TT 501: Tropic Thunder Execution Laboratory
LESSON OBJECTIVES
501.1 Comprehend the relationship between national objectives and means availability within the framework provided by the joint planning processes. [I.4(a)]
501.11 Explain the relationship between national objectives & strategy to military objectives and strategy.
He has instructed the Joint Force Land Component Commander to initially adopt a defensive stance and to be prepared to counterattack on order. As the player of Tropic Thunder, you are cast in the position of the Joint Force Air Component Commander (JFACC). The JFC has given you latitude to plan and execute air operations in support of his military objectives. You are free to employ air assets throughout the theater, with the exception that you are prohibited from violating Chinese airspace.
(Scenario)
501.2 Comprehend the principles, concepts, and procedures taught at ACSC and how they fit into a Master Attack Plan (MAP) for a war game exercise.
501.21 Give examples of orders for air units for simulated operational level combat operations.
An example would be an ATO from the game. This is a brief description of how to play.
In this exercise, you will be making decisions that would otherwise originate with the Joint Forces Air Component Commander (JFACC): apportioning total air resources among the various tasks; defining targets and allocating aircraft; determining force requirements to achieve destruction or disruption levels; tasking aircraft individually or in packages; and selecting weapon loads to support employment requirements. The computer program will hint at the right number of aircraft for bombing missions, and at the optimum weapon for that particular aircraft to use against that particular target. Although it will take some time to develop and carry out your campaign plan, it is doable--regardless of whether or not you have an operational (i.e., flying) background.
The TROPIC THUNDER Missions and Tasks section that follows this section provides an overview of each type of TROPIC THUNDER task you may assign, offers planning considerations, and lists questions you will want to consider in the process of defining your air employment plan.
In this exercise there are nine tasks to which you can assign aircraft. These tasks correspond to Air Force Manual 1-1 missions as listed below. The tasks provide greater ability to visualize exactly what your aircraft are doing. If we had used only the AFM 1-1 missions, we would have lost some of the ability to track the actions of the campaign: for example, if a plane was tasked to fly a counterair mission, you wouldn't know whether it was sitting on the end of the runway as a defensive interceptor or bombing enemy airfields.
The following table lists the nine TROPIC THUNDER Tasks and the AFM 1-1 Missions.
TROPIC THUNDER TASK |
AFM 1-1 MISSION |
1. Offensive Counter Air (OCA) | Counterair |
2. Defensive Counter Air (DCA) | Counterair |
3. Strategic Attack (SA) | Strategic Attack |
4. Interdiction (AI) | Interdiction |
5. Close Air Support (CAS) | Close Air Support |
6. Electronic Warfare (EW) [area suppression/jamming] | Electronic Combat |
7. Suppression of Enemy Air Defenses (SEAD) | Electronic Combat |
8. Reconnaissance (RECCE) | Surveillance & Reconnaissance |
9. Escort (ESC) [vs enemy fighters] | (mission of the escortee) |
Other Air Force missions such as Airlift, Base Operability and Defense, Logistics, and Combat Support are abstracted.
(Scenario)
501.22 Describe intelligence data as a measure of desired outcome and predictor of desired end state during simulated operational level combat operations.
Reconnaissance missions may be flown pre- and post-attack. Pre-attack recce missions may be flown to obtain data for mission planning purposes, whereas post-attack missions are flown to determine the success of missions. In either case, recce is flown to obtain accurate bomb damage assessments. Pilot reports (in the exercise generated by the computer) may or may not be valid, which is real-world; hard copy pictures, video, radar images collected by recce are valid, which is real-world too, usually!
Intelligence is necessary for three major reasons. First, it provides us with information on what the elements or nodes of the enemy system are. Second, and most importantly, it provides us with information on what the relationships or links between those nodes are. Without both of these pieces of information it is impossible for us to determine cascading effects and hence critical nodes. Finally, information on the enemy's objectives can provide insight into how the enemy may employ its systems which may in turn affect the links in those systems. (OS 501)
501.23 Explain the principles of War and Conflict, and War Theory at the operational level of war.
Tactical:
(WC 503)
501.3 Comprehend the considerations of employing joint and multinational forces at the operational level of war. [I.3(a)]
501.31 Describe methods for employment of forces to achieve desired operational outcomes recognizing limitations of interoperability and differences in capabilities.
Functional and Service components of the joint force conduct subordinate and supporting operations, not independent campaigns. Joint force commanders (JFCs) synchronize the actions of air, land, sea, space, and special operations forces to achieve strategic and operational objectives through integrated, joint campaigns and major operations. The goal is to increase the total effectiveness of the joint force, not necessarily to involve all forces or to involve all forces equally. The authority vested in a commander must be commensurate with the responsibility assigned. All Service forces (except as noted in title 10, US Code, section 162) are assigned to combatant commands by the Secretary of Defense "Forces for Unified Commands" memorandum. A force assigned or attached to a combatant command may be transferred from that command only as directed by the Secretary of Defense and under procedures prescribed by the Secretary of Defense and approved by the President. Establishing authorities for subordinate unified commands and joint task forces may direct the assignment or attachment of their forces to those subordinate commands as appropriate. When forces are transferred, the command relationship the gaining commander will exercise over those forces must be specified. Planning for employment of joint teams begins with articulating and understanding the objective, purpose of the operations, and commander's intent (the commander's vision of the end state to be achieved). JFCs issue prioritized mission-type orders to subordinate commanders and define command relationships to facilitate mission accomplishment consistent with their concept of operations.
(JO 501)
FORCE PACKAGING
This section presents discussion of some typical packages which can serve as a starting point for developing your TROPIC THUNDER mission packages. First, some general planning considerations regarding aircraft:
1. F-16s and F-15s usually employ in four-ship formations and should be tasked in multiples of four when able. At a minimum they should be tasked in two-ship elements. Regarding combat radii, in this exercise the F-15 can employ at whatever range the F-16 can attack. Note: There are no range limitations in this particular exercise.
2. F-16 Wild Weasels fly in pairs (elements). The more that can be made available to support a given package, the better (typically four to eight for an OCA/AI effort). Wild Weasels have a slightly shorter combat range than F-16s, but have sufficient fuel to open an ingress corridor through enemy surface-to-air missile sites (via detection, then destruction and/or harassment) and remain on station until the attack force is "on target."
3. Based on the mutually supporting capabilities of the two systems, operations may include having F-16 Wild Weasel aircraft and F-15 air superiority aircraft ingress to the target area together. Doing so would permit both weapons systems to be employed from optimum medium and high altitudes, while providing simultaneous fighter and SAM suppression support.
4. F-117 attack aircraft fly as singles or elements of two aircraft and can be targeted throughout the exercise area. Even when flying enroute in groups larger than two, they typically attack as singles. The force package should consist of only F-117, due to the unique capabilities of these aircraft. (Other type aircraft would highlight the location of the F-117 and deny it the use of its stealth.)
5. EA-6B could be tasked to provide EW support for multiple OCA/AI/CAS packages spanning a several hour period. This assumes that the EA-6B is employed in a stand-off role. If required, the EA-6B is capable of penetration with the attack force package, but the target must be of very high value/importance to risk loss of this limited aircraft. NOTE: in this exercise, EA-6B aircraft tasked as "EW" will be in area suppression mode. If they are tasked as "SEAD," then they escort a particular mission package.
6. F-16s, when used as reconnaissance aircraft, may be tasked as singles or elements of two aircraft. Flying in elements increases survivability and provides camera/sensor redundancy. In this exercise, as in the real world, accurate intelligence is only possible with reconnaissance. If you don't fly "recce," you get an aircrew report which may or may not be correct. In this exercise, when you task F-16s to fly recce, they upload the recce pod.
7. OA-10s fly in elements (two) or as four-ships. While the OA-10 can remain airborne for several hours, its speed is slow in comparison to the other fighter aircraft. It is generally not suited for combining with other type aircraft in a force package. Regarding the "typical" force package, consider some applicable lessons from the past in General Momyer's guidelines (from his book, Air Power in Three Wars, p. 220):
"Because the nature of the targets demanded individual bombing, the number of aircraft that we could use effectively on a given target was limited smoke and debris would quickly obscure the target. As a consequence of these target limitations, the size of the forces available, and the number of tankers available at a given time, a strike force of 16 attack aircraft (then F-105s) composing four flights of four aircraft each provided the best balance that a single composite force commander could handle.... A basic force was built around an attack package of 16 aircraft with additional packages being added as the size of the target, number of targets, and availability of aircraft dictated. To give this force the best opportunity to get into the target, we used a fighter cover that usually consisted of two flights of four aircraft (and) two flights of Wild Weasels with four aircraft in each flight. One flight would precede the force by five minutes, and the other would cover the withdrawal."
Thus a "typical" OCA/AI package today might consist of 16 F-16s, eight F-15s, and eight Wild Weasels. In the Gulf packages varied in size up to 80 or more aircraft. A primary coordination challenge in composite force missions (several force packages of possibly dissimilar aircraft) is that of aircraft deconfliction during ingress, in the target area, and on egress. This is a mission commander's responsibility. He assigns routings, altitudes, and timing considerations for all formations involved, to:
501.32 Explain the apportionment and allocation decisions of theater forces.
Assigned forces are those forces that have been placed under the combatant command (command authority) of a unified commander by the Secretary of Defense in his "Forces For Unified Commands" memo. Forces and resources so assigned are available for normal peacetime operations of that command.
Apportioned forces and resources are those made available for deliberate planning as of a certain date. They may include those assigned, those expected through mobilization, and those programmed. They are apportioned by the JSCP for use in developing deliberate plans and may be more or less than those allocated for execution planning.
Allocated forces and resources are those provided by the NCA for execution planning or actual implementation. The allocation of forces and resources is accomplished through procedures established for crisis action planning.
(JO 501)
In this exercise, you will be making decisions that would otherwise originate with the Joint Forces Air Component Commander (JFACC): apportioning total air resources among the various tasks; defining targets and allocating aircraft; determining force requirements to achieve destruction or disruption levels; tasking aircraft individually or in packages; and selecting weapon loads to support employment requirements. The computer program will hint at the right number of aircraft for bombing missions, and at the optimum weapon for that particular aircraft to use against that particular target. Although it will take some time to develop and carry out your campaign plan, it is doable--regardless of whether or not you have an operational (i.e., flying) background.
501.4 Comprehend the attributes needed to plan for employment of joint forces at the operational level of war. [1.3(c)]
501.41 Explain the importance of time-sequenced attacks on an enemy's system of systems.
Warden used a systems approach to develop his air campaign plan - Instant Thunder
Air strikes would not concentrate on Iraqi troops in Kuwait (the outer ring - fielded
forces)
The Air Campaign Plan - Instant Thunder
(OS 501)
501.5 Comprehend the capabilities and limitations of US military forces. [I.1(a)]
501.51 Explain the capabilities and limitations of US military forces as highlighted in Tropic Thunder.
Aircraft Characteristics
EA-6B (USN): for electronic countermeasure support. Limitations: This aircraft has no armament and is relatively slow.
A/OA-10 (USAF): for air-to-surface attack; dedicated primarily to the CAS mission; pilots routinely train with army ground forces; 30mm tank killer gun; long endurance; diverse munitions; maneuverable. Limitations: limited night or adverse weather capability; slow (a disadvantage against AAA threat).
F-15 (USAF): to assist in protecting an attack force with sweep and/or escort missions; pilots are dedicated to training in the air-to-air engagement aspects of the air superiority role; long range air-to-air radar; look-down, shoot-down, beyond-visual-range (BVR) capability; large air-to-air weapons load; maneuverable. Day/night capable.
F-15E (USAF): For air-to-surface attack; able to carry large weapons loads, or precision guided munitions long distances with extremely accurate delivery, all-weather, day or night; able to assist in protecting an attack force; large air-to-air weapons load; highly maneuverable.
F-16 (USAF): for air-to-surface attack; accurate weapons delivery system; night/adverse weather capability; diverse munitions; fast; maneuverable. Used for: air-to-air engagements; limited head-on capability; good radar; very maneuverable; small, hard to detect. The F-16 with a recce pod is the only system in this exercise which is capable of flying recce missions.
F/A-18 (USN): for air-to-surface attack & air-to-air combat; accurate weapons delivery system; night/adverse weather capability; diverse munitions; fast; maneuverable. Limitations: sometimes tied to carrier fleet duties; "short legs" - requires aerial refueling for endurance.
B-52 (USAF): for air-to-surface attack; day/night/all weather capable; effective in delivering large quantities of area munitions. Limitation: reduced flexibility in working with forward air controllers to refine/adjust targets.
F-117 (USAF): for air-to-surface attack; long range; extremely accurate delivery system; best used at night to take advantage of its stealth characteristics. Limited by weather.
AC-130 (USAF): for air-to-surface attack using a very high speed Gatling gun and cannons; day/night/all-weather capable; effective in delivering a large number of rounds on a specific target. Limitations: big, low and slow.
F16 Wild Weasels (USAF): for destruction and/or suppression of surface-to-air threats (SAMs and AAA); dedicated to training solely in that role; stand-off antiradiation air-to-surface missiles; limited BVR air-to-air missile capability. Limitation: short endurance in the target area if tasked to penetrate with attack package. Longer endurance if employed in SOJ mode (area suppression) which also allows suppression for more than one mission or package.
NOTE: In the computer program, aircraft scheduled as EW are in area suppression mode and aircraft scheduled as SEAD will penetrate with the designated attack package. These aircraft should always be scheduled in pairs or multiples thereof.
AIRCRAFT USE
Aircraft | OCA |
DCA |
SA |
AI |
CAS |
EW |
SEAD |
RECCE |
ESC |
A/OA-10 | - |
- |
- |
2 |
1 |
- |
- |
- |
- |
F-16 WW | - |
- |
- |
- |
- |
1 |
1 |
- |
- |
F/A-18 | 1 |
2 |
1 |
1 |
2 |
- |
3 |
- |
2 |
F-15 | - |
1 |
- |
- |
- |
- |
- |
- |
2 |
F-15E | 1 |
3 |
1 |
1 |
3 |
- |
- |
- |
3 |
F-16 | 1 |
2 |
1 |
1 |
1 |
- |
3 |
1 with pod |
2 |
F-117 | 2 |
- |
1 |
2 |
3 |
- |
3 |
- |
- |
AC-130 | - |
- |
- |
- |
1 |
- |
- |
- |
- |
B-52 | 1 |
- |
1 |
1 |
2 |
- |
- |
- |
- |
EA-6B | - |
- |
- |
- |
- |
3 |
1 |
- |
- |
TABLE NOTES
- A "1" indicates that this is the task for which the aircraft is best suited.
- A "2" indicates that this is a good second task or declared operational capability.
- A "3" indicates that the program will accept that task for the aircraft, but its use in that task will typically result in less than optimum task accomplishment and/or greater losses.
COURSE OBJECTIVES
READINGS ( all are also in coursebook)
READINGS RATIONALE
Readings 1 through 6 provide background information that directly supports the student's efforts in preparing general and detailed planning for air operations in support of the exercise campaign. Readings 7 and 8 provide necessary information to run the computer program and helpful tips.
LESSON OUTLINE
Thesis: ACSC students have acquired enough knowledge in air and space power and joint operations to develop an efficient plan to deal with the TROPIC THUNDER scenario. The student will develop a plan to create operational, strategic, and psychological effects in order to achieve a predetermined end state. The fog and friction of war usually requires changes to a pre-hostilities plan. It is crucial to success that military officers are able to respond to a changing scenario in a timely and efficient manner and, in addition, determine causal relationships of events.