23.10.2014 Views

jp3_12r

jp3_12r

jp3_12r

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter IV<br />

through intelligence sources represents an increased level of risk associated with using the<br />

capability. Cyberspace capabilities that have the fewest environmental dependencies and/or<br />

allow the operator to reconfigure the capability on-the-fly are preferred. Department of<br />

Defense Instruction (DODI) O-3600.03, Technical Assurance Standard (TAS) for Computer<br />

Network Attack (CNA) Capabilities, provides detailed requirements for technical assurance<br />

evaluations that document these characteristics.<br />

(3) Cascading and Collateral Effects. Overlaps between military, civil,<br />

government, private, and corporate activities on shared networks in cyberspace make the<br />

evaluation of probable cascading and collateral effects particularly important when planning<br />

for CO. Due to policy concerns, an EXORD or applicable ROE may limit CO to only those<br />

operations that result in no or low levels of collateral effects. A collateral effects analysis to<br />

meet policy limits is separate and apart from the proportionality analysis required by the law<br />

of war. Even if a proposed CO is permissible after a collateral effects analysis, the proposed<br />

CO must also be permissible under a law of war proportionality analysis.<br />

For more information see JP 3-60, Joint Targeting.<br />

(4) Target Nomination and Synchronization. Component commanders, national<br />

agencies, supporting commands and/or the JFC staff submit target development nominations<br />

to the JFC targeting staff for development and inclusion on the JFC’s joint target list (JTL).<br />

Once identified on the JTL, targets can be selected for engagement by organic assets (if<br />

within a component commander’s assigned area of operations) or nominated for action by<br />

other joint force components and other organizations, usually via a coordinating body (joint<br />

fires element [JFE] of the operations directorate of joint staff) or working group (joint<br />

targeting working group [JTWG]). The JFE normally holds a JTWG for prioritization of the<br />

nominated targets through a draft joint integrated prioritized target list (JIPTL) and<br />

establishment of the “cut line.” The “cut line” simply reflects an estimate of resources<br />

available to take action against targets in priority order and does not guarantee that a specific<br />

target will be attacked. The joint targeting coordination board (JTCB) provides a seniorlevel<br />

forum in which all components can articulate strategies and priorities for future<br />

operations to ensure that they are synchronized and integrated. Although most targeting<br />

issues are worked out at the JTWG, the JTCB normally conducts final coordination of the<br />

JIPTL and submits it for JFC approval. The JFE also maintains the restricted target list and<br />

no-strike list. The no-strike list contains objects or entities that are not legal targets, while,<br />

the restricted target list is constrained by the JFC for other reasons characterized as protected<br />

from the effects of military operations under international law and/or the rules of<br />

engagement.<br />

For additional details on vetting, validation, and JTWGs, refer to JP 3-60, Joint Targeting,<br />

and CJCSI 3370.01, Target Development Standards.<br />

(5) Time-Sensitive Targeting<br />

(a) A time-sensitive target (TST) is a target of such high priority to friendly<br />

forces that the JFC designates it as requiring immediate response because it poses (or will<br />

soon pose) a danger to friendly forces, or it is a highly lucrative, fleeting target. TSTs are<br />

IV-4 JP 3-12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!