It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
In 2002 we had a well-defined set up, we knew where the enemy was, how it would react to our presence, where the threats were located etc.; in 2010, we faced a “border line” scenario with enemy elements embedded in friendly forces or civilian population, where CDE (Collateral Damage Estimation) was extremely important, where target VID (Visual IDentification) or EOID (Electro Optical IDentification) were the main success factors in the simulated air campaign. In other words, 8 years apart, the RF scenario had evolved to adapt to the ever-changing “combat environment.”
The most recent RFs prove that the exercise continues to change.
For instance, while maintaining the standard coalitions scheme (Blue and Red forces), RF 17-1 had the two teams involved in a “crisis” instead of a war situation. On top of that, not only does the scenario has introduced the latest and most sophisticated and capable threats that require a change in tactics, but it has also moved on a higher level, focusing on the importance of “battlefield information management,”
originally posted by: Zaphod58
a reply to: hutch622
When a guy that's 8 missions out of transition training gets 4 kills in a mission, I'd say they work pretty good.
“One of the key strike missions I did that day was to watch an eight-ship [formation] of F-35s kick open a door, which was a fairly hard door to open. Some F-22s came in after that to hold the door open, and the F-35s went back and picked up a strike train that consisted of [RAAF] Hornets, Super Hornets from the U.S. Navy, Typhoons from the [British] Royal Air Force and U.S. Air Force F-16s, supported by U.S. Navy [EA-18G] Growlers and U.S. Air Force F-16s,” Kitcher said.
“That was the first time I’ve been in a high-end exercise, involving a significant air threat, a significant surface-to-air threat and even a cyberthreat. You could see the way the F-35 was working with Classic Hornets, Super Hornets, Typhoons and Growlers to solve a very difficult problem. I’m confident that we’ll be doing that in Australia with our F-35s and our Super Hornets and Growlers within the next couple of years.”