Abstract

Abstract : Operation Desert Storm, the 1991 Gulf War, and Operation Allied Force, the 1999 Air War over Serbia, saw US and coalition Air Forces attacking enemy fielded forces at unprecedented levels, Given the real change in the nature, strategy, and conduct of air operations in the last decade, this study examines how to most efficiently employ airpower to achieve its objectives in the asymmetric attack against a fielded army. During Desert Storm, US Air Forces developed medium altitude tactics increasing survivability by over-flying the range of Iraqi AAA and MANPADS. Difficulties in attacking from medium altitude were countered with massed formations of specialized armor-killing A-lOs, the development of F-l6 Killer Scouts, and the F-11 and F-15E tactic of Tank Plinking with laser guided bombs. During Allied Force, the challenge lay not in attacking the enemy, but in locating and identifying army interspersed with a large number of civilian refugees. A systems approach is required to most efficiently attack a fielded army by air. The key is the integration of ISR assets through an intelligence flex targeting cell and the use of terminal air controllers such as Forward Air Controllers Airborne (FACAs), along with trained strikers capable of precision attack. This approach requires a change in Joint and Air Force doctrine acknowledging the supported role that US Air Forces have performed against enemy fielded forces over the last decade. It calls for the adaptation of the tactics, techniques, and procedures necessary to ensure the USAF prepares for these kinds of operations in the future.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.