An Air War Like No Other

Total Page:16

File Type:pdf, Size:1020Kb

An Air War Like No Other Eighty percent of the time, American airmen received their targets only after they had taken off. PERATION Enduring Freedom command in a harsh, politically com- marked the first time the US plex environment. The airpower com- military responded to an act ponent set the conditions for a coali- Oof terrorism with a large- tion campaign and achieved success scale, sustained, conventional-force from the first night onward, adapting operation. The war on the Taliban to tactical constraints and bringing An Air War and al Qaeda was most intense from precise firepower to bear. Indeed, 80 October 2001 through January 2002, percent of the targets struck by US when it featured mostly air and space airpower were “flex targets”—those power. given to pilots en route. It was not, however, a massive air The Sept. 11 attacks came as a war; the sortie count from its start thunderous strategic surprise. It took through takeover of major Afghan time for the Bush Administration to Like No cities was about half that of Opera- formulate its response. Soon, how- tion Allied Force in the Balkans in ever, US attention was drawn to 1999 and nowhere near that of the Osama bin Laden’s nest, Afghani- Gulf War in 1991. stan. Its Taliban rulers had offered What made OEF unique was that the Saudi–born terrorist a safe har- Other joint airpower was able to respond on bor since 1996. Thus, the first step in By Rebecca Grant USAF photo by SrA. James Harper Excerpted from the Air Force Association Special Report “The Afghan Air War,” published by AFA’s Aerospace Education Foundation. The full report is available on the Web at www.aef.org (go to publications, then Eaker Institute Papers). 30 AIR FORCE Magazine / November 2002 AIR FORCE Magazine / November 2002 30 Eighty percent of the time, American airmen received their targets only after they had taken off. PERATION Enduring Freedom command in a harsh, politically com- marked the first time the US plex environment. The airpower com- military responded to an act ponent set the conditions for a coali- Oof terrorism with a large- tion campaign and achieved success scale, sustained, conventional-force from the first night onward, adapting operation. The war on the Taliban to tactical constraints and bringing An Air War and al Qaeda was most intense from precise firepower to bear. Indeed, 80 October 2001 through January 2002, percent of the targets struck by US when it featured mostly air and space airpower were “flex targets”—those power. given to pilots en route. It was not, however, a massive air The Sept. 11 attacks came as a war; the sortie count from its start thunderous strategic surprise. It took through takeover of major Afghan time for the Bush Administration to Like No cities was about half that of Opera- formulate its response. Soon, how- tion Allied Force in the Balkans in ever, US attention was drawn to 1999 and nowhere near that of the Osama bin Laden’s nest, Afghani- Gulf War in 1991. stan. Its Taliban rulers had offered What made OEF unique was that the Saudi–born terrorist a safe har- Other joint airpower was able to respond on bor since 1996. Thus, the first step in By Rebecca Grant USAF photo by SrA. James Harper Excerpted from the Air Force Association Special Report “The Afghan Air War,” published by AFA’s Aerospace Education Foundation. The full report is available on the Web at www.aef.org (go to publications, then Eaker Institute Papers). 30 AIR FORCE Magazine / November 2002 AIR FORCE Magazine / November 2002 30 C-17 airlifters carried out a long- distance airdrop of humanitarian daily rations. Air strikes to eliminate air defenses and other key targets were a logical first step, given the success of air- power in the conflicts of the 1990s. But Rumsfeld took pains to point out USAF photo by SSgt. Shane Cuomo that a few days’ worth of strikes would not topple the Taliban. “We have to have a clear under- standing of what is possible in a country like that,” Rumsfeld said. “That country has been at war for a very long time. ... They do not have high-value targets or assets that are the kinds of things that would lend themselves to substantial damage from the air.” It was plain from the outset that An airman prepares a precision guided bomb during Operation Enduring OEF was not going to unfold accord- Freedom. After dropping a portion of their loads, USAF’s B-1Bs, such as this ing to a predetermined strategy. The one, and B-52 bombers were on-call for emerging targets. Gulf War air campaign of 1991 pounded Iraqi forces for 38 days as reducing the terror threat would be sea but turned back on station after the US “tried to set conditions” for to eliminate al Qaeda bases in Af- hearing of the attacks. hostilities, Myers noted in a late Oc- ghanistan. Beyond that, everything for the tober briefing. “Then,” he went on, The primary internal opposition war in Afghanistan had to go in by “we had a ground component that to Taliban rule came from the North- air. USAF’s Air Mobility Command went in and finished the job. You ern Alliance, a loose coalition of began putting in place an air bridge shouldn’t think of this [the war against irregular forces under the leadership of tankers to refuel inbound aircraft. terrorists] in those terms.” of various Afghan strongmen. Some- For the first time, the air bridge out where in the days after Sept. 11, the of the United States ran in two direc- “A Different War” Bush Administration decided that tions, east and west, converging on Echoing that point was Gen. Tom- teaming with the Northern Alliance Central Asia. my R. Franks, the Army officer com- offered the best hope for “liquidat- OEF began on Oct. 7, 2001. Gen. manding US Central Command and ing” the Taliban and al Qaeda in Richard B. Myers, the Air Force of- thus the war’s top military figure. Afghanistan. ficer who had only recently become “It has been said that those who ex- It was also clear that inserting any Joint Chiefs of Staff Chairman, an- pect another Desert Storm will won- US military forces into the region nounced the action. He said, “About der every day what it is that this war would require cooperation from Af- 15 land-based bombers, some 25 is all about,” said Franks. “This is a ghanistan’s neighbors. They were a strike aircraft from carriers, and US different war.” complicated group. Afghanistan bor- and British ships and submarines Part of the strategy was to take dered nations whose names must have launching approximately 50 Toma- steps to hunt down key individuals made planners shudder: China, Iran, hawk missiles have struck terrorist and learn more about al Qaeda’s the now-independent republics of targets in Afghanistan.” structure and any plans for future Turkmenistan, Uzbekistan, and Ta- On Oct. 7 and 8, strikes by Air operations. Another was to unseat jikistan, and on-again, off-again US Force bombers and Navy fighters hit the Taliban. ally Pakistan. Taliban air defense sites, airfields, The Northern Alliance, always a military command-and-control cen- loose grouping, was not ready for The Buildup Begins ters, and other fixed targets near coordinated air and ground offen- The US soon began assembling major cities and installations. The sives. Aid ranging from ammunition forces, however. The Air Force al- first order of business was to “re- to horse fodder had to be flown into ready had established a modern, top- move the threat from air defenses the theater and air-dropped to alli- of-the-line nerve center, called the and from Taliban aircraft,” Defense ance forces. Trained US special op- Combined Air Operations Center, or Secretary Donald H. Rumsfeld said erations teams and air controllers CAOC, in a Persian Gulf state. This on Oct. 7. had to link up with assigned ele- center would be used to direct all “We need the freedom to operate on ments of the Northern Alliance. facets of the coming air campaign. the ground and in the air, and the The mechanics of airpower for Moreover, some Navy warships were targets selected, if successfully de- OEF were different from those seen in place in the northern Arabian Sea. stroyed, should permit an increasing in other recent conflicts. Distance The aircraft carrier USS Enterprise degree of freedom over time,” he added. was a major challenge. Navy fight- and its battle group had begun their Humanitarian relief missions be- ers flew more than 700 miles one return to the US after six months at gan on the first night of the war. Two way from their carriers to their com- 32 AIR FORCE Magazine / November 2002 bat stations. Bombers coming from precision air wings, the strike fight- intricate deck cycle time of the the British–owned Indian Ocean atoll ers averaged two aim points per air- carrier’s operations created a major of Diego Garcia faced a 2,500-mile craft per sortie, a monumental shift challenge. one-way trip. from the mass force packages of Bombers were less affected by For airmen, the war shifted rap- Desert Storm. A full 93 percent of range limitations and soon shoul- idly from strikes against preplanned the Navy strike sorties delivered pre- dered the major part of the job. targets to a combination of pre- cision guided ordnance. After two initial days of strikes, planned and flexible targets. “After “We are more precise than we the B-2 stealth aircraft flying from the first week, the pilots didn’t know were in the past,” explained Adm.
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Continuing Airworthiness Management Its Contribution to Identifying Evidence of Ageing in Aircraft
    AAPWG Paper 013 Ageing Aircraft Programmes Working Group (AAPWG) Paper 013 Continuing Airworthiness Management its Contribution to Identifying Evidence of Ageing in Aircraft Martin Hepworth Final Issue June 2017 ii 1. DISTRIBUTION Task Sponsor Dr Steve Reed, Dstl Mrs Mandy Cox, MAA-Cert-Structures4-Gen AAPWG Members AAPWG Members at time of paper release iii 2. EXECUTIVE SUMMARY The Defence Science and Technology Laboratories (dstl), with the support of the Military Aviation Authority through the Ageing Aircraft Programmes Working Group (AAPWG), have initiated a research and development programme titled “Understanding Ageing Aircraft”. This paper contributes to the dstl programme by seeking to explore continuing airworthiness management activities that might identify the onset of ageing. The UK MOD policy for ageing aircraft centres round carrying out an Ageing Aircraft Audit (AAA) 15 years after a type’s in-services date or at the mid-point between the declared ISD and the initial planned Out of Service Date (OSD) whichever is soonest. Repeat audits should be conducted at 10 year intervals thereafter. However, it is recognised that ageing is a progressive process that commences from manufacture and an in-service programme of monitoring ageing would be advantageous. The responsibilities of both a Type Airworthiness Authority (TAA) and a Continuing Airworthiness Management Organisation (CAMO) include data collection and associated analysis, functions which are recognised as essential tools in identifying potential ageing in aircraft. The concept of an Operator’s CAMO was first introduced as a Joint Aviation Authorities (JAA) requirement; this was later subsumed into EC2042/2003[1] the European Aviation Safety Authority’s regulation for Continuing Airworthiness (CAW).
    [Show full text]
  • Where Are the Carriers? U.S
    WHERE ARE THE CARRIERS? U.S. National Strategy FRONT COVER and the Choices Ahead JOHN F. LEHMAN with Steven Wills This page was left blank for printing purposes WHERE ARE THE CARRIERS? U.S. National Strategy and the Choices Ahead This page was left blank for printing purposes WHERE ARE THE CARRIERS? U.S. National Strategy and the Choices Ahead JOHN LEHMAN, with Steven Wills Published by the Foreign Policy Research Institute 1528 Walnut Street, Suite 610, Philadelphia, PA 19102 www.fpri.org Copyright©2021 Foreign Policy Research Institute All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including inofmration storage and retrieval systems, without written permission from the publisher, except by a reviewer who may quote passages in a review. Library of Congress Cataloging-in-Publication Data Names: Lehman, John, author. | Wills, Steven, author Title: Where are the Carriers? U.S. National Strategy and the Choices Ahead Identifiers: ISBN 978-0-910191-16-6 (electronic) | ISBN 978-0-910191-17-3 (print) Subjects: Political Science Printed by Creative Print Group Cover Design: Natalia Kopytnik Cover Image: United States Navy CONTENTS Executive Summary i 1. Introduction 1 2. Land-based Airpower as a Substitute for Sea-Based 24 Power 3. Can Carriers Survive in the Modern Age? 48 4. Four Options for Carrier Size and Capability 65 5. Nuclear vs. Conventional Propulsion 88 6. How Many Carriers? At What Cost? 98 7. Unmanned Carrier Aircraft: Missions and Myths 116 8. Conclusions 131 Executive summary s the United States seeks to prepare for a potential conflict withA a peer-level adversary, the debate around the utility of the aircraft carrier—and its role in such a contingency—once again has resurfaced.
    [Show full text]
  • Civilian Starvation and Relief During Armed Conflict: the Modern Humanitarian Law
    GEORGIA JOURNAL OF INTERNATIONAL AND COMPARATIVE LAW VOLUME 19 1989 NUMBER 1 CIVILIAN STARVATION AND RELIEF DURING ARMED CONFLICT: THE MODERN HUMANITARIAN LAW Charles A. Allen* I. INTRODUCTION A. The Multilateral Setting: The Geneva Conference of 1974-1977 and Protection of Civilians In 1977, after four years of intense negotiations by a diverse group of representatives from the world community, the 1977 Protocols Additional to the 1949 Geneva Conventions' (the Protocols) were finalized. The Geneva Conference that produced the Protocols was the first international conference aimed at the progressive development * Lieutenant Commander, United States Navy Judge Advocate General's Corps; presently serving as Staff Judge Advocate for the Commander, Iceland Defense Force, Keflavic, Iceland. A.B. Stanford University, 1974; J.D. University of Georgia School of Law, 1982; LL.M. National Law Center George Washington University, 1987. This article is based on a thesis submitted as part of the author's LL.M. degree at George Washington University. The views expressed in this article are those of the author and do not necessarily reflect the official policy or position of the Department of Defense or the U.S. Government. I Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflict (Protocol I), and Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of Non-International Armed Conflicts (Protocol II), Dec. 12, 1977, U.N. Doc. A/32/144, Annexes I & II, reprinted in 16 I.L.M. 1391 (Protocol I), 1442 (Protocol II) (1977); and in, 72 AM.
    [Show full text]
  • Military Aviation: Issues and Options for Combating Terrorism and Counterinsurgency
    Order Code RL32737 CRS Report for Congress Received through the CRS Web Military Aviation: Issues and Options for Combating Terrorism and Counterinsurgency January 27, 2006 Christopher Bolkcom Specialist in National Defense Foreign Affairs, Defense, and Trade Division Kenneth Katzman Specialist in Middle East Affairs Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Military Aviation: Issues and Options for Combating Terrorism Summary By all accounts, the U.S. military dominates state-on-state conflict. In the past, non-state actors (terrorists, guerrillas, drug traffickers) appeared to be less threatening to U.S. national security than the well funded, well organized, and potent armed forces of an enemy nation-state. The terrorist attacks of September 11, 2001 illustrate, however, that small groups of non-state actors can exploit relatively inexpensive and commercially available technology to conduct very destructive attacks over great distances. Today’s U.S. armed forces were developed principally with state-on-state conflict in mind. Combating non-state actors, however, presents a number of distinct challenges in terms of operations, cost, and mindset. Non-state actors generally strive to hide within civilian populations. While U.S. policy makers typically seek quick and decisive victories, non-state actors seek protracted war. Non-state actors often employ cheap, commercially available weapons, that often result in expensive responses by the United States. Many of the weapons and methods employed today by U.S. armed forces can be used against non-state actors. Some, however, are more directly applicable than others. U.S. experience in conducting close air support (CAS), employing special operations forces (SOF) and advising friendly governments in using aviation to defend themselves from insurgents and terrorists may form a basis for building capabilities against non-state actors.
    [Show full text]
  • Sortie Generation Simulation of a Fighter Squadron Abdurrahman Sevimli
    Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 3-24-2016 Sortie Generation Simulation of a Fighter Squadron Abdurrahman Sevimli Follow this and additional works at: https://scholar.afit.edu/etd Part of the Operational Research Commons Recommended Citation Sevimli, Abdurrahman, "Sortie Generation Simulation of a Fighter Squadron" (2016). Theses and Dissertations. 378. https://scholar.afit.edu/etd/378 This Thesis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. SORTIE GENERATION SIMULATION OF A FIGHTER SQUADRON THESIS Abdurrahman Sevimli, Major, TURAF AFIT-ENS-MS-16-M-127 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio DISTRIBUTION STATEMENT A. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Turkish Air Force, Department of Defense, or the Turkish Government. AFIT-ENS-MS-16-M-127 SORTIE GENERATION SIMULATION OF A FIGHTER SQUADRON THESIS Presented to the Faculty Department of Operational Sciences Graduate School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Science in Operations Research Abdurrahman Sevimli, BS Major, TURAF March 2016 DISTRIBUTION STATEMENT A. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT-ENS-MS-16-M-127 SORTIE GENERATION SIMULATION OF A FIGHTER SQUADRON THESIS Abdurrahman Sevimli, B.S.
    [Show full text]
  • U.S. Navy Capstone Strategies and Concepts (2001-2010): Strategy, Policy, Concept, and Vision Documents
    U.S. Navy Capstone Strategies and Concepts (2001-2010): Strategy, Policy, Concept, and Vision Documents Peter M. Swartz with Karin Duggan MISC D0026241.A2/Final December 2011 CNA is a not-for-profit organization whose professional staff of over 700 provides in-depth analysis and results-oriented solutions to help government leaders choose the best courses of action. Founded in 1942, CNA operates the Institute for Public Research and the Center for Naval Analyses, the federally funded research and development center (FFRDC) of the U.S. Navy and Marine Corps. CNA Strategic Studies (CSS), created in 2000, conducts high-quality research on and analysis of issues of strategic, regional, and policy importance. CSS’ analyses are based on objective, rigorous examination and do not simply echo conventional wisdom. CSS provides analytic support to U.S. Government organizations and the governments of partner countries. CSS also maintains notable foundation- sponsored and self-initiated research programs. CSS includes a Strategic Initiatives Group, an International Affairs Group, and a Center for Stability and Development. The Strategic Initiatives Group (SIG) looks at issues of U.S. national security, and military strategy, policy and operations, with a particular focus on maritime and naval aspects. SIG employs experts in historical analyses, futures planning, and long-term trend analysis based on scenario planning, to help key decision makers plan for the future. SIG specialties also include issues related to regional and global proliferation, deterrence theory, threat mitigation, and strategic planning for combating threats from weapons of mass destruction. The Strategic Studies Division is led by Vice President and Director Dr.
    [Show full text]
  • Controlling Cyberwarfare International Laws of Armed Conflict and Human Rights in the Cyber Realm
    Controlling Cyberwarfare International Laws of Armed Conflict and Human Rights in the Cyber Realm by William James Jordan A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Doctor of Philosophy in Philosophy Waterloo, Ontario, Canada, 2021 © William James Jordan 2021 Examining Committee Membership The following served on the Examining Committee for this thesis. Thedeci­ sion of the Examining Committee is by majority vote. External Examiner: Col. David Barnes Professor, Department of English and Philosophy United States Military Academy Supervisor: W. Mathieu Doucet Associate Professor, Department of Philosophy University of Waterloo Internal Member: Brian D. Orend Professor, Department of Philosophy University of Waterloo Internal Member: Patricia A. Marino Professor, Department of Philosophy University of Waterloo Internal­External Member: Veronica M. Kitchen Associate Professor, Department of Political Science University of Waterloo ii Author’s Declaration I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my ex­ aminers. I understand that my thesis may be made electronically available to the pub­ lic. iii Abstract Cyberwarfare, military activities in cyberspace conducted by a state against another state and intended to disrupt or destroy computing or communica­ tion systems or data, is a recent addition to the warfaring arsenal. The in­ ternational laws of armed conflict set out an obligation for states at warto protect civilians from the effects of the conflict. As societies continue toex­ pand their activities in the cyber realm, the risk of cyberwarfare negatively affecting the civilian population increases.
    [Show full text]
  • Impacts of the Fleet Response Plan on Surface Combatant Maintenance
    THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION Jump down to document ENERGY AND ENVIRONMENT 6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit research NATIONAL SECURITY POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND National Defense Research Institute View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. This product is part of the RAND Corporation technical report series. Reports may include research findings on a specific topic that is limited in scope; present discus- sions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research profes- sionals, and supporting documentation; or deliver preliminary findings. All RAND reports undergo rigorous peer review to ensure that they meet high standards for re- search quality and objectivity. Impacts of the Fleet Response Plan on Surface Combatant Maintenance Roland J.
    [Show full text]
  • Air-Minded Considerations for Joint Counterinsurgency Doctrine Written by Charles J
    Air-Minded Considerations for Joint Counterinsurgency Doctrine Written by Charles J. Dunlap Jr This PDF is auto-generated for reference only. As such, it may contain some conversion errors and/or missing information. For all formal use please refer to the official version on the website, as linked below. Air-Minded Considerations for Joint Counterinsurgency Doctrine https://www.e-ir.info/2012/01/25/air-minded-considerations-for-joint-counterinsurgency-doctrine/ CHARLES J. DUNLAP JR, JAN 25 2012 What would joint counterinsurgency (COIN) doctrine that includes “air-mindedness” look like? The Army and Marine Corps have issued COIN doctrine—Field Manual (FM) 3-24 / Marine Corps Warfighting Publication (MCWP) 3-33.5, Counterinsurgency—that clearly articulates what one might call a “surface-minded” perspective.[1] Unfortunately, that doctrine relegates airpower to a five-page annex in a 282-page document. However, an effort is now under way to draft joint COIN doctrine that, presumably, not only will include a full exploitation of airpower per se, but also be informed by an air-minded perspective.[2] “Air-minded” does not mean “air-centric” or even dominated by air, space, and cyberspace power. Rather, one should look to Gen Henry H. “Hap” Arnold’s use of the term to characterize an Airman’s “particular expertise and . distinctive point of view.”[3] According to Air Force doctrine, an Airman’s “perspective . is necessarily different; it reflects the range, speed, and capabilities of aerospace forces, as well as threats and survival imperatives unique to Airmen.”[4] Air-mindedness actually means more than that. It includes, for example, an Airman’s predilection to especially value technology when seeking advantages over enemy forces.
    [Show full text]
  • NAVY AIRCRAFT CARRIERS Cost-Effectiveness of Conventionally and Nuclear-Powered Carriers
    United States General Accounting Office GAO Report to Congressional Requesters August 1998 NAVY AIRCRAFT CARRIERS Cost-Effectiveness of Conventionally and Nuclear-Powered Carriers GAO/NSIAD-98-1 United States General Accounting Office GAO Washington, D.C. 20548 National Security and International Affairs Division B-259298 August 27, 1998 The Honorable Ted Stevens Chairman The Honorable Daniel K. Inouye Ranking Minority Member Subcommittee on Defense Committee on Appropriations United States Senate The Honorable C.W. Bill Young Chairman The Honorable John P. Murtha Ranking Minority Member Subcommittee on National Security Committee on Appropriations House of Representatives The aircraft carrier forms the building block of the Navy’s forward deployed peacetime presence, crisis response, and war-fighting forces. The nuclear-powered carrier is the most expensive weapon system in the Nation’s arsenal and represents a significant portion of the Navy’s shipbuilding and conversion future years defense program. As requested, this report discusses the cost-effectiveness to the Navy of using conventionally and nuclear-powered aircraft carriers. As the Defense Department and the Navy assess design concepts for a new class of carriers, they will evaluate a number of factors, including different propulsion types. This report contains information and analysis that you may find useful in the process of allocating future defense resources. We are sending copies of this report to the Secretaries of Defense, Navy, Energy, and State and the Director, Office of Management and Budget. Copies will also be made available to others on request. Please contact me on (202) 512-3504 if you or your staff have any questions concerning this report.
    [Show full text]
  • Gao-15-22, Ford-Class Aircraft Carrier
    United States Government Accountability Office Report to Congressional Committees November 2014 FORD-CLASS AIRCRAFT CARRIER Congress Should Consider Revising Cost Cap Legislation to Include All Construction Costs GAO-15-22 November 2014 FORD-CLASS AIRCRAFT CARRIER Congress Should Consider Revising Cost Cap Legislation to Include All Construction Costs Highlights of GAO-15-22, a report to congressional committees Why GAO Did This Study What GAO Found Ford-class aircraft carriers will feature The extent to which the lead Ford-class ship, CVN 78, will be delivered by its new technologies designed to reduce current March 2016 delivery date and within the Navy’s $12.9 billion estimate is life-cycle costs. The lead ship, CVN 78, dependent on the Navy’s plan to defer work and costs to the post-delivery period. has been under construction since Lagging construction progress as well as ongoing issues with key technologies 2008, and early construction on CVN further exacerbate an already compressed schedule and create further cost and 79 is underway. In 2007 Congress schedule risks. With the shipbuilder embarking on one of the most complex established a cap for procurement phases of construction with the greatest likelihood for cost growth, cost increases costs—which has been adjusted over beyond the current $12.9 billion cost cap appear likely. In response, the Navy is time. In September 2013, GAO deferring some work until after ship delivery to create a funding reserve to pay for reported on a $2.3 billion increase in any additional cost growth stemming from remaining construction risks. This CVN 78 construction costs.
    [Show full text]