60,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
  • Broschiertes Buch

This paper will explain why ISR efforts must target the inner seams of irregular warfare (IW) networks by 1) demonstrating irregular enemies are networked in nature and 2) explaining how ISR's capabilities are well-matched to undermining that networked nature. To support this thesis, this paper will utilize the problem/solution methodology. The problem is identified as a widespread misunderstanding of how prioritized ISR significantly disrupts irregular enemy networks. Due to the national importance placed on defeating IW networks, this paper derives a solution by offering a basic…mehr

Produktbeschreibung
This paper will explain why ISR efforts must target the inner seams of irregular warfare (IW) networks by 1) demonstrating irregular enemies are networked in nature and 2) explaining how ISR's capabilities are well-matched to undermining that networked nature. To support this thesis, this paper will utilize the problem/solution methodology. The problem is identified as a widespread misunderstanding of how prioritized ISR significantly disrupts irregular enemy networks. Due to the national importance placed on defeating IW networks, this paper derives a solution by offering a basic understanding of why prioritized ISR is a pillar in a network-attack strategy. This paper will begin by validating the need for a network-attack strategy in IW. Recognizing the merits of a network-attack strategy is required to accept ISR's role in the strategy itself. Next, this paper will illustrate the networked nature of irregular enemies. Understanding this point is critical since it reveals how hidden, networked efforts are required to conduct horrific attacks. These findings lay out a foundation for the second half of the paper -- explaining why ISR's capabilities of persistent stare and distributed operations are key components to disrupting irregular networks. Finally, the paper concludes with the assessment that ISR efforts must be prioritized for network-attack operations with the following recommendations: 1) ensure ISR allocation focuses on attacking the internal seams of IW networks, 2) concentrate and mass ISR efforts where needed most, and 3) increase ISR capacity by prioritizing ISR in Air Force acquisition endeavors.