StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Unmanned Aircraft Systems in the Global War on Terrorism - Research Paper Example

Cite this document
Summary
The paper "Unmanned Aircraft Systems in the Global War on Terrorism" highlights that many view the current trend as the “backlash against modernization” and consider it as a resistance to the “global spread (or imposition) of values of Western market democracies” (Lia 2005, 2). …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Unmanned Aircraft Systems in the Global War on Terrorism
Read Text Preview

Extract of sample "Unmanned Aircraft Systems in the Global War on Terrorism"

Intelligence Collection in the Modern Day: Unmanned Aircraft Systems (UAS) in the Global War on Terrorism In the modern day, human beings have become a highly sophisticated species mainly due to the advent of technology. However, along with the improvement in the quality of life and the comforts that technology offers, they also have to deal with several challenges. One of the most significant of such challenges is the threat of global terrorism, which has grown to unprecedented proportions in the recent days. Therefore, it has become an absolute priority for nations across the world to fight this menace with all their might so as to ensure the security and welfare of the citizens. Proper intelligence is an inevitable component of the defense system of all governments in the world to evaluate the threat by external as well as internal elements and to protect their countries from exposure to attacks by terrorists. In this context, the development of technology is a crucial factor for enabling nations to monitor and exercise surveillance over the activities of various organizations that sponsor and promote terrorism and other subversive activities. Intelligence collection is a process of “collection, processing, integration, evaluation, analysis and interpretation of available information concerning foreign nations, hostile or potentially hostile forces or elements or areas of actual or potential operations” (Forcese 2011, 181). For obtaining such intelligence and to ensure the safety of their citizens, countries deploy modern technology. The effective collection of intelligence by the US government through Unmanned Aircraft System has enabled the country to attain a high level of operational success in the global war on terror. Human history, right from its initial stage has evidenced the use of human intelligence for the purpose of obtaining the movements of their enemies for preparing for offensive tactics in wars. Similarly, in order to fight terrorism, countries also need to collect intelligence on various terrorist organizations and evaluate their strategies for offensives to properly counter the problem of terrorism. In his message to war fighters, Joseph Reynes Jr., Major General USAF, states that proper surveillance can facilitate the “prediction of an adversary’s behavior and the formulation and execution of preemptive activities to deter or forestall” offensive attempts by such adversaries (Commander’s Handbook for Persistent Surveillance 2011). This handbook has been developed with an intention to provide an overview of the present systems of surveillance as well as discusses future needs for persistent surveillance and can be a valuable for defense personnel involved in the process of intelligence collection. It further delineates the responsibilities of the Joint Force Operations Staff and Commanders. Recent attacks by terrorists such as 9/11 and the attack in Mumbai, India, indicate that militants use technology and innovative strategies to wreak terror on the public mind. Thus, in order to counter such offensive, the security forces as well as governments will have to include “persistent surveillance” as a part of intelligence “collection management doctrine and training” (VII-4). For this process to be effective in the modern context, they will also have to deploy appropriate technology. The successful planning and execution of all military operations depend on the ready availability of information on various aspects of the adversary through intelligence, surveillance and reconnaissance (ISR). ISR can be discerned as a process of collecting, processing, and disseminating “accurate and timely information that provides the battlespace awareness necessary” for the successful planning and conducting of operations (Intelligence, Surveillance and Reconnaissance Operations 1999, 1). ISR is also a significant ingredient of nonmilitary operations for providing near real time (NRT) “information critical to assessing the current situation directly to on-site commander” (7). The Air Force Doctrine Document 2-5.2 further provides a detailed description of planning, tasking and analyzing and applying the collected data for the purpose of offensives. This can be useful for people who intend to understand the whole process of intelligence collection and its application in military and nonmilitary operations. The availability of intelligence is not only significant in waging war on terrorism but also for defense purposes. For example, China’s emergence as strong economy enables it to expand its military by deploying sophisticated technology including the “ability to place an astronaut in the orbit” (Intelligence and the National Security Environment 2004, 7). Thus, it becomes a priority to keep a tag on the country so that it does not intervene in any way with the US prerogatives as “China becomes “more independent and capable of influencing the course of international affairs” (7). Since 9/11, the concept of intelligence has changed totally and acquired the highest significance in the safety of American citizens. To combat the menace of terrorism, the country needs a “workforce equipped with unified standards of excellence” that is trained to understand the importance of the intelligence they obtain, in safeguarding their country (9). This document has clearly delineated the relevance of intelligence collection to the US in the present day both in terms of defense as well as economic perspectives and also points out future focus. In the present day, the US government deploys high end technology for the purpose of intelligence collection, to ensure that the country receives appropriate and timely information to secure its defense positions. In a research paper, Agate and Sullivan speaks about developing a “particle filtering algorithm which tracks ground targets in a road constrained environment (Agate & Sullivan n.d., 2). This document illustrates the step by step procedure and calculation and claims that this tool can be used for “tracking ground targets when constrained to travel on a road network” (10). Similarly, in another article, Andrew P Brown, Kevin J Sullivan and David J Miller proposes an Image Plane Tracker (IPT), which can track objects as well as people which can “assist operators and commanders in most effectively utilizing the video platform assets and achieving their mission objectives” (Brown, Sullivan & Miller n.d., 1). The authors further claim that this device can be used to detect “foreground objects” as well as to measure “their positions” (6). Thus, this can be deployed as a valuable and effective tool in tracking the movement of targeted vehicles or persons. The authors clearly demonstrate the scope, functioning and use of this device with an illustration of the algorithm behind its design and the article provides a highly comprehensive knowledge about the device. Yet another research paper coauthored by Gaemus E Collins, Chris Stankevitz and Jeffrey Liese delineates the algorithm of Sensor Guided Flight (SGF) and illustrates how this device tracks a “moving target to maintain persistent surveillance” (Collins, Stankevitz & Liese n.d., 3). The authors further contend that despite some limitations of the device such as “limited speed, maneuverability, and sensing capabilities” it can attain “99% eyes on target” when used in a Unicorn UAS (11). The article clearly illustrates the processes with the use of diagrams and calculations and the information can be highly useful for people involved in the collection of intelligence. An overview of the above articles clearly establish the fact that the devices discussed therein can be potential tools in aerial surveillance for obtaining intelligence both in the War of Terror and well as national defense. Terrorism in the modern day, especially after the tragedy of 9/11, has become the most threatening issue for nations across the world. Many view the current trend as the “backlash against modernization” and consider it as a resistance to the “global spread (or imposition) of values of Western market democracies” (Lia 2005, 2). In a scenario when terrorists receive funds from several sponsor nations and acquire the capability to use modern technology and human talent, it becomes a prerogative of countries to combat the menace using highly sophisticated technology and skilled workforce. Aerial surveillance, deploying appropriate technology can go a long way in effectively countering the global threat of terrorism and can render immense aid to the Global War on Terrorism as it will facilitate persistent surveillance of suspected targets round the clock. Taking cognizance of the situation, the Department of Defense (DoD) has “spent about $67 billion on ISR since 9/11” with the objectives of improving the collection of intelligence, surveillance and the process of reconnaissance (Performance Audit of Department of Defense Intelligence, Surveillance and Reconnaissance 2012, iv). This signifies the extent of concern of the American government over the issue of terrorism. In this context, devices such as dynamic sensors as proposed by Kevin J Sullivan, Craig S Agate and Harry L Burger in their article will be highly relevant. The authors contend that the “dynamic sensor-tasking algorithm” that they created can “follow targets through multiple move-stop cycles” and it can facilitate better performance than a “preplanned sensor tasking strategy” (Sullivan, Agate & Burger 2002, 20). It, therefore, transpires that modern technology offers a lot of options for intelligence collection and if these tools are appropriately deployed along with properly trained human resources, the US defense system can effectively counter the menace of terrorism. Reference List Adair, J.T. & Hamel, L. 2009. Optimizing Deadly Persistence in Kandahar: Armed UAV Integration in the Joint Tactical Fight. US Army and Marine Corps Counterinsurgency Center. http://www.army.forces.gc.ca/caj/documents/vol_13/iss_1/CAJ_vol13.1_11_e.pdf (accessed January 1, 2012). Agate, Craig S. and Sullivan, Kevin J. n.d. Particle Filtering Algorithm for Tracking Multiple Road-Constrained Targets. Toyon Research Corporation. http://www.toyon.com/downloads/isr_pubs/Agate-SPIE03b.pdf (accessed January 1, 2012). Brown, Andrew P. Sullivan, Kevin J. and Miller, David J. n.d. Feature-Aided Multiple Target Tracking in the Image Plan. Toyon Research Corporation. http://www.toyon.com/downloads/isr_pubs/Brown-SPIE06.pdf (accessed January 1, 2012). Commander’s Handbook for Persistent Surveillance. 2011. United States Joined Forces Command. http://www.dtic.mil/doctrine/doctrine/jwfc/surveillance_hbk.pdf (accessed January 1, 2012). Collins, Gaemus. E. Stankevitz, Chris and Liese, Jeffrey. n.d. Implementation of a Sensor Guided Flight Algorithm for Target Tracking by Small UAS. Toyon Research Corporation. http://www.toyon.com/downloads/isr_pubs/Collins-SPIE11.pdf (accessed January 1, 2012). Forcese, Craig. 2011. Spies without Borders: International Law and Intelligence Collection. http://jnslp.com/wp-content/uploads/2011/06/05_Forceses.pdf (accessed January 1, 2012). Intelligence, Surveillance, and Reconnaissance Operations. 1999. United States Air Force. http://www.fas.org/man/dod-101/usaf/docs/afdd/afdd2-5-2.pdf (accessed January 1, 2012). Intelligence and the New National Security Environment. 2004. AFCEA International. http://www.afcea.org/mission/intel/documents/innse.pdf (accessed January 1, 2012). Lia, Brynjar. 2005. Globalization and Future of Terrorism: Patterns and Predictions. Routledge. http://books.google.co.in/books?id=MstL1miFg7YC&pg=PA242&dq=Unmanned+Aircraft+Systems+in+the+War+against+Terrorism+pdf&hl=en#v=onepage&q=Unmanned%20Aircraft%20Systems%20in%20the%20War%20against%20Terrorism%20pdf&f=false (accessed January 1, 2012). Performance Audit of Department of Defense Intelligence, Surveillance, and Reconnaissance. 2012. House Permanent Select Committee on Intelligence. http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/ISRPerformanceAudit%20Final.pdf (accessed January 1, 2012). Sullivan, Kevin J. Agate, Craig S. and Burger, Harry L. 2002. Allocation of Radar Resources to Maximize Tracker Information. Toyon Research Corporation. http://www.toyon.com/downloads/isr_pubs/Sullivan-NSSF02.pdf (accessed January 1, 2012). Unmanned Aircraft Systems: Advance Coordination and Increased Visibility Needed to Optimize Capabilities. 2007. GAO. http://www.gao.gov/new.items/d07836.pdf (accessed January 1, 2012). Unmanned Aircraft Systems Roadmap. n.d. Department of Defense United States of America. https://www.fas.org/irp/program/collect/uav_roadmap2005.pdf (accessed January 1, 2012). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research topic related to intelligence collection Paper”, n.d.)
Research topic related to intelligence collection Paper. Retrieved from https://studentshare.org/miscellaneous/1612327-research-topic-related-to-intelligence-collection
(Research Topic Related to Intelligence Collection Paper)
Research Topic Related to Intelligence Collection Paper. https://studentshare.org/miscellaneous/1612327-research-topic-related-to-intelligence-collection.
“Research Topic Related to Intelligence Collection Paper”, n.d. https://studentshare.org/miscellaneous/1612327-research-topic-related-to-intelligence-collection.
  • Cited: 0 times

CHECK THESE SAMPLES OF Unmanned Aircraft Systems in the Global War on Terrorism

Analyse the Impact of the Changing Strategic Environment on delivery of Air Power

Air power has been increasingly attaining the status of the most primary option to respond to the bulk of the global crises, which range from relief activities to theatre wars.... Some of these threats include not only international war and conflict but also the local violence, well planned crime, terrorism and weapons of mass destruction.... war for acquisition of land is directly related to the necessity of providing food for a nation or a group....
24 Pages (6000 words) Essay

AirPower: Unmanned Aerial Vehicles

UAVs were first used extensively to conduct reconnaissance missions during the Vietnam war.... During this war, UAV was a leading-edge intelligence-gathering tool.... During the Vietnam war, the U.... After the war, UAVs provided surveillance over areas of China, North Vietnam, and the Far East that were too dangerous for manned aircraft.... fter the Vietnam war, the U.... Department of Defense began to develop a new UAV that would be free from many shortcomings exhibited by UAVs during the war....
11 Pages (2750 words) Essay

Money Laundering and Smuggling: Border Control and National Security

In conclusion, one of the greatest threats to our national security is terrorism.... This essay describes the present risk, that is a combination of drug smuggling into the US and the profits are used to finance the purchase of weapons, money laundering, biological and chemical weapons, and the transport of illegal aliens across the bordersof the United States today....
9 Pages (2250 words) Essay

MILITARY TRANSFORMATION BETWEEN WWII AND THE GLOBAL WAR ON TERRORISM

At the same time, the terrorism has started showing its negative impact in all corners of the world.... The major challenge before all nations including US is terrorism.... he growing extent of global terrorism in the recent years led to change in US military style and structure.... US military transformation was witnessed in World war II and in post World war periods.... US military has also undergone significant transformation in these two centuries in general and post World war II period in particular (Flinor Sloan, 2008)....
5 Pages (1250 words) Essay

Affliction in the Land East of the Atlantic

-bound aircraft via advanced designs and concealment methods.... In the research paper 'Affliction in the Land East of the Atlantic' the author analyzes some measures proposed by the United States government that could help deal with the terrorist threat such as the use of Smart ID cards and some biometric devices....
26 Pages (6500 words) Thesis Proposal

Every Act of Terrorism is a Wrongful Act

This essay "Every Act of terrorism is a Wrongful Act" dwells on the history of terrorism, the major terrorists in the world, reasons why the terrorists make the lives of people miserable, acts of terrorism that affect the people and recommendations to stop terrorism.... Prior to the 9/11 attacks, the subject of terrorism did not loom so big in philosophical discussions.... Philosophical literature contributed to just a few monographs, as well as a single collection of paper devoted largely to issues to do with terrorism (Chaliand & Blin 2007, p....
14 Pages (3500 words) Essay

Money Laundering and Smuggling: Border Control and National Security

The researcher also pays attention to the growing threat of terrorism raised as one of the consequences of the above-mentioned problems.... Before the age of terrorism, the major threat to national security was framed as an attack from military action.... After September 11, 2001, the threat of terrorism became the number one concern of the nation's security....
9 Pages (2250 words) Essay

Globalization and Resistance Media Journal

ince the global financial crisis, there has been a reduction in the supply of oil into the market (Ruppert 2009).... It was estimated that peak oil started in 2005 and would be boosted by the oil production from Iraq during the Iraq war.... he fact that global car manufacturers are closing their factories in Australia is a worrying trend for globalization.... In fact, the low supply of oil does not encourage global integration because it impedes free transport which would facilitate integration....
28 Pages (7000 words) Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us