Canada Targeting
Canada Targeting
Canada Targeting
Supporting
Canadian Forces Joint Publication
CFJP 3-9 - Targeting
CFJP 3-9
Targeting
1st Edition
Canada
Cette publication est également disponible en français.
To ensure you are using the most current version of this publication, refer to the joint
doctrine DIN website at:
http://cjoc-coic.mil.ca/sites/intranet-eng.aspx?page=3560
Preface
01. Canadian Forces Joint Publications (CFJP) are authorized joint doctrine for the guidance
of Canadian Armed Forces (CAF) operations. CFJP 3-9, Targeting is pitched at the philosophical
and high-application level. It provides doctrinal guidance for commanders and staff at all levels
of command.
02. Policy is prescriptive as represented by Defence Administrative Orders and Directives
and has legal standing. Doctrine is not policy and does not have legal standing; however it
provides authoritative and proven guidance, which can be adapted to suit each unique situation.
03. CFJP 3-9 seeks to reflect the maturing of CAF targeting from two sources; working with
Canada’s allies and coalition partners (particularly the United States) during recent operations,
and the growing importance of matching targeting efforts to the creation of desired effects in the
operational environment. The latter recognises that targeting is but one way of supporting
national military objectives. Targeting solutions may be broad, encompassing munitions-based
and non-munitions-based means to achieve physical and psycho-cognitive effects.
Note: For clarification, the terms ‘munitions-based’ and ‘non-munitions-based’ are used
here in place of the often technically incorrect and confusing terms ‘kinetic’ and ‘non-
kinetic’; the latter having a strict scientific meaning that will not always fit with usage in a
targeting context, which has become commonplace.
04. Targeting must be viewed within the context of joint operations, and therefore CFJP 3-9
should be read in conjunction with the following joint publications:
a. CFJP 01, Canadian Military Doctrine (Ref. B), which outlines the strategic military
doctrine of the CAF;
b. CFJP 2-0, Intelligence (Ref. C), which describes how the intelligence process
supports CAF operations including targeting;
c. CFJP 3-0, Operations (Ref. D), which describes operational art and campaigning,
and details the relationships between the national strategic and military strategic,
operational and tactical levels of command for the conduct of a campaign;
d. CFJP 3-0.1, The Law of Armed Conflict at the Operational and Tactical Levels (Ref.
E), which promulgates legal guidance to commanders for the planning and conduct
of operations;
e. CFJP 3-10, Information Operations (Ref. F), which describes the CAF’s approach to
information operations and must be coordinated and harmonised with the targeting
activities;
f. CFJP 5-0, Planning (Ref. G), which describes the CAF’s operational planning
process.
g. CFJP 5-1, Use of Force for CF Operations (Ref. H), which describes the means by
which the CAF are authorized to use force and are provided direction to do so.
v
CFJP 3-9
05. Commander Canadian Joint Operations Command is the approval authority for this
publication.
06. Forward any amendment recommendations to the Canadian Forces Warfare Centre, Joint
Doctrine Branch.
vi
CFJP 3-9
Table of Contents
vii
CFJP 3-9
viii
CFJP 3-9
ix
CFJP 3-9
Chapter 1
What is Targeting?
Introduction
0101. Targeting is the “process of selecting and prioritizing targets and matching the
appropriate response to them, taking into account operational requirements and capabilities.” 1
This process consists of the selection and evaluation of legitimate targets followed by the
selection of the means (munitions-based or non-munitions-based) to be used to achieve the
effects desired. Its purpose is to plan, integrate and synchronize a range of planned lethal and
non-lethal targeted effects produced by the appropriate military means of action, into CAF joint
operations to achieve the ’Chief of Defence Staff (CDS)’s desired end state. Targeting is part of
a broader planning and evaluation process that enables commanders to continuously update and
assess the progress of operations.
0102. Targeting undertaken by the CAF is a full-spectrum, effects-based, inherently joint (and
where necessary, multinational activity, guided by Government of Canada (GC) aims and
priorities. It is fully integrated in the national, military strategic and subsequent lower-level
planning processes, and is constrained by national and international law.
0103. Targeting, in the military sense, is the holistic application of an effects-based approach to
military operations. It is the essence of planning the art of military operations at the highest
levels, focussing on those key adversary and other nodes critically assessed to elicit desired
change once the right type and quantity of pressure is applied. That pressure may take many
forms, as will be discussed in more detail in this publication, and the key to targeting is
identifying the right node, the right type of pressure to apply, the right time to apply it,
recognizing when the required effect is happening/has happened, and knowing what step to take
next to continue to capitalize on and develop the result. Sometimes this is relatively
straightforward (as with the application of fires against a target), but increasingly, with a truly
holistic methodology, it is extremely difficult to get right, and this is clear when aiming to
produce less tangible (and thus less measurable) non-munitions-based targeted effects, although
none the less desired. For this reason, and to be fully effective, targeting—as a concept—needs
to be completely mastered at the highest levels of military command, as well as understood
especially by those that provide input to the process at the politico-military level.
1
DTB, record 5514
1-1
CFJP 3-9
0104. Targeting cuts across all functional and organizational boundaries. At all levels it will be
command-led, plans-directed, operations-driven and coordinated, but intelligence-enabled, as
shown at Figure 1-1. These are the primary participants, but other functional areas such as legal,
command, control, communications, computers and intelligence (C4I), communications,
logistics and meteorology also support the targeting process. Targeting is not tied to a particular
capability, theatre of operations, level of conflict or automated support system. It supplements—
not replaces—planning at all levels.
What is a Target?
0105. A target is “the object of a particular action, for example, a geographic area, a complex,
an installation, a force, equipment, an individual, a group or a system, planned for capture,
exploitation, neutralization or destruction by military forces.” 2 A target may also be an audience
planned for influence with a specific message. The importance of a target is dependent on how it
relates to an adversary’s critical vulnerabilities, and how achieving a desired effect on it will
support the achievement of the commander’s objectives. The nature of legitimate targets is
further discussed in Chapter 2 and CFJP 3-0.1, The Law of Armed Conflict at the Operational
and Tactical Levels (Ref. E).
0106. A target can be an entity (person, place, physical or virtual thing) considered for possible
engagement or action to alter or neutralize the function it performs for the adversary. A target’s
importance is derived from its potential contribution to achieving a commander’s objective(s) or
2
DTB, record 1031.
1-2
CFJP 3-9
otherwise accomplishing assigned tasks. These objectives must be consistent with national
strategic direction and selected to accomplish the assigned missions and tasks. Targets may
include the following:
a. Facilities. A geographically located, defined physical structure, group of structures,
or area that provides a function that contributes to a target system’s capability.
b. Individuals. A person or persons who provide a function that contributes to a target
system’s capability.
c. Entity. An entity in cyberspace that provides a function that contributes to a target
system’s capability.
d. Equipment. A device that provides a function that contributes to a target system’s
capability.
e. Organization. A group or unit that provides a function that contributes to a target
system’s capability.
Characteristics of Targets
0107. Target characteristics form the basis for their detection, location, identification, and
classification for future surveillance, analysis, prosecution and assessment. In general, there are
five types of characteristics for a target:
a. Physical. The physical characteristics of a target describe what a target is in terms of
features that are discernible to the senses (see, feel, hear and smell) or through
sensor-derived signatures. These characteristics will influence the effects employed
against the target, which may be munitions-based, non-munitions-based, or both.
b. Functional. Functional characteristics describe what the target does, how it does it
and how it relates to other parts of its target system. They describe the target’s
function within the adversary system, how the target or system operates, its level of
activity, the status of its functionality and, in some cases, its importance to the
adversary. Functional characteristics are often hard to discern, because they most
often cannot be directly observed. Reaching plausible conclusions entails careful
assessment of known facts and the use of deductive and inductive reasoning.
c. Cognitive. Cognitive characteristics describe how some targets think, exercise
decision and control functions, or otherwise process information. These
characteristics can be critical to targeting a system, since nearly every system
possesses some central controlling function, and neutralizing this may be crucial to
bringing about desired changes in behaviour. As with functional characteristics,
these can be difficult to discern or deduce. While partially overlapping and linked to
cognition (how humans encode, store and process information), psychological
characteristics include emotion, morale, attitude, will and perception. Psychological
characteristics are an important part of the adversary’s capability to perform
operations and as such become a key consideration for targeting activity.
d. Environmental. Environmental factors describe the effect of the environment on
the target. These factors may also influence the methods used to affect or observe
them.
1-3
CFJP 3-9
A Full-Spectrum Approach
0111. Full-spectrum targeting (FSpecT) is a holistic approach; reviewing targets of all types
together and apportioning action (munitions-based or non-munitions-based) in conjunction with
the campaign information strategy, and in accordance with desired behavioural objectives.
FSpecT therefore looks to support a top-down targeting methodology, with close linkages to the
plan at all levels, and able to be audited at any stage by reference to the strategic intent. By
seeking to blend a range of targeted effects, FSpecT aims to provide a range of options and
effects, avoiding duplication of effort and ‘effects fratricide’, and ensure that the right targets are
prosecuted in the right order, at the right time by the right capability; coherent with the wider
context and direction. It recognizes that lethal prosecution will always have a specific influence
effect, and that other capabilities can deliver both physical and psycho-cognitive effects, either
directly, or as enablers.
3
Such thresholds will usually be defined by CDS in the operation-specific TD.
4
DTB, record 35044.
5
DTB, record 19439.
1-4
CFJP 3-9
Targeting Principles
0112. The key principles of targeting are:
a. Focused. The function of targeting is to efficiently achieve the commander’s
objectives through target engagement within the parameters set by the relevant
concept of operations (CONOPS), the operational limitations within the plan and
orders, the ROE, and the law of armed conflict (LOAC). 6
b. Legitimate. All legal obligations, both domestic and international must be
understood and met.
c. Effects-based. An effects-based approach emphasises identification of the fullest
possible range of targeting options to create desired effects supporting the
commander’s objectives.
d. Interdisciplinary. Targeting entails participation from all elements of the
commander’s staff, component commander’s staffs, OGDA and multinational
partners (where appropriate).
e. Systematic. The joint targeting cycle (JTC) is designed to create effects through a
rational and iterative process that methodically analyzes, prioritizes and assigns
assets against targets in a systematic manner.
6
The LOAC is covered in Chapter 2, Legal Considerations.
1-5
CFJP 3-9
0115. Targeting is a process that supports the planning and conduct of operations by identifying
the desired effects to be achieved that support the mission, objectives and end state. EBT places
emphasis on linking planning and operations activities to identify the fullest possible range of
targeting options available to the commander. The ability to develop a wide range of targeting
options depends on a detailed understanding of the adversary, targeting stakeholders, and desired
own force operational capabilities and objectives. This requires access to relevant, timely, and
accurate information and intelligence. 7
0116. Physical effects – Influencing capability and capacity. The capability to realise
physical effects will either be instrumental (to destroy/disrupt/neutralize, etc., someone or
something) or expressive (to influence behaviour, attitudes or decisions). Thus, it can be
employed to affect behaviour when there is insufficient time to alter the perceptions of an
intransigent adversary, or in a critical situation. Physical effects can be achieved directly or less
obviously by the manipulation and exploitation of information that results in physical impact.
0117. Psycho-cognitive effects – Influencing will and understanding. Psycho-cognitive
effects result from activities that alter or shape perceptions. Perceptions, ideas and conscious
decisions will generally be altered indirectly, through impressions, influences and activity that
alter the features of the context from which understanding is derived. These influences may be
physical, conscious or sub-conscious, or a combination of any or all. The orchestration and
synchronisation of activity to realize intended and desired cognitive effects is in itself a
challenging and complicated task, especially as the precise impact of cognitive effects is difficult
to measure, complex and rarely readily apparent in the short term.
Targeting Methodologies
7
see CFJP 2-0, Intelligence (Ref. C), for more details
8
DTB record 4987
9
And therefore the appropriate planning cycle (typically the air tasking order [ATO] cycle).
1-6
CFJP 3-9
0119. Deliberate and dynamic targeting are formal and planned activities, fully integrated into
the respective planning processes at all levels of command. The key difference between them is
that dynamic happens faster, in response to a reduced exposure time of the relevant target. Any
type of target may be engaged by either method (in the right circumstances).
0120. Combat engagement. Combat engagement occurs during the close battle, where combat
with the adversary is actual, imminent or likely. 10 Planned targets should be engaged using
deliberate or dynamic targeting procedures wherever possible; however, during combat
engagement, targets will appear inside of the relevant planning cycles and will need to be
prosecuted when there is no time for either a deliberate or formally expedited targeting process
to take place. In these cases, their targeting follows a simplified methodology, taking into
account ROE and the LOAC. Fig. 1-2 illustrates the relationship between deliberate and dynamic
targeting, with combat engagement and self-defence.
Note: The full process of target development, prosecution approval by a target board (TB), or the formal conduct
of a collateral damage estimate (CDE) prior to prosecution, are not required when conducting operations under
combat engagement or self-defence procedures. In these circumstances only the practical application of the
LOAC is required.
10
Dependent on the headquarters/level of command, this may not necessarily be immediate, but still within the
96 hours of the ATO cycle, or other relevant planning cycle.
1-7
CFJP 3-9
Targeted Effects
0121. An effect is the consequence of action. Effects can be physical or non-physical and can
be achieved by both munitions-based and non-munitions-based means. An effect can be direct or
indirect:
a. Direct. Direct effects are the immediate, first-order consequence of a military action
(results of weapon employment, etc.), unaltered by intervening events or
mechanisms. They are usually immediate and easily recognizable.
b. Indirect. Indirect effects are the delayed or displaced second- or subsequent-order
consequences of action, created through intermediate events or mechanisms. These
outcomes may also be physical, virtual or behavioural in nature. Indirect effects may
be difficult to recognize, due to subtle changes in system behaviour that may make
them difficult to observe, or may manifest themselves in different forms, often with
longer lead times. Consequently, planners and targeteers should consider (as much
as practical) higher-order effects, especially political-military effects, during
planning and assessment. The implications of a single event can be magnified over
time and distance to an extent that greatly exceeds the span of the originally
intended direct effect. Therefore, potentially any (military or non-military) element
can affect, and be affected by, another’s actions.
0122. Understanding how the target interacts within its system and with other systems is critical
for commanders and targeting staff to ensure the appropriate effect is generated within the
operational environment. Thus, understanding the characteristics of both direct and indirect
effects enables the effective planning of targeting to support operations. In this sense effects can
be:
a. Cumulative effects. The cumulative result of a number of effects is equal to or
greater than the sum of their immediate consequences. The compound effect may be
felt and at different times and be produced in different forms (i.e. direct effect is
physical; secondary effect is psycho-cognitive).
b. Cascading effects. Indirect effects can ripple through a targeted system, often
impacting other systems, through common and critical nodes. As an example,
destruction of a headquarters may result in the loss of C2 and subsequently the
cohesion and effectiveness of its subordinate units.
0123. Effects may also be categorised as:
a. Desired. Military operations are planned to produce a predictable desired effect or
set of desired effects, which contribute to the conditions necessary to achieve an
objective or end state. Desired effects are what we want to achieve.
b. Undesired. An undesired effect can inhibit the achievement of an objective or end
state. An undesired effect may be realised by either action by the adversary or by the
unintended consequences of our actions, and in this sense may be either expected or
unexpected. It may also adversely impact on public support for an operation.
1-8
CFJP 3-9
0124. Collateral effects. Collateral effects are those resulting from a specific military action
but occurring outside the target boundary. By definition, they do not directly affect the target and
may affect civilians or civilian objects. Unintended effects may create unintended consequences,
which may be either counterproductive (negative) or possibly create unexpected opportunities
(positive). Unintended collateral effects may also occur if the adversary’s reaction differs from
what was expected, complicates the operational situation, or necessitates a change to the plan. To
the extent that they can be foreseen/predicted, collateral effects are a deliberate consideration in
planning, executing, and assessing military actions on any scale. The most important collateral
effect is CD, in the form of death or injury to civilians or damage to civilian objects.
0125. Additional effects. Additional effects are those resulting from a specific military action
and created on the target, but additional to what was intended by that action. By definition, they
do not affect civilians or civilian objects.
Targeting Criteria
0127. For all targeting activities (less self-defence), five criteria, or ‘pillars’, must be satisfied
prior to the prosecution of any target:
a. Target engagement authority (TEA). Every planned prosecution requires approval
to prosecute by an individual with the appropriate level of authority. The appropriate
approval authority will be specified in the relevant operation-specific targeting
directives (TDs).
b. ROE. Each prosecution must be linked to an appropriate ROE under which it will
be conducted.
c. Assessment of CD. All planned targeting (both deliberate and dynamic) requires a
formal CD estimate (CDE) to be carried out prior to prosecution approval being
granted by an appropriate TEA.
1-9
CFJP 3-9
Planning Relationship
0128. The targeting process, particularly for deliberate targeting, is integrated within the
operations planning process and ensures the focus remains on achieving mission objectives and
the end state. Essentially, the targeting process aims to employ the most appropriate capabilities
to increase the likelihood of success while mitigating the risk of undesirable effects.
Intelligence Relationship
0129. Intelligence is a critical enabler to the targeting process. Intelligence may be secured from
a variety of sources, and accurate intelligence is essential for targeting to achieve the desired
effect within the operational environment. The greater the need to quantify the desired effects,
the greater the need for detailed and accurate intelligence. The collection, processing and
dissemination of intelligence require prioritisation to support the planning and targeting
processes, as capabilities are rarely sufficient to satisfy every demand for intelligence. Target
intelligence, such as target systems analysis and target materials, developed in peacetime,
provide a crucial baseline to support operational commanders. During periods of increasing
tension, more focussed commander’s guidance is provided to direct intelligence support to
targeting. 11
11
For further information refer to CFJP 2-0, Intelligence. (Ref C)
1-10
CFJP 3-9
Chapter 2
Legal Considerations
Introduction
0201. This chapter outlines the key legal rules applicable to targeting and should be read in
conjunction with:
a. CFJP 3-0.1, The Law of Armed Conflict at the Operational and Tactical Levels
(Ref. E).
b. CFJP 5-1, Use of Force for CF Operations (Ref. H).
0202. It discusses how legal rules must be incorporated into the planning and execution of
Canadian Armed Forces (CAF) targeting. Legal considerations are not just a matter for the legal
advisor (LEGAD); all CAF members must understand and consider legal rules in performing
their roles. Commanders at all levels, and their subordinates, are responsible for the correct and
comprehensive application of the law in planning and conducting an operation.
12
AP I, Arts 48, 51 - 58; (Ref O) AP II, Arts 13 – 15.(Ref P)
13
Prosecutor v. Tadic, (1995), Case No.IT-94-1-A, (International Criminal Tribunal for Yugoslavia). (Ref W)
14
Ibid. (Ref W)
2-1
CFJP 3-9
0207. The LOAC has developed a number of legal rules to ensure that military forces select
targets that are legitimate targets. Military commanders must apply these rules when selecting
targets. These rules, such as distinction and proportionality, guide the military commander to a
determination of what objects, areas and personnel are legitimate targets. In the context of
targeting, these legal rules have largely been incorporated in treaty law, most notably, but not
exclusively in AP I. It must be remembered that AP I deals with international armed conflicts
whereas Additional Protocol II (AP II) deals with the application of humanitarian principles to
non-international armed conflicts (though significant portions of AP I are widely accepted to
form part of customary international law).
0208. This chapter concentrates on the key legal rules that impact on the planning and
execution of joint targeting operations, but also refers to certain other international agreements,
particularly those concerning specific weapons.
15
AP l, Art 57 (2) (a). (Ref O)
2-2
CFJP 3-9
Standard of Care
0212. Throughout the targeting process, commanders, planners and staff officers will not be
held to a standard of perfection in reaching their decisions. 16 They are however, required to take
‘all feasible’ steps to verify that potential targets are legitimate targets. Such decisions will be
based on the ‘circumstances ruling at the time’. Consideration must be paid to the honest
judgement of responsible commanders, based on the information reasonably available to them at
the relevant time, taking fully into account the urgent and difficult circumstances under which
such judgements are usually made. 17
Legitimate Targets
0215. The legal rule of distinction establishes that commanders, at all times, shall distinguish
between the civilian population and combatants and between civilian objects and military
objectives. 19 Military operations shall be directed only against legitimate targets. Legitimate
targets include combatants, unlawful combatants and military objectives. Under the LOAC, a
civilian object is any object that is not a military objective.
0216. Legitimate targets are divided into two categories: persons as military objectives and
objects as military objectives. The test for targeting people is and must be different from that
applied when identifying military objects.
16
Statement of understanding made by Canada at the time of ratification of AP I in relation to Arts 48, 51 to 60
inclusive, 62 & 67.(Ref O)
17
AP I, Art 57 (2) (a) (i) (Ref O) and Statement of understanding made by Canada at the time of ratification in
relation to Arts 41, 56, 57, 58, 78 & 86 (Ref Q) and CFJP 3-0.1, Law of Armed Conflict at the Operational and
Tactical Levels (Ref. E)
18
HIVR, Arts 25 & 27 (1); (Ref AA) HIX, Arts 1 (1) & 5 (1) (Ref Z); GIV, Art 53; AP I, Arts 48, 51, 52 & 57 (Ref
O)
19
API, Arts 48, 51, 52 & 57; (Ref O) AP II, Arts 13(Ref P)
2-3
CFJP 3-9
20
The term “unlawful combatants” is not stated in any of the Geneva Conventions
21
HIVR, Art 2; AP I,Art 51 (3); AP II, Art 13 (3). (Ref AA)
22
Vienna Convention on the Law of Treaties, Art 31 [1]. (Ref X)
23
Ken Watkin, Brigadier-General Retired, “Assessing Proportionality: Moral Complexity and Legal Rules” in
Yearbook of International Humanitarian Law Volume 7, (The Hague: Asser Instituut, 2004)3 at 12. (Ref DD)
24
Ibid., 13. (Ref DD)
2-4
CFJP 3-9
Military Objectives 25
0219. In so far as objectives are concerned, the test is the following:
a. military objectives are limited to those objects that, by their nature, location, purpose
or use, make an effective contribution to military action; and;
25
API, Art 52 (2) (Ref O)
26
Statement of understanding made by Canada at the time of ratification of AP I regarding Arts 51 (5) (b), 52 (2) &
57 (2) (a) (iii) (Ref Q)
2-5
CFJP 3-9
27
For legal and policy reasons, a no-strike list (NSL) and a restricted-target list (RTL) consisting of objects to be
protected may also be incorporated into the operation-specific CDS TD to facilitate target nomination.
28
HIVR, Art 27 (1) (Ref AA); HIX, Art 5 (1); H Cultural Property Convention , Art 4 (1); AP I, Arts 53 (a) & (b) &
85 (4) (d); (Ref O) AP II, Art 16. (Ref P)
29
AP I, Art 56 (1); (Ref O) AP II, Art 15. (Ref P)
30
Ibid., Art 54 (2). (Ref P)
31
Ibid, Arts 35 (3) & 55 (1). (Ref P)
32
Convention on the Prohibition of Military or Any Other Hostile Use of Environmental Modification Techniques,
10 December 1976, (signed by Canada 18 May 1977, ratified 11 June 1981). (Ref T)
33
GI , Art 19 (1); GII , Arts 22 (1), 23 & 24; GIV , Arts 18 (1); (Ref Y) API , Art 12 (1) & (2); (Ref O) AP II , Art
11 (1). (Ref P)
2-6
CFJP 3-9
f. Medical transports. Medical transport of all types (land, sea and air) is protected
and must not be attacked. 34
g. Civil defence buildings, materiel and shelters. Such buildings are provided for the
civilian population, are considered civilian objects and shall not be attacked or
subjected to reprisals. 35
h. Prisoner of war (PW) camps. Such camps will be marked with the letters “PW” or
“PG” (prisonnier de guerre) and be clearly visible from the air. 36
i. Internment camps (ICs). Such camps will be marked with the letters “IC” and be
clearly visible from the air. 37
0224. However, under certain circumstances, entities entitled to protection may lose that
protection, and, in this respect, may subsequently be subject to military action against them.
Further details are given in the CDS TD.
Proportionality Test
0225. Once the military character of a target has been ascertained, commanders must apply the
proportionality test. In deciding whether the legal rule of proportionality is being respected, the
standard of measurement is the anticipated contribution to the military purpose of an attack or
operation considered as a whole. The anticipated military advantage must be assessed against
other consequences of the action, such as the adverse effect on civilians or civilian objects. It
involves evaluating the interests arising from the success of the operation in light of the possible
harmful effects on protected persons and objects, and making a determination as to whether these
harmful effects are excessive in relation to the military advantage.
0226. The proportionality test must be used in the selection of any target. The test is as follows:
Is the attack expected to cause incidental loss of civilian life, injury to civilians, damage to
civilian objects, or a combination thereof, which would be excessive in relation to the concrete
and direct military advantage anticipated? If the answer is yes, the attack must be cancelled or
suspended. 38
0227. Where a choice is possible between several legitimate targets for obtaining a similar
military advantage, the target to be selected shall be the one on which an attack would be
expected to cause the least civilian casualties and damage to civilian objects. 39
34
GI, Art 35(1) & 36 (1); GII, Arts 22, 25 & 39 (1); GIV, Art 21 (1), 22 (1) & 56 (2); (Ref Y) AP I, Arts 21, 22 (2),
23 (1) (Ref O) & 24; AP II, Art 11 (1). (Ref P)
35
AP I, Art 62 (3). (Ref O)
36
GIII, Art 23 (4).
37
GIV, 79 & 83 (3). (Ref Y)
38
AP I, Art 57 (2) (a) (iii). (Ref O)
39
Ibid, Art 57 (3). (Ref O)
2-7
CFJP 3-9
Indiscriminate Attacks
0229. Indiscriminate attacks are those that may strike legitimate targets and civilians, or civilian
objects without distinction, and are prohibited. Indiscriminate attacks are:
a. those that are not directed at a specific legitimate target;
b. those that employ a method or means of combat that cannot be directed at a specific
legitimate target, and;
c. those that employ a method or means of combat, the effects of which cannot be
limited as required by the LOAC. 40
0230. Certain types of attacks are considered indiscriminate, including treating (for the
purposes of targeting) as a single military objective a number of clearly separated and distinct
military objectives located in a city, town, village or other area containing a similar concentration
of civilians or civilian objects. Attacks that do not comply with the principle of proportionality
are also considered indiscriminate attacks.
40
AP l, Art 51 (4). (Ref O)
41
AP l, Art 57 (2) (b) (Ref O)
42
HIVR, Art 26; (Ref AA) HIX, Art 6; AP l, Art 57 (2) (c).
2-8
CFJP 3-9
Doubt Rule
0233. In case of doubt whether a person is a civilian or not, that person shall be considered to
be a civilian. In the case of doubt as to whether an object that is normally dedicated to civilian
purposes (such as a place of worship, a house or other dwelling, or a school) is being used to
make an effective contribution to military action or not, it shall be presumed not to be so used. 43
43
AP l, Arts 50 (1) & 52 (3). (Ref O)
44
Ken Watkin, Brigadier-General Retired, “The Operational Lawyer: An Essential Resource For the Modern Commander” at 4. (Ref
EE)
45
AP I, Art 82. (Ref O)
2-9
CFJP 3-9
f. ROE;
g. legality of weapons and their use;
h. self-defence;
i. legal input to other subordinate operational instructions and aides-mémoire;
j. legal questions specifically related to the conduct of air (air and space law), land
and/or operations at sea (law of the sea);
k. liaison and coordination with LEGAD and staffs from allied/coalition nations;
l. legal briefings and instruction, and
m. all legal matters of particular interest for commanders, and for the CAF.
2-10
CFJP 3-9
Cyber Operations
0242. International law, including LOAC applies to CAF cyber operations (cyber ops). The
content of this section focuses on the law that governs the way cyber ops are conducted in the
context of armed conflicts. For advice concerning the law governing the resort to force by States
through cyber ops, the Office of the Judge Advocate General (OJAG) will be able to advise.
0243. Cyber ops are the employment of cyber capabilities with the primary purpose of
achieving objectives in or by the use of cyberspace. 48 In terms of targeting, it is important to
determine if a cyber op rises to the level of an attack as prescribed in article 49 of AP I. An attack
is a concept that “serves as the basis for a number of specific limitations and prohibitions under
LOAC.” 49 The majority of the information contained in the present cyber ops section is derived
from the Tallinn Manual on the International Law Applicable to Cyber Warfare (Tallinn
Manual). 50 This is not an authoritative statement of the law and reference to it in this section
should not be taken as a DND/CAF endorsement or adoption of its text. It provides various rules
reflecting consensus among a group of international experts as to the application of the law
currently governing cyber conflict. Although the Tallinn Manual serves as a guide, this is an
emerging area of law with little direct consideration by courts in terms of cyber warfare at this
time. Therefore, it is crucial to seek legal advice from a LEGAD on cyber issues to ensure the
correct application of current law and DND/CAF and GC policy.
0244. The Tallinn Manual, Rule 30 establishes that a cyber attack is a cyber op, whether
offensive or defensive, if it is reasonably expected to cause injury or death to persons, or damage
or destruction of objects. Serious illness and severe mental suffering are equivalent to injury.
Operations that do not cause violent consequences do not qualify as attacks. However, it is
important to note that it is the consequence of the cyber op, not its nature, that characterizes it as
violent or not. With respect to attacks on objects, the majority of Tallinn Manual experts were of
the view that cyber interference with the functionality of an object may represent damage,
thereby constituting a cyber attack, if the restoration of such objects requires the replacement of a
physical component. A cyber attack that is successfully intercepted and does not result in actual
harm could still be considered an attack in accordance with the LOAC. 51 If a cyber op is an
important part of a larger operation, such as disabling defences, that also includes the use of
munitions-based means; the LOAC rules with respect to attacks would apply to the cyber ops.
Cyber ops must accord with the principles of distinction and proportionality.
48
Ibid.at 15. see also CNO Policy for definitions of Computer Network Operation and its constitutive elements.
49
Ibid.at 106.
50
Michael Schmitt, ed., Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge
University Press: 2013). The principle of distinction requires that commanders distinguish between the civilian
population and combatants and between civilian objects and military objectives, and only direct operations against
military objectives. In the cyber domain, computers, networks and cyber infrastructure may be the object of an
attack if it qualifies as a military objective. Military objectives are those objects that by their nature, location,
purpose or use make an effective contribution to military action and whose total or partial destruction, capture or
neutralization in the circumstances ruling at the time offers a definite military advantage.50 (Ref CC)
51
Ibid.at 110 (Ref CC)
2-11
CFJP 3-9
0245. Distinction. The principle of distinction requires that commanders distinguish between
the civilian population and combatants and between civilian objects and military objectives, and
only direct operations against military objectives. In the cyber domain, computers, networks and
cyber infrastructure may be the object of an attack if it qualifies as a military objective. A
military objective is “an object that, by its nature, location, purpose or use makes an effective
contribution to military action and whose total or partial destruction, capture or neutralization, in
the circumstances ruling at the time, offers a definite military advantage.” 52 With respect to dual
use objects, the Tallinn Manual experts concluded that an object used for both military and
civilian purposes (including computers networks and cyber infrastructure) is a military
objective. 53 However, if there is doubt as to whether a normally civilian computer is being used
to make an effective military contribution, the determination that it is being so used should only
be made after careful assessment. 54
0246. Proportionality. A cyber attack that may be expected to cause incidental loss of life or
injury to civilians and/or damage or destruction to civilian objects that would be excessive in
relation to the anticipated concrete and direct military advantage is prohibited. It is important to
note that the incidental CD to be considered when assessing the proportionality of an attack can
include both direct damage (the immediate first-order effects of the attack), as well as indirect
damage (the subsequent consequences created through secondary events or actions). The indirect
effects of an operation take on particular significance in the cyber context when one considers
the possible consequences of an attack on a SCADA 55 system or a server that may be used by an
adversary’s military as well as providing vital civilian services. However, in the view of the
Tallinn Manual experts, effects that simply amount to stress, irritation or inconvenience may not
have to be factored into the proportionality analysis. 56
PsyOps
0247. The LOAC, including international treaty law, or customary law, applies equally to info
ops and PsyOps. Regardless of whether the method of engagement is munitions-based or non-
munitions-based, the civilian population shall enjoy general protection against dangers arising
from military operations. 57 Equally, the employment of PsyOps capabilities must accord with the
principles of distinction and proportionality, and they must not employ measures by resorting to
perfidy.
0248. Distinction. The principle of distinction imposes an obligation on commanders to
distinguish between legitimate targets and civilian objects and the civilian population. Although
the principle of distinction is framed in terms of military operations, its application to PsyOps
may vary depending on the nature of the operation in question. For example, a PsyOp directed at
the general civilian population, such as dropping leaflets, broadcasting, or even jamming public
broadcasts, is generally accepted as lawful as long as the civilian population is not endangered.
When assessing whether to conduct PsyOps directed at the general civilian population, Art. 51 of
52
AP I, Art, 51(1). (Ref O)
53
Schmitt , supra note 32 at 134.
54
Ibid atI137.
55
SCADA: Supervisory Control and Data Acquisition. SCADA includes industrial control systems used to monitor
and control industrial processes and infrastructure, including power generation and gas and oil pipelines.
56
Schmitt, supra note 32 at 160160.
57
AP I, Art 51. (Ref O)
2-12
CFJP 3-9
AP I shall be followed when examining the purpose and effect of the message to determine
whether it is lawful or not: “Acts or threats of violence, the primary purpose of which is to
spread terror among the civilian population are prohibited.” 58 On the other hand, messaging
may also act as an effective advance warning 59 system, further protecting the civilian population,
and in some circumstances, is required prior to conducting an attack. 60
0249. Proportionality. When considering the application of this rule to PsyOps, it is important
to consider the military advantage gained throughout the operation as a whole rather than only
from isolated or particular parts of it. It involves evaluating the interests arising from the success
of the operation on the one hand, against the possible harmful effects on protected persons and
objects.
0250. Perfidy, treachery and ruses. The difference between an unlawful act by way of perfidy
or treachery and lawful ruses lies in whether the message involves inviting the confidence of
adversaries to lead them to believe that they are entitled to, or obliged to provide, safety or
protection under the rules of LOAC with the intent to betray that confidence. If this is the case,
than the message constitutes perfidy and/or treachery, and any killing or injuring (or capturing, in
international armed conflict) of an adversary by way of this perfidy or treachery is unlawful. The
difference between perfidy/treachery and ruses is given below:
a. Perfidy and Treachery. When contemplating messaging, planners and decision
makers must keep in mind that it is prohibited to kill, injure or capture adversaries
by resort to perfidy. “Acts inviting the confidence of an adversary to lead him to
believe that he is entitled to, or is obliged to accord, protection under the rules of
international law applicable in armed conflict, with intent to betray that confidence,
shall constitute perfidy.” 61 Perfidy as a term is only employed with respect to
international armed conflict. However, the prohibition with respect to perfidy may
also be used as guidance as to the meaning of treachery in non-international armed
conflicts (note that prohibitions with respect to treachery only refer to killing or
wounding, and not to capture.) 62
b. Ruses. Ruses of war are more formally defined as acts that are intended to mislead
an adversary or to induce that adversary to act recklessly. Ruses must not infringe
any rule of the LOAC. Ruses are lawful if they are not treacherous, perfidious and
do not violate any express or tacit agreement. Examples of ruses include decoys and
fake radio messages. 63
58
Ibid., Art. 51(2). (Ref O)
59
Ibid., Art. 57. (Ref O)
60
Ibid., Art. 57(2)(c). (Ref O)
61
AP I, Art 37 (Ref O)
62
Art. 8(2) (e)(ix) of the Rome Statute
63
AP l, Art 37 (2) (Ref O)
2-13
CFJP 3-9
2-14
CFJP 3-9
2-15
CFJP 3-9
Consequence Management
0261. If targeting operations result in unintended and unexpected consequences, such as more
civilian casualties than anticipated, or following attack it is discovered that the target was not a
military objective, demonstrable compliance with LOAC principles and processes, both
generally and in relation to the specific targeting activity, will be very important. This includes
any formal investigation of the incident and any potential adverse action against individuals, as
well as developing a proactive information strategy to acknowledge the incident and mitigate any
potential negative consequences, as required.
0262. In particular, the availability of documentary evidence that the precautions required by
LOAC were undertaken will be essential. This documentary evidence may include the TVC, as
well as any instructions and briefings used in planning and executing the attack. While such
documents will not rectify the physical damage caused, they may prevent a tragic accident from
reoccurring or being mischaracterised as a war crime either by the media, or more seriously, as a
finding by a board of inquiry or court.
Weapons
0263. Some weapons are totally prohibited by the LOAC because they are either indiscriminate
in their effect or are of such a nature as to cause superfluous injury and/or unnecessary
suffering. 67 Weapons that are indiscriminate in their effect are prohibited. A weapon that cannot
be directed at a specific legitimate target or the effects of which cannot be limited as required by
the LOAC is prohibited. 68 Weapon selection is based on a number of criteria including mission
profile, desired effect, threat and legal considerations. More detail on specific weapons is
included in Chapter 5 of CFJP 3-0.1, Law of Armed Conflict at the Operational and Tactical
Levels (Ref. E).
0264. Precision-guided munitions (PGMs). No principle of LOAC requires the use of PGMs
in all circumstances. A PGM may now be required for a particular attack to fulfil a party’s legal
obligations in relation to proportionality and distinction or for some other specific reason related
to the nature of that target (including the location of protected objects and persons). With the
advent of modern technology many armed forces are now able to deliver weapons on target with
unparalleled accuracy. 69
0265. Cluster munitions. Cluster munitions have significant adverse effects on civilian
populations both during armed conflict and after hostilities have ceased, and are subject to the
Convention on Cluster Munitions(Ref L). Although Canada has not yet ratified this convention,
it participated in its negotiation and signed it in December 2008. Article 21 details the
‘interoperability exception’ that permits military cooperation between States parties and non-
States parties engaging in military operations subject to certain other positive obligations. Legal
advice regarding the interoperability exception should be sought when CAF members are
involved in any multinational targeting operation.
67
HlVR, Art 23 (e) (Ref AA); AP I, Arts 35 (2) & 51. (Ref O)
68
AP I, Art 51. (Ref O)
69
HIVR, Art 23 (e) (Ref AA); AP I, Arts 35, 51 & 57 (Ref O)
2-16
CFJP 3-9
0266. Incendiary weapons. Protocol III to the 1980 Convention on Conventional Weapons
prohibits certain uses of incendiary weapons.
0267. Blinding lasers. Protocol IV to the 1980 Conventional Weapons Convention prohibits the
use of laser weapons specifically designed, as their sole combat function or as one of their
combat functions, to cause permanent blindness to unenhanced vision (that is, to the naked eye
or to the eye with corrective eyesight devices).
Summary
0269. Legal considerations have a variety of applications throughout the targeting process.
Legal issues become more complex when Canada participates in a multinational operation. All
members of the CAF have a duty to comply with Canadian and international law. All targets
passed for prosecution must meet the legal requirements of relevant international law, CDS TD
and ROE. Early involvement of the LEGAD in targeting will improve the process and can
prevent possible domestic and international law violations.
2-17
CFJP 3-9
Chapter 3
Targeting Duties and Responsibilities
0301. The use of force during military operations is subject to careful scrutiny to ensure that its
use is consistent with strategic and operational objectives. To fulfill Canadian Armed Forces
(CAF) operational requirements within these constraints, a CAF targeting process has been
developed to support the efficient and effective validation and approval of targets. The authority
for approving the targeting and subsequent attack using any means (munitions-based or non-
munitions-based) by CAF elements rests with the Chief of Defence Staff (CDS), with an
appropriate level of authority delegated to subordinate commanders and other individuals below
that level, crucially the designated supported commander and the task force commander (TF
Comd). 70 The CDS TD articulates the policy and mechanisms by which CAF targeting is
governed, and provides the guidance necessary to ensure effective and timely decision making in
the targeting process at all levels of command, both prior to and during CAF participation in
unilateral or multinational operations.
70
The detail of delegation of targeting authority to the designated supported commander and the TF Comd is
defined in the CDS TD. For all operations an operation-specific a CDS directive and a CDS TD will be issued by the
SJS, from which the designated supported commander will issue an operational targeting directive (OTD).
3-1
CFJP 3-9
Target Validation
0305. The authority to validate targets for CAF operations will be directed by the relevant
operation-specific CDS Directive/TD.
71
Including CFINTCOM and the strategic-level, and the J2 staff at lower levels.
3-2
CFJP 3-9
Target Approval
0309. The target approval process at the tactical level will be initiated during operations based
on the commander’s guidance, or on the assignment of targets to CAF assets by higher national,
allied/coalition authority. TF Comds may approve targets commensurate with their level of
delegated authority.
3-3
CFJP 3-9
3-4
CFJP 3-9
Audit Trail
0314. The development, validation and approval of targets is an iterative process. All
information that informed the process leading to the validation and subsequent approval of a
target is to be retained within its electronic target folder (ETF) 72 for audit purposes for the time
period and in the archive location stipulated in CAF archive regulations for such documents. 73
The folder should highlight the source of the intelligence with clearly annotated validity dates.
Any additions, amendments or alterations must be clearly annotated by the author, including the
date/time the changes were incorporated. Decisions taken on the basis of this information must
be clearly indicated, including the date of the decision. The ETF and target summary sheet
(TSS) 74 of targets cleared for prosecution by a TB must contain the following:
a. the TB conducting the approval (including the Chairman’s name/date of TB);
b. the analysis of the expectation of CD;
c. all weaponeering constraints applied to the attack;
d. comments from other agencies; and
e. decisions reached in the TB process, and any explanatory
discussion/explanation/reasoning.
0315. It is the responsibility of the J3 targeting officer (or equivalent) to ensure that detailed
records as described here are assembled, and archived/disposed of in conjunction with CDS TD
direction.
72
ETFs are populated with all the -source intelligence and imagery required to conduct an effective prosecution.
They are discussed more fully in Chap 4.
73
Further specific guidance and direction may also be included in the operation-specific TD.
74
The TSS is a working document used to inform TBs that summarizes a target’s information and facilitates the TB
process.
3-5
CFJP 3-9
Chapter 4
The Targeting Process
Section I
The Targeting Cycle
0401. The targeting process is an iterative one that provides a framework to ensure successful
targeting during operations. It is not time-dependent and steps may occur concurrently. An
effective, disciplined targeting process minimizes undesired effects, the potential for collateral
damage (CD), and reduces inefficient actions during military operations.
0402. The targeting process integrates military capabilities to create desired effects in support
of the commander’s mission and end state. The targeting process aims to ensure that:
a. targeting effort is aligned with national objectives and the commander’s intent;
b. legal obligations are met;
c. a range of effects are generated across the operational environment that target an
adversary’s critical vulnerabilities;
d. targets selected for prosecution are valid;
e. targeting is coordinated, integrated and deconflicted with other operational
activities; and
f. target intelligence requirements are identified and tasking of collection assets is
managed according to the commander’s priorities.
4-1
CFJP 3-9
4-2
CFJP 3-9
75
Operational objectives link the military strategic end state and objectives with tactical action.
4-3
CFJP 3-9
0410. Targeting involves understanding what effects need to be achieved, identifying the nodes
through which the effect can be realized and then applying the appropriate resourced activity
against those nodes. This broad approach, known as full-spectrum targeting (FSpecT) is
represented pictorially in Fig. 4-2. The operational commander, having identified the conditions
needed to be achieved, uses a target-system analysis (TSA) (including a target-audience analysis
[TAA]) to examine behaviours, attitudes, perceptions and vulnerabilities of potential targets,
determining whether and how they can be influenced. Further refinement determines the blend of
desired munitions-based and non-munitions-based effects. This allows identification of
behavioural objectives, the effects that will achieve them and the activities and resources
required to generate those effects.
4-4
CFJP 3-9
4-5
CFJP 3-9
not be done separately from physical targeting, but in conjunction with it, so that the
effects are complementary and take into consideration that munitions-based actions
could result in cognitive effects, and vice versa. A TSA is the preferred start point
for the building of target lists.
(1) A TSA examines:
a) a specific target system’s functions;
b) a target system’s dependencies on, and linkages to, other target systems;
and
c) the impact of exploitation of particular target elements on the overall
system as well as on other target systems that are functionally related
through those target elements.
(2) A TAA examines:
a) the ability to affect a TA to achieve the desired effect;
b) the optimal techniques and means to influence a TA to achieve the
effect required, and;
c) the events that will indicate success or failure of the effort.
c. Target development nominations (TDNs). Potential targets resulting from the
TSA/TAA process are identified for target development and become TDNs. TDNs
will be formally developed by CFINTCOM and CAF targeteers and their ETFs
established. The CAF target-development process will include the vetting, validation
and analysis of all nominated candidate targets.
(1) Vetting. Candidate targets are vetted to confirm the accuracy of the underlying
intelligence supporting the justification for their nomination. Vetting is an
intelligence function and will be conducted by CFINTCOM, but will involve
the involvement of the whole intelligence community. It aims to establish a
reasonable level of confidence in a candidate target’s functional
characterization, based on a review of its ETF. Vetting also seeks to avoid
dissent on assessments arising during target boards. The elements to be
considered in vetting are:
(2) Validation. A candidate target does not become a ‘target’ until it has been
validated by a designated target validation authority (TVA). Vetted candidate
targets will be validated to confirm that future prosecution would meet all the
objectives and criteria outlined in planning (i.e. in the strategic, operational
TDs, or other guidance issued), be legal (i.e. a target is lawful) and directly
contribute to the strategic objectives and success of the CDS’s mission.
Validation is an operations, policy and legal function, and carried out at a TB,
joint targeting coordination board (JTCB) (see chap 6) or similar review forum.
A TVC is to be completed for each nominated target, with successfully
validated targets being signed off by the appropriate commander. Validated
targets will be included on the Joint Target List (JTL).
4-6
CFJP 3-9
(3) Analysis. Validated targets will be analyzed by targeteers, to confirm that they
are considered technically suitable for prosecution.
d. Target-intelligence production. Following identification of key targets matching
the adversary’s critical vulnerabilities, standardized target materials (TM) are
produced to support commanders and combat units. The physical and functional
characteristics of individual targets are determined and recorded to inform later
weaponeering and OPP.
e. Target-list development. The output of target development is the production of the
various target lists. It is imperative that procedures be in place to manage target lists
to ensure these products are responsive and verifiable.
f. Electronic target folder (ETF). Each target’s details are to be contained in an ETF
populated with the relevant all-source intelligence and imagery required to conduct
an effective prosecution. All target-related intelligence should be included in the
ETF and it must be retained post-conflict for audit purposes. 76 ETFs will conform to
the accepted US/NATO standard, as per US CJCSI 3370, Target Development
Standards. The information in the ETF is used to populate a TSS.
g. Target summary sheet (TSS). TSSs are produced by the J3 targeting officer (or
equivalent) and provide a summary of a target’s information and facilitate the
targeting process. They are TB’s working documents and form the operational
record of each target’s passage through the target-approval process. They also
provide a briefing tool to enable senior commanders and legal advisers to judge the
assessed military advantage of an intended attack/engagement, against the potential
CD risk. TSSs will be compiled for all targets to be prosecuted as deliberate or as
dynamic targets and presented to the relevant TB. For dynamic targeting, a TSS will
be completed before engagement, but where this is not possible it is to be completed
as soon as possible thereafter. In all cases, the TSSs for prosecuted targets are to be
returned to the designated supported commander’s targeting cell with all relevant
supporting data as soon as is practicable, but not later than two days after target
prosecution. 77
0412. Target lists. The principal target lists that will be developed are:
a. Candidate target list (CTL). On completion of a TDN review, and the
determination that a target is sufficiently developed, the target can be considered a
candidate target, eligible for vetting, and added to the CTL. The CTL is a list of
candidate targets that are being vetted and validated. Each validated target on the
CTL will be nominated to either the JTL or RTL. If a candidate target has been
assessed as being invalid, it is removed from the CTL. The rejected target should
remain on the TDN spreadsheet, but annotated as having been rejected at validation,
with date and rationale. In certain cases the rejected nomination may go onto the no-
strike list (NSL).
76
ETFs and their TSS are retained as operational records.
77
In accordance with the operation-specific CDS TD and OTD .
4-7
CFJP 3-9
b. Joint target list (JTL). A JTL comprises those CTL targets not on the NSL that, if
prosecuted, would assist in the achievement of CDS’s strategic aim. 78 The JTL is
owned by the CDS, who will delegate management of it to the delegated supported
commander. If such delegation occurs, responsibility for further development of the
JTL will rest with the delegated supported commander, supported by CFINTCOM.
Additional targets may be nominated to the JTL at any time by any commander.
c. Restricted target list (RTL). JTL targets whose disruption might have an adverse
effect on other military options; future intelligence gathering or the post-conflict
step of operations will be placed on the RTL. Responsibility for compilation,
management, maintenance and dissemination of the RTL rests with the delegated
supported commander. Any commander may nominate targets for the inclusion in
the RTL, but authority to remove a target from the list, or change its status, rests
with the originator of that restriction. The JTL and RTL combine to form the
database of official targets, having some significance in a particular plan.
d. Joint prioritized target list (JPTL). The JTL is prioritized into a draft JPTL for
TEA approval at an appropriate level. Notwithstanding unforeseen change in
particular circumstances, targets on the JPTL will be scheduled for prosecution.
0414. No-strike list (NSL). The NSL is not considered a target list. Entities are placed on the
NSL if their deliberate or inadvertent physical destruction or damage would be particularly
sensitive for legal, political, cultural or other reasons. Special care must be taken when targeting
nearby military objectives where CD to a nearby NSL object is a possibility. 79 The NSL is
owned by the CDS but its day-to-day management may be delegated to an NSL coordinator at
the operational-level. The CDS’s authorization is required to remove objects from the NSL,
subject to additional guidance given in the operation-specific TD.
0415. Fully developed targets. CAF targets are considered to be fully developed when
sufficient intelligence exists to support the operational and legal requirements necessary to
proceed with military operations against them. Fully developed targets must still be cleared for
attack/engagement at an appropriate level of TB.
0416. Collateral-damage estimation (CDE). The LOAC requires that military operations be
directed only against legitimate targets. Military operations directed against such targets must
also meet the requirement of proportionality in accordance with the LOAC. Parties to a conflict
have a duty to distinguish between civilians and combatants as well as between civilian objects
and military objectives. Civilians are entitled to protection from the dangers arising from military
operations. When conducting operations, care should always be taken to protect civilians and
civilian objects. 80 The fact that an attack on a legitimate target may cause civilian casualties or
damage to civilian objects does not necessarily make the attack unlawful under the LOAC.
However, such CD must not be excessive in relation to the concrete and direct military
advantage anticipated from the attack.
78
Some CTL entities may not assist in this aim, and will be rejected from inclusion in the JTL.
79
Proximity of lawful military targets to no-strike entities does not preclude engagement of the former. However, in
these circumstances, the commander must weigh the anticipated loss of life, damage to property, or other negative
effects as a result of an attack, versus the military advantage expected to be gained.
80
AP I, Arts 48, 51-58 (Ref O); AP II, Arts 13-15. (Ref P)
4-8
CFJP 3-9
0417. CDE is a fundamental principle of the CAF target-approval process and of the
proportionality assessment. A formal CDE is undertaken for every target to be prosecuted using
a deliberate or dynamic process. Without an effective CDE it may be difficult to demonstrate due
diligence and appropriate risk management post-attack. It is recognized that there may be
situations when it is not feasible to conduct a full CDE. In these circumstances, commanders
must, as a minimum, respect their obligations under LOAC. An attack must be cancelled or
suspended if it becomes apparent that the objective is not a legitimate target, or that the attack
may be expected to cause CD that would be excessive in relation to the concrete and direct
military advantage anticipated. The CDE process does not form by itself a decision; is it an
estimate that assists to balance collateral risk against military requirement. Population density
and PoL surrounding the target must also be considered. Largely an exercise in military
judgment, CDE can be quantified by the use of CDE software tools to produce a statistically
realistic result. Responsibility for production of a CDE rests with the J3 Targeting staff (or
equivalent) supporting the target’s TEA.
0418. CDE methodology (CDEM). The CAF CDEM for physical effects is a five-level
process that provides the commander with empirically derived CDE mitigation tools designed to
support command decision making and weigh military necessity against CD risk. The CAF
CDEM aligns with the US, UK, AUS and NATO equivalents. It simplifies the US Joint
Munitions Effectiveness Manuals (JMEMs) empirical data into a more readily usable graphical
form to enable assessment of CD at any level of command. The concept of CDE also applies to
means that are non-munitions-based 81 although a different methodology will apply. This latter
topic is beyond the scope of this publication.
0419. In its most basic form, CDE is a process of estimating the CD that is considered by every
commander within the chain of command. CDE distils down to five questions that must be
answered before prosecuting any target:
a. Has a PID 82 been established for the object to be affected?
b. Are there protected or collateral objects, civilian or non-combatant personnel,
human shields, or significant environmental concerns within the effects range of the
weapon to be used to attack the target?
c. Can damage to those collateral concerns be mitigated by attacking the target with a
different weapon or with a different method of engagement, yet still accomplish the
mission?
d. If not, how many civilians are likely to be injured or killed, what property may be
damaged or destroyed or what adverse effect might there be on the environment if
the attack is carried out?
81
It should be noted that non-munitions-based means might also result in a lethal effect, which might be intended or
could be an unintended second or third order effect. For instance, denying power or water production through
interference with control systems might result in injury or death.
82
Positive identification (PID): In targeting, the reasonable certainty that a functionally and geospatially defined
entity is a legitimate military target.
4-9
CFJP 3-9
e. Are the collateral effects excessive in relation to the expected military advantage
gained and, based on the ROE in use, is it necessary to request approval to attack the
target from the next level of command?
0420. The technical methods detailed in the CDE process enable a reasonable understanding of
the CD inherent in weapons employment. CDEs thereby address the LOAC requirement for
proportionality. The supporting technical data, mitigation techniques, and logic of the CDE
recognize the intelligence limitations of what can reasonably be known about a given target, its
surroundings, and collateral structure composition; the reliability of available weapon-effects
data; and the operational realities and uncertainties of weapons delivery in a combat
environment.
0421. The framework of munitions-based CDE is built around five mutually dependent CDE
levels. Each level is based on a progressively refined analysis with specific risk thresholds
established for each of the CDE levels. The CDE supports the relationship between three
principal categories of risk: risk of CD, risk to own forces, and risk to the mission. The
intersection of these is determined by the factors required to avoid, and in all cases minimize, CD
to an acceptable level, while still seeking to achieve mission success and minimizing risk to own
forces. Fig. 4-5 depicts the risk continuum and the interaction between CD and targeting factors
for each CDE level. CDEs provide easily recognizable measures of operational risk to
commanders. The CD threshold in CDE levels 1, 2, and 3 mitigate risk to less than 10%
probability of serious/lethal wounds to standing personnel, dressed in summer-weight clothing,
in open rolling terrain, from primary warhead fragmentation or debris. The threshold in CDE
Level 4 reduces this risk to less than 1% fractional structural damage to collateral structures from
primary warhead blast effects. CDE Level 5 considers the level of structural damage and/or
casualties that levels 1-4 were unable to mitigate.
Figure 4-4: The Five CDE Levels and Risk Management/Mitigation Strategy.
(Note: This is a graphical representation of risk and not a linear depiction of how the levels increase)
4-10
CFJP 3-9
4-11
CFJP 3-9
Step 6—Assessment
0429. The assessment of effects realized is essential in the targeting and operational process.
MoEs enable commanders to identify the impact of a targeting action in relation to the overall
mission. MoEs are criteria used to evaluate how well a task has achieved the desired result. 83
These criteria focus on the results or consequences of actions taken, considering whether the
right things are being done to create the desired effects. MoPs are criteria used to evaluate the
accomplishment of a task. 84 These criteria assess the conduct of the task itself, considering
whether the task was done right. If the desired effect is not achieved, the target may need to be
reattacked using the same response, or another response selected to achieve the desired effect.
MoPs are identified to assess how well our forces are conducting the targeting effort. MoPs
enable commanders to determine performance of own forces and ensure that adequate resources
are being allocated to the targeting effort. In essence MoEs help answer “Are we doing the right
things?” and MoPs help answer “Are we doing things right?” By feeding back the results of
MoPs/MoEs against the campaign objectives, this enables the assessment phase to determine if
progress in the mission is being made. This is illustrated at Fig. 4-6.
0430. The assessment step both completes and begins the cyclic targeting process. Assessment
occurs at all levels and across the range of military operations, even those that do not include
combat. Commanders and their staff determine relevant assessment actions and measures during
planning. They consider assessment metrics and measures as early as mission analysis, and
include them and related guidance in the estimate process/OPP. This properly focuses
subsequent assessment and collection at each step and enhances the efficiency of the overall
process. Assessment is continuous and directly tied to the commander’s decisions throughout
planning, preparation, and execution of operations.
83
DTB, record 32281.
84
DTB, record 32230.
4-12
CFJP 3-9
4-13
CFJP 3-9
0432. Effects assessment. Commanders will continuously assess the operational environment
and the progress of operations, and compare the outcomes with their initial vision and intent,
based on the effects that are produced in the operational environment. In this way they adjust the
nature and type of operations, and therefore the effects required, based on their assessment, to
ensure that objectives are met and their end state is achieved. At the operational and/or strategic
levels effects assessment is a campaign assessment that is incorporated into strategy and
guidance development.
0433. Combat assessment (CA). CA examines the effects produced on the targets to determine
if mission objectives were achieved in accordance with the commander’s intent. It also
recommends further targeting priorities in line with the assessed results. Effective CA requires an
understanding of the linkages between the targets and the higher commander’s objectives,
targeting guidance and desired effects. The linkage begins with targeting tasks, effects and
objectives that support assigned operational tasks, effects and objectives. There is a difference
between operational objectives/effects, targeting objectives/effects and munitions effects. CA
comprises four aspects: mission assessment, BDA, weapons effectiveness assessment, and re-
attack recommendation.
a. Battle damage assessment (BDA). BDA is “the timely and accurate estimate of
damage resulting from the application of military force, either lethal or non-lethal,
against a predetermined objective.” 85 BDA is conducted in three steps:
initial/physical damage assessment, functional damage assessment and target system
assessment.
b. Mission assessment. Mission assessment is an evaluation of the effectiveness of all
preceding steps in the targeting process in the light of overall command guidance. It
informs commanders at all levels of the results of targeting operations.
c. Weapon-effectiveness assessment (WEA). WEA is a technical assessment of how
the capabilities employed performed, and of the method by which they were applied.
d. Re-attack recommendation. This phase compares the result of prosecution with the
predetermined MoEs, which may lead to a requirement to re-engage the target if the
intended result was not achieved.
0434. Engaging targets identified on a target list does not, of itself, represent the total
effectiveness of operations. CA seeks to ascertain whether required effects are being achieved.
All components, commands and sources contribute to and rely on CA. At the JTF level, the
outcomes of the assessment step will influence the commander’s future mission guidance and
force allocation.
0435. Collateral assessment. Collateral assessments are the understanding of the actual CD
caused by the use of munitions-based and cognitive weapons, and they are necessary to fully
understand the consequences of own actions. Collateral assessments measure actual CD against
the previously assessed CDE, to determine what undesired effect occurred that may require
consequence management and/or a re-assessment of the applicable CDEM. Collateral assessment
draws from the BDA process, but has different goals.
85
DTB record 26988.
4-14
CFJP 3-9
Section II
Dynamic Targeting
Introduction
0437. Dynamic targeting primarily prosecutes targets of opportunity, which are targets
identified too late, or not selected for action in time to be included in deliberate targeting; or
planned targets whose status has recently changed necessitating more expedient prosecution.
Dynamic targeting is conducted almost exclusively in Step 5 of the targeting process, as shown
in Fig. 4-8. However, planning conducted during Steps 1-4 can and does support dynamic
targeting. These targets must be prosecuted on a compressed timeline compared to those that are
prosecuted using deliberate targeting. To facilitate their execution the CDS may pre-approve
certain target sets for prosecution. These target sets will largely comprise opposing
military/combatant and other similar designated groupings necessary for belligerent activities.
Examples of such targets might be, but not limited to: theatre ballistic missiles; mobile, high-
threat surface-to-air missiles; mobile command and control vehicles and facilities and key mobile
and temporary capabilities such as temporary military bridging. Dynamic targeting remains a
methodical process irrespective of the time available.
0438. Targets of opportunity. There are two types of targets of opportunity:
a. Unplanned. Unplanned targets are those known to exist in the operational
environment but that have not had action planned against them.
b. Unanticipated. Unanticipated targets are unknown, or not expected to exist in the
operational environment.
4-15
CFJP 3-9
0439. Although priorities may vary, the primary focus of dynamic targeting is prosecution of
the following:
a. Designated supported commander’s TSTs. The TF Comd is usually responsible for
TST prosecution and relies on the component commanders for conducting TST
operations.
b. Targets previously scheduled for attack, but that have changed status in some way.
c. Component high-priority targets that are not TSTs approved at the operational level
(dynamic targets), but are considered crucial for the success of a friendly component
commanders’ missions because of their fleeting nature and threat to friendly forces.
d. Designated HPTs and HVTs, identified during execution that friendly commanders
deem worthy of targeting.
e. Dynamic targeting supporting joint fires that require immediate engagement to
achieve desired effects.
0440. Successful dynamic targeting requires prior planning and coordination by relevant staff(s)
and/or respective components. Some common methods for creating this capability are:
a. preplanning target reference methods and fire support coordination measures
(FSCM);
b. pre-positioning available on-call ISR assets and attack resources to rapidly respond
to emerging targets;
4-16
CFJP 3-9
86
The traditional doctrinally accepted dynamic targeting process has the F2T2EA steps. NATO work on AJP-3.9,
Allied Joint Doctrine for Joint Targeting (Ref. J) has developed the additional ‘E’ for ‘Exploit’, and it is considered
that this step is an important part of the dynamic targeting process sufficient that it should be included here.
4-17
CFJP 3-9
Step 1 – Find
0442. The Find step involves ISR detection of an emerging target, some aspect of which
suggests that it fits within either the unplanned or unanticipated target categories. The Find step
requires clearly designated guidance from commanders, especially concerning target priorities,
and the focused ISR collection plan based on JIPOE for specific named areas of interest (NAIs)
and/or TAIs. Some of the emerging targets detected as part of the collection operations will meet
the criteria to be further developed. The time sensitivity and importance of a target may be
initially undetermined, and emerging targets usually require further ISR and analysis to develop
and confirm their status.
0443. Collection. A good collection plan is active and focused. The deployment of collection
assets should be undertaken with a clear understanding of what information/data will be
collected. Collection should be anticipatory and involve confirming anticipated results. The
result of the Find step could be an emerging target that will be nominated for further
investigation and development in the Fix step.
Step 2 – Fix
0444. In the Fix step an emerging target is positively identified and its position and other
relevant data are determined with sufficient fidelity to permit engagement. This step begins after
the detection of the emerging target, with sensors focused on confirming the identity and precise
location. This may require implementing a sensor network or diverting ISR assets. An estimation
of the target’s window of vulnerability frames the timeliness required for prosecution and may
affect the prioritization of assets and risk assessment.
0445. The Find and Fix steps may be completed near-simultaneously, without the need for
additional ISR input if the system that detects the target will also engage it. This action may also
result in the subsequent Target and Engage steps being completed without a lengthy
coordination and approval process. Battle management systems can often fix target locations
precisely enough to permit engagement without the need for further ISR collection. Growth in
sensor technology also permits non-traditional sources of ISR to supplement the Find, Fix, and
Track steps, integrating data from platforms other than those traditionally dedicated to
intelligence collection. This helps to build a COP that commanders can use to expedite the
F2T2EA process.
Step 3 – Track
0446. In the Track step a confirmed target’s position and track, if appropriate, is monitored.
Sensors may be coordinated to maintain SA or track continuity on targets. Windows of
vulnerability should continue to be identified. This step requires relative reprioritisation of ISR
assets, just as the Fix step may, to maintain SA.
0447. If track continuity is lost, it will probably be necessary to return to the Fix or possibly the
Find steps. The Track step results in track continuity and maintenance of identification on the
target, maintained by appropriate sensors or sensor combinations, and updates on the target’s
window of vulnerability (if required).
4-18
CFJP 3-9
Step 4 – Target
0448. The Target step is a decision-making process that uses available information to produce a
particular engagement recommendation for approval by an appropriate tactical commander. Any
restrictions and deconfliction issues are also resolved in this step. Guidance on the conditions
under which prosecution can occur, and the effects required, is used in this recommendation.
Step 5 – Engage
0449. In this step, engagement of a target is ordered and transmitted to the selected engagement
system. The engagement is monitored and managed by the engaging force element/component.
The desired result of this step is successful action against the target.
0450. Prosecution of the target must continue to be audited, through appropriate mechanisms,
by the targeting staff, to ensure that it was carried-out as planned and in accordance with the
wishes of the TEA. Records of all actions concerning the prosecution, both formal (TSS, etc.)
and informal (operations/communications logs, etc.), must be included in the target records for
audit and record purposes.
Step 6 – Exploit
0451. The engagement of any target, physical or cognitive, can present immediate or longer
term opportunities for exploitation. During the planning phase, targeting and planning staffs
should identify these opportunities and develop plans that can be executed if the appropriate
conditions arise.
0452. Where a target is detected, validated and engaged, and recorded sensor data is available,
it can be analyzed to track the target back to its point of origin, such as a base camp, and thus
potentially identifying a wider threat or additional emerging targets for subsequent analysis
and/or attack.
Step 7 – Assess
0453. This step links Engage and Exploit. Here the resultant effects are measured against
actions and desired effects on the target. ISR assets collect information about the engagement
according to the collection plan and attempt to determine whether desired effects and objectives
were achieved. In cases of the most fleeting targets, quick assessment will be required to make
expeditious re-attack recommendations. Legal advice should also be sought during the Assess
step, especially if the commander is contemplating re-engaging the target.
4-19
CFJP 3-9
0455. Risk management. The prosecution of any target entails a certain amount of risk.
However, to make an informed decision, the TEA must be aware of the nature and type of that
risk. Awareness of the level of acceptable risk is critical to successful targeting during planning
and execution. Compression of the decision cycle increases risk due to the time needed for the
detailed coordination and deconfliction required during dynamic targeting. TEAs must assess
risk early, determine what constitutes acceptable risk, and communicate their intent to their staff.
The prosecution of TSTs may necessitate that a higher level of risk is accepted to successfully
attack the target. Issues in the consideration of risk management include:
a. risk to the mission (LOAC/ROE compliance, mission mandate and Government
policy, the risk of not attacking the target in time or losing the opportunity to
prosecute the target);
b. risk to friendly forces;
c. increased CD potential; and
d. opportunity cost of diverting assets from their planned missions.
Section III
Time-Sensitive Targets
Introduction
0456. A TST is a JFC-designated target requiring immediate response because it is a highly
lucrative, fleeting target of opportunity or it poses (or will soon pose) a significant danger to
friendly forces. TSTs are also designated as such because their engagement is of a high enough
priority to warrant immediate action and the possible retasking of forces, to support campaign or
operational objectives. A TST may be either engaged by either deliberate or a dynamic targeting.
TST execution may involve cross-boundary issues and multicomponent or joint force assets to
prosecute them. TSTs are prioritized, categorized, coordinated, deconflicted, and directed for
engagement at the operational level. Some examples of potential TSTs are:
a. weapons of mass destruction and their supporting systems;
b. deployed theatre ballistic missile systems;
c. mobile, high-threat surface-to-air missile systems;
d. mobile rocket launchers;
e. mobile C2 vehicles and facilities; and
f. targets that have undergone a change in status (e.g. a standby C2 facility that has
recently become functional).
Prosecuting TSTs
0457. The targeting process establishes the mechanism, via which all targets are identified,
developed and engaged, this includes TSTs. However, due to the time sensitivity associated with
TSTs, they are usually prosecuted using the dynamic targeting process (F2T2E2A).
4-20
CFJP 3-9
Considerations
0460. Intelligence. Synchronization between intelligence and targeting requirements is
necessary to optimize the ability of forces to effectively locate, engage and assess the TST.
During execution planning, intelligence closely monitors target status to update final planning
before execution.
0461. Time. The TF Comd must rapidly balance the time required for coordination against the
danger of not engaging the target in time. Often this means accepting a risk of redundant attacks
against the same target, and/or possible attacks with non-optimum weapons. The best response
for each TST often depends on the level of conflict, clarity of the desired outcome, and ROE.
0462. Engagement capabilities and limitations. Determination of the most appropriate
prosecution asset begins during the Target step and continues through to Engage. Time
permitting, each component provides recommendations highlighting the benefits and limitations
of their available weapon systems based on the current situation. The designated supported
commander also provides guidance to components to allow them the flexibility to make the
proper decision regarding rapid selection of most appropriate engagement capability. Each of the
different weapon systems has associated benefits and limitations regarding effectiveness against
different target types, responsiveness, range, accuracy, vulnerability to an adversarial threat, and
associated risks of employment.
4-21
CFJP 3-9
Chapter 5
Influence-Activity Targeting
Introduction
0501. Info ops coordinate and integrate non-munitions-based activities with traditional military
operations. The focus of info ops is to create first-order cognitive effects on approved TAs
through the synchronized use of information-related capabilities (IRCs); operations security
(OPSEC); military deception (MD); psychological operations (PsyOps); civil-military
coordination (CIMIC); public affairs (PA); key-leader engagements (KLEs); computer network
operations (CNO); electronic warfare (EW); and presence, posture and profile (PPP), to affect
their will, behaviour and capabilities. 87 Info ops must therefore be fully integrated within the
operations planning and targeting processes.
0502. Influence activities (IAs) operate in the areas where the physical, informational, and
cognitive domains converge. If the core functions of land operations 88 consist of Find, Fix, Strike
and Exploit; then the equivalent for IAs might be along the lines of Identify, Empathise,
Communicate, Influence and Assess. Thus the aims of IA targeting are similar to those of
traditional targeting, but reached by very different methods. This chapter looks at these
differences, and hence the differences in approach taken by IA targeteers.
0503. All targeting is command-led and IA targeting is no different. It starts with the issuance
of a commander’s guidance and intent. This assists the targeting staff to identify relevant TAs.
The next step must always be about identifying what effect needs to be produced on the TA, and
this has undergone radical development in our understanding of what the TA is and how it
works/thinks. Clearly, none of this would be possible without good information and thorough
understanding. It is no surprise that the nature of the problem described earlier required
something rather more than just an analysis of the adversary—the ‘red’ picture. In this instance it
is also about ‘white’ (politics, people and their motivations) and ‘green’ (host nation partners);
and include crime, corruption, etc. Lastly, all sources need to be coordinated effectively to
answer the key questions. This process is led in the traditional way by the commander’s
information requirements, but it is important that they be disseminated very widely and updated
regularly so that they leverage not just ‘task-able’ sources, but also ‘incidental’ sources as well
as—most frequently forgotten—what is available in open source material.
0504. The employment of IAs. The key to employing IAs is to decide the effect that is to be
created and coordinate action and message across all lines of operation. Commanders must
understand and select the influence effects that will accomplish their campaign objectives, and
then assign the requisite activities required to achieve them. A wide range of activities will be
used to influence a target. IAs may include:
a. MD. MD may be applied to adversary commanders and forces to affect their
perception of the threat and intent.
87
CFJP 3-10, Information Operations (Ref. F).
88
B-GL-300-001/FP-001, Land Operations , Chap 4. (Ref K)
5-1
CFJP 3-9
5-2
CFJP 3-9
0508. Influence effects. While objectives for IAs express a condition or outcome in the
information domain, an influence effect must express a condition or outcome in the real world
(i.e. the cognitive or physical domains). These effects are generally manifested as conditions
affecting either the target’s information systems in the physical domain, decision making in the
cognitive domain, or subsequent behaviour in the physical domain. The key cognitive and
physical effects may be described as:
a. Psycho-cognitive effects. Effects in the psycho-cognitive domain should describe a
psychological condition or state that will manifest itself in the mind of the target as a
result of influence engagement. Possible psycho-cognitive effects are:
(1) Mislead. A target is misled when it believes something that is not true. This
specific effect should be used when the commander desires to drive the
adversary to make a specific decision or form a specific perception.
(2) Confuse. A target is confused when it does not know whether or not to
believe something is true. This effect is used when a commander desires that
the adversary cannot make an informed decision due to the lack of
information of sufficient quality, or confusing information.
(3) Degrade. In the physical domain, degradation means to physically reduce
the effectiveness or efficiency of adversary employment of combat power. It
also has applicability in the psycho-cognitive domain, and in this sense
degradation can reduce an adversary’s or third party’s morale, perceptions,
or attitudes (e.g. degrading popular support for a particular insurgent group).
(4) Promote. Just as a commander may want to degrade perceptions and
attitudes, it may be desirable to promote specific perceptions and attitudes.
Promote can be to increase support for, or awareness of, the friendly force
presence and activities.
(5) Inform. To increase SA and knowledge of a TA without seeking to change
perceptions and attitudes. Inform could be a preparatory condition prior to
seeking a change in the target’s cognition.
b. Physical effects. Effects in the physical domain should describe a physical,
behavioural condition or outcome exhibited by the target. For IAs, information
systems and networks (both technological and human) are attacked or engaged to
generate physical effects. Possible physical effects can include:
(1) Destroy. A familiar term to conventional operations, destruction is applicable
to describe effects in the information environment as well. Destruction
physically renders adversary information systems useless or ineffective, until
reconstituted.
(2) Degrade. For IAs, affecting the physical collection, processing, and
dissemination of particular information can add to the degradation of the
adversary’s ability to synchronize and execute operations.
5-3
CFJP 3-9
IA Targeting
0509. The process of IA targeting represents the implementation level where targets residing in
the physical, informational and cognitive domains are prosecuted. Doctrinally, the IA targeting
process is executed through the JTC, and no doctrinal conflict exists between IAs and targeting.
The challenge lies in knowing where, when, and how to target an opponent as part of an overall
coherent campaign to produce the conditions for ultimate victory. Since the targeting cycle
makes no distinction between lethal and non-lethal effects, IAs’ doctrine, supporting technology,
and practices serve as significant inputs to second phase of the targeting cycle. Phase two
involves the development and prioritization of targets. This phase identifies, researches,
develops, vets and validates potential targets for approval and action during a given time period.
Although these actions can apply to any target residing in the physical, informational, and
cognitive domain, IAs target development and prioritization possess nuances that account for the
multiple domain convergence.
0510. In examining the targeting process as it relates to IAs, some key points emerge. First,
IAs’ inherent complexity impedes the traditional targeting capability to effectively align effects
with objectives. Secondly, from an informational and cognitive perspective, the term MoE
struggles to accurately capture complete progress, because it may only focus on indicators of
positive attainment. Thirdly, beyond the usage of the JTC, the doctrine does not advocate any
adherence to a single targeting methodology. Finally, and most importantly, the four principles
of targeting are equally applicable to all IA capabilities.
0511. Principles. The following principles are key to IA targeting:
a. Establishing and maintaining credibility. For fires and IAs to be successful in
creating influence on the psychological plane, the source of the fires and IAs must
have significant credibility in the eyes of the TA. The credibility of a force may have
to be established in a planned, incremental fashion. If lacking credibility, a force will
require the engagement of indigenous proxies such as social or religious leaders who
have established credibility with TAs, to broadcast the desired messages.
b. Timely counter-IAs. Even the most effective fires and IAs plans will be frustrated
in execution if deliberate actions are not taken to counter the IAs of the adversary.
With respect to IAs, the advent of real-time communications technologies forces the
commander to constantly observe and to consider whether to or not to counter the
adversary’s attempts to influence TAs, locally and internationally. Fires and IAs
planning must dedicate resources to monitoring adversary IAs and remain flexible
enough to counter erroneous information. Timeliness is paramount and in terms of
PA, the first side to get its story out into the public domain often holds the public
‘high ground.’
5-4
CFJP 3-9
5-5
CFJP 3-9
0515. The application of fires and IAs is accomplished through synchronization on the physical
and psychological planes, and battlespace management. The application of the full range of
capabilities to achieve desired objectives may be summarized and mapped out in a logical
sequence. Objectives and desired effects are the basis for planning and will dictate the types of
activities to be undertaken by allocated capabilities and resources. Note that the commander and
staff planners must always consider the second-order effects of planned targeting activities.
Conclusion
0516. As for all other types of targeting, the work of fires and IAs planners is guided by the
objectives of the commander and of the higher headquarters. To be successful, fires and IAs
must have an integrated approach to produce optimal effects on the physical and psycho-
cognitive planes. While the objectives and supporting effects may be planned and issued
centrally, lower level commanders require the flexibility to decide on the supporting activities
that are suitable for their particular AO and the specific targets and audiences therein. The
individuals and systems within each AO’s environment must be assessed to ascertain the
activities that are required to establish the directed effects. Additionally, MoEs/MoPs must be
continually utilized to ensure that fires and influence effects are meeting campaign objectives.
0517. In general, IAs targets should be treated like any other fires target. However, some of
those targets will require a greater level of detailed understanding, and this may require detailed
and often lengthy study prior to their engagement. To identify and display the most appropriate
targets and means of engagement for the effects and objectives sought, there must be close
liaison with intelligence staff and advisors. The TB within a headquarters must include key fires
and IAs staff. Not only will the fires and IAs staff represent their own targets, but also they will
be able to provide advice to consider for other targets. Firstly, they will be able to recommend
activities to support the engagement of targets in their area of specialization. Secondly, each
specialization will be able to advise on the limitations of nominated targets and/or engagements
that may violate overarching themes or cause undesired effects. During the targeting process,
planning staff should focus their attention to delivering their respective fires and influence
capabilities against the identified critical vulnerabilities of an enemy, adversary or other actors.
5-6
CFJP 3-9
Chapter 6
Targeting in Multinational Operations
Introduction
0601. As stated in CFJP 5-1, Use of Force for CF Operations (Ref. H), the CAF are an
instrument of national policy and power. The use of force by the CAF is controlled by, and
subject to the authority and direction of the GC. The national domestic authority authorizing the
deployment of the CAF on international operations flows from an exercise of the Crown
prerogative. In practice, this might be commonly provided by way of strategic objective letters
from the Prime Minister’s Office (PMO) in response to an initiating letter from the MND, the
Minister of Foreign Affairs, or in a joint letter from both. Minor deployments, or those to
established positions, might be authorized by either minister with simultaneous prime ministerial
notification or concurrence. 89
0602. In addition to this domestic basis, CAF participation in international operations would
also require a basis under international law. This basis could be provided in several ways,
including, for example, consent of a host nation, as an exercise of individual or collective self-
defence, or pursuant to a United Nations Security Council Resolution (UNSCR). When acting in
accordance with a specific mandate, those methods authorized will be obtained by the
appropriate authorities prior to commencement of operations.
0603. The multinational dimension of these operations poses significant challenges over and
above those inherent in unilateral military operations. At the strategic level, there is the need to
reach agreement on the composition and force structure of the alliance/coalition, as well as a
shared end-state for operations, and to maintain the cohesion of the alliance/coalition. At the
operational and tactical levels, there is the need to establish interoperability between participants
with differing levels of military capability and potentially operating under differing ROE and
national targeting guidance.
0604. When operating in an alliance/coalition, the CDS retains national command of CAF
elements on behalf of the GC. Strategic guidance on targeting will be given by the GC in any
arrangement for operational or tactical control of CAF units by another country. Visibility of
multinational target planning is critical at the strategic-level, and results of all targeting
operations involving CAF assets must be reported to the SJS, so that the CDS can inform the
GC.
Targeting in an Alliance/Coalition
0605. Multinational targeting is ideally a seamless, distributed enterprise operating with shared
doctrine, information systems and intelligence, and pooled munitions-based and non-munitions-
based means capabilities. This ideal is more achievable in an alliance/coalition composed of Five
Eyes or NATO nations than in a broader partnership of willing nations. In these circumstances
significant issues may include a lack of agreed doctrine, disparate sensitivities to CD, and a lack
of releasability of certain information to some participants.
89
Major Alexander Bolt, The Crown Prerogative in Canada and its Use in the Context of International Military
Deployments , Office of the Judge Advocate General Strategic Legal Paper Series, Issue 2, A-LG-007-SLA/AF-002
(Ref L)
6-1
CFJP 3-9
6-2
CFJP 3-9
6-3
CFJP 3-9
6-4
CFJP 3-9
6-5
CFJP 3-9
6-6
CFJP 3-9
0619. JTCB responsibilities. The JTCB is typically responsible for the following:
a. reviewing operational-level assessment to guide the JFC’s decision making;
b. maintaining a macro-level view of the operational environment;
c. reviewing components’ schemes of manoeuvre and broad targeting guidance for
compliance with the JFC’s intent;
d. integrating, when appropriate, component plans according to the JFC’s CONOPS;
e. developing and refining broad component targeting guidance and priorities;
f. reviewing and refining ISR collection requirements and joint ISR assessment
guidance based on JFC priorities and intent, to include refinement of MoPs and
MoEs, as appropriate;
g. reviewing and submitting the coordinated JPTL for JFC approval or serving as
approving authority for JPTL when designated by the JFC;
h. ensuring the JTL, RTL, and other relevant target lists are maintained and updated,
based on JFC guidance; and
i. reviewing, validating, and approving targets to the JTL and RTL when such
authorities are delegated to the JTCB by the JFC.
6-7
CFJP 3-9
Glossary
The definitions contained in this Glossary are derived from a number of sources. Where this
publication is the source of a definition, no source is indicated. Definitions taken from other
sources are indicated in parentheses at the end of each term, utilizing the following
abbreviations:
AP I – Additional Protocol I to the Geneva Conventions (Ref O)
DTB – DND Defence Terminology Bank (Ref. J)
LOAC – The Law of Armed Conflict at the Operational and Tactical levels. (Ref. E)
additional damage
Unintentional or incidental injury or damage affecting enemy combatants, military objects and
military objectives that would be lawful military targets in the circumstances ruling at the time.
area of operations (AO)
A geographical area, within an area of responsibility, assigned to a subordinate commander
within which that commander has the authority to plan and conduct tactical operations.
DTB, record 3528
attack
An attack is an act of violence against an adversary, whether in offence or defence.
battle damage assessment (BDA)
The timely and accurate estimate of damage resulting from the application of military force,
either lethal or non-lethal, against a predetermined objective. DTB, record 26988
civilian objects
All objects which are not military objectives. (AP I)
combatants
Combatants are legitimate targets and may be attacked unless they have been captured,
surrendered, expressed a clear intention to surrender, or are hors de combat (i.e., out of combat),
provided they refrain from hostile acts and do not attempt to escape. (LOAC)
collateral damage (CD)
Inadvertent causalities and destructions in civilian areas caused by military operations.
DTB, record 26989
GL-1
CFJP 3-9
collection
The exploitation of sources by collection agencies and the delivery of the information obtained to
appropriate processing unit for use in the production of intelligence. DTB, record 3796
combat assessment (CA)
The determination of the effectiveness of one’s own tactical engagement.
Note: Combat assessment is usually composed of three major components: battle damage
assessment, munitions effectiveness assessment and re-attack recommendation.
DTB, record 47916
damage assessment
The determination of the effect of attacks on targets. DTB, record 3989
distinction
The principle of distinction imposes an obligation on commanders to distinguish between
legitimate targets and civilian objects and the civilian population. (LOAC)
effect
Consequences of a physical process, chemical reaction or fire.
Note: An effect can take the form of e.g. air blast, gas pressure, debris throw, fireball, thermal
radiation and toxic gases. DTB, record 42575
fires
Actions that seek to produce a first order physical effect against a target’s capabilities.
Note: They include lethal and non-lethal means. DTB, record 33777
functional damage assessment
The estimate of the effect of military force to degrade or destroy the functional or operational
capability of the target to perform its intended mission and on the level of success in achieving
operational objectives established against the target. This assessment is based on all-source
information, and includes an estimation of the time required for recuperation or replacement of
the target function.
high pay-off target (HPT)
A target of significance and value to an adversary, the destruction, damage or neutralization of
which may lead to a disproportionate advantage to friendly forces DTB, record 35044
high pay-off target list (HPTL)
A prioritised list of high pay-off targets by phase of a joint operation.
high-value target (HVT)
HVTs are those targets, which the enemy commander is likely to need for the successful
completion of his mission and are therefore, of high value to him. The HVTs identified during
this step are passed to the Targeting Team for further refinement. DTB, record 19439
GL-2
CFJP 3-9
GL-3
CFJP 3-9
GL-4
CFJP 3-9
non-combatant
Non-combatants comprise all persons who are not combatants. Provided they do not take a direct
part in hostilities, non-combatants are not legitimate targets. Civilians are generally the largest
category of non-combatants. Religious and medical personnel are non-combatants, even if they
are in uniform and members of the armed forces of a party to the conflict. (LOAC).
non-international armed conflict (NIAC)
Exists whenever there is protracted armed violence between governmental authorities and
organized armed groups or between such groups within a State.
Armed conflict does not include situations of internal disturbances and tensions, such as riots,
isolated and sporadic acts of violence and other acts of a similar nature, in accordance with
article 1(2) of Protocol Additional to the Geneva Conventions Of 1949, And Relating to the
Protection of Victims of Non-International Armed Conflicts (Protocol II) – 1977.
Note: This definition is for guidance purposes only as it has not been formally adopted by the
Government of Canada. This definition was accepted by the International Criminal Tribunal for
the former Yugoslavia (ICTY), The Prosecutor v. Dusko Tadic, Decision on the Defence Motion
for Interlocutory Appeal on Jurisdiction, IT-94-1-A, 2 October 1995, para.70.
non-lethal weapon
A weapon that is explicitly designed and primarily employed to incapacitate or repel persons or
to disable equipment, while minimizing fatalities, permanent injury and damage to property and
the environment. DTB, record 26986
no-strike list (NSL)
A list of geographic areas, objects or entities characterized as protected from the effects of
military operations under international law and/or rules of engagement.
Note: Attacking items on this list may violate the law of armed conflict or interfere with friendly
relations with the local population and government. DTB, record 43615
objective (obj)
A clearly defined and attainable goal for a military operation, for example seizing a terrain
feature, neutralising an adversary’s force or capability or achieving some other desired outcome
that is essential to a commander’s plan and towards which the operation is directed.
DTB, record 3119
physical damage assessment
The estimate of the quantitative extent of physical damage (through munition blast,
fragmentation, and/or fire damage effects) to a target resulting from the application of military
force. This assessment is based on observed or interpreted damage.
planned target
A target that is known to exist in the operational environment, on which actions are planned
using deliberate targeting, creating effects which support commander’s objectives. There are two
types of planned targets: scheduled and on-call.
GL-5
CFJP 3-9
GL-6
CFJP 3-9
target intelligence
Intelligence concerning a target, target complex or target system used to determine how its
functional characteristics and vulnerabilities may be exploited to achieve a desired effect.
DTB, record 47933
targeting
The process of selecting and prioritizing targets and matching the appropriate response to them
taking account of operational requirements and capabilities. DTB, record 5514
target materials (TM)
Graphic, textual, tabular, digital, video, or other presentations of target intelligence, primarily
designed to support operations against designated targets by one or more weapon systems. Target
materials are suitable for training, planning, executing, and evaluating military operations.
target nomination list (TNL)
A list of targets nominated by component commanders, national agencies, or the joint force
commander staff for potential inclusion on the joint integrated prioritised target list to support
joint force commander objectives and priorities.
target of opportunity
A target which appears during combat and which can be reached by ground fire, naval fire, or
aircraft fire, and against which fire has not been scheduled. DTB, record 4987
target system
All the targets situated in a particular geographic area and functionally related.
DTB, record 5513
target system analysis (TSA)
An all-source examination of potential target systems to determine relevance to stated objectives,
military importance, and priority of attack. It is an open-ended analytic process produced through
the intelligence production process using national and theatre validated requirements as a
foundation.
time-sensitive target (TST)
A target requiring immediate response because it poses (or will soon pose) a danger to friendly
forces or is a highly lucrative, fleeting target of opportunity.
target-system assessment (TSA)
The broad assessment of the overall impact and effectiveness of the full spectrum of military
force applied against the operation of an enemy target system or total combat effectiveness
(including significant subdivisions of the system) relative to the operational objectives
established.
target system component
A set of targets belonging to one or more groups of industries and basic utilities required to
produce component parts of an end product, or one type of a series of interrelated commodities.
GL-7
CFJP 3-9
unanticipated target
A target of opportunity that was unknown or not expected to exist in the operational
environment.
unplanned target
A target of opportunity that is known to exist in the operational environment.
unlawful combatants
Unlawful combatants are persons who engage in hostilities but are not legally entitled to do so
under the LOAC. Unlawful combatants include:
a. civilians who take a direct part in hostilities (other than as part of a levee en masse);
b. mercenaries; and
c. spies who engage in hostilities while not in the uniform of their armed forces.
validation
A part of target development that ensures all vetted targets meet the objectives and criteria
outlined in the commander’s guidance and ensures compliance with the Law of Armed Conflict
and the Rules of Engagement.
vetting
A part of target development that assesses the accuracy of the supporting intelligence to
targeting.
weaponeering
The process of determining the type, quantity and point of application of a weapon to achieve a
desired effect, considering the target's characteristics, the weapon's accuracy and reliability, and
the probability of success. DTB, record 47939
weapons effectiveness assessment (WEA)
Conducted concurrently and interactively with battle damage assessment, the assessment of the
military force applied in terms of the weapon system and weapons effectiveness to determine and
recommend changes to the methodology, tactics, weapon system, weapons, and/or weapon
delivery parameters to increase force effectiveness.
GL-8
CFJP 3-9
List of Abbreviations
AO area of operations
AP I Additional Protocol I to the Geneva Conventions
AP II Additional Protocol II to the Geneva Conventions
ATO air tasking order
AUS Australia
GC Government of Canada
AL-1
CFJP 3-9
IA influence activity
IAC international armed conflict
IC internment camp
IGL intelligence gain/loss
IHL international humanitarian law
IHRL international human rights law
IRC information-related capability
ISR intelligence, surveillance and reconnaissance
MD military deception
MIDB modernized integrated database
MND Minister of National Defence
MoE measures of effectiveness
MoP measure of performance
AL-2
CFJP 3-9
PA public affairs
PG prisonnier de guerre
PGM precision guided munitions
PID positive identification
PMO Prime Minister’s Office
PoL pattern of life
PPP presence, posture and profile
PsyOp psychological operation
PW prisoner of war
SA situational awareness
SCADA supervisory control and data acquisition
SJS Strategic Joint Staff
ST sensitive target
STB strategic targeting board
TA target authority
TAA target-audience analysis
TAI target area of interest
TB target board
TD targeting directive
TDN target development nomination
TEA target engagement authority
TF Comd task force commander
TSA target-system analysis
TSS target summary sheet
TST time-sensitive target
TTB theatre target board
TVA target validation authority
TVC targeting validation checklist
UK United Kingdom
UN United Nations
UNSCR United Nations Security Council Resolution
US United States
AL-3
CFJP 3-9
List of References
Canada
Government of Canada
A. Canada First Defence Strategy
NATO
M. AJP-3.9, Allied Joint Doctrine for Joint Targeting.
N. NATO Strategic Vision: The Military Challenge (NATO, 2004)
UNITED NATIONS
O. Additional Protocol I to the Geneva Conventions of 12 August 1949
P. Additional Protocol II to the Geneva Conventions of 12 August 1949
Q. Statements of understanding made by Canada at the time of ratification of Additional Protocol
I
R. Convention on Cluster Munitions of 30 May 2008
S. Hague Convention for the Protection of Cultural Property in the Event of Armed Conflict of
14 May 1954
T. Convention on the Prohibition of Military or Any Other Hostile Use of Environmental
Modification Techniques of 10 December 1976
U. Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons
Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects
(Convention on Conventional Weapons) of 10 October 1980
V. International Humanitarian Law
W. Prosecutor v. Tadic, (1995), Case No.IT-94-1-A, (International Criminal Tribunal for
Yugoslavia).
REF-1
CFJP 3-9
CIVILIAN
BB. Boothby, Dr. William H. (Air Commodore Retd, RAF). The Law of Targeting. Oxford:
Oxford University Press, 2012.
CC. Schmitt, Michael (ed.). Tallinn Manual on the International Law Applicable to Cyber
Warfare. Cambridge: Cambridge University Press, 2013
DD. Watkin, Ken (Brigadier-General Retd). “Assessing Proportionality: Moral Complexity and
Legal Rules” in Yearbook of International Humanitarian Law Volume 7. The Hague: Asser
Instituut, 2004
EE. Watkin, Ken (Brigadier-General Retd). “The Operational Lawyer: An Essential Resource
For the Modern Commander.”
REF-2
CFJP 3-9
Canada