Total Pageviews

Search This Blog

Sunday, June 15, 2014

Divergent Thinking: How Best to Employ Fighter Aircraft - The American Approach Part II

UPDATED 10/9/2014: Correction, AFHRA



Image 1: Group of F-35 aircraft. Image Credit: Donald Allen, 2013.



  • A country’s method of fighter employment is uniquely tailored to the host country’s national security objectives, the relative strengths and weaknesses of its defense industry, budgetary considerations, prior combat experiences, and its pilot training programs and infrastructure.
  • The United States method of fighter employment favors aircraft with stealth and heightened situational awareness which results in a comparatively high cost mass production procurement strategy. This procurement strategy is made possible by consistent and large scale American R&D efforts in avionics, sensors, stealth technology, and related software in conjunction with the unrivaled Department of Defense procurement budget.
  • The US method of fighter employment addresses the national security challenges associated with a high intensity anti-access/area denial (A2/AD) conflict in the Western Pacific. A measure to replace the F-35 with existing 4.5 generation aircraft, as advocated by many F-35 critics, will not meet current American national security objectives, ignores the relative strengths and weaknesses of the American defense industry, and does not account for the robust pilot training programs and initiatives of the United States.
Introduction

The air campaign in Vietnam was a significant learning experience for the USAF not only in terms of highlighting the importance of fighter maneuverability, institutionalizing dogfighting skills, and retaining an internally mounted gun - as commonly discussed by scholars and USAF officials, but also in terms of highlighting the importance of situational awareness. After the relative ineffectiveness of the USAF against Vietnamese Migs, the Air Force compiled its findings in the Project Red Baron report with the goal of improving American air to air capabilities. One of the key findings of the Red Barron report was the majority of American airmen who were shot down did not see their adversary until it was too late (Laslie, 2013). Robin Olds, a triple ace and one of the most distinguished American airmen who served in both World War II and Vietnam, described an encounter with Vietnamese Mig 21s for the Air Force Historical Research Agency (AFHRA): 

"Going in a pair of MiG-21s hit us, two of them, and they came in supersonic from six o'clock high and was [sic] right on top of us before we ever knew anything about it,  launched a bunch of missiles, and shot down two of my F-4s. Bang. Just that fast. I turned around, I heard them scream, I turned, and all I saw were two burning objects on  the side….these MiGs were gone, supersonic."



Image 2: Robin Olds was an extremely influential American aviator who argued for greatly expanding basic dogfighting skills as part of standard fighter pilot training. Among his many accomplishments, Olds was responsible for orchestrating Operation Bolo which was both the largest and most successful air-to-air engagement carried out by American forces during the Vietnam War. Olds was also well known for his trademark non-regulation "bullet proof" handlebar mustache. NY Times obituary 

Significant investments in radar technology, command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) equipment and the institutionalization of new techniques, tactics, and procedures (TTP) and concepts  - such as John Boyd's OODA loop in the 1970s and 1980s, revolutionized the approach in which the USAF used established air superiority. The results of the USAF's approach to establishing situational awareness greatly contributed towards the lopsided engagements favoring Coalition forces in the Persian Gulf War. 

Similarly, the development of stealth technology in the mid 1970s enabled the USAF to greatly degrade an enemy's situational awareness by both limiting the effectiveness of enemy radars and enabling allied aircraft to destroy enemy command and control assets in the opening hours of a conflict. For example, F-117A destroyed Iraqi command and control facilities and Integrated Air Defense Systems (IADS) with impunity at the onset of the Gulf War which limited the effectiveness of the Iraqi Air Force for the remaining duration of the conflict.

The combination of both heightened situational awareness and low observability form the basis of American 5th generation fighter aircraft. New developments in cyber warfare, electronic attack capabilities, avionics, and sensors featured in the F-35 and recent F-22 upgrades further augments the USAF's ability to achieve situational awareness through Network-Centric Warfare (NCW) and provides new opportunities for the USAF to deny and degrade a potential enemy's situational awareness. Prior to an examination of how stealth and situational awareness have shaped the evolution of American air-to-air tactics, an examination of how fighter aircraft operate within a broader combined arms context in addition to pilot training is required.
 

The Combined Arms Approach 


Image 3: Flight deck of USS George Washington in the Pacific

As stated in part I of this series, one cannot draw meaningful conclusions of force effectiveness by merely reviewing the specifications of two opposing fighter aircraft (e.g. thrust to weight ratio vs. wing loading) to determine the probable victor. A comprehensive analysis to determine the future effectiveness of a nation's method of fighter employment must include consideration of its force doctrines, how its fighter aircraft preform within the nation's combined arms approach. In the case of the United States, fighter aircraft do not operate alone but as part of a larger networked force. For example, F-35C aircraft would coordinate actions as part of Naval Integrated Fire Control-Counter Air (NIFC-CA) concept:

"...targets spotted hundreds of miles away by one sensor—such as the emerging F-35C Lighting II Joint Strike Fighter (JSF) or E-2D Advanced Hawkeye intelligence, surveillance, and reconnaissance (ISR) aircraft—could be engaged cooperatively by any number of shooters: a JSF, F/A-18 E/F Super Hornet tactical fighter, or future unmanned vehicles, all available to the strike group over vast distances." - Majumdar & LaGrone, 2014

Aircraft from the carrier air wing, such as the F-35C and E-2D, would work in conjunction with Aegis equipped assets to cue SM-6 surface to air missiles (SAM) and SM-3 anti-ballistic missiles (ABM) beyond the range of ship mounted radars (LaGrone & Laird, 2014). Furthermore, the USN would closely coordinate with USAF assets in contested A2/AD environments resulting in new tactics such as F-22s providing targeting data to tomahawk cruise missile equipped nuclear attack submarines. In summary, American fighter aircraft train and fight with other assets. Thus, any examination of future American air-to-air capabilities must account for how American fighter aircraft would preform within not only a broader inter-service force but as part of a broader joint USAF and USN force.


Pilot Training


Image 4: Group of F-16 aggressor pilots participating in a Red Flag exercise

Similarly, without understanding how American fighter pilots train for combat at the tactical level (doctrines and broader operational concepts being strategic level), one cannot determine the probable outcome of an engagement. As The Russian Approach and the American Approach - Part I demonstrate, the manner in which air forces employ similar assets varies significantly. For example, the Russian method of fighter employment favors a comparatively minimal pilot training programs supplemented by mass production of 4.5 generation aircraft and cost-effective use of beyond visual range radar guided missiles. The American approach invests greater resources in both the airframe and the development of its individual fighter pilots. American fighter pilots fly between 250-300 hours per year for training purposes while Russian fighter pilots receive 100 practice hours each year (Source 1 & 2). The base requirements of American fighter pilots are augmented by realistic combat exercises such as Red Flag and Red Air.

Analysis of the air war in Vietnam led by Moody Suter concluded that the majority of pilot casualties occurred before each pilot's tenth combat mission, casualty rates decreased dramatically if a pilot survived their first ten combat missions. Red Flag was devised as a means to provide US fighter pilots with their first ten combat missions in a training environment. More than 30 years later, Red Flag and Red Air provide American fighter pilots with invaluable opportunities to hone their skills and operate alongside US allies in conjunction with a larger networked force. Aggressor units provide a holistic simulation of potential enemy threats not only in air-to-air operations but also in cyber warfare and electronic warfare operations:

"...the Information Aggressors simulate attacks on Blue Force computer networks and information systems. At the same time the 57th and 177th Information Aggressor Squadrons (57th and 177th IAS) might attempt to infiltrate Blue Force bases- including their dorms- to search for intelligence useful to the Aggressors during the simulated war. Combined with the aerial Aggressors flying the F-15 Eagle and F-16 Fighting Falcon fighters, these Aggressor forces mount a coordinated offensive against the Blue Force during exercises...
Similarly, in order to replicate the very real danger of computer network infiltration attacks the 57th and 177th Information Aggressor Squadrons stage elaborate attacks on various USAF installations in order to test their defenses...Toth said that due to the serious nature of the threat, the simulated attacks have to be very realistic. The bases that are subject to a simulated network attack by the Aggressors are not given any prior warning, Toth stated. He added that only a few seniors officer are given prior notice of these 'stimulation exercises' in order to ensure that the Aggressors tactics are not mistaken for an actual attack on the USAF network." - . Dave Majumdar



Image 5: Pair of aggressor F-16s at Red Flag Alaska. Aggressor units have incorporated new technologies in recent years such as IRST pods to replicate probable enemy threats.

American intelligence agencies (primarily the Defense Intelligence Agency, Central Intelligence Agency, and National Security Agency) provide invaluable information to aggressor units regarding the capabilities, TTP, organization, and doctrines of potential enemies and strategic competitors (Bender, 2013). Aggressor units have imitated North Korean, Russian, Iranian, and Chinese forces within Red Flag exercises (Hoffman, 2009). The realistic training environment and robust pilot training infrastructure of the United States enables the facilitation of new TTP by special test and evaluation squadrons (TES) and the USAF Weapons School.

PART III 

Author's Note: Part III will discuss the process in which TES units and the USAF Weapons School create new TTP which exploits the advantages of stealth and situational awareness. Probable tactics that will be utilized by future American fighter pilots, specifically F-35 pilots, will subsequently be examined. Part IV will discuss the American approach with an A2/AD context in the Western Pacific and the new challenges posed by emerging Chinese systems such as the J-20 and J-31.

Sources


(1) F-16 Fighting Falcon Service Life, Global Security, 2012. http://www.globalsecurity.org/military/systems/aircraft/f-16-life.htm
(2) Reviving the Russian Air Force, Gorenburg, 2013.
https://russiamil.wordpress.com/tag/russian-air-force/
(3) F-22 will provide targeting for submarine based Tomahawk cruise missiles, David Cenciotti, 2013.
http://theaviationist.com/2013/12/24/f-22-targeting-tlams/
(4) Plymouth native emulates enemy in Air Force war games, Bryan Bender 2013.
http://www.bostonglobe.com/news/nation/2013/02/23/air-force-retrains-pilots-confront-high-tech-enemy/8ZSwUe4IPREnLgDcxQqjRJ/story.html
(5) Aggressor pilots: Paid to play the villain, Michael Hoffman, 2009.
http://www.airforcetimes.com/article/20091213/NEWS/912130301/Aggressor-pilots-Paid-play-villain
(6) The Next Act for Aegis, Sam LaGrone, 2014.
http://news.usni.org/2014/05/07/next-act-aegis
(7) The Long Reach of Aegis, Robbin Laird, 2012.
http://www.usni.org/magazines/proceedings/2012-01/long-reach-aegis
(8) The makings of a warrior: Training pilots to fly America's next generation fighters. Part 1, Dave Majumdar, 2009.
http://www.examiner.com/article/the-makings-of-a-warrior-training-pilots-to-fly-america-s-next-generation-fighters-part-1
(9) Inside the Navy’s Next Air War, Dave Majumdar and Sam LaGrone, 2014.
http://news.usni.org/2014/01/23/navys-next-air-war
(10) The Implementation of Network-Centric Warfare, Office of the Secretary of Defense, 2005.
http://www.carlisle.army.mil/DIME/documents/oft_implementation_ncw%5B1%5D.pdf
(11) Red Flag: How the Rise Of "Realistic Training" after Vietnam Changed the Air Force's Way of War, Brian Laslie, 2006.
http://krex.k-state.edu/dspace/bitstream/handle/2097/15506/BrianLaslie2013.pdf?sequence=1
(12) Aggressor squadrons feel the pinch of DoD cuts, Jamie Hunter, 2014.
http://www.janes.com/article/35411/aggressor-squadrons-feel-the-pinch-of-dod-cuts

2 comments:

  1. The quote from Olds actually comes from his Oral History Interview conducted by the Air Force Historical Research Agency: Colonel Robin Olds, Oral History Interview, Air Force Historical Research Agency, 01 January 1968, K239.0512-051, 40. It was part of his Vietnam Exit Interviews. AFHRA has severl OHIs conducted with Olds.

    ReplyDelete
    Replies
    1. Thank you for your correction, its great to hear from you.

      Delete