The Evolution of Time Sensitive Targeting: Operation Iraqi Freedom Results and Lessons - Desert Storm, Enduring Freedom, CENTCOM Definitions, Future Trends, Adversary Focus on Asymmetric Operations

Nonfiction, History, Military, Aviation
Cover of the book The Evolution of Time Sensitive Targeting: Operation Iraqi Freedom Results and Lessons - Desert Storm, Enduring Freedom, CENTCOM Definitions, Future Trends, Adversary Focus on Asymmetric Operations by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310600920
Publisher: Progressive Management Publication: April 26, 2015
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310600920
Publisher: Progressive Management
Publication: April 26, 2015
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this study provides unique insights into battlefield targeting.

The nature of US military operations since DESERT STORM has gradually shifted from a conventional force-on-force scenario to one in which US forces likely will counter an adversary strategy of concealment, dispersal, and deception. Over the last decade, airmen at the operational and tactical levels of combat have had to adapt the US targeting cycle to accommodate targets discovered during Air Tasking Order (ATO) execution that cannot wait to be processed under the traditional 24-72 hour ATO targeting cycle. While these targets are sometimes referred to by different names among the services, the highest priority target category as defined above are Time-Sensitive Targets (TST).

The US military's successful joint development of an efficient process to Find, Fix, Track, Target, Engage, and Assess (F2T2EA) emerging battlefield targets coupled with advances in command and control automation with fused intelligence data has resulted in a significant US military capability to counter adversaries' asymmetric strategies. Predominantly from the air component's operational viewpoint, this study will trace the requirement for and evolution of the TST process beginning with the Scud hunt in the first Gulf War. It will summarize the TST progress through Operations ALLIED FORCE and ENDURING FREEDOM, and then analyze the targeting process and results refined during OIF. This analysis will cover broad operational-level results and observations, and where appropriate will note tactical level impacts on operational execution. Finally, the study will address a few of the many TST-related lessons from OIF and provide recommendations to further improve the immediate targeting process execution.

Although the OIF analysis and recommendations are based largely upon draft lessons, doctrine, and/or tactics revisions, many of the draft source documents are already being used in exercises by the USAF and joint community. Other sources for this paper include Congressional testimony, oral histories, briefings, interviews, and personal interaction with the TST Team and immediate targeting process during OIF as a CAOC Senior Offensive Duty Officer at Prince Sultan Air Base, Kingdom of Saudi Arabia.

CHAPTER 1 - INTRODUCTION * CHAPTER 2 - THE RECENT EVOLUTION OF TIME-SENSITIVE TARGETING * Environment * Operation DESERT STORM * Operation ALLIED FORCE * Operation ENDURING FREEDOM * CHAPTER 3 - TIME-SENSITIVE TARGETING IN OPERATION IRAQI FREEDOM * Post OEF Improvements * Background * OIF Force Organization * CENTCOM Target Definitions * OIF TST Execution Results * The Successes * The Problems * CHAPTER 4 - FUTURE TRENDS AND CHALLENGES * Lessons Learned Process * Fixing the Problems * Adversary Focus on Asymmetric Operations * Joint and Coalition Training * CHAPTER 5 - CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this study provides unique insights into battlefield targeting.

The nature of US military operations since DESERT STORM has gradually shifted from a conventional force-on-force scenario to one in which US forces likely will counter an adversary strategy of concealment, dispersal, and deception. Over the last decade, airmen at the operational and tactical levels of combat have had to adapt the US targeting cycle to accommodate targets discovered during Air Tasking Order (ATO) execution that cannot wait to be processed under the traditional 24-72 hour ATO targeting cycle. While these targets are sometimes referred to by different names among the services, the highest priority target category as defined above are Time-Sensitive Targets (TST).

The US military's successful joint development of an efficient process to Find, Fix, Track, Target, Engage, and Assess (F2T2EA) emerging battlefield targets coupled with advances in command and control automation with fused intelligence data has resulted in a significant US military capability to counter adversaries' asymmetric strategies. Predominantly from the air component's operational viewpoint, this study will trace the requirement for and evolution of the TST process beginning with the Scud hunt in the first Gulf War. It will summarize the TST progress through Operations ALLIED FORCE and ENDURING FREEDOM, and then analyze the targeting process and results refined during OIF. This analysis will cover broad operational-level results and observations, and where appropriate will note tactical level impacts on operational execution. Finally, the study will address a few of the many TST-related lessons from OIF and provide recommendations to further improve the immediate targeting process execution.

Although the OIF analysis and recommendations are based largely upon draft lessons, doctrine, and/or tactics revisions, many of the draft source documents are already being used in exercises by the USAF and joint community. Other sources for this paper include Congressional testimony, oral histories, briefings, interviews, and personal interaction with the TST Team and immediate targeting process during OIF as a CAOC Senior Offensive Duty Officer at Prince Sultan Air Base, Kingdom of Saudi Arabia.

CHAPTER 1 - INTRODUCTION * CHAPTER 2 - THE RECENT EVOLUTION OF TIME-SENSITIVE TARGETING * Environment * Operation DESERT STORM * Operation ALLIED FORCE * Operation ENDURING FREEDOM * CHAPTER 3 - TIME-SENSITIVE TARGETING IN OPERATION IRAQI FREEDOM * Post OEF Improvements * Background * OIF Force Organization * CENTCOM Target Definitions * OIF TST Execution Results * The Successes * The Problems * CHAPTER 4 - FUTURE TRENDS AND CHALLENGES * Lessons Learned Process * Fixing the Problems * Adversary Focus on Asymmetric Operations * Joint and Coalition Training * CHAPTER 5 - CONCLUSION

More books from Progressive Management

Cover of the book Training to Fight: Training and Education During the Cold War - Pentomic Era, Korean War, Vietnam War, Top Gun Miramar, Coverage of Training Facilities Listed by State by Progressive Management
Cover of the book 21st Century Geothermal Energy: A History of Geothermal Energy Research and Development in the United States - Volume 4 - Energy Conversion 1976-2006 by Progressive Management
Cover of the book 21st Century Behcet's Disease Sourcebook: Clinical Data for Patients, Families, and Physicians - Diagnosis, Testing, Treatment, Drugs, Uveitis, Vasculitis and Related Autoimmune Diseases by Progressive Management
Cover of the book Reclamation: Managing Water in the West - The Bureau of Reclamation: From Developing to Managing Water, 1945-2000, Volume 2 - Part 1: Hells Canyon, Columbia, Utah, Arizona, Fish versus Dams by Progressive Management
Cover of the book Getting To Know the President: CIA Briefings of Presidential Candidates, 1952-1992 - Truman, Eisenhower, Kennedy, Johnson, Nixon, Ford, Carter, Reagan, Bush, Clinton by Progressive Management
Cover of the book History of the Joint Chiefs of Staff: The War in Vietnam 1969-1970 - Nixon Takes Over, Atrocities, Invasion of Cambodia, Vietnamization and Pacification, PHOENIX Program, Ho Chi Minh by Progressive Management
Cover of the book Orienting Our Sights on the Future: Opportunities and Challenges of the Arab Revolts - Arab Spring, Syria, Libya, Turkey, Egypt by Progressive Management
Cover of the book National Defense Intelligence College Paper: Learning With Professionals - Selected Works from the Joint Military Intelligence College - Spying as Depicted in Movies, Spy Fiction, Clancy, LeCarre by Progressive Management
Cover of the book 21st Century FEMA Study Course: NIMS Communications and Information Management (IS-704) - Interoperability, Mutual Aid and Assistance, Exercises, Scenarios by Progressive Management
Cover of the book Evolution of Aircraft Carriers: The History of U.S. Navy Carriers, USS Langley, Early Tests and Developments, World War II and Beyond by Progressive Management
Cover of the book Diversity within the Joint Team: Understanding the Different Operational Perspectives of the Army and Air Force, Clashing Perspectives and Shared Domains, Joint Test in Operation Desert Storm by Progressive Management
Cover of the book Religious Roots: Moral Judgment in American Policy - Methods of Evaluating Policy Historically Scarce and Insufficient, Philosophical Roots, All Policy Is Faith-Based by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Merkel Cell Carcinoma (MCC) - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Irregular Warfare - Air Force Policy Directive 10-42 - Counterterrorism, Unconventional Warfare, Foreign Internal Defense, Counterinsurgency by Progressive Management
Cover of the book With Marines in Operation Provide Comfort: Humanitarian Operations in Northern Iraq, 1991 - Kurds, Saddam Hussein, Incirlik Air Base, Camp Sommers, Zakho, Gallant Provider, Kurdish Relief Efforts by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy