Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Targeting

Targeting

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Systems Engineering for Ethical Autonomous Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Targeting is a formal process which needs to operate at a speed appropriate to the circumstances. An attack on a major installation such as a harbour or airfield is likely to take several days or weeks to prepare, so large amounts of data can be assimilated and even special surveillance operations undertaken to provide missing information. In contrast, an attack on a fleeting target of opportunity has to be completed in seconds but still comply with International Humanitarian Law (IHL). The targeting process is now generally considered to include assessing damage to the target, battle damage assessment and post operation reviews.

Chapter Contents:

  • 8.1 Introduction to targeting
  • 8.2 Types of weapon used in attack
  • 8.2.1 Classes of attack
  • 8.2.2 Ballistic projectiles
  • 8.2.3 Externally guided projectiles
  • 8.2.4 Self-guided projectiles
  • 8.3 Targeting law
  • 8.4 Targeting processes and cycles
  • 8.4.1 A range of targeting processes
  • 8.4.2 The F2T2EA phases
  • 8.4.2.1 Find
  • 8.4.2.2 Fix
  • 8.4.2.3 Track
  • 8.4.2.4 Target
  • 8.4.2.5 Engagement
  • 8.4.2.6 Assessment
  • 8.5 Automating targeting processes
  • 8.5.1 General considerations
  • 8.5.2 Assumptions
  • 8.5.3 Observe
  • 8.5.3.1 Electro-optical systems
  • 8.5.3.2 Radar and sonar sensors
  • 8.5.3.3 Other sensor types
  • 8.5.4 Orient
  • 8.5.5 Decide
  • 8.5.6 Act
  • 8.6 Issues for autonomous targeting and Article 36 reviews
  • 8.6.1 The general problem
  • 8.6.2 A projectile as an Autonomous Weapon System (AWS)
  • 8.6.3 Capability restrictions on the AWS
  • 8.6.4 Article 36 reviews of projectile AWSs
  • References

Inspec keywords: law; target tracking; military systems

Other keywords: post operation reviews; International Humanitarian Law; battle damage assessment; fleeting target; IHL; targeting

Subjects: Military detection and tracking systems; Policy, government and political aspects (military and defence)

Preview this chapter:
Zoom in
Zoomout

Targeting, Page 1 of 2

| /docserver/preview/fulltext/books/ra/sbra517e/SBRA517E_ch8-1.gif /docserver/preview/fulltext/books/ra/sbra517e/SBRA517E_ch8-2.gif

Related content

content/books/10.1049/sbra517e_ch8
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address