Considerations on Countering the Actions Aimed at Banning Access and Restricting Freedom of Action (A2AD)

Each state seeks to protect its territory from external threats using a wide range of forces and means, which combine the strike power with increased possibilities of detection given by the use of modern technologies. In this regard, we can see that some states have developed complex active and pass...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Land Forces Academy review 2021-12, Vol.26 (4), p.274-281
Hauptverfasser: Cîrdei, Ionuț Alin, Bojor, Laviniu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 281
container_issue 4
container_start_page 274
container_title Land Forces Academy review
container_volume 26
creator Cîrdei, Ionuț Alin
Bojor, Laviniu
description Each state seeks to protect its territory from external threats using a wide range of forces and means, which combine the strike power with increased possibilities of detection given by the use of modern technologies. In this regard, we can see that some states have developed complex active and passive defense systems with the purpose of banning access and controlling certain key areas and aimed at both discouraging potential aggressors and protecting vital interests. For states with regional or global ambitions, the successful conduct of access operations in the area of operations, in a permissive, semi-permissive or hostile environment must be a priority. Access operations in a semi-permissive or hostile environment involve the use of tailored capabilities to deal with the opponent’s defense system and to overcome A2AD’s abilities.
doi_str_mv 10.2478/raft-2021-0035
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3082681940</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3082681940</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1604-e5a83384ce441f5c14f6ca1895fc4a905fdc99d40b69e1f80e0654f3a2686b3f3</originalsourceid><addsrcrecordid>eNptkM1LAzEQxRdRsGivngNe9LB18rFpFrys1apQEETBW0izSd3SJjXZRfrfm2ULevA0j5n3ZoZfll1gmBA2FTdB2TYnQHAOQIujbERSOxcMPo7_6NNsHOMaADBMKSd0lDUz72JTm6DaJinkHZr5zrUmNG6F2k-DKj1MqmZraqRadKec64eV1iZGpFyNXk1sQ5OMqT0PxtR-i7w9RNFVRar76_PsxKpNNONDPcve5w9vs6d88fL4PKsWucYcWG4KJSgVTBvGsC00ZpZrhUVZWM1UCYWtdVnWDJa8NNgKMMALZqkiXPAltfQsuxz27oL_6tJjcu274NJJSUEkFy4ZJNdkcOngYwzGyl1otirsJQbZE5U9UdkTlT3RFLgdAt9qk-jUZhW6fRK_2_8PEs7IlNEfjOV8aQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3082681940</pqid></control><display><type>article</type><title>Considerations on Countering the Actions Aimed at Banning Access and Restricting Freedom of Action (A2AD)</title><source>Walter De Gruyter: Open Access Journals</source><source>Alma/SFX Local Collection</source><source>Sciendo</source><creator>Cîrdei, Ionuț Alin ; Bojor, Laviniu</creator><creatorcontrib>Cîrdei, Ionuț Alin ; Bojor, Laviniu</creatorcontrib><description>Each state seeks to protect its territory from external threats using a wide range of forces and means, which combine the strike power with increased possibilities of detection given by the use of modern technologies. In this regard, we can see that some states have developed complex active and passive defense systems with the purpose of banning access and controlling certain key areas and aimed at both discouraging potential aggressors and protecting vital interests. For states with regional or global ambitions, the successful conduct of access operations in the area of operations, in a permissive, semi-permissive or hostile environment must be a priority. Access operations in a semi-permissive or hostile environment involve the use of tailored capabilities to deal with the opponent’s defense system and to overcome A2AD’s abilities.</description><identifier>ISSN: 2247-840X</identifier><identifier>ISSN: 1582-6384</identifier><identifier>EISSN: 2247-840X</identifier><identifier>DOI: 10.2478/raft-2021-0035</identifier><language>eng</language><publisher>Sibiu: Sciendo</publisher><subject>Access control ; Active control ; anti-access ; area denial ; Costs ; counter ; Defense ; entry ; Military aircraft ; Military policy ; Military strategy ; operations ; Regional development</subject><ispartof>Land Forces Academy review, 2021-12, Vol.26 (4), p.274-281</ispartof><rights>Copyright Nicolae Balcescu 2021</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c1604-e5a83384ce441f5c14f6ca1895fc4a905fdc99d40b69e1f80e0654f3a2686b3f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://sciendo.com/pdf/10.2478/raft-2021-0035$$EPDF$$P50$$Gwalterdegruyter$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://sciendo.com/article/10.2478/raft-2021-0035$$EHTML$$P50$$Gwalterdegruyter$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,27924,27925,76164,76165</link.rule.ids></links><search><creatorcontrib>Cîrdei, Ionuț Alin</creatorcontrib><creatorcontrib>Bojor, Laviniu</creatorcontrib><title>Considerations on Countering the Actions Aimed at Banning Access and Restricting Freedom of Action (A2AD)</title><title>Land Forces Academy review</title><description>Each state seeks to protect its territory from external threats using a wide range of forces and means, which combine the strike power with increased possibilities of detection given by the use of modern technologies. In this regard, we can see that some states have developed complex active and passive defense systems with the purpose of banning access and controlling certain key areas and aimed at both discouraging potential aggressors and protecting vital interests. For states with regional or global ambitions, the successful conduct of access operations in the area of operations, in a permissive, semi-permissive or hostile environment must be a priority. Access operations in a semi-permissive or hostile environment involve the use of tailored capabilities to deal with the opponent’s defense system and to overcome A2AD’s abilities.</description><subject>Access control</subject><subject>Active control</subject><subject>anti-access</subject><subject>area denial</subject><subject>Costs</subject><subject>counter</subject><subject>Defense</subject><subject>entry</subject><subject>Military aircraft</subject><subject>Military policy</subject><subject>Military strategy</subject><subject>operations</subject><subject>Regional development</subject><issn>2247-840X</issn><issn>1582-6384</issn><issn>2247-840X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptkM1LAzEQxRdRsGivngNe9LB18rFpFrys1apQEETBW0izSd3SJjXZRfrfm2ULevA0j5n3ZoZfll1gmBA2FTdB2TYnQHAOQIujbERSOxcMPo7_6NNsHOMaADBMKSd0lDUz72JTm6DaJinkHZr5zrUmNG6F2k-DKj1MqmZraqRadKec64eV1iZGpFyNXk1sQ5OMqT0PxtR-i7w9RNFVRar76_PsxKpNNONDPcve5w9vs6d88fL4PKsWucYcWG4KJSgVTBvGsC00ZpZrhUVZWM1UCYWtdVnWDJa8NNgKMMALZqkiXPAltfQsuxz27oL_6tJjcu274NJJSUEkFy4ZJNdkcOngYwzGyl1otirsJQbZE5U9UdkTlT3RFLgdAt9qk-jUZhW6fRK_2_8PEs7IlNEfjOV8aQ</recordid><startdate>20211201</startdate><enddate>20211201</enddate><creator>Cîrdei, Ionuț Alin</creator><creator>Bojor, Laviniu</creator><general>Sciendo</general><general>Nicolae Balcescu</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>88F</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BYOGL</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>M1Q</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20211201</creationdate><title>Considerations on Countering the Actions Aimed at Banning Access and Restricting Freedom of Action (A2AD)</title><author>Cîrdei, Ionuț Alin ; Bojor, Laviniu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1604-e5a83384ce441f5c14f6ca1895fc4a905fdc99d40b69e1f80e0654f3a2686b3f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Active control</topic><topic>anti-access</topic><topic>area denial</topic><topic>Costs</topic><topic>counter</topic><topic>Defense</topic><topic>entry</topic><topic>Military aircraft</topic><topic>Military policy</topic><topic>Military strategy</topic><topic>operations</topic><topic>Regional development</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Cîrdei, Ionuț Alin</creatorcontrib><creatorcontrib>Bojor, Laviniu</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East Europe, Central Europe Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Military Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Land Forces Academy review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Cîrdei, Ionuț Alin</au><au>Bojor, Laviniu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Considerations on Countering the Actions Aimed at Banning Access and Restricting Freedom of Action (A2AD)</atitle><jtitle>Land Forces Academy review</jtitle><date>2021-12-01</date><risdate>2021</risdate><volume>26</volume><issue>4</issue><spage>274</spage><epage>281</epage><pages>274-281</pages><issn>2247-840X</issn><issn>1582-6384</issn><eissn>2247-840X</eissn><abstract>Each state seeks to protect its territory from external threats using a wide range of forces and means, which combine the strike power with increased possibilities of detection given by the use of modern technologies. In this regard, we can see that some states have developed complex active and passive defense systems with the purpose of banning access and controlling certain key areas and aimed at both discouraging potential aggressors and protecting vital interests. For states with regional or global ambitions, the successful conduct of access operations in the area of operations, in a permissive, semi-permissive or hostile environment must be a priority. Access operations in a semi-permissive or hostile environment involve the use of tailored capabilities to deal with the opponent’s defense system and to overcome A2AD’s abilities.</abstract><cop>Sibiu</cop><pub>Sciendo</pub><doi>10.2478/raft-2021-0035</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2247-840X
ispartof Land Forces Academy review, 2021-12, Vol.26 (4), p.274-281
issn 2247-840X
1582-6384
2247-840X
language eng
recordid cdi_proquest_journals_3082681940
source Walter De Gruyter: Open Access Journals; Alma/SFX Local Collection; Sciendo
subjects Access control
Active control
anti-access
area denial
Costs
counter
Defense
entry
Military aircraft
Military policy
Military strategy
operations
Regional development
title Considerations on Countering the Actions Aimed at Banning Access and Restricting Freedom of Action (A2AD)
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T11%3A41%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Considerations%20on%20Countering%20the%20Actions%20Aimed%20at%20Banning%20Access%20and%20Restricting%20Freedom%20of%20Action%20(A2AD)&rft.jtitle=Land%20Forces%20Academy%20review&rft.au=C%C3%AErdei,%20Ionu%C8%9B%20Alin&rft.date=2021-12-01&rft.volume=26&rft.issue=4&rft.spage=274&rft.epage=281&rft.pages=274-281&rft.issn=2247-840X&rft.eissn=2247-840X&rft_id=info:doi/10.2478/raft-2021-0035&rft_dat=%3Cproquest_cross%3E3082681940%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3082681940&rft_id=info:pmid/&rfr_iscdi=true