Targeting Flashcards

1
Q

Describe joint targeting

A

The process of selecting and prioritizing targets and matching the appropriate response to them, taking account if operational requirements and capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is Targeting both a joint and component level

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the principles of targeting

A

Focused-achieving JFC”S objective
Effects based- produce specific effects: functional, physical, or pyscological
Interdisciplinary- operators, intelligence, legal, geospatial
Systematic-achieve effects in a systematic manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Target characteristics

A

Physical-generally discernable to the five senses
Functional- describes what the target does and it does it
Cognitive- how targets process information
Environmental-the effect of the environment on the target
Temporal- describes the targets vulnerability to detection, attack, or other engagement in relation to time available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Deliberate targeting

A

Prosecutes planned targets, known to exist, with engagement scheduled to create effects which support JFC objectives. planned for more than 24 hours in advance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dynamic targeting

A

Prosecutes targets of opportunity and changes to planned targets or objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the targeting category methodologies

A

Deliberate

Dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the targeting categories for deliberate targets

A

Scheduled- prosecuted at a specific time

On call- actions planned but not for specific delivery time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the targeting categories for dynamic

A

Unplanned- known to exist in operational environment

Unanticipated- unknown or unexpected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the joint targeting cycle

A

An iterative process that is not time-constrained, and steps may occur concurrently, but it provides a helpful framework to describe the steps that just be satisfied to successfully conduct joint targeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Joint targeting cycle steps

A

Endstate-described and commanders objectives: Drives targeting process, specify damage criteria, sets requirements

Target development and prioritization: systematic evaluation of potential target systems, vetting and validation, CCMD determines its prioritization criteria

Capabilities analysis: evaluates available capabilities with desired effects to determine appropriate options

Commanders decision and force assignment: provides a vital link between planning and ops

Mission planning and execution: consider target engagement authority, and PID

Assessment: the measure of progress toward mission accomplishment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is measures of effectiveness

A

Criterion used to assess changes tied to measuring the attainment of an endstate. More subjective than MOP
Are we meeting the intended purpose
Why in the mission statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is measures of performance

A

Criterion used to assess friendly actions tied to task accomplishment.
Are we doing things right
Task completion
The “what” in the mission statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is d3a

A

Decide- set priorities for intelligence collection and attack planning (HPTL,ISR,AGM,TSS)

detect-determines accurate, identifiable, and timely requirements for collection systems, focus’on HPT and PIRs (connects recon to surveillance)

deliver- executes the targeting guidance and supports the commanders battle plan

assess- determination of the effectiveness of force employment during military operations

** Conventional/deliberate targeting methodology, process that prioritizes, identify, prosecutes and exploits targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the SOLE

A

Special operations liaison element ( a joint team)

  • Provide JSOFT combat plan to JFACC
  • coordinate ARSOF requests for air support
  • Synchronizes manuever and fired by exchanging operational and intelligence data
  • Deconflict airspace requirements
  • Integrate ADA with defensive counter-air
  • Provide feedback on the air war to JSOTF
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Steps of Target development and prioritization

A

Target systems analysis
Entity level Target development
Target list management

17
Q

Describe Target vetting

A

Assesses the accuracy of the supporting intelligence to establish a reasonable level of confidence in a targets functional characterization

18
Q

Describe Target validation

A

Ensures all vetted targets meet the objectives and criteria outlined in the commanders guidance, ensures compliance with ROE, LoW

19
Q

what is F3EAD

A

find- process of establishing a start point for Intel
Fix- applying Intel collection capabilities against a target to fix it in space and time
Finish- rapidly executing required actions
Exploit- examining and analyzing capture personnel, equipment and materiel for Intel purposes
Analyze- information found in previous phases are turned into intelligence
Disseminate- disperse Intel throughout the IC

20
Q

How do we overcome the challenge of targeting

A
Conduct thorough IPB
Strict adherence to processes
PIRs must be tied to a decision point
Fuse OPs and Intel
Update collection plan
21
Q

What are the steps of Capability anaylsis

A

Target vulnerability analysis

capabilities assignment

feasibility assessment

effects assessment

22
Q

What are the steps of Commander’s decision and force assignment

A

Consolidate targeting development and capabilities analysis

assemble data on friendly force status

Assign forces to specific targets

present joint targeting recommendations to the JFC

issue tasking orders to forces

23
Q

What are the three steps of Assssment

A

BDA

munitions effectiveness assessment

re-attack recommendations

24
Q

Describe the JIPTL creation process

A

Entity level target creation (ODA level)

Target development nomination (TDN)

Vett the target through Target Lists (RTL, NSL, CTL)

Joint target list

Joint target coordination board

Deputy JTF Commander approval

25
Q

What types of targets end up on the JTL

A

vetted and validated for risk but not approved or prioritized yet

26
Q

Definition of CDE

A

Collateral damage estimate, unintended or incidental damage to persons or objects which are not lawful targets (happens before action)

27
Q

definition of BDA

A

estimate of target damage or effects.

28
Q

When do you use center of gravity analysis or taxonomy

A

CoG - cognitive Target

Taxonomy- physical Target

29
Q

What are the positive effects of targeting management

A

Offensive operations- applies constant pressure and targets the whole movement

Precision targeting-adaptive strategy focusing on effects based and applies operational patience
Minimizes collateral damage

30
Q

What are some secondary effects of training management

A

ID Intel gaps
Prioritizes and synergizes operational effort
Long term application

31
Q

What are the outputs for “focused” principle

A

Fully developed TVA

collection management that is developed in conjunction with friendly COA

32
Q

What are the outputs for “effects based” principle

A

CDE
Target taxonomy
Facilitated through FUSION meetings
Incorporate IO planner in COADEV

33
Q

What are the outputs for “interdisciplinary” principle

A

Fully understand available assets
Fully developed collection management
Fully developed sync told such as OVERLAYS that show gaps

34
Q

What are the outputs for “systematic” principle

A

If desired effects are not scheduled, targets are recycled through process

35
Q

What are the steps of Target value analysis

A
ID the threats
Analyze the threats
     Critical capability
      Critical requirement
       Critical vulnerability
ID high value targets and develop HVTL
Detailed friend COA analysis
analyze and ID HPT
Develop HPTL