Target Development Standards - Federation Of American Scientists

1y ago
73 Views
2 Downloads
4.00 MB
230 Pages
Last View : 8d ago
Last Download : 4m ago
Upload by : Jacoby Zeller
Transcription

UNCLASSIFIED//FOR OFFICIAL USE ONLYCJCSI 3370.01B6 May 2016TARGET DEVELOPMENTSTANDARDSJOINT STAFFWASHINGTON, D.C. 20318UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY(INTENTIONALLY BLANK)UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLYCHAIRMAN OF THE JOINTCHIEFS OF STAFFINSTRUCTIONJ-2DISTRIBUTION: A, B, CCJCSI 3370.01B6 May 2016TARGET DEVELOPMENT STANDARDSReference(s):See Enclosure H for References1. Purpose. The purpose of this instruction is to document DoD policy andstandards for target development and target intelligence standards consistentwith references A through AH.2. Superseded/Cancellation. CJCSI 3370.01A, 17 October 2014, “TargetDevelopment Standards,” is hereby superseded. CJCSM 3370.01, 25 October2013, “Target Graphics Standards,” and CJCSM 3375.01, 29 May 2014, “Target Intelligence Data Standards,” are hereby canceled. CJCSI 3370.01Bconsolidates content from all three directives.3. Applicability. This Instruction applies to the Joint Staff, Services,Combatant Commands, joint forces, DoD Combat Support Agencies (CSA), andjoint activities.4. Policy. See Enclosures A through G.5. Definitions. See Glossary, Part II, Terms and Definitions.6. Responsibilities. See Enclosure A7. Summary of Changes. This instruction consolidates and updates guidanceon target development standards, target graphic standards, and targetintelligence data standards. Document updates include:a. Annexes have been added to provide specific details for the basic,intermediate, and advanced target development of each of the five target types.b. Vetting: Defines the timeframe for “EXPEDITED” target vetting.UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIEDCJCSI 3370.01B6 May 2016TABLE OF CONTENTSPageENCLOSURE A -- TARGET DEVELOPMENT ROLES ANDRESPONSIBILITIES . A-1Introduction . A-1Command Relationships . A-1Joint Staff (JS) Targeting . A-2Defense Intelligence Analysis Program (DIAP), Intelligence Planningand Modernized Integrated Database (MIDB) . A-3Intelligence Community (IC) Organizations that Support Targeting . A-4Intelligence Organizations that Support Targeting . A-8Other Organizations that Support Targeting . A-9Allied and Coalition Partners . A-10ENCLOSURE B -- TARGET DEVELOPMENT OVERVIEW AND CONCEPTS . B-1Introduction . B-1The Joint Operational Planning Process (JOPP) and Joint IntelligenceRequirements . B-1Creating Effects in the Operational Environment . B-3Target Intelligence . B-3Target Development Defined . B-5The Joint Targeting Cycle (JTC) and Target Development . B-7Target Taxonomy . B-7Applying Defense Threat Assessments (DTA), Joint IntelligencePreparation of the Operational Environment (JIPOE), TargetSystem Analysis (TSA), and the Targeting Taxonomy to theTarget Development Process . B-11Target Intelligence Production . B-15Target Development Resources . B-15ENCLOSURE C -- TARGET SYSTEM ANALYSIS (TSA) . C-1Introduction . C-1Target System Analysis (TSA) Value . C-2The Target System Analysis (TSA) Process . C-2Target System Analysis (TSA) Product Review or Modification Based onAssessment . C-6APPENDIX A -- TARGET SYSTEMS . C-A-1APPENDIX B -- TARGET SYSTEMS ANALYSIS PRODUCT FORMAT . C-B-1ENCLOSURE D -- TARGET DEVELOPMENT AT THE ENTITY LEVEL . D-1Introduction . D-1Target Development Responsibility . D-2Coordinating Target Development . D-2iUNCLASSIFIED

UNCLASSIFIEDCJCSI 3370.01B6 May 2016Types of Targets . D-3Electronic Target Folders . D-5APPENDIX A -- REMARK DEVELOPMENT . D-A-1APPENDIX B -- TARGET DEVELOPMENT REMARK TYPES . D-B-1ANNEX A -- FACILITY TARGETS .D-B-A-1ANNEX B -- INDIVIDUAL TARGETS . D-B-B-1ANNEX C -- VIRTUAL TARGETS . D-B-C-1ANNEX D -- EQUIPMENT TARGETS . D-B-D-1ANNEX E -- ORGANIZATION TARGETS . D-B-E-1APPENDIX C -- ELECRONIC TARGET FOLDERS (ETF) STRUCTURE ANDCONTENT . D-C-1APPENDIX D -- FEDERATED ELECTRONIC TARGET FOLDERS (ETF)PRODUCTION . D-D-1APPENDIX E -- SAMPLE TARGET DEVELOPMENT CHECKLIST . D-E-1ENCLOSURE E -- VETTING, VALIDATION, AND TARGET LISTMANAGEMENT . E-1Introduction . E-1Procedures . E-1Target Lists in Modernized Integrated Database (MIDB) . E-6Removing Targets from Target Lists . E-6Target List Naming Convention. E-7APPENDIX A -- TARGET VETTING . E-A-1APPENDIX B -- TARGET LIST TYPES AND JUSTIFICATION . E-B-1ENCLOSURE F -- AIMPOINT DATA STANDARDS . F-1Introduction . F-1Joint Desired Point of Impact . F-1Non-Lethal Reference Point Data Standards . F-8Weapon Characteristics Standards . F-11ENCLOSURE G -- GEOSPATIALLY ENABLED TARGET MATERIALS ANDTARGET GRAPHIC STANDARDS . G-1Introduction . G-1Geospatially Enabled Target Materials (GETM) Database Standards . G-1Target Graphics (TG) Standard Annotations . G-5Target Graphics (TG) Standards for Basic Target Development .G-15Target Graphics (TG) Standards for Intermediate Target Development ofFacility Target Types.G-15iiUNCLASSIFIED

UNCLASSIFIEDCJCSI 3370.01B6 May 2016Target Graphics (TG) Standards for Advanced Target Development ofFacility Target Types.G-19Target Graphics (TG) Standards for Facility Target Type SupplementalGraphics .G-29Target Graphics (TG) Standards for Battle Damage Assessment (BDA) ofFacility Target Types.G-32Deviation from Standard .G-34Magnification/Zoom Box .G-34Imagery Standards .G-34APPENDIX A -- TARGET GRAPHIC EXAMPLES . G-A-1APPENDIX B -- JOINT DESIRED POINT OF IMPACT (JDPI)REFERENCE ILLUSTRATIONS . G-B-1APPENDIX C -- TARGET GRAPHIC STORAGE AND DISSEMINATION . G-C-1APPENDIX D -- GEOSPATIALLY ENABLED TARGET MATERIALSDATA ATTRIBUTE TABLE EXAMPLE . G-D-1ENCLOSURE H -- REFERENCES . H-1GLOSSARY .GL-1PART I -- ABBREVIATIONS AND ACRONYMS .GL-1PART II -- TERMS AND DEFINITIONS .GL-4FIGURES1. Joint Targeting Cycle. B-62. Targeting Taxonomy and Relationships . B-83. Planning, Intelligence, and Target Development . B-144. TSA Process Model . C-35. Counterterrorism Analytical Framework (CTAF). C-A-36. Relationship of Data/Information/Intelligence to Joint Targeting. D-57. Basic Target Development . D-B-18. Intermediate Target Development . D-B-49. Advanced Target Development . D-B-810. Target Engagement Types. D-B-911. Other Target Remark Development . D-B-1012. Sample Target Development Checklist . D-E-113. Target List Development . E-414. Ground Level Point, JDPI on ground . G-B-115. Above Ground Bunker, JDPI on ground. G-B-216. Feature with Height, JDPI inside feature on ground. G-B-217. Feature with height, JDPI on feature top . G-B-318. Feature with height, JDPI on sloped roof . G-B-319. Tower/radar, JDPI on ground . G-B-420. Tower/radar on feature, JDPI on tower/radar base . G-B-4iiiUNCLASSIFIED

UNCLASSIFIED21.22.23.24.25.CJCSI 3370.01B6 May 2016Radome, JDPI on pedestal & JDPI on ground . G-B-5Feature with height, multiple JDPIs within interior . G-B-5Portal apex or apron, JDPI on ground. G-B-6Bridge deck, JDPI on ground . G-B-6Geospatially Enabled Target Materials Data Attribute TableExample . G-D-1TABLES1. Prioritized Sources for Deriving Positional Data . D-C-5ivUNCLASSIFIED

UNCLASSIFIED//FOR OFFICIAL USE ONLYCJCSI 3370.01B6 May 2016ENCLOSURE ATARGET DEVELOPMENT ROLES AND RESPONSIBILITIES1. (U) Introduction. Joint forces are established at three levels: unifiedcommands, subordinate unified (subunified) commands, and joint task forces(JTF). (See reference a). When assigned battlespace and military end states,joint forces have inherent target intelligence production responsibilities.Target development is primarily the responsibility of the joint force, whichmust manage partnerships to leverage appropriate expertise. Thesepartnerships leverage the roles, capabilities, and production responsibilities ofnational, Defense, and allied organizations as well as non-intelligenceorganizations to conduct target development.2. (U) Command Relationshipsa. (U) Joint Forces(1) (U//FOUO) Unified commands, which are assigned battlespaceand objectives through the Guidance for Employment of the Force (GEF)(reference b) and Joint Strategic Capabilities Plan (JSCP) (reference c), areresponsible for coordinating the production of Target System Analysis(TSA) and Electronic Target Folders (ETFs) related to defeating theidentified or potential adversaries within their battlespace, and formaintaining Target Lists (TLs) which appropriately catalogue the entitiesthat perform functions for those adversaries.(2) (U) When unified commands establish subunified commands orJTFs and give those subordinate joint forces battlespace and objectives toachieve, the responsibilities of producing TSAs, ETFs, and TLs for thatbattlespace may be transferred to the subordinate joint force. In situationswhen the subordinate joint force is deemed not to have the target intelligenceproduction capacity to produce these requirements, the parent command mayselectively choose which responsibilities to delegate and which to retain.Detailed instructions and orders should be provided per the Adaptive Planningand Execution (Apex) Planning process.(3) (U) If joint forces and/or Service components cannot fulfill theirtarget intelligence production responsibilities, they may task assigned,attached, and supporting organizations with specific productionrequirements (PR) and manage those tasks to ensure the resultant productsmeet requirements. The tasked organization should provide current statusA-1Enclosure AUNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLYCJCSI 3370.01B6 May 2016and production updates to the Combatant Command (CCMD), throughtheir requesting Service component, to ensure full visibility throughout thetarget development process.(4) (U//FOUO) Joint forces are required to document targetintelligence production responsibilities and tasks in their published plansand orders per the APEX process (e.g., Annex B Appendix 4); (reference d).(5) (U) When production requirements exceed the capability ofassigned, attached, and supporting organizations identified in the CCMD’splans and orders, CCMDs may request Joint Staff Targeting federate targetintelligence production requirements.(6) (U) Effective, thorough, diligent, and efficient target development,and target intelligence production are best achieved by close adherence to thestandards in this instruction. Any product content, format, and/or processbeyond the minimum target intelligence standards outlined in this instruction,or related joint targeting manuals identified in this instruction, remain theresponsibility of the joint force.b. (U) Supporting Organizations. CSAs, Services, Service components, andfunctional components have responsibilities to support joint forces with targetintelligence consistent with their mission, expertise, and organizationalrelationship with the supported joint force. While supporting organizations maybe explicitly tasked by supported joint forces to produce target intelligencewithin their areas of expertise, the joint force is still responsible for ensuringthe target intelligence produced meets the Joint Force Commander’s (JFC’s)requirements.3. (U) Joint Staff Targetinga. (U) Joint Staff (JS) Targeting represents the Department of Defense inpolicy matters pertaining to Combatant Command, Service, CSA, and alliedparticipation in TSA, ETF, and target materials production. JS Targetingaddresses targeting analysis-related issues that are worldwide in scope and/orwithin the purview of more than one Combatant Command and thereforeoutside the geographic or functional responsibility of a particular command.b. (U) JS Targeting utilizes the Military Targeting Committee (MTC) and itsprocedures to provide direction for target development policy. This includesfacilitating and coordinating the approval of new and revised joint processesand graphic types, standardizing these products, and ensuring effective use ofresources during federated target intelligence production. See Enclosure D.A-2Enclosure AUNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLYCJCSI 3370.01B6 May 2016c. (U) JS Targeting is responsible for coordinating Combatant Commandtarget development support between national-level organizations, supportingCombatant Commands, and Service elements, upon Combatant Commandrequest. This assistance can be coordinated via intelligence planning orfederated production request processes. See Enclosure D.d. (U) Such requests for target intelligence production should be directed toJS Targeting for review and coordination. JS Targeting will coordinate with theappropriate production organization to ensure these requirements are alignedwith suitable responsible offices and reflected in the appropriate intelligenceproduction tasking system. JS Targeting will ensure production requirementsare received by the appropriate Responsible Organization. JS Targeting canconvene a Joint Targeting Working Group (JTWG) upon Combatant Commandrequest.4. (U) Defense Intelligence Analysis Program (DIAP), Intelligence Planning, andModernized Integrated Database Terms and Responsibilities (MIDB)a. (U) The Defense Intelligence Analysis Program (DIAP) assigns analyticresponsibilities in such a manner as to minimize duplication of effort andensure unique and specialized expertise is available to the full range ofintelligence customers. The current General Military Intelligence (GMI) andGeneral Defense Intelligence Program (GDIP) production structure flows frombroad to specific intelligence topics from the “National Intelligence PriorityFramework (NIPF) topic” to “DIAP topic” and finally “DIAP subtopic.” Specificanalytic responsibilities are assigned under the DIAP subtopic; those assignedorganizations are called “Responsible Organizations.” These assignments arefor GMI and GDIP intelligence production that supports broad DoD intelligenceneeds and DoD intelligence support to national intelligence customers.b. (U) Intelligence planning is the intelligence portion of APEX, the jointcapability to create and revise plans rapidly and systematically, ascircumstances require (see reference e). APEX supports the overall JointOperational Planning Process (JOPP) discussed in Enclosure B. Intelligenceplanning provides a process that effectively integrates, synchronizes, prioritizes,and focuses Defense intelligence (both theater and national) to supportplanning and phased operations. Additionally, intelligence planning identifiesknowledge gaps and capability shortcomings within the DoD IntelligenceEnterprise (DIE). A key component of intelligence planning is the ProductionRequirement Matrix (PRMx). A Combatant Command drafts a PRMx, andResponsible Analytical Center (RACs) and Collaborating Analytic Centers(CACs) are assigned via the intelligence planning process. These RAC/CACassignments for the production requirements will be in accordance with theDIAP (see reference f). Therefore, while all RACs/CACs are ResponsibleA-3Enclosure AUNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLYCJCSI 3370.01B6 May 2016Organizations because their Intelligence Task List (ITL) responsibilities willcorrespond to their DIAP analytical assignments, not all ResponsibleOrganizations are RACs/CACs because they may be producing Defenseintelligence that is not in support of a PRMx.c. (U) Responsible Producer (RESPROD) is an authority assignment madeby the DoD GDIP Functional Manager for Intelligence, as prescribed under theDIAP and used in the Modernized Integrated Database (MIDB), to control userpermissions and identify intelligence that has been validated by approvedsubject matter experts (SMEs) as finished intelligence. All RESPRODs areResponsible Organizations because their RESPROD responsibilities correspondto their DIAP analytical responsibilities. However, not all producers areRESPRODs, as they may not have DIAP GMI write authorities or desire toexercise them. (One example would be the Defense Intelligence Agency (DIA)Defense Combating Terrorism Center (DCTC), which assigns CounterterrorismIdentification numbers (CTIDs) for terrorist-related targets but does not writethe CTIDs or its associated information to the MIDB.) Organizations that donot have RESPROD but do have producer codes have write permissions tospecific data sets and can route new record nominations (NOMs) and datachange requests (DCRs) to a RESPROD for validation/review. Every useraccount with producer codes and permissions can create MIDB records in theyou-build-it-you-own-it parts of the database or submit NOMs or DCRs to thenational producers, but only user accounts that have the correct “RESPRODcode” can create, update or delete records in the “RESPROD” controlled datastore.5. (U//FOUO) Intelligence Community (IC) Organizations that SupportTargeting. The Intelligence Community (IC) organizations listed belowrepresent many of the DoD and non-DoD agencies and organizations thattypically support command target development and may support the ICvetting process. They do not explicitly support targeting or the joint firesfunction, but they may provide intelligence/intelligence analysis that, on acase-by-case basis, support targeting needs. (Note: This list is notexhaustive. For a complete list of intelligence organizations, see referenceg).a. (U//FOUO) DIA. DIA is the Defense Department’s national-levellead organization for providing timely, objective, and cogent GMI towarfighters, defense planners, and defense and national securitypolicymakers. Fused all-source target intelligence products and analysis(text, graphics, and models) generated by DIA support various aspects oftarget development, capabilities analysis, and assessment. DIA is also thefunctional manager for MIDB.A-4Enclosure AUNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLYCJCSI 3370.01B6 May 2016b. (U//FOUO) National Security Agency. The National SecurityAgency (NSA) and Central Security Service (CSS) lead the U.S.Government (USG) in cryptology that encompasses both SignalsIntelligence (SIGINT) and Information Assurance (IA) products andservices, and enables Cyberspace Operations (CO) in order to gain adecision advantage for the nation and our allies under all circumstances.The Combined Military Planning and Access Strategies (CoMPAS) Officemanages the military target vetting process for NSA/CSS, supportingJoint Staff and CCMD target development. CoMPAS conducts analysis,research and development of NSA military target vetting votes, which caninclude Intelligence Gain/ Loss statements and Restricted Target Listconsiderations.c. (U//FOUO) National Geospatial-Intelligence Agency. NationalGeospatial-Intelligence Agency (NGA) is the functional manager forgeospatial-intelligence. NGA supports the targeting community throughthe governing National System for Geospatial-Intelligence Instruction(NSGI) 3103 Geospatial-Intelligence Targeting Support Program (seereference H). It provides timely, relevant, and accurate imagery, imageryintelligence and geospatial information, and services involving theprocessing and exploitation of geospatial-intelligence (GEOINT) (physicaland functional analysis including authoritative installation and facilityoutline data, 3-dimensional (3D) characterization and geolocation data), insupport of U.S. national security objectives. NGA establishes targetcoordinate mensuration certification standards in accordance with (IAW)reference I and, upon request, reviews and accredits uniformed Service,CSA, Combatant Command, and allied training and certification processesfor target coordinate mensuration. NGA also provides reach backassistance through the federated process for Combatant Commands (asneeded via the formal federation process) and provides global foundationaltarget materials, to include Digital Point Positioning Data Base (DPPDB)).NGA is leading the development of Object Based Production (OBP)methodology and capabilities within the TargetingEnterprise. Additionally, it evaluates imagery and GEOINT tools thatsupport coordinate derivation for coordinate seeking weapons through itsvalidation program.d. (U//FOUO) Central Intelligence Agency. Responsible for providingaccurate, comprehensive, and timely all-source intelligence on foreign topicsrelated to national security. It also conducts counterintelligence (CI) activities,special activities, and other functions related to foreign intelligence andnational security, as directed by the President.A-5Enclosure AUNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLYCJCSI 3370.01B6 May 2016e. (U//FOUO) Department of Treasury, Office of Terrorism andFinancial Intelligence. This Department of Treasury (DOT) office providesinformation on financial networks as they relate to illicit transactions suchas weapons trafficking and terrorism activities.f. (U//FOUO) Air Force Intelligence. The Air Force Deputy Chief ofStaff for Intelligence, Surveillance, and Reconnaissance (AF/A2) isresponsible for the oversight and implementation of AF intelligence policyand guidance. The AF Director of ISR Capabilities (AF/A2C) is thefunctional manager for Service-level AF targeting activities,administration, policy, resources, and requirements. Air CombatCommand (ACC) is the Lead Major Command (MAJCOM)/Command forAir Force Targeting and is the Core Function Lead Integrator for GlobalIntegrated Intelligence, Surveillance, and Reconnaissance entrusted withguiding and developing the force and inventory of the Air Force. ACC, asthe senior command to the Air Force 363rd ISR Wing (363rd ISRW) willdeconflict target material production priorities to Air Force componentsand manage/authorize support to components tasked with federatedactivities. Other Air Force intelligence organizations include 25th Air Force(25 AF) which governs the Air Force Distributed Common Ground System(480th ISR Wing), intelligence airborne collection assets (i.e., 9thReconnaissance Wing and 55th Wing), and Service unique analyticcapabilities (i.e., 70th ISR Wing and 363rd ISR Wing). The National Airand Space Intelligence Center, a direct reporting unit to Air Staff, whichproduces multi-source intelligence products pertaining to foreign air andspace threats. The Air Force Office of Special Investigations also providesa full range of CI services.g. (U//FOUO) Army Intelligence. The Army Deputy Chief of Staff forIntelligence (G-2) exercises staff supervision over the U.S. ArmyIntelligence Enterprise, and is responsible for policy formulation, planning,programming, budgeting, management, staff supervision, evaluation, andoversight of intelligence, counterintelligence, and weather activities for theDepartment of the Army. The U.S. Army Intelligence and SecurityCommand (INSCOM) conducts intelligence, security, and informationoperations to support national decision makers and military commandersat every echelon. INSCOMs regionally aligned military intelligencebrigades are focused on the support of warfighters across the operationalcontinuum. They perform continuous intelligence preparation of thebattlefield to ensure the Army knows its potential adversaries and thetheaters in which it must operate. INSCOM is also the headquarterselement for the National Ground Intelligence Center, the DefenseIntelligence Enterprise lead for producing and disseminating all-sourceintegrated intelligence on foreign ground forces and related militaryA-6Enclosure AUNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLYCJCSI 3370.01B6 May 2016technologies to ensure that U.S. forces have a decisive edge in current andfuture military operations.h. (U//FOUO) Navy Intelligence. The Deputy Chief of Naval Operations,Information Dominance (N2/N6) serves as the Director of Naval Intelligence, theuniformed head of the Naval Service intelligence elements and the Navy’s seniorofficial within the defense and national intelligence communities regardingintelligence authorities and responsibilities established in federal law, ExecutiveOrders, and regulations. U.S. Fleet Cyber Command serves as the Navy'sService Cryptologic Component of NSA/CSS, and is the central operationalauthority for Navy cryptology/SIGINT. U.S. Fleet Cyber Command also servesas Navy Component Command to U.S. Strategic Command and U.S. CyberCommand. The Office of Naval Intelligence is the leading provider of globalmaritime intelligence for the U.S. Navy and other national IC organizations.i. (U//FOUO) Marine Corps Intelligence. The Director of Intelligenceis the Commandant's principal intelligence staff officer and the functionalmanager for intelligence, CI, and cryptologic activities. As the ServiceIntelligence Chief, the Director allocates resources and manpower to theoperating forces with specific expertise in the areas of human andtechnic

on target development standards, target graphic standards, and target intelligence data standards. Document updates include: a. Annexes have been added to provide specific details for the basic, intermediate, and advanced target development of each of the five target types. b. Vetting: Defines the timeframe for "EXPEDITED" target vetting.

Related Documents:

Therefore, target 1 has three target drops, i.e., target 1-A-1, target 1-B-1 and target 1-C-2. In this manner we can enumerate all possible target drops from target information. From source and target information we can set all possible assignments, and each of them is composed of a source and sequence of target drops, called a target drop set .

To overcome these challenges, Twitter engineering teams implement a hybrid-cloud SQL federation system, which processes around 10PB of data daily in production. This paper presents the evolution of the SQL system at Twitter including query federation, cluster federation, and storage federation. The remainder of this paper is organized as follows.

Cross-Forest Delegation GALsync v7 2007 Exchange Online Microsoft Federation GALsync v7 2010 2003 Public folders 2 GALsync v4 1 2010 2007 Microsoft Federation or Cross-Forest Delegation GALsync v7 2010 2010 Microsoft Federation or Cross-Forest Delegation GALsync v7 GALsync v7 2010 2013 Microsoft Federation or Cross-Forest Delegation

County (Md.) Civic Federation." civic federation news civicfednews AT montgomerycivic.org to submit an article, see page 25 top Federation Meeting #892 Monday, February 12, 2018 7:45 p.m. Lobby Level Auditorium Executive Office Building 101 Monroe Street Rockville, Maryland agenda 7:00 Social Time for Members 7:45 Call to Order/Introductions

Apr 17, 2021 · 11th X 12th 1ST 50 1.890 2 1ST 0.992 13th 2ND 50 1.970 2 2nd 1.353 3RD 50 1.977 2 3rd 1.42 26 . LG TARGET 1 LG TARGET 2 LG TARGET 3 Bryant Hogue Seth Wooten Robby Miles Chris Nichols Spencer Lamm Bart Sauter 47 44 43 Jerry Rochelle TJ Brown Bart Saute

an existing target card. Target card practice: After the pupils are familiar with the target card questions and carried out a few whole class activities, the teacher can assign a set time for target card practice each week. E.g. Target Day Thursday. Teacher can give a target

6 TARGET volume 17 7 TARGET market share vs other LVPS in euro 18 8 Average value of a TARGET payment 18 9 TARGET payment value bands 18 10 Average value of a TARGET payment-intraday pattern 19 11 Share of inter-Member States traffi c per country 19 12 Contribution to TARGET turnover 20

Cover illustration: Ballyaghagan Cashel, looking north-east . Centre for Archaeological Fieldwork, QUB Data Structure Report: AE/11/110 Ballyaghagan Cashel, County Antrim 3 Contents page List of figures 4 List of plates 4 Summary 5 Introduction General 6 Background 6 Reason for excavation and research objectives 7 Archiving 7 Credits and acknowledgements 7 Excavation Methodology 8 Account of .