The Evolution of Time Sensitive Targeting: Operation Iraqi Freedom Results and Lessons - Desert Storm, Enduring Freedom, CENTCOM Definitions, Future Trends, Adversary Focus on Asymmetric Operations

Nonfiction, History, Military, Aviation
Cover of the book The Evolution of Time Sensitive Targeting: Operation Iraqi Freedom Results and Lessons - Desert Storm, Enduring Freedom, CENTCOM Definitions, Future Trends, Adversary Focus on Asymmetric Operations by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310600920
Publisher: Progressive Management Publication: April 26, 2015
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310600920
Publisher: Progressive Management
Publication: April 26, 2015
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this study provides unique insights into battlefield targeting.

The nature of US military operations since DESERT STORM has gradually shifted from a conventional force-on-force scenario to one in which US forces likely will counter an adversary strategy of concealment, dispersal, and deception. Over the last decade, airmen at the operational and tactical levels of combat have had to adapt the US targeting cycle to accommodate targets discovered during Air Tasking Order (ATO) execution that cannot wait to be processed under the traditional 24-72 hour ATO targeting cycle. While these targets are sometimes referred to by different names among the services, the highest priority target category as defined above are Time-Sensitive Targets (TST).

The US military's successful joint development of an efficient process to Find, Fix, Track, Target, Engage, and Assess (F2T2EA) emerging battlefield targets coupled with advances in command and control automation with fused intelligence data has resulted in a significant US military capability to counter adversaries' asymmetric strategies. Predominantly from the air component's operational viewpoint, this study will trace the requirement for and evolution of the TST process beginning with the Scud hunt in the first Gulf War. It will summarize the TST progress through Operations ALLIED FORCE and ENDURING FREEDOM, and then analyze the targeting process and results refined during OIF. This analysis will cover broad operational-level results and observations, and where appropriate will note tactical level impacts on operational execution. Finally, the study will address a few of the many TST-related lessons from OIF and provide recommendations to further improve the immediate targeting process execution.

Although the OIF analysis and recommendations are based largely upon draft lessons, doctrine, and/or tactics revisions, many of the draft source documents are already being used in exercises by the USAF and joint community. Other sources for this paper include Congressional testimony, oral histories, briefings, interviews, and personal interaction with the TST Team and immediate targeting process during OIF as a CAOC Senior Offensive Duty Officer at Prince Sultan Air Base, Kingdom of Saudi Arabia.

CHAPTER 1 - INTRODUCTION * CHAPTER 2 - THE RECENT EVOLUTION OF TIME-SENSITIVE TARGETING * Environment * Operation DESERT STORM * Operation ALLIED FORCE * Operation ENDURING FREEDOM * CHAPTER 3 - TIME-SENSITIVE TARGETING IN OPERATION IRAQI FREEDOM * Post OEF Improvements * Background * OIF Force Organization * CENTCOM Target Definitions * OIF TST Execution Results * The Successes * The Problems * CHAPTER 4 - FUTURE TRENDS AND CHALLENGES * Lessons Learned Process * Fixing the Problems * Adversary Focus on Asymmetric Operations * Joint and Coalition Training * CHAPTER 5 - CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this study provides unique insights into battlefield targeting.

The nature of US military operations since DESERT STORM has gradually shifted from a conventional force-on-force scenario to one in which US forces likely will counter an adversary strategy of concealment, dispersal, and deception. Over the last decade, airmen at the operational and tactical levels of combat have had to adapt the US targeting cycle to accommodate targets discovered during Air Tasking Order (ATO) execution that cannot wait to be processed under the traditional 24-72 hour ATO targeting cycle. While these targets are sometimes referred to by different names among the services, the highest priority target category as defined above are Time-Sensitive Targets (TST).

The US military's successful joint development of an efficient process to Find, Fix, Track, Target, Engage, and Assess (F2T2EA) emerging battlefield targets coupled with advances in command and control automation with fused intelligence data has resulted in a significant US military capability to counter adversaries' asymmetric strategies. Predominantly from the air component's operational viewpoint, this study will trace the requirement for and evolution of the TST process beginning with the Scud hunt in the first Gulf War. It will summarize the TST progress through Operations ALLIED FORCE and ENDURING FREEDOM, and then analyze the targeting process and results refined during OIF. This analysis will cover broad operational-level results and observations, and where appropriate will note tactical level impacts on operational execution. Finally, the study will address a few of the many TST-related lessons from OIF and provide recommendations to further improve the immediate targeting process execution.

Although the OIF analysis and recommendations are based largely upon draft lessons, doctrine, and/or tactics revisions, many of the draft source documents are already being used in exercises by the USAF and joint community. Other sources for this paper include Congressional testimony, oral histories, briefings, interviews, and personal interaction with the TST Team and immediate targeting process during OIF as a CAOC Senior Offensive Duty Officer at Prince Sultan Air Base, Kingdom of Saudi Arabia.

CHAPTER 1 - INTRODUCTION * CHAPTER 2 - THE RECENT EVOLUTION OF TIME-SENSITIVE TARGETING * Environment * Operation DESERT STORM * Operation ALLIED FORCE * Operation ENDURING FREEDOM * CHAPTER 3 - TIME-SENSITIVE TARGETING IN OPERATION IRAQI FREEDOM * Post OEF Improvements * Background * OIF Force Organization * CENTCOM Target Definitions * OIF TST Execution Results * The Successes * The Problems * CHAPTER 4 - FUTURE TRENDS AND CHALLENGES * Lessons Learned Process * Fixing the Problems * Adversary Focus on Asymmetric Operations * Joint and Coalition Training * CHAPTER 5 - CONCLUSION

More books from Progressive Management

Cover of the book Stopping Mass Killings in Africa: Genocide, Airpower, and Intervention - Somalia, Rwanda, Hutus and Tutsis, Ivory Coast by Progressive Management
Cover of the book 21st Century Peacekeeping and Stability Operations Institute (PKSOI) Papers - Ground Truth in Building Human Security - Land Rights, Cadastres and Cadastral Systems, Land Tenure, USAID by Progressive Management
Cover of the book Marines in the Korean War Commemorative Series: Fire Brigade - U.S. Marines in the Pusan Perimeter, Pershing Medium Tank, North Korean Tank, Vought F4 Corsair, General Gates, Sikorsky Helicopter by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Salivary Gland Cancer - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book The Evolving Role of Foreign Direct Investment (FDI) in China from 1978 Onward - Early Flow into Textiles, Followed by Telecommunications and Currently Automobiles, Information, and Semiconductors by Progressive Management
Cover of the book NASA Human Spaceflight Astronaut Health Research for Exploration and Manned Mars Missions, Risk Report WSN-07, Human Computer Interaction, Task Design, Injury from Dynamic Loads, Food System Illness by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force Aircrew Training, Aircrew Standardization / Evaluation Program Instructions by Progressive Management
Cover of the book Qatar: Federal Research Study with Comprehensive Information, History, and Analysis - Politics, Economy, Military by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Weapons of Mass Destruction (WMD) Civil Support Team Operations - Field Manual 3-11.22 - Threats, Delivery Systems (Professional Format Series) by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Red Horse Program (Air Force Instruction 10-209) - Rapid Engineer Deployable Heavy Operational Repair Squadron Engineers, Mobile Heavy Engineering by Progressive Management
Cover of the book Essential Guide to Sexual Assault and Rape: Campus and College Student Victimization, Not Alone: White House Task Force to Protect Students From Sexual Assault, Alcohol on Campus by Progressive Management
Cover of the book Battle-Wise: Seeking Time-Information Superiority in Networked Warfare - Defeating Adversaries, Cognitive Demands, Integrating Intuition and Reasoning, Battle Wisdom from Firepower to Brainpower by Progressive Management
Cover of the book 21st Century FEMA Study Course: Emergency Operations Center (EOC) Management and Operations (IS-775) - NIMS, ICS, MAC Group, Joint Information System (JIS), Coordination by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Therapeutics III - Respiratory System, Cardiovascular and Lymphatic Systems, Cardiac Drugs, Vasodilators, Urogenital, Antihypertensive Agents by Progressive Management
Cover of the book Were They Prepared? Escape and Evasion in Western Europe, 1942-1944: World War II Army Air Force Aircrew Training for Successful Rescue and Survival Behind Enemy Lines by Thousands by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy