Operation Epic Fury served as the first large-scale combat test of Joint All-Domain Command and Control — the Pentagon's vision for connecting every sensor and every shooter across all military domains into a single, integrated network. The concept, debated and developed for years in Pentagon conference rooms, met the real world over Iran.
The JADC2 Vision
Traditional military command follows a hierarchical chain: a sensor detects a target, reports to its command center, which requests engagement authority, which tasks a weapon system, which executes the strike. Each handoff adds minutes or hours. Against time-sensitive targets — a mobile missile launcher that relocates every 30 minutes — this sequential process is too slow.
JADC2 collapses this chain by creating a networked web where any sensor can share targeting data directly with any shooter, with automated systems handling deconfliction and fire control calculations. The goal: reduce the kill chain from hours to minutes, or even seconds.
The system rests on three pillars:
- Sensors: Satellites, reconnaissance drones (RQ-4, MQ-9, MQ-4C), fighter radar (F-35 APG-81), AWACS (E-3, E-7), ground stations
- Network: Advanced Battle Management System (ABMS), Link 16, MADL, satellite communications, and cloud processing
- Shooters: Any platform capable of delivering weapons — fighters, bombers, ships, submarines, ground-based launchers
Time-Sensitive Targeting: The Mobile TEL Problem
Iran's most dangerous retaliatory weapon was the mobile transporter-erector-launcher carrying Shahab-3 and Emad ballistic missiles. These TELs dispersed from garrison before the first strikes and operated from pre-surveyed launch points across Iran's road network. Destroying them required detecting, identifying, and engaging each TEL before it could launch and relocate — a problem the US had failed to solve during the 1991 Gulf War's "Scud hunt."
JADC2 transformed the TEL hunt. The kill chain operated as follows:
- Detection: Space-based infrared sensors or RQ-4 Global Hawk radar imagery detected a TEL deploying at a launch site
- Identification: AI-assisted image recognition confirmed the target as a ballistic missile TEL rather than a decoy or civilian vehicle
- Tasking: ABMS automatically identified the nearest available strike asset — perhaps an F-15E on a nearby combat air patrol or a submarine with Tomahawk missiles
- Engagement: Targeting data was transmitted directly to the shooter, which released weapons within minutes of initial detection
This compressed kill chain reduced engagement timelines from the hours that characterized Desert Storm to single-digit minutes in some Epic Fury engagements. While not every TEL was caught, the success rate was dramatically higher than any previous conflict.
The ABMS Backbone
The Air Force's Advanced Battle Management System served as the primary data-sharing network for JADC2 in the Iran theater. ABMS connected:
- F-35 sensor data with Navy Aegis combat systems for integrated air and missile defense
- Space-based missile warning with THAAD and Patriot fire control units for faster intercept timelines
- Submarine-launched Tomahawk targeting updates from airborne sensors providing real-time coordinates
- B-1B JASSM targeting data from RQ-4 and MQ-9 surveillance feeds
The system processed enormous volumes of data — satellite imagery, radar tracks, signals intelligence, and human intelligence reports — using cloud-based servers that filtered and prioritized information for decision-makers at every level.
Integration with Allies
Extending JADC2 to coalition partners proved one of the campaign's biggest challenges. Israeli forces operated their own sophisticated C2 network that needed to exchange data with US systems for deconfliction and cooperative targeting. UK and Saudi Arabian forces used different data link standards. Building bridges between these networks required custom gateway solutions and, in some cases, human liaison officers manually relaying information.
The F-35's Multifunction Advanced Data Link (MADL) provided a secure, stealthy communication path between US and Israeli F-35s operating in the same airspace. This link enabled cooperative targeting — one F-35 detecting a threat and another engaging it — without broadcasting on traditional radio frequencies that Iran could intercept.
Limitations Exposed
JADC2 in Epic Fury was not the seamless, fully automated system envisioned in Pentagon briefings. Several limitations emerged:
- Bandwidth: Satellite communication links saturated during peak operations, forcing prioritization of data feeds
- Interoperability: Legacy systems (E-3 AWACS, older Arleigh Burke-class ships) required software patches to participate in ABMS
- Human bottlenecks: Despite automation, human decision-makers in the loop added latency to time-sensitive engagements
- Cyber vulnerability: The network itself became a target for Iranian cyber operations attempting to inject false data or degrade connectivity
Despite these growing pains, JADC2's performance in Epic Fury represented a generational leap over previous conflicts. The ability to compress kill chains, share sensor data across services, and coordinate multi-domain fires in near-real-time gave the coalition a decisive advantage that no amount of Iranian courage or tactical skill could overcome.
The Data Advantage
At its core, JADC2 created an unprecedented information advantage. US and coalition forces operated with a comprehensive, continuously updated picture of the battlespace that Iranian forces could not match. Every Iranian radar emission was detected and geolocated. Every vehicle movement on major roads was tracked. Every radio transmission was intercepted and analyzed. This omniscient awareness — while not perfect — meant that Iranian commanders operated in a fog of war while coalition commanders operated in relative clarity.
The data advantage proved most decisive in missile defense. When Iranian ballistic missiles launched, the entire defensive chain — from space-based detection through ground-based intercept — operated as an integrated system rather than a collection of independent batteries. This integration, enabled by JADC2's data-sharing architecture, produced intercept rates that exceeded pre-war modeling and demonstrated the transformative potential of genuinely networked military operations.