Targeting Flashcards

1
Q

What is the definition of Targeting?

A

The process of selecting and priortizing targets and matching the appropriate response to them while considering operational requirements and capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four principles of Targeting?

A
  • Focused
  • Effects Based
  • Interdisciplinary
  • Systematic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the primary tasks for an SFOD-A in LSCO targeting?

A
  • Sense deep with organic and indigenous assets (Detect)
  • Provide terminal guidance in the deep areas (Detect)
  • Assist cyber and IO with physical access (Deliver)
  • Conduct raids and seize critical targets (Deliver)
  • Employ indigenous assets to conduct raids, ambushes, sabotage, subversion, deception, and assist cyber and IO with physical access (Deliver)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give an example of an entity that could be on the No Strike List.

A
  • Hospitals
  • Churches
  • Schools
  • Bridges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give an example of a target that could be on the Restricted Target List.

A
  • HVIs that are friendly sources
  • Chemical weapons facilities
  • Communication relays being targeted and exploited
  • A military server that will be an access point for a friendly cyber attack
  • A radar facility that will be given spoofed radar data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should be included in Commander’s Targeting Guidance?

A
  • Targeting priorities
  • Operational objectives
  • Delegated responsibilities for target validation and approval
  • Desired end state
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Critical Capabilities?

A

A verb that describes what the system does and is essential to achieving the threat objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Critical Requirements?

A

The means (noun) that the threat requires to execute a critical capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Critical Vulnerabilities?

A

Elements (noun) related to threat critical requirements that appear exposed or susceptible to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What tool do we use for Target Value Analysis?

A

CARVER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Target Vetting?

A

Determining whether the target intelligence is good; the target does what we think it does and is where we think it is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Target Validation?

A

Determing whether:

it meets the commander’s objectives

complies with the LOAC (this is a legal target)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does CARVER stand for?

A
  • Criticality
  • Accessibility
  • Recooperability
  • Vulnerability
  • Effect
  • Recognizability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Collateral Damage Estimation?

A

A methodology that assists the commander in staying within LOAC, ROE, and international law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What two factors do we balance during Collateral Damage Estimation?

A
  • Expected loss of life, injury, and damage to civilians
  • Expected military advantage to be gained
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Battle Damage Assessment?

A

Evaluating the physical and functional damage inflicted on the enemy to gauge the effectiveness of military actions.

provides commanders crucial intelligence on enemy capabilities

drives future operations and targeting.

  • Known or estimated enemy unit strengths
  • Degraded, neutralized, or destroyed enemy weapon systems
  • Known captured, wounded, or killed enemy personnel during the reporting period
17
Q

What are the weaknesses of D3A?

A
  • Ignores exploitation
  • Weak technique against HVIs
18
Q

What are the weaknesses of F3EAD?

A
  • Missing ‘Decide’
  • Emphasis on exploitation which requires increased time on target
19
Q

When would you use F3EAD as a targeting methodology?

A

In a COIN environment, focused on HVIs, and where it is feasible to exploit targets.

20
Q

When would you use D3A as a targeting methodology?

A

In LSCO, War, where enemy is organized in conventional formations and BDA is the focus.

21
Q

What is the first principle of Targeting?

A

Focused: Achieving the commander’s objectives.

22
Q

What is the second principle of Targeting?

A

Effects Based: Creating specific desired effects through lethal and nonlethal actions.

23
Q

What is the third principle of Targeting?

A

Interdisciplinary: is a command function that requires the participation of many disciplines.

24
Q

What is the fourth principle of Targeting?

A

Systematic: Achieving effects through lethal and nonlethal actions in a systematic manner.

25
What is commanders targeting guidance?
Includes targeting priorities, target selection standards, high payoff targets, operational objectives, authorized actions against targets, desired effects, and the desired end state.
26
What is D3A?
* A targeting process where the Army identifies, locates, engages, and evaluates targets. * Essentially, it's a cycle: * Decide: Determine which targets to engage. * Detect: Locate the targets. * Deliver: Engage the targets with the appropriate weapons. * Assess: Evaluate the effectiveness of the engagement.
27
What is F3EAD?
Systematically targeting threats by gathering intelligence, taking action, and using the results to drive future operations. * Find: * gathering intelligence to identify potential targets * Fix: * confirming the location and identity of the target. * Finish: * action taken against the target which may involve capture or elimination. * Exploit: * gathering any useful intelligence or materials from the target or the target area. * Analyze: * processing and evaluating the gathered intelligence and identify intelligence. * Disseminate: * sharing the analyzed intelligence with relevant parties. F3EAD: * It's a cyclical process, meaning that the information gained from each step can feed back into the "Find" stage to identify new targets. * used in situations where rapid and decisive action is required. * used to target individuals or networks. * used in both lethal and non lethal targeting. B
28
What is Center of Gravity?
The entity or actor that has the inherent ability to achive the objective or goal. In Tactical Operations: What is the enemies main effort?