Page 76 - Maritime Services and the Kill Web
P. 76

The Maritime Services, the Allies and Shaping the Kill Web

            This means that at Air Wing Fallon, some of the skills which should have been learned earlier need to be
            caught up in the pre-deployment phase of training.

            It is obviously important that this challenge be met and rectified.

            Air Wing Fallon prepares as the earlier quote indicates the CAG for a variety of settings and scenarios, not
            just what currently deployed CAGs are facing and doing.

            And to do this they involve external assets with which the CAG will operate as well.

            For the non-naval aviator, the way to think about is that the CAG works its relationship with organic carriers
            assets, such as with the strike aircraft, Growlers onboard and Hawkeyes.

            This part of the concentrate circle expands as the reach of the air wing is extended by its ability to work with
            assets external to the carrier.

            Air Wing Fallon provides training for working with non-organic assets which will vary in terms of what is
            available and present at Fallon during Air Wing Fallon training.

            But obviously as technology evolves and new platforms being added such as P-8s, Tritons, F-35s, etc. the
            external reach of the carrier is expanded as well.

            “The concern that we have is making sure that the CAG is prepared for all contingencies, which is why we
            have a wide scope when it comes to what we put them through, and in addition, we’ve incorporated realistic
            scenarios, so they know how painful the real world is going to be.

            “They need to learn to use off board and on board systems.

            “They need to learn how to work with the E2 or the AWACS to be able to put the puzzle together to figure
            out if the ROE is met and staying within the allowable threat level or risk level.”

            With the evolution of the threat, training needs to evolve as well.
            There clearly is a need to work in a “dark environment” where jamming is a key threat and challenge.

            There is a need to leverage the digital battlefield and to change procedures allowing for faster upgrades to
            the data in the strike force to ensure that stovepiped security arrangements block the combat aviators from
            having the data they need to prevail in the digitally informed battlespace.

            This is a particular challenge onboard the carrier, as the crews need to build their own data and crypto loads.
            The coming of the F-35 will accentuate this challenge and will need to be solved to ensure that the CAG gets
            full value out of an information superiority strike asset.

            In short, there is a clear need to align security, data flows and sustainment approaches with the evolving CAG
            and its ability to work with external assets.

            “How we acquire, how we sustain, and how we secure our forces needs to work and be aligned for an
            integrated, high intensity warfare enabled force.

            “This is a key challenge which must be met to prevail in combat”




            Second Line of Defense


                                                                                                         Page 75
   71   72   73   74   75   76   77   78   79   80   81