1 / 22

Date 090908

CLIC Support to Targeting Methodology. Date 090908. Overview. Conventional Targeting Cycle (D3A) Modifications for Counterinsurgency Nesting Targeting Cycles CARVER Technique Target Tracking Tools Using a tracking matrix Target Storyboards Target Dossiers

lavonn
Download Presentation

Date 090908

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CLIC Support to Targeting Methodology Date 090908 CLIC Support to Targeting Methodology (MCIS – )090908

  2. Overview • Conventional Targeting Cycle (D3A) • Modifications for Counterinsurgency • Nesting Targeting Cycles • CARVER Technique • Target Tracking Tools • Using a tracking matrix • Target Storyboards • Target Dossiers • Integration of MEF assets for target development CLIC Support to Targeting Methodology (MCIS – )090908

  3. Conventional TargetingD3A CLIC Support to Targeting Methodology (MCIS – )090908

  4. S2 reviews HVTL • IDs “way ahead” • PIRs Drafted • SIRs established Counterinsurgency TargetingD3A • Actions completed • Frag-O issued CLIC Support to Targeting Methodology (MCIS – )090908

  5. Timing the Targeting Cycle • How long do we need? • Depends on targets, mission, and supporting assets • Some targets may be worth passing immediately with the CO’s authorization as a TST or high-priority target • HET, CAG, SJA may need to plan approach to a human target • Minimize staff time • One day between Board and Meeting • 12 hours between Meeting and Frag-O • Supporting docs are a continuing action • Dossiers, storyboards always kept updated • Allows instant insertion as enclosures to the Frag-O Targeting Board Targeting Meeting Debriefs Reports Frag-O CLIC Support to Targeting Methodology (MCIS – )090908

  6. Nesting Targeting Cycles Battalion Company Targeting Board (Timeline) Company Company Battalion Targeting Cycle serves as a template for a smaller-scale and less formal process at the company level Company CO’s convene a board (XO, GySgt, Intel Cell) and set the HVTL then assign missions to platoons based on identified intel gaps This fills out the remaining “white space” after Battalion has assigned its priority missions CLIC Support to Targeting Methodology (MCIS – )090908

  7. To relevant Companies for Info • No action mandated (until Bn FragO) • Feeds the Co-level targeting cycle • DIIRs • TAREX • Patrol Reports ALL TARGETING MEETING SLIDE STORYBOARDS Targeting Board ASAP 1 DAY Targeting Cycle SAMPLE PIR LIST Debriefs Reports Targeting Meeting Action on Target MISSION DEPENDENT 12 HRS Frag-O TARGET DOSSIER SAMPLE FRAG-O STORYBOARD CLIC Support to Targeting Methodology (MCIS – )090908

  8. The Matrix- Target Tracking One Artillery Target number is assigned to each target in the Matrix. Associates without distinct identities (activity, locations, photos) are designated by a, b, c following the target number of the most important individual Each target number appears on the storyboard for quick reference (see storyboard slide) CLIC Support to Targeting Methodology (MCIS – )090908

  9. The Matrix- Name The name entry corresponds to the version used in the majority of reporting. Specific spellings vary so much that this can be a major point of contention. The name should be hyperlinked to the storyboard or target dossier, to allow quick electronic reference. CLIC Support to Targeting Methodology (MCIS – )090908

  10. The Matrix- Reports The Reports entry includes all the relevant and available DIIRs, IIRs, TAREXs Reports are listed by serial number, so they can be referenced in the “Reporting” folder. If the target has a significant reporting history, they should also be printed out and filed in the target’s dossier folder. CLIC Support to Targeting Methodology (MCIS – )090908

  11. The Matrix- Locations This column lists the towns associated with the given target. There may be more than one, especially for a cross-boundary figure. If so, each location should receive its own grid. CLIC Support to Targeting Methodology (MCIS – )090908

  12. The Matrix- Grids These are the references for the locations listed in the previous column. They should be the specific grids associated with the reporting on the target individual. In the event that there are multiple grids reported for a given target, all of the grids should be included in the entry. CLIC Support to Targeting Methodology (MCIS – )090908

  13. CARVER Technique • Criticality • Accessibility • Recuperability • Vulnerability • Effect • Recognizability • Assigns numerical rating to targets • Value represents desirability of attacking the target CLIC Support to Targeting Methodology (MCIS – )090908

  14. Criticality • Time: • How rapidly will the impact of the target attack affect operations? • Quality: • What percentage of output, production, or service will be curtailed by target damage? • Surrogates: • What will be the effect on the output, production, and service? • Relativity: • How many targets are there? • What are their positions? • How is their relative value determined? • What will be effected in the system or complex "stream"? CLIC Support to Targeting Methodology (MCIS – )090908

  15. Accessibility • A target is accessible when the operational element can reach it with enough personnel and equipment to accomplish the mission. • Grading criteria are: • Infiltration from the staging base to the target area • Movement from the point of entry to the target or objective • Movement to the target's critical element • Exfiltration CLIC Support to Targeting Methodology (MCIS – )090908

  16. Recuperability • Measured in time: • How long to repair, replace, or bypass the damage done? • Factors include: • On-hand equipment (railroad cranes, dry docks, and cannibalization) • Restoration and substitution through redundancies. • On-hand spares. • Equivalent OB equipment sets that backup critical equipment or components, and the effects of economic embargoes and labor unrest. CLIC Support to Targeting Methodology (MCIS – )090908

  17. Vulnerability • Do you have the means and expertise to successfully attack the target? • Are you going to: • Choose special components to attack • Do permanent damage • Prevent or inhibit cannibalization • Maximize effects through the use of onsite materials • Cause the target to self-destruct • Vulnerability depends on: • Nature and construction of the target • Amount of damage required • Assets available CLIC Support to Targeting Methodology (MCIS – )090908

  18. Effect • The effect of a target attack is a measure of possible military, political, economic, psychological, and sociological impacts at the target and beyond. • What is the Effect on: • Friendly forces • Cost to target • Assets to be used and available • Enemy forces • The triggering of countermeasures • Neutral forces • Support or negation of PSYOP themes • Unemployment • Reprisals against the civilian populace • Collateral damage to other targets CLIC Support to Targeting Methodology (MCIS – )090908

  19. Recognizability • A target's recognizability is the degree to which it can be recognized by an operational element and/or intelligence collection and reconnaissance assets under varying conditions. • Factors which influence recognizability include: • size and complexity of the target • existence of distinctive target signatures • presence of masking or camouflage • technical sophistication and training of the attackers. CLIC Support to Targeting Methodology (MCIS – )090908

  20. Outside Assets • HET • Probably TACON to Co already • HET Marine needs to understand how CLIC is supporting the Battalion targeting effort • UAVs • Coordinate through Bn-S2 for assets beyond DragonEye • Follow their formats, and follow-up with a phone call • RadBn • Tendency to play “I’ve got a secret…” • Show them “yours” first: pre-empt them with info on the targets you want prosecuted and why • Ensure that RadBnOIC is comfortable with small-unit training in dealing with RadBn: compromise is a HUGE issue CLIC Support to Targeting Methodology (MCIS – )090908

  21. Asset Integration • Doctrinal Coordination • Contact Higher with support request • Include Scheme of Maneuver, task/purpose, target dossier information • Non-Doctrinal Coordination • “Jim, Ted here. I’m going to request support on a target package that I’ve pushed up to RCT-X, want to know if your teams can support this one…” CLIC Support to Targeting Methodology (MCIS – )090908

  22. Questions? ________________________________________ <<author>> Marine Corps Intelligence Schools Company Level Intelligence Cell – <<author billet>> <<author email>><<author tel>> https://www.intranet.tecom.usmc.mil/sites/MCIS/FocusAreas/CIC/default.aspx CLIC Support to Targeting Methodology (MCIS – )090908

More Related