Targeting Flashcards

(35 cards)

1
Q

Describe joint targeting

A

The process of selecting and prioritizing targets and matching the appropriate response to them, taking account if operational requirements and capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is Targeting both a joint and component level

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the principles of targeting

A

Focused-achieving JFC”S objective
Effects based- produce specific effects: functional, physical, or pyscological
Interdisciplinary- operators, intelligence, legal, geospatial
Systematic-achieve effects in a systematic manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Target characteristics

A

Physical-generally discernable to the five senses
Functional- describes what the target does and it does it
Cognitive- how targets process information
Environmental-the effect of the environment on the target
Temporal- describes the targets vulnerability to detection, attack, or other engagement in relation to time available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Deliberate targeting

A

Prosecutes planned targets, known to exist, with engagement scheduled to create effects which support JFC objectives. planned for more than 24 hours in advance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dynamic targeting

A

Prosecutes targets of opportunity and changes to planned targets or objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the targeting category methodologies

A

Deliberate

Dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the targeting categories for deliberate targets

A

Scheduled- prosecuted at a specific time

On call- actions planned but not for specific delivery time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the targeting categories for dynamic

A

Unplanned- known to exist in operational environment

Unanticipated- unknown or unexpected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the joint targeting cycle

A

An iterative process that is not time-constrained, and steps may occur concurrently, but it provides a helpful framework to describe the steps that just be satisfied to successfully conduct joint targeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Joint targeting cycle steps

A

Endstate-described and commanders objectives: Drives targeting process, specify damage criteria, sets requirements

Target development and prioritization: systematic evaluation of potential target systems, vetting and validation, CCMD determines its prioritization criteria

Capabilities analysis: evaluates available capabilities with desired effects to determine appropriate options

Commanders decision and force assignment: provides a vital link between planning and ops

Mission planning and execution: consider target engagement authority, and PID

Assessment: the measure of progress toward mission accomplishment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is measures of effectiveness

A

Criterion used to assess changes tied to measuring the attainment of an endstate. More subjective than MOP
Are we meeting the intended purpose
Why in the mission statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is measures of performance

A

Criterion used to assess friendly actions tied to task accomplishment.
Are we doing things right
Task completion
The “what” in the mission statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is d3a

A

Decide- set priorities for intelligence collection and attack planning (HPTL,ISR,AGM,TSS)

detect-determines accurate, identifiable, and timely requirements for collection systems, focus’on HPT and PIRs (connects recon to surveillance)

deliver- executes the targeting guidance and supports the commanders battle plan

assess- determination of the effectiveness of force employment during military operations

** Conventional/deliberate targeting methodology, process that prioritizes, identify, prosecutes and exploits targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the SOLE

A

Special operations liaison element ( a joint team)

  • Provide JSOFT combat plan to JFACC
  • coordinate ARSOF requests for air support
  • Synchronizes manuever and fired by exchanging operational and intelligence data
  • Deconflict airspace requirements
  • Integrate ADA with defensive counter-air
  • Provide feedback on the air war to JSOTF
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Steps of Target development and prioritization

A

Target systems analysis
Entity level Target development
Target list management

17
Q

Describe Target vetting

A

Assesses the accuracy of the supporting intelligence to establish a reasonable level of confidence in a targets functional characterization

18
Q

Describe Target validation

A

Ensures all vetted targets meet the objectives and criteria outlined in the commanders guidance, ensures compliance with ROE, LoW

19
Q

what is F3EAD

A

find- process of establishing a start point for Intel
Fix- applying Intel collection capabilities against a target to fix it in space and time
Finish- rapidly executing required actions
Exploit- examining and analyzing capture personnel, equipment and materiel for Intel purposes
Analyze- information found in previous phases are turned into intelligence
Disseminate- disperse Intel throughout the IC

20
Q

How do we overcome the challenge of targeting

A
Conduct thorough IPB
Strict adherence to processes
PIRs must be tied to a decision point
Fuse OPs and Intel
Update collection plan
21
Q

What are the steps of Capability anaylsis

A

Target vulnerability analysis

capabilities assignment

feasibility assessment

effects assessment

22
Q

What are the steps of Commander’s decision and force assignment

A

Consolidate targeting development and capabilities analysis

assemble data on friendly force status

Assign forces to specific targets

present joint targeting recommendations to the JFC

issue tasking orders to forces

23
Q

What are the three steps of Assssment

A

BDA

munitions effectiveness assessment

re-attack recommendations

24
Q

Describe the JIPTL creation process

A

Entity level target creation (ODA level)

Target development nomination (TDN)

Vett the target through Target Lists (RTL, NSL, CTL)

Joint target list

Joint target coordination board

Deputy JTF Commander approval

25
What types of targets end up on the JTL
vetted and validated for risk but not approved or prioritized yet
26
Definition of CDE
Collateral damage estimate, unintended or incidental damage to persons or objects which are not lawful targets (happens before action)
27
definition of BDA
estimate of target damage or effects.
28
When do you use center of gravity analysis or taxonomy
CoG - cognitive Target | Taxonomy- physical Target
29
What are the positive effects of targeting management
Offensive operations- applies constant pressure and targets the whole movement Precision targeting-adaptive strategy focusing on effects based and applies operational patience Minimizes collateral damage
30
What are some secondary effects of training management
ID Intel gaps Prioritizes and synergizes operational effort Long term application
31
What are the outputs for "focused" principle
Fully developed TVA collection management that is developed in conjunction with friendly COA
32
What are the outputs for "effects based" principle
CDE Target taxonomy Facilitated through FUSION meetings Incorporate IO planner in COADEV
33
What are the outputs for "interdisciplinary" principle
Fully understand available assets Fully developed collection management Fully developed sync told such as OVERLAYS that show gaps
34
What are the outputs for "systematic" principle
If desired effects are not scheduled, targets are recycled through process
35
What are the steps of Target value analysis
``` ID the threats Analyze the threats Critical capability Critical requirement Critical vulnerability ID high value targets and develop HVTL Detailed friend COA analysis analyze and ID HPT Develop HPTL ```