Historia wymaga pasterzy, nie rzeźników.

HUMINT is also a key enabler of airpower in the strike role. Commanders require the best possible intelligence about a target and its surrounding area when considering an air strike. With proper placement and access to a target, a HUMINT source can often provide the most accurate target data. Details might include optimum strike times, detailed descriptions of the surrounding area, and the presence of sensitive sites like hospitals, churches, and mosques. Target data can include other important factors for collateral damage considerations. Poststrike HUMINT sources equipped with a cell phone, radio, or camera can provide an initial battle damage assessment in near real time. With a thorough debriefing, the HUMINT source can provide an accurate assessment of the functional and psychological effects achieved on the target.
Commanders can use this information to assess restrike options.
AIR AND SPACE INFORMATION OPERATIONS
E−12. Air and space forces have information operations (IO) capabilities that include collecting, controlling, exploiting, and protecting information. To make IO most effective, commanders should seamlessly integrate it among all Service components. Air and space forces contribute to the execution of three IO missions:
Influence operations.

Electronic warfare.

Network operations.

223
The U.S. Army and Marine Corps Counterinsurgency Field Manual E−13. Air and space forces conduct and support many influence operations. These operations include the following:
Counterpropaganda.

Psychological operations.

Military deception.

Operations security.

Counterintelligence.

Public affairs (a related activity of IO).

Commanders must preplan and deconflict these activities to ensure success.
E−14. Airpower and spacepower also contribute to information superiority through electronic warfare operations. Air and space assets are critical in the effort to shape, exploit, and degrade the enemy's electronic devices while protecting and enhancing those of counterinsurgents. The electronic warfare spectrum is not limited to radio frequencies; it includes the optical and infrared regions as well.
E−15. In this context, network operation s are activities conducted to operate and defend the Global Information Grid (JP 1−02). Commanders enhance these operations by using air and space systems. Such tools help achieve desired effects across the interconnected analog and digital network portions of the Global Information Grid.
HIGH−TECHNOLOGY ASSETS
E−16. Today's high−technology air and space systems have proven their worth in COIN operations.
Unmanned aircraft systems, such as the Predator, give counterinsurgents unprecedented capabilities in surveil−lance and target acquisition. Aerial surveillance platforms with long loiter times can place an entire region under constant surveillance. Tactical air control parties now provide ground commanders beyond−line−of− sight awareness with ROVER (remote operations video enhanced receiver), which links to aircraft targeting pods and unmanned aircraft systems. Predators have been equipped with precision munitions and successfully employed in the strike role against senior terrorist leaders. Air− and space−based SIGINT
platforms give U.S. forces and multinational partners important information collection capabilities. Modern munitions, such as the joint direct attack munition, can guide accurately through clouds and bad weather to destroy insurgent targets under adverse conditions.
LOW−TECHNOLOGY ASSETS
E−17. Today's low−technology aspects of airpower have also proven effective in COIN operations. Light, slow, inexpensive civilian aircraft often have successfully patrolled border areas. In the 1980s, Guatemala mobilized its civilian light aircraft, formed them into an air force reserve, and used them to patrol main roads 224

Podstrony