Latest News:  


Report on U.S. Military Power 2012 (21)

(People's Daily Online)

10:56, July 19, 2013

4. Basic Principles of Joint Operational Access Concept

To deal with A2/AD threats and ensure access into operational areas, Joint Operational Access Concept describes the following 11 guiding principles: a. conduct operations to gain access based on the requirements of the broader mission, while planning subsequent operations to lessen access challenges; b. prepare the operational area in advance to facilitate access; c. consider a variety of basing options; d. seize the initiative by deploying and operating on multiple, independent lines of operations; e. exploit advantages in one or more domains to disrupt enemy A2/AD capabilities in others; f. disrupt enemy reconnaissance and surveillance efforts while protecting friendly efforts; g. create pockets or corridors of local domain superiority to penetrate the enemy’s defenses and maintain them as required to accomplish the mission; h. maneuver directly against key operational objectives from strategic distance; i. attack enemy A2/AD defenses in depth rather than rolling back those defenses from the perimeter; j. maximize surprise through deception, stealth, and ambiguity to complicate enemy targeting; k. protect space and cyber assets while attacking the enemy’s space and cyber capabilities.

5. Development of Eight Categories of 30 Capabilities Required by Joint Operational Access

To tackle A2/AD threats, DoD calls on the development of 30 capabilities classified into eight categories, namely, command and control, including the following five capabilities: reliable connectivity and interoperability among major warfighting headquarters, effective command and control in a degraded communications environment, the ability to integrate cross-domain operations, situational awareness across the domains, and task-based command; intelligence, including the following three capabilities: to detect and respond to hostile computer network attack, to conduct timely and accurate cross-domain all-source intelligence fusion, and the ability to develop all categories of intelligence in any necessary domain; fires, including the following four capabilities: to locate, target, and suppress or neutralize hostile A2/AD capabilities while limiting collateral damage, to deter, disrupt or destroy enemy systems, to conduct electronic attack and computer network attack, and to interdict enemy forces and materiel; movement and maneuver, including the following five capabilities: to conduct operational maneuver along multiple axes of advance, to gain entry into hostile digital networks, to conduct en route rehearsal and assembly of deploying forces, to conduct forcible entry operations, and to mask the approach of joint maneuver elements; protection, including the following six capabilities: to defeat enemy targeting systems, to provide missile defense, to protect and reconstitute bases and other infrastructure, to protect forces and supplies, to protect friendly space forces, and to conduct cyber defense; sustainment, including the following three capabilities: to deploy, employ, and sustain forces, to establish nonstandard support mechanisms, to manage and integrate contractors; information: the ability to inform and influence selected audiences; engagement, including the following three capabilities: to share capabilities to ensure access and advance long-term regional stability, to secure basing, navigation, and overflight rights, and to provide training, supplies, equipment, and other assistance to regional partners.

【1】 【2】 【3】 【4】 【5】 【6】 【7】 【8】 【9】 【10】
【11】 【12】 【13】 【14】 【15】 【16】 【17】 【18】 【19】 【20】
【21】 【22】 【23】 【24】 【25】 【26】 【27】 【28】 【29】 【30】
【31】 【32】 【33】 【34】 【35】 【36】 【37】

We Recommend:

Seaplanes of North Sea Fleet in training at sea

Aviation regiment of South Sea Fleet in flight training

Naval landing ships can perform diverse military tasks

Military training base improves teaching mode

14th Chinese naval escort taskforce arrives in Pakistan

Chinese navy's Su-30MKK2 fighters in attack training

Email|Print|Comments(Editor:YanMeng、Yao Chun)

Related Reading

Leave your comment0 comments

  1. Name


Selections for you

  1. Special operation forces hold competition

  2. HK Youth Military Summer Camp opens

  3. Chicago hits 100 degrees Fahrenheit high

  4. Birds flying over waters off Xisha Islands

  5. In'l Exhibition on Public Safety & Security

  6. Blasting scene above barrier lake

  7. A tribute to Chinese and Indian dulcimers

  8. ESMOD fashion school graduation show

  9. The foreign dairy conundrum in China

  10. Cross-sea bridge to be open in E China

Most Popular


  1. China's foreign investment policy not changing
  2. ADB economist 'optimistic' on China economy
  3. What are so-called 'eight facts' of the Philippines?
  4. US surveillance program clouds US-European ties
  5. Abe's anti-China machinations doomed to fail
  6. China's recent slowdown not hard landing
  7. U.S. experts optimistic about China's growth
  8. Harmony is the theme of China's ocean strategy
  9. It is right time to invest in China
  10. Two-way fluctuation essential for RMB reform

What’s happening in China

Charger shock for iPhone user

  1. China to launch cargo train to Germany
  2. Locals evacuated from flooded village in Fujian
  3. Human-trafficking gangs cracked in E China
  4. Qingdao eatery finds use for pesky seaweed
  5. Beijing clamps down on apartment group rentals