Reference document

Title
JISR Exploitation Process
Description

The Joint Intelligence, Surveillance and Reconnaissance (JISR) Exploitation Process takes full advantage of any information that has come to hand for tactical or strategic purposes. ISR exploiters analyze processed data and extract information to determine its significance. The final product is created according to the customer’s requirement.

Level
7
emUUID
e3c0b16f-4b7a-44c4-a6a5-2a0de17bff7f
Parent
Joint ISR Processes