Considerations on Countering the Actions Aimed at Banning Access and Restricting Freedom of Action (A2AD)
Each state seeks to protect its territory from external threats using a wide range of forces and means, which combine the strike power with increased possibilities of detection given by the use of modern technologies. In this regard, we can see that some states have developed complex active and pass...
Gespeichert in:
Veröffentlicht in: | Land Forces Academy review 2021-12, Vol.26 (4), p.274-281 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 281 |
---|---|
container_issue | 4 |
container_start_page | 274 |
container_title | Land Forces Academy review |
container_volume | 26 |
creator | Cîrdei, Ionuț Alin Bojor, Laviniu |
description | Each state seeks to protect its territory from external threats using a wide range of forces and means, which combine the strike power with increased possibilities of detection given by the use of modern technologies. In this regard, we can see that some states have developed complex active and passive defense systems with the purpose of banning access and controlling certain key areas and aimed at both discouraging potential aggressors and protecting vital interests. For states with regional or global ambitions, the successful conduct of access operations in the area of operations, in a permissive, semi-permissive or hostile environment must be a priority. Access operations in a semi-permissive or hostile environment involve the use of tailored capabilities to deal with the opponent’s defense system and to overcome A2AD’s abilities. |
doi_str_mv | 10.2478/raft-2021-0035 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3082681940</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3082681940</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1604-e5a83384ce441f5c14f6ca1895fc4a905fdc99d40b69e1f80e0654f3a2686b3f3</originalsourceid><addsrcrecordid>eNptkM1LAzEQxRdRsGivngNe9LB18rFpFrys1apQEETBW0izSd3SJjXZRfrfm2ULevA0j5n3ZoZfll1gmBA2FTdB2TYnQHAOQIujbERSOxcMPo7_6NNsHOMaADBMKSd0lDUz72JTm6DaJinkHZr5zrUmNG6F2k-DKj1MqmZraqRadKec64eV1iZGpFyNXk1sQ5OMqT0PxtR-i7w9RNFVRar76_PsxKpNNONDPcve5w9vs6d88fL4PKsWucYcWG4KJSgVTBvGsC00ZpZrhUVZWM1UCYWtdVnWDJa8NNgKMMALZqkiXPAltfQsuxz27oL_6tJjcu274NJJSUEkFy4ZJNdkcOngYwzGyl1otirsJQbZE5U9UdkTlT3RFLgdAt9qk-jUZhW6fRK_2_8PEs7IlNEfjOV8aQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3082681940</pqid></control><display><type>article</type><title>Considerations on Countering the Actions Aimed at Banning Access and Restricting Freedom of Action (A2AD)</title><source>Walter De Gruyter: Open Access Journals</source><source>Alma/SFX Local Collection</source><source>Sciendo</source><creator>Cîrdei, Ionuț Alin ; Bojor, Laviniu</creator><creatorcontrib>Cîrdei, Ionuț Alin ; Bojor, Laviniu</creatorcontrib><description>Each state seeks to protect its territory from external threats using a wide range of forces and means, which combine the strike power with increased possibilities of detection given by the use of modern technologies. In this regard, we can see that some states have developed complex active and passive defense systems with the purpose of banning access and controlling certain key areas and aimed at both discouraging potential aggressors and protecting vital interests. For states with regional or global ambitions, the successful conduct of access operations in the area of operations, in a permissive, semi-permissive or hostile environment must be a priority. Access operations in a semi-permissive or hostile environment involve the use of tailored capabilities to deal with the opponent’s defense system and to overcome A2AD’s abilities.</description><identifier>ISSN: 2247-840X</identifier><identifier>ISSN: 1582-6384</identifier><identifier>EISSN: 2247-840X</identifier><identifier>DOI: 10.2478/raft-2021-0035</identifier><language>eng</language><publisher>Sibiu: Sciendo</publisher><subject>Access control ; Active control ; anti-access ; area denial ; Costs ; counter ; Defense ; entry ; Military aircraft ; Military policy ; Military strategy ; operations ; Regional development</subject><ispartof>Land Forces Academy review, 2021-12, Vol.26 (4), p.274-281</ispartof><rights>Copyright Nicolae Balcescu 2021</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c1604-e5a83384ce441f5c14f6ca1895fc4a905fdc99d40b69e1f80e0654f3a2686b3f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://sciendo.com/pdf/10.2478/raft-2021-0035$$EPDF$$P50$$Gwalterdegruyter$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://sciendo.com/article/10.2478/raft-2021-0035$$EHTML$$P50$$Gwalterdegruyter$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,27924,27925,76164,76165</link.rule.ids></links><search><creatorcontrib>Cîrdei, Ionuț Alin</creatorcontrib><creatorcontrib>Bojor, Laviniu</creatorcontrib><title>Considerations on Countering the Actions Aimed at Banning Access and Restricting Freedom of Action (A2AD)</title><title>Land Forces Academy review</title><description>Each state seeks to protect its territory from external threats using a wide range of forces and means, which combine the strike power with increased possibilities of detection given by the use of modern technologies. In this regard, we can see that some states have developed complex active and passive defense systems with the purpose of banning access and controlling certain key areas and aimed at both discouraging potential aggressors and protecting vital interests. For states with regional or global ambitions, the successful conduct of access operations in the area of operations, in a permissive, semi-permissive or hostile environment must be a priority. Access operations in a semi-permissive or hostile environment involve the use of tailored capabilities to deal with the opponent’s defense system and to overcome A2AD’s abilities.</description><subject>Access control</subject><subject>Active control</subject><subject>anti-access</subject><subject>area denial</subject><subject>Costs</subject><subject>counter</subject><subject>Defense</subject><subject>entry</subject><subject>Military aircraft</subject><subject>Military policy</subject><subject>Military strategy</subject><subject>operations</subject><subject>Regional development</subject><issn>2247-840X</issn><issn>1582-6384</issn><issn>2247-840X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptkM1LAzEQxRdRsGivngNe9LB18rFpFrys1apQEETBW0izSd3SJjXZRfrfm2ULevA0j5n3ZoZfll1gmBA2FTdB2TYnQHAOQIujbERSOxcMPo7_6NNsHOMaADBMKSd0lDUz72JTm6DaJinkHZr5zrUmNG6F2k-DKj1MqmZraqRadKec64eV1iZGpFyNXk1sQ5OMqT0PxtR-i7w9RNFVRar76_PsxKpNNONDPcve5w9vs6d88fL4PKsWucYcWG4KJSgVTBvGsC00ZpZrhUVZWM1UCYWtdVnWDJa8NNgKMMALZqkiXPAltfQsuxz27oL_6tJjcu274NJJSUEkFy4ZJNdkcOngYwzGyl1otirsJQbZE5U9UdkTlT3RFLgdAt9qk-jUZhW6fRK_2_8PEs7IlNEfjOV8aQ</recordid><startdate>20211201</startdate><enddate>20211201</enddate><creator>Cîrdei, Ionuț Alin</creator><creator>Bojor, Laviniu</creator><general>Sciendo</general><general>Nicolae Balcescu</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>88F</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BYOGL</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>M1Q</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20211201</creationdate><title>Considerations on Countering the Actions Aimed at Banning Access and Restricting Freedom of Action (A2AD)</title><author>Cîrdei, Ionuț Alin ; Bojor, Laviniu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1604-e5a83384ce441f5c14f6ca1895fc4a905fdc99d40b69e1f80e0654f3a2686b3f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Active control</topic><topic>anti-access</topic><topic>area denial</topic><topic>Costs</topic><topic>counter</topic><topic>Defense</topic><topic>entry</topic><topic>Military aircraft</topic><topic>Military policy</topic><topic>Military strategy</topic><topic>operations</topic><topic>Regional development</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Cîrdei, Ionuț Alin</creatorcontrib><creatorcontrib>Bojor, Laviniu</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East Europe, Central Europe Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Military Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Land Forces Academy review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Cîrdei, Ionuț Alin</au><au>Bojor, Laviniu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Considerations on Countering the Actions Aimed at Banning Access and Restricting Freedom of Action (A2AD)</atitle><jtitle>Land Forces Academy review</jtitle><date>2021-12-01</date><risdate>2021</risdate><volume>26</volume><issue>4</issue><spage>274</spage><epage>281</epage><pages>274-281</pages><issn>2247-840X</issn><issn>1582-6384</issn><eissn>2247-840X</eissn><abstract>Each state seeks to protect its territory from external threats using a wide range of forces and means, which combine the strike power with increased possibilities of detection given by the use of modern technologies. In this regard, we can see that some states have developed complex active and passive defense systems with the purpose of banning access and controlling certain key areas and aimed at both discouraging potential aggressors and protecting vital interests. For states with regional or global ambitions, the successful conduct of access operations in the area of operations, in a permissive, semi-permissive or hostile environment must be a priority. Access operations in a semi-permissive or hostile environment involve the use of tailored capabilities to deal with the opponent’s defense system and to overcome A2AD’s abilities.</abstract><cop>Sibiu</cop><pub>Sciendo</pub><doi>10.2478/raft-2021-0035</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2247-840X |
ispartof | Land Forces Academy review, 2021-12, Vol.26 (4), p.274-281 |
issn | 2247-840X 1582-6384 2247-840X |
language | eng |
recordid | cdi_proquest_journals_3082681940 |
source | Walter De Gruyter: Open Access Journals; Alma/SFX Local Collection; Sciendo |
subjects | Access control Active control anti-access area denial Costs counter Defense entry Military aircraft Military policy Military strategy operations Regional development |
title | Considerations on Countering the Actions Aimed at Banning Access and Restricting Freedom of Action (A2AD) |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T11%3A41%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Considerations%20on%20Countering%20the%20Actions%20Aimed%20at%20Banning%20Access%20and%20Restricting%20Freedom%20of%20Action%20(A2AD)&rft.jtitle=Land%20Forces%20Academy%20review&rft.au=C%C3%AErdei,%20Ionu%C8%9B%20Alin&rft.date=2021-12-01&rft.volume=26&rft.issue=4&rft.spage=274&rft.epage=281&rft.pages=274-281&rft.issn=2247-840X&rft.eissn=2247-840X&rft_id=info:doi/10.2478/raft-2021-0035&rft_dat=%3Cproquest_cross%3E3082681940%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3082681940&rft_id=info:pmid/&rfr_iscdi=true |