SlideShare una empresa de Scribd logo
1 de 15
Intelligence Operations in Denied Areas
Jeff Cuddington
Undergraduate Student
Angelo State University
15 October 2014
1
Abstract
This paper recognizes that there are a number of shortcomings in the current intelligence,
surveillance, and reconnaissance field in preparing for future warfare paradigms. I intend to use
data from various journal articles, defense guidance documents, and think-tank assessments to
show that the current state cannot be effective against future adversaries. This paper will
examine: (1) the current structure of the field, how it has adapted to the post-9/11 threat, and how
the Department of Defense guidance for the future is not met by current standards, (2) the anti-
access and area denial picture from leading world nations as well as transnational terrorist groups
and reflect on how the field must meet these new challenges, (3) the resistance to change and
identify rewards of effective adaptation, (4) and upcoming technologies and practices that can
address denied environments. In all, a solution will require a new type of thinking to move
ahead, US forces to come together with each other and partner forces, and a budget that supports
the necessary change.
Introduction
Necessity is the mother of all invention and the demands of war often result in the rapid
advancement of tactics, techniques and procedures. While America’s latest decade of armed
conflict has shaped its method of warfare, the evolution that helped drive the national debt to
unprecedented heights may have occurred in too narrow a scope. The United States has clearly
made a statement that it plans to shift its attention to the Pacific, a region with a very different set
of intelligence challenges than Iraq and Afghanistan. Despite Middle East flare-ups from the
ISIS movement and others, America will continue to make political, economic, and military
strides in the Pacific. As tightening military and intelligence budgets demand using available
resources to their fullest, significant changes will have to be made in order for the United States
to support intelligence operations in future contested areas. The intelligence community must
recognize the benefits from the increased integration and synergy of the military services, but
also that the current and future adversaries of the United States have different priorities and
capabilities than recent ones, and that many of these adversaries have formidable anti-access and
area denial systems in place.
Current ISR
Intelligence, surveillance, and reconnaissance (ISR) operations are critical to United
States (US) military operations, foreign policy, and to secure the nation’s global position. ISR is
a broad discipline, part of a broader command architecture known as command, control,
communications, computers, intelligence, surveillance, and reconnaissance, or C4ISR. The US
intelligence community (IC) is headed by the Director of National Intelligence (DNI) and
currently consists of 17 agencies, both military and civilian. The IC’s responsibility is divided
into several intelligence-gathering disciplines, or “INT’s”, such as human intelligence
(HUMINT), signals intelligence (SIGINT), and geospatial intelligence (GEOINT).
The recent decade of conflict has dramatically shaped and altered the way the United
States conducts these operations. Despite the advances in ISR tactics, techniques, and
procedures, Lieutenant General (Lt. Gen.) Larry D. James, the Air Force ISR Chief claims that
the current structure is not necessarily the structure needed for the future.1 Anywhere that the US
may operate ISR in which the environment is contested will make for a complicated and tough
endeavor, unlike what has been seen in the past thirteen years. During the Global War on Terror,
1 Schanz, “ISR After Afghanistan,” 22.
2
ISR was challenged with high-demand, time-sensitive targets in supporting tactical ground units
in complex irregular warfare. Had air defenses been more robust, those operations would have
been more difficult and less successful.2
Though the concept of knowing your enemy dates back thousands of years to the
beginning of warfare itself, the new millennium of American ISR is largely reliant on airborne
technical intelligence collection; that is, using aircraft laden with sophisticated equipment for
gathering intelligence and flying within range of a target to detect the information. ISR aircraft
are generally very susceptible to interception from ground-based or airborne attack and typically
only operate in areas of aerial superiority or air supremacy. These assets, manned or unmanned,
armed or unarmed, were designed to prosecute a set of targets that are both mobile and
clandestine.3 Gathering useful, actionable information to support long-term effects requires
“persistent surveillance,” a term that refers to observing a set of targets for many hours over an
extended period of time. This work can be quite tedious and involves many man-hours of
interaction, thus much of the recent airborne ISR network relies on unmanned aerial vehicles
(UAVs) “because of their long dwell time, improved sensors, enhanced connectivity, and
precision strike capability.”4 Despite the fact that these systems were designed for use in the
open skies and thus permissive air-operations environments of Iraq and Afghanistan, technical
intelligence collection assets can also be vitally important in monitoring less-permissive rogue
states like North Korea and Iran, if employed properly.5
A glimpse of reconnaissance UAV evolution demonstrates how ISR priorities have
changed in recent years. The US military’s first modern production reconnaissance UAV was
the RQ-1 Predator. This unmanned system saw its first overseas deployment in 1995 over
Bosnia, and again in 1999 over Serbia. It originally operated solely on imagery gathering by the
use of electronic sensors to pick up the visible spectrum (termed “electro-optical” or EO) and the
infrared (IR) bands of light to provide tactical intelligence to commanders. Predators provided
near-real time (NRT) full-motion video (FMV) streamed back to a base station, which can be
viewed like live overhead television. With the experience of live intelligence behind enemy
lines, a new requirement was added: the capability to use reconnaissance aircraft to strike high-
value and mobile targets as they were identified instead of waiting for strike aircraft to arrive and
risk losing the target. Thus Hellfire missiles were added to the Predators and the aircraft became
a “multi-role” asset, re-designated as MQ-1 Predator. As the value of UAV NRT intelligence
became more in-demand, more systems were developed such as the RQ-4 Global Hawk for high
altitude EO/IR and radar imagery, and enhanced attack-capable assets like the MQ-9 Reaper.
Simultaneously, advances were being made in SIGINT and other technical collection from
airborne assets, often combining these capabilities on a single aircraft to benefit from a synergy
of “cross-cueing.” Among the advantages of using an airborne “platform” for intelligence
gathering rather than ground-based stations is being able to quickly get into enemy territory
while staying mobile and safe from attack. Coupling ISR with strike capabilities created a
“hunter-killer” concept that became an important US military capability that America evidently
intends to carry forward against future adversaries.6
2 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 35.
3 Ibid.
4 Ibid., 31.
5 Howard, Intelligence in Denied Areas, 4.
6 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 31.
3
While UAVs have played an increasing role in intelligence gathering in recent years,
there are still many manned aircraft that provide critical and crucial intelligence to military
commanders. These piloted and crewed aircraft continue to risk putting people in harm’s way
over unfriendly skies. Some manned ISR aircraft include the MC-12 Liberty which provides
multi-INT integration, the RC-135 Rivet Joint (RJ) for SIGINT collection, the E-8C Joint
Surveillance Target Attack Radar System (JSTARS) for precision radar data, and the U-2
Dragon Lady reconnaissance plane for visual imagery.7 Also to be included is “non-traditional
ISR,” which refers to the use of sensor systems such as targeting pods on manned fighter aircraft
like the F-15, F-16, and F-18 along with other attack aircraft like the AC-130 gunship.8
However, one thing that is evident from all this evolution is the assumption that the US has
control of the skies and can operate a majority of these vulnerable, sophisticated, and expensive
aircraft with little fear of being shot down or disabled.
HUMINT has always been one of the most reliable, yet often one of the most difficult
sources of intelligence. Retired Brigadier General Russell Howard of the Joint Special
Operations University (JSOU) argues that “technical intelligence methods that worked well in a
Cold War environment, such as imagery intelligence (IMINT) or signal intelligence (SIGINT),
have not proven effective against terrorists, and increased HUMINT capabilities will be crucial
in waging an effective campaign against Al Qaeda and like-minded terrorist groups.”9 This was
certainly the case in Afghanistan where unforgiving geography combined with low-tech methods
of operation by US adversaries severely limited the usefulness of highly technical intelligence
gathering. In response, HUMINT took a renewed front-seat in the intelligence-gathering arena.
During the Cold War, access beyond the “curtains” was particularly difficult for HUMINT
gatherers, and to overcome these difficulties the US IC developed more technical means.10 This
technical reliance proved so useful that much of the United States’ effort shifted away from
HUMINT, a discipline that requires a long lead-time and highly specialized training for effective
operation.
Howard noted that the United States has continued to rely in large part on the same Cold
War paradigm of remote technical collection, appropriate for the Soviet Union, but that
transnational terrorist groups are much more ambiguous and harder to detect.11 The primary
issue in Afghanistan regarding technical intelligence collection is that the visible and electronic
signature of terrorists is much smaller and harder to detect than that of the former Soviet Union
or any other state.12 Furthermore, Howard makes a very important distinction between
HUMINT and technical intelligence in identifying that, “technical collection assets do little to
penetrate denied minds.”13 Imagery intelligence is typically limited to detecting things after they
have moved; signals intelligence can detect things as they are happening; communications
intelligence can intercept orders and dialogs; but effective human intelligence can get into the
decision–making process and detect intentions before they happen, or even alter the course of
decisions. Afghanistan showed that relying too much on technical intelligence creates an
exploitable gap that the many terror organizations in the Afghanistan-Pakistan region benefitted
from. Likewise, a future shift to the Pacific Rim or a conflict with another developed state like
7 Ibid., 32.
8 Ibid.
9 Howard, Intelligence in Denied Areas, 1.
10 Ibid., 2.
11 Ibid., 3.
12 Ibid.
13 Ibid.
4
Iran will highlight another gap in current US intelligence collection: the vulnerability of
intelligence operations in denied areas. US assets may not be able to fly through or near the
borders of aggressive countries like Russia, China, North Korea, and Iran. The airborne
intelligence fleet will be effectively grounded and the lack of recent HUMINT focus only serves
to magnify the intelligence “blinding.” Yet despite the advantages and drawbacks of disciplines
in different contexts, Lt. Gen. James paves a positive way to the future with “[the US is] not one
‘INT’ focused… Our teams utilize all these domains to create information.”14
With the US withdrawal from Iraq and Afghanistan all but complete, there is an expected
dramatic shift in upcoming ISR guidance. In the latest guidance from the US Department of
Defense (DoD) “Sustaining US Global Leadership: Priorities for 21st Century Defense,” or
known simply as the 2012 Defense Strategic Guidance, the DoD stated that “while the US
military will continue to contribute to security globally, we will of necessity rebalance toward
the Asia-Pacific region.”15 Despite other conflicts that arise, it is the stated intention of the
highest authority of the United States to rebalance to the Pacific region; contemporary Middle
Eastern affairs only delay the intended momentum. Despite or perhaps because of the continual
distraction in the Persian Gulf and Levant, the US must continue to evaluate other global threats
and not solely focus on a single form of combat. The 2012 Defense Strategic Guidance goes on
to state that the force of the near future will have to respond less to the permissive environment
of Afghanistan and more to countries sheltered behind formidable anti-access, area-denial
systems.16 In a symposium address by US Air Force (USAF) Secretary Michael B. Donley, he
stated that the Air Force is rebalancing its priorities to how they might have stood had events like
9/11 not intervened.17 Stacie L. Pettyjohn, a RAND political scientist described global USAF
presence as “largely stable in regions where key interests and allies are located. However, it’s
worth noting that large Cold War-style garrisons overseas—such as those in Germany and
Japan—are ‘anathema’ to many new and prospective partners, who often want lighter, more
rotational presence.”18 The priorities declared in the 2012 Defense Strategic Guidance include
requirements in stark contrast to present US ISR capabilities, and further warns that adversaries
in these denied access areas will present difficult obstacles to US military intervention.19
Anti-Access, Area Denial (A2/AD)
As the US foreign focus shifts from a region where there has been a general freedom of
access for intelligence gathering assets, leaders must consider that many regions containing near-
future threats do not grant US forces the permissive access that they have become accustomed to.
Developed nations like Russia, China, North Korea, and Iran are among the locations that the
military and State Department once again consider to be top threats. These potential threats
simply will not allow foreign powers like the US to have complete freedom of movement and
will actively work against attempted US intelligence operations.
Simply put, the act of an adversary to work against the actions of another defines what
anti-access or area denial environments are. More formally, the US DoD Joint Operational
Access Concept (JOAC) defines these terms: “Anti-access (A2) refers to those actions and
14 Schanz, “ISR After Afghanistan,” 23.
15 USDoD, “Sustaining US Global Leadership,” 2.
16 Schanz, “ISR After Afghanistan,” 23.
17 Ibid., 24.
18 Ibid., 26.
19 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 36.
5
capabilities, usually long-range, designed to prevent an opposing force from entering an
operational area. Area denial (AD) refers to those actions and capabilities, usually of shorter
range, designed not to keep an opposing force out, but to limit its freedom of action within the
operational area.”20 This continues to be an ongoing concern for leaders as the 2014 “National
Intelligence Strategy of the United States of America” lists among its major objectives that the
IC will have to develop strategies to operate in denied areas.21 According to the “Air-Sea Battle”
concept, the general US solution to the A2/AD issue is to develop a network of integrated forces
capable of defeating the enemy across all modern warfighting domains: air, sea, land, space, and
cyberspace.22 This concept recognizes that adversary forces will likely attack without warning
and forward friendly forces will be in the A2/AD environment from the outset of hostilities
where they must provide an immediate and effective response.
While this reflects one view of future complications, A2/AD can be defined in other
ways. Howard defines these denied areas as, “regions whose nations are characterized by weak
state structures.”23 While Howard approaches A2/AD from a HUMINT standpoint, his
definition does not necessarily apply to much of the Middle East in a general intelligence
perspective, a region characterized by many countries with weak state structure but for the most
part presenting little A2/AD against the United States.
Regardless, any state operating effective A2/AD could severely hinder US operations in
that area, or even deter the US and coalition partners from responding to aggression in the first
place.24 The Center for Strategic and Budgetary Assessments (CSBA) goes further with this
reasoning suggesting that America may be the cause of its own A2/AD problems, stemming
from United States’ worldwide power projection and military preeminence.25 This suggests that
there may be issues inherent in Unites States foreign policy or other national ideals. Conversely,
some may argue that the “big brother” image of America forces some nations to make significant
expenditures in deterrence or self-defense, instead of possibly more offensive actions. America’s
current foreign policy program is in some ways creating more problems than it is solving. An
aggressive and intrusive foreign policy creates more barriers and friction among other nations,
seeds more conflict, and translates to increased difficulty, risk, and casualties when conflicts do
erupt.
It is important to be aware that not all of the current, emerging, and evolving threats are
alike—while developed and modern nation-states have returned to the forefront of attention,
there will continue to be the threat of transnational terrorism. Developed countries such as
Russia, China, Iran, and North Korea have considerable access to advanced missile and satellite
technology permitting even regional rogue states the ability to pre-target US forward bases
abroad and monitor deployment activity.26 By contrast, transnational terrorist cells like al-
Qaeda, Taliban, and Abu Sayyaf often operate beyond political borders, blend in with the local
populations, and maintain a low visibility. As such, this category of threats requires a very
different approach than with nation-states.
China is one of the most significant A2/AD threats at this time. China not only deters the
United States from deploying into the Western Pacific, but also threatens to disrupt nearby
20 USDoD, “Joint Operational Access Concept,” i.
21 Office of the Director of National Intelligence, “The National Intelligence Strategy”, 8.
22 USDoD, “Air-Sea Battle,” 4.
23 Howard, Intelligence in Denied Areas, 2.
24 Krepinevich, Watts,and Work, Meeting the Anti-Access and Area-Denial Challenge,4.
25 Ibid., 93.
26 Ibid., 1.
6
operations such as around Taiwan or the South China Sea.27 While US advanced fighters and
bombers have inherent advantages against China’s defenses, these aircraft are not immune and
are very limited in availability. A majority of American fighters, bombers, reconnaissance
aircraft, and cruise missiles remain extremely vulnerable. China’s integrated air defense system
is virtually impossible to penetrate with current US fourth-generation aircraft.28 Furthermore,
China is expected to increase its threat range with the development of the S-400 missile system,
extending their air defense coverage out to over 200 nautical miles.29 In 2007, China also
demonstrated its ability to target and shoot down orbital satellites when it shot down one of its
own. This capability could be easily carried out against US satellites in a conflict, severely
degrading the US view into the Chinese interior. The side that can better collect, transmit, and
exploit information while denying their enemy the same will be the victor in war, a term called
“information dominance,” something that China has demonstrated they are well aware of.30
While their strategic and operational concepts are of concern, China’s tactical dimension focuses
on destroying or damaging American capabilities with an array of missiles and submarines.31
Staying out of China’s missile envelope brings questions to the effectiveness of the upcoming
F-35 with its relatively short range. Clearly, the Chinese position is one of exclusion and intent
on keeping America or other adversaries away with formidable A2/AD.
Iran has a dangerous influence over one of the most important commercial chokepoints in
the world: the Straits of Hormuz. Iran also has a significant modern military capability and
robust A2/AD network. Should all-out conflict occur with Iran, the United States may have no
close-in bases to operate fighters from, an important first step in modern warfare.32 It could be
presumed that in a conflict with Iran, access to the Persian Gulf would be denied and Iran would
pressure its neighbors to deny US access. Launching from an airbase in Turkey or a carrier in
the Arabian Sea, our closest guaranteed large-scale basing opportunities, provides only partial
coverage into Iran. Iran also has a significant defensive advantage which will require detailed
intelligence to counter. While their command infrastructure prevents it from combining its air
defense systems into a truly integrated network, Iran’s A2/AD capabilities and strategies are
considered to be similar to China’s and thus produce a significant threat to all US ISR attempts.33
Non-state actors, such as transnational terrorist organizations, can also pose a threat.
Ballistic missile systems and advanced stealth fighters are not the only ways to deter enemies.
The cyberspace domain has become a major front in modern warfare and requires very little
technology to be devastating. Cyber-information warfare, distributed denial of service attacks,
malicious software, and financial or resource manipulation are only some of the effects that can
severely impair a fighting force. Electro-magnetic pulse weapons can be cheaply made and be
just as devastating to a modern force as the inexpensive and low-tech explosive-formed
penetrators that punched through armored trucks in Iraq. High-power scramblers that disrupt
global positioning systems can make UAV guidance ineffective and reduce accuracy of smart-
weapons. Man-portable air defense systems are proliferated throughout the world and night-
vision optics of increasing capability are reaching the consumer markets. The A2/AD issue is
not limited to top-tier nations, and unconventional tactics will have to be considered as well.
27 McCarthy, “Anti-Access/Area Denial,” 3.
28 Ibid., 4.
29 Ibid.
30 Cheng, “Countering China’s A2/AD Challenge.”
31 Ibid.
32 Gunzinger and Dougherty, Outside-In, 18.
33 Ibid., 44.
7
A2/AD creates a new set of intelligence priorities different than what has been faced in
the last decade. Future A2/AD priorities require some new considerations. According to a
CSBA analyst, a “blinding campaign” or “scouting battle” will be the first and most important
military move in an A2/AD confrontation.34 A significant change is that ISR assets, or
“platforms” as they are often called, must adapt their sensing capability toward detecting A2/AD
forces and networks in order to survive in these environments.35 Additionally, according to two
prestigious defense consultants, Robert Haffa and Anand Datla, “the requirement for high-
definition FMV with its attendant bandwidth, considered so important over the last decade, may
take a backseat to large, strategic UAVs with long-range radar, SIGINT, and EO/IR sensors and
multifunction radio-frequency sensor payloads.”36 Near the beginning of the Iraq and
Afghanistan wars, the US was fielding as few as four UAV “orbits” in theater; in the years that
followed, this peaked to over 60 UAV orbits. The high demand of these types of assets also
created a high demand of bandwidth to transmit and process the data gathered. The centralized
authority employed in this type of intelligence gathering for the US “processes more than 1.3
petabytes of data a month—equivalent to 1,000 hours a day of full-motion video—and better
sensor technology will only add to these figures.”37 Data management and movement are vital to
operations where control of air, sea, and space is contested, according to USAF leaders.38
In addition to traditional ISR aircraft, America’s most modern fighter aircraft, the F-22
and F-35, will also have to assume ISR roles well beyond the non-traditional role.39 Older
fighter and attack aircraft operators learned the value of using targeting pods for ISR, a process
called non-traditional ISR (NTISR). In the development of the newest generation of aircraft, ISR
requirements were included in the capabilities of these multi-role aircraft, with ISR collection
being a dedicated role rather than an ancillary or additional one. To continue to be able to
outthink our adversaries, operators will have to push these new capabilities well beyond the old
NTISR tactics, techniques and procedures into new realms to defeat and circumvent various
A2/AD systems.
Airborne platforms are not the only way to move ISR assets over enemy territory quickly
and safely. Space-based systems have been in use by the United States for over half a century.
The Corona program began in 1959 and since then the US has deployed vast constellations of
reconnaissance satellites into orbit. While satellite reconnaissance was considered critical during
the Cold War, it has not been considered as much a major player in recent years in the pursuit of
high-value, mobile, tactical targets. However, space-based radar and IR collection will prove to
be particularly significant for defeating A2/AD.40 Similar to the airborne fleet of ISR, satellite
sensors and platforms require robust space-based communication networks and bandwidth in
order to provide essential ISR integration.41 All of these different airborne and orbital assets are
operated under different command structures within the IC: military service commands, civilian
agencies like the Central Intelligence Agency, National Security Agency, National
Reconnaissance Office, and National Geospatial-Intelligence Agency, and other contracted,
partnered, or multinational forces. Whether using UAVs, manned aircraft, or orbital satellites, in
34 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 37.
35 Ibid., 40.
36 Ibid.
37 Schanz, “ISR After Afghanistan,” 24.
38 Ibid., 25.
39 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 41.
40 Ibid.
41 Ibid., 43.
8
working against A2/AD, the United States “must pay greater attention not only to joint
interoperability in the processing, exploitation, and dissemination (PED) process but also to their
security.”42
With all these new priorities, it is reasonable to ask how the current US systems measure
up to new requirements. In an A2/AD environment, quickly projecting military power may
hinge on the fighting forces’ ability to eliminate A2 and AD systems in the span of a few hours
or days. There are considerable risks in doing so, particularly in the absence of long-range,
penetrating surveillance.43 High-altitude, long-endurance UAVs will play a role, but depending
on the enemy’s airstrike and air-defense capability, will have to be operated carefully and be
equipped with self-defense capabilities.44 The purpose-built ISR capabilities of the F-22 and F-
35, combined with their low observability, could make them primary ISR collectors in contested
airspace.45 Despite the changing environment, Lt. Gen. James said that the USAF’s force
structure for ISR will not see significant change in the near term, and many of the assets used in
US Central Command (Middle East region) will also see a great deal of use in the Asia-Pacific
region.46 This ignores or glosses over the fact that the joint force has yet to come to grips with
the challenges and range of possible options to employ ISR platforms in contested airspace.47
Facing Resistance to Change
While some elements can continue to operate in the new environment, other elements
will face inherent hurdles. Many of the current US systems and their architectures face some
limitations in denied-area operations. As the robust ISR network of today took shape, much of
the command and control of assets became “stovepiped” from the ISR asset, or “platform,” to the
specific user.48 This has severely hampered joint connectivity and interoperability toward a
unified effort. Nonetheless, according to Lt. Gen. James, “connectivity lies at the core of
USAF’s global ISR superiority. It is important to remember fielding an asset is far different than
networking one—and this capability sets the USAF apart from the rest of the world.”49 Yet in
the end, and strikingly, the US IC response to the A2/AD challenge lacks a truly joint
approach.50 Fortunately, some systems are less affected than others such as the fifth-generation
fighter aircraft, specifically the F-22 and F-35. The key will be figuring out how to best use
these platforms’ ISR capabilities to their fullest since they will initially be the only assets able to
fly in contested space.51
Politics will also play a significant role alongside the A2/AD issue. The United States
must continue to be prepared to utilize host-nation and partner force facilities, as it is not
possible to maintain a garrison in every corner of the globe.52 The US must be prepared for the
political consequences of these dealings, such as when in 2009 the Kyrgyzstan Parliament tripled
the rent for use of its base, a major transit hub for US forces in and out of Afghanistan, or the
42 Ibid., 42.
43 Krepinevich, Watts,and Work, Meeting the Anti-Access and Area-Denial Challenge,iii.
44 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 39.
45 Ibid.
46 Schanz, “ISR After Afghanistan,” 24.
47 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 29.
48 Ibid., 34.
49 Schanz, “ISR After Afghanistan,” 27.
50 Krepinevich, Watts,and Work, Meeting the Anti-Access and Area-Denial Challenge,iii.
51 Schanz, “ISR After Afghanistan” 26.
52 Krepinevich, Watts,and Work, Meeting the Anti-Access and Area-Denial Challenge,2.
9
many cases in which countries have refused basing rights or not allowed American aircraft at
bases to fly in certain operations. Budget cutbacks, sequestration, and personnel cutbacks have
further complicated matters. The 2011 Budget Control Act and resulting sequestration
threatened to slash hundreds of billions of dollars from future Department of Defense budgets
and make the strategic guidance nearly unworkable, yet there must continue to be some
consideration for the development of future systems.53 In fact, ISR platforms of the future will
need all of the characteristics that have proven effective over the last decade with one significant
additional requirement: survivability in hostile airspace.54 In developing new systems, there are
the issues of new budget requirements, time requirements to develop, test, and field the systems,
and training time for crews to use the system. In the shift of ISR priorities, there must also be a
consideration of retraining existing personnel for the new requirements of current systems as
well as the addition or reduction of manning to support these changes.
The United States’ declared shift to rebalance to the Asia-Pacific region, as mentioned in
the 2012 Defense Strategic Guidance, has not been without hurdles. While the DoD document
identifies the importance of the region’s stability for trade and economy as well as supporting US
interests in the region, the Obama administration has been criticized for letting focus on the
Pacific slip in lieu of Middle Eastern concerns. International disputes in Ukraine and Crimea as
well as the ISIS movement in Iraq and Syria have diverted American attention away from the
Pacific. In March of 2013, National Security Advisor Tom Donilon described the strategic pivot
as a rebalance of the projection and focus of US power. Further, that all elements of US power,
military, political, trade and investment, development and values, will be harnessed in the shift.
He continued that sixty percent of the US naval fleet will be based in the Pacific by 2020, and the
focus will shift to submarines, fifth-generation fighter jets, and reconnaissance platforms.
Donlion did acknowledge that difficult fiscal times have made some question the sustainability
of the rebalance.55
President Obama commented in May of 2014 that other issues of the Pacific need to be
resolved first. He stated, “We can’t try to resolve problems in the South China Sea when we
have refused to make sure that the Law of the Sea Convention is ratified by the United States
Senate”.56 Others still question the power-balancing involved in the shift of naval assets. With
cuts in defense budgeting, some argue that the rebalance may mean only shrinking in the Atlantic
while not growing in the Pacific.57 As the US shift to the Pacific continues to stall, Russia has
seized the initiative and made its own pivot by signing a $400 billion deal with China.58
Still, the “whole-of-government” approach to rebalancing likely will not diminish despite
months of airstrikes in Iraq and Syria, defense experts say. These experts do express some
concern as to whether or not the new US commitment in the Middle East will stunt the military
rebalance.59 Iraq and Ukraine aside, the United States is still projecting national power into the
Pacific region economically, diplomatically, and militarily, and US investments will need to be
protected by preparing for conflict contingencies.60 The United States must recognize and plan
53 Schanz, “ISR After Afghanistan,” 24.
54 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 38.
55 Lyle, “National Security Advisor Explains Asia-Pacific Pivot.”
56 Avni, “Obama’s Incredible Shrinking Pacific Pivot.”
57 Ibid.
58 Ibid.
59 Olson, “Mideast Flare-Up, Budget Cuts Could Affect Pacific Pivot.”
60 Ibid.
10
for the challenges that may be faced against dominant powers in the Asia-Pacific region,
including increased future intelligence operations.
Rewards of Adaptation
There are several benefits to finding the best method of transition. By appropriately
identifying requirements and the best support for those requirements, significant expenditures
can be saved. For instance, using current systems that can fill requirements before specialized
systems are developed can facilitate rapid transition. When reconnaissance aircraft were unable
to fly certain missions due to unavailability or hostile threat, NTISR was developed to fill the
gap. The evolution of the Predator from a single-INT collector, to an attack-capable platform, to
a multi-INT, multirole system makes the most of an available asset while recognizing the
synergy of cross-cueing and joint intelligence efforts. American adversaries are constantly
developing new tactics and technologies to defeat US systems. The budget-constrained United
States cannot expect to be competitive without making advances, and priority must be given to
selecting the right systems to develop which will defend America’s primary interests from likely
threats. Leaders must also continue to break down “stovepipes” in order to foster a more joint
atmosphere, sharing in the abilities and information across the services and community. Single-
purpose systems are not cost effective, and by building on the synergy of crossing service
boundaries, current systems can be dramatically more effective. Whether using an existing
system, augmenting a current one, or developing a new one to fill a gap, knowing what to plan
for can maximize the effect of ISR operations.
The Way Ahead
Experts have already offered a number of solutions, courses of action, and alternatives.
One advisor stated that, “we need to fundamentally change ISR so we never look at a single
sensor again; we look at how it contributes to all other sensors.”61 Lt. Gen. James agrees that the
Air Force “must find a way to bring unconventional and open source assets into its ISR
enterprise.”62 In dealing with areas in which access is not permitted, the US will have to
improve operations from standoff distances, such as U-2s flying outside the range of ground-
based surface-to-air missiles and other threats.63 Aside from technical collection, a
reexamination of HUMINT collection can also be performed. Howard proposes several
alternatives in gathering HUMINT information such as using criminals and criminal cartels, or
using non-governmental organizations in cooperation with intelligence services for mutually
beneficial reasons.64 An important point made by the CSBA is that “a joint approach to the
prospective A2 and AD capabilities of future US adversaries is crucial if the various risks are to
be mitigated or hedged against to any serious degree.”65
There are numerous projects underway to push the edge of ISR collection. One project
that is already in service to attempt to defeat A2/AD is the RQ-170 Sentinel. This is a stealth
UAV operated by the Central Intelligence Agency designed to penetrate enemy detection
systems and is assumed to be fitted with reconnaissance equipment. However, even this system
is not without vulnerabilities: in 2011 while flying over Iran, an RQ-170 was downed and
61 Schanz, “ISR After Afghanistan,” 25.
62 Ibid.
63 Ibid., 26.
64 Howard, Intelligence in Denied Areas, 5.
65 Krepinevich, Watts,and Work, Meeting the Anti-Access and Area-Denial Challenge,iv.
11
captured by Iran. Other systems in development include the Unmanned Carrier-Launched
Airborne Surveillance and Strike (UCLASS) system. This project is designed to provide a strike-
capable remotely-piloted vehicle to the navy. The X-47B has shown promise to fill this role and
testing and development continue to push closer to implementation. Other developments in
reconnaissance include pushing the edge of high-altitude long-endurance unmanned aircraft.
Boeing has been developing the Phantom Eye capable of staying aloft over 100 hours at altitudes
up 65,000 feet, and plans to develop further versions to remain airborne up to a week while
carrying payloads of up to 2,000 pounds.66 Another impressive development is the QinetiQ
Zephyr, though relatively small and not capable of carrying weapons, it has the endurance record
of 336 hours (14 days) and capable of flying over 70,000 feet.67 Other developments include the
SR-72 hypersonic strategic reconnaissance aircraft. The SR-72 is a proposed successor to the
SR-71 Blackbird and is intended to be an optionally-piloted aircraft designed to fill the ISR gap
between surveillance satellites, subsonic manned aircraft, and UAVs.
While the F-22 and F-35 can assume roles of ISR and may be able to defeat some A2/AD
systems, budget reduction has severely limited the availability of these aircraft. The last
production F-22 was delivered in 2012 capping the fleet to only 187 operational aircraft.
Additionally, The F-35 continues to be plagued with development problems and extreme cost
overruns. It is expected to begin operational status between 2016 and 2018 for the United States.
The US has stated it plans to build a fleet of 2,443 aircraft; however delivery of this massive
number to the US military is scheduled to take until 2037. Progressive budget cutbacks could
certainly see the final number of F-35s reduced similar to how F-22s were cut from an initial
vision of 750 aircraft to a meager 187. Certainly more systems are under development or
perhaps already in service and kept secret from public eye. It is crucial that development in
technology and tactics continue in order to find a necessary breakthrough to change the course of
ISR, and more importantly funding needs to continue to make the research possible.
Lastly, not everything has to be done on the backs and by the dollars of Americans. The
US can reach out to partner forces and allies for support. Several countries have proven quite
capable in acquiring and assessing intelligence. Australia has an impressive HUMINT network
that has been in operation for years and can fill the gap that the United State has been neglecting.
In the Pacific region, Japan has a very capable force and prime operating location for the Asia-
Pacific region. Israel has a very effective and rapid weapons development plan that can be
utilized. Other countries are very skilled at specific types of warfare as well. The US should
look more into integrating partner force technologies and systems into our own to reduce the
burden and cost of development. Secretary of the Air Force Michael Donley noted that
“cooperation activities with Australia and Japan are vital to maintaining USAF global vigilance.”
These countries and other allies abroad in Europe, Asia, and even Africa and the Americas can
certainly ease the burden on the United States for future overseas operations.
Conclusion
In order for the United States to secure its global position, ISR must continue to adapt to
the changing political climate. US leadership has signaled for a change in focus away from the
Middle East and towards the Pacific region. While Middle East conflicts and budget cutbacks
are delaying and limiting the rebalancing, America must secure important political and economic
interests in the Asia-Pacific region. This will require a re-examination of how intelligence
66 Botwick, “High Altitude Long Endurance Aircraft Configurations,” 4.
67 Ibid., 2.
12
operations are conducted as adversaries in this region have robust A2/AD networks and pose a
different threat than Iraq and Afghanistan. The possibility of armed conflict with major states
such as Russia, China, or North Korea must be considered; one must not get trapped into mirror-
imaging, thinking one’s adversary will act the same as himself. As some now consider China to
be an unlikely real threat, the Kennedy administration considered Cuba to be impossible. Failing
to plan for unexpected variations nearly led to worldwide disaster during the Cuban Missile
Crisis in 1962.
Throughout history, there have been points where the character of warfare had to make
significant changes. During the American Revolution, land war made a dramatic shift from the
Napoleonic-style to what would become the basis of modern land strategy. The idea of marching
dense masses across open battlefields blindly shooting each other in a war of attrition evolved
into guerrilla-style tactics and asymmetric skirmish warfare. In World War I, the introduction of
the airplane forever changed the operation of war. Initially a reconnaissance vehicle, the airplane
was repurposed as a bomber and after years of development the new air strategy became a major
element of warfare. In World War II, the battleship evolved to be the capital ship and naval
warfare shifted dramatically to adapt to its capabilities. All these domains are constantly
reaching boundaries and breaking through them in unexpected ways. For example, land war
evolved again after World War I as technology and strategy made major breakthroughs with the
machine gun and tanks. US naval warfare shifted its capital fleet from battleships to aircraft
carrier groups and in the future submarines are expected to lead the fleet. Intelligence warfare
has now reached a similar critical inflection point: Operations and counter-operations have
evolved to a point where a new type of thinking will be required to overcome the current
barriers. While significant advances have been made in recent years, the threats of the future
may pose a dramatically different challenge. The intelligence community must work together to
find new solutions to novel situations, to make the most of the current systems, and allowances
in the budget must be made to develop future systems to meet the coming threats.
13
References
Avni, Benny. "Obama's Incredible Shrinking Pacific Pivot." NYPost.com. June 1, 2014.
http://nypost.com/2014/06/01/obamas-incredible-shrinking-pacific-pivot/ (accessed
October 15, 2014).
Botwick, Aaron F. "High Altitude Long Endurance Aircraft Configurations." Academia.edu. n.d.
http://www.academia.edu/6632990/High_Altitude_Long_Endurance_UAV_Configuratio
ns (accessed October 15, 2014).
Cheng, Dean. "Countering China's A2/AD Challenge." The National Interest, September 20,
2013.
Gunzinger, Mark, and Chris Dougherty. Outside-In: Operating from Range to Defeat Iran's Anti-
Access and Area-Denial Threats. Washington, D.C.: Center for Strategic and Budgetary
Assessments, 2011.
Haffa, Robert P, and Anand Datla. "Joint Intelligence, Surveillance and Reconnaissance in
Contested Airspace." Air & Space Power Journal, May-June 2014: 29-47.
Howard, Russell D. Intelligence in Denied Areas: New Concepts for a Changing Security
Environment. Hurlburt Field, Florida: Joint Special Operations University Report 07-10,
2007.
Krepinevich, Andrew, Barry Watts, and Robert Work. Meeting the Anti-Access and Area-Denial
Challenge. Washington, D.C.: Center for Strategic and Budgetary Assessments, 2003.
Lyle, Amaani. "National Security Advisor Explains Asia-Pacific Pivot." Defense.gov. March 12,
2013. http://www.defense.gov/News/newsarticle.aspx?ID=119505 (accessed October 15,
2014).
McCarthy, Christopher J. (Maj, USAF). "Anti-Access/Area Denial: The Evolution of Modern
Warfare." United States Naval War College: Lucent - A Journal of National Security
Studies, 2010.
Office of the Director of National Intelligence. "The National Intelligence Strategy of the United
States of America." 2014.
Olson, Wyatt. "Mideast Flare-up, Budget Cuts Could Affect Pacific Pivot." Stars and Stripes.
September 22, 2014. http://www.stripes.com/news/pacific/mideast-flare-up-budget-cuts-
could-affect-pacific-pivot-1.304295 (accessed October 15, 2014).
Schanz, Marc V. "ISR after Afghanistan." Air Force Magazine: The Online Journal of the Air
Force Association, January 2013: 22-27.
United States Department of Defense. "Air-Sea Battle: Service Collaboration to Address Anti-
Access & Area Denial Challenge." 2013.
14
—. "Joint Operational Access Concept (JOAC)." Washington DC, 2012.
—. "Sustaining U.S. Global Leadership: Priorities for the 21st Century Defense." Washington
DC, 2012.

Más contenido relacionado

La actualidad más candente

The Future Of Unmanned Air Systems (2 May2011)
The Future Of Unmanned Air Systems (2 May2011)The Future Of Unmanned Air Systems (2 May2011)
The Future Of Unmanned Air Systems (2 May2011)Mark Tempestilli
 
UAE's C4ISR Transformation
UAE's C4ISR TransformationUAE's C4ISR Transformation
UAE's C4ISR TransformationMatthew Hedges
 
bft-afghanistan-and-iraq-exper
bft-afghanistan-and-iraq-experbft-afghanistan-and-iraq-exper
bft-afghanistan-and-iraq-experKevin Parrish
 
Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...Vic Artiga
 
Ncw, c4 isr, io and rma paper
Ncw, c4 isr, io and rma paperNcw, c4 isr, io and rma paper
Ncw, c4 isr, io and rma paperAria Sudarman
 
The Application of Photographic Aerial Reconnaissance to Military Operations ...
The Application of Photographic Aerial Reconnaissance to Military Operations ...The Application of Photographic Aerial Reconnaissance to Military Operations ...
The Application of Photographic Aerial Reconnaissance to Military Operations ...Nikki Parsons
 
unmanned aerial vehicle (UAV)
unmanned aerial vehicle (UAV)unmanned aerial vehicle (UAV)
unmanned aerial vehicle (UAV)UDIT PATEL
 
DRONE WARFARE AND THE LAW OF ARMED CONFLICT
DRONE WARFARE AND THE LAW OF ARMED CONFLICTDRONE WARFARE AND THE LAW OF ARMED CONFLICT
DRONE WARFARE AND THE LAW OF ARMED CONFLICTAngelo State University
 
Regulatory reforms for civil applications of UAVs
Regulatory reforms for civil applications of UAVsRegulatory reforms for civil applications of UAVs
Regulatory reforms for civil applications of UAVsSireesh Pallikonda
 

La actualidad más candente (19)

10. Scope Of UAV In USA
10. Scope Of UAV In USA10. Scope Of UAV In USA
10. Scope Of UAV In USA
 
The Future Of Unmanned Air Systems (2 May2011)
The Future Of Unmanned Air Systems (2 May2011)The Future Of Unmanned Air Systems (2 May2011)
The Future Of Unmanned Air Systems (2 May2011)
 
final pppt
final ppptfinal pppt
final pppt
 
UAE's C4ISR Transformation
UAE's C4ISR TransformationUAE's C4ISR Transformation
UAE's C4ISR Transformation
 
bft-afghanistan-and-iraq-exper
bft-afghanistan-and-iraq-experbft-afghanistan-and-iraq-exper
bft-afghanistan-and-iraq-exper
 
Group1
Group1Group1
Group1
 
Air power essay
Air power essay Air power essay
Air power essay
 
Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...
 
Ncw, c4 isr, io and rma paper
Ncw, c4 isr, io and rma paperNcw, c4 isr, io and rma paper
Ncw, c4 isr, io and rma paper
 
The Application of Photographic Aerial Reconnaissance to Military Operations ...
The Application of Photographic Aerial Reconnaissance to Military Operations ...The Application of Photographic Aerial Reconnaissance to Military Operations ...
The Application of Photographic Aerial Reconnaissance to Military Operations ...
 
0822b
0822b0822b
0822b
 
Proceedings Article
Proceedings ArticleProceedings Article
Proceedings Article
 
unmanned aerial vehicle (UAV)
unmanned aerial vehicle (UAV)unmanned aerial vehicle (UAV)
unmanned aerial vehicle (UAV)
 
Gov Vision for 2020
Gov Vision for 2020Gov Vision for 2020
Gov Vision for 2020
 
DRONE WARFARE AND THE LAW OF ARMED CONFLICT
DRONE WARFARE AND THE LAW OF ARMED CONFLICTDRONE WARFARE AND THE LAW OF ARMED CONFLICT
DRONE WARFARE AND THE LAW OF ARMED CONFLICT
 
UAV Types and Applications
UAV Types and ApplicationsUAV Types and Applications
UAV Types and Applications
 
Regulatory reforms for civil applications of UAVs
Regulatory reforms for civil applications of UAVsRegulatory reforms for civil applications of UAVs
Regulatory reforms for civil applications of UAVs
 
Dean R Berry Pro and Con Drones
Dean R Berry Pro and Con DronesDean R Berry Pro and Con Drones
Dean R Berry Pro and Con Drones
 
Jds 2 1_gskhurana
Jds 2 1_gskhuranaJds 2 1_gskhurana
Jds 2 1_gskhurana
 

Destacado

SatisfaccióN Al Cliente Y MedicióN De La Calidad
SatisfaccióN Al Cliente Y MedicióN De La CalidadSatisfaccióN Al Cliente Y MedicióN De La Calidad
SatisfaccióN Al Cliente Y MedicióN De La CalidadAndrés Medel Prieto
 
2 derechos y deberes de empleadores y empleados
2 derechos y deberes de empleadores y empleados2 derechos y deberes de empleadores y empleados
2 derechos y deberes de empleadores y empleadosHugo Humberto Heredia
 
Among The Hidden
Among The HiddenAmong The Hidden
Among The HiddenFloresYMS
 
ICEA July 2014 1st Published Work
ICEA July 2014 1st Published WorkICEA July 2014 1st Published Work
ICEA July 2014 1st Published WorkChristina Dixon
 
Cadenas de markov
Cadenas de markovCadenas de markov
Cadenas de markovPoro Punk
 
Modeling Requirements with SysML
Modeling Requirements with SysML Modeling Requirements with SysML
Modeling Requirements with SysML Daniel Brookshier
 
Function of management leadership
Function of management   leadershipFunction of management   leadership
Function of management leadershipSthefanie Parera
 
Newly Diagnosed Dementia Family Support Seminar
Newly Diagnosed Dementia Family Support Seminar Newly Diagnosed Dementia Family Support Seminar
Newly Diagnosed Dementia Family Support Seminar Amanda Kanners
 
9675960 diccionario-competencias-laborales-martha-alles
9675960 diccionario-competencias-laborales-martha-alles9675960 diccionario-competencias-laborales-martha-alles
9675960 diccionario-competencias-laborales-martha-allesEduardo Leon
 
BUENAS PRÁCTICAS PARA EL ANÁLISIS DELICTUAL EN AMÉRICA LATINA
BUENAS PRÁCTICAS PARA EL ANÁLISIS DELICTUAL EN AMÉRICA LATINABUENAS PRÁCTICAS PARA EL ANÁLISIS DELICTUAL EN AMÉRICA LATINA
BUENAS PRÁCTICAS PARA EL ANÁLISIS DELICTUAL EN AMÉRICA LATINAMotorola Solutions LatAm
 
Unidad 3. toma de decisiones y solución
Unidad 3. toma de decisiones y soluciónUnidad 3. toma de decisiones y solución
Unidad 3. toma de decisiones y soluciónLinda De la Barrera
 
Contabilidad (Activo Circulante y No Circulante)
Contabilidad (Activo Circulante y No Circulante)Contabilidad (Activo Circulante y No Circulante)
Contabilidad (Activo Circulante y No Circulante)Henry Salom
 
Unidad 3 La Recta Y Su Ecuacion Cartesiana
Unidad 3 La Recta Y Su Ecuacion CartesianaUnidad 3 La Recta Y Su Ecuacion Cartesiana
Unidad 3 La Recta Y Su Ecuacion Cartesianabrekaluga4
 

Destacado (20)

SatisfaccióN Al Cliente Y MedicióN De La Calidad
SatisfaccióN Al Cliente Y MedicióN De La CalidadSatisfaccióN Al Cliente Y MedicióN De La Calidad
SatisfaccióN Al Cliente Y MedicióN De La Calidad
 
Frida kahlo
Frida kahloFrida kahlo
Frida kahlo
 
2 derechos y deberes de empleadores y empleados
2 derechos y deberes de empleadores y empleados2 derechos y deberes de empleadores y empleados
2 derechos y deberes de empleadores y empleados
 
De Kansen En De Risico[1] 1
De Kansen En De Risico[1]  1De Kansen En De Risico[1]  1
De Kansen En De Risico[1] 1
 
Information Literacy through the eyes of Teachers And Librarians
Information Literacy through the eyes of Teachers And LibrariansInformation Literacy through the eyes of Teachers And Librarians
Information Literacy through the eyes of Teachers And Librarians
 
Among The Hidden
Among The HiddenAmong The Hidden
Among The Hidden
 
ICEA July 2014 1st Published Work
ICEA July 2014 1st Published WorkICEA July 2014 1st Published Work
ICEA July 2014 1st Published Work
 
Modelo negocio
Modelo negocioModelo negocio
Modelo negocio
 
Cadenas de markov
Cadenas de markovCadenas de markov
Cadenas de markov
 
Modeling Requirements with SysML
Modeling Requirements with SysML Modeling Requirements with SysML
Modeling Requirements with SysML
 
Function of management leadership
Function of management   leadershipFunction of management   leadership
Function of management leadership
 
Newly Diagnosed Dementia Family Support Seminar
Newly Diagnosed Dementia Family Support Seminar Newly Diagnosed Dementia Family Support Seminar
Newly Diagnosed Dementia Family Support Seminar
 
9675960 diccionario-competencias-laborales-martha-alles
9675960 diccionario-competencias-laborales-martha-alles9675960 diccionario-competencias-laborales-martha-alles
9675960 diccionario-competencias-laborales-martha-alles
 
Tesis de calzado
Tesis de calzadoTesis de calzado
Tesis de calzado
 
Nextel peru sa
Nextel peru saNextel peru sa
Nextel peru sa
 
BUENAS PRÁCTICAS PARA EL ANÁLISIS DELICTUAL EN AMÉRICA LATINA
BUENAS PRÁCTICAS PARA EL ANÁLISIS DELICTUAL EN AMÉRICA LATINABUENAS PRÁCTICAS PARA EL ANÁLISIS DELICTUAL EN AMÉRICA LATINA
BUENAS PRÁCTICAS PARA EL ANÁLISIS DELICTUAL EN AMÉRICA LATINA
 
Unidad 3. toma de decisiones y solución
Unidad 3. toma de decisiones y soluciónUnidad 3. toma de decisiones y solución
Unidad 3. toma de decisiones y solución
 
Contabilidad (Activo Circulante y No Circulante)
Contabilidad (Activo Circulante y No Circulante)Contabilidad (Activo Circulante y No Circulante)
Contabilidad (Activo Circulante y No Circulante)
 
Unidad 3 La Recta Y Su Ecuacion Cartesiana
Unidad 3 La Recta Y Su Ecuacion CartesianaUnidad 3 La Recta Y Su Ecuacion Cartesiana
Unidad 3 La Recta Y Su Ecuacion Cartesiana
 
El Punto De Equilibrio
El Punto De EquilibrioEl Punto De Equilibrio
El Punto De Equilibrio
 

Similar a Cuddington Journal Paper

Alexandros kolovos on_'esdp and space'_initiative_presented_on_eumc_on_24th s...
Alexandros kolovos on_'esdp and space'_initiative_presented_on_eumc_on_24th s...Alexandros kolovos on_'esdp and space'_initiative_presented_on_eumc_on_24th s...
Alexandros kolovos on_'esdp and space'_initiative_presented_on_eumc_on_24th s...alexanderkolovos
 
Global Airbone ISR Market
Global Airbone ISR MarketGlobal Airbone ISR Market
Global Airbone ISR MarketDefense Report
 
Defense technology writing sample
Defense technology writing sampleDefense technology writing sample
Defense technology writing sampleBernie Adelsberger
 
The Future of Singapore’s Ground-Based Air Defense
The Future of Singapore’s Ground-Based Air DefenseThe Future of Singapore’s Ground-Based Air Defense
The Future of Singapore’s Ground-Based Air DefenseAshwin Samales
 
The Sharp Curve of Technology.pdf
The Sharp Curve of Technology.pdfThe Sharp Curve of Technology.pdf
The Sharp Curve of Technology.pdfMandeep Singh
 
Keir A intel resume 05 16
Keir A intel resume 05 16Keir A intel resume 05 16
Keir A intel resume 05 16Keir Huery
 
Bft afghanistan-and-iraq-exper
Bft afghanistan-and-iraq-experBft afghanistan-and-iraq-exper
Bft afghanistan-and-iraq-experannavikas
 
Airborne ISR & C2 Battle Management USA 2014
Airborne ISR & C2 Battle Management USA 2014Airborne ISR & C2 Battle Management USA 2014
Airborne ISR & C2 Battle Management USA 2014G. Jane Louise Cook
 
How Military sector change the GIS world
How Military sector change the GIS world How Military sector change the GIS world
How Military sector change the GIS world PRASANNA KUMAR
 
WalkerJ- Analysis Resume Word Docv2U9Jul
WalkerJ- Analysis Resume Word Docv2U9JulWalkerJ- Analysis Resume Word Docv2U9Jul
WalkerJ- Analysis Resume Word Docv2U9JulJason Walker
 
The Automation and Proliferation of Military Drones and the Protection of Civ...
The Automation and Proliferation of Military Drones and the Protection of Civ...The Automation and Proliferation of Military Drones and the Protection of Civ...
The Automation and Proliferation of Military Drones and the Protection of Civ...Angelo State University
 
BROWN-SEAN-P-RESUME ASA
BROWN-SEAN-P-RESUME ASABROWN-SEAN-P-RESUME ASA
BROWN-SEAN-P-RESUME ASASean Brown
 
BROWN-SEAN-P-RESUME ASA
BROWN-SEAN-P-RESUME ASABROWN-SEAN-P-RESUME ASA
BROWN-SEAN-P-RESUME ASASean Brown
 
SSA research_2_19_13_final
SSA research_2_19_13_finalSSA research_2_19_13_final
SSA research_2_19_13_finalMatthew Lupone
 
What Our Army Needs is a True Aero Scout
What Our Army Needs is a True Aero ScoutWhat Our Army Needs is a True Aero Scout
What Our Army Needs is a True Aero ScoutWilliam Nuckols
 
Operation Anaconda in Afghanistan A Case Study of Ada.docx
Operation Anaconda in Afghanistan  A Case Study of Ada.docxOperation Anaconda in Afghanistan  A Case Study of Ada.docx
Operation Anaconda in Afghanistan A Case Study of Ada.docxvannagoforth
 

Similar a Cuddington Journal Paper (20)

Alexandros kolovos on_'esdp and space'_initiative_presented_on_eumc_on_24th s...
Alexandros kolovos on_'esdp and space'_initiative_presented_on_eumc_on_24th s...Alexandros kolovos on_'esdp and space'_initiative_presented_on_eumc_on_24th s...
Alexandros kolovos on_'esdp and space'_initiative_presented_on_eumc_on_24th s...
 
Vol4ch02
Vol4ch02Vol4ch02
Vol4ch02
 
Global Airbone ISR Market
Global Airbone ISR MarketGlobal Airbone ISR Market
Global Airbone ISR Market
 
Defense technology writing sample
Defense technology writing sampleDefense technology writing sample
Defense technology writing sample
 
The Future of Singapore’s Ground-Based Air Defense
The Future of Singapore’s Ground-Based Air DefenseThe Future of Singapore’s Ground-Based Air Defense
The Future of Singapore’s Ground-Based Air Defense
 
The Sharp Curve of Technology.pdf
The Sharp Curve of Technology.pdfThe Sharp Curve of Technology.pdf
The Sharp Curve of Technology.pdf
 
Keir A intel resume 05 16
Keir A intel resume 05 16Keir A intel resume 05 16
Keir A intel resume 05 16
 
Bft afghanistan-and-iraq-exper
Bft afghanistan-and-iraq-experBft afghanistan-and-iraq-exper
Bft afghanistan-and-iraq-exper
 
Airborne ISR & C2 Battle Management USA 2014
Airborne ISR & C2 Battle Management USA 2014Airborne ISR & C2 Battle Management USA 2014
Airborne ISR & C2 Battle Management USA 2014
 
How Military sector change the GIS world
How Military sector change the GIS world How Military sector change the GIS world
How Military sector change the GIS world
 
Airborne ISR Market
Airborne ISR MarketAirborne ISR Market
Airborne ISR Market
 
WalkerJ- Analysis Resume Word Docv2U9Jul
WalkerJ- Analysis Resume Word Docv2U9JulWalkerJ- Analysis Resume Word Docv2U9Jul
WalkerJ- Analysis Resume Word Docv2U9Jul
 
The Automation and Proliferation of Military Drones and the Protection of Civ...
The Automation and Proliferation of Military Drones and the Protection of Civ...The Automation and Proliferation of Military Drones and the Protection of Civ...
The Automation and Proliferation of Military Drones and the Protection of Civ...
 
BROWN-SEAN-P-RESUME ASA
BROWN-SEAN-P-RESUME ASABROWN-SEAN-P-RESUME ASA
BROWN-SEAN-P-RESUME ASA
 
BROWN-SEAN-P-RESUME ASA
BROWN-SEAN-P-RESUME ASABROWN-SEAN-P-RESUME ASA
BROWN-SEAN-P-RESUME ASA
 
SSA research_2_19_13_final
SSA research_2_19_13_finalSSA research_2_19_13_final
SSA research_2_19_13_final
 
Remotesensing 04-01671
Remotesensing 04-01671Remotesensing 04-01671
Remotesensing 04-01671
 
What Our Army Needs is a True Aero Scout
What Our Army Needs is a True Aero ScoutWhat Our Army Needs is a True Aero Scout
What Our Army Needs is a True Aero Scout
 
ekmektsioglou.pdf
ekmektsioglou.pdfekmektsioglou.pdf
ekmektsioglou.pdf
 
Operation Anaconda in Afghanistan A Case Study of Ada.docx
Operation Anaconda in Afghanistan  A Case Study of Ada.docxOperation Anaconda in Afghanistan  A Case Study of Ada.docx
Operation Anaconda in Afghanistan A Case Study of Ada.docx
 

Cuddington Journal Paper

  • 1. Intelligence Operations in Denied Areas Jeff Cuddington Undergraduate Student Angelo State University 15 October 2014
  • 2. 1 Abstract This paper recognizes that there are a number of shortcomings in the current intelligence, surveillance, and reconnaissance field in preparing for future warfare paradigms. I intend to use data from various journal articles, defense guidance documents, and think-tank assessments to show that the current state cannot be effective against future adversaries. This paper will examine: (1) the current structure of the field, how it has adapted to the post-9/11 threat, and how the Department of Defense guidance for the future is not met by current standards, (2) the anti- access and area denial picture from leading world nations as well as transnational terrorist groups and reflect on how the field must meet these new challenges, (3) the resistance to change and identify rewards of effective adaptation, (4) and upcoming technologies and practices that can address denied environments. In all, a solution will require a new type of thinking to move ahead, US forces to come together with each other and partner forces, and a budget that supports the necessary change. Introduction Necessity is the mother of all invention and the demands of war often result in the rapid advancement of tactics, techniques and procedures. While America’s latest decade of armed conflict has shaped its method of warfare, the evolution that helped drive the national debt to unprecedented heights may have occurred in too narrow a scope. The United States has clearly made a statement that it plans to shift its attention to the Pacific, a region with a very different set of intelligence challenges than Iraq and Afghanistan. Despite Middle East flare-ups from the ISIS movement and others, America will continue to make political, economic, and military strides in the Pacific. As tightening military and intelligence budgets demand using available resources to their fullest, significant changes will have to be made in order for the United States to support intelligence operations in future contested areas. The intelligence community must recognize the benefits from the increased integration and synergy of the military services, but also that the current and future adversaries of the United States have different priorities and capabilities than recent ones, and that many of these adversaries have formidable anti-access and area denial systems in place. Current ISR Intelligence, surveillance, and reconnaissance (ISR) operations are critical to United States (US) military operations, foreign policy, and to secure the nation’s global position. ISR is a broad discipline, part of a broader command architecture known as command, control, communications, computers, intelligence, surveillance, and reconnaissance, or C4ISR. The US intelligence community (IC) is headed by the Director of National Intelligence (DNI) and currently consists of 17 agencies, both military and civilian. The IC’s responsibility is divided into several intelligence-gathering disciplines, or “INT’s”, such as human intelligence (HUMINT), signals intelligence (SIGINT), and geospatial intelligence (GEOINT). The recent decade of conflict has dramatically shaped and altered the way the United States conducts these operations. Despite the advances in ISR tactics, techniques, and procedures, Lieutenant General (Lt. Gen.) Larry D. James, the Air Force ISR Chief claims that the current structure is not necessarily the structure needed for the future.1 Anywhere that the US may operate ISR in which the environment is contested will make for a complicated and tough endeavor, unlike what has been seen in the past thirteen years. During the Global War on Terror, 1 Schanz, “ISR After Afghanistan,” 22.
  • 3. 2 ISR was challenged with high-demand, time-sensitive targets in supporting tactical ground units in complex irregular warfare. Had air defenses been more robust, those operations would have been more difficult and less successful.2 Though the concept of knowing your enemy dates back thousands of years to the beginning of warfare itself, the new millennium of American ISR is largely reliant on airborne technical intelligence collection; that is, using aircraft laden with sophisticated equipment for gathering intelligence and flying within range of a target to detect the information. ISR aircraft are generally very susceptible to interception from ground-based or airborne attack and typically only operate in areas of aerial superiority or air supremacy. These assets, manned or unmanned, armed or unarmed, were designed to prosecute a set of targets that are both mobile and clandestine.3 Gathering useful, actionable information to support long-term effects requires “persistent surveillance,” a term that refers to observing a set of targets for many hours over an extended period of time. This work can be quite tedious and involves many man-hours of interaction, thus much of the recent airborne ISR network relies on unmanned aerial vehicles (UAVs) “because of their long dwell time, improved sensors, enhanced connectivity, and precision strike capability.”4 Despite the fact that these systems were designed for use in the open skies and thus permissive air-operations environments of Iraq and Afghanistan, technical intelligence collection assets can also be vitally important in monitoring less-permissive rogue states like North Korea and Iran, if employed properly.5 A glimpse of reconnaissance UAV evolution demonstrates how ISR priorities have changed in recent years. The US military’s first modern production reconnaissance UAV was the RQ-1 Predator. This unmanned system saw its first overseas deployment in 1995 over Bosnia, and again in 1999 over Serbia. It originally operated solely on imagery gathering by the use of electronic sensors to pick up the visible spectrum (termed “electro-optical” or EO) and the infrared (IR) bands of light to provide tactical intelligence to commanders. Predators provided near-real time (NRT) full-motion video (FMV) streamed back to a base station, which can be viewed like live overhead television. With the experience of live intelligence behind enemy lines, a new requirement was added: the capability to use reconnaissance aircraft to strike high- value and mobile targets as they were identified instead of waiting for strike aircraft to arrive and risk losing the target. Thus Hellfire missiles were added to the Predators and the aircraft became a “multi-role” asset, re-designated as MQ-1 Predator. As the value of UAV NRT intelligence became more in-demand, more systems were developed such as the RQ-4 Global Hawk for high altitude EO/IR and radar imagery, and enhanced attack-capable assets like the MQ-9 Reaper. Simultaneously, advances were being made in SIGINT and other technical collection from airborne assets, often combining these capabilities on a single aircraft to benefit from a synergy of “cross-cueing.” Among the advantages of using an airborne “platform” for intelligence gathering rather than ground-based stations is being able to quickly get into enemy territory while staying mobile and safe from attack. Coupling ISR with strike capabilities created a “hunter-killer” concept that became an important US military capability that America evidently intends to carry forward against future adversaries.6 2 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 35. 3 Ibid. 4 Ibid., 31. 5 Howard, Intelligence in Denied Areas, 4. 6 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 31.
  • 4. 3 While UAVs have played an increasing role in intelligence gathering in recent years, there are still many manned aircraft that provide critical and crucial intelligence to military commanders. These piloted and crewed aircraft continue to risk putting people in harm’s way over unfriendly skies. Some manned ISR aircraft include the MC-12 Liberty which provides multi-INT integration, the RC-135 Rivet Joint (RJ) for SIGINT collection, the E-8C Joint Surveillance Target Attack Radar System (JSTARS) for precision radar data, and the U-2 Dragon Lady reconnaissance plane for visual imagery.7 Also to be included is “non-traditional ISR,” which refers to the use of sensor systems such as targeting pods on manned fighter aircraft like the F-15, F-16, and F-18 along with other attack aircraft like the AC-130 gunship.8 However, one thing that is evident from all this evolution is the assumption that the US has control of the skies and can operate a majority of these vulnerable, sophisticated, and expensive aircraft with little fear of being shot down or disabled. HUMINT has always been one of the most reliable, yet often one of the most difficult sources of intelligence. Retired Brigadier General Russell Howard of the Joint Special Operations University (JSOU) argues that “technical intelligence methods that worked well in a Cold War environment, such as imagery intelligence (IMINT) or signal intelligence (SIGINT), have not proven effective against terrorists, and increased HUMINT capabilities will be crucial in waging an effective campaign against Al Qaeda and like-minded terrorist groups.”9 This was certainly the case in Afghanistan where unforgiving geography combined with low-tech methods of operation by US adversaries severely limited the usefulness of highly technical intelligence gathering. In response, HUMINT took a renewed front-seat in the intelligence-gathering arena. During the Cold War, access beyond the “curtains” was particularly difficult for HUMINT gatherers, and to overcome these difficulties the US IC developed more technical means.10 This technical reliance proved so useful that much of the United States’ effort shifted away from HUMINT, a discipline that requires a long lead-time and highly specialized training for effective operation. Howard noted that the United States has continued to rely in large part on the same Cold War paradigm of remote technical collection, appropriate for the Soviet Union, but that transnational terrorist groups are much more ambiguous and harder to detect.11 The primary issue in Afghanistan regarding technical intelligence collection is that the visible and electronic signature of terrorists is much smaller and harder to detect than that of the former Soviet Union or any other state.12 Furthermore, Howard makes a very important distinction between HUMINT and technical intelligence in identifying that, “technical collection assets do little to penetrate denied minds.”13 Imagery intelligence is typically limited to detecting things after they have moved; signals intelligence can detect things as they are happening; communications intelligence can intercept orders and dialogs; but effective human intelligence can get into the decision–making process and detect intentions before they happen, or even alter the course of decisions. Afghanistan showed that relying too much on technical intelligence creates an exploitable gap that the many terror organizations in the Afghanistan-Pakistan region benefitted from. Likewise, a future shift to the Pacific Rim or a conflict with another developed state like 7 Ibid., 32. 8 Ibid. 9 Howard, Intelligence in Denied Areas, 1. 10 Ibid., 2. 11 Ibid., 3. 12 Ibid. 13 Ibid.
  • 5. 4 Iran will highlight another gap in current US intelligence collection: the vulnerability of intelligence operations in denied areas. US assets may not be able to fly through or near the borders of aggressive countries like Russia, China, North Korea, and Iran. The airborne intelligence fleet will be effectively grounded and the lack of recent HUMINT focus only serves to magnify the intelligence “blinding.” Yet despite the advantages and drawbacks of disciplines in different contexts, Lt. Gen. James paves a positive way to the future with “[the US is] not one ‘INT’ focused… Our teams utilize all these domains to create information.”14 With the US withdrawal from Iraq and Afghanistan all but complete, there is an expected dramatic shift in upcoming ISR guidance. In the latest guidance from the US Department of Defense (DoD) “Sustaining US Global Leadership: Priorities for 21st Century Defense,” or known simply as the 2012 Defense Strategic Guidance, the DoD stated that “while the US military will continue to contribute to security globally, we will of necessity rebalance toward the Asia-Pacific region.”15 Despite other conflicts that arise, it is the stated intention of the highest authority of the United States to rebalance to the Pacific region; contemporary Middle Eastern affairs only delay the intended momentum. Despite or perhaps because of the continual distraction in the Persian Gulf and Levant, the US must continue to evaluate other global threats and not solely focus on a single form of combat. The 2012 Defense Strategic Guidance goes on to state that the force of the near future will have to respond less to the permissive environment of Afghanistan and more to countries sheltered behind formidable anti-access, area-denial systems.16 In a symposium address by US Air Force (USAF) Secretary Michael B. Donley, he stated that the Air Force is rebalancing its priorities to how they might have stood had events like 9/11 not intervened.17 Stacie L. Pettyjohn, a RAND political scientist described global USAF presence as “largely stable in regions where key interests and allies are located. However, it’s worth noting that large Cold War-style garrisons overseas—such as those in Germany and Japan—are ‘anathema’ to many new and prospective partners, who often want lighter, more rotational presence.”18 The priorities declared in the 2012 Defense Strategic Guidance include requirements in stark contrast to present US ISR capabilities, and further warns that adversaries in these denied access areas will present difficult obstacles to US military intervention.19 Anti-Access, Area Denial (A2/AD) As the US foreign focus shifts from a region where there has been a general freedom of access for intelligence gathering assets, leaders must consider that many regions containing near- future threats do not grant US forces the permissive access that they have become accustomed to. Developed nations like Russia, China, North Korea, and Iran are among the locations that the military and State Department once again consider to be top threats. These potential threats simply will not allow foreign powers like the US to have complete freedom of movement and will actively work against attempted US intelligence operations. Simply put, the act of an adversary to work against the actions of another defines what anti-access or area denial environments are. More formally, the US DoD Joint Operational Access Concept (JOAC) defines these terms: “Anti-access (A2) refers to those actions and 14 Schanz, “ISR After Afghanistan,” 23. 15 USDoD, “Sustaining US Global Leadership,” 2. 16 Schanz, “ISR After Afghanistan,” 23. 17 Ibid., 24. 18 Ibid., 26. 19 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 36.
  • 6. 5 capabilities, usually long-range, designed to prevent an opposing force from entering an operational area. Area denial (AD) refers to those actions and capabilities, usually of shorter range, designed not to keep an opposing force out, but to limit its freedom of action within the operational area.”20 This continues to be an ongoing concern for leaders as the 2014 “National Intelligence Strategy of the United States of America” lists among its major objectives that the IC will have to develop strategies to operate in denied areas.21 According to the “Air-Sea Battle” concept, the general US solution to the A2/AD issue is to develop a network of integrated forces capable of defeating the enemy across all modern warfighting domains: air, sea, land, space, and cyberspace.22 This concept recognizes that adversary forces will likely attack without warning and forward friendly forces will be in the A2/AD environment from the outset of hostilities where they must provide an immediate and effective response. While this reflects one view of future complications, A2/AD can be defined in other ways. Howard defines these denied areas as, “regions whose nations are characterized by weak state structures.”23 While Howard approaches A2/AD from a HUMINT standpoint, his definition does not necessarily apply to much of the Middle East in a general intelligence perspective, a region characterized by many countries with weak state structure but for the most part presenting little A2/AD against the United States. Regardless, any state operating effective A2/AD could severely hinder US operations in that area, or even deter the US and coalition partners from responding to aggression in the first place.24 The Center for Strategic and Budgetary Assessments (CSBA) goes further with this reasoning suggesting that America may be the cause of its own A2/AD problems, stemming from United States’ worldwide power projection and military preeminence.25 This suggests that there may be issues inherent in Unites States foreign policy or other national ideals. Conversely, some may argue that the “big brother” image of America forces some nations to make significant expenditures in deterrence or self-defense, instead of possibly more offensive actions. America’s current foreign policy program is in some ways creating more problems than it is solving. An aggressive and intrusive foreign policy creates more barriers and friction among other nations, seeds more conflict, and translates to increased difficulty, risk, and casualties when conflicts do erupt. It is important to be aware that not all of the current, emerging, and evolving threats are alike—while developed and modern nation-states have returned to the forefront of attention, there will continue to be the threat of transnational terrorism. Developed countries such as Russia, China, Iran, and North Korea have considerable access to advanced missile and satellite technology permitting even regional rogue states the ability to pre-target US forward bases abroad and monitor deployment activity.26 By contrast, transnational terrorist cells like al- Qaeda, Taliban, and Abu Sayyaf often operate beyond political borders, blend in with the local populations, and maintain a low visibility. As such, this category of threats requires a very different approach than with nation-states. China is one of the most significant A2/AD threats at this time. China not only deters the United States from deploying into the Western Pacific, but also threatens to disrupt nearby 20 USDoD, “Joint Operational Access Concept,” i. 21 Office of the Director of National Intelligence, “The National Intelligence Strategy”, 8. 22 USDoD, “Air-Sea Battle,” 4. 23 Howard, Intelligence in Denied Areas, 2. 24 Krepinevich, Watts,and Work, Meeting the Anti-Access and Area-Denial Challenge,4. 25 Ibid., 93. 26 Ibid., 1.
  • 7. 6 operations such as around Taiwan or the South China Sea.27 While US advanced fighters and bombers have inherent advantages against China’s defenses, these aircraft are not immune and are very limited in availability. A majority of American fighters, bombers, reconnaissance aircraft, and cruise missiles remain extremely vulnerable. China’s integrated air defense system is virtually impossible to penetrate with current US fourth-generation aircraft.28 Furthermore, China is expected to increase its threat range with the development of the S-400 missile system, extending their air defense coverage out to over 200 nautical miles.29 In 2007, China also demonstrated its ability to target and shoot down orbital satellites when it shot down one of its own. This capability could be easily carried out against US satellites in a conflict, severely degrading the US view into the Chinese interior. The side that can better collect, transmit, and exploit information while denying their enemy the same will be the victor in war, a term called “information dominance,” something that China has demonstrated they are well aware of.30 While their strategic and operational concepts are of concern, China’s tactical dimension focuses on destroying or damaging American capabilities with an array of missiles and submarines.31 Staying out of China’s missile envelope brings questions to the effectiveness of the upcoming F-35 with its relatively short range. Clearly, the Chinese position is one of exclusion and intent on keeping America or other adversaries away with formidable A2/AD. Iran has a dangerous influence over one of the most important commercial chokepoints in the world: the Straits of Hormuz. Iran also has a significant modern military capability and robust A2/AD network. Should all-out conflict occur with Iran, the United States may have no close-in bases to operate fighters from, an important first step in modern warfare.32 It could be presumed that in a conflict with Iran, access to the Persian Gulf would be denied and Iran would pressure its neighbors to deny US access. Launching from an airbase in Turkey or a carrier in the Arabian Sea, our closest guaranteed large-scale basing opportunities, provides only partial coverage into Iran. Iran also has a significant defensive advantage which will require detailed intelligence to counter. While their command infrastructure prevents it from combining its air defense systems into a truly integrated network, Iran’s A2/AD capabilities and strategies are considered to be similar to China’s and thus produce a significant threat to all US ISR attempts.33 Non-state actors, such as transnational terrorist organizations, can also pose a threat. Ballistic missile systems and advanced stealth fighters are not the only ways to deter enemies. The cyberspace domain has become a major front in modern warfare and requires very little technology to be devastating. Cyber-information warfare, distributed denial of service attacks, malicious software, and financial or resource manipulation are only some of the effects that can severely impair a fighting force. Electro-magnetic pulse weapons can be cheaply made and be just as devastating to a modern force as the inexpensive and low-tech explosive-formed penetrators that punched through armored trucks in Iraq. High-power scramblers that disrupt global positioning systems can make UAV guidance ineffective and reduce accuracy of smart- weapons. Man-portable air defense systems are proliferated throughout the world and night- vision optics of increasing capability are reaching the consumer markets. The A2/AD issue is not limited to top-tier nations, and unconventional tactics will have to be considered as well. 27 McCarthy, “Anti-Access/Area Denial,” 3. 28 Ibid., 4. 29 Ibid. 30 Cheng, “Countering China’s A2/AD Challenge.” 31 Ibid. 32 Gunzinger and Dougherty, Outside-In, 18. 33 Ibid., 44.
  • 8. 7 A2/AD creates a new set of intelligence priorities different than what has been faced in the last decade. Future A2/AD priorities require some new considerations. According to a CSBA analyst, a “blinding campaign” or “scouting battle” will be the first and most important military move in an A2/AD confrontation.34 A significant change is that ISR assets, or “platforms” as they are often called, must adapt their sensing capability toward detecting A2/AD forces and networks in order to survive in these environments.35 Additionally, according to two prestigious defense consultants, Robert Haffa and Anand Datla, “the requirement for high- definition FMV with its attendant bandwidth, considered so important over the last decade, may take a backseat to large, strategic UAVs with long-range radar, SIGINT, and EO/IR sensors and multifunction radio-frequency sensor payloads.”36 Near the beginning of the Iraq and Afghanistan wars, the US was fielding as few as four UAV “orbits” in theater; in the years that followed, this peaked to over 60 UAV orbits. The high demand of these types of assets also created a high demand of bandwidth to transmit and process the data gathered. The centralized authority employed in this type of intelligence gathering for the US “processes more than 1.3 petabytes of data a month—equivalent to 1,000 hours a day of full-motion video—and better sensor technology will only add to these figures.”37 Data management and movement are vital to operations where control of air, sea, and space is contested, according to USAF leaders.38 In addition to traditional ISR aircraft, America’s most modern fighter aircraft, the F-22 and F-35, will also have to assume ISR roles well beyond the non-traditional role.39 Older fighter and attack aircraft operators learned the value of using targeting pods for ISR, a process called non-traditional ISR (NTISR). In the development of the newest generation of aircraft, ISR requirements were included in the capabilities of these multi-role aircraft, with ISR collection being a dedicated role rather than an ancillary or additional one. To continue to be able to outthink our adversaries, operators will have to push these new capabilities well beyond the old NTISR tactics, techniques and procedures into new realms to defeat and circumvent various A2/AD systems. Airborne platforms are not the only way to move ISR assets over enemy territory quickly and safely. Space-based systems have been in use by the United States for over half a century. The Corona program began in 1959 and since then the US has deployed vast constellations of reconnaissance satellites into orbit. While satellite reconnaissance was considered critical during the Cold War, it has not been considered as much a major player in recent years in the pursuit of high-value, mobile, tactical targets. However, space-based radar and IR collection will prove to be particularly significant for defeating A2/AD.40 Similar to the airborne fleet of ISR, satellite sensors and platforms require robust space-based communication networks and bandwidth in order to provide essential ISR integration.41 All of these different airborne and orbital assets are operated under different command structures within the IC: military service commands, civilian agencies like the Central Intelligence Agency, National Security Agency, National Reconnaissance Office, and National Geospatial-Intelligence Agency, and other contracted, partnered, or multinational forces. Whether using UAVs, manned aircraft, or orbital satellites, in 34 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 37. 35 Ibid., 40. 36 Ibid. 37 Schanz, “ISR After Afghanistan,” 24. 38 Ibid., 25. 39 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 41. 40 Ibid. 41 Ibid., 43.
  • 9. 8 working against A2/AD, the United States “must pay greater attention not only to joint interoperability in the processing, exploitation, and dissemination (PED) process but also to their security.”42 With all these new priorities, it is reasonable to ask how the current US systems measure up to new requirements. In an A2/AD environment, quickly projecting military power may hinge on the fighting forces’ ability to eliminate A2 and AD systems in the span of a few hours or days. There are considerable risks in doing so, particularly in the absence of long-range, penetrating surveillance.43 High-altitude, long-endurance UAVs will play a role, but depending on the enemy’s airstrike and air-defense capability, will have to be operated carefully and be equipped with self-defense capabilities.44 The purpose-built ISR capabilities of the F-22 and F- 35, combined with their low observability, could make them primary ISR collectors in contested airspace.45 Despite the changing environment, Lt. Gen. James said that the USAF’s force structure for ISR will not see significant change in the near term, and many of the assets used in US Central Command (Middle East region) will also see a great deal of use in the Asia-Pacific region.46 This ignores or glosses over the fact that the joint force has yet to come to grips with the challenges and range of possible options to employ ISR platforms in contested airspace.47 Facing Resistance to Change While some elements can continue to operate in the new environment, other elements will face inherent hurdles. Many of the current US systems and their architectures face some limitations in denied-area operations. As the robust ISR network of today took shape, much of the command and control of assets became “stovepiped” from the ISR asset, or “platform,” to the specific user.48 This has severely hampered joint connectivity and interoperability toward a unified effort. Nonetheless, according to Lt. Gen. James, “connectivity lies at the core of USAF’s global ISR superiority. It is important to remember fielding an asset is far different than networking one—and this capability sets the USAF apart from the rest of the world.”49 Yet in the end, and strikingly, the US IC response to the A2/AD challenge lacks a truly joint approach.50 Fortunately, some systems are less affected than others such as the fifth-generation fighter aircraft, specifically the F-22 and F-35. The key will be figuring out how to best use these platforms’ ISR capabilities to their fullest since they will initially be the only assets able to fly in contested space.51 Politics will also play a significant role alongside the A2/AD issue. The United States must continue to be prepared to utilize host-nation and partner force facilities, as it is not possible to maintain a garrison in every corner of the globe.52 The US must be prepared for the political consequences of these dealings, such as when in 2009 the Kyrgyzstan Parliament tripled the rent for use of its base, a major transit hub for US forces in and out of Afghanistan, or the 42 Ibid., 42. 43 Krepinevich, Watts,and Work, Meeting the Anti-Access and Area-Denial Challenge,iii. 44 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 39. 45 Ibid. 46 Schanz, “ISR After Afghanistan,” 24. 47 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 29. 48 Ibid., 34. 49 Schanz, “ISR After Afghanistan,” 27. 50 Krepinevich, Watts,and Work, Meeting the Anti-Access and Area-Denial Challenge,iii. 51 Schanz, “ISR After Afghanistan” 26. 52 Krepinevich, Watts,and Work, Meeting the Anti-Access and Area-Denial Challenge,2.
  • 10. 9 many cases in which countries have refused basing rights or not allowed American aircraft at bases to fly in certain operations. Budget cutbacks, sequestration, and personnel cutbacks have further complicated matters. The 2011 Budget Control Act and resulting sequestration threatened to slash hundreds of billions of dollars from future Department of Defense budgets and make the strategic guidance nearly unworkable, yet there must continue to be some consideration for the development of future systems.53 In fact, ISR platforms of the future will need all of the characteristics that have proven effective over the last decade with one significant additional requirement: survivability in hostile airspace.54 In developing new systems, there are the issues of new budget requirements, time requirements to develop, test, and field the systems, and training time for crews to use the system. In the shift of ISR priorities, there must also be a consideration of retraining existing personnel for the new requirements of current systems as well as the addition or reduction of manning to support these changes. The United States’ declared shift to rebalance to the Asia-Pacific region, as mentioned in the 2012 Defense Strategic Guidance, has not been without hurdles. While the DoD document identifies the importance of the region’s stability for trade and economy as well as supporting US interests in the region, the Obama administration has been criticized for letting focus on the Pacific slip in lieu of Middle Eastern concerns. International disputes in Ukraine and Crimea as well as the ISIS movement in Iraq and Syria have diverted American attention away from the Pacific. In March of 2013, National Security Advisor Tom Donilon described the strategic pivot as a rebalance of the projection and focus of US power. Further, that all elements of US power, military, political, trade and investment, development and values, will be harnessed in the shift. He continued that sixty percent of the US naval fleet will be based in the Pacific by 2020, and the focus will shift to submarines, fifth-generation fighter jets, and reconnaissance platforms. Donlion did acknowledge that difficult fiscal times have made some question the sustainability of the rebalance.55 President Obama commented in May of 2014 that other issues of the Pacific need to be resolved first. He stated, “We can’t try to resolve problems in the South China Sea when we have refused to make sure that the Law of the Sea Convention is ratified by the United States Senate”.56 Others still question the power-balancing involved in the shift of naval assets. With cuts in defense budgeting, some argue that the rebalance may mean only shrinking in the Atlantic while not growing in the Pacific.57 As the US shift to the Pacific continues to stall, Russia has seized the initiative and made its own pivot by signing a $400 billion deal with China.58 Still, the “whole-of-government” approach to rebalancing likely will not diminish despite months of airstrikes in Iraq and Syria, defense experts say. These experts do express some concern as to whether or not the new US commitment in the Middle East will stunt the military rebalance.59 Iraq and Ukraine aside, the United States is still projecting national power into the Pacific region economically, diplomatically, and militarily, and US investments will need to be protected by preparing for conflict contingencies.60 The United States must recognize and plan 53 Schanz, “ISR After Afghanistan,” 24. 54 Haffa and Datla, “Joint Intelligence, Surveillance, and Reconnaissance in Contested Airspace,” 38. 55 Lyle, “National Security Advisor Explains Asia-Pacific Pivot.” 56 Avni, “Obama’s Incredible Shrinking Pacific Pivot.” 57 Ibid. 58 Ibid. 59 Olson, “Mideast Flare-Up, Budget Cuts Could Affect Pacific Pivot.” 60 Ibid.
  • 11. 10 for the challenges that may be faced against dominant powers in the Asia-Pacific region, including increased future intelligence operations. Rewards of Adaptation There are several benefits to finding the best method of transition. By appropriately identifying requirements and the best support for those requirements, significant expenditures can be saved. For instance, using current systems that can fill requirements before specialized systems are developed can facilitate rapid transition. When reconnaissance aircraft were unable to fly certain missions due to unavailability or hostile threat, NTISR was developed to fill the gap. The evolution of the Predator from a single-INT collector, to an attack-capable platform, to a multi-INT, multirole system makes the most of an available asset while recognizing the synergy of cross-cueing and joint intelligence efforts. American adversaries are constantly developing new tactics and technologies to defeat US systems. The budget-constrained United States cannot expect to be competitive without making advances, and priority must be given to selecting the right systems to develop which will defend America’s primary interests from likely threats. Leaders must also continue to break down “stovepipes” in order to foster a more joint atmosphere, sharing in the abilities and information across the services and community. Single- purpose systems are not cost effective, and by building on the synergy of crossing service boundaries, current systems can be dramatically more effective. Whether using an existing system, augmenting a current one, or developing a new one to fill a gap, knowing what to plan for can maximize the effect of ISR operations. The Way Ahead Experts have already offered a number of solutions, courses of action, and alternatives. One advisor stated that, “we need to fundamentally change ISR so we never look at a single sensor again; we look at how it contributes to all other sensors.”61 Lt. Gen. James agrees that the Air Force “must find a way to bring unconventional and open source assets into its ISR enterprise.”62 In dealing with areas in which access is not permitted, the US will have to improve operations from standoff distances, such as U-2s flying outside the range of ground- based surface-to-air missiles and other threats.63 Aside from technical collection, a reexamination of HUMINT collection can also be performed. Howard proposes several alternatives in gathering HUMINT information such as using criminals and criminal cartels, or using non-governmental organizations in cooperation with intelligence services for mutually beneficial reasons.64 An important point made by the CSBA is that “a joint approach to the prospective A2 and AD capabilities of future US adversaries is crucial if the various risks are to be mitigated or hedged against to any serious degree.”65 There are numerous projects underway to push the edge of ISR collection. One project that is already in service to attempt to defeat A2/AD is the RQ-170 Sentinel. This is a stealth UAV operated by the Central Intelligence Agency designed to penetrate enemy detection systems and is assumed to be fitted with reconnaissance equipment. However, even this system is not without vulnerabilities: in 2011 while flying over Iran, an RQ-170 was downed and 61 Schanz, “ISR After Afghanistan,” 25. 62 Ibid. 63 Ibid., 26. 64 Howard, Intelligence in Denied Areas, 5. 65 Krepinevich, Watts,and Work, Meeting the Anti-Access and Area-Denial Challenge,iv.
  • 12. 11 captured by Iran. Other systems in development include the Unmanned Carrier-Launched Airborne Surveillance and Strike (UCLASS) system. This project is designed to provide a strike- capable remotely-piloted vehicle to the navy. The X-47B has shown promise to fill this role and testing and development continue to push closer to implementation. Other developments in reconnaissance include pushing the edge of high-altitude long-endurance unmanned aircraft. Boeing has been developing the Phantom Eye capable of staying aloft over 100 hours at altitudes up 65,000 feet, and plans to develop further versions to remain airborne up to a week while carrying payloads of up to 2,000 pounds.66 Another impressive development is the QinetiQ Zephyr, though relatively small and not capable of carrying weapons, it has the endurance record of 336 hours (14 days) and capable of flying over 70,000 feet.67 Other developments include the SR-72 hypersonic strategic reconnaissance aircraft. The SR-72 is a proposed successor to the SR-71 Blackbird and is intended to be an optionally-piloted aircraft designed to fill the ISR gap between surveillance satellites, subsonic manned aircraft, and UAVs. While the F-22 and F-35 can assume roles of ISR and may be able to defeat some A2/AD systems, budget reduction has severely limited the availability of these aircraft. The last production F-22 was delivered in 2012 capping the fleet to only 187 operational aircraft. Additionally, The F-35 continues to be plagued with development problems and extreme cost overruns. It is expected to begin operational status between 2016 and 2018 for the United States. The US has stated it plans to build a fleet of 2,443 aircraft; however delivery of this massive number to the US military is scheduled to take until 2037. Progressive budget cutbacks could certainly see the final number of F-35s reduced similar to how F-22s were cut from an initial vision of 750 aircraft to a meager 187. Certainly more systems are under development or perhaps already in service and kept secret from public eye. It is crucial that development in technology and tactics continue in order to find a necessary breakthrough to change the course of ISR, and more importantly funding needs to continue to make the research possible. Lastly, not everything has to be done on the backs and by the dollars of Americans. The US can reach out to partner forces and allies for support. Several countries have proven quite capable in acquiring and assessing intelligence. Australia has an impressive HUMINT network that has been in operation for years and can fill the gap that the United State has been neglecting. In the Pacific region, Japan has a very capable force and prime operating location for the Asia- Pacific region. Israel has a very effective and rapid weapons development plan that can be utilized. Other countries are very skilled at specific types of warfare as well. The US should look more into integrating partner force technologies and systems into our own to reduce the burden and cost of development. Secretary of the Air Force Michael Donley noted that “cooperation activities with Australia and Japan are vital to maintaining USAF global vigilance.” These countries and other allies abroad in Europe, Asia, and even Africa and the Americas can certainly ease the burden on the United States for future overseas operations. Conclusion In order for the United States to secure its global position, ISR must continue to adapt to the changing political climate. US leadership has signaled for a change in focus away from the Middle East and towards the Pacific region. While Middle East conflicts and budget cutbacks are delaying and limiting the rebalancing, America must secure important political and economic interests in the Asia-Pacific region. This will require a re-examination of how intelligence 66 Botwick, “High Altitude Long Endurance Aircraft Configurations,” 4. 67 Ibid., 2.
  • 13. 12 operations are conducted as adversaries in this region have robust A2/AD networks and pose a different threat than Iraq and Afghanistan. The possibility of armed conflict with major states such as Russia, China, or North Korea must be considered; one must not get trapped into mirror- imaging, thinking one’s adversary will act the same as himself. As some now consider China to be an unlikely real threat, the Kennedy administration considered Cuba to be impossible. Failing to plan for unexpected variations nearly led to worldwide disaster during the Cuban Missile Crisis in 1962. Throughout history, there have been points where the character of warfare had to make significant changes. During the American Revolution, land war made a dramatic shift from the Napoleonic-style to what would become the basis of modern land strategy. The idea of marching dense masses across open battlefields blindly shooting each other in a war of attrition evolved into guerrilla-style tactics and asymmetric skirmish warfare. In World War I, the introduction of the airplane forever changed the operation of war. Initially a reconnaissance vehicle, the airplane was repurposed as a bomber and after years of development the new air strategy became a major element of warfare. In World War II, the battleship evolved to be the capital ship and naval warfare shifted dramatically to adapt to its capabilities. All these domains are constantly reaching boundaries and breaking through them in unexpected ways. For example, land war evolved again after World War I as technology and strategy made major breakthroughs with the machine gun and tanks. US naval warfare shifted its capital fleet from battleships to aircraft carrier groups and in the future submarines are expected to lead the fleet. Intelligence warfare has now reached a similar critical inflection point: Operations and counter-operations have evolved to a point where a new type of thinking will be required to overcome the current barriers. While significant advances have been made in recent years, the threats of the future may pose a dramatically different challenge. The intelligence community must work together to find new solutions to novel situations, to make the most of the current systems, and allowances in the budget must be made to develop future systems to meet the coming threats.
  • 14. 13 References Avni, Benny. "Obama's Incredible Shrinking Pacific Pivot." NYPost.com. June 1, 2014. http://nypost.com/2014/06/01/obamas-incredible-shrinking-pacific-pivot/ (accessed October 15, 2014). Botwick, Aaron F. "High Altitude Long Endurance Aircraft Configurations." Academia.edu. n.d. http://www.academia.edu/6632990/High_Altitude_Long_Endurance_UAV_Configuratio ns (accessed October 15, 2014). Cheng, Dean. "Countering China's A2/AD Challenge." The National Interest, September 20, 2013. Gunzinger, Mark, and Chris Dougherty. Outside-In: Operating from Range to Defeat Iran's Anti- Access and Area-Denial Threats. Washington, D.C.: Center for Strategic and Budgetary Assessments, 2011. Haffa, Robert P, and Anand Datla. "Joint Intelligence, Surveillance and Reconnaissance in Contested Airspace." Air & Space Power Journal, May-June 2014: 29-47. Howard, Russell D. Intelligence in Denied Areas: New Concepts for a Changing Security Environment. Hurlburt Field, Florida: Joint Special Operations University Report 07-10, 2007. Krepinevich, Andrew, Barry Watts, and Robert Work. Meeting the Anti-Access and Area-Denial Challenge. Washington, D.C.: Center for Strategic and Budgetary Assessments, 2003. Lyle, Amaani. "National Security Advisor Explains Asia-Pacific Pivot." Defense.gov. March 12, 2013. http://www.defense.gov/News/newsarticle.aspx?ID=119505 (accessed October 15, 2014). McCarthy, Christopher J. (Maj, USAF). "Anti-Access/Area Denial: The Evolution of Modern Warfare." United States Naval War College: Lucent - A Journal of National Security Studies, 2010. Office of the Director of National Intelligence. "The National Intelligence Strategy of the United States of America." 2014. Olson, Wyatt. "Mideast Flare-up, Budget Cuts Could Affect Pacific Pivot." Stars and Stripes. September 22, 2014. http://www.stripes.com/news/pacific/mideast-flare-up-budget-cuts- could-affect-pacific-pivot-1.304295 (accessed October 15, 2014). Schanz, Marc V. "ISR after Afghanistan." Air Force Magazine: The Online Journal of the Air Force Association, January 2013: 22-27. United States Department of Defense. "Air-Sea Battle: Service Collaboration to Address Anti- Access & Area Denial Challenge." 2013.
  • 15. 14 —. "Joint Operational Access Concept (JOAC)." Washington DC, 2012. —. "Sustaining U.S. Global Leadership: Priorities for the 21st Century Defense." Washington DC, 2012.