jp3_12r
jp3_12r
jp3_12r
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter IV<br />
through intelligence sources represents an increased level of risk associated with using the<br />
capability. Cyberspace capabilities that have the fewest environmental dependencies and/or<br />
allow the operator to reconfigure the capability on-the-fly are preferred. Department of<br />
Defense Instruction (DODI) O-3600.03, Technical Assurance Standard (TAS) for Computer<br />
Network Attack (CNA) Capabilities, provides detailed requirements for technical assurance<br />
evaluations that document these characteristics.<br />
(3) Cascading and Collateral Effects. Overlaps between military, civil,<br />
government, private, and corporate activities on shared networks in cyberspace make the<br />
evaluation of probable cascading and collateral effects particularly important when planning<br />
for CO. Due to policy concerns, an EXORD or applicable ROE may limit CO to only those<br />
operations that result in no or low levels of collateral effects. A collateral effects analysis to<br />
meet policy limits is separate and apart from the proportionality analysis required by the law<br />
of war. Even if a proposed CO is permissible after a collateral effects analysis, the proposed<br />
CO must also be permissible under a law of war proportionality analysis.<br />
For more information see JP 3-60, Joint Targeting.<br />
(4) Target Nomination and Synchronization. Component commanders, national<br />
agencies, supporting commands and/or the JFC staff submit target development nominations<br />
to the JFC targeting staff for development and inclusion on the JFC’s joint target list (JTL).<br />
Once identified on the JTL, targets can be selected for engagement by organic assets (if<br />
within a component commander’s assigned area of operations) or nominated for action by<br />
other joint force components and other organizations, usually via a coordinating body (joint<br />
fires element [JFE] of the operations directorate of joint staff) or working group (joint<br />
targeting working group [JTWG]). The JFE normally holds a JTWG for prioritization of the<br />
nominated targets through a draft joint integrated prioritized target list (JIPTL) and<br />
establishment of the “cut line.” The “cut line” simply reflects an estimate of resources<br />
available to take action against targets in priority order and does not guarantee that a specific<br />
target will be attacked. The joint targeting coordination board (JTCB) provides a seniorlevel<br />
forum in which all components can articulate strategies and priorities for future<br />
operations to ensure that they are synchronized and integrated. Although most targeting<br />
issues are worked out at the JTWG, the JTCB normally conducts final coordination of the<br />
JIPTL and submits it for JFC approval. The JFE also maintains the restricted target list and<br />
no-strike list. The no-strike list contains objects or entities that are not legal targets, while,<br />
the restricted target list is constrained by the JFC for other reasons characterized as protected<br />
from the effects of military operations under international law and/or the rules of<br />
engagement.<br />
For additional details on vetting, validation, and JTWGs, refer to JP 3-60, Joint Targeting,<br />
and CJCSI 3370.01, Target Development Standards.<br />
(5) Time-Sensitive Targeting<br />
(a) A time-sensitive target (TST) is a target of such high priority to friendly<br />
forces that the JFC designates it as requiring immediate response because it poses (or will<br />
soon pose) a danger to friendly forces, or it is a highly lucrative, fleeting target. TSTs are<br />
IV-4 JP 3-12