JADC2 in the Iran Theater

United States October 15, 2025 4 min read

Operation Epic Fury served as the first large-scale combat test of Joint All-Domain Command and Control — the Pentagon's vision for connecting every sensor and every shooter across all military domains into a single, integrated network. The concept, debated and developed for years in Pentagon conference rooms, met the real world over Iran.

The JADC2 Vision

Traditional military command follows a hierarchical chain: a sensor detects a target, reports to its command center, which requests engagement authority, which tasks a weapon system, which executes the strike. Each handoff adds minutes or hours. Against time-sensitive targets — a mobile missile launcher that relocates every 30 minutes — this sequential process is too slow.

JADC2 collapses this chain by creating a networked web where any sensor can share targeting data directly with any shooter, with automated systems handling deconfliction and fire control calculations. The goal: reduce the kill chain from hours to minutes, or even seconds.

The system rests on three pillars:

Time-Sensitive Targeting: The Mobile TEL Problem

Iran's most dangerous retaliatory weapon was the mobile transporter-erector-launcher carrying Shahab-3 and Emad ballistic missiles. These TELs dispersed from garrison before the first strikes and operated from pre-surveyed launch points across Iran's road network. Destroying them required detecting, identifying, and engaging each TEL before it could launch and relocate — a problem the US had failed to solve during the 1991 Gulf War's "Scud hunt."

JADC2 transformed the TEL hunt. The kill chain operated as follows:

This compressed kill chain reduced engagement timelines from the hours that characterized Desert Storm to single-digit minutes in some Epic Fury engagements. While not every TEL was caught, the success rate was dramatically higher than any previous conflict.

The ABMS Backbone

The Air Force's Advanced Battle Management System served as the primary data-sharing network for JADC2 in the Iran theater. ABMS connected:

The system processed enormous volumes of data — satellite imagery, radar tracks, signals intelligence, and human intelligence reports — using cloud-based servers that filtered and prioritized information for decision-makers at every level.

Integration with Allies

Extending JADC2 to coalition partners proved one of the campaign's biggest challenges. Israeli forces operated their own sophisticated C2 network that needed to exchange data with US systems for deconfliction and cooperative targeting. UK and Saudi Arabian forces used different data link standards. Building bridges between these networks required custom gateway solutions and, in some cases, human liaison officers manually relaying information.

The F-35's Multifunction Advanced Data Link (MADL) provided a secure, stealthy communication path between US and Israeli F-35s operating in the same airspace. This link enabled cooperative targeting — one F-35 detecting a threat and another engaging it — without broadcasting on traditional radio frequencies that Iran could intercept.

Limitations Exposed

JADC2 in Epic Fury was not the seamless, fully automated system envisioned in Pentagon briefings. Several limitations emerged:

Despite these growing pains, JADC2's performance in Epic Fury represented a generational leap over previous conflicts. The ability to compress kill chains, share sensor data across services, and coordinate multi-domain fires in near-real-time gave the coalition a decisive advantage that no amount of Iranian courage or tactical skill could overcome.

The Data Advantage

At its core, JADC2 created an unprecedented information advantage. US and coalition forces operated with a comprehensive, continuously updated picture of the battlespace that Iranian forces could not match. Every Iranian radar emission was detected and geolocated. Every vehicle movement on major roads was tracked. Every radio transmission was intercepted and analyzed. This omniscient awareness — while not perfect — meant that Iranian commanders operated in a fog of war while coalition commanders operated in relative clarity.

The data advantage proved most decisive in missile defense. When Iranian ballistic missiles launched, the entire defensive chain — from space-based detection through ground-based intercept — operated as an integrated system rather than a collection of independent batteries. This integration, enabled by JADC2's data-sharing architecture, produced intercept rates that exceeded pre-war modeling and demonstrated the transformative potential of genuinely networked military operations.

Frequently Asked Questions

What is JADC2?

Joint All-Domain Command and Control (JADC2) is the Pentagon's concept for connecting sensors and shooters across all domains — air, land, sea, space, and cyber — into a unified network. It enables any sensor to feed targeting data to any weapon system, dramatically compressing the time from detection to engagement.

How did JADC2 perform in Epic Fury?

JADC2 enabled kill chains as short as single-digit minutes for time-sensitive targets like mobile missile launchers. Satellite and drone sensors could pass targeting data directly to nearby strike aircraft or naval platforms through the ABMS network, bypassing traditional hierarchical command channels.

What is ABMS?

The Advanced Battle Management System is the Air Force's contribution to JADC2. It serves as a cloud-based data-sharing network that connects sensors (satellites, aircraft, ground stations) with shooters (fighters, bombers, ships, ground-based launchers) across all services.

Related Intelligence Topics

Kill Chain Explained THAAD Missile Defense System Patriot PAC-3 Missile Defense Tomahawk Cruise Missile JASSM-ER Stealth Cruise Missile F-35I Adir Profile
JADC2United Statescommand and controlkill chainsensor-to-shooterABMSIran