Intelligence, Surveillance and Reconnaissance Research Articles

ISR Research Articles Comments Updated
Staff Sgt. Dakota Karlsen, 455th Expeditionary Security Forces Squadron, echo sector controller, looks at a monitor of the surrounding area around the base, Bagram Airfield, Afghanistan, Aug. 4, 2016. The echo sector command post defends all assets and personnel within their sector of responsibility, in addition to providing command and control (C2) for security forces members. (U.S. Air Force photo by Senior Airman Justyn M. Freeman) 2017 Student Research
2017 ISR Task Force Papers
0 8/29
ACEOC 15-2 students are introduced to the latest Command and Control (C2) system currently being field in the Fleet Marine Force (FMF) for the first time. The students are familiarizing themselves with the Common Aviation C2 System (CAC2S) by navigating around maps and airspaces used during their formal school training. Intelligence Support to Joint Targeting in the A2/AD Environment
According to the Joint Operational Access Concept (JOAC) published by the United States Department of Defense in 2012, “Events of recent decades have demonstrated the decisive results U.S. joint forces can achieve when allowed to flow combat power into an operational area unimpeded...and U.S. operational access during that period was essentially
0 10/10
The Integrated Cyber and Electronic Warfare, or ICE, program at the Army Research, Development and Engineering Command’s Communications-Electronics Research, Development and Engineering Center or CERDEC, looks to leverage cyber and electronic warfare capabilities like those on display at DARPA’s Cyber Grand Challenge as an integrated system to increase a commander's situational awareness. CERDEC is focusing its science and technology efforts on researching solutions to address specific cyber and electronic warfare threats and developing the architecture onto which scientists and engineers can rapidly develop and integrate new more capable solutions. U.S. Army illustration Nuclear Deterrence in Cyber-IA: Challenges and Controversies
Although nuclear and cyber issues might seem to belong in separate compartments, current US military activity and prospective challenges suggest that “nuclear” and “cyber” topics may achieve certain congruities. For its success, nuclear deterrence requires secure networks for the command, control, communications, computers, intelligence,
0 10/10