Srl | Item |
1 |
ID:
130661
|
|
|
Publication |
2014.
|
Summary/Abstract |
The article discusses advanced reconnaissance and weapon guidance radars as potential targets of electronic warfare. Also discussed are the role and significance of reconnaissance and weapon guidance radar systems in combat operations, and general trends toward greater information gathering capabilities of radar systems. It also presents the multiple input-multiple output (MIMO) multichannel radar system, and the effectiveness and survival rate of radar systems using MIMO technologies.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
130151
|
|
|
Publication |
2013.
|
Summary/Abstract |
Airborne Electronic Warfare (EW) encompasses several different tasks: It includes the tactical detection
of Radio Frequency (RF) energy emitted by ground-based, aircraft-mounted and weapons guidance radars, and the activation of active and passive counter - measures to neutralise such threats. Beyond its tactical use, EW includes the collection of information regarding the enemy's electronic order or battle vis-Ã -vis the planning and execution of an air campaign at the strategic level. This article surveys some of the recent occurrences in the world of Airborne EW, examining the products of some of the leading companies in this domain.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
133340
|
|
|
Publication |
2014.
|
Summary/Abstract |
The Royal Australian Air Forces (RAAF) debuted two upgraded Lockheed Martin C-130J Hercules Multirole Transports with a newly fitted electronic warfare self protection system at exercise red flag Alaska 14-2, which concluded at the end of June.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
133607
|
|
|
Publication |
2014.
|
Summary/Abstract |
Cyber terrorism is a phenomenon that is gaining more and more attention. One reason for this is the concern that modern information and communications technology may be used in order to harm open societies. This concern also involves actual IT systems and the information generated being targets of advanced attacks. That way functions that are important to society could be affected. The term 'cyber terrorism' is complex. This article describes the difference between traditional and cyber terrorism. The main focus is on how the al-Qaeda terrorist network acts in cyberspace and how their change in concentration and activities has made them a clever player in an electronic Jihad.
|
|
|
|
|
|
|
|
|
|
5 |
ID:
133609
|
|
|
Publication |
2014.
|
Summary/Abstract |
In June 2013, President Obama met with President Xi Jinping at Sunnylands, California. The meeting was seen as a chance for the two leaders to get to know each other in a relatively informal setting so they could address the growing mistrust between their countries. While maritime disputes, trade tensions and differences over how to contain the North Korean and Iranian nuclear programmes were high on the agenda, cyber security-in particular Chinese cyber espionage-was the defining issue of this unusual summit. For the US, the meeting between the two presidents was the culmination of a long campaign to pressure Beijing to reduce the scope and scale of Chinese cyber attacks on the United States.
|
|
|
|
|
|
|
|
|
|
6 |
ID:
130662
|
|
|
Publication |
2014.
|
Summary/Abstract |
The article discusses recommendations to make the activities of the Russian Armed Forces environment friendly. Topics discussed include details of the environmental safety doctrine for the Armed Forces' activities, development of general standards of environmental safety of weapon and military equipment systems and complexes, constraints to reform. Recommendations include a process approach Armed Forces Environmental Safety Manual and regulations for environmental safety maintenance agencies.
|
|
|
|
|
|
|
|
|
|
7 |
ID:
133988
|
|
|
Publication |
2014.
|
Summary/Abstract |
A recent electromagnetic environment review has cast the die for the shake-up of electronic warfare organization, planning and delivery across UK defence.
|
|
|
|
|
|
|
|
|
|
8 |
ID:
133608
|
|
|
Publication |
2014.
|
Summary/Abstract |
The issue of cybersecurity as an issue for international security has captured the attention of policy makers around the world. A 2011 United Nations (UN) assessment found that only 68 of the 193 UN member states had cybersecurity programmes. By 2012, this had increased to 114 countries. Of the nations with cybersecurity programmes, roughly 40 have publicly identified cybersecurity as a military concern in national military strategies or defence white papers.
|
|
|
|
|
|
|
|
|
|