The Evolution of Time Sensitive Targeting: Operation Iraqi Freedom Results and Lessons - Desert Storm, Enduring Freedom, CENTCOM Definitions, Future Trends, Adversary Focus on Asymmetric Operations

Nonfiction, History, Military, Aviation
Cover of the book The Evolution of Time Sensitive Targeting: Operation Iraqi Freedom Results and Lessons - Desert Storm, Enduring Freedom, CENTCOM Definitions, Future Trends, Adversary Focus on Asymmetric Operations by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310600920
Publisher: Progressive Management Publication: April 26, 2015
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310600920
Publisher: Progressive Management
Publication: April 26, 2015
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this study provides unique insights into battlefield targeting.

The nature of US military operations since DESERT STORM has gradually shifted from a conventional force-on-force scenario to one in which US forces likely will counter an adversary strategy of concealment, dispersal, and deception. Over the last decade, airmen at the operational and tactical levels of combat have had to adapt the US targeting cycle to accommodate targets discovered during Air Tasking Order (ATO) execution that cannot wait to be processed under the traditional 24-72 hour ATO targeting cycle. While these targets are sometimes referred to by different names among the services, the highest priority target category as defined above are Time-Sensitive Targets (TST).

The US military's successful joint development of an efficient process to Find, Fix, Track, Target, Engage, and Assess (F2T2EA) emerging battlefield targets coupled with advances in command and control automation with fused intelligence data has resulted in a significant US military capability to counter adversaries' asymmetric strategies. Predominantly from the air component's operational viewpoint, this study will trace the requirement for and evolution of the TST process beginning with the Scud hunt in the first Gulf War. It will summarize the TST progress through Operations ALLIED FORCE and ENDURING FREEDOM, and then analyze the targeting process and results refined during OIF. This analysis will cover broad operational-level results and observations, and where appropriate will note tactical level impacts on operational execution. Finally, the study will address a few of the many TST-related lessons from OIF and provide recommendations to further improve the immediate targeting process execution.

Although the OIF analysis and recommendations are based largely upon draft lessons, doctrine, and/or tactics revisions, many of the draft source documents are already being used in exercises by the USAF and joint community. Other sources for this paper include Congressional testimony, oral histories, briefings, interviews, and personal interaction with the TST Team and immediate targeting process during OIF as a CAOC Senior Offensive Duty Officer at Prince Sultan Air Base, Kingdom of Saudi Arabia.

CHAPTER 1 - INTRODUCTION * CHAPTER 2 - THE RECENT EVOLUTION OF TIME-SENSITIVE TARGETING * Environment * Operation DESERT STORM * Operation ALLIED FORCE * Operation ENDURING FREEDOM * CHAPTER 3 - TIME-SENSITIVE TARGETING IN OPERATION IRAQI FREEDOM * Post OEF Improvements * Background * OIF Force Organization * CENTCOM Target Definitions * OIF TST Execution Results * The Successes * The Problems * CHAPTER 4 - FUTURE TRENDS AND CHALLENGES * Lessons Learned Process * Fixing the Problems * Adversary Focus on Asymmetric Operations * Joint and Coalition Training * CHAPTER 5 - CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this study provides unique insights into battlefield targeting.

The nature of US military operations since DESERT STORM has gradually shifted from a conventional force-on-force scenario to one in which US forces likely will counter an adversary strategy of concealment, dispersal, and deception. Over the last decade, airmen at the operational and tactical levels of combat have had to adapt the US targeting cycle to accommodate targets discovered during Air Tasking Order (ATO) execution that cannot wait to be processed under the traditional 24-72 hour ATO targeting cycle. While these targets are sometimes referred to by different names among the services, the highest priority target category as defined above are Time-Sensitive Targets (TST).

The US military's successful joint development of an efficient process to Find, Fix, Track, Target, Engage, and Assess (F2T2EA) emerging battlefield targets coupled with advances in command and control automation with fused intelligence data has resulted in a significant US military capability to counter adversaries' asymmetric strategies. Predominantly from the air component's operational viewpoint, this study will trace the requirement for and evolution of the TST process beginning with the Scud hunt in the first Gulf War. It will summarize the TST progress through Operations ALLIED FORCE and ENDURING FREEDOM, and then analyze the targeting process and results refined during OIF. This analysis will cover broad operational-level results and observations, and where appropriate will note tactical level impacts on operational execution. Finally, the study will address a few of the many TST-related lessons from OIF and provide recommendations to further improve the immediate targeting process execution.

Although the OIF analysis and recommendations are based largely upon draft lessons, doctrine, and/or tactics revisions, many of the draft source documents are already being used in exercises by the USAF and joint community. Other sources for this paper include Congressional testimony, oral histories, briefings, interviews, and personal interaction with the TST Team and immediate targeting process during OIF as a CAOC Senior Offensive Duty Officer at Prince Sultan Air Base, Kingdom of Saudi Arabia.

CHAPTER 1 - INTRODUCTION * CHAPTER 2 - THE RECENT EVOLUTION OF TIME-SENSITIVE TARGETING * Environment * Operation DESERT STORM * Operation ALLIED FORCE * Operation ENDURING FREEDOM * CHAPTER 3 - TIME-SENSITIVE TARGETING IN OPERATION IRAQI FREEDOM * Post OEF Improvements * Background * OIF Force Organization * CENTCOM Target Definitions * OIF TST Execution Results * The Successes * The Problems * CHAPTER 4 - FUTURE TRENDS AND CHALLENGES * Lessons Learned Process * Fixing the Problems * Adversary Focus on Asymmetric Operations * Joint and Coalition Training * CHAPTER 5 - CONCLUSION

More books from Progressive Management

Cover of the book German Foreign Fighters in Syria and Iraq: Islamist Jihadist Mobilization, Muslim Radicalization, ISIS, Syrian Civil War, Terrorist Online Recruiting, Salafism, Migrant Integration, Millatu Ibrahim by Progressive Management
Cover of the book Gangs and Crime in America: Central America and Mexico Gang Assessment, Cost of Violence, Profiles of El Salvador, Guatemala, Honduras, Mexico, and Nicaragua, Risk Factors, Historical Context by Progressive Management
Cover of the book The Emerging Shield: The Air Force and the Evolution of Continental Air Defense, 1945-1960 - NORAD, Dew Line, SAGE, BOMARC, SAC, Early Warning Systems, Radar Fence, Atom Bomb Impact by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Small Intestine Cancer - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Testicular Cancer (Cancer of the Testicles) - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book 2018 Department of Homeland Security Cybersecurity Strategy: Five Pillar Framework of Risk Identification, Vulnerability Reduction, Threat Reduction, Consequence Mitigation, and Cyberspace Outcomes by Progressive Management
Cover of the book NASA Mishap Board Report on Serious Spacesuit Anomaly July 2013 ISS Space Station EVA EMU Suit Helmet Water Intrusion: Threatened Astronaut Luca Parmitano with Drowning by Progressive Management
Cover of the book Air Force Doctrine Document 1-1, Leadership and Force Development: Leading Airmen by Progressive Management
Cover of the book NASA History Series: The Birth of NASA - The Diary of T. Keith Glennan, The First Years of America's Space Agency, Eisenhower, Kennedy, Saturn, Moon Landing, Communications Satellites (NASA SP-4105) by Progressive Management
Cover of the book Space Shuttle NASA Mission Report: STS-2, November 1981 - Second Flight of Columbia, Complete Technical Details of Orbiter Performance and Problems, Mission Events by Progressive Management
Cover of the book Complete Guide to the Olmsted Locks and Dam on the Ohio River: Controversial In-the-Wet Construction Method, Inland Waterways Navigation Dams, Equipment, Designs, Financing by Progressive Management
Cover of the book The American Civil War Encyclopedia: Sweeping Account of All Aspects of the War Between the States - Army and Navy History and Timelines, Campaigns and Battles, Intelligence, Militias, Unique Stories by Progressive Management
Cover of the book Seize the High Ground: The Army in Space and Missile Defense - NIKE-ZEUS, Safeguard, Ballistic Missile Defense, Sentry, Strategic Defense Initiative, Anti-satellite, Laser, Space Shuttle by Progressive Management
Cover of the book 2011 Tsunami Sourcebook: Japanese Disaster, Science and Survival Guides, History, Physics, Detection and Forecasting, Warning Systems, Designing for Tsunamis, Hazard Mitigation Programs by Progressive Management
Cover of the book Haiti in Perspective - Orientation Guide and Cultural Orientation: Geography, History, Economy, Religion, Customs, Duvalier, Vodou (Voodoo), Aristide, Catholicism, Port-au-Prince, Windward Passage by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy