Air Sea Battle Intelligence, Surveillance, and Reconnaissance Concept of Operations: Getting Back to Fundamentals

reportActive / Technical Report | Accession Number: ADA601421 | Open PDF

Abstract:

For ten years the United States military, specifically the United States Air Force, has been employing ISR within a permissive environment against a nontraditional enemy. This mindset must be changed if the United States is to successfully employ ISR against more capable threats mainly China. With Chinas advanced IAD systems, employing ISR in a nontraditional form as well as traditional will be crucial for a successful mission. Operating in a non-permissive environment will also change how ISR assets are used and how the ISR mission is to be accomplished. Decentralized execution will be vital in this type of environment and against such advanced threat systems. JIPOE conducted well before the commencement of operations will also be necessary in order to provide the most current intelligence to the United States military for the planning and execution of missions. This paper will address these topics in order to show what role ISR will play in a conflict against China as well as how to employ ISR successfully against a technologically advanced threat system. Processing, Exploitation, and Dissemination PED will not only need to be processed quickly, but disseminated to all players across the battlefield in order for successful integration amongst the U.S. military

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution:
Approved For Public Release
Distribution Statement:
Approved For Public Release; Distribution Is Unlimited.

RECORD

Collection: TR
Identifying Numbers
Subject Terms