Figure 6.1: Intelligence Cycle and JISR process within C-UAS. Then, once a threat is identified, JISR also needs to continuously accompany and support every single line of effort within the C-UAS Methodology. Because of this, the intelligence cycle and the JISR process have to start even before the described C-UAS Methodology comes into play. Although these vectors are not always predictable with absolute certainty, JISR can provide probabilities if a threat exists and how it could evolve, so C-UAS measures can be planned and developed accordingly. A prerequisite to successfully apply this method are defined threat vectors. 76) comprises a broad range, from deterrence to neutralization, and from preventive to reactive countermeasures. This chapter will also highlight how JISR can support UAS related threat assessments at all levels and it provides an outlook of potential future challenges regarding JISR. This chapter discusses the role of Joint Intelligence, Surveillance, and Reconnaissance (JISR) in support of countering Unmanned Aircraft Systems (UAS) and the essential contributions of the different intelligence collection disciplines throughout all phases of the C-UAS methodology described in the previous Chapter.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |