Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
31 Cards in this Set
- Front
- Back
What is F3EAD and what is it used for? |
Find, Fix, Finish, Exploit, Analyze, Disseminate
Compliments the D3A process Suited for engaging HVIs Exploit and Analyze = Main Effort of F3EAD |
|
Describe elements of find for F3EAD |
Collection plans tailored to support F3EAD ISR most effective when masked Nodal/Link analysis Pattern of Life Analysis |
|
What are the inputs and outputs of "find"? |
Inputs: CDRs Guidance, IPB, POL, Collection plan Outputs: Potential HVI detection, Target Information Folder, HVI Network Identified and analyzed |
|
Describe elements of "fix" for F3EAD. |
Persistent ISR identifies POL, Determine COA (KILL, Capture, Collect), COA development relative to the HVIs probable location (Narrowed POL=Developing CONOP |
|
what are the inputs and outputs of "fix" F3EAD? |
INPUTS: Probable HVI, Information on the target and target's network
OUTPUTS: Target ID, Target Location Accuracy, Target dwell time characteristics identified |
|
what are some characteristics of "finish" F3EAD? |
Well trained and rehearsed finish force - Target window of opportunity - focused targeting force Shelved CONOPs Follow on COA development |
|
What are the inputs and outputs of "finish" F3EAD? |
INPUTS: HVI location within a given time frame
OUTPUTS: Target isolated and engaged, target location secure, SSE |
|
What are some characteristics of Exploit? |
Methodical collection Collection rehearsed (SOP, search plans, smart cards), Understand and include enablers within operation (DOCEX), Forensic analysis etc. Main Effort=follow on targeting opportunities |
|
What are the inputs and outputs of "exploit"? |
Inputs: secure target location, targeting questions, SSE SOP
Outputs: DOCEX results, follow on targeting |
|
What are some characteristics of "disseminate"? |
Time consuming (Who needs to know?) Prioritize dissemination effort (PIRs answered?, OE implications, routine information)
|
|
What are the inputs and outputs of "disseminate"? |
Inputs: Relevant and correlated information, actionable intel, assessments
Outputs: Database updates |
|
Within the F3EAD methodology, what serves as the main effort? |
Exploit and Analyze |
|
What actions may be conducted, relative to "exploit", prior to target prosecution? |
Rehearsals, search plans, SOPs, SSE kits, smart cards |
|
What appendix in FM 3-60 identifies and defines the F3EAD methodology? |
Appendix B |
|
Why is it important to disseminate information across all echelons? |
So everyone is aware of what is going on. That single piece of information might seem minimal data to some but it might close the loop and allow another staff section or unit to gain further knowledge on a person of interest or network of interest. |
|
What is F2T2EA and what is it used for? |
Find, Fix, Track, Target, Engage, Assess
Designed for TSTs and HPTs The methodology is used for dynamic targeting usually at the joint level. Steps may overlap or be conducted simultaneously. |
|
What are some characteristics of "find" F2T2EA? |
Intel collection based on JIPOE
Emerging Targets (stays in deliberate process until adequate collection permits prosecution)
|
|
What are the inputs and outputs of "find" F2T2EA? |
Inputs: Clear JFC dynamic targeting guidance and priorities, focused JIPOE, collection plans based on JIPOE
Outputs: Potential targets detected and nominated for further development. |
|
What are some characteristics of "fix" F2T2EA? |
actions to determine the location of the probable target, PID, POL Sensors allocations diverted in support of the dynamic process FACTORS MUST BE CONSIDERED: Layering of ISR, Day/Night surveillance, OAKOC, Weather |
|
What are the inputs and outputs of "fix" F2T2EA? |
Inputs: Probable targets, sensor information on the target
Outputs: target ID, classification, confirmation, location accuracy, dwell time |
|
What are some characteristics of "track" F2T2EA? |
target is observed and its activity and movement is monitored (requires persistent surveillance while awaiting engagement. if track lost cycle must be repeated)
Begins during 'fix' and ends upon engagement/or achievement of desired effect |
|
What are the inputs and outputs of "track" F2T2EA? |
Inputs: Confirmed target, Target location and plot of movement
Outputs: Track continuity, sensor prioritization, updates to target window of vulnerability |
|
What are some characteristics of "target" F2T2EA? |
takes an identified, classification, located, and prioritized target and finalizes the desire effect and targeting solution against it to include obtains required approval to engage.
Streamline How? Shelved CONOPs, Layered ISR |
|
What are the inputs and outputs of "target" F2T2EA? |
Inputs: Identified, classified, located, prioritized target, Restriction for consideration, collection manager SA
Outputs: Desire effect, finalized target data, asset de-confliction, target execution approval, and consequence management predictions |
|
What are some characteristics of "engage" F2T2EA? |
Target confirmed hostile and engaged |
|
What are the inputs and outputs of "engage" F2T2EA? |
Inputs: target approval decision, selected engagement option
Outputs: issue and pass engagement order, target engagement, engagement direction and control |
|
What are the characteristics of "assess and what are the inputs and outputs F2T2EA? |
Characteristics: Examine results of target engagement (desired effect achieved?, types of assessment include? BAD, MEA, Re-attack recommendations) Inputs: assessment request matched against desired scalable fires Outputs: estimated or confirmed results, re-attack recommendations |
|
What category of targeting is the F2T2EA methodology applied? |
Dynamic |
|
What type of targets are engaged utilizing the F2T2EA methodology? |
TSTs |
|
What level is the F2T2EA methodology utilized? |
Joint |
|
Who approves TST Targets? |
JFC |