Talk:Electronic warfare

Untitled
I suggest to move it into Electronics Project --Davy Jones 11:42, 16 October 2005 (UTC)

Nonpropagating EM modes?
Is there a particular reason that nonpropagating EM modes and other non-radiative EM fields could not be used as part of electronic warfare? I can't find any good references for this, but as someone with a degree in Applied Physics, I'm certain that technically, at least, it is possible. - JustinWick 03:05, 6 December 2006 (UTC)

Uhh... a DJ?
"1. Electronic Warfare is an experimental electronic DJ experiment featuring fellow artists Jay Hines and Adam Barr. The group was founded in 2007." - Why is this here? If this guy wants to be on wikipedia then he should submit his own article not modify this combat related article about this nonsense.

Citizendium Electronic warfare
Citizendium has good article on Electronic warfare that could inform this one Electronic warfare

"Citizendium original articles are available under the Creative Commons Attribution ShareAlike 3.0 Unported License (cc-by-sa)" see Citizendium. --LittleHow (talk) 06:11, 10 August 2009 (UTC)

Russian systems?
http://www.flightglobal.com/blogs/the-dewline/2011/12/avtobaza-irans-weapon-in-rq-17.html

The Iranians are reported to have just used a Russian system called Avtobaza, which we don't seem to cover at all. Hcobb (talk) 16:38, 5 December 2011 (UTC)
 * Shocking that we might not cover something that was only just reported online today. As a matter of fact, adding this would smack terribly of recentism, to say nothing of the fact that, as your article points out, this is all speculation and there is no confirmation that the Iranians actually managed to do anything. --OuroborosCobra (talk) 23:26, 5 December 2011 (UTC)

http://www.roe.ru/cataloque/air_def/air_def_78-81.pdf

Just because you didn't know about doesn't mean it hasn't been around for years. In this case 2007. Hcobb (talk) 01:57, 6 December 2011 (UTC)
 * We don't mention each and every electronic warfare suit in this article. The fact that it has been around since 2007 is irrelevant since your reason for adding it is something from 5 December 2011. In otherwords, your claim for notability is recentism for an unconfirmed claim. I will kindly ask you not to speculate as to my prior knowledge as I only commented as to the recent news story claim and its lack of mention in this article, not any prior personal knowledge. --OuroborosCobra (talk) 03:18, 6 December 2011 (UTC)

Merger proposal
I propose that EWSP be merged into Electronic warfare. I think that the content in the EWSP article can easily be explained in the context of Electronic warfare, and the Electronic warfarearticle is of a reasonable size that the merging of EWSP will not cause any problems as far as article size or undue weight is concerned. Sander.v.Ginkel (talk) 09:17, 25 June 2013 (UTC)

Why are the same things repeated over and over again in the article?
The article can be shortened five times if the repeated information is removed. — Preceding unsigned comment added by 178.239.231.68 (talk) 11:58, 12 September 2013 (UTC)
 * Do you have specific examples? --OuroborosCobra (talk) 12:01, 12 September 2013 (UTC)

spoofing
The categorization of electronic warfare methods leaves out at least one: Spoofing. That means sending informational signals to mislead the enemy. It only partly overlaps with jamming. Spoofing can be sending a false message that you hope the enemy will intercept and act on, or setting up dummy transmitters to generate fake radio traffic, or injecting signals into enemy systems to cause them to misbehave. Radar spoofing methods can be considered a method of radar jamming, but inserting false commands into an enemy control system is not any form of jamming. Many methods of cyber warfare, which surely ought to be counted as a field of electronic warfare, can be seen as spoofing methods. — Preceding unsigned comment added by 144.118.94.167 (talk) 22:59, 24 September 2014 (UTC)

Comment - The difference between electronic warfare and cyber warfare occurs somewhere towards the bottom layers of the OSI model. But I agree, if a jammer is transmitting fake packets/frames with the hopes of causing radios to detect them and subsequently drop them, then it is a jamming attack that uses spoofing. If it's goal is to have the radios detect the fake packets/frames and somehow act on them, then that gets into the area of cyber warfare because it is less about spectrum and more about the protocol. Perhaps we need a subsection in this article about EW vs Cyber Warfare? — Preceding unsigned comment added by 24.254.146.156 (talk) 01:28, 25 September 2014 (UTC)

External links modified
Hello fellow Wikipedians,

I have just added archive links to 1 one external link on Electronic warfare. Please take a moment to review my edit. If necessary, add after the link to keep me from modifying it. Alternatively, you can add to keep me off the page altogether. I made the following changes:
 * Added archive http://web.archive.org/web/20110812190924/http://www.dtic.mil:80/doctrine/jel/service_pubs/afd2_5_1.pdf to http://www.dtic.mil/doctrine/jel/service_pubs/afd2_5_1.pdf

When you have finished reviewing my changes, please set the checked parameter below to true to let others know.

Cheers.—cyberbot II  Talk to my owner :Online 20:40, 27 February 2016 (UTC)

External links modified
Hello fellow Wikipedians,

I have just modified 1 one external link on Electronic warfare. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Added archive https://web.archive.org/web/20160208190823/http://www.tmd.co.uk/markets/electronic_warfare.asp to http://www.tmd.co.uk/markets/electronic_warfare.asp

When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at ).

Cheers.— InternetArchiveBot  (Report bug) 08:22, 22 December 2016 (UTC)

External links modified
Hello fellow Wikipedians,

I have just modified one external link on Electronic warfare. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Added archive https://web.archive.org/web/20131113200915/http://www.hot.ee/aasa/LPL_1211.pdf to http://www.hot.ee/aasa/LPL_1211.pdf

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

Cheers.— InternetArchiveBot  (Report bug) 04:36, 19 September 2017 (UTC)

Severe editing required
This article is horribly written in its current form and is hardly encylopedic. As mentioned by someone else years ago on this talk page, many statements repeat many times. The engineering section doesn’t mention anything about engineering. The history section covers only the last few years and onky 2 events, when we know that the history of EW easily reaches back beyond WWII. Over the next few days, if I don’t see other comments here, I’ll take in upon myself to do some major rewriting. But this should be a collaborative effort. TadgStirkland401 (TadgTalk) 07:46, 10 August 2018 (UTC)
 * Okay, I took a stab at making some pretty hefty edits throughout the document. I paid a lot of attention to the History section, found a few dead links, and fixed a few improper citations. I'd appreciate it if someone would come behind me and make more edits. The article still reads poorly to me even after I made several grammatical changes... Anyone? TadgStirkland401 (TadgTalk) 02:46, 15 August 2018 (UTC)

Irrelevant Photos
The E-4B picture relates to protection against a nuclear electromagnetic pulse (EMP), which I would not consider a form of Electronic Attack. There's nothing here that explains how ECHELON relates to Electronic Attack, either. It would make more sense to have photos of a radar display with and without jamming, or a radar antenna with ECCM related components called out, or an actual jammer. — Preceding unsigned comment added by Vanzandtj (talk • contribs) 12:51, 25 April 2019 (UTC)

No mention of counter-intelligence, encryption, hacking or espionage.
Signals intelligence is mentioned, but counter-intelligence, information policy, vetting, security clearances, control over physical access to information, internal investigation, and encryption are not, and there is no mention of hacking or traditional espionage in the signals intelligence section. MathewMunro (talk) 10:58, 28 April 2020 (UTC)