Chapter
DOD DEVELOPED AN ELECTRONIC WARFARE STRATEGY, BUT ONLY PARTIALLY ADDRESSED KEY DESIRABLE STRATEGY CHARACTERISTICS
DOD HAS NOT ESTABLISHED AN EFFECTIVE DEPARTMENTWIDE GOVERNANCE FRAMEWORK FOR MANAGING AND OVERSEEING ELECTRONIC WARFARE
DOD Actions Have Not Fully Addressed a Critical Leadership Gap
DOD Policy Documents Have Not been Updated to Include All Oversight Roles and Responsibilities for Electronic Warfare
DOD May Face Challenges in Its Oversight of the Evolving Relationship of Electronic Warfare and Cyberspace Operations
RECOMMENDATIONS FOR EXECUTIVE ACTION
AGENCY COMMENTS AND OUR EVALUATION
APPENDIX I. SCOPE AND METHODOLOGY
APPENDIX II. DESIRABLE STRATEGY CHARACTERISTICS
Chapter 2 AIRBORNE ELECTRONIC ATTACK: ACHIEVING MISSION OBJECTIVES DEPENDS ON OVERCOMING ACQUISITION CHALLENGES∗
DOD STRATEGY TO LOWER COSTS ALSO REDUCED SYNERGY AMONG SYSTEMS
Airborne Electronic Attack Acquisition Strategy Has Evolved
Existing Airborne Electronic Attack Systems Face Capability Limitations and Sustainment Challenges
ACQUISITIONS MAY NOT PRODUCE SUFFICIENT RESULTS
Investments in New Airborne Electronic Attack Systems Have Yielded Mixed Results to Date
Some Programs Are Progressing Well
Some Programs Are Underperforming
Planned Systems May Offer Capabilities That Overlap, Presenting Opportunities to Consolidate Acquisition Efforts
Potential Overlap among Irregular Warfare Systems Driven by Service-Specific Solutions to Urgent Warfighting Needs
Navy and Air Force Have Not Agreed on a Common Decoy Solution
Leadership Deficiencies Undermine the Department’s Ability to Reduce Overlap
Planned Systems Will Not Fully Address Capability Gaps
IMPROVEMENTS TO TACTICS, TECHNIQUES, AND PROCEDURES AND INVESTMENTS IN SCIENCE AND TECHNOLOGY ARE HELPING TO BRIDGE GAPS
Changing Tactics, Techniques, and Procedures for Existing Systems Can Mitigate Gaps in the Near Term
DOD Focusing Science and Technology Investments to Close Gaps in the Long Term, but Coordination Remains a Concern
RECOMMENDATIONS FOR EXECUTIVE ACTION
AGENCY COMMENTS AND OUR EVALUATION
APPENDIX I. SCOPE AND METHODOLOGY
APPENDIX II. ANALYSES OF SELECT AIRBORNE ELECTRONIC ATTACK SYSTEMS