Electronic battle space domination: The IEWCS systems

Morgan Jr., William F.
January 1996
Military Intelligence Professional Bulletin;Jan-Mar96, Vol. 22 Issue 1, p42
Focuses on the Intelligence and Electronic Warfare Common Sensor (IEWCS) which is a grouping of subsystems developed to revolutionize the way the United States' Army targets warfare and attacks. Use of digital communications and noncommunications through super high frequency radio spectrum; Subsystems listed.


Related Articles

  • Kasserine pass and the proper application of airpower. Rife, Shawn P. // JFQ: Joint Force Quarterly;Fall99, Issue 23, p71 

    Analyzes the factors that influenced the results of the 1942 XII Air Support Command's invasion of the French Morocco and Algeria. Reasons behind the failure of the group to acquire a rapid victory; Various groups that participated in the military invasion.

  • SLOW ROLL OR FAST DASH IN IRAQ? Freedberg Jr., Sydney J. // National Journal;2/22/2003, Vol. 35 Issue 8, p600 

    Offers several military strategies for U.S. military commanders as they prepare for a possible war with Iraq as of February 2003. Phases of a military invasion plan; Role of technological advances in war; Importance of precision bombing and a coordinated ground troops movement; Significance of...

  • Airborne Walloon Dragoons. McCall, Bruce // Military History;Apr2007, Vol. 24 Issue 2, p80 

    The article provides information on a siege weapon developed by King Wally of the Walloons during the Battle of the Witts in Germany in 1406. A lumber shortage had left his army drastically short of scaling ladders, so he developed a siege weapon, catapulting a whole squad of pikemen at a time...

  • Ancient Siege Warfare (Book). Santosuosso, Antonio // American Historical Review;Oct2002, Vol. 107 Issue 4, p1269 

    Reviews the book 'Ancient Siege Warfare,' by Paul Bentley Kern.

  • Fortifications. Guilmartin, John F. // Reader's Companion to Military History;1996, p166 

    Although the first defenses built by humans to protect themselves from their enemies were surely temporary, the earliest extant archaeological evidence concerns permanent works. Permanent linear defenses also appeared in antiquity, the most famous being Hadrian's Wall and the Antonine Wall of...

  • Sieges. Parker, Geoffrey // Reader's Companion to Military History;1996, p425 

    The siege constitutes the natural pattern of fortifications, and until the advent of aerial bombardment, a fortified location could be compelled to surrender in war only by employing one of four strategies. Many places, especially those containing a large civilian population, have fallen...

  • HOW TO CAPTURE A CASTLE. Hull, Lise // MHQ: Quarterly Journal of Military History;Spring2004, Vol. 16 Issue 3, p34 

    Discusses various components of medieval warfare designed for conquering castles during the Middle Ages. Background on a fictional perception of medieval warfare; Significance of a castle-building program initiated by William the Conqueror; Purpose of the development of siegecraft for breaching...

  • TVRÐAVA GRIPE U SPLITU. PEROJEVIĆ, SNJEŽANA // Prostor;2013, Vol. 21 Issue 1, p2 

    The 17th century fortification of Split comprised the fortification of the city centre and two separate defence structures: the Bačvice Fortress in the eastern part of the city port and the Gripe Fortress situated on a hill east of the centre. The Gripe Fortress was built in five stages from...

  • Warfare and Wanton Destruction: A Reexamination of Deuteronomy 20:19-20 in Relation to Ancient Siegecraft. Wright, Jacob L. // Journal of Biblical Literature;Fall2008, Vol. 127 Issue 3, p423 

    An article is presented that discusses deuteronomic proscriptions regarding siege warfare and the justice of war. It describes how the prohibition of setting siege engines in Deuteronomy 20:19-20 was not a subversion of foreign imperial policies but the result of careful socio-ethical discussion...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics