The Evolution of Time Sensitive Targeting: Operation Iraqi Freedom Results and Lessons - Desert Storm, Enduring Freedom, CENTCOM Definitions, Future Trends, Adversary Focus on Asymmetric Operations

Nonfiction, History, Military, Aviation
Cover of the book The Evolution of Time Sensitive Targeting: Operation Iraqi Freedom Results and Lessons - Desert Storm, Enduring Freedom, CENTCOM Definitions, Future Trends, Adversary Focus on Asymmetric Operations by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310600920
Publisher: Progressive Management Publication: April 26, 2015
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310600920
Publisher: Progressive Management
Publication: April 26, 2015
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this study provides unique insights into battlefield targeting.

The nature of US military operations since DESERT STORM has gradually shifted from a conventional force-on-force scenario to one in which US forces likely will counter an adversary strategy of concealment, dispersal, and deception. Over the last decade, airmen at the operational and tactical levels of combat have had to adapt the US targeting cycle to accommodate targets discovered during Air Tasking Order (ATO) execution that cannot wait to be processed under the traditional 24-72 hour ATO targeting cycle. While these targets are sometimes referred to by different names among the services, the highest priority target category as defined above are Time-Sensitive Targets (TST).

The US military's successful joint development of an efficient process to Find, Fix, Track, Target, Engage, and Assess (F2T2EA) emerging battlefield targets coupled with advances in command and control automation with fused intelligence data has resulted in a significant US military capability to counter adversaries' asymmetric strategies. Predominantly from the air component's operational viewpoint, this study will trace the requirement for and evolution of the TST process beginning with the Scud hunt in the first Gulf War. It will summarize the TST progress through Operations ALLIED FORCE and ENDURING FREEDOM, and then analyze the targeting process and results refined during OIF. This analysis will cover broad operational-level results and observations, and where appropriate will note tactical level impacts on operational execution. Finally, the study will address a few of the many TST-related lessons from OIF and provide recommendations to further improve the immediate targeting process execution.

Although the OIF analysis and recommendations are based largely upon draft lessons, doctrine, and/or tactics revisions, many of the draft source documents are already being used in exercises by the USAF and joint community. Other sources for this paper include Congressional testimony, oral histories, briefings, interviews, and personal interaction with the TST Team and immediate targeting process during OIF as a CAOC Senior Offensive Duty Officer at Prince Sultan Air Base, Kingdom of Saudi Arabia.

CHAPTER 1 - INTRODUCTION * CHAPTER 2 - THE RECENT EVOLUTION OF TIME-SENSITIVE TARGETING * Environment * Operation DESERT STORM * Operation ALLIED FORCE * Operation ENDURING FREEDOM * CHAPTER 3 - TIME-SENSITIVE TARGETING IN OPERATION IRAQI FREEDOM * Post OEF Improvements * Background * OIF Force Organization * CENTCOM Target Definitions * OIF TST Execution Results * The Successes * The Problems * CHAPTER 4 - FUTURE TRENDS AND CHALLENGES * Lessons Learned Process * Fixing the Problems * Adversary Focus on Asymmetric Operations * Joint and Coalition Training * CHAPTER 5 - CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this study provides unique insights into battlefield targeting.

The nature of US military operations since DESERT STORM has gradually shifted from a conventional force-on-force scenario to one in which US forces likely will counter an adversary strategy of concealment, dispersal, and deception. Over the last decade, airmen at the operational and tactical levels of combat have had to adapt the US targeting cycle to accommodate targets discovered during Air Tasking Order (ATO) execution that cannot wait to be processed under the traditional 24-72 hour ATO targeting cycle. While these targets are sometimes referred to by different names among the services, the highest priority target category as defined above are Time-Sensitive Targets (TST).

The US military's successful joint development of an efficient process to Find, Fix, Track, Target, Engage, and Assess (F2T2EA) emerging battlefield targets coupled with advances in command and control automation with fused intelligence data has resulted in a significant US military capability to counter adversaries' asymmetric strategies. Predominantly from the air component's operational viewpoint, this study will trace the requirement for and evolution of the TST process beginning with the Scud hunt in the first Gulf War. It will summarize the TST progress through Operations ALLIED FORCE and ENDURING FREEDOM, and then analyze the targeting process and results refined during OIF. This analysis will cover broad operational-level results and observations, and where appropriate will note tactical level impacts on operational execution. Finally, the study will address a few of the many TST-related lessons from OIF and provide recommendations to further improve the immediate targeting process execution.

Although the OIF analysis and recommendations are based largely upon draft lessons, doctrine, and/or tactics revisions, many of the draft source documents are already being used in exercises by the USAF and joint community. Other sources for this paper include Congressional testimony, oral histories, briefings, interviews, and personal interaction with the TST Team and immediate targeting process during OIF as a CAOC Senior Offensive Duty Officer at Prince Sultan Air Base, Kingdom of Saudi Arabia.

CHAPTER 1 - INTRODUCTION * CHAPTER 2 - THE RECENT EVOLUTION OF TIME-SENSITIVE TARGETING * Environment * Operation DESERT STORM * Operation ALLIED FORCE * Operation ENDURING FREEDOM * CHAPTER 3 - TIME-SENSITIVE TARGETING IN OPERATION IRAQI FREEDOM * Post OEF Improvements * Background * OIF Force Organization * CENTCOM Target Definitions * OIF TST Execution Results * The Successes * The Problems * CHAPTER 4 - FUTURE TRENDS AND CHALLENGES * Lessons Learned Process * Fixing the Problems * Adversary Focus on Asymmetric Operations * Joint and Coalition Training * CHAPTER 5 - CONCLUSION

More books from Progressive Management

Cover of the book American X-Vehicles, An Inventory from X-1 to X-50 - NACA, NASA, Air Force Experimental Airplanes and Spacecraft (NASA SP-2003-4531) by Progressive Management
Cover of the book Serbia in Perspective: Orientation Guide and Serbian Cultural Orientation: Geography, History, Economy, Security, Belgrade, Novi Sad, Nis, Subotica, Dusan, Balkan Wars, Tito, Kosovo, Danube, Tisza by Progressive Management
Cover of the book 2011 Essential Guide to Nuclear Power Plants and Nuclear Energy: Reactor Designs, Safety, Emergency Preparedness, Security, Renewals, New Designs, Licensing, American Plants, Decommissioning by Progressive Management
Cover of the book Haqqani Network Financing: The Evolution of an Industry - Origins and Financial Evolution, Key Financial Personalities, Sources of Income, Pakistani Support by Progressive Management
Cover of the book 2013 National Gang Report: Street, Prison, Outlaw Motorcycle, Drug Trafficking, Organized Crime, Weapons, Explosives, Eme, Mexican Mafia, Bloods, Crips, Latin Kings, OMG, BCF, Los Zetas, Pagans by Progressive Management
Cover of the book Turkey in Perspective: Orientation Guide and Turkish Cultural Orientation: Geography, History, Economy, Security, Istanbul, Ankara, Izmir, Bursa, Kurds, Laz, Alevi, Sufism, Cemevis, Tigris, Euphrates by Progressive Management
Cover of the book The Origins of the "Golden Hour" of Medical Care and its Applicability to Combat Medicine: History of Casualty Care from World War I through Vietnam, Injury and Death in Combat, Evacuation Doctrine by Progressive Management
Cover of the book Arms Control and European Security: Major Essays on the Conventional Forces in Europe (CFE) Treaty, Azerbaijan, Armenia, Nagorno-Karabakh, Afghanistan by Progressive Management
Cover of the book The U.S. Navy's Vision For Information Dominance: Concept, Information as a Weapon, Guiding Principles, Road Map by Progressive Management
Cover of the book Operation Fast and Furious: Senate Report on the ATF Gunwalking Policy on the Southwest Border, Mexican Gun Trafficking, Death of U.S. Border Patrol Agent Brian Terry, Mexico Drug Violence by Progressive Management
Cover of the book 21st Century VA Independent Study Course: Vietnam Veterans and Agent Orange Exposure - Symptoms, Diagnosis, Medical Care for Wartime Dioxin Herbicide Exposure (Veterans Health Issues Series) by Progressive Management
Cover of the book Keeping Special Forces Special: Regional Proficiency in Special Forces (SOF) - Evolution of Commando and Warrior Diplomat Roles, Language and Culture Needs Assessment, Foreign Area Officer Standard by Progressive Management
Cover of the book 21st Century FEMA Study Course: Livestock in Disasters (IS-111) - For Farmers, Extension Agents - Cattle, Pigs, Poultry, Floods, Storms by Progressive Management
Cover of the book "We Freeze to Please" - A History of NASA's Icing Research Tunnel and the Quest for Flight Safety (NASA SP-2002-4226) by Progressive Management
Cover of the book Self-Inflicted Wounds: Debates and Divisions Within Al-Qaida and its Periphery - Osama bin Laden, Hamas, Hizballah, Muslim Brotherhood, Taliban, Salafists, Sharia Law by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy