Bomb on Target (1) BOT and BOC. JTACs/FAC(A)s will state the method of attack, whether BOT or BOC, as part of the game plan prior to the CAS brief. These.

Slides:



Advertisements
Similar presentations
Barhale Procedure for Site Establishment
Advertisements

BRIEFING OFFICER APPROVAL AUTHORITY TRAINING Updated Jan09.
1 #4295. Which frequency should you expect to use for Regional Approach Control, control tower, and ground control respectively at DFW when coming from.
Best Practices for Taxi Operations at Towered & Non-Towered Airports
Assault An enemy position CONDITION: The tank platoon is operating as part of a company team or cavalry troop during tactical operations and receives.
Welcome Air Traffic Control Procedures For: SAFECON 2015 Competition.
VISUAL APPROACHES.
Determine Target Location
Helicopter Safety 2015 Agusta 109.
Best Practices for Taxi Operations at Towered & Non-Towered Airports
Selecting and fighting
Federal Aviation Administration Deepwater Horizon NOTAM Overview Air Traffic Organization System Operations Security Date: July 25, 2010.
PERFORM MULTIAIRCRAFT OPERATIONS TASK 2010 CONDITIONS: In an H-60 helicopter. STANDARDS: Appropriate common standards plus the following additions/modifications:
Flight Mission AREA 1 COURSE RULES GOUGE. FAM-08 AREA 1.
Flight Mission AREA 4 COURSE RULES GOUGE. FAM-08 AREA 4 WILBUR 9K FLOOR LUKE 9K FLOOR NMM R-007 NMM R-325 FOZZY 11K FLOOR TARGET NJW GUNSHY AREA SEQUENCE:
AIRCRAFT HANDLING Part 5 Pre-Take Off Checks. Starting Engines Starting engines is a team procedure between the pilot and the ground handling team. The.
Ground Taxi Call (prior to taxi)  3E123: “North Ground, 3E123, taxi, with information (ATIS).” North Ground: “3E123, taxi to runway 14, Squawk 0123.”
Integrating COIN and Full Spectrum Training LtCol M. B. Barry 23 Sep 2010.
RED FLAG “Training the world’s best to be better!” Threat Update: 27 Sep 2008 Mass Brief Day-9 Mission-1.
INTRODUCTION TO THE ELEMENTS OF A FIRING OPERATION.
US IL Flying Club June 1 st, VERSION 4.
 The patrol is moving along its route.  The Point person halts the patrol and gives the signal for a danger area.
Force Packaging >. Overview  Force Packaging  Process of Force Packaging  Detached Support  Developing Packages.
Uncontrolled copy not subject to amendment Revision 2.00 Airmanship Knowledge for Air Cadets Learning Outcome 2 Know the Rules of the Air.
A/V 7-1 UNIT 7: THE EXPANDED ORGANIZATION/REINFORCED RESPONSE.
Breaking Contact B Trp 7-10 CAV 4ID Reference Material
REGULATIONS FOR ARMY AIRCRAFT CW2 ROBERT GOEBEL. Administrative Please turn off all: –Cell phones –Beepers –Palm Pilots –Gameboys –Stereos –Watch alarms.
Fireground Operations: Staging Union County SOG 3.24.
Overview Member knowledge of proper ground handling enables NESA to conduct safe operations and prevent unnecessary injury and/or damage to equipment.
Federal Aviation Administration Runway Safety For Corporate Pilot’s Corporate Seminar August 8, 2009 Back to Basics For Runway Safety.
Bomb on Target (1) BOT and BOC. JTACs/FAC(A)s will state the method of attack, whether BOT or BOC, as part of the game plan prior to the CAS brief. These.
14 Wg ATC Procedures Captain Greg Miller FAS Briefing, 16 Oct 2016.
TARGET HANDOVER TO AN ATTACK HELICOPTER (TASK 2054)
EVASIVE MANEUVERS TASK: 2008 Perform Evasive Maneuvers
Working Together Preventing Runway Incursions (an integrated approach)
Dulles Airport Operations
Air Traffic Control Communications
Patuxent River Navy Flying Club Bi-Monthly Safety Briefing October 11, 2016 Dave Kirk PRNFC Safety Officer.
86th Flying Training Squadron
Uncontrolled copy not subject to amendment
AIRCRAFT MAINTENANCE TOWING OF AIRCRAFT.
Emergencies.
1st Virtual Fighter Wing 6 FEB z
Auto Tow Conversion Course
VFA-141 “WOLFPACK” SOPs for Air-to-Ground Attack
Law 13 – Free Kicks U.S. Soccer Federation Referee Program
OPERATIONS ON PARALLEL OR NEAR-PARALLEL RUNWAYS
SAFE WORK INSTRUCTIONS
XYZ Port Facility Maritime Security Drill
XYZ Port Facility Maritime Security Drill
DJ de Nysschen Wonderboom Air Traffic Control
AIR ASSAULT AIR MOVEMENT OPERATIONS. AIR ASSAULT AIR MOVEMENT OPERATIONS.
Battle to Retake Fallujah 4 JUN 2016 | 1800z Local | 02:00 In Sim
Banks Logo Emergency Procedures.
Tactical Decision Games
Protocol References Section Title 6.2 Entry Visit 5.1
AIR TRAFFIC CONTROL SERVICE
Protocol References Section Title 6.2 Entry Visit 5.1
FIREFIGHT SOP.
Emergency Evacuations: Multi-Level Apartments
SAFE WORK INSTRUCTIONS
Force Packaging.
Oleh : Ir. Sjaifuddin Thahir, MSc.
Aircrew Tasks O-2022 DEMONSTRATE SCANNING PATTERNS AND LOCATE TARGETS (S) O-2102 DEMONSTRATE PLANNING AND FLYING A ROUTE SEARCH (P) O-2103 DEMONSTRATE.
RECONNAISSANCEPATROLS. Reconnaissance Patrol TERMINAL LEARNING OBJECTIVE ACTIONS: Organize and lead a recon patrol CONDITIONS: Given a tactical situation.
Electronic Search Patterns & Procedures
Steps to Interior Attack
Helicopter Safety for SAR Operations
Aircrew Tasks O-2022 DEMONSTRATE SCANNING PATTERNS AND LOCATE TARGETS (S) O-2102 DEMONSTRATE PLANNING AND FLYING A ROUTE SEARCH (P) O-2103 DEMONSTRATE.
Presentation transcript:

Bomb on Target (1) BOT and BOC. JTACs/FAC(A)s will state the method of attack, whether BOT or BOC, as part of the game plan prior to the CAS brief. These methods of attack apply to all types of control and all ordnance employed in CAS missions. JTACs/FAC(A)s and CAS aircrews should think of and use these methods of attack as a clear, concise, effective manner to communicate the requirements for correlation from CAS aircraft employing ordnance. Effective use of BOT and BOC constructs to clarify JTAC/FAC(A) and CAS requirements for a CAS engagement will result in more expeditious attacks and help mitigate friendly fire and collateral damage. The misapplication of BOT and BOC in tactical scenarios will often result in confusion between CAS aircraft and JTAC/FAC(A), increased time to kill, and potentially cause friendly fire or collateral damage. ForBOTmissions,onlytheleadaircraftisrequiredtoreadbackLine4and Line 6, in conjunction with other required restrictions. All attack aircraft will conduct readbacks if requested by the JTAC/ FAC(A). (b) ForBOCmissions,allaircraftdeliveringordnancemustreadbackLine4 and Line 6 from their system or weapon, as appropriate, in conjunction with other required restrictions. (2) A BOC attack is used when the JTAC/FAC(A) determines that the desired effects can be created against the target with CAS aircraft employing ordnance on a specified set of coordinates. The coordinates must be of sufficient fidelity/mensuration to produce the desired effect on the target and be used for fires approval. If the aircraft is never required to be TALLY/CAPTURED the target or CONTACT the mark, it is a BOC attack The JTAC/FAC(A) does not need to delay the CAS attack in order to build CAS aircraft awareness to achieve target TALLY/CAPTURE. If a BOC attack is planned based on the tactical scenario, then unnecessary exposure to the threat by CAS platforms is avoided and time is not wasted conducting targeting confirmation. Great care must be taken to ensure that the target location with the required precision and accuracy determined in the commander’s tactical risk assessment is obtained and entered into the weapon/navigation system. Aircrew will not modify coordinates once read back. For a BOC attack, aircrew readback will be from the weapon or aircraft system.

Bomb on Target (1) BOT and BOC. JTACs/FAC(A)s will state the method of attack, whether BOT or BOC, as part of the game plan prior to the CAS brief. These methods of attack apply to all types of control and all ordnance employed in CAS missions. JTACs/FAC(A)s and CAS aircrews should think of and use these methods of attack as a clear, concise, effective manner to communicate the requirements for correlation from CAS aircraft employing ordnance. Effective use of BOT and BOC constructs to clarify JTAC/FAC(A) and CAS requirements for a CAS engagement will result in more expeditious attacks and help mitigate friendly fire and collateral damage. The misapplication of BOT and BOC in tactical scenarios will often result in confusion between CAS aircraft and JTAC/FAC(A), increased time to kill, and potentially cause friendly fire or collateral damage. ForBOTmissions,onlytheleadaircraftisrequiredtoreadbackLine4and Line 6, in conjunction with other required restrictions. All attack aircraft will conduct readbacks if requested by the JTAC/ FAC(A). (b) ForBOCmissions,allaircraftdeliveringordnancemustreadbackLine4 and Line 6 from their system or weapon, as appropriate, in conjunction with other required restrictions. (2) A BOC attack is used when the JTAC/FAC(A) determines that the desired effects can be created against the target with CAS aircraft employing ordnance on a specified set of coordinates. The coordinates must be of sufficient fidelity/mensuration to produce the desired effect on the target and be used for fires approval. If the aircraft is never required to be TALLY/CAPTURED the target or CONTACT the mark, it is a BOC attack The JTAC/FAC(A) does not need to delay the CAS attack in order to build CAS aircraft awareness to achieve target TALLY/CAPTURE. If a BOC attack is planned based on the tactical scenario, then unnecessary exposure to the threat by CAS platforms is avoided and time is not wasted conducting targeting confirmation. Great care must be taken to ensure that the target location with the required precision and accuracy determined in the commander’s tactical risk assessment is obtained and entered into the weapon/navigation system. Aircrew will not modify coordinates once read back. For a BOC attack, aircrew readback will be from the weapon or aircraft system.

FLIGHT 1 FLIGHT 2

Type 2 Control The JTAC/FAC(A) must visually acquire the target or utilize targeting data from another asset with accurate real-time targeting information. Type 2 control requires control of individual attacks. Examples of when Type 2 control may be applicable are troops in contact, night, adverse weather, and high altitude or standoff weapons employment. Type 2 control procedures are as follows: 1. The JTAC/FAC(A) visually acquires the target or acquires targeting data from another asset with accurate real-time targeting information. 2. The JTAC/FAC(A) passes the game plan and CAS brief to the attacking aircrew. 3. The attack aircrew validates target location by cross-checking that the position is coincident with the expected target area, using all appropriate means. 4. TheaircrewwillreadbackLine4,Line6,andanyrestrictionsprovided by the JTAC/FAC(A). 5. The JTAC/FAC(A) will conduct correlation as required. 6. The aircrew will provide an “IP INBOUND” call if requested. 7. The attack aircrew will provide the JTAC/FAC(A) with an “IN” call, indicating entering terminal phase of air-to-ground attack, prior to weapons release. Aircrew should make this call at the appropriate time to allow clearance before entering the release window. If a restriction in the form of a direction or final attack heading (FAH) was given in the CAS brief, then it will be included with the IN call. Example: “IN from the South” or “IN heading 360.” All attacking aircraft are required to provide an IN call unless coordinated otherwise. 8. JTAC/FAC(A) will provide a “CLEARED HOT,” “CONTINUE DRY,” or “ABORT” based on the above procedures being met. In the case of a flight conducting attacks together, the JTAC/FAC(A) may elect to either provide a single clearance for the flight or each attack aircraft individually, based upon the tactical scenario.

CHECK IN / ROUTING / STACKING SITUATION UPDATE GAME PLANE 9-LINE ATTACKS CHECK OUT BDA

(1) Line 1―IP or BP. The IP is the starting point for the run-in to the target. For RW aircraft, the BP is where attacks on the target are commenced. (2) Line 2―Heading and Offset. The heading is given in degrees magnetic from the IP to the target or from the center of the BP to the target. The offset is the side of the IP- to-target line on which aircrews can maneuver for the attack. (3) Line 3―Distance. The distance is given from the IP/BP to the target. (4) Line4―TargetElevation.Thetargetelevationisgiveninfeetmeansealevel (MSL) unless otherwise specified. (5) Line5―TargetDescription.Thetargetdescriptionshouldbespecificenough for the aircrew to recognize the target. (6) Line 6―Target Location. The JTAC/FAC(A) provides the target location. (7) Line7―MarkType/Terminal Guidance.The type of mark the JTAC/FAC(A) will use (for example, smoke, laser, or IR). If using a laser, the JTAC/FAC(A) will also pass the call sign of the platform/ individual that will provide terminal guidance for the weapon and laser code. (8) Line 8―Friendlies. Cardinal/sub-cardinal heading from the target (N, NE, E, SE, S, SW, W, or NW) and distance of closest friendlies from the target in meters (e.g., “South 300”). (9) Line 9―Egress. These are the instructions the aircrews use to exit the target area. (10) Remarks/Restrictions. Supplies additional information important to the conduct of the attack.

Talon1, Hold check in, attack in progress Talon1, Hold check in, attack in progress. Hold at Sinatra, block 20 to 22 Talon 1, Go with Check In Keyhole in effect N 38.24.210 E 127.11.05 How copy Proceed Bravo 8, block 17-19, We have another Viper flight in the stack, callsign Falcon1, advise when ready game plan. Advise when ready for situation update. CAS: “Current surface-to-air threat is an unlocated ZSU 23-4, last reported NE of echo point. enemy situation is a light armored company attempting to flank us to the north and two companies dug in three klicks to our west, break. Friendlies are a recon team SW of Sinatra. There is also a STA team at the northwest tip of Blue Mountain; 81mm mortars are firecapped south of OP 2, firing generally northwest, break. Winds on the deck are 5 knots out of the northwest, I have a Sniper pod. I plan on using you to disrupt the light armor so the recon team can push up closer to the DMZ for a better line of site, cleared into the wheel at your assigned block, advise when ready for game plan.” “Talon1, this is Elvis 51, Type 2 control, bomb on coordinate, 2 Mk-82s each, simultaneous impacts, running a race track in and off target single ship passes. advise when ready to copy 9-line.” Seconds to impact if you can or just say 30 seconds to impact. How many dropped and where you going ie. Talon 11, 2 away, 30 seconds to impact, proceeding to charlie 10 Situagtion up date is for fun - don

Charlie 10 Elevation: 1300ft BMP Infantry Vehicles N 38.27.232 E 129.38.066 No Mark South 1100 Egress, left pull, back to charlie 10 block 20-22 Advise when ready for remarks Final attack heading 360 plus or minus 30, no other restrictions at this time how copy? Good readback. Talon1, Report IP inbound on your first pass. Call in with heading, Expect clearance as a flight. Continue (IP inbound) Cleared hot Good impacts standby BDA (say if good or not) Talon12 are you tally on Talon11 last impact? Request reattack. Change to game plan, bomb on target. Same ordnance, same 9-line, same restrictions. From Talon1 last impacts, adjust east 25 meters. There is a second command BMP there, how copy”

Don’t need to acknowledge continue or cleared hot