Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Targeting in Stability Operations - Carver
Targeting in Stability Operations - Carver
Appendix E
CARVER TECHNIQUE
E-69. Army special operations forces (SOF) use CARVER (criticality, accessibility, recuperability,
vulnerability, effect, and recognizability) factors to assess mission, validity, and requirements. CARVER is
also used in technical appreciation and target analysis. (See table E-8.)
E-70. The CARVER selection factors assist in selecting the best targets or components to attack. As the
factors are considered, they are assigned a numerical value, which represents the desirability to attack the
target. The values are recorded, in numerical order, on a decision matrix. After assigning CARVER values
to each target or component, the sum of the values indicates the highest value target or component to be
attacked within the limits of the statement of requirements and commander’s intent.
Appendix E
lbs—pounds
Appendix E
E-71. CARVER factors and their assigned values are used to construct a CARVER matrix. Table E-9 is a
tool for rating the desirability of potential targets and allocating attack resources.
• List the potential targets in the left column.
• For strategic level analysis, list the enemy’s systems or subsystems (electric power supply, rail
system).
• For tactical level analysis, list the complexes or components of the subsystems or complexes
selected for attack by higher headquarters.
• As each potential target is evaluated for each CARVER factor, enter the appropriate value into
the matrix.
• Once all the potential targets are evaluated, add the values for each potential target.
• Each sum represents the relative desirability of each potential target; this constitutes a prioritized
list of targets.
• Attack the targets with the highest totals first.
• If additional men or munitions are available as resources, allocate them to the remaining
potential targets in descending numerical order.
• This allocation scheme maximizes the use of limited resources.
E-72. The G-2/S-2 can present the CARVER matrix, with a variety of attack options to operation planners,
and discuss the strengths and weaknesses of each COA against the target. Because of this the rigorous
evaluation process, the G-2/S-2 can comfortably defend conclusions.
E-73. Some OIF units have added three additional CARVER factors—CARVERSHP. Analyzing the
symbolism, historical significance, and political significance of an HVI has proven effective while fighting
in a counterinsurgency environment.
• Symbolism. How the population accepts relations with the counterinsurgents.
• Will the general population be indifferent to, support, or oppose a relationship with the
group?
• If a relationship is generally accepted by the local population, will there be factions
opposing the relationship? If yes, how will they disrupt the relationship?
• Historical significance. How long have relations with the counterinsurgents existed?
• What other external groups, agencies, or ideologies have formed alliances with the
counterinsurgents?
• Did U.S. or other forces have established relationships with this group?
• Did these relationships occur rarely or regularly?
• Does this group establish relationships with others when there is a common interest?
• Will relations with this group set a historical precedence?
• Political significance. How important are relations with the group on the international political
scene?
• What is the political advantage or disadvantage?
• Will relations with the group have any political significance—locally, regionally, nationally,
or internationally? If yes, what significance?
TARGETING MEETING
E-74. The targeting meeting allows the staff to—
• Focus and synchronize the unit’s efforts based on the current enemy situation, current unit
success, and fragmentary orders (FRAGOs) from higher echelons.
• Assess the current lethal and nonlethal effects to determine if a change to the current plan is
needed.
E-75. The end state of a targeting meeting is a FRAGO to the subordinate staffs that decides what to target,
how to detect it, how to deliver combat power against the target, and how to assess operation results. The
FRAGO should address both lethal and nonlethal tasks.
Appendix E
PRETARGETING MEETING
E-76. The G-2/S-2 offers inputs during the pretargeting meeting:
• Light, weather forecast, and terrain data.
• BDA and TSM assessments.
• Proposed HVTL and link or pattern analysis (D, D+1/2/3).
• Current and proposed PIRs.
• Enemy COA and event template (D, D+1/2/3).
• Current ISR synchronization tools and proposed changes.
E-77. At the conclusion of the pretargeting meeting, the staff should have developed a TSM with baseline
data sufficient to begin developing resources, synchronizing engagements, and other preparatory work
necessary to conduct the targeting meeting. At a minimum, the decision column, and desired effect should
be completed.
TARGETING MEETING
E-78. The G-2/S-2 offers input during the targeting meeting:
• Light, weather forecast, and terrain data.
• Current enemy situation template, incident overlay, pattern and link analysis.
• Status of ISR synchronization tools—NAIs tasked, gaps in coverage, significant reports,
required synchronization.)
• Status of ISR assets available.
• BDA of attacked targets—in the past 12-24 hours—highlighting changes in enemy capabilities.
• Current or proposed PIRs and HVTs.
• Enemy COA for the targeting period.
Appendix E