Page 76 - Maritime Services and the Kill Web
P. 76
The Maritime Services, the Allies and Shaping the Kill Web
This means that at Air Wing Fallon, some of the skills which should have been learned earlier need to be
caught up in the pre-deployment phase of training.
It is obviously important that this challenge be met and rectified.
Air Wing Fallon prepares as the earlier quote indicates the CAG for a variety of settings and scenarios, not
just what currently deployed CAGs are facing and doing.
And to do this they involve external assets with which the CAG will operate as well.
For the non-naval aviator, the way to think about is that the CAG works its relationship with organic carriers
assets, such as with the strike aircraft, Growlers onboard and Hawkeyes.
This part of the concentrate circle expands as the reach of the air wing is extended by its ability to work with
assets external to the carrier.
Air Wing Fallon provides training for working with non-organic assets which will vary in terms of what is
available and present at Fallon during Air Wing Fallon training.
But obviously as technology evolves and new platforms being added such as P-8s, Tritons, F-35s, etc. the
external reach of the carrier is expanded as well.
“The concern that we have is making sure that the CAG is prepared for all contingencies, which is why we
have a wide scope when it comes to what we put them through, and in addition, we’ve incorporated realistic
scenarios, so they know how painful the real world is going to be.
“They need to learn to use off board and on board systems.
“They need to learn how to work with the E2 or the AWACS to be able to put the puzzle together to figure
out if the ROE is met and staying within the allowable threat level or risk level.”
With the evolution of the threat, training needs to evolve as well.
There clearly is a need to work in a “dark environment” where jamming is a key threat and challenge.
There is a need to leverage the digital battlefield and to change procedures allowing for faster upgrades to
the data in the strike force to ensure that stovepiped security arrangements block the combat aviators from
having the data they need to prevail in the digitally informed battlespace.
This is a particular challenge onboard the carrier, as the crews need to build their own data and crypto loads.
The coming of the F-35 will accentuate this challenge and will need to be solved to ensure that the CAG gets
full value out of an information superiority strike asset.
In short, there is a clear need to align security, data flows and sustainment approaches with the evolving CAG
and its ability to work with external assets.
“How we acquire, how we sustain, and how we secure our forces needs to work and be aligned for an
integrated, high intensity warfare enabled force.
“This is a key challenge which must be met to prevail in combat”
Second Line of Defense
Page 75