Targeting Flashcards

1
Q

What is targeting?

Targeting is the process of fusing what 2 things?

What is the Main obj of targeting?

Targeting is both a ______and _______level command function

A

the process of SELECTING and PRIORITIZING targets and MATCHING the appropriate RESPONSE to them, taking account of operational requirements and capabilities

Targeting is the process of fusing intel and ops

The main objective is to IDENTIFY resources the enemy can least afford to lose, or those that provide him with the greatest advantage.

Targeting is both a JOINT- and COMPONENT-level command function that:
 determines desired effects necessary to accomplish JFC objectives
 selects targets that achieve those effects
 selects or tasks the means to best engage those targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Guidelines/Principles of Targeting

A

• Focused - Achieving JFC’s objective

• Interdisciplinary -Operators, intelligence, legal, geospatial, etc.

• Systematic - Achieve effects (lethal and nonlethal actions) in a systematic manner

• Effects-based - Produce specific effects (physical, functional, or psychological)

• Direct - directs lethal and nonlethal to create desired effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Categories of Target
Functions

A

Facilities, individuals, virtual, equipment, organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

General targeting Categories

A

DELIBERATE: Prosecutes PLANNED targets, known to exist with engagement schedule to create effects which support JFC objectives

DYNAMIC: Prosecutes targets of OPPORTUNITY and changes to planned targets or objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Deliberate targeting scheduling methodologies

A

Scheduled: prosecuted at a specific time

On-call: actions planned but not for specific delivery time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dynamic Targeting scheduling methodologies

A

Unplanned: known to exist in OE

Unanticipated: unknown or not expected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Joint Targeting Cycle Definition?

A

“An iterative process that is NOT time-constrained, and steps may occur CONCURRENTLY, but it provides a helpful FRAMEWORK to describe the steps that must be satisfied to successfully conduct joint targeting”

 Common methodology
 Authoritative, yet flexible
 Helpful to coordinate, synchronize, and de-conflict
 Minimizes duplication
 Aids in integration of capabilities
 Links objectives, effects, tactical actions
 Relevant through all phases of operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the joint targeting cycle steps (Enter The Candy Cunt Mighty Ass)

A

1: End State and Commanders Objectives
2: Target Development and Prioritization
3: Capabilities Analysis
4: Commanders Decision and Force Assignment
5: Mission Planning and Force Execution
6: Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe Step 1 “End State and CDRS OBJ” (D-PECRR)

A

DRIVES targeting
• Sets targeting PRIORITIES
• Determines desired/undesired EFFECTS
• Specifies DAMAGE CRITERIA
• Establishes RESTRICTIONS
• Sets collection REQUIREMENTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe Step 2 “TARGET DEVELOPMENT AND PRIORITIZATION” (DEEV)

A

• Determines TYPE AND DURATION OF ACTION necessary to achieve Commander’s objectives
• Entails systematic EVALUATION OF POTENTIAL TARGET SYSTEMS
• EACH CCMD DETERMINES ITS PRIORITIZATION CRITERIA in accordance with the mission and the Commander’s intent, guidance, and objectives
• VETTING AND VALIDATION determines if a target remains a viable element of the system and whether it is lawful target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the 3 steps of “TARGET DEVELOPMENT AND PRIORITIZATION”

A
  1. TARGET SYSTEM ANALYSIS: An all-source examination of potential target systems to determine relevance to stated objectives, military importance, and priority of attack. It is an open-ended analytic process produced through the intelligence production process using national and theater validated requirements as a foundation”
  2. ENTITY-LEVEL TARGET DEVELOPMENT:
    • Progresses target from initial ID to execution level detail
    • Simultaneously conducted across the Joint Force. Submit individual entities as TDNs by components, agencies, and MN partners.
    • Target Development Nomination (TDN): Entities submitted by analysts from across the joint force as a result of TSA and target development.
  3. TARGET LIST MANAGEMENT
    Begins when a target is nominated for target development and ends with the creation and maintenance of a prioritized target list.
    Includes target:
    • Vetting
    • Validation
    • Listing
    • Nomination
    • Prioritization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Candidate Target List (CTL):

A

A list of OBJECTS or ENTITIES submitted by component commanders, appropriate agencies, or the joint force commander’s staff for FURTHER DEVELOPMENTand inclusion on the joint target list and/or restricted target list, or moved to the no-strike list”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Restricted Target List (RTL):

A

A list of restricted targets nominated by elements of the joint force and approved by the joint force commander. This list also includes restricted targets directed by higher authorities”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

No-Strike List (NSL):

A

A list of objects or entities characterized as PROTECTED from the effects of military operations under international law and/or ROE. Attacking these may violate the law of armed conflict or interfere with friendly relations with indigenous personnel or governments”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Joint Target List (JTL):

A

A CONSOLIDATED AND VALIDATED list of selected targets, upon which there are NO RESTRICTIONS placed, considered to have military significance in the JFC AOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Target Nomination List (TNL):

A

A target-consolidated list of targets made up of the multiple candidate target lists.

*A PRIORITIZED list of targets drawn from the joint target list and nominated by component commanders, appropriate agencies, or the joint force commander’s staff for INCLUSION on the joint integrated prioritized target list”

CTL–>JTL–>TNL–>JIPTL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(JIPTL):

A

Joint Integrated Prioritized Target List

A prioritized list of targets APPROVED and MAINTAINED by the JFC.

Targets and priorities are derived from the recommendations of components and other appropriate agencies, in conjunction with their proposed operations supporting the JFC’s objectives and guidance”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Target Oversight Authority:

A

Individual(s) responsible for conducting planning, coordination, and deconfliction associated with joint targeting”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Joint Targeting Coordination Board (JTCB):

A

A group formed by the JFC to accomplish broad targeting OVERSIGHT FUNCTIONSthat may include but are not limited to coordinating targeting information, providing targeting guidance and priorities, and refining the JIPTL. The board is normally comprised of representatives from the joint force staff, all components, and if required, component subordinate units”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe Step 3 “CAPABILITIES ANALYSIS” (4 steps: Tom Cant Fucking Eat)

A

TARGET VULNERABILITY ANALYSIS.
-Building on the critical target elements identified in phase 2

CAPABILITIES ASSIGNMENT.
-Weaponeering is accomplished in this step
-Asset Target Interactions (ATIs) is created and evaluated

FEASIBILITY ASSESSMENT.
-ATIs must be evaluated for feasibility.

EFFECTS ESTIMATE.
-Each feasible ATI should have first, second, and higher order effects identified.
-Collateral damage is a second order effect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Weaponeering

A

– Selecting weapon/system to inflict damage or effect
– Based on objectives and desired lethal and non-lethal effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Collateral Damage Estimation (CDE)

A

–UNINTENDED or INCIDENTAL damage to persons or objects which are not lawful targets
–CDE is conducted before operations to prepare the CDR for all possible effects of potential COAs
–Commanders must conduct a proper proportionality analysis to use the amount of force required to achieve a direct and concrete military advantage.
–CDE provides the process to predict and mitigate collateral damage
• Facilitates risk estimation and mitigation
• Identifies target engagement’s sensitivity and associated risks
• **Required on every target IAW ROE
• Target is weaponeered to balance accomplishing the mission with the risks to U.S. forces and the risk for collateral damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe step 4 “COMMANDER’S DECISION AND FORCE ASSIGNMENT” ( 5 Steps, CAAPI)

A

Integrates previous phases of JTC and fuses capabilities analysis with available forces, sensors, and weapons systems

Provides vital link between planning and ops

  1. Consolidate Target Development and Capabilities Analysis Results.
  2. Assemble Data on Friendly Force Status, Factoring in Operational Limitations and Apportionment Guidance
  3. Assign Forces to Specific Targets and Supporting Missions.
  4. Present Joint Targeting Recommendations to the JFC for Approval.
  5. Issue Tasking Orders to Forces.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe Step 5 “MISSION PLANNING AND FORCE EXECUTION”(PCPT)

A

Performed at operational and tactical levels
-tasked units conduct detailed planning and conduct assigned missions
-mission command monitors

Component planning
– OPORD/FRAGORD/ATO Input
– JFC support to units

**Target Engagement Authority (TEA): The authority to direct fires against approved targets.

Positive Identification: The reasonable certainty that a functionality and geospatially defined object of attack is a legitimate military target in accordance with the LOW and applicable ROE; also called PID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Describe Step 6 ASSESSMENT (Monkey Butt Rape)

A

Measures progress toward mission accomplishment

In general, the level at which a specified operation, task, or action is planned and executed should be the level at which it is assessed

Combat assessment is composed of three elements:
• BDA
• Munitions effectiveness assessment
• Re-attack recommendation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Describe BDA and the three phases

A

Battle Damage Assessment (BDA):

(PHYSICAL, CHANGE, FUNCTIONAL damage, TARGET system,—ASSESSMENT)

the estimate of target damage or effect which is based on PHYSICAL damage assessment, CHANGE assessment, and FUNCTIONAL damage assessment, as well as TARGET system assessment, resulting from the application of lethal and nonlethal capabilities.

BDA is conducted POST OPERATIONS to evaluate the EFFECTS of the actions conducted on the target.
***It facilitates advising the CDR on the MOEs and the MOPS

  • Phase 1: A PHYSICAL damage assessment is an estimate of the QUANTITATIVE extent of physical damage
  • Phase 2: FUNCTIONAL damage assessment is an estimate of the degradation or DESTRUCTION of the functional/operational capability of a target to perform its intended mission.
  • Phase 3: FUNCTIONAL Assessment of Higher-Level TARGET SYSTEM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Purpose—Munitions Effectiveness Assessment?

A

Determining the effectiveness of munitions, weapons systems, and tactics.

***The purpose of MEA is to compare the ACTUAL effectiveness of the task to the ANTICIPATED effectiveness calculated during phase 3 capability analysis of the joint targeting cycle.

MEA is conducted concurrently and interactively with BDA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Future Targeting and Re-attack Recommendation

A

***MERGE the picture of WHAT was done (BDA) with HOW it was done (MEA) and COMPARE the result with predetermined MOEs

The purposes are to determine degree of success in achieving objectives and to formulate any required follow-up actions, or to indicate readiness to move on to new tasks in the path to achieving the overall JFC objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Measures of Effectiveness

A

• A MOE is a criterion used to ASSESS CHANGES in system behavior, capability, or operational environment that is tied to measuring the attainment of an end state, an objective, or the creation of an effect. It measures the relevance of actions being performed.
• More subjective than MOP.
• Can be qualitative and quantitative.

“Are we doing the right things”

The WHY in the mission statement - Intended purpose

NOT tied to MOPs

Tracked in formal assessment plans

EXAMPLES?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Measure of Performance

A

• A MOP is a criterion used to assess friendly ACTIONS that is tied to measuring task accomplishment. (tactical tasks)
• Metrics should be: relevant, measurable (against baseline), responsive, and resourced.

“Are we doing things right”

WHAT in the mission statement

Not tied to MOEs

Tracked in Execution Matrices

EXAMPLES?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the purpose of Joint Targeting?

A

The purpose is to provide the JFC with a TARGET LIST to support the joint force campaign OBJECTIVES

Components, of which SOF is one, must understand the Joint Targeting Cycle to achieve the effects necessary to accomplish the JFC objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Describe the role of the SOLE

A

Typically a joint team provided by the JFSOCC to the JFACC at the JAOC (Joint Air Operations Center) to coordinate, deconflict and synchronize special operations air, surface and subsurface activities with joint air operations.

JFSOCC–>JFACC @ JAOC

SOLE Director:
- works directly for the JFSOCC / CDR JSOTF
- has no command authority; does NOT make decisions
- places SOF ground, maritime, and air members in the JAOC

***Role: Critical to integrating the ARSOF/JSOTF Commander’s targeting needs with the Joint Force

Responsibilities:
• Provide JSOTF/ARSOF combat plan to JFACC/JAOC.
• Coordinate ARSOF/JSOTF requests for air support.
• Synchronizes maneuver and fires by exchanging operational and intelligence data.
• De-conflict airspace requirements
• Integrate ADA with defensive counter-air
• Provide feedback on the air war to JSOTF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the 3 Perspective of SOF Targets?

A

Strategic Targets: Vital to friendly objectives and the adversary’s overall political, military, and economic operations or psychological stability.

Operational Targets: Critical to the adversary’s capability to conduct battles on a relatively local scale. Such targets may include logistics and C4I functions to support and direct tactical operations.

Tactical Targets: Affect the adversary’s capability to conduct battles on a relatively localized basis.

34
Q

What are the positive effects of targeting management? (MAIT)

A

PRIMARY EXAMPLES
** Minimizes populace disruption and creates IO opportunities
** Applies pressure on the enemy Op Cycle
** ID INTEL gaps
** Trusts instincts, hunches and seizes unforeseen opportunities
* Allows forces to ID, Target, Destroy cells and networks (Long term implication)

  • Prioritizes and synergizes operational effort

Offensive Operations
** Applies constant pressure on the Adversary Operational Cycle
- Targets entire insurgent movement vs. individuals
- Trusts instincts, hunches and seizes unforeseen opportunities
- Neutralizes when necessary in order to achieve mid to long term affects

Precision Targeting
- Develops an adaptive offensive strategy that is effects based and applies operational patience for higher gains
** Minimizes collateral disruption among the populace and creates IO opportunities
- Demonstrates an offensive presence that demoralizes the enemy and discourages potential recruits

Effects cont:
** Identifies intelligence gaps
** Prioritizes and synergizes operational effort
- Identifies opportunities for surge/ synchronized operations
- Enhances ability to forecast enemy reaction and enemy counters post operations
** Long term implication: Allows forces to Identify, Target, and Destroy cells and networks.

35
Q

Targeting Guidelines (FISE + D)

A
  1. Focused
  2. Effects Based
  3. Interdisciplinary
  4. systematic
  5. directs

FISE (principles) + directs

36
Q

What is a target?

A

A target is an ENTITY or OBJECT (that performs a function for the enemy) considered for possible engagement or other action. It may be an … FIVE-O

37
Q

***Target Characteristics (C-PEFT)

A

Cognitive - describe how targets process information or exercise control functions.

Physical - generally discernible to the five senses.

Environmental - describe the effect of the environment on the target.

Functional - describe what the target does and how it does it.

Temporal - describes the target’s vulnerability to detection, attack, or other engagement in relation to the time available.

38
Q

Target Types-six

A

HVT
HPT
High Value Individual
Time Sensitive Targets
No strike
Restricted Target List

39
Q

HVT vs HPT

A

HVT: Target/asset req for success of enemy COA

HPT: Target/asset loss to enemy, contribute to success of friendly COA (subset of HVT)

High Value Targets: A target the enemy commander requires for the successful completion of the mission.

High Payoff Targets: (subset of HVTs) A target whose loss to the enemy will significantly contribute to the success of the friendly COA.

HPTL is a prioritized list of HPT

40
Q

High Value Individual:

A

High Value Individual: A high-value individual is a PERSON of INTEREST (friendly, adversary, or enemy) who must be identified, surveilled, TRACKED and influenced through the use of information or fires.

41
Q

Time Sensitive Targets:

A

Time Sensitive Targets: A target or set of targets requiring IMMEDIATE response because it is a highly lucrative, fleeting target of opportunity or it poses (or will soon pose) a danger to friendly forces.

42
Q

No-Strike:

A

No-Strike: Objects or entities characterized as protected from the effects of military operations under international law and/or ROE.

Attacking these may violate the law of armed conflict or interfere with friendly relations with indigenous personnel or governments

43
Q

Restricted Target List:

A

Restricted Target List: VALID target that has specific RESTRICTIONS placed on the actions authorized against it due to OPERATIONAL CONSIDERATIONS

44
Q

Explain the Army’s deliberate targeting methodology

A

The Decide, Detect, Deliver, and Assess (D3A) deliberate targeting methodology is an integral part of the decision cycle from receipt of the mission through OPORD execution.

**Each part of the methodology occurs at the same time and sequentially

**As decisions are made in planning future operations, current operations staff elements execute detection and attack of targets on the basis of prior decisions.

Top-Down-Approach

45
Q

D3A: DECIDE

A

-provides the overall focus
-SETS PRIORITIES FOR INTELLIGENCE COLLECTION and attack planning.

Draws heavily on a DETAILED IPB and continuous assessment of the situation.

-Target DEV
-TVA
-HPT and HVT
-TSS
-Attack Options
-Attack Guidance
-ISR

46
Q

Target Value Analysis

A

The TVA process identifies potential HVT sets associated with critical enemy functions that could interfere with the friendly COA or that are key to enemy success.

QUANTIFIES THE RELATIVE VALUE OF HVTS WITH EACH OTHER IN RELATION TO A PARTICULAR ENEMY COA
• Separate process conducted initially during IPB
• Repeated throughout the operations process as part of targeting
• Most current intelligence related to the enemy
• Initially based on the threat/adversary templates (Step 3 of IPB)
• Refined based on the threat/adversary COAs (Step 4 of IPB)
• Continually refined based on changes to the enemy situation overlay during operations

47
Q

Intelligence Collection vs Targeting

A

Intelligence is collected and reported to higher for analysis and dissemination. The disseminated intelligence product is used by various branches of the USG for monitoring emerging security issues and developing US policy

Targeting requires working down to the primary source of the information in order to develop actionable intel. success requires matching the actionable intelligence with prosecution capabilities

48
Q

D3A: DETECT

A

-Focus on HPTs and PIRs.
—> Target TRACKING (maintain current location)

  • Determines accurate, identifiable, and timely requirements for collection systems

• Fires Cell tells the S2 the degree of accuracy required and dwell time for a target to be eligible for attack (TSS)
• Update the HPTL and AGM
• ISR Synchronization Matrix

The G-2 or S-2 is responsible for directing the effort to detect HPTs identified in the decide function.

49
Q

D3A DELIVER

A

**This function EXECUTES the target GUIDANCE and SUPPORTS the CDR BATTLE PLAN once the HPTs have been located and Identified.

Execution of the Attack Guidance Matrix (AGM)

“Fire Support Coordination Measure (FSCM): A measure employed by land or amphibious commanders to facilitate the rapid engagement of targets and simultaneously provide safeguards for friendly forces”

-Attack
-Planned Targets
-Targets of Opportunity
-Desired Effects
-Attack Systems

50
Q

D3A ASSESS

A

The determination of the EFFECTIVENESS of force employment during military operations.

-Tactical Level
-Operational Level
-Restrike
-Feedback

51
Q

Taxonomy

A

Adversary
Target System
Target System Component
Target
Target Element
Critical Element
Critical Damage Point

52
Q

COG

A

• A COG is a source of power that provides moral or physical strength, freedom of action, or will to act.
• The purpose of performing COG analysis is to determine and evaluate the enemy’s Critical Vulnerabilities (CVs) for exploitation.
• The results of COG analysis are later used during Course of Action Development to exploit identified vulnerabilities.
• Vulnerabilities = HVT

53
Q

COG Critical Factors

A

Critical Capabilities (CC)

-Essential to objective accomplishment

-Key word is a verb:
It can destroy
Seize an objective
Prevent you from achieving a mission

Critical Requirements (CR)

-An essential condition, resource, and means for a critical capability to be fully operational

Critical Vulnerabilities (CV)

-An aspect of a critical requirement which is deficient or vulnerable to direct or indirect attack that will create decisive or significant effects.

54
Q

COG analysis Technique / Sequence

A

 Identify the end state

 Define the primary CC

 Identify the COG.

(“Who possess the means to execute the primary CC that achieves the ES?” The response to this question is the most likely candidate for COG)

 Identify the CRs required to execute the CC.

 Identify critical vulnerabilities (CV).

55
Q

CARVER and purpose

A

Criticality
Accessibility
Recuperability
Vulnerability
Effect
Recognizability

Purpose of CARVER is to determine the military importance of target Components, the priority of attack, and weapons required to obtain a desired effect on a target or set of targets.

56
Q

Target Value Analysis Steps

A
  1. ID Threat
  2. Analyze Threat
  3. ID HVT. Develop HVTL
  4. COA Analysis
  5. Analyze the HVTL. ID HPT
  6. Develop HPTL
57
Q

Target development generally results in four products:

A
  • target development nominations
    • target folders
    • collection and exploitation requirements
    • target briefs
58
Q

Vetting vs Validation

A

VETTING assesses the accuracy of the supporting intelligence to establish a reasonable level of confidence in a target’s functional characterization

VALIDATION ensures all vetted targets meet the objectives and criteria outlined in the commander’s guidance, and ensures compliance with the law of war (LOW) and rules of engagement (ROE)

Both are a key part of target development. Both reduce risk in identification of inappropriate/illegitimate targets.
59
Q

What’s the challenge with targeting?

A

-Sifting through massive amounts of intel

-examine the adversary from a macro level

-characterize vulnerabilities with enough detail to derive meaning.

60
Q

How do we overcome the challenges to targeting?

A

-Conduct IPB
-Strict adherence to various processes like TVA, COG Analysis, CARVER
-PIRs must be tied to a decision point
-(Fusion) S2 & S3 must coordinate the collection effort and targeting effort
-Update the collection plan, strict management of assets and disseminate information

61
Q

What constitutes a prioritized list of targets whose loss to the enemy will contribute to the success of the friendly course of action?

A

High Pay-Off Target List (HPTL)

62
Q

What are assets the enemy commander needs for successful completion of his mission?

A

High Value Targets (HVTs)

63
Q

What are the physical and or/ morale entities that are the primary components of strength, power and resistance?

A

Center of Gravity

64
Q

The most important elements of effective dynamic dynamic targeting?

A

Detailed commander’s objectives and guidance and (CCIRs)

guidance should articulate the risk tolerance

65
Q

Dynamic targets vs deliberate targets

A

Dynamic Targets
Targets identified too late, or not selected, for action in time to be included in deliberate targeting but when detected meet criteria specific to achieving objectives.

Deliberate Target
Targets known to exist in the operational environment, upon which actions are planned using deliberate targeting, creating effects which support commander’s objectives.

66
Q

Dynamic targets can be used for both….

A

Lethal and nonlethal capabilities

67
Q

F2T2EA Process “Kill Chain” (multi service)

A

(1) Find. Detect and classify targets for prosecution.

(2) Fix. Determine the location of the potential target.

(3) Track. Observe and monitor the target’s activity and movement.

(4) Target. Decide whether to engage the target and select and coordinate the means to create the desired effects.

(5) Engage. Take action against the target.

(6) Assess. Focus on the results of the target engagement. Battle damage assessment (BDA) is critical to determine if an immediate reattack is required.

68
Q

Dynamic (HVI) Targeting Method

A

F3EAD

FIND
FIX
FINISH
EXPLOIT
ANALYZE
DISSEMINATE

69
Q

F3EAD

A

*provides MANEUVER leaders at all levels with a methodology that enables them to organize resources and array forces across the range of operations.

*provides the maneuver commander an additional tool to address CERTAIN TARGETING CHALLENGES

*F3EAD is not a replacement for D3A nor is it exclusive to targeting. Example of TTPs that work at tactical level

*The exploit and analyze steps are often the main efforts of F3EAD because they provide insight into the enemy’s network and may open new lines of operation.

70
Q

FIND (F3EAD)

A

The process of establishing a START point for intelligence collection.
***Can be deliberate or opportunity-based

Uses CMDRS guidance, priorities and IPB to detect and nominate potential HVIs for dev
– uses full range of intel capes

Takes place at ALL LEVELS of both the intelligence and operations systems

HVI network ID and analyzed

71
Q

FIX (F3EAD)

A

Applying INTEL COLLECTION capability against the target to develop OP-TRIGGERS to “fix” the target in space and time.

Fixing a target simply means that the intelligence effort has progressed enough that the operations function has sufficient information to execute the mission

Maximize effects while minimizing costs, effort, and time by reaching out to higher “2” shops, adjacent units, and the IC.

1) sufficient info on target to execute mission
2) target is ID
3) location accuracy refined to a level required for engagement
4) fixed in time and space – intel capes
5) ISR to fix target and brings to next decisive phase

72
Q

FINISH (F3EAD)

A

Lethal combat operations in which SOF close with and destroy or seize enemy facilities, equipment, or personnel.

Previously considered the main effort.

Also non-kinetic! Neutralization of an enemy communications node, disrupting a courier network, legal prosecution of key terrorist personalities, or achieving a desired psychological, political, or social effect are just as much a part of “finish” as missile strikes or combat assaults.

** Kinetic or non kinetic action on tgt target is isolated and engaged target location secured exploitation force on site

73
Q

EXPLOIT (F3EAD)

A

Main effort of F3EAD… the most CRITICAL single step in the process… leads to the finding, fixing, and finishing of the next target and the perpetuation of the cycle.

The process of examining, analyzing, interrogating, and processing captured enemy personnel, equipment, and materiel for intelligence purposes.

Purpose is to produce enough actionable intelligence and/or prosecutorial evidence to perpetuate the F3EAD process as rapidly as possible.

four steps include:

Force pro
targeting component
materiel sourcing
prosecution

74
Q

ANALYZE (F3EAD)

A

The “analyze” phase is where the information gained in the find, fix, finish, and exploit phases turns into intelligence which can be used to drive operations.

Analysis can be performed by SOF in theater, or information and materiel can be sent back to CONUS for further in-depth analysis.

The exploit, analyze, and disseminate steps amplify the assess function.

75
Q

DISSEMINATE (F3EAD)

A

-Creation of a wider dissemination network than what has traditionally been practiced inside the US intelligence community.

-Dissemination is a key aspect of the SOF targeting process and warrants inclusion as an independent phase of the SOF targeting cycle.

-Dissemination of intelligence information gleaned through the SOF targeting process helps to create “A NETWORK TO DEFEAT A NETWORK” throughout the intelligence enterprise and helps eliminate intelligence stovepipes.

Spread info/knowledge gathered resulting exploitation and analysis

Intel and info is pushed higher, lower to adjacent units

Databases/Matrices assessment updated

76
Q

What are four goals of Target Exploitation?

A

Force pro
targeting component
materiel sourcing
prosecution

77
Q

Information gained in the find, fix, finish, and exploit phases turns into intelligence which can be used to drive operations is what part of F3EAD?

A

Analyze

78
Q

F3EAD is best suited for what level of operations

A

Tactical

79
Q

What step in F2T2EA allows you to focus sensors, locate, identify a potential target?

A

Fix

80
Q

What is the difference between the track and target phases? (F2T2EA)

A

The track phase is used to provide persistent ISR on the target while the target phase validates that the target is approved for engagement.

81
Q

What is the most important output of the assess phase? (F2T2EA)

A

The timely report of estimated or confirmed engagement results