41, 2 January 2014
  • ...sic electronic warfare function, such as a [[radar warning receiver]] or [[electronic warfare expendables dispenser]]. {{Image|Electronics countermeasures suite controller.png|left|450px|Electronics countermeasures suite with conceptual central controller}}
    3 KB (471 words) - 16:15, 15 April 2011
  • {{r|Electronic warfare}} {{r|Electronic attack||**}}
    362 B (54 words) - 08:58, 27 June 2009
  • An [[electronic warfare|electronic attack]] (i.e., countermeasures) transmitter, the U.S. '''[[AN-|AN/]]ALQ-162''' ja is deployed on transport, special operations, electronic warfare and [[attack helicopter]]s such as the [[AH-64 Apache]]. The 40-pound unit is small for
    908 B (131 words) - 01:37, 21 May 2009
  • [[electronic warfare#electronic attack|jamming]] and interception for [[electronic intelligence]], as they rapidly change the frequency they use, so that th ...communications privacy, and, more importantly, resistance to [[electronic attack]] from their [[frequency agility]]. For more serious security, many units c
    3 KB (476 words) - 17:59, 10 February 2011
  • An active [[electronic warfare|electronic attack]] remote device targeted at [[radar]], spooled out by an [[AN-|AN/]][[ALE-4
    350 B (51 words) - 03:46, 12 February 2009
  • ...the crew in staying aware of the threats, and managing the deployment of [[electronic warfare]] devices that operate externally to the vehicle.<ref name=Symetr ...his context, covers enemy sensors across the [[electromagnetic spectrum]]. Electronic defense includes, as well as receivers and computers that detect and anal
    9 KB (1,290 words) - 21:59, 6 June 2010
  • ...[[electronic warfare]], most specifically [[electronic warfare|electronic attack]] on the German navigational aids, such as [[Knickebein]], [[X-Geraet]] and .... Jones]], determined that the German night bombing attacks were guided by electronic navigation signals sent from occupied Europe. Once the systems were under
    5 KB (744 words) - 21:43, 13 February 2011
  • ...her directly attack the enemy by kinetic or nonkinetic (e.g., [[electronic attack]]) means, or have a mission that takes them into the battle area (e.g., [[c
    255 B (39 words) - 18:01, 22 August 2010
  • ...[EF-18 Growler]], although an Air Force replacement has not been selected; electronic warfare versions of the [[F-22 Raptor]] and possibly [[B-1 Lancer|B-1B La ...n gather tactical and strategic [[electronic intelligence]], also called [[electronic support]] in a tactical context. It can fire [[AGM-88 HARM]] [[anti-radia
    1 KB (212 words) - 21:59, 12 August 2010
  • ==Electronics== ...) guidance assist usable when heavy [[electronic warfare#electronic attack|electronic countermeasures]] are directed against this system.
    2 KB (276 words) - 06:33, 22 September 2013
  • ...ures, and better protection against [[Electronic warfare#electronic attack|electronic deception]].
    2 KB (319 words) - 10:19, 13 August 2010
  • ...term is [[electronic attack]] although the original is still used, as in [[electronic countermeasures suite controller]]
    272 B (36 words) - 21:57, 6 March 2010
  • Auto-populated based on [[Special:WhatLinksHere/Electronic intelligence]]. Needs checking by a human. {{r|Electronic attack}}
    2 KB (310 words) - 21:15, 11 January 2010
  • ...have a crew of 1, while the F model and the [[EF-18 Growler]] dedicated [[electronic warfare]] variant have two crewmembers. ...ic warfare|electronic support]] for active [[electronic warfare|electronic attack]]. All other upgraded and new U.S. fighters are moving to AESA designs, inc
    6 KB (817 words) - 21:14, 14 February 2011
  • ...tle that the [[U.S. Navy]] planned against a serious Soviet Naval Aviation attack against [[carrier battle group]]s, the motto is that it "is better to shoot The key electronic warfare attack on the missile, in this phase, is to attack the search radar of an antiaircraft system, or other sensors that put it in
    8 KB (1,147 words) - 00:48, 13 July 2009
  • A specific form of deceptive [[electronic attack|jamming]] directed at navigational systems
    91 B (12 words) - 16:33, 8 July 2010
  • ...e large entertainment corporations have been extremely aggressive in legal attack, to the extent of creating [[chilling effect]] on legitimate users, demandi ...h includes electronic warfare, but also attack, countermeasure, and counterattack on computers and computer networks.
    9 KB (1,351 words) - 16:52, 17 April 2010
  • ...uniformed military personnel, in a national chain of command, exclusively attacking military targets. ...ilitary targets are difficult to categorize. The [[Irgun]] warned of their attack on the King David Hotel in British Palestine; evacuation would have prevent
    43 KB (6,344 words) - 05:34, 6 October 2013
  • '''EF-18 Growler''' are [[carrier-capable]] [[electronic warfare]] aircraft, built on the [[F-18 Super Hornet]] airframe, which wi ...tirement of the [[EF-111]]. As the Prowlers retire, the Navy and Air Force electronic warfare will again diverge. Where the Navy uses Growlers, the Air Force i
    5 KB (789 words) - 21:56, 12 August 2010
  • When First World War aviators began to attack ground targets, they were principally concerned with the two-dimensional gr ...d the "no man's land" in between. If the aircraft were cooperating with an attack, they might need to be aware of their own side moving into no man's land, b
    57 KB (8,468 words) - 22:51, 17 February 2011
  • ...rations (IO)''' are "The integrated employment of the core capabilities of electronic ===Electronic warfare===
    10 KB (1,459 words) - 15:05, 11 August 2009
  • ...ate one's own electronics in the face of enemy attacks, and to evade those attacks through protection or deception
    319 B (48 words) - 03:52, 1 October 2008
  • ...otecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services<ref>{{cite w | title = Field Manual 34-37: Echelons above Corps (EAC) Intelligence and Electronic Warfare (IEW) Operations
    33 KB (4,818 words) - 21:42, 7 February 2011
  • ...ition tactical air, surface, and special operations forces. Its electronic attack is now directed at communications, but will be upgraded to be capable again ...aircraft are flown by the 55th Electronic Combat Group (41st, 42nd and 43d Electronic Combat Squadrons) at [[Davis-Monthan Air Force Base]], Arizona. They have
    2 KB (317 words) - 22:55, 13 July 2009
  • ...ircraft, and the aircraft side of the cable, which connects to the onboard electronics warfare systems.<ref name=BaE-ALE55>{{citation ...s_fotd_datasheet.pdf//}}</ref> It is part of a three-part architecture for electronic warfare, in which the towed decoy is the final line of defense, using a t
    4 KB (574 words) - 13:41, 14 August 2010
  • *Protected: survivable against [[electronic warfare]] and other attacks, even if bandwidth is sacrificed ...AEHF of earlier MILSTAR satellites, which makes it much less vulnerable to attacks on ground stations. As a geosynchronous satellite over the Equator, it sti
    7 KB (925 words) - 00:00, 12 February 2011
  • ...ining [[signals intelligence]] from it, or [[electronic warfare#electronic attack|jamming]] to deny its use for [[command and control]].
    2 KB (342 words) - 17:15, 11 June 2009
  • ...''F-22 Raptor''' are being planned for attack, electronic intelligence and electronic warfare. A "fifth generation" fighter, it is extremely maneuverable, has ...tronics, especially its [[radar#active electronically scanned array|Active Electronically Scanned Array (AESA)]], the [[AN-|AN/]][[APG-77]]. Since the F-22 is
    2 KB (351 words) - 00:41, 15 August 2010
  • ...called "Predator B", which is roughly twice the size, with aerodynamic and electronic improvements. | title = Predator, Reaper to add electronic warfare payload
    6 KB (815 words) - 04:58, 8 February 2011
  • ...medium data rate communications under conditions of nuclear and electronic attack
    242 B (31 words) - 19:48, 11 April 2009
  •, and experimentally in an [[unmanned aerial vehicle]]-based electronic attack system
    236 B (31 words) - 22:29, 2 February 2009
  • ...''EB-66''', like its prececessor, was an [[electronic intelligence]] and [[electronic warfare]] aircraft built on a bomber airframe. Neither the basic B-66 nor ...t were used primarily for active ECM using high power barrage and tuneable electronic jamming of selected frequencies.
    2 KB (310 words) - 06:18, 6 July 2010
  • ...sures]] against heat-seeking missiles and can also control an [[electronic attack|radar jammer]]
    241 B (29 words) - 19:28, 14 April 2009
  • '''Electronics intelligence (ELINT)''' is a branch of [[signals intelligence]], which t .... Jones]], determined that the German night bombing attacks were guided by electronic navigation signals sent from occupied Europe. Once the systems were under
    14 KB (2,154 words) - 06:15, 14 June 2010
  • ...ountermeasures''', and include making one's signal hard to detect and thus attack ...tely expendable, such as [[chaff (electronic warfare)|chaff]] and [[flare (electronic warfare)|flares]], or can be towed, such as the [[ALE-55|AN/ALE-55]] tow
    2 KB (255 words) - 22:10, 6 June 2010
  • ...t, or using [[deceptive decoy]]s to draw attention from the real object or electronic signal.
    667 B (96 words) - 21:17, 8 July 2009
  • ...with applications in reconnaissance, missile and fighter training, attack, electronic warfare and testing [[integrated air defense system]]s
    275 B (37 words) - 17:34, 27 August 2008
  • ...ncy-hopping]] as a means to interfere with [[electronic warfare#electronic attack|jamming]] and interception for [[signals intelligence]], as they rapidly ch ...Joint STARS]] to send pictures to send information to ground troops, an [[attack helicopter]], and a command post.
    5 KB (694 words) - 17:58, 10 February 2011
  • {{r|Electronic attack}}
    369 B (49 words) - 21:20, 8 July 2009
  • ...olve physical damage, such as [[electronic warfare]], concealing smoke, or attacks on computer network software
    272 B (38 words) - 20:30, 25 December 2010
  • {{r|Electronic warfare}} {{r|Attack helicopter}}
    214 B (27 words) - 21:18, 9 December 2008
  • ...aircraft carrier]] minimize its [[electronic warfare#electronic protection|electronic emissions]]. ...e AN/APS-139, and resistant to clutter and [[electronic warfare#electronic attack|jamming]]. It used an ingenious scheme by which target altitude was determi
    8 KB (1,121 words) - 08:27, 14 October 2013
  • ...tive electronic attack. It can, however, be controlled by a more extensive electronic warfare computer, such as the [[ALQ-213|AN/ALQ-213]], which, in turn, all
    2 KB (252 words) - 04:07, 10 February 2011
  • ...ion aids, such as [[radar]] reflectors and [[electronic warfare#electronic attack|jammers]]. ...e missiles in unmanned, heavily hardened and widely dispersed silos linked electronically to a series of central launch control facilities. Senior Air Force of
    11 KB (1,614 words) - 14:54, 5 September 2009
  • ...d off, mainly because of their defeat in the Battle of Britain, German air attacks continued throughout the war, including later use of the first [[cruise mi ...sile attacks on Britain, would break civilian morale. In retrospect, while attacks on both British and German populations caused much misery, morale never br
    48 KB (7,406 words) - 21:27, 13 February 2011
  • ...oisy environments, but may be under active [[electronic warfare|electronic attack]]. The edge networks will not only not be fixed, but may be moving at high ...adical departure from traditional [[radio]], in which many of the discrete electronic components, and even fundamental techniques such as [[superheterodyne]] o
    13 KB (1,857 words) - 17:53, 10 February 2011
  • | title = Navy Nonresident Training Courses: Electronics Technician, Volume 3, communications systems ==Electronic protection and communications security==
    14 KB (2,115 words) - 13:07, 19 September 2013
  • surprising redesigns of seemingly mundane uniforms, giving individuals electronics worth of ''Starship Troopers'', and providing medical equipment and trai ..."kinetic operations", but builds in [[information operations]] including [[electronic warfare]], civil-military operations, actions on external computer networ
    34 KB (5,030 words) - 12:10, 18 October 2013
  • ...end of the 19th century, and as artillery range increased, the side being attacked, at first, could take no effective counteraction. ...e|proximity fuzed]] ammunition, [[information operations#electronic attack|electronic countermeasures]] may be able to predetonate the rounds. The latest techn
    19 KB (2,840 words) - 21:53, 25 February 2011
  • ...otecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services<ref name=Wis ...adversary's thinking, they may also be most vulnerable to the adversary's attacks on one's own organization. Before trusting an enemy agent, remember that s
    43 KB (6,102 words) - 07:25, 6 October 2013
  • ...f large volumes of [[chaff (electronic warfare)|chaff]] over an area being attacked or overflown, in support of an overall mission rather than the more usual
    300 B (42 words) - 09:11, 2 February 2009
  • ...ed from a first, mechanically scanned version, to the first [[radar#active electronically scanned array|AESA radar]] on an operational fighter, and into the se ...rade for the [[F-15E Strike Eagle]]. This aircraft is principally for deep attack, but retains significant air-to-air capabilities; its radar this needs grou
    6 KB (981 words) - 00:45, 15 August 2010
  • ...ysically destructive) artillery as well as non-kinetic resources such as [[electronic warfare]] to them,<ref>{{citation ...o [[signals intelligence]] collection and the coordination of [[electronic attack]] by other services.<ref>{{citation
    4 KB (584 words) - 19:58, 19 February 2011
  • ...jamming resistance, although they are not as hardened against [[electronic attack|jamming]] or the effects of [[nuclear weapon]]s as are the present [[MILSTA
    986 B (133 words) - 21:08, 11 April 2009
  • ...pollo_cm.jpg|right|310px|Apollo Command Module flying at a high [[angle of attack]] for lifting entry, artistic rendition.}} ...light of Apollo 4 (AS-501)," NASA TN D-5399, (1969).]</ref> This angle-of-attack was achieved by precisely offsetting the vehicle's center-of-mass from its
    56 KB (8,515 words) - 06:19, 10 October 2013
  • {{r|Attack helicopter}} {{r|Electronic warfare expendables dispenser}}
    723 B (93 words) - 21:25, 11 January 2010
  • ...e parent topics [[cryptanalysis]] and [[cryptography]] discuss brute force attacks. ...cure largely because they could resist brute force but which fell to other attacks.
    1 KB (163 words) - 03:27, 27 March 2009
  • ...les do have a [[home-on-jam]] capability so that they will attack an enemy electronic warfare system, or have [[infrared guidance]] for the terminal phase of t
    1 KB (227 words) - 03:39, 18 May 2009
  • {{r|Joint Direct Attack Munition}} ===Electronics===
    835 B (113 words) - 21:38, 14 February 2011
  • ...tems for aircraft with damaged onboard electronics, and also mark areas to attack, relative to an airborne spotter that discovered a new target. While more accurate attack direction systems replaced it in that role, it continued to be used for tra
    1 KB (185 words) - 19:04, 4 July 2010
  • | only [[armed helicopter|armed]] and [[attack helicopter]]s, | only [[armed helicopter|armed]] and [[attack helicopter]]s,
    5 KB (701 words) - 02:13, 11 August 2010
  • '''Cyberterrorism''' includes both terrorist attacks on resources in [[cyberspace]], or use of Internet and other cyberspace to “Cyberterrorism means premeditated, politically motivated attacks by sub national groups or clandestine agents, or individuals against infor
    5 KB (707 words) - 13:48, 30 May 2009
  • ...ded munition]]s. Historically, less precise systems, such as the Japanese attack at the [[Battle of Pearl Harbor]], used "dumb" weapons with varying levels A counterforce attack concentrates on enemy military systems, with several variants depending on
    3 KB (494 words) - 11:06, 8 February 2011
  • ...that enclose the warhead and soon vaporize, or as complex as maneuvering [[electronic warfare]] decoys that deceive [[measurement and signature intelligence]] ...d area or military base, the target nation is more prone to wait to counterattack.
    4 KB (610 words) - 20:05, 13 August 2010
  • {{r|Amplification attack}} {{r|Electronic warfare}}
    420 B (51 words) - 15:13, 12 June 2009
  • '''SA-6 GAINFUL''', is a highly mobile, still very capable platform for attacking aircraft at low to medium altitude. The original system mounted four ''' ==Electronics and Electro-optics==
    6 KB (842 words) - 09:17, 22 March 2014
  • ...use any elements of electronic warfare. SEAD may draw significantly from [[electronic intelligence]] at national or theater level. ...[[unmanned aerial vehicle]]s can either complement or replace conventional attack aircraft.
    14 KB (2,102 words) - 04:14, 10 February 2011
  • | ELINT and COMINT in support of [[electronic attack]] (e.g., jamming) *[[radar# Active electronically scanned array| active electronically scanned arrays (AESA)]]
    8 KB (1,217 words) - 22:04, 31 January 2011
  • ...[[bomber aircraft]], operating independently or with support aircraft, to attack the homeland [[counterforce|military forces]], [[countervalue|industry and well as nonkinetic attacks using [[information operations]] including [[electronic warfare]].
    5 KB (767 words) - 01:14, 26 June 2009
  • ...everal kinds of aircraft: air superiority fighters, electronic and kinetic attack aircraft for [[suppression of enemy air defense]] (SEAD), and [[C3I-ISR|com ===Electronic order of battle===
    15 KB (2,233 words) - 19:14, 24 March 2011
  • ...Army, helicopters are under the [[Army aviation]] branch. A representative attack helicopter is the U.S. Army's [[AH-64 Apache]]. As are all helicopters, it ...than light machine guns and possibly small pods for [[unguided rockets]]. Attack helicopters carry heavy armament such as heavy [[machine gun]]s, [[autocann
    9 KB (1,384 words) - 03:03, 11 February 2010
  • ...and bombings, hijackings, assassinations, kidnappings, cyber-attacks, and attacks using biological, chemical, and — theoretically — nuclear weapons. ==Characteristics of Terrorist attacks==
    18 KB (2,652 words) - 21:23, 23 September 2013
  • ...dversaries, in order to determine what holds them together." CoG-oriented attack is most relevant in a total war. ...ribes that point where the enemy is most vulnerable and the point where an attack will have the best chance of being decisive. The term is borrowed from mech
    17 KB (2,557 words) - 18:20, 8 February 2011
  • ...omechanical devices. In 1956, U.K. COMINT specialists succeeded in such an attack against [[Hagelin machine]]s used by [[Egypt]]. The technique was assigned A defense against such attacks, even with all-electronic workstations and cryptosystems, can involve generating random noise that
    12 KB (1,818 words) - 06:13, 14 June 2010
  • A '''brute force''' or '''exhaustive search''' attack is an attempt to break a [[cipher]] by trying all possible keys. This is a Brute force is by no means the only attack against a cipher; there are many other techniques under the general heading
    11 KB (1,752 words) - 18:47, 22 August 2013
  • A '''brute force''' or '''exhaustive search''' attack is an attempt to break a [[cipher]] by trying all possible [[Key|keys]] in Brute force is by no means the only attack against a cipher; there are many other techniques under the general heading
    11 KB (1,816 words) - 08:25, 20 February 2016
  • ...the morale of the enemy population by what are now called [[countervalue]] attacks. Postwar studies, as well as observations during the most intense bombing In a large-scale nuclear countervalue attack, civilian morale would be irrelevant, for it is hard to have morale when on
    31 KB (4,759 words) - 09:41, 12 November 2013
  • ...]], and track back to their point of origin so the artillery can be counterattacked. Sometimes annoyingly, it can tell when a car is exceeding the speed limi ==Article scope and minimal necessary concepts from electronics==
    59 KB (9,074 words) - 11:06, 7 April 2014
  • ...Obama has said that Gaddafi must go, he distinguished US participation in attacks in support of UN humanitarian goals from military action to force regime c ...Moussa]], Secretary-General of the Arab League, said the intensity of the attacks was far more than the League had expected. ""What happened differs from th
    32 KB (4,801 words) - 11:08, 5 October 2013
  • ...omber roles, as the other major tactical aircraft used by the Air Force to attack North Vietnam, the [[F-105]], lacked the maneuverability for effective air- ...vulnerable rear of an American strike formation, then executing a missile attack and diving away before fighter cover could intervene. Scoring its first kil
    23 KB (3,796 words) - 00:58, 14 November 2010
  • ...posed by geography, by limited electrical power, and by deliberate enemy [[electronic warfare]]. *Defense Message System (DMS): the Defense Department [[electronic mail]] system
    9 KB (1,197 words) - 10:14, 1 October 2013
  • ...idered obsolete; its small key size makes it vulnerable to a [[brute force attack]] | title = "EFF DES Cracker" Machine brings Honesty to Crypto Debate; Electronic Frontier Foundation proves that DES is not secure
    16 KB (2,453 words) - 03:31, 10 June 2011
  • ...warfare]], which covers the entire [[electromagnetic spectrum]] '''chaff (electronic warfare)''' is a mass of [[radar]]-reflective material that acts as a dec ...'seduce''' the final attack. Chaff may be used in conjunction with other [[electronic warfare]], such as deceptive jammers, and final hard-kill defense systems
    5 KB (699 words) - 11:20, 12 September 2013
  • Glider attacks are obsolete, but assault landings using suitable transport aircraft (e.g. was to come in Holland in May, with a brigade-sized jump and airlanding attack under their excellent airborne commander, Gen. Kurt Student. Student himsel
    37 KB (5,685 words) - 21:16, 14 February 2011
  • ...the target hard to find against the background, and systems that directly attack the infrared seeker. ...d missile is using an infrared guidance system and if its functions can be attacked.
    9 KB (1,283 words) - 22:00, 6 June 2010
  • ...ndwidth, which can cause a computer to stop responding, and can also allow attackers to gain unauthorized remote control of one or more computers. The first widespread Internet worm attack took place in 1988.<ref name=MorrisWorm>{{citation
    5 KB (809 words) - 11:36, 31 May 2009
  • [[Image:CESAS Electronic Attack.jpg|left|thumb|400px|CESAS deployed on HMMWVs]] ...cking System (CESAS), is a [[United States Marine Corps]] capability for [[electronic warfare]], which can operate in a fully [[mobile]], on-the-move from plat
    3 KB (398 words) - 02:35, 7 June 2010
  • ...ed for attack is escorted by an [[EF-18 Growler]] or some future dedicated electronic warfare platform, the mission planners may choose not to insert the jamm
    1 KB (166 words) - 01:53, 15 August 2010
  • ...a capability to fight other airplanes, that detracts from their mission of attacking a surface target. ...ttack by fighters, modern bombers carry no defensive guns, but extensive [[electronic warfare]] systems to defeat or hide from enemy [[radar]].
    7 KB (1,143 words) - 23:10, 20 March 2009
  • ...e the first modern [[precision-guided munition]]s. Like the [[Joint Direct Attack Munition]], PAVEWAY is a set of components that attaches to a conventional ...h cost reductions, was responsible for the dramatic "video game" precision attacks of the [[Gulf War]]. [[PAVEWAY III]], however, was a major redesign that,
    7 KB (1,150 words) - 14:21, 4 March 2011
  • ...rong electronic and [[hip-hop]] influences. In 2004, he suffered a [[heart attack]], but later returned to performing. His final album, ''[[Blackstar]]'', wa
    2 KB (329 words) - 22:35, 12 January 2016
  • ...[guided missile]] or [[unmanned aerial vehicle]] capable of flying to, and attacking, several locations. are not intended to do permanent damage of any type. They may conduct [[electronic warfare]] for a short period of time, or be designed to disable electrica
    4 KB (588 words) - 19:30, 1 November 2008
  • ...lectron donor), either an atom or a group, that can undergo [[nucleophilic attack]] of the terminal halogenated carbon(s) to form a cyclic cation ([[phosphon
    6 KB (977 words) - 01:06, 29 January 2011
  • ..., a (usually) mobile transmitting device that will lure an enemy weapon to attack it rather than the real platform it is protecting
    206 B (29 words) - 23:36, 19 January 2009
  • ...ield]] and was effectively written off as a fighting force by Japanese air attacks.<ref name=Hyper6>{{citation }}, pp. 201-218</ref> "The ability to change roles quickly, [from OCA attack, offensive sweep, SEAD, and DCA.] even while airborne on a mission, can com
    8 KB (1,219 words) - 21:28, 14 February 2011
  • The '''Trafalgar-class''' is a type of British [[Submarine#Attack submarine|tactical submarine]], the first of which, ''[[HMS Trafalgar S107| | title = Trafalgar Class Attack Submarines, United Kingdom
    4 KB (604 words) - 06:56, 1 September 2010
  • {{r|Attack helicopter}} {{r|Electronic intelligence}}
    1 KB (155 words) - 21:08, 11 January 2010
  • ...would have a nuclear capability of 3 first-generation SRAM's (Short-Range Attack Missiles). The next designation was RS-71 (Reconnaissance-Strike) when the analog design which, based on pitot-static, pitch, roll, yaw, angle-of-attack inputs, would determine how much movement was required. By moving, the spik
    53 KB (8,382 words) - 04:51, 19 April 2014
  • ...hreat's tracking or guidance mechanism, so it loses the target or fails to attack anything. .... Ideally, it will seem enough like the real submarine that the enemy will attack it.
    1 KB (165 words) - 22:06, 6 June 2010
  • The formal US definition is generic: "An attack to damage or destroy an objective or a capability".<ref <ref name=JP1-02>{{ ...fenses that could interfere with strike aircraft. Air, sea, and land based electronic warfare assets can help the strikers penetrate.
    8 KB (1,226 words) - 11:03, 8 February 2011
  • ...major accidents; the role was to change again after the [[9-11 Attack|9/11 Attacks]]. ...port stating that even the management of civilian consequences of military attack, much less natural disasters, was an individual and local responsibility. <
    16 KB (2,370 words) - 19:55, 19 May 2010
  • ...tion missile|anti-radar]] applications but sometimes home-on-jam against [[electronic warfare]]
    281 B (35 words) - 06:02, 17 February 2011
  • [[Image:Gamma phage.gif|thumb|200 px|Negative stain electron micrograph of the gamma phage from which the PlyG lytic enzyme was cloned f ...other scientists. It was not until the first phage was observed under an [[electron microscope]] by [[Helmut Ruska]] in 1939 that its true nature was establish
    20 KB (3,245 words) - 11:43, 27 August 2013
  • [[Image:Gamma phage.gif|thumb|200 px|Negative stain electron micrograph of the gamma phage from which the PlyG lytic enzyme was cloned f ...other scientists. It was not until the first phage was observed under an [[electron microscope]] by [[Helmut Ruska]] in 1939 that its true nature was establish
    20 KB (3,198 words) - 11:42, 27 August 2013
  • ...diation source, which may be the antenna rather than the harder-to-replace electronics. ...for the basic attack on surface radars, but also have explicitly addressed attacking dedicated C3I aircraft, including airborne warning and control. Some U.S
    6 KB (950 words) - 22:43, 6 June 2010
  • ...f accuracy, balance and impartiality in news reports appearing on print or electronic media was one of the many reasons that evoked the Terai unrest. Dozens of journalists were attacked, manhandled, threatened, their offices wrecked, their vehicle burnt and d
    5 KB (793 words) - 07:14, 11 November 2007
  • ...arget, the helicopters rapidly separate, releasing decoys such as [[chaff (electronic warfare)|chaff]]. ...modern navy, there are multiple concentric rings of defenses through which attackers must pass. During the Cold War, the U.S. Navy believed in starting with
    4 KB (575 words) - 21:29, 10 July 2009
  • ...COMINT or communications intelligence) or between machines (i.e., ELINT or electronic intelligence), or mixtures of the two. As sensitive information is often ...phy]]. A simple encryption system, for example, is the [[Caesar cipher]]. Electronic interception appeared as early as 1900, during the Boer War. The Boers ha
    36 KB (5,237 words) - 15:21, 8 October 2019
  • ...approach than the U.S. [[AGM-88 HARM]] and the French [[Matra Armat]]. All attack enemy [[radar]], often as part of an [[integrated air defense system]]. The ...with Armat, both ALARM and HARM are more for the defense of a general air attack mission than as an independent mission to destroy long-range [[radar]]. Bri
    13 KB (2,179 words) - 02:14, 9 March 2011
  • ...trikes onto them. When air support was delayed, however, the patrols might attack key SCUD system elements with their organic weapons and explosives. See [[# ...mission deals with locating targets, and planning, guiding, and evaluating attacks against them.
    53 KB (8,150 words) - 22:58, 8 February 2011
  • | volume = George Washington University National Security Archive Electronic Briefing Book No. 121 ...s increasingly irrelevant in the face of larger and larger VC conventional attacks. [[Military Assistance Command, Vietnam]] began to refer to the "two wars"
    50 KB (7,729 words) - 11:34, 17 September 2013
  • ...capabilities of the [[United States Coast Guard]] following [[al-Qaeda]]'s attacks in the [[United States|Continental USA]] on September 11th, 2001.<ref> ...rticles/military-aerospace-electronics/volume-14/issue-12/news/coast-guard-electronics-upgrade-program-kicks-into-high-gear.html
    4 KB (564 words) - 05:05, 1 January 2014
  • ...tary)|tanks]], which are a subset of [[armored fighting vehicle]]s (AFV). Attacking a tank factory, or a refinery that makes fuel for tanks, is not part of ...the AFV but limiting its operation. Indirect attacks can threaten kinetic attack (e.g., a minefield in the path of the tanks), or fall into a wide range of
    7 KB (1,075 words) - 09:30, 21 February 2010
  • {{r|Electronic intelligence}} {{r|Flare (electronic warfare)}}
    2 KB (247 words) - 00:27, 15 February 2011
  • ...WMD facilities, may need [[hard target penetrator]]s or other specialized attacks.
    3 KB (378 words) - 01:01, 24 April 2011
  • ...legitimize the insurgents and lead to their lasting defeat. This line will attack the hard-core insurgents. Some may succumb to offers of amnesty, but most w | title =Physical Attack Information Operations in Bosnia: Counterinformation in a Peace Enforcement
    48 KB (7,182 words) - 20:56, 8 February 2011
  • The '''AGM-84 SLAM (Stand-off Land Attack Missile)''' is a land-attack derivative of the [[AGM-84 Harpoon]], an [[anti-shipping missile]].<ref nam ...rrent versions are air-launched, it may be adapted to a shorter-range land attack weapon for submarines, to complement the longer-range Tomahawks, although a
    5 KB (694 words) - 17:06, 16 August 2010
  • ...posed by non-state groups developing more cunning and destructive means to attack and terrorize -- scenarios that transcend the familiar contingencies that d *53 – 55 attack submarines and 4 guided missile submarines (non-nuclear weapons)
    17 KB (2,360 words) - 05:40, 5 October 2013
  • {{r|Joint Direct Attack Munition}} {{r|Full Authority Digital Electronic Control}}
    785 B (110 words) - 19:37, 17 February 2011
  • ...ircraft''' is a fast and maneuverable aircraft, whose capabilities include attacking other aircraft. There are a variety of missions, and many fighters are b have some air combat capability, but generally would concentrate on the attack mission, perhaps relying on speed to avoid interceptors.
    8 KB (1,200 words) - 06:47, 16 September 2009
  • {{r|Attack helicopter}} {{r|Electronic warfare}}
    2 KB (219 words) - 02:20, 12 January 2010
  • ...ed for training, proficiency testing, and similar requirements. All ground attack variants, beginning with the [[F-15E Strike Eagle]], are two seat, with a p ...n informal motto of "not a pound for air to ground", as a high-performance attack aircraft retaining air combat capability, the Strike Eagle has been extreme
    2 KB (372 words) - 11:14, 31 May 2009
  • ...s do converge on a target, not every military action, where multiple units attacked from all sides of a target, constitute swarming. Other conflicts, especi ...another swarm of horse archers would sometimes replace them, and sometimes attack elsewhere. The Scythians eventually cause the [[phalanx]] to break formatio
    7 KB (1,045 words) - 11:22, 8 February 2011
  • {{r|Attack helicopter}} {{r|Flare (electronic warfare)}}
    1 KB (144 words) - 21:29, 11 January 2010
  •, in which major naval campaigns were concerned with coastal defense and attacks on individual or small groups of ships. Maritime activity was therefore ex ...Union blockade of the Confederacy. Nevertheless, there were major tactical attacks on ports and rivers. The [[Battle of Hampton Roads]] was a two-day affair
    9 KB (1,318 words) - 11:47, 18 March 2014
  • [[U.S. Navy]] '''Los Angeles-class''' [[attack submarine]]s have been in three major generations, starting with the 31 boa ...), also called "Improved 688i", have improved under-ice capability, better electronics, and are quieter.
    1 KB (185 words) - 08:08, 14 April 2011
  • ...] and coenzyme A, and the dihydrolipoyl dehydrogenase subunits contain the electron-transferring coenzymes [[FAD]] and [[Nicotinamide adenine dinucleotide|NAD] ...try, as well as [[Benzoin Condensation|benzoin condensation]]). This anion attacks the S1 of the oxidized lipoate species in an Sn2-like mechanism that displ
    5 KB (643 words) - 17:17, 6 April 2009
  • | journal = Journal of Electronic Defense ...lear weapons, there are deeply penetrating precision guided bombs that can attack them. Deep burial, with appropriate concealment during construction, is a w
    74 KB (10,988 words) - 21:31, 25 November 2013
  • ...localize it sufficiently to aim weapons at it. Of course, once a submarine attacks, any surviving enemies now know it is in the general area; submariners cal ..., which was to be attached, by a screw, to the hull. Unfortunately for the attacker, the hull had freshly been covered with sheets of copper, and those sheet
    23 KB (3,543 words) - 23:34, 20 February 2014
  • ...] (his title was First Lord of the Admiralty), where he planned the failed attack on Turkey in the [[Gallipoli Campaign]]. He served in the important roles o ...s, he "crossed the floor" to sit as a member of the [[Liberal Party]]. He attacked his erstwhile Conservative colleagues relentlessly; they bitterly denounc
    39 KB (6,181 words) - 19:43, 7 October 2019
  • {{r|Attack helicopter}} {{r|APR-48|AN/APR-48A Radar Frequency Interferometer Electronic Support}} target acquisition system
    616 B (84 words) - 04:08, 15 September 2009
  • ...t-term objective, rather than either fundamentally disrupting the enemy by attacking a [[centers of gravity (military)|center of gravity]], or using force an ...ya, said "In my view, on 30 December 1972, after eleven days of those B-52 attacks on the Hanoi area, you had won the war. It was over… They and their whol
    10 KB (1,629 words) - 07:05, 15 August 2010
  • ...e technical evolution, and, in August 2005, an upgrade Fire Control Radar Electronics Unit (REU) as part of the US Army's Apache Longbow Block III modernizati
    900 B (131 words) - 20:32, 18 December 2009
  • ...ues that have perfectly valid operational uses can also be preparation for attacks. See [[network reconnaissance]]. ...rified [[fingerprint]], or "something you have", such as a physical key or electronic [[security token]].
    13 KB (2,006 words) - 10:18, 22 May 2010
  • * [[AC-130|AC-130H/U Spectre/Spooky II]] precision night ground attack for special operations ...OMPASS CALL]] [[communications intelligence]] and [[information operations#electronic warfare|jamming]]
    2 KB (279 words) - 02:22, 15 August 2010
  • ...e control and have it follow its current trajectory. Some of its guidance electronics have been used in the [[AGM-84 SLAM]] program. ...missile, might not be used today; guided bombs such as the [[Joint Direct Attack Munition]] or [[PAVEWAY]] do not have identifiers in the powered missile fa
    2 KB (263 words) - 21:14, 14 February 2011
  • ..., regroup, and attack again. "Pulsing", where the units shift the point of attack, is a necessary part of swarming. Swarming is not limited to the pure human''' involves the use of many autonomous forces against an opponent, the attacking forces being highly mobile and in effective communication and being sync
    60 KB (8,926 words) - 07:45, 6 October 2013
  • See also: [[electronic medical record]], [[electronic health record]], [[clinical decision support system]], and [[medical orde ...ocardial infarction|Myocardial Infarction]]…to prevent deaths from heart attack."
    65 KB (9,110 words) - 02:20, 27 October 2013
  • ...'[[Atomic Kitty]]', the cat was [[surgery|surgically]] altered to contain electronic equipment, but the first field test ended in disaster when the would-be a ...<ref>''BBC'': '[ Shark attacks not linked to Mossad says Israel]'. 7th December 2010.</ref>
    7 KB (1,011 words) - 15:33, 10 September 2011
  • On July 4, the DRV announced that RVN guerrillas attacked in Laos on 27 June and the DRV coast on 30 June. General [[Nguyen Cao Ky] ...lan was to consist of "Psychological Operations"; Phase II of "Hit and Run Attacks." The latter included "amphibious raids using Vietnamese
    18 KB (2,711 words) - 20:43, 17 November 2012
  • *[[Air Force Electronic Systems Center]] **Fighter Attack Systems Wing
    5 KB (770 words) - 03:04, 23 December 2009
  • ...dar itself, which would have very substantial power available in the final attack.
    3 KB (418 words) - 00:22, 28 October 2008
  • <center>'''Strategic aircraft capable of attacking the Japanese Home Islands'''</center> ...d physical productive capacity by roughly the following percentages of pre-attack plant capacity: <ref>United States Strategic Bombing Survey, ''Summary Repo
    14 KB (2,138 words) - 12:23, 12 September 2013
  • ...n service. Unauthenticated encryption is vulnerable to [[man-in-the-middle attack]]s . Also note that encryption does not prevent [[traffic analysis]]. ...that all mail passing between a pair or a group of sites is encrypted. An attacker looking only at external traffic, without access to anything on or behind
    40 KB (6,216 words) - 08:26, 17 October 2013
  • A '''fuze''' is an electronic, pyrotechnic or mechanical system that initiates the detonation of a [[wa ...The fuse may act "instantaneously", or with a mechanically, and eventually electronically, set delay.
    6 KB (962 words) - 23:54, 6 March 2011
  • ...ace warfare]], [[anti-air warfare]], [[anti-submarine warfare]] and [[land attack]]. While technically warships, vessels purpose-built for [[mine warfare]] ...t acquisition]], [[fire control (military)|fire control]], and defensive [[electronic warfare]], as well as for [[navigation]] and [[telecommunications network
    1 KB (178 words) - 05:59, 15 April 2010
  • }}</ref>. Both electronics and missiles were constantly upgraded over the system' life. ...elative to the SA-1. It is intended for defeat of manned and pilotless air attack weapons at the heights from 100 m to 30 km, which fly with speeds of up to
    12 KB (1,954 words) - 01:01, 5 July 2010
  • {{r|Joint Direct Attack Munition||**}} ''Variant being developed to allow high-altitude torpedo dr ====Electronic warfare====
    956 B (112 words) - 00:18, 15 February 2011
  • ...e known to be in active research. Charged particle beams, using protons or electrons rather than the photons of lasers, have been of some interest but do not s
    1 KB (174 words) - 13:30, 16 January 2011
  • ...6]] capabilities, Combat Direction Finding, the [[SLQ-32|AN/SLQ-32(V3)]] [[electronic warfare]] suite, and Extended Range (ER) [[surface-to-air missile]]s. ...ional Capability; *Phase II integrated system upgrades including Deceptive Electronic Countermeasures, Track Load Control algorithms, and Track Initiation Proc
    7 KB (1,059 words) - 18:26, 10 February 2011
  • {{r|Chaff (electronic warfare)|Chaff}} {{r|Fast attack craft}}
    1 KB (144 words) - 16:34, 12 October 2009
  • {{r|Electronic health record}} {{r|Transient ischemic attack}}
    1 KB (134 words) - 20:37, 2 March 2010
  • ...000), nearly all such ciphers became more or less breakable by an informed attacker. Such classical ciphers still enjoy popularity today, though mostly as [[ ...crecy of the key should be alone sufficient for confidentiality when it is attacked. This fundamental principle was first explicitly stated in 1883 by [[Augu
    9 KB (1,309 words) - 02:07, 16 August 2011
  • ...orth Vietnamese motor torpedo boats, during their action on 2 August 1964. Attacks by aircraft from USS ''Ticonderoga'' (CVA-14) are also shown.]] the [[Republic of Vietnam]] (South Vietnam). Two attacks by DRV [[fast attack craft]] were described to the Congress, one on the lone destroyer USS ''Mad
    15 KB (2,343 words) - 05:57, 27 February 2013
  • ...itive insight into the circuit and often is easier to derive than a direct attack on the gain. ...ely characterizes feedback amplifiers, including loading effects and the [[Electronic amplifier#Unilateral or bilateral|bilateral]] properties of amplifiers an
    19 KB (3,224 words) - 14:47, 30 June 2011
  • ...eneric terms &mdash; so the '''Su-25''' and its derivatives are, while jet attack planes that first flew in 1979, still are "Shturmoviks".<ref GS-Su-25>{{cit An unusual weapons load found useful for attacking Afghan ground targets in a line (e.g., vehicles on a road) were wing-mou
    3 KB (495 words) - 09:34, 21 March 2014
  • ...ecision bombing and Pathfinder roles, and then in a variety of bombing and attack missions after the war. It remains in service, at RAF Marham, flying [[Pana other Lancaster squadrons. Even he was not told, until just before the attacks, of the exact targets, just that low flying over water was required.
    3 KB (408 words) - 06:22, 17 February 2011
  • ...West. [[Mohammed Atta]] and three others directly involved in the [[9-11 Attacks]] radicalized while in [[Hamburg]], [[Germany]], and then traveled to Paki | title = The Terrorists Among Us: Why an al Qaeda attack on U.S. soil is still a real threat.
    6 KB (912 words) - 07:19, 23 September 2013
  • *[[RIM-161 Standard SM-3]] when equipped with area BMD electronics *Super Rapid Blooming 6-barrelled SRBOC [[chaff (electronic warfare)|chaff]] and infrared decoy launchers;
    5 KB (739 words) - 00:13, 18 August 2010
  • {{r|Electronic warfare}} {{r|Joint Direct Attack Munition}}
    3 KB (358 words) - 21:38, 14 February 2011
  • ...d neutral term for people who interfere with networks, either by technical attacks or deceptive "human engineering". '''[[Hacker]]''', at one time, had no n ...f protest, or a plethora of other reasons, might alter data (e.g., put the electronic equivalent of graffiti on a web page), or force the system to be unusable
    3 KB (445 words) - 15:21, 31 October 2008
  • ...penetration aid, to take out air defenses on the way to the targets to be attacked with [[gravity bomb]]s. ...troops and for missions with conventional weapons, but retaining a nuclear attack capability with cruise missiles. Strategic delivery of nuclear bombs would
    24 KB (3,627 words) - 18:29, 5 March 2013
  • ...s had a much more capable AWACS platform using the Il-76 but more advanced electronics, the [[Beriev A-50]] ...flexibility did emerge.<ref name=Clark2000 /> The Iraqis considered ground attack their most important air warfare mission, and put their best pilots into th
    38 KB (5,873 words) - 09:23, 12 October 2013
  • There was an apparent, mutually reinforcing belief that [[wolf pack]] attacks by groups of submarines were much more deadly than individual operations, ...ans were not declassified until 1975, [[Winston Churchill]] paid homage to electronic warfare, and its companion ELINT, in his series on the Second World War:
    23 KB (3,454 words) - 00:22, 14 September 2010
  • [[Electronic warfare]], in the broad usage, considers all parts of the electromagnetic ...obra]], sensed that a laser designator or rangefinder was "painting" the [[attack helicopter]], and sent a new warning signal that appeared on the cockpit di
    3 KB (494 words) - 06:51, 8 March 2011
  • ..., tend to be under exceptional security, and there may be, for example, no electronic communications that can be intercepted by the [[National Security Agency] interdiction groups) for these meetings. It leads policy development to attack the trade in nuclear materials (nuclear smuggling), and coordinate closely
    68 KB (9,926 words) - 04:25, 1 January 2014
  • ...aval Surface Fire Support (NSFS), [[anti-submarine warfare]] (ASW), [[land attack]] and [[anti-surface warfare]] (ASuW) missions, and, in some cases, [[balli control system. The core radar is an [[SPY-1|AN/SPY-1]] [[radar#passive electronically scanned array|passive phased array]], which can be upgraded with a [[
    8 KB (1,160 words) - 16:04, 16 April 2011
  • | title = National Security Archive Electronic Briefing Book No. 5 | title = National Security Archive Electronic Briefing Book No. 153
    12 KB (1,829 words) - 13:35, 13 September 2009
  • === Electronic Code Book, ECB === In '''Electronic Code Book''' mode, the cipher is just applied to each block of plaintext
    8 KB (1,294 words) - 04:01, 2 March 2010
  • ...tical, indicating that an opponent is not only preparing for war, but will attack in the near term. :* Attacks against the analyst's country and its interests, which can come from state
    69 KB (10,271 words) - 16:45, 6 November 2010
  • ...during the traditional cease-fire of the [[Tet]] holiday, Communist forces attacked 36 of 44 provincial capitals and 5 of 6 major cities is most often called #Major urban attacks in early 1968
    35 KB (5,538 words) - 19:50, 4 July 2010
  • | work = Electronic Briefing Book No. 130 ...that cannot communicate cannot fight, so [[information operations]] and [[electronic warfare]] are additional means that can be decisive, without any physical
    36 KB (5,313 words) - 00:26, 21 November 2010
  • {{r|Electronic intelligence}} {{r|Suicide attack}}
    1 KB (151 words) - 22:11, 11 January 2010
  • In a '''man-in-the-middle''' attack on a communications system, the attacker is the man-in-the-middle.<ref name=Ellison>{{citation ...other but in fact both are talking to him. It is an [[active attack]]; the attacker needs not only the ability to intercept messages, but to insert his own a
    7 KB (1,012 words) - 06:46, 20 February 2016
  • ...high/low mix of fighters, the F-16 took the low role, with a strong ground attack capability, but also having its maneuverability and combat radius (distance It was assumed the aircraft electronics ([[avionics]]) would constantly be updated, so the aircraft has a [[MIL-
    13 KB (1,948 words) - 00:38, 15 August 2010
  • ...xtensive options, than the other main U.S. guided bomb, the [[Joint Direct Attack Munition]] (JDAM). ...cts to standard [[MIL-STD-1553]]/[[MIL-STD-1760]] (also NATO STANAG 3837) electronic interfaces, and could, in principle, be used by any aircraft with them. "
    5 KB (692 words) - 21:41, 24 October 2013
  • ...ion of the European firm [[EADS]], the '''Eurocopter Tiger''' is a light [[attack helicopter]] initially to be used by Australia, France, Germany and Spain.< | title = Tiger Attack Helicopter, Europe
    2 KB (223 words) - 12:15, 24 January 2009
  • ...ers usually use uranyl acetate and phosphotungstate to stain the virus for electron microscopy.<ref>[]</ref> ...s still the number one favorite host of mite and WSMV. Mites and WSMV only attack the other cereal plants when the wheat crops are severe damaged, grown old,
    26 KB (4,353 words) - 09:51, 1 November 2013
  • ...liction]], but allowing a fighter pilot the discretion to pursue the final attack. Soviet doctrine, including that of Iraq, was more centralized and less fle *Find the attackers
    18 KB (2,758 words) - 09:27, 22 March 2014
  • ...i.e., causing physical damage or destruction) or '''nonkinetic''' (e.g., [[electronic warfare]] and interference with computers or networks). similarities and differences to [[ballistic missile defense]]. Both can attack the launcher, but cruise missile launchers are far more likely to be mobile
    4 KB (678 words) - 23:47, 25 January 2009
  • ...on guidance to [[RIM-156 Standard SM-2]] missiles in over-the-horizon ASuW attack. ...d (EO/IR) sensor, the directional infrared countermeasures system, and the electronic support measures system. Northrop Grumman’s Mission Systems sector will
    7 KB (960 words) - 19:47, 17 February 2011
  • ...ash; a character of text in a manual system, a byte or computer word in an electronic version. The receiver has an identical pad to use in decryption. One-time pad is that, properly used, it is provably secure against all [[passive attack]]s. However, the requirement that each part be used only once means the key
    12 KB (1,874 words) - 13:49, 11 October 2013
  • ...edits include "Star Wars: Episode I - The Phantom Menace" and "Episode II: Attack of the Clones", "Galaxy Quest", "Terminator 3", "A.I." and the "Matrix" seq ...cluding Star Wars: Episode 1 - The Phantom Menace, Star Wars: Episode 2 - Attack of the Clones, Starship Troopers, Galaxy Quest, T3, The Matrix, The Matrix
    5 KB (750 words) - 00:06, 5 November 2009
  • {{r|Land attack}} {{r|Electronic warfare}}
    967 B (130 words) - 21:38, 19 March 2011
  • ====Electronic warfare and electronic intelligence==== ...Analyzer]] with [[ALR-66| AN/ALR-66C(V)3]] [[ELINT]]/[[electronic warfare|electronic support]] receiver. The C version incorporates a spinning [[direction-fin
    8 KB (1,183 words) - 08:33, 21 March 2014
  • ...ttleships began, in the early 20th century, with [[torpedo]]es from [[fast attack craft]] and [[mine (naval)|mines]]. These [[#The underwater threat|underwat ...ertiary battery of medium guns for such purposes as defense against [[fast attack craft]]. Some have suggested that the USS ''Monitor'' might have been the p
    29 KB (4,423 words) - 03:45, 22 June 2013
  • | title = Goldwater attacks Johnson's Vietnam policy ...nal waters, Operation PIERCE ARROW was the formal name for the retaliatory attack against naval bases, and an oil refinery at [[Vinh]].
    7 KB (1,103 words) - 17:30, 18 February 2011
  • ...operators trained in the UK in 1990. <ref>Private Eye, 31.8.90; Thorn EMI Electronics entry, BAEE catalogue 1990; Sunday Times, 2.12.90; Jane's Defence Weekly The [[BAE Hawk]] trainer/light attack aircraft is manufactured only for export from Britain. <ref name=FAS-SPP-At
    28 KB (4,221 words) - 12:32, 12 September 2013
  • *[[AC-47 Spooky (ground attack)]], also known as "Puff the Magic Dragon", [[Vietnam War]] gunship Other military variants served in [[electronic warfare]], ski-equipped transport, [[search and rescue]], air ambulance,
    1 KB (213 words) - 15:36, 13 February 2011
  • ...[[torture]], not all coercive interrogation qualifies as torture. It does attack the subject's defenses, causing psychological regression, but it can includ | volume = George Washington University National Security Archive Electronic Briefing Book No. 122
    23 KB (3,348 words) - 16:00, 12 February 2011
  • | title = Plan of Attack | year = 2004 | publisher = George Washington University National Security Archive Electronic Briefing Book No. 198
    3 KB (465 words) - 22:29, 30 June 2009
  • ...endly forces on the ground. These sensors allow the gunship to visually or electronically identify friendly ground forces and targets any place, any time. Both the AC-130s employ the latest technologies and can attack two targets simultaneously.
    5 KB (764 words) - 02:23, 15 August 2010
  • ...mple expendables, such as [[chaff (electronic warfare)|chaff]] or [[flare (electronic warfare)|flares]], a more complex expendable such as the Australian [[Nul ...intelligent and independently moving decoys. Surface ships, under torpedo attack, can fire acoustic decoys from their deck-mounted expendables launchers, or
    2 KB (237 words) - 22:03, 6 June 2010
  • ...dates every 10 seconds, and also allows soldiers and marines to exchange [[electronic mail]] and Microsoft Word documents. BFT2 communicates through the commer ...port.png|right|500px|BFT view of Baghdad International Airport, April 2003 attack]]
    5 KB (694 words) - 18:48, 10 February 2011
  • in Bremen, was transformed in France into an electronic eavesdropping ship between 1976 and 1977. ...rried out significant missions in the Indian Ocean following the 9/11/2001 attacks.
    9 KB (1,235 words) - 22:48, 11 October 2009
  • mainly focused on the R&D of increasingly sophisticated landmines (like electronic mines and mines with remote control activation, with radio crypto-coded s Between 1977 and 1987, Iraq purchased from the Soviet Union eight fast-attack [[Osa class missile boat]]s--each equipped with [[Styx SS-N-2]] [[anti-ship
    14 KB (2,089 words) - 01:59, 1 October 2013
  • | Bomber and attack aircraft ...e oil in the non-Communist world, and, especially when oil facilities were attacked, the war caused worldwide economic disruption
    26 KB (4,099 words) - 00:44, 12 October 2013
  • |uses= coinage, jewelry, electronics ...) [[transition metal]]. Modern industrial uses include [[dentistry]] and [[electronics]]. Gold is the basis for a [[Gold standard|monetary standard]] used by t
    27 KB (4,192 words) - 22:16, 3 May 2011
  • ...ure, human error, weather and other natural causes, and physical and cyber attacks. Addressing these vulnerabilities will necessarily require flexible, evolu but also a high-risk target, through human error rather than deliberate attack.
    7 KB (1,028 words) - 02:38, 16 June 2010
  • ...ionics failed. The pilot turned his jet towards the airport when the jet's electronics returned to working order. During this time Yousefi witnessed the UFO an ...xplained at the time. The term "gremlin" was used to describe, among other electronic phenomena, unexplained readings from World War II radar systems. There ar
    18 KB (2,921 words) - 07:26, 17 November 2013
  • ...ts. Nature 340:467-8</ref> [[Image:Phage S.gif|thumb|200 px|A Transmission Electron Microscope Image of the ''Synechococcus'' Phage S-PM2 by Hans-Wolfgang Acke [[Image:Myoviruses P-SSM2 and P-SSM4.gif|thumb|350 px|Electron micrograph of negatively-stained ''Prochlorococcus'' Myoviruses P-SSM2 and
    25 KB (3,751 words) - 00:57, 9 August 2018
  • ...ts. Nature 340:467-8</ref> [[Image:Phage S.gif|thumb|200 px|A Transmission Electron Microscope Image of the ''Synechococcus'' Phage S-PM2 by Hans-Wolfgang Acke [[Image:Myoviruses P-SSM2 and P-SSM4.gif|thumb|350 px|Electron micrograph of negatively-stained ''Prochlorococcus'' Myoviruses P-SSM2 and
    25 KB (3,807 words) - 04:44, 15 November 2014
  • ...have been affected by other failures. A [[distributed denial of service]] attack on specialized infrastructure provider of [[Domain Name System]] (DNS) serv | title = DDoS attack on UltraDNS affects,,
    57 KB (8,395 words) - 07:15, 24 October 2013
  • ...should be distributed in the formation, so a single less-than-catastrophic attack will not leave the unit leaderless. ...split into lead and trail elements, which must stay in constant visual or electronic contact. While the lead element moves continuously, the trail element mov
    5 KB (841 words) - 17:59, 8 July 2009
  • the book, ''Underground: Tales of hacking, madness and obsession on the electronic frontier''.<ref>{{citation | title = Underground: Tales of hacking, madness and obsession on the electronic frontier
    70 KB (10,269 words) - 23:37, 7 April 2014
  • ...raids of 20-40 aircraft, as might come from Israel or Iran, not a massive attack. While it used Soviet doctrine, there was a huge difference between challen [[Operation DESERT STORM#Suppressing KARI: Poobah's Party|Coalition air attack]] during [[Operation DESERT STORM]].
    6 KB (921 words) - 20:40, 23 August 2009
  • {{r|Attack helicopter}} {{r|APR-48|AN/APR-48A Radar Frequency Interferometer Electronic Support}} target acquisition system
    2 KB (228 words) - 04:09, 15 September 2009
  • ...r a buildup by [[special operations]] forces and an intensification of air attacks under the [[Operation NORTHERN WATCH]] and [[Operation SOUTHERN WATCH]] "n ...e lethality of the U.S. armored vehicles, and aggressively but haphazardly attacked them. <ref>Zucchino, pp. 14-15</ref> Senior Iraqi Army officers seemed t
    62 KB (9,789 words) - 23:35, 31 October 2013
  • ...s that break the rules come down quickly."<ref>{{cite web | title =YouTube attacked by MPs over sex and violence footage|author=| publisher = [[Daily Telegra ...eir [[IP address]]es and login names. The decision was criticized by the [[Electronic Frontier Foundation]], which called the court ruling "a set-back to priva
    53 KB (7,747 words) - 14:25, 9 October 2013
  • ...ial law to carry out massive raids on Buddhist pagodas and portrayed those attacks as the responsibility of the ARVN and the CIA. However, the raids were no | volume = George Washington University Electronic Briefing Book No. 101
    8 KB (1,236 words) - 20:52, 24 September 2013
  • ...Birthday), which fell on May 8, many Buddhists perceived this as a direct attack on their customs., killing several adults and children. The Diem government described the attack as having been arranged by Viet Cong provocateurs, without strong evidence;
    15 KB (2,324 words) - 22:15, 19 October 2012
  • {{r|Attack helicopter}} {{r|Flare (electronic warfare)}}
    5 KB (720 words) - 02:21, 12 January 2010
  • ...are the current [[attack helicopter]] of the [[United States Army]]. U.S. attack helicopters differ from "armed helicopters" in that they have no troop or c ...ack.jpg|thumb|right|300px|AH-64 attack helicopter returning from the first attack of the war]]
    4 KB (580 words) - 01:41, 22 August 2010
  • ...ground combat troops withdrawing between 1968 and 1972, with the last air attacks in 1972. After that, the U.S. provided limited replacements of supplies, a ...enhower]] succeeded Truman as President in 1952, after a campaign that had attacked Truman's "weaknesses" against communism and in Korea, he formulated a str
    56 KB (8,488 words) - 07:39, 5 October 2013
  • #Electronic Systems ==Electronic Systems==
    1 KB (180 words) - 17:16, 14 July 2009
  • ...tive II: retain the sensors and keep the program’s systems that focus on attacking targets more than 20 km away. All manned vehicles, unmanned ground vehic ...[[#Unmanned ground vehicles|unmanned ground vehicles]], non-line-of-sight attack systems, and unattended ground sensors. They will also provide libraries of
    31 KB (4,614 words) - 11:39, 8 April 2011
  • ...n Army SIGINT unit. A large number of personnel were killed in the Israeli attack on the SIGINT ship, ''USS Liberty''. ...minating to the FBI and Secret Service information acquired by you through electronic devices pursuant to requests from the FBI and Secret Service, it is reque
    72 KB (10,683 words) - 13:22, 11 October 2013
  • ...)|key]] and are designed to be hard to read without that key. Of course an attacker's intent is exactly the opposite; he wants to read the material without a ...enough and sufficiently random that searching for the key (a [[brute force attack]]) is effectively impossible, and in any application which encrypts large v
    53 KB (8,368 words) - 20:41, 29 June 2014
  • ...)|key]] and are designed to be hard to read without that key. Of course an attacker's intent is exactly the opposite; he wants to read the material without a ...enough and sufficiently random that searching for the key (a [[brute force attack]]) is effectively impossible, and in any application which encrypts large v
    53 KB (8,395 words) - 18:27, 22 August 2013
  • {{r|Attack helicopter}} {{r|Electronic intelligence}}
    4 KB (533 words) - 02:23, 12 January 2010
  • ...perating signal characteristics of enemy transmitters, antennas, and other electronic equipment. ...research institutions. I was able to watch the DI respond to the terrorist attacks of 11 September 2001 and ramp-up for the war on terrorism.
    37 KB (5,529 words) - 02:14, 27 September 2013
  • ...[[History of cryptography]] for details. With the spread of computers and electronic communication systems in recent decades, cryptography has become much mor ...For instance, the effects of [[Moore's Law]] on the speed of [[brute force attack]]s must be taken into account when specifying [[cryptographic key#key lengt
    55 KB (8,724 words) - 22:37, 25 August 2013
  • ...[[History of cryptography]] for details. With the spread of computers and electronic communication systems in recent decades, cryptography has become much mor ...For instance, the effects of [[Moore's Law]] on the speed of [[brute force attack]]s must be taken into account when specifying [[cryptographic key#key lengt
    56 KB (8,878 words) - 17:44, 10 April 2014
  • ...d ammunition. When a general would make a strategic argument, Hitler would attack his credibility by showing a small point to be incorrect. Speer observed th ...then-new [[explosively formed projectile|shaped charge demolitions]], the attack succeeded more through surprise and speed.
    67 KB (10,623 words) - 05:52, 3 November 2013
  • ...s on January 12, 2002. After Macgregor briefed Franks, Franks responded, "Attack from a cold start. I agree. Straight at Baghdad. Small and fast. I agree. S ...tical matter, the oil facilities were kept under close surveillance as the attack grew closer. <ref>COBRA II, pp. 166-167</ref>
    20 KB (3,013 words) - 14:39, 28 September 2013
  • ...s authentication can use someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable m ...e design process in cryptography; publish your design and invite others to attack it. Nearly all cryptographic algorithms and protocols undergo this process
    32 KB (4,913 words) - 22:33, 25 August 2013
  • ...s authentication can use someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable m ...e design process in cryptography; publish your design and invite others to attack it. Nearly all cryptographic algorithms and protocols undergo this process
    32 KB (4,913 words) - 22:36, 25 August 2013
  • ...important means of defeating modern militaries are "nonkinetic" such as [[electronic warfare]]. "Contact" must be interpreted in an era of long-range systems to time immemorial, but its basic functions of reconnaissance and shock attack have now been given to [[armored fighting vehicle]]s, light ground vehicles
    1 KB (186 words) - 16:56, 11 November 2008
  • ...rmation of NSA. In 1955, ASA took over electronic intelligence (ELINT) and electronic warfare functions previously carried out by the Signal Corps. Since its m ...Underwing fuel tanks were added to this model, and the AQM-34R updated the electronics and had standard underwing tanks.<ref name=RyanDrone />
    74 KB (11,149 words) - 21:13, 23 July 2010
  • ...ate with the distant destination. The only goal is communicating with the electronics in a local '''cell''', which is a relatively small geographic area cente ==Electronic warfare==
    3 KB (525 words) - 23:11, 18 February 2010
  • ...nce community was dealing with aspects of terrorism long before the [[9-11 attack]]. Those aspects included the support of guerrillas against the Soviets, in ...well as sources, had changed, with the greater use of suicide attacks and attacks by women and children. A very significant concern was the possible use, by
    32 KB (4,667 words) - 06:40, 5 October 2013
  • text with a [[code word]] (for example, <tt>apple pie</tt> replaces <tt>attack at dawn</tt>). Codes are no longer used in serious cryptography - except in ...ermitting its subversion. Cryptanalysis might be undertaken by a malicious attacker, attempting to subvert a system, or by the system's designer (or others)
    52 KB (7,735 words) - 17:10, 12 July 2020
  • ...q and [[Kuwait]], began on 17 January 1991, at 02:00 local time, with an [[attack helicopter]] strike against an early warning [[radar]] just inside Iraq. D ...adarAttack.jpg|thumb|left|AH-64 attack helicopter returning from the first attack of the war]]
    29 KB (4,491 words) - 07:08, 15 August 2010
  • {{seealso|Fast attack craft}} ...en called "torpedo boat" and exists in new forms generically called [[fast attack craft]].
    50 KB (7,528 words) - 00:55, 16 December 2010
  • ...e decentralized models, sometimes because they are enabled by new forms of electronic communications. ...ine communications personnel may be aware of the direct contact, but newer electronics allow the leader to manage his or her only communications.
    55 KB (8,423 words) - 11:55, 19 October 2013
  • ...ed more than a nuisance transoceanic attack. The only, and very minor, air attacks on the United States came from Japanese balloons and submarine-launched fl ...astern targets, land, refuel, and fly back either to home bases or another attack on the way home.
    50 KB (7,821 words) - 16:10, 30 May 2010
  • | volume = George Washington University National Security Archive Electronic Briefing Book No. 121 ...liked aspects of the Diem government. During this time, the increase in VC attacks was largely coincidental; they were resulting from the VC having reached a
    67 KB (10,279 words) - 10:16, 17 October 2013
  • The '''A-10 Thunderbolt II''' is a [[United States Air Force]] attack aircraft, heavily armored, with a built-in antitank gun, low speed and long ..., it has been found that the A-10 is complementary to the [[AH-64 Apache]] attack helicopter and [[OH-58 Kiowa Warrior]] scout [[armed helicopter]]. It can a
    10 KB (1,450 words) - 00:49, 15 August 2010
  • governing Politburo]]. There was a specific 1974 decision for the final attack, but even it came in phases. ...ary assistance]] to the South, and always the threat of U.S. air and naval attacks against the North. While the North Vietnamese would not directly fight U.S
    43 KB (6,849 words) - 01:21, 22 February 2010
  • ...ign groups became an increasingly major concern, as with the 1992 al-Qaeda attack in Yemen, the 1993 truck bombing of the World Trade Center, 1995 (Saudi com ...f communications to Ireland from a facility called the Ministry of Defence Electronic Test Facility in a British Nuclear Fuels Limited site at Capenhurst, Ches
    21 KB (2,985 words) - 06:09, 14 June 2010
  • ...d a series of actions in the border regions of South Vietnam. All of these attacks were conducted by regimental-size PAVN/[[National Front for the Liberation ...antry Division]] were able to respond quickly. After a ten-day battle, the attackers were pushed back into [[Cambodia]]. At least 852 North Vietnamese soldie
    52 KB (8,500 words) - 19:02, 4 July 2010
  • ...connection between the user and the mail server. However, it does prevent attacks at routers between the mail servers. It provides partial protection agains ...yption system for email called STEED for "Secure Transmission of Encrypted Electronic Data"[].
    14 KB (2,263 words) - 16:52, 2 May 2013
  • ...ed States Government offices abroad is carefully guarded against terrorist attacks, to be taken on a tour of the building and meet Radio Liberty's broadcaste ...rious concern that the [[Warsaw Pact]], led by the [[Soviet Union]], would attack and overrun [[Western Europe]]. From 1945 to 1948, there were ''ad hoc'' mi
    71 KB (10,485 words) - 10:49, 30 October 2013
  • {{quotation|Privacy is necessary for an open society in the electronic age. ... electronic post office box? <ref name=CFPspeech>{{citation
    35 KB (5,286 words) - 22:53, 25 August 2013
  • {{quotation|Privacy is necessary for an open society in the electronic age. ... electronic post office box? <ref name=CFPspeech>{{citation
    36 KB (5,446 words) - 16:36, 7 June 2014
  • ...ialist Republics|Soviets]]; and operations in Afghanistan after the [[9-11 attack]] were directed against the [[Taliban]] and [[al-Qaeda]]. ...he [[10th Special Forces Group]] to Europe, was in expectation of a Soviet attack on Western Europe. SF would help organize, train, and lead resistance move
    55 KB (8,331 words) - 17:16, 13 May 2011
  • did not begin with the [[George W. Bush Administration]] or the [[9-11 Attacks]]. | volume = George Washington University National Security Archive Electronic Briefing Book No. 122
    46 KB (6,792 words) - 11:41, 25 September 2013
  • ...for helicopter handling and can temporarily support them to localize and attack submarines and conduct Over-The-Horizon Targeting missions. ::The ship can attack hostile submarine contacts by firing torpedoes from her six MK 32 Surface V
    12 KB (1,807 words) - 21:20, 10 September 2009
  • ...confined to moonless nights; World War II [[radar]] could not guide ground attack. A large fraction of tactical air power focused on this mission. ...hen armored divisions assigned airmen to radio-equipped tanks to guide the attacks. In the first days of the [[Battle of the Bulge]], in December 1944, bad w
    17 KB (2,641 words) - 14:37, 28 September 2013
  • a result of recommendations from the [[National Commission on Terrorist Attacks Upon the United States]] ("9/11 Commission")<ref name=911CommRpt>{{Citatio | author = National Commission on Terrorist Attacks Upon the United States
    54 KB (7,768 words) - 14:23, 19 September 2013
  • ...among the Maghreb states, none is likely to mount a deliberate major armed attack against a neighbor during the period of this estimate. Limited border confl | title =The Yemen Attack: Illegal Assassination or Lawful Killing?
    72 KB (10,781 words) - 10:46, 5 October 2013
  • ...ition, with the use of [[SS-1 SCUD]] missiles as psychological weapons for attack. Coalition combat casualties were minimal, the number from [[Fratricide (mi ...eparing for the "Left Hook" attack from western Iraq. Iraq made one ground attack, on Khafji, which was repulsed.
    47 KB (7,400 words) - 15:28, 19 September 2013
  • ...f health left in their enemies, and no indication of the strength of their attacks. Reviewers took the absence badly, wishing for more visible feedback. Beth ...|side-quests]] found by mere exploration. Even the main plot itself may be attacked in a number of directions. There are, in the words of critic Craig Lindle
    41 KB (6,394 words) - 15:18, 26 September 2009
  • ...some French and Jordanian military advisors in the defense to the Iranian attack, Operation Jerusalem. The advisors were most effective with the regular tro ...of equipment. On bombing missions the Iraqis started to use low-altitude attacks. Precision-guided munitions such as laser-guided bombs were used with inc
    12 KB (1,806 words) - 06:33, 27 October 2013
  • ...insisted that every German bomber be capable of dive bombing, a method of attack impractical for long-range aircraft designs of the time.<ref> Peter Fritzsc ...ground control, while the Germans violated their own doctrine with wasted attacks on London.
    35 KB (5,408 words) - 09:44, 13 October 2013
  • ...breviation. This always-evolving system began as the '''Joint (Army-Navy) Electronics Type Designation System'''. Information security equipment under the con ...rget, guides a [[RIM-156 Standard SM-2]] missile to it, but, for the final attack of the missile, an AN/SPG-62 radar "illuminates" the target with energy tha
    8 KB (1,179 words) - 13:05, 22 August 2013
  • ...breviation. This always-evolving system began as the '''Joint (Army-Navy) Electronics Type Designation System'''. Information security equipment under the con ...rget, guides a [[RIM-156 Standard SM-2]] missile to it, but, for the final attack of the missile, an AN/SPG-62 radar "illuminates" the target with energy tha
    8 KB (1,181 words) - 13:04, 22 August 2013
  • Nevertheles, the second engine development has been attacked as unneeded "pork", and the [[Obama Administration]] cancelled the projec | journal = Air Attack
    8 KB (1,214 words) - 03:01, 11 May 2011
  • ...closer to the target. These weapons rarely were for close support, but for attacking fortifications. ...for ground troops. In many cases, the mission of a ground unit is less to attack the enemy with its own weapons, and more to direct heavy weapons onto them.
    16 KB (2,370 words) - 19:04, 10 February 2011
  • ...and the subsequent investigation by the [[National Commission on Terrorist Attacks Upon the United States]] ("9/11 Commission")<ref name=911CommRpt>{{Citatio | author = National Commission on Terrorist Attacks Upon the United States
    41 KB (6,051 words) - 03:55, 7 February 2011
  • ...arrier''' is a warship designed to support and operate aircraft, engage in attacks on targets afloat or ashore, and engage in sustained operations in support ...formed outer screens against submarines, and to give early warning of air attack.
    21 KB (3,285 words) - 07:55, 24 December 2012
  • ...s supported in various ways by many other countries, some of which allowed attacks to be launched or controlled from their territory. The [[United Nations]] ...]], believe that many decision makers found it hard to accept that such an attack could come from other than a nation-state.
    85 KB (12,790 words) - 13:58, 10 October 2013
  • | volume = George Washington University National Security Archive Electronic Briefing Book No. 233 | volume = George Washington University National Security Archive Electronic Briefing Book No. 233
    25 KB (3,818 words) - 21:44, 4 July 2010
  • ...ero'''. '''[[Designated ground zero]] (DGZ)''' is a term used in planning attacks with nuclear weapons; the DGZ is the point on the ground, either below an ...rgets, while ordinary buildings and factories, the targets of countervalue attacks, would be destroyed by much lower overpressures.
    32 KB (4,684 words) - 06:14, 10 October 2013
  • ...asic hull is used for the [[Ticonderoga-class]] cruisers, the retired land attack and antisubmarine-optimized [[Spruance-class]] [[destroyer]]s, and for the *Sea denial ships, using their pre-deployed location, attacked other nations' trade routes. Counter-raider merchant ship escorts would,
    34 KB (5,336 words) - 05:16, 21 February 2013
  • ...evant agreements. The legal and political context evolved since the [[9-11 attack]], partially due to a shortage of trained interrogators and a demand for im *[[#Constitutional authority|Legal concept]] following the [[9-11 attacks]] beginning September 25, 2001
    106 KB (15,708 words) - 03:26, 3 November 2013
  • ...detected through Soviet counterintelligence work. [[Adolf Tolkachev]], and electronic engineer working on Soviet radar, was another defector in place for the U ...S. Mueller, III, Director, FBI Before the National Commission on Terrorist Attacks upon the United States
    61 KB (9,521 words) - 15:17, 12 February 2011
  • ...ts could arise from a variety of sources: the vulnerability of the area to attack from outside the hemisphere; the establishment of a military presence withi | title = National Security Archive Electronic Briefing Book No. 67
    67 KB (10,111 words) - 20:56, 30 October 2013
  • ...nstance the possible application of principles of topology to the study of electronic structure.) The latter area of theoretical chemistry is sometimes referr ...ther crude and speculative. Currently, much more sophisticated theoretical attacks based on quantum mechanics are in vogue.
    4 KB (592 words) - 08:37, 15 November 2007
  • ...ient of the handkerchief, as CIA officials would likely have remembered an attack on the Iraqi head of state. While Qasim was not a colonel but a brigadier g ...A and other agencies to collect and transmit intelligence of the impending attack or from a judgment failure of President Bush, Sr. and his National Security
    43 KB (6,547 words) - 03:35, 3 February 2016
  • ...o hit. The fuzes played a decisive role in defeating the Japanese Kamikaze attacks of 1944-45. ...rce on Japan in 1945, and they were used to defend Britain against the V-1 attacks of 1944, achieving a kill ratio of about 79%. (They were ineffective again
    5 KB (729 words) - 20:30, 12 April 2011
  • you filled a prescription. You had to sign a HIPAA-mandated form, often electronically, allowing information release, offering you consultation, etc. The ru ...tute a world emergency and probable [[biological weapon|biological warfare attack]].
    26 KB (3,820 words) - 06:32, 28 June 2010
  • The '''Joint Direct Attack Munition''', usually abbreviated to '''JDAM''', is an add-on guidance kit u ...mass". Originally, this meant the number of soldiers that could be used in attacking a single point. Later on, it referred to the weight of artillery shells
    30 KB (4,547 words) - 23:07, 7 March 2011
  • in [[fault tolerance]]. Historically, clandestine organizations avoided electronic communications, because [[SIGINT]] is a strength of conventional militari When the cut-off team has electronic communications, such as the Internet, it has a much better chance of elud
    37 KB (5,710 words) - 06:44, 6 October 2013
  • | journal = Journal of Electronic Defense ...ould rush out, at close range, and ram naval vessels. The 12 October 2000 attack on the ''[[USS Cole]]'', in a harbor, was only by one boat; consider that i
    41 KB (5,949 words) - 23:39, 7 December 2013
  • ...le of Agincourt]] &mdash; all were ancestors of today's soldiers joined by electronics that turn night into day -- and have robots to carry their heavy equipme ...rmed helicopter]]s that carried them to the battlefield, or from heavier [[attack helicopter]]s that travel with them
    8 KB (1,284 words) - 07:50, 21 February 2010
  •, including a gas [[fire|flame]], an [[electric arc]], a [[laser]], an [[electron]] beam, [[Friction (science)|friction]], and [[ultrasound]]. While often a ...Developments continued with the invention of [[laser beam welding]] and [[electron beam welding]] in the latter half of the century. Today, the science conti
    41 KB (6,367 words) - 10:51, 12 September 2013
  • ...tution]]<ref name=Bennett>Bennett, S. (1999) 'Authors' Rights', Journal of Electronic Publishing, vol. 5, no. 2, Dec., 1999</ref> has been the main protection ...was expensive and usually resulted in degraded content. The development of electronic and digital media transformed the production and distribution of informat
    47 KB (7,472 words) - 21:13, 13 May 2014
  • ...and fall of 1951, <ref name=NSAVN-1 />, French forces beat back Viet Minh attacks, but continued to be increasingly hard-pressed in 1953. While the NSA hist In 1955, ASA took over electronic intelligence (ELINT) and electronic warfare functions previously carried out by the Signal Corps. Since its m
    25 KB (3,805 words) - 03:34, 15 June 2009
  • ...visions of U.S. copyright law, and it may be archived and redistributed in electronic form, provided that this entire notice, including copyright information, ...:0.0069in solid #00000a;padding:0.05in;font-family:Gill Sans MT"| 1760-90: Attack on British corruption; American Revolution; belief in equality of opportuni
    32 KB (4,738 words) - 10:41, 8 January 2014
  • ...s to recoil after a successful block and leaving them open for a follow-up attack by the player. Most of these changes to combat were received well: [[GameSp ...te. After having closed the gate and assisting Savlian Matius in a counter-attack, the player arrives at the Kvatch chapel and persuades Martin to join him/h
    33 KB (5,167 words) - 08:53, 16 October 2013
  • ...the Harpoon was a dedicated [[anti-shipping missile]], but now has a land attack variant, [[AGM-84 SLAM]], which itself has variants.<ref name=DS-SLAM>{{cit ...e autonomously. That the Harpoon is subsonic also decreases its ability to attack a ship with good point defense. Nevertheless, it is still in widespread use
    4 KB (673 words) - 19:54, 12 August 2010
  • ...tly, long-range active methods have been enabled. These can use high-power electronic sound generators, especially on specialized tracking platforms. Another a ...ide, but, in the [[Second World War]], submarines in such lanes were still attacked and destroyed.<ref name=Orloff1999>{{citation
    15 KB (2,276 words) - 11:16, 1 February 2011
  • |distributor=[[Electronic Arts]] (retail) <br/> [[Steamworks|Steam]] (online) ...f you get too close, and the bile attracts a massive horde of zombies that attack.) Teamwork is absolutely essential to survive and progress through the map.
    7 KB (1,124 words) - 18:18, 19 June 2011
  • ...he [[1998 bombings of U.S. Embassies in Africa]] to just before the [[9-11 attack]], negotiated with the West regarding [[Osama bin Laden]], although he may |volume = National Security Archive Electronic Briefing Book No. 134 (update)
    8 KB (1,260 words) - 04:53, 6 July 2015
  • ...essful service in the 1991 Gulf War, the '''E-8C Joint Surveillance Target Attack Radar System, or Joint STARS''', is a large airborne [[intelligence, survei ...per side, with an update every 60 seconds. For finer-grained tracking, '''Attack Planning Mode (APM)''' goes into high resolution, with 6 second updates for
    7 KB (1,056 words) - 03:21, 10 February 2011
  • the evacuation of Boston in 1775, the relief of Quebec in 1776 and the attack on Philadelphia in 1777. In defensive terms, the Royal Navy did protect the ...The kind of guerre de course carried out by Washington's schooners--mostly attacks on unarmed, enemy storeships that hauled loads of foodstuffs and the like-
    29 KB (4,562 words) - 16:35, 5 December 2011
  • ...[[liquid crystal display|LCD]] screen, but in later generations may use [[electronic paper]] such as [[e-ink]]. The laptop will be rugged, use innovative powe ...OLPC laptop are expected to use low-cost, low-power and high-resolution [[electronic paper]] displays.
    32 KB (4,938 words) - 08:07, 26 October 2013
  • ...g liberal ideas on unsuspecting conservative majorities. Thus teachers are attacked for fostering poor education through government monopoly, inefficiency, h ...en new justices. The [[Warren Court]] of the 1960s came under conservative attack for decisions regarding redistricting, desegregation, and the rights of tho
    43 KB (6,294 words) - 16:55, 10 February 2011
  • ...the desired [[azimuth]], but these ramps were relatively easy to find and attack. <ref name=Cully>{{citation ===Attack on development center===
    6 KB (905 words) - 02:28, 30 December 2010
  • ...on the ground, but they have also led more heavily armed [[AH-64 Apache]] attack helicopters to their targets. Ground forces carried typically have [[specia instant access to the total battlefield situation, using near real-time electronic Order of Battle updates. It also provides a new level of detection avoida
    5 KB (747 words) - 07:20, 25 October 2013
  • ...around his 22nd birthday. His Ph.D. work, on the excited states of the one-electron system H<sub>2</sub><sup>+</sup>, gave rise to his first publication.<ref>E ...ectronenübergange bei mehratomigen Molekülen'' (Vibrational structure of electronic transitions in polyatomic molecule), Z. Phys. Chemie '''B21''', 410-446
    28 KB (4,412 words) - 08:42, 29 November 2010
  • .... With this unprecedented support, DVD became the most successful consumer electronics product of all time in less than three years of its introduction. In 200 cartridges, and CD-ROM applications and enjoys wide support among major electronics firms and computer makers as well as movie and music studios.<ref name=t
    28 KB (4,087 words) - 04:16, 29 March 2010
  • ...telbau-Dora |Mittelbau Dora Concentration Camp]] than were killed with the attacks.<ref name='Mittelbau The Human Cost'>The Mittelwerk V-2 factory produced s .....The strongly Nazified town of Nordhausen fell before air-armor and night attack on 11 April...Lying among the multitudes of dead were reported to be a few
    37 KB (5,683 words) - 11:42, 15 September 2013
  • | id = Electronic Briefing Book No. 85 | volume = George Washington University National Security Archives Electronic Briefing Book No. 222, "The CIA's Family Jewels"
    46 KB (6,828 words) - 07:28, 6 October 2013
  • see deep fissures in Communist movement, especially when China sharply attacked Stalin's successors for losing the revolutionary fervor of Marxist-Lenini ...which could fly at very high altitudes, to take good pictures and collect electronic signals. One was shot down in May 1960, which led to the cancellation of
    45 KB (6,968 words) - 04:14, 12 October 2013
  • | volume = George Washington University National Security Archive Electronic Briefing Book No. 122 ..."primary responsibility for the defense of Latin America against external attack, that the role of the Latin American nations in this mission is to be de-em
    50 KB (7,291 words) - 10:36, 17 October 2013
  • ...nt and Faloon filed a new battery of legal motions, escalated their counterattack against the FDA and began extensive preparations for their trial. In Novemb ...rategy to reduce free radical production in mitochondria by making human [[electron transport chain|Complex&nbsp;I]] more like the Complex&nbsp;I found in [[bi
    54 KB (8,068 words) - 03:27, 6 October 2013
  • [[Image:V1-20040830.jpg|thumb|left|[[V-1]]'s were attacked before their role was understood]] attack it was that if the enemy apparently valued it, it must be worth attacking
    62 KB (9,305 words) - 11:54, 12 September 2013
  • '''Bass pedals''' are an [[electronic music|electronic]] [[musical instrument]]. Analogous to the keyboard on [[keyboard instrum ...s pedals. By the late 1960s, some manufacturers began to build stand-alone electronic bass pedal units. These were intended to be much more portable than large
    3 KB (571 words) - 04:09, 17 February 2010
  • ...kground, it soon become apparent that Gunpei was quite adept at developing electronic toys. These devices had a much higher novelty value than traditional toys ===Electronic Game===
    71 KB (11,001 words) - 00:20, 21 September 2013
  • ...iner in the 1980s or 1990s, but not as sharp as the response to the [[9-11 Attack]] in 2001. The ''Lusitania'' sinking was the event that decisively swung Am ...people were dead serious about their opposition to unrestricted submarine attacks on neutral ships. They clearly told Germany they would fight for the princ
    34 KB (5,497 words) - 05:26, 29 October 2013
  • ...ntennas are usually separated by some number of wavelengths. At least some electronics will be at each location, although the signals are usually sent to a pro ...], [[spread spectrum]], or combination techniques of electronic protection/electronic counter-countermeasures (ECCM), the components also must know the frequen
    2 KB (252 words) - 06:51, 24 October 2013
  • ...l in three days. As Japanese morale increased and British morale fell, the attack turned into a race rather than a deliberate operation. Before and during the final attacks, Yamashita visually observed the front from an observation towar in the pa
    10 KB (1,506 words) - 14:37, 25 September 2013
  • ===Communications-electronics=== ...ber aircraft|attack aircraft]] such as the [[A-10 Thunderbolt II]], and [[attack helicopter]]s such as the [[AH-64 Apache]]. An especially destructive techn
    10 KB (1,608 words) - 03:46, 7 February 2010
  • ...[nitrogen]] or [[fluorine]], all of which are strongly [[Electronegativity|electronegative]] ...sults when this strong positive charge density attracts a [[lone pair]] of electrons on another [[heteroatom]], which becomes the hydrogen-bond ''acceptor''.
    12 KB (1,826 words) - 09:38, 8 June 2009
  • ...ce 1981, and the earlier models now need mechanical rebuilding, as well as electronics and other combat systems. ...[OH-58 Kiowa Warrior]] scout/attack helicopters and [[AH-64 Apache]] heavy attack helicopters. They may also use [[unmanned aerial vehicle]]s.
    13 KB (2,001 words) - 00:56, 12 August 2010
  • | work = Journal of Electronic Defense | title = Electronic Warfare in Australia
    14 KB (1,932 words) - 17:48, 30 January 2010
  • ...apons, such that a prepared defense could be nearly invulnerable to direct attack, as tragically demonstrated by [[Battle of Gettysburg# Pickett's Charge|Pic [[William T. Sherman]] attacked logistics in several ways, starting with the destruction of railroads and
    15 KB (2,322 words) - 15:46, 4 May 2010
  • ...ected blow, and the particular parts of the body which were scientifically attacked. The same, of course, applied to the use of the foot or the stick. :Judo and jujitsu were not designed as primary means of attack and defence against a boxer or a man who kicks you, but were only to be use
    16 KB (2,346 words) - 14:02, 13 September 2019
  • ...facility might soon be ready. The government debated a preemptive military attack. "In the meantime, the Mossad would take steps to buy additional time. Thes | author = Whitney Raas and Austin Long}}</ref> The Osirak reactor was attacked on June 7, 1981, setting the Iraqi nuclear program back at least five yea
    17 KB (2,486 words) - 02:34, 12 October 2013
  • ...s a military component too; neighbors had to band together in the event of attacks by [[Native American]]s. People ''had to act as citizens''. The meetings w ...right]] or [[entitlement]] and not as a necessity for [[survival]] against attack, since external authorities such as the federal government could make such
    133 KB (19,779 words) - 11:54, 11 October 2013
  • ...f nocturnal animals during the day, and, in carnivores, evidence of having attacked porcupines. Death usually results from respiratory arrest.<ref>http://www ...lation, all mice were found to have neurologic abnormalities. Thin section electron microscopy of CNS tissue showed rhabdovirus particles and another test show
    20 KB (2,992 words) - 01:47, 10 June 2010
  • ...British army from point to point at will. The American Navy's role was to attack British shipping, while avoiding direct combat. ...nd American inventions and countermeasures, with more and more emphasis on electronics, communications, and computing. An ultimate nuclear deterrent lurked un
    21 KB (3,197 words) - 18:29, 21 August 2010
  • was an invention that facilitated the [[Enlightenment]], and today, electronic communication has accelerated the rate of research. The availability of t ...mproved optics and the new imaging techniques of scanning and transmission electron microscopes, that "little man" inside the sperm cell vanished forever.
    29 KB (4,598 words) - 16:26, 25 January 2011
  • ==Electronic deconfliction== ..., units trying to operate on the same frequency. A more subtle example of electronic conflict involves an enemy frequency, if one intelligence unit is gatheri
    4 KB (606 words) - 19:01, 10 February 2011
  • power and rejected notions of the morally worthy poor in favor a direct attack on the structural barriers such as lack of education, inadequate facilities ...Radiation Safety Act of 1968 provided standards and recalls for defective electronic products.
    31 KB (4,591 words) - 13:59, 1 September 2013
  • power and rejected notions of the morally worthy poor in favor a direct attack on the structural barriers such as lack of education, inadequate facilities ...Radiation Safety Act of 1968 provided standards and recalls for defective electronic products.
    31 KB (4,591 words) - 14:01, 1 September 2013
  • ...methods" which later was used to justify domestic activities ranging from electronic surveillance and break-ins to penetration of protest groups. ...real CIA's corresponding lack of success in foiling the World Trade Centre attacks." <ref name=Guardian2001-10-05 />
    44 KB (6,630 words) - 11:27, 4 October 2013
  • ...right actions are taken. If defensive counterintelligence stops terrorist attacks, it has succeeded. ...indeed the main invasions, the strategic reserves had been under heavy air attack, and the lodgment was sufficiently strong that the reduced reserves could n
    52 KB (8,131 words) - 06:40, 29 October 2013
  • ...s of cricket, the essence of the game is that the wicket is a target being attacked by a bowler using the ball and defended by a batsman using his bat. The o ...nd of the pitch. The one facing the bowler, and defending the wicket being attacked, is called the "'''[[Glossary of cricket#Striker|striker]]'''". His partn
    52 KB (8,650 words) - 12:18, 3 September 2019
  • ...system and the all electronic 405 line EMI system. The superiority of the electronic system saw the mechanical system dropped later that year. Television bro ...uring major crises such as the [[September 11, 2001 attacks|9/11 terrorist attacks on the United States]], the [[7 July 2005 London bombings]] or a Royal Fun
    49 KB (7,304 words) - 19:39, 25 July 2015
  • * The color code on electronic [[resistors]]: [[Black]] = 0, [[Brown]] = 1, [[Red]] = 2, [[Orange]] = 3, ...ple, direction of movement, troops digging in, [[artillery ]]fire, type of attack, [[weapons of mass destruction|NBC (nuclear, biological, chemical) activity
    7 KB (847 words) - 11:39, 29 December 2010
  • ...ground state of <sup>60</sup>Co, and which in turn decays by emitting an [[electron]] to form <sup>60m</sup>Ni. The excited state of the <sup>60m</sup>Ni then ...herapy is usually accompanied by some form of [[chemotherapy]] designed to attack any remaining tumor cells.
    10 KB (1,653 words) - 13:27, 12 September 2013
  • ===Attacking field=== Generally, a new bowler being introduced into the attack. More specifically, the term is used in reference to a certain player, who
    94 KB (16,273 words) - 14:41, 13 October 2019
  • National Security Archive Electronic Briefing Book No. 130 National Security Archive Electronic Briefing Book No. 130
    11 KB (1,597 words) - 07:18, 10 March 2014
  • ...ange, with changes in Cold War emphasis and alliances, the first submarine attack since World War II in the context of a regional war involving extensive pow ..., 241 Marines of the 1st Battalion 8th Marines died in the attack; another attack on the same day killed 58 French paratroopers of 3rd Company of the 6th Pa
    12 KB (1,726 words) - 23:15, 10 February 2010
  • ...gnizable or reasonable extrapolations. In some cases, such as computing, [[electronic warfare]], and other areas, some do not appear to be immensely advanced f ...which is equivalent to a [[carrier-capable]] aircraft rather than a [[fast attack craft]] fight in hundreds or thousands, like the largest carrier battles of
    13 KB (1,986 words) - 18:52, 21 December 2010
  • ...nd the player has an option to buy a flower from her. Later after a failed attack on the Sector 5 Reactor, Cloud falls into the church and wakes up on the fl ...ured themselves. Aeris' heritage is made known to them, and when Sephiroth attacks Shinra the group escapes and leaves Midgar to pursue him. Traveling with C
    13 KB (2,204 words) - 23:04, 31 October 2013
  • ...stant innovation in Internet-enabled services. Early ISPs engineered for [[electronic mail]], [[Telnet]] and [[file transfer]] were overwhelmed by graphics-int The [[Electronic Frontier Foundation]], usually a proponent of minimal regulation of the I
    15 KB (2,186 words) - 15:41, 10 August 2010
  • ...ensive warships optimized for open-ocean operations. As opposed to [[fast attack craft]], it is capable of transoceanic voyages to reach its operational ar ...nd [[cruise missile]]s. The ships are also designed to mesh into military electronic networks.
    14 KB (2,065 words) - 04:43, 8 April 2011
  • ...Web]] is the best-known application, but many other applications, such as electronic mail and a large percentage of telephone calls run over Internet protocol ...d, it was never intended to be a military network survivable under nuclear attack, although other, not necessarily packet-switching, networks, were intended
    17 KB (2,481 words) - 10:48, 10 January 2012
  • ...century 20; some results are published in the [[Soviet Journal of Quantum Electronics]].<ref name="kuzne2"/><ref name="kk"/> ...ture and a plane wave in a quantum amplifier |journal=Soviet J. of Quantum Electronics |year=1981 |volume= 11|issue=8 |pages=pp.1090-1094.}}( Russian version:
    19 KB (2,953 words) - 09:47, 11 October 2013
  • ...include the [[Electronic Frontier Foundation]] or EFF [], [[Electronic Privacy Information Center]] or EPIC [] and [[Global Inte ...lectrical-engineering-and-computer-science/6-805-ethics-and-the-law-on-the-electronic-frontier-fall-2005/readings/read_tlp4/#legal
    20 KB (2,958 words) - 07:00, 29 October 2013
  • ...a forward-firing design, in approaching unescorted bombers, which it could attack from the underside or other angles that gave more flexibility in the flight ...emoved and replaced with electronics, it was a useful light platform for [[electronic warfare]].
    2 KB (265 words) - 05:15, 3 February 2009
  • ...and excess heat in a D<sub>2</sub>-Pd system and its interpretation by the electron-induced nuclear reaction model '' Fusion Technol'' p. 476</ref> #Reduction of the Coulomb barrier by electrons being concentrated between the nuclei;
    27 KB (4,108 words) - 05:45, 8 October 2013
  • ...0th century, [[Frederick Twort]] discovered that bacteria itself could be attacked by viruses. [[Felix d'Herelle]], working independently, showed that a pre ...and can be seen under high magification. Both scanning and transmission [[electron microscope]]s are commonly employed to visualise virus particles.
    33 KB (4,988 words) - 16:11, 7 March 2015
  • ...ting press was an invention that facilitated the Enlightenment, and today, electronic communication has accelerated the rate of research. The availability of t Towards the mid-20th century, with the development of the [[electron microscope]], ultra-high power examination of cells was possible and the fi
    35 KB (5,494 words) - 18:22, 22 August 2013
  • ...ntion of the printing press facilitated the [[Enlightenment]], and today, electronic communication has accelerated the rate of research. The availability of t Towards the mid-20th century, with the development of the [[electron microscope]], ultra-high power examination of cells was possible and the fi
    38 KB (5,837 words) - 22:29, 2 September 2018
  • ...d by a [[TSEC-|TSEC/]][[KIV-14]]. It transmits over a [[electronic warfare#electronic protection|jamming-protected]], [[low probability of intercept]], spread ...guided munition]]s, especially [[guided bomb]]s such as the [[Joint Direct Attack Munition]] (JDAM). With such coordinates, weapons can use the [[go-onto-loc
    2 KB (326 words) - 21:34, 14 February 2011
  • Military interrogations are, by doctrine, recorded, by a stenographer or electronic equipment. Audio and video recording is particularly useful if the interv stay covert; the idea is that the enemy obviously knows they are being attacked, but not who is directing fire.
    66 KB (10,233 words) - 10:19, 17 October 2013
  • ...approximately twice that of the Dragon. Its default anti-tank mode is top-attack, in which, as it nears the target, it "pops up" and dives to hit a tank whe ==Reusable electronics==
    3 KB (519 words) - 08:31, 9 August 2010
  • The city was one of the sites of the [[9-11 Attack|9-11 attacks]]. Nearly 3,000 people died in the destruction of the [[World Trade Cente ...birthplace of [[hip hop]].<ref>{{cite book|first=David|last=Toop|title=Rap Attack 2: African Rap to Global Hip Hop|publisher=Serpents Tail|year=1992|isbn=185
    82 KB (12,497 words) - 21:15, 24 January 2016
  • ...r System (LSRS)''', recently designated the '''AN/APS-149''', is a active electronically scanned array (AESA) surveillance radar, currently used on several [[ ...ting updates to air- and ship-launched weapons ranging from [[Joint Direct Attack Munition]]s to [[AGM-84 Harpoon]]s.
    4 KB (624 words) - 00:19, 15 February 2011
  • ...not come close to the accuracy of more modern aiming systems with digital electronics, and, of course no combination of "dumb bombs" and bombsight could maint ...ent test, a [[B-2 Spirit]] aircraft released 80 independent [[Joint Direct Attack Munition]] guidance kits, on Mk. 82 500 lb. bombs in one 2-second opening o
    5 KB (852 words) - 21:32, 14 February 2011
  • ...tication data with [[DNS security]] and it is also secure against [[active attack]]ers. Members of the FreeS/WAN team wrote RFCs documenting this design.<ref Project leader was activist and [[Electronic Frontier Foundation]] co-founder [[John Gilmore]]. The technical lead for
    6 KB (911 words) - 05:35, 20 October 2013
  • ...le]]s on [[helicopter]]s such as the [[OH-64 Kiowa Warrior]], typically to attack other helicopters rather than high-performance aircraft. The missile proper ...ters and some higher-performance aircraft, and helicopters no longer could attack guerrillas with impunity.
    6 KB (872 words) - 06:46, 10 August 2010
  • ...submarine had to surface to launch them, making the vehicle vulnerable to attack. Polaris could be launched from a submerged submarine. ...5, 1960. ''George Washington'' class boats were adaptations of production attack submarines, which were cut in half and the missile section welded between t
    5 KB (807 words) - 09:22, 12 September 2013
  • ...cations, such as [[flare (electronic warfare)|flares]] used as decoys in [[electronic warfare]].<ref name=K2021>Kosanke ''et al.'', chapter 8, pp. 20-21</ref> ...nt does throw doubt on some conspiracy theories associated with the [[9-11 attack in New York]], which suggest that preplanted thermite was used to cut verti
    7 KB (1,052 words) - 09:30, 12 September 2013
  • ...]. B-29s remained in supporting roles for years after, such as weather and electronic reconnaissance, but were obsolete as combat aircraft. ...ties. Plans to base [[B-17]] bombers in the Philippines failed when Japan attacked the airbases and overran the islands. The B-29 had the range to give the
    6 KB (901 words) - 11:17, 13 March 2012
  • | title = electronic version and English translation of "La cryptographie militaire" ...ns and one wants to spy on the other, or if it is available so a potential attacker can buy a copy for analysis. One way or another, sooner or later they ''w
    8 KB (1,334 words) - 12:51, 4 October 2013
  • ...ter-bomber, and continued to be upgraded into a variety of roles, with its electronic warfare variant being retired in the 1990s. The Navy F-111B, however, nev emphasis on [[command and control]] systems that would function under attack, as well as techniques to ensure weapons system survival, including airborn
    9 KB (1,297 words) - 18:47, 4 July 2010
  • '''USS ''Renate'' (AKA-36)''' was an ''Artemis'' class [[attack cargo ship]] named after the minor planet ''[[575 Renate]].'' The meaning o .... Steaming independently, her men standing daily dawn and dusk alerts, the attack cargo ship crossed the 180th meridian on [[18 May]], and ultimately reached
    11 KB (1,591 words) - 17:54, 8 June 2009
  • ...the enemy's rear by [[air warfare planning#Strategic strike|air or missile attack]] or [[special operations|special operations forces]], the most common star ...are, this is characterized by extreme decentralization enabled by advanced electronics, special operations forces and non-national actors including revolutiona
    14 KB (2,129 words) - 10:17, 8 February 2011
  • ...n''. (Competitions include [[racing]] and [[figure skating]].) However, if attacks are allowed, then the conflict qualifies as a game. ...and sports amuse a broader public. When games like chess and go or even [[Electronic sports|video games]] are played professionally, they take on many of the
    15 KB (2,385 words) - 05:22, 22 June 2009
  • ...ity was increasing the sensitivity of spectroscopic scanners, since, if an attack has not actually taken place, the threat needs to be analyzed remotely. In ...between from 400 to 2350 nm, being developed by the Army Night Vision and Electronic Sensors Directorate (NVESD)<ref name=OSD-UASR-2005 />.
    19 KB (2,667 words) - 07:34, 8 October 2013
  • aircraft. These include the [[AH-64 Apache]] (the ''AH'' stands for [[attack helicopter]]),<ref>{{cite web |url= ...ns Aviation Regiment]] operates the [[Hughes H-6|MH-6/AH-6]] small assault/attack helicopters, as well as highly-modified versions of the Black Hawk and Chin
    18 KB (2,792 words) - 00:29, 30 June 2011
  • | volume = National Security Archive Electronic Briefing Book No. 157 ...tro group that participated in the [[Bay of Pigs Invasion|1961 Bay of Pigs attack on Cuba]]. Several also said they supplied information about the smuggling
    23 KB (3,515 words) - 21:11, 9 March 2010
  • *[[Electronic warfare]] * Attack/[[close air support]]
    21 KB (3,059 words) - 19:40, 26 March 2011
  • ...ns guided by a pilot who would die with the weapon was just that. Kamikaze attacks, especially at the [[Battle of Okinawa]], were an example of the potential | U.S. [[Joint Direct Attack Munition]] ([[JDAM]]), [[AGM-154 Joint Standoff Weapon]] (JSOW)
    24 KB (3,597 words) - 04:49, 16 April 2014
  • ...h gives the turbine blades the best angle of attack. Allowing the angle of attack to be remotely adjusted gives greater control, so the turbine collects the ...the wind turbine cost, includes the [[electrical generator]], the control electronics, and most likely a gearbox component for converting the low speed rotati
    32 KB (5,125 words) - 20:34, 8 October 2011
  • ...ity in public places leading to automotive vigilantism and widely deployed electronic surveillance systems ...tly complaining about the traffic, keeping up a stream of mental or spoken attacks against drivers, passengers, law enforcement officials, road workers, pede
    35 KB (5,349 words) - 14:40, 8 December 2007
  • ...651, Bhutan fell into anarchy. Taking advantage of the chaos, the Tibetans attacked Bhutan in 1710, and again in 1730 with the help of the [[Mongols]]. Both ...dia Company]] who assisted them in ousting the [[Bhutanese]], and later in attacking Bhutan itself in 1774. A peace treaty was signed in which Bhutan agreed
    41 KB (6,110 words) - 04:24, 8 February 2010
  • ...t Lamar did not. When the Cherokee were negotiating for Mexican support to attack frontier settlements, Lamar decided to buy them out. They would not sell an ...glo men. Rebels assassinated opponents and killed several dozen people in attacks on railroads and ranches before the Texas Rangers smashed the insurrection
    43 KB (6,647 words) - 03:45, 21 September 2013
  • ...y complex and necessary for survival, it has naturally become a target for attack by both predators and prey. As [[venom|venomous organisms]] often use their using alcohol to clean electronics products. Several workers in Chinese electronics factories have been poisoned by n-Hexane in recent years.<ref>[http://ww
    68 KB (9,221 words) - 02:36, 16 December 2013
  • ...sail with VF-51 aboard, bound for Korea, where they would act as [[ground-attack aircraft]].<ref>Hansen 2005, pp.&nbsp;79–85.</ref><!--all good-->|last=Ford | first=Peter Shann| title=Electronic Evidence and Physiological Reasoning Identifying the Elusive Vowel "a" in
    68 KB (10,519 words) - 12:25, 1 March 2014
  • ...nd-in-command. The bumbling men go through impossible antics, including an attack against Confederate troops without guns. Yvonne Craig is on screen once, fo ...Big-time politician "Boss" Gates hires Stu to prove his son was framed for attacking a girl. Craig plays the friend of the victim, and helps Stu with his inv
    58 KB (9,928 words) - 00:57, 11 February 2010
  • ...od provided great men, and occasionally women, to rally the nation against attacking enemies, some of which were sent by God as a punishment for the sins of *[[Torah database]]s (electronic versions of the Traditional Jewish Bookshelf)
    77 KB (11,975 words) - 05:46, 15 September 2013
  • ...1886 was the day of the Bay View Tragedy in which striking Polish workers attacking a steel mill in the Bay View section were intercepted by a squad of Nati ...ocialist thought. During World War I, Bartel defended German culture while attacking the capitalist motivations that had caused both Germany and America to g
    72 KB (10,649 words) - 06:15, 15 September 2013
  • ...ic electronic form of the document is copyright. Permission is granted for electronic copying, distribution in print form for educational purposes and personal ...t first infected remains sound; the lues venerea has occasionally made its attack with pains in the shoulders and head, and other symptoms, the genital organ
    172 KB (31,000 words) - 19:07, 26 August 2008
  • ...gun batteries that made warships unsuitable platforms for shock-sensitive electronics, as well as the much smaller size of amphibious operations. Any large am The airborne command post would be much harder for an enemy to attack than a ship, but the aircraft has much less endurance than a ship. While th
    2 KB (289 words) - 02:46, 16 January 2010
  • ...ght to medium bomber than a fighter-bomber, and, in the EF-111 version, an electronic warfare aircraft. The Navy's F-111B always was overweight for carrier use terrain-following [[radar]], allowing it to make extremely low altitude attacks in all weather. In Air Force service, its approximate replacement was the
    2 KB (266 words) - 03:12, 24 January 2009
  • ...pending on the mission, they may be [[armed helicopter]]s, but dedicated [[attack helicopter]] variants are not used in conventional Army operations. ...INT]] platform with the "Quickfix" [[signals intelligence]] (SIGINT) and [[electronic warfare]] (EW) emitter location and targeting system.
    2 KB (320 words) - 23:07, 16 September 2009
  • ...ported and still can be a threat. It also has command-guided capability to attack land and sea targets.<ref name=FAS-SA3>{{citation ==Electronics==
    2 KB (283 words) - 17:53, 3 July 2008
  • *Optical and electronic landing direction systems to replace human-to-human methods ...ive, moving across them could seem a recipe for disaster. The [[kamikaze]] attacks at the end of the [[Second World War]] was an early warning of the increas
    3 KB (412 words) - 02:55, 16 April 2011
  • ...the future. Without earth penetration, nuclear weapons may not be able to attack deep facilities &mdash; which are in the range of specialized [[precision g ...3.html}}</ref> In addition, it has a [[fire-resistant pit]] and [[enhanced electronic isolation]].<ref>{{citation
    3 KB (396 words) - 00:37, 15 August 2010
  • ...affected only by gravity, wind, and air resistance. Practical variants are electronically [[guided bomb|guided]] and may be [[precision-guided munition]]s. ...area-effect and do not need extreme precision, but they need guidance when attacking targets at long range. The '''Wind Corrected Munitions Dispenser''' is o
    3 KB (529 words) - 19:55, 16 February 2011
  • have started with non-linear movement, by [[combined arms]] forces, and attacks in the enemy's rear by [[Strategic strike|air or special operations forces ...are, this is characterized by extreme decentralization enabled by advanced electronics, special operations forces and non-national actors including revolutiona
    4 KB (628 words) - 10:14, 8 February 2011
  • ...s of armor-piercing, incendiary, chemical, [[cluster submunition]], smoke, electronic jammers, etc. The payload triggers by any of a variety of fuzing methods, | title = Background — CF-18 Ground Attack – CRV-7 Unguided Rocket
    5 KB (707 words) - 09:00, 21 February 2010
  • ...missiles were not even sent by beam to the target; the bombers did have [[electronic warfare]] equipment to interfere with the beam. Instead, the missiles wer a second ground radar to illuminate the target for the missile's final attack. This latter technique, [[semi-active radar homing]], requires only a brief
    5 KB (775 words) - 15:26, 30 May 2009
  • ...ters, SWPA, also under Akin but including Navy and Marine Corps, with an [[electronic intelligence]] mission against Japanese radar in mid-1943. The US Army had shared, with the Navy, the [[Purple]] attack on Japanese diplomatic cryptosystems. Many histories assume Purple included
    6 KB (782 words) - 04:11, 7 September 2010
  • ...king a '''routing table''', or '''Routing Information Base (RIB)''', is an electronic table ''(file)'' or database type object that is stored in a [[router]] o ...te back to the source address, the packet is assumed to be malformed or an attack, and is dropped.
    6 KB (958 words) - 12:14, 9 June 2009
  • ...command of the [[United States Air Force]], SAC did not coordinate nuclear attack plans with the [[United States Navy]], which, first from aircraft and then ...of computers and communications, drawing from DISA, service communications-electronics organizations, and NSA.
    6 KB (887 words) - 03:32, 1 December 2009
  • | title = electronic version and English translation of "La cryptographie militaire" has to overcome. (One obstacle the British ran into when attacking the
    7 KB (1,185 words) - 00:00, 5 September 2013
  • ''Encephalomyocarditis Virus''(EMCV) attacks many animals as mentioned previous but studies documenting pig infection s ...d necrosis with lymphocytic infiltrates, virus particles may be visible on electron microscopy, definitive diagnosis: virus isolation, PCR, mouse inoculation,
    7 KB (1,025 words) - 03:35, 8 February 2010
  • ...en a clue that a given missile radar system might be in a certain place, [[electronic intelligence]] can be tasked to confirm by detecting the radars of that s ...ET/TK clearances, could not see pictures of the targets they were going to attack. Most imagery useful at the tactical level is now at the SECRET "[[compartm
    8 KB (1,223 words) - 15:17, 11 February 2011
  • | [[Electronics]] company workers ...''BBC News'': [ Prince Philip attacks 'townies' ]'. 6th August 1998.</ref>
    9 KB (1,397 words) - 08:07, 16 May 2009
  • ...designator]] with [[PAVEWAY laser guidance]], or use the [[Joint Direct Attack Munition]] (JDAM) with [[inertial navigation|inertial guidance]], often sup ...FMU-139]], only the ground proximity sensor is in the nose, and the actual electronics and detonating explosives of the fuze are in the tail.
    8 KB (1,263 words) - 03:15, 7 March 2011
  • | volume = National Security Archive Electronic Briefing Book No. 85 ...tml}}</ref>, the U.S. Supreme Court ruled in favor of a ship that had been attacked by Argentine aircraft during the [[Falklands War]]. While this was not an
    10 KB (1,470 words) - 10:08, 31 May 2009
  • The '''email system''' is the network of computers handling electronic mail ([[email]]) on the Internet. This system includes user machines run ...border defense" – blocking [[Denial of service|Denial of Service]] (DoS) attacks, authenticating the sender, and various [[Anti-spam techniques|spam-filter
    11 KB (1,671 words) - 11:06, 29 August 2013
  • The '''email system''' is the network of computers handling electronic mail ([[email]]) on the Internet. This system includes user machines run ...border defense" – blocking [[Denial of service|Denial of Service]] (DoS) attacks, authenticating the sender, and various [[Anti-spam techniques|spam-filter
    11 KB (1,673 words) - 11:07, 29 August 2013
  • ...acobins", and would have nothing to do with television and what he called "electronic computers." ...student of [[Leo Strauss]]) wrote: "Kirk was a poor Burke scholar. Burke's attack on metaphysical reasoning related only to modern philosophy's attempt to el
    11 KB (1,620 words) - 05:02, 21 July 2009
  • ...ll fire back at the player and destroy their ship. This does not mean that attacks in high security space are impossible (until recently, pirates would use a ...(boosting either the shield or the armor on a ship), as well as the use of electronics warfare to 'jam' ships. Ship fitting is something of an art, and players
    10 KB (1,709 words) - 21:48, 28 March 2010
  • ...SAR aircraft such as the [[E-8 Joint STARS| E-8 Joint Surveillance Target Attack Radar System (Joint STARS)]], whose [[APY-3|AN/APY-3]] radar has multiple m There are several electronic approaches to MTI. One is a refinement of CCD<ref>{{cite web
    11 KB (1,591 words) - 13:49, 1 October 2013
  • dialogue, featuring himself on saxophone, John Turville on keys and electronics, Yaron Stavi on bass and Asaf Sirkis on drums. Other artists include vo Atzmon confronted the ongoing attacks on him in an article entitled "Think Tribal, Speak Universal" [http://www.
    13 KB (1,987 words) - 01:44, 21 June 2016
  • ...outhern France in 1944. His resistance forces prepared the battlefield for attacks on retreating German forces. | volume = George Washington University Electronic Briefing Book No. 101
    12 KB (1,908 words) - 06:26, 9 August 2010
  • ...atological toxicity]], immune system infection due to vulnerability, heart attack, uncommon [[dermatological]] effects, and overexposure to radiation<ref>3</ ...(Herceptin) Modified with Nuclear Localization Sequences (NLS): An Auger Electron-Emitting Radiotherapeutic Agent for HER2/neu-Amplified Breast Cancer. [ser
    11 KB (1,563 words) - 08:38, 7 October 2013
  • ...FOB, it provides communications center services, telephone communications, electronic maintenance, and photographic support. deep in Iraq, hunting [[SS-1 SCUD]] launchers, guiding air strikes, and attacking command & control.
    13 KB (1,760 words) - 13:57, 13 May 2011
  • ...e is a prolific writer and loves to teach. He has wide interests including electronics for [[commercial fishing]], [[cloud computing]], renewable biodiesel app ...on ways to keep military telecommunications networks functioning after an attack or disruption. He wrote:
    13 KB (1,902 words) - 17:28, 31 August 2010
  • ...n-vehicular network|In-vehicular networks (IVN)]] for real-time control of electronic devices within the car and [[Fieldbus]]es for real-time digital communica Also [[network security]] becomes a topic again if the network must resist attacks which employ individual devices stolen from the network, a scenario not im
    15 KB (2,272 words) - 18:13, 18 April 2010
  • ...propriation from the U.S. Congress. The website is one of President Bush's electronic government initiatives to help federal government agencies work together ...n for information during national disasters. After the September 11, 2001, attack on the United States, became a major tool for the U.S. government t
    16 KB (2,508 words) - 05:37, 14 September 2013
  • | volume = National Security Archive Electronic Briefing Book No. 26. }} p. 25</ref> ...r systems are intended for both a CBR battlefield and [[release other than attack]] (ROTA) events. ROTA events include industrial accidents as well as terror
    16 KB (2,324 words) - 16:43, 14 March 2011
  • ...ty]], it is impossible for government to deliver reliable services through electronic means. The advent of [[Internet]] delivery and [[cloud computing]] immens ::number of attacks defended against
    20 KB (2,775 words) - 01:18, 7 February 2010
  • | image = Salmonella typhimurium.jpg|thumb|Color-enhanced scanning electron micrograph showing Salmonella typhimurium (red) invading cultured human cel the age of five, however, [[typhoid fever]] is not such an illness that attacks younger children, and so policymakers tend to neglect it.
    20 KB (3,123 words) - 12:55, 27 October 2010
  • The probability of a bioterrorist attack against US civilian and military personnel overseas or in the United States ...rgency room is one obvious place for comparison, but the availability of [[electronic health record]]s, from which data from many office encounters can be extr
    22 KB (3,131 words) - 10:36, 31 May 2009
  • ...and petty theft increased amongst the Czech clergy, which led to reformers attacking the practices of the Church. ...ies in the Prague area are chemical production, electrical engineering and electronics, food processing and general engineering.
    23 KB (3,648 words) - 08:37, 14 February 2010
  • with Kier–Hall Electrotopological State (E–state) Indices, Internet Electron. J. Mol. Des. 2008, 7, 55–67, <
    24 KB (3,731 words) - 13:40, 1 September 2013
  • with Kier–Hall Electrotopological State (E–state) Indices, Internet Electron. J. Mol. Des. 2008, 7, 55–67, <
    24 KB (3,739 words) - 13:42, 1 September 2013
  • ...bjects such as [[mannequin|shop dummies]] and [[doll]]s coming to life and attacking people. Though Letts and Dicks tried to tone down the violence, writer a ...[Delia Derbyshire]] of the [[BBC Radiophonic Workshop]], this example of [[electronic music]] played over the original series titles, which were achieved using
    25 KB (3,970 words) - 11:00, 14 August 2014
  • ...strings of an old, gutted piano. The resulting sound was then recorded and electronically processed with echo and reverb. ...strovalva'' (1981), ''Arc of Infinity'' (1983), ''Terminus'' (1983), and ''Attack of the Cybermen'' (1985). In the secondary console room, most of the rounde
    26 KB (4,201 words) - 14:57, 13 May 2019
  • ...l several research labs], devoted to fields including [[robotics]], [[microelectronics]], [[computer science]], [[chemistry]], [[prototyping]], [[optics]], [[c ...rinciples of Engineering and Technology) stresses drafting, CAD, and basic electronics skills. Integrated Humanities courses are offered in 10th and 11th grade
    34 KB (5,058 words) - 16:53, 2 February 2012
  • ...[Delia Derbyshire]] of the [[BBC Radiophonic Workshop]], this example of [[electronic music]] played over the original series titles, which were achieved using ...dventures available on digital channels or the internet, the first being ''Attack of the Graske'' in 2005.
    34 KB (5,277 words) - 11:23, 4 March 2020
  • ...heir inexperience led to a number of illuminated clouds being mistaken for attacking airships. Aerial defences against Zeppelins were haphazard and the lack ...nd forced to leave Polish airspace. During this time, LZ130 was used as an electronic scouting vehicle and was equipped with various telemetric equipment. Fro
    36 KB (5,607 words) - 16:42, 2 October 2013
  • ...Indian Wars that were characterized by brutal border raids and successful attacks on British forces in present-day [[Canada]]. ...bacco and vegetables. Its industrial outputs are machinery, electrical and electronic equipment, scientific instruments, printing, and publishing. Thanks large
    37 KB (5,598 words) - 15:06, 2 September 2014
  • | author = Institute of Electrical and Electronics Engineers}}</ref> ...://}}</ref> Such an update is an invitation to attack unless secured, so dynamic DNS update should always be associated with a sp
    39 KB (5,816 words) - 23:07, 25 March 2011
  • ...paper]]s, [[magazine]]s, [[journal]]s and all forms of [[broadcast]] and [[electronic]] media were enabled by the growth of large [[bourgeois]] or [[middle cla ..., reporting about technology and breaking news. Footage from the terrorist attacks in central London on July 7, 2005, was captured on camera phones. Similarl
    42 KB (6,486 words) - 00:59, 12 February 2010
  • ...f>[ Sumerian King List] Electronic text Corpus of Sume5rian Literature] The ETCSL project, Faculty of Orient ...e earth cracked from which poured fire. Beasts appeared in the forests and attacked humans. She drove the beasts away, placed river stones to patch the holes
    46 KB (7,447 words) - 20:03, 2 August 2014
  • ...inancial disclosures, bans gifts from [[lobybying|lobbyists]] and improves electronic access.<ref>Governor's office press release, "100th Day in Office" Mar 13 ...asual similarity of being former beauty contest winners, and conservatives attacked by a liberal media, and, according to Fullilove, showed hubris in intervi
    45 KB (6,710 words) - 09:38, 8 October 2013
  • ...' (1st ed. 1906; 2nd ed. 1915; 3rd ed. 1957; 4th ed. 1974; 6th ed. 1999 is electronic) ...sed for People: Mike Harris's Ontario.'' Fernwood, 1997. 207 pp. leftwing attack on Conservative party of 1990s
    64 KB (8,604 words) - 23:46, 16 July 2010
  • ...r=Hopewell S, Clarke M, Lefebvre C, Scherer R| title=Handsearching versus electronic searching to identify reports of randomized trials. | journal=Cochrane D meta-analysis of common antiplatelet regimens after transient ischaemic attack or stroke. ur Heart J. 2008 May;29(9):1086-92. Epub 2008 Mar 17. PMID 18349
    72 KB (9,965 words) - 09:41, 4 October 2016
  • ...the possibility of forming a 'supergroup' based around a twin-lead guitar attack which included himself on 12-string with his friend Beck, and a rhythm sect ...sessions. It also featured a 1976 John Bonham percussion instrumental with electronic embellishments added by Jimmy Page, called '[[Bonzo's Montreux]]'. With n
    65 KB (10,452 words) - 13:17, 6 September 2013
  • ...the possibility of forming a 'supergroup' based around a twin-lead guitar attack which included himself on 12-string with his friend Beck, and a rhythm sect ...sessions. It also featured a 1976 John Bonham percussion instrumental with electronic embellishments added by Jimmy Page, called '[[Bonzo's Montreux]]'. With n
    67 KB (10,601 words) - 07:30, 13 December 2015
  • '''"Stone, kidney disease, strangury and sciatica are very apt to attack people, and ruptures occur, when they drink water of very many different ki 60 medical texts by Hippocrates and his pupils, was searched using the electronic database Thesaurus Lingua Graeca to identify the words "anaesthesia" and
    97 KB (14,807 words) - 20:59, 3 October 2018