Term
The three major subdivisions of EW are: |
|
Definition
1. Electronic attack 2. Electronic Prot 3. Electronic warfare support (3) |
|
|
Term
_____ is the offensive portion of EW and was formerly called ECM. |
|
Definition
|
|
Term
EA uses _____ and _____ to disrupt or deny the enemy effective use of their electronic systems. It includes the efforts for: |
|
Definition
jamming, elec deception (4)/ intercept, locate, identify |
|
|
Term
_____ is the defensive portion of EW |
|
Definition
|
|
Term
______ protects the friendly use of the electronic spectrum |
|
Definition
|
|
Term
____ includes the actions taken to protect personnel, facilities or equipment from enemy EA |
|
Definition
|
|
Term
____ is conflict-related info that involves actions to search for, intercept, identify and locate sources of EM energy for immediate threat recognition |
|
Definition
ES (Elec warfare support) (6) |
|
|
Term
_________ is the deliberate radiation or reflection of electromagnetic energy with the objective of impairing the use of electronic devices, equipment or systems |
|
Definition
|
|
Term
_______ is unintentional radiation, emission, or induction of electromagnetic radiation which causes degradation or disruption |
|
Definition
|
|
Term
_________ is the employment of weapons that ue either electromagnetic or directed energy as their primary destructive mechanism |
|
Definition
EA/EP Destructive electronic attack(8) |
|
|
Term
What five components comprise the five fundamentals of EA/EP non-destructive ea |
|
Definition
1. Meaconing 2. Intrusion 3. Jamming 4. Interference 5. EM deception |
|
|
Term
_____ is the false navigational signals from the enemy. What types of signals are used? |
|
Definition
Meaconing; TACAN or GPS (10) |
|
|
Term
______ are false messages (normally voice) imitation of known stations e.g. the enemy imitating an e-8 broadcast. What is our defense toward this? |
|
Definition
Intrusion; authentication codes (11) |
|
|
Term
_________ is the deliberate radiation or reflection of electromagnetic energy with the objective of impairing the use of electronic devices, equipment, or systems. |
|
Definition
|
|
Term
What three things can be jammed? |
|
Definition
Radar, voice, data links (12) |
|
|
Term
_______ may be the result of natural phenomena, spectrum congestion, poorly designed equipment, or any number of other factors |
|
Definition
|
|