OPINION | Need of the Hour : New Intelligence Priorities for Anti-Access, Area Denial (A2/AD)

OPINION | Need of the Hour : New Intelligence Priorities for Anti-Access, Area Denial (A2/AD)

By Jeff Cuddlington

As the United States (U.S.) foreign focus shifts from a region where there has been a general freedom of access for intelligence gathering assets, leaders must consider that many regions containing near-future threats do not grant U.S.forces the permissive access that they have become accustomed to. Developed nations like Russia, China, North Korea, and Iran are among the locations that the military and State Department once again consider to be top threats. These potential threats simply will not allow foreign powers like the U.S.to have complete freedom of movement and will actively work against attempted U.S. intelligence operations.

Image Attribute: Joint Operational Access Concept (JOAC) in a Anti-Access, Area Denial Theatre  / Source: McNeal & Associates

Image Attribute: Joint Operational Access Concept (JOAC) in a Anti-Access, Area Denial Theatre
 / Source: McNeal & Associates

Simply put, the act of an adversary to work against the actions of another defines what anti-access or area denial environments are. More formally, the U.S Department of Defense (DoD) Joint Operational Access Concept (JOAC) defines these terms: “Anti-access (A2) refers to those actions and capabilities, usually long-range, designed to prevent an opposing force from entering an operational area. Area denial (AD) refers to those actions and capabilities, usually of shorter range, designed not to keep an opposing force out, but to limit its freedom of action within the operational area” (United States Department of Defense 2012, i). This continues to be an ongoing concern for leaders as the 2014 “National Intelligence Strategy of the United States of America” lists among its major objectives that the IC will have develop strategies to operate in denied areas (Office of the Director of National Intelligence 2014). 

According to the “Air-Sea Battle” concept, the general U.S. solution to the A2/AD issue is to develop a network of integrated forces capable of defeating the enemy across all modern war fighting domains: air, sea, land, space, and cyberspace (United States Department of Defense 2013). This concept recognizes that adversary forces will likely attack without warning and forward friendly forces will be in the A2/AD environment from the outset of hostilities and must provide an immediate and effective response.

While this reflects one view of future complications, A2/AD can be defined in other ways. Howard defines these denied areas as, “regions whose nations are characterized by weak state structures” (Howard 2007, 2). While Howard approaches A2/AD from a Human Intelligence (HUMINT) standpoint, I feel his definition does not necessarily apply to much of the Middle East in a general intelligence perspective, a region characterized by many countries with weak state structure but for the most part presenting little A2/AD against the United States.

Regardless, any state operating effective A2/AD could severely hinder U.S. operations in that area, or even deter the U.S. and coalition partners from responding to aggression in the first place (Krepinevich, Watts and Work 2003). The Center for Strategic and Budgetary Assessments (CSBA) goes further with this reasoning suggesting that America may be the cause of its own A2/AD problems, 8 stemming from United States’ worldwide power projection and military pre-eminence (Krepinevich, Watts and Work 2003). This suggests that there may be issues inherent in Unites States foreign policy or other national ideals. Conversely, some may argue that the “big brother” image of America forces some nations to make significant expenditures in deterrence or self-defense, instead of possibly more offensive actions. I feel America’s current foreign policy action is creating more problems than it is solving. An aggressive and intrusive foreign policy creates more barriers and friction among other nations, seeds more conflict, and translates to increased difficulty, risk, and casualties when conflicts do erupt.

It is important to be aware that not all of the current, emerging, and evolving threats are alike— while developed and modern nation-states have returned to the forefront of attention, there will continue to be the threat of transnational terrorism. Developed countries such as Russia, China, Iran, and North Korea have considerable access to advanced missile and satellite technology permitting even regional rogue states the ability to pre-target U.S. forward bases abroad and monitor deployment activity (Krepinevich, Watts and Work 2003). By contrast, transnational terrorist cells like al-Qaeda, Taliban, and Abu Sayyaf often operate beyond political borders, blend in with the local populations, and maintain a low visibility. As such, this category of threats requires a very different approach than with nation states.

China is one of the most significant A2/AD threats at this time. China not only deters the United States from deploying into the Western Pacific, but also threatens to disrupt nearby operations such as around Taiwan or the South China Sea (McCarthy 2010). While U.S. advanced fighters and bombers have inherent advantages against China’s defenses, these aircraft are not immune and are very limited in availability. A majority of American fighters, bombers, reconnaissance aircraft, and cruise missiles remain extremely vulnerable. China’s integrated air defense system is virtually impossible to penetrate with current U.S. fourth-generation aircraft (McCarthy 2010). Furthermore, China is expected to increase 9 its threat range with the development of the S-400 missile system, extending their air defense coverage out to over 200 nautical miles (McCarthy 2010).

In 2007, China also demonstrated its ability to target and shoot down orbital satellites when it shot down one of its own. This capability could be easily carried out against U.S. satellites in a conflict, severely degrading the U.S. view into the Chinese interior. The side that can better collect, transmit, and exploit information while denying their enemy the same will be the victor in war, a term called “information dominance,” something that China has demonstrated they are well aware of (Cheng 2013). While their strategic and operational concepts are of concern, China’s tactical dimension focuses on destroying or damaging American capabilities with an array of missiles and submarines (Cheng 2013). Staying out of China’s missile envelope brings questions to the effectiveness of the upcoming F-35 with its relatively short range. Clearly, the Chinese position is one of exclusion and intent on keeping America or other adversaries away with formidable A2/AD.

Iran has a dangerous influence over one of the most important commercial choke-points in the world: the Straits of Hormuz. Iran also has a significant modern military capability and robust A2/AD network. Should all-out conflict occur with Iran, the United States has no close-in bases to operate fighters from, an important first step in modern warfare (Gunzinger and Dougherty 2011). It would be assumed that in a conflict with Iran, access to the Persian Gulf would be denied and Iran would pressure its neighbours to deny U.S. access. Launching from an airbase in Turkey or a carrier in the Arabian Sea, our closest guaranteed large-scale basing opportunities, provides only partial coverage into Iran. Iran also has a significant defensive advantage which will require detailed intelligence to counter. While their command infrastructure prevents it from combining its air defense systems into a truly integrated network, Iran’s A2/AD capabilities and strategies are considered to be similar to China’s and produce a significant threat to all U.S. ISR attempts (Gunzinger and Dougherty 2011).

Non-state actors, such as transnational terrorist organizations, can also pose a threat. Ballistic missile systems and advanced stealth fighters are not the only ways to deter enemies. The cyberspace 10 domain has become a major front in modern warfare and requires very little technology to be devastating. Cyber-information warfare, distributed denial of service attacks, malicious software, and financial/resource manipulation are only some of the effects that can severely impair a fighting force. Electro-magnetic pulse weapons can be cheaply made and be just as devastating to a modern force as the inexpensive and low-tech explosive-formed penetrators that punched through armored trucks in Iraq. High-power scramblers that disrupt global positioning systems can make UAV guidance ineffective and reduce accuracy of smart-weapons. Man-portable air defense systems are proliferated throughout the world and night-vision optics of increasing capability are reaching the consumer markets. The A2/AD issue is not limited to top-tier nations, and unconventional tactics will have to be considered as well.

A2/AD creates a new set of intelligence priorities different than what has been faced in the last decade. Future A2/AD priorities require some new considerations. According to a CSBA analyst, a “blinding campaign” or “scouting battle” will be the first and most important military move in an A2/AD confrontation (Haffa and Datla 2014). A significant change is that ISR assets, or “platforms” as they are often called, must adapt their sensing capability toward detecting A2/AD forces and networks in order to survive in these environments (Haffa and Datla 2014). Additionally, the requirement for high definition FMV with its attendant bandwidth, which has been so important over the last decade, may take a backseat to large, strategic UAVs with long-range radar, SIGINT, and EO/IR sensors and multifunction radio-frequency sensor payloads (Haffa and Datla 2014). Near the beginning of the Iraq and Afghanistan wars, the U.S. was fielding as few as four UAV “orbits” in theater; in the years that followed, this peaked to over 60 UAV orbits. The high demand of these types of assets also created a high demand of bandwidth to transmit and process the data gathered. The centralized authority, including structures and technologies, employed in this type of intelligence gathering for the U.S. “processes more than 1.3 petabytes of data a month—equivalent to 1,000 hours a day of full-motion 11 video—and better sensor technology will only add to these figures” (Schanz 2013, 24). Data management and movement are vital to operations where control of air, sea, and space is contested, according to USAF leaders (Schanz 2013).

In addition to traditional ISR aircraft, America’s most modern fighter aircraft, the F-22 and F-35, will also have to assume ISR roles well beyond the non-traditional role (Haffa and Datla 2014). Older fighter and attack aircraft operators learned the value of using targeting pods for ISR, a process called non-traditional ISR (NTISR). In the development of the newest generation of aircraft, ISR capabilities were included in the capabilities of these multi-role aircraft, with ISR collection being a dedicated role rather than an ancillary or additional one. To continue to be able to out-think our adversaries, operators will have to push these new capabilities well beyond the old NTISR TTPs into new realms to defeat and circumvent A2/AD systems. Airborne platforms are not the only way to move ISR assets over enemy territory quickly and safely. Space-based systems have been in use by the United States for over half a century. The Corona program began in 1959 and since then the U.S. has deployed vast constellations of reconnaissance satellites into orbit. While satellite reconnaissance was considered critical during the Cold War, it has not been considered a major player in recent years in the pursuit of high-value, mobile, tactical targets. 

However, space-based radar and IR collection will prove to be particularly significant for defeating A2/AD (Haffa and Datla 2014). Similar to the airborne fleet of ISR, satellite sensors and platforms require robust space-based communication networks and bandwidth in order to provide essential ISR integration (Haffa and Datla 2014). All these different assets are operated under different command structures within the IC: military service commands, civilian agencies like the Central Intelligence Agency, National Security Agency, National Reconnaissance Office, and National Geospatial-Intelligence Agency, and other contracted, partnered, or multinational forces. Whether using UAVs, manned aircraft, or orbital satellites, in working against A2/AD, the United States must pay greater attention not only to joint interoperability in the processing, exploitation, and dissemination (PED) process but also to their security (Haffa and Datla 2014).

With all these new priorities, it is reasonable to ask how the current U.S. systems measure up to new requirements. In an A2/AD environment, quickly projecting military power may hinge on the fighting forces’ ability to eliminate A2 and AD systems in the span of a few hours or days. There are considerable risks in doing so, particularly in the absence of long-range, penetrating surveillance (Krepinevich, Watts and Work 2003). High-altitude, long-endurance UAVs will play a role, but depending on the enemy’s airstrike and air-defense capability, will have to be operated carefully and be equipped with self-defense capabilities (Haffa and Datla 2014). The purpose-built ISR capabilities of the F-22 and F-35, combined with their low observability, could make them primary ISR collectors in contested airspace (Haffa and Datla 2014). 

Despite the changing environment, Lt. Gen. James said that the USAF’s force structure for ISR will not see significant change in the near term, and many of the assets used in U.S. Central Command (Middle East region) will also see a great deal of use in the Asia-Pacific region (Schanz 2013). This ignores or glosses over the fact that the joint force has yet to come to grips with the challenges and range of possible options to employ ISR platforms in contested airspace (Haffa and Datla 2014)

  1. Krepinevich, Andrew, Barry Watts, and Robert Work. Meeting the Anti-Access and Area-Denial Challenge. Washington, D.C.: Center for Strategic and Budgetary Assessments, 2003.
  2. Olson, Wyatt. "Mideast Flare-up, Budget Cuts Could Affect Pacific Pivot." Stars and Stripes. September 22, 2014. http://www.stripes.com/news/pacific/mideast-flare-up-budget-cuts-could-affect-pacificpivot-1.304295 (accessed October 15, 2014).
  3. Schanz, Marc V. "ISR after Afghanistan." Air Force Magazine: The Online Journal of the Air Force Association, January 2013: 22-27.
  4. United States Department of Defense. "Air-Sea Battle: Service Collaboration to Address Anti-Access & Area-Denial Challenge." 2013.
Publication Details:

This work is an extract from an article titled "Intelligence Operations in Denied Area by Jeff Cuddington",  VOL 2, NO 1, (2015): AT HOME AND ABROAD: Thinking Through Conflicts and Conundrums, licensed under a Creative Commons Attribution 3.0 License.  ISSN: 2377-1852

Download the Paper - LINK
    Blogger Comment
    Facebook Comment