Armed Escort for Special Air Operations - An Operational Concept, World War II, Korea, Vietnam, Order of Battle Analysis, Special Operations Forces (SOF), Helicopters, Aircraft, Electronic Combat

Nonfiction, History, Military, Vietnam War, Asian, Aviation
Cover of the book Armed Escort for Special Air Operations - An Operational Concept, World War II, Korea, Vietnam, Order of Battle Analysis, Special Operations Forces (SOF), Helicopters, Aircraft, Electronic Combat by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310145544
Publisher: Progressive Management Publication: March 22, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310145544
Publisher: Progressive Management
Publication: March 22, 2016
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this unique book study hypothesizes that armed escort is required to protect special operations lift helicopters inserting, extracting, or resupplying SOF ground teams deep in the enemy rear. It compares the escort doctrine and tactics utilized by conventional air assets with current special operations tactics in light of the rapidly increasing threat among lesser developed nations.

This study is based upon a Soviet-style, Third World threat. As the Soviet Union continues to modernize and field new air defense systems and interceptor aircraft, much of the older and some modern equipment is sold or given to allies, clients, and surrogates. The proliferation of highly capable weapons among developing nations has improved their air defenses and significantly complicated the problem of special air operations attempting clandestine penetrations.

Beginning with the historical perspective of armed escort, then examining the current and projected threat, this study concludes that armed escort is indeed required to counter the increasingly capable and proliferating air defense threat. Based upon Phase One of the Concept Based Requirements System, Concept Formulation, this thesis proposes an Operational Concept for armed escort.

The doctrine and tactics for armed escort during deep air assault and deep attack missions already exist in Army and Air Force doctrinal and tactics manuals. Conventional doctrine needs modification, though, to meet the unique requirements of clandestine penetrations 200 or more miles in depth. Part of the adjustment has to be in mindset-forcible entry is the least preferred option in most special operations Direct Action or Special Reconnaissance scenarios.

Many questions and issues raised by this study warrant further attention. Among these are electronic combat implications, appropriate mix of weapons, and training issues. The intent of this thesis, however, was to propose the initial Operational Concept within allowable classification limits and stimulate future quantitative and qualitative studies.

CHAPTER I * INTRODUCTION * CHAPTER II * REVIEW OF THE LITERATURE * Background * Concept Development System * Annotated Bibliography * Historical Perspective * Threat * Current Doctrine * Friendly Capability * CHAPTER III * METHODOLOGY * CHAPTER IV * HISTORICAL PERSPECTIVE * World War II * Korea * Vietnam * Summary/Lessons Learned * CHAPTER V * ORDER OF BATTLE ANALYSIS * What Kind of Fights? * Threat * Technology * Current Doctrine * Friendly Capability * Summary * CHAPTER VI * CONCLUSION & RECOMMENDATIONS * Introduction * Conclusion * An Operational Concept * Other Considerations * Recommendations * Areas for Further Study

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this unique book study hypothesizes that armed escort is required to protect special operations lift helicopters inserting, extracting, or resupplying SOF ground teams deep in the enemy rear. It compares the escort doctrine and tactics utilized by conventional air assets with current special operations tactics in light of the rapidly increasing threat among lesser developed nations.

This study is based upon a Soviet-style, Third World threat. As the Soviet Union continues to modernize and field new air defense systems and interceptor aircraft, much of the older and some modern equipment is sold or given to allies, clients, and surrogates. The proliferation of highly capable weapons among developing nations has improved their air defenses and significantly complicated the problem of special air operations attempting clandestine penetrations.

Beginning with the historical perspective of armed escort, then examining the current and projected threat, this study concludes that armed escort is indeed required to counter the increasingly capable and proliferating air defense threat. Based upon Phase One of the Concept Based Requirements System, Concept Formulation, this thesis proposes an Operational Concept for armed escort.

The doctrine and tactics for armed escort during deep air assault and deep attack missions already exist in Army and Air Force doctrinal and tactics manuals. Conventional doctrine needs modification, though, to meet the unique requirements of clandestine penetrations 200 or more miles in depth. Part of the adjustment has to be in mindset-forcible entry is the least preferred option in most special operations Direct Action or Special Reconnaissance scenarios.

Many questions and issues raised by this study warrant further attention. Among these are electronic combat implications, appropriate mix of weapons, and training issues. The intent of this thesis, however, was to propose the initial Operational Concept within allowable classification limits and stimulate future quantitative and qualitative studies.

CHAPTER I * INTRODUCTION * CHAPTER II * REVIEW OF THE LITERATURE * Background * Concept Development System * Annotated Bibliography * Historical Perspective * Threat * Current Doctrine * Friendly Capability * CHAPTER III * METHODOLOGY * CHAPTER IV * HISTORICAL PERSPECTIVE * World War II * Korea * Vietnam * Summary/Lessons Learned * CHAPTER V * ORDER OF BATTLE ANALYSIS * What Kind of Fights? * Threat * Technology * Current Doctrine * Friendly Capability * Summary * CHAPTER VI * CONCLUSION & RECOMMENDATIONS * Introduction * Conclusion * An Operational Concept * Other Considerations * Recommendations * Areas for Further Study

More books from Progressive Management

Cover of the book 21st Century Oil Spill Cleanup: Best Practices for Migratory Bird Care During Oil Spill Response by Progressive Management
Cover of the book Endgame in the Pacific: Complexity, Strategy, and the B-29 - World War II Technological Solution to Attacking Japan, Bomber's Unintended Consequences in Chaos, Atomic Bombing of Hiroshima, Nagasaki by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Combat Service Support Operations - Theater Army Area Command - FM 63-4 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Generals of the Ardennes: American Leadership in the Battle of the Bulge - World War II Malmedy Massacre, 7th Armored, Eisenhower, Bradley, Patton, Bastogne, Heroes and Victims, Defense of St. Vith by Progressive Management
Cover of the book FEMA U.S. Fire Administration Strategies for Marketing Your Fire Department: Today and Beyond by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Vulvar Cancer - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Militarized Maneuver Terrorism: Case Studies from Beslan Russia, Mumbai India, and Nairobi Kenya, Highly Trained Terrorists Executing Coordinated Attacks Substantively Different Than Active Shooters by Progressive Management
Cover of the book Afghanistan: Federal Research Study and Country Profile with Comprehensive Information, History, and Analysis - Taliban, War, Terrorism, History, Politics, Economy by Progressive Management
Cover of the book Would the U.S. Benefit from a Unified National Strategy to Combat Violent Salafi Jihadism (VSJ)? Foundational Understanding of Islam, Sunni and Shia, Terrorism Insufficient to Describe Threat by Progressive Management
Cover of the book Addressing Urgent Cyber Threats to Critical Infrastructure: Report of the President's National Infrastructure Advisory Council - Innovative Recommendations Including Creation of Dark Fiber Network by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Apollo 9 Official NASA Mission Reports and Press Kit - 1969 First Manned Flight of the Lunar Module in Earth Orbit by McDivitt, Scott, and Schweickart by Progressive Management
Cover of the book Lessons Encountered: Learning from the Long War - Afghanistan and Iraq, Taliban, al-Qaeda, Hillary Clinton, President Bush, Cheney, Petraeus, Powell, Rice, Obama, Saddam Hussein, Historical Timelines by Progressive Management
Cover of the book Cold War Infrastructure for Strategic Air Command (SAC): The Bomber Mission - Hangars, Command Posts, Major Commands, B-36, B-47, and B-52, Sixteen Air Force Bases from Barksdale to Whiteman by Progressive Management
Cover of the book 2011 Complete Guide to IEDs: Improvised Explosive Devices: Enemy Tactics, Roadside Bombs, Counter-IED Targeting, Defeat the Device, Programs, Technologies, Afghanistan, Iraq, JIEDDO by Progressive Management
Cover of the book The Evolution of Time Sensitive Targeting: Operation Iraqi Freedom Results and Lessons - Desert Storm, Enduring Freedom, CENTCOM Definitions, Future Trends, Adversary Focus on Asymmetric Operations by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy