FM 3-90.15
FM 3-90.15
FM 3-90.15
15)
JULY 2010
Contents
Page
PREFACE..............................................................................................................iii
Chapter 1 CONDUCTING SITE EXPLOITATION OPERATIONS ..................................... 1-1
Site Exploitation Defined .................................................................................... 1-1
The Operational Environment in Relation to Site Exploitation ........................... 1-2
The Brigade Combat Team and Site Exploitation .............................................. 1-4
The Purposes and Potential Results of Site Exploitation ................................... 1-4
Site Exploitation in Full Spectrum Operations .................................................... 1-6
Using the Operations Process for Site Exploitation ........................................... 1-6
Chapter 2 SPECIALIZED SUPPORT ASSETS FOR SITE EXPLOITATION .................... 2-1
Brigade Combat Team Assets to Support Site Exploitation ............................... 2-1
Additional Brigade-Level Assets for SIte Exploitation ........................................ 2-7
Site Exploitation Enablers At Echelons Above Brigade ..................................... 2-8
Technical Intelligence Support for Site Exploitation ........................................... 2-9
Chapter 3 CONSIDERATIONS FOR SENSITIVE SITES ................................................... 3-1
Characteristics of Sensitve Sites ........................................................................ 3-1
Special Challenges for Sensitive Sites ............................................................... 3-3
Task-Organizing for Sensitive Sites ................................................................... 3-4
Terminating Operations at a Sensitive Site ........................................................ 3-5
Appendix A NON-ARMY SUPPORT FOR SITE EXPLOITATION ........................................ A-1
Appendix B EVIDENCE COLLECTION, HANDLING, AND DOCUMENTATION................. B-1
GLOSSARY .......................................................................................... Glossary-1
REFERENCES .................................................................................. References-1
INDEX .......................................................................................................... Index-1
i
Contents
Figures
Figure 1-1. Site exploitation purposes, execution, and potential results ............................... 1-5
Figure 1-2. Example of a search element task-organized for site exploitation .................... 1-16
Figure 1-3. The site exploitation execution framework ........................................................ 1-18
Figure B-1. Example layout sketch drawn before collecting evidence .................................. B-6
Tables
Table 1-1. Expanded site exploitation execution framework ............................................... 1-19
Table 2-1. Some site exploitation capabilities of the CBRN reconnaissance platoon ........... 2-3
Table B-1. Guidelines for topics to include in the pre-entry briefing ...................................... B-1
Table B-2. Examples of physical evidence ............................................................................ B-3
Table B-3. Guidelines for photographing evidence................................................................ B-5
Table B-4. Guidelines for drawing sketches .......................................................................... B-6
Table B-5. Guidelines for initial handling of detainees ........................................................... B-7
Table B-6. Guidelines for minimizing change to evidence ..................................................... B-8
Table B-7. Guidelines for handling electronic devices ........................................................... B-8
Table B-8. Guidelines for handling DNA evidence ................................................................ B-9
1-5. Site exploitation operations doctrine emphasizes three purposes for SE operations—
To answer information requirements (usually the commander’s critical information
requirements).
To facilitate subsequent operations (already planned or not yet anticipated).
To facilitate criminal prosecution by host-nation or international authorities (related to war
crimes).
1-6. Analyzed information obtained from SE eventually becomes intelligence. The relationship between
SE operations and intelligence collection necessitates coordination. The fusion of intelligence from
multiple sources can reveal opportunities for subsequent operations. Regardless of the mission’s specific
purpose, all Army operations have the implied task of collecting and sharing information about the
opponent and the operational environment.
specific enemy or adversary. Opponents may combine types of threat. (See FM 3-0 for a discussion of the
types of threat.)
1-12. Opponents often operate in small cells from diverse locations, some well hidden within urban areas.
Friendly forces are likely to discover their locations during cordon and search operations by small patrols.
Site exploitation operations can quickly obtain and analyze information for exploitation. Opponents often
use unconventional means such as improvised explosive devices and information operations in tactical and
strategic attacks. Soldiers conducting SE operations may recover unconventional weapons, homemade
explosives, and ammunition. Maneuver forces must be able to search for, collect, and analyze IMP on-site.
forces conducting SE operations may discover disruptive threats during U.S. checkpoint or cordon and
search operations.
operations. Figure 1-1 shows the three general purposes for SEs missions in relation to execution and
potential results.
1-34. Joint, theater, and division assets can provide analysis, produce answers to information requirements,
and support BCT targeting requirements. Therefore, commanders ensure tactical units have access to
appropriate assets. They brief all tactical units on information requirements so they can recognize potential
answers.
1-42. In general, commanders base the criteria for estimating a site’s probability of answering information
requirements on available intelligence. To determine a site’s potential for exploitation, considerations
include—
Existing intelligence.
Hazards at the site.
Security concerns related to the site.
Complexity or scope of the site (building or grounds).
Suspected contents of strategic significance.
Historical use of the site (its affiliation or employment).
Location of the site.
1-43. The commander’s assessment includes criteria for assessing the sensitivity of IMP the site may yield.
For instance, a site is considered sensitive if it contain evidence of war crimes; research and production
facilities involving chemical, biological, radiological, nuclear, and high-yield explosive materials; or
breakthrough technologies used by the opponent. Specialized units or agencies not resident in the BCT
tactical formation may be required to exploit the site. See Chapter 3 for a more detailed discussion of
sensitive sites.
Nested Concepts
1-46. Purpose unifies all elements of battlefield organization by focusing all actions. In general,
commanders organize forces according to a mission’s overall purpose by determining whether each unit’s
operation will be decisive, shaping, or sustaining. Site exploitation operations are shaping operations that,
when effectively executed, facilitate operational and strategic success.
1-47. Site exploitation operations are nested within the higher headquarters concept of operations.
Commanders conducting operations that include SE ensure that subordinate unit missions are unified and
integrated by task and purpose. For example, conducting shaping operations such as a cordon and search or
a raid can obtain information and intelligence that facilitate subsequent attack of the threat network.
1-48. The commander ensures the concept of operations clearly describes the SE scheme of maneuver and
expresses how each element will cooperate to accomplish the mission.
Sequencing Operations
1-49. Based on the availability of resources—such as time, forces, and specialized assets—commanders
synchronize subordinate SE actions in time, space, and purpose. Site exploitation operations usually follow
a general sequence (see paragraph 1-108). Planning for the mission may require phasing linked to the
transitions from other tactical tasks, based on forces available and the threat.
1-50. Based on the level of protection required to thoroughly search for and collect IMP, forces may
execute any number of tactical tasks early in execution. These tasks might include isolating, controlling, or
seizing an objective. Portions of the forces that support the initial protection tasks often perform the search
and collection tasks. When applicable, maneuver forces conduct tactical tasks (cordon, secure, and isolate)
to protect a site before other forces begin searching for and collecting IMP. After maneuver forces
complete their tasks, units such as forensic collection units or chemical, biological, radiological, and
nuclear forces may begin their tasks. When availability of these types of assets is limited, commanders may
sequence their support across several phases or components of an operation.
1-51. Based on uncertainty in the operational environment, commanders maintain flexibility in their
planning. Commanders consider branch plans or sequels within base plans. Branch plans facilitate changing
the mission, disposition, orientation, or direction of movement based on anticipated events. Unforeseen
events can require additional resources. Examples of unforeseen events that might require flexibility
include the discovery of—
Chemical, biological, radiological, nuclear, and high-yield explosive threats.
Significant environmental hazards (hazardous materials or waste).
High-value individuals.
External disruptions, such as enemy attacks, that require protecting the site until specialized
teams arrive to neutralize or reduce the threat.
A large munitions or explosives cache.
IMP that meet the criteria for a sensitive site (see chapter 3).
1-52. Sequels follow current operations and are developed based on anticipated outcomes. One example is
collecting specific information that leads to immediately exploitable targets.
Control Measures
1-53. Planners develop and recommend control measures for each course of action (COA) being
considered. Control measures provide the means for the commander to direct SE actions. These measures
establish responsibilities to subordinate elements and outline limits that can prevent loss or destruction of
relevant information and potential intelligence. Control measures are either permissive or restrictive.
Permissive control measures allow SE elements freedom of action and limit the requirement to refer to
higher headquarters for permission. Examples include apprehension parameters. Restrictive SE measures
might prohibit forces from entering specific areas of a site to prevent contamination of material by Soldiers
or the contamination of Soldiers from suspected chemical, biological, radiological, or nuclear material.
1-56. The main difference between deliberate and hasty operations is the time available for planning and
preparation. Commanders assess their operational environment using the mission variables of mission,
enemy, terrain and weather, troops and support available, time available and civil considerations
(METT-TC). They task organize forces to ensure they take advantage of unexpected SE opportunities.
They train, equip, and organize forces to maintain flexibility. They bear in mind that regardless of the time
available, any SE opportunity has the potential to yield answers to information requirements and other
relevant information. During execution, seemingly benign missions can present unexpected opportunities.
1-57. As subordinate units encounter opportunities, their commanders initiate hasty SE operations. Hasty
SE operations support tactical, operational, or strategic objectives no less than deliberate operations. If a
hasty SE operation identifies IMP of significant intelligence value, a commander may choose to allocate
additional time to the operation and transition to a deliberate operation.
1-58. When planning for SE missions in a time-constrained environment, commanders assess the situation,
refine their situational understanding, and direct the staff to perform the MDMP steps needed to support SE
decisions. Commanders rely on more intuitive decisionmaking to take advantage of hasty SE opportunities.
Receipt of Mission
1-66. Planning for a SE mission may be initiated—
In anticipation or receipt of a new mission.
As a branch or sequel to an ongoing operation.
As a part of a base order.
As a part of a unit standing operating procedure.
1-67. As previously discussed, one of the purposes of SE is to facilitate subsequent operations. Successful
SE actions support the commander’s decisionmaking by identifying potential targets. The staff uses the
information gained from SE to help the commander to anticipate subsequent SE missions.
Running Estimates
1-68. Before conducting mission analysis, the staff evaluates and refines the status of friendly forces and
resources. The staff continually maintains a running estimate throughout the operations process. Updates
may include the status or availability of specialized support such as—
Document and media exploitation assets.
Military working dog teams.
Environmental assets.
Linguists.
Forensics laboratories and facilities.
Updates also include the availability of equipment, such as biometric identity management tools, remote
detection assets, and language translation tools.
Initial Assessment
1-69. Time constraints are the focus of the initial assessment. Time constraints significantly influence SE
planning in relation to the perishable nature of the information or intelligence that initiated the SE mission.
The commander and staff must receive and develop information quickly enough to interrupt the threat’s
decision cycle.
Initial Guidance
1-70. The commander provides initial guidance (not to be confused with commander’s initial planning
guidance during mission analysis) that outlines multiple factors. Key to SE operations, the initial guidance
provides the operational time line and the initial information requirements.
1-71. Commanders develop their initial guidance based on initial visualization. Commanders visualize the
SE mission and provide guidance to the staff while still providing the latitude to explore different options
based on the time available for planning. Initial guidance focuses on ISR considerations required to develop
COAs that will meet the desired end state.
1-72. Commanders integrate information engagement into the operations process from its inception.
Information engagement actions are nested with higher headquarters intent and any applicable strategic
guidance. The commander’s initial guidance regarding information engagement informs the staff on how to
integrate and synchronize information engagement actions with other operational actions. Commanders
consider how proposed actions might affect the operational environment in relation to the overarching
information engagement plan.
Mission Analysis
1-73. The commander and staff conduct mission analysis to enable better visualization of the operation.
The process and products derived from mission analysis help commanders refine their situational
understanding. Mission analysis is a 17-step process outlined in FM 5-0. Paragraphs 1-74 to 1-97 describe
selected mission analysis steps in relation to SE planning requirements. Refer to Figure B-2 of FM 5-0 for a
complete list of the steps for mission analysis.
available, along with their level of training, to determine their capabilities in support of SE tasks. For
example, tactical questioning may require personnel trained in direct questioning, the employment of a
linguist, or incorporation of certified human intelligence collectors trained in interrogation. For certain
search-related tasks, mission requirements determine the required training level of forces. Maneuver
Soldiers trained in search tasks provide a different level of capability than an engineer squad trained in
specialized search techniques and equipment. Environmental concerns identified may require personnel
trained specifically on environmental issues and hazardous materials tactics, techniques, and procedures.
Additionally, the equipment available, such as biometric identification tools, void anomaly detectors, or
ground-penetrating radar, affects COA development. Commanders must consider the time available for SE
planning and the time sensitivity of the IMP to be exploited. The availability of supporting agencies to
provide technical analysis, forensic collection, and render-safe capabilities influence planning and COA
development. Commanders, coordinating staffs, and liaison officers help identify capabilities and
limitations of the assets associated with their respective area of expertise.
Determine Constraints
1-84. A constraint is a restriction placed on the command by a higher command. A constraint dictates an
action or inaction, thus restricting the freedom of action a subordinate commander has for planning (FM
5-0). Examples of constraints for SE planning include, but are not limited to rules of engagement, search
restrictions relating to males or females, and rules for the use of force. Constraints can affect COA
development of both the parent unit and its subordinate elements. Constraints should be included as tasks or
coordinating instructions in operations orders to account for the impact on planning and execution.
resources identify chemical, biological, radiological, nuclear, or high-yield explosive materials, a branch
plan may be executed requiring a different approach or task organization.
1-89. CCIRs should be specific enough to answer the information management priorities. CCIRs fall into
two categories: priority intelligence requirements (PIRs) and friendly force information requirements
(FFIRs).
1-90. PIRs identify the information about the enemy, terrain and weather, and civil considerations that the
commander considers most important. Lessons from recent operations show that intelligence about civil
considerations may be as critical as intelligence about the enemy. Thus, all staff sections may recommend
information about civil considerations as PIRs (FM 3-0). PIRs related to a building being exploited can
answer questions such as—
What is the floor plan for the building?
Where are the improvised explosive devices along the route to the building?
Where are the explosives in the building?
What is the civilian presence in the building?
What is the attitude of the local populace towards friendly forces?
What environmental hazards are present that will adversely affect the health and well-being of
the Soldiers conducting the exploitation?
1-91. FFIRs identify the information about the mission, troops and support available, and time available for
friendly forces that the commander considers most important (FM 3-0). FFIRs related to SE can answer
questions such as—
What is the status of the cordon force?
What is the location of the weapons intelligence team?
What is the response time for the quick reaction force and explosive ordnance disposal?
Where are the local law enforcement facilities?
1-92. Commanders direct the staff and subordinates throughout the operations process. During the MDMP,
commanders direct the staff during COA development, analysis, comparison, and selection by providing
guidance and criteria to the staff on how the SE operation should develop.
statement may read, “Not later than 190500 Oct 09, B Troop (+) conducts a raid on objective Tiger to
capture the high-value individuals conducting sniper attacks on multinational forces. On order, conduct SE
on objective Tiger to collect information for subsequent intelligence analysis and prosecution.”
assessment of the situation, requiring subsequent changes to the ISR plan. The focus for reconnaissance
may be to determine the best opportunity to execute SE, based on established criteria.
1-107. The complexity of SE operations and the volume of events and resources linked during execution
require directed rehearsals to ensure coordination. Commanders conduct rehearsals to ensure subordinates
understand their role in the SE operation in relation to other elements. Examples of SE tasks that may
require rehearsals are—
Establishment of initial protection and control points within the area to be searched.
Coordination of host-nation persons.
Documenting search and collection results.
Specific tactical questioning of women and children based on intelligence and local customs.
Biometric enrollment.
Evidence handling procedures.
Transfer or handover of detainees and material.
Search execution.
encounter a building suspected of containing biological warfare agents. Unit leaders may suspect that
hostile persons are inside a building that contains information of value. However, the unit may need to
isolate or contain the site and seek technical advice from subject matter experts before securing the site for
the search element. In some cases, a unit secures a site and simply waits for additional support.
1-115. Based on various factors, such as booby traps and environmental hazards, the search element
employs appropriate internal security procedures. After removing any adversaries from the site and clearing
hazards, security units secure access to the site to prevent destruction of information, which the search
element may collect and subsequently evaluate.
facilitate recognition; they require every Soldier to be a sensor. Commanders focus a search by articulating
the mission’s purpose.
stability operations, supporting war crimes courts and tribunals is a primary stability task related to
establishing civil control. Establishing civil control also includes protecting and securing key facilities such
as places of religious worship, cultural sites, critical infrastructure, natural resources, and strategically
important institutions. Examples include government or medical buildings, banks, museums, and military
facilities.
1-130. In addition, Army forces help establish civil security by supporting identification programs.
Examples of essential stability tasks related to civil security are securing facilities, documenting and
preserving evidence, and securing documents relating to personal identification, property ownership, court
records, and voter registration. (See FM 3-07 for more information about stability tasks.)
1-131. Commanders address preservation requirements in the operation order. Throughout execution,
commanders ensure exploitation forces follow procedures precisely to preserve items discovered during SE
operations. Commanders establish positive control of the site to limit access and minimize movement of
people. They also establish control measures to avoid inadvertent destruction of evidence and to preserve
the value of information obtained. The search element takes every precaution to preserve information or
potential evidence in its original state until its transfer to the appropriate entity. (See appendix B.)
1-147. Following analysis, commanders assess information and materials collected to determine their
final disposition. Based on the assessment, the commander initiates the final transfer of information and
materials. This can include—
Destruction.
Long-term storage and maintenance.
Transfer to other organizations.
Return to appropriate host-nation person or group.
Establish Connectivity
1-149. Effective dissemination requires connectivity with supporting intelligence organizations. Brigades
establish access to databases and information portals that facilitate self-service of information requirements
by commanders and their staffs. The staffs follow up with supporting agencies to capitalize on the
information processed from tactical operations.
1-150. A database provides a bridge allowing different systems with different purposes to work together.
For example, Harmony is the national intelligence database for foreign document and media exploitation
and translations management. It is the single, comprehensive bibliographic reference for all available
primary source foreign technical and military documents and their translations. The Harmony database
supports tactical through strategic users, and is available to all units with access to the SECRET Internet
Protocol Router Network, Joint Worldwide Intelligence Communications System, or StoneGhost networks.
Through a common database, multiple applications can simultaneously use the same data for different
purposes at different echelons.
2-5. Environmental damage is an inescapable consequence of combat operations. However, the revolution
in military technology has made it possible to minimize the collateral damage from legitimate military
operations. It is seldom necessary to obliterate terrain to achieve the desired military effect. It is imperative
that organizations develop additional environmental procedures to support SE operations. Forces practice
routine environmental protection measures during execution. Actions required during or after operations
may include—
Conducting remediation operations after the discovery of toxic industrial chemicals.
Integrating force health protection considerations in densely populated areas that are impacted
by SE operations.
Responding to environmental terrorism or sabotage.
Working within the limitations brought about by environmental considerations.
Remedying adverse environmental impacts as a part of the exit strategy.
For further information concerning environmental considerations in military operations, see FM 3-34.5.
Table 2-1. Some site exploitation capabilities of the CBRN reconnaissance platoon
2-13. Knowing the agent, delivery system, and other items helps the commander take appropriate offensive
and defensive actions. To support this knowledge, CBRN reconnaissance units possess limited sampling
capabilities as part of their normal operations. Regardless of what type of CBRN unit is assigned to the
BCT, the collection, reporting, and administrative procedures pertaining to sampling operations are similar.
Laboratory analysis identifies the sample, agent characteristics, toxicity, persistency, hazards to personnel,
decontamination procedures, and first aid procedures.
ENGINEER ASSETS
2-16. Each of the combined arms battalions in a heavy BCT or in a Stryker BCT has an engineer company.
The infantry BSTB has an engineer company. The engineer company organic to the BSTB consists of a
headquarters section, two combat engineer platoons and an obstacle reduction section. The engineer
company is capable of—
Assessing and marking of unsafe structures on the site.
Supporting exploitation by assisting mobility and site access.
Identifying and preparing barriers to isolate the site, particularly when the site is located in or
near an urban area.
Clearing sites using mine detection systems.
Identifying environmental hazards.
GEOSPATIAL ASSETS
2-17. Geospatial assets organic to the BCT can assist with SE by providing maps. For complex operations,
the engineer coordinator or the intelligence staff officer in the BCT staff can obtain division- or higher-
level geospatial support. For example, support is available through the Facilities, Infrastructure, and
Engineering Systems (known as FIRES), a program of the National Ground Intelligence Center. FIRES is
the national database for architectural drawings and blueprints of facilities, infrastructures, and engineering
systems of operational or intelligence interest to the U.S. government. The images are retrievable by any
governmental agency that has a need for such information. FIRES could be extremely helpful when
exploiting structures of strategic importance.
MILITARY INTELLIGENCE
2-18. The military intelligence company conducts intelligence, surveillance, and reconnaissance (ISR)
analysis, intelligence synchronization, and human intelligence collection. The military intelligence
company supports the BCT and its subordinate commands through collecting, analyzing, and disseminating
intelligence information and products. It provides continual input for the commander through maintaining
the threat portion of the common operational picture. It provides analysis and intelligence synchronization
support to the BCT intelligence staff officer. The military intelligence company also collaborates with the
BCT operations staff officer in integrating ISR tasks and coordinating requirements and human intelligence
operations as directed by the BCT operations staff officer and the counterintelligence and human
intelligence staff officer. The military intelligence company contains an analysis and integration platoon, a
tactical unmanned aircraft system platoon, and a ground collection platoon.
and continuous interpersonal contact throughout the area of operations. However, human intelligence
collection teams must be prepared to conduct operations across the spectrum of conflict.
2-29. Human intelligence collectors working in conjunction with SE operations contribute to developing an
understanding of the current situation by questioning local inhabitants and debriefing friendly forces. They
also conduct tactical questioning and interrogation of detained persons at the exploited site before their
transfer to holding facilities. Additionally, they conduct document and media exploitation. Site exploitation
units provide human intelligence collectors with pertinent point-of-capture data for all information,
material, and persons (IMP) acquired from a site. (See paragraph 1-2 regarding potential sources of
information at a site.) Human intelligence collection teams use the point-of-capture information to exploit
the IMP for intelligence.
2-30. Products and intelligence derived from document and media exploitation can be a significant force
multiplier for the commander. Document and media exploitation must be conducted with sufficient speed
and accuracy to satisfy the commander’s critical information requirements and enable operations that
interrupt the enemy’s decision cycle. All Soldiers must be able to correctly identify and collect IMP for
further exploitation to avoid the inadvertent loss of valuable information.
MILITARY POLICE
2-31. The BSTB headquarters company contains a military police (MP) platoon. This MP platoon has the
potential for fulfilling limited security and forensic missions in support of SE operations. Its capabilities
include—
Isolating and securing the site by establishing a restricted perimeter, providing access control,
and preventing evidence destruction.
Conducting site searches and evidence collection and management activities. (See Appendix B
for details about evidence collection.)
Conducting the initial assessment of suspected mass graves, torture chambers, and war crimes
sites.
Segregating and processing personnel encountered at the site and evaluating them for possible
detention and interrogation.
Processing captured documents and equipment.
Conducting police intelligence operations through the collection of police information.
Conducting crowd control operations.
2-32. The criminal investigation division (CID)—
Deploys highly trained special agents and support personnel, including computer crimes
specialists.
Operates a certified forensic laboratory, a protective services unit, and polygraph services.
Conducts criminal intelligence collection and analysis.
Operates a variety of other services associated with law enforcement activities.
2-33. Additional MP assets may be required once a site has been secured by the organic MP unit. MPs
have many potential roles. Mission planners coordinate and allocate support from the MP and criminal
investigation division (CID), based on the type of site and anticipated conditions.
2-34. Some MP support capabilities include—
Providing access control at captured intelligence facilities or sites related to CBRN materials.
In coordination with CID, investigating mass graves, torture chambers, and other war crimes
sites.
Evaluating personnel on-site for possible detention and interrogation. (CID agents also may be
needed to interview suspects or collect witness statements).
Assisting in establishing a chain of custody for material captured at the site.
(When material collected will be used in legal proceedings, a proper chain of custody for evidentiary
purposes must be established. See appendix B.)
operations integrate key protection and mobility capabilities, tasks, and systems to assure freedom of action
for the supported force. The maneuver enhancement brigade contains no organic units other than its organic
headquarters and headquarters company, signal network support company, and brigade support battalion.
The maneuver enhancement brigade can provide unique and critical capabilities to BCT commanders.
2-55. The maneuver enhancement brigade staff includes CBRN, engineer, and MP functional operations
and planning cells. Each maneuver enhancement brigade is uniquely tailored with augmentation for its
directed mission. A maneuver enhancement brigade typically includes a mix of several types of battalions
and separate companies and may include civil affairs, CBRN, engineer, explosive ordnance disposal, and
MP units. It may be augmented with MI assets and possibly a tactical combat force when assigned an area
of operations with a level-III threat.
2-56. The four primary mission sets performed by the maneuver enhancement brigade include—
Maneuver support operations.
Support area operations.
Consequence management operations.
Stability operations.
See FM 3-90.31 for additional information about the maneuver enhancement brigade.
for example, Army forces uncovered large caches of stolen art treasures hidden by the Nazi Party. A lack of
guidance about safeguarding these sites resulted in Soldiers looting the contents. Teams were eventually
created and procedures established for recovering stolen works of art and maintaining accountability.
3-13. Tactical units discovering a potentially sensitive site perform the actions listed below and take other
actions as appropriate for the nature of the site:
The unit commander—
Initiates actions for securing the site.
Initiates a survey and assessment of the site’s contents.
Requests guidance from higher headquarters immediately after the initial assessment.
The unit—
Secures the site and eliminates any armed resistance.
Records (in writing or with photographs or video, as appropriate).
Safeguards the site’s IMP.
Reports, as accurately as possible, the IMP and the conditions found at the site.
The tactical rule is this: when in doubt, secure it and report it. A higher headquarters receiving a report of
an unusual site reports to the joint force commander on the nature of the discovery and requests support for
determining the value and sensitivity of the site.
agreements. Items of interest can include computers and electronic storage media, paper files, blueprints,
drawings, and key personnel that can provide further information and insights regarding the site’s activities.
Ideally, the initial analysis of a sensitive site provides timely intelligence to commanders at the tactical
level that can be readily exploited.
Team members were drawn from the Defense Threat Reduction Agency, Defense Intelligence Agency, and
explosive ordnance disposal and technical escort unit elements. The task force also received interagency
attachments from the Central Intelligence Agency and Department of Justice. This task force was known as
the 75th Exploitation Task Force. The task force established mobile exploitation teams based on any unique
requirements identified during intelligence preparation of the battlefield. For example, Mobile Exploitation
Team Alpha was augmented with a team of nuclear experts from the Defense Threat Reduction Agency to
conduct the exploitation mission at the military-industrial complex near the city of Karbala, Iraq.
INTERAGENCY COORDINATION
A-1. Interagency relationships are ones of coordination and mutual support, not direction. A commander
may request support. The degree to which other government agencies or departments can or will provide
support depends on federal statutes, policy decisions, resources, and memorandums of agreement and
understanding. Commanders plan collaboratively to identify where and how they and other government
agencies or departments can work together. Together, they provide mutually beneficial support through the
Office of the Secretary of Defense and the joint staff to develop standing relationships with the requisite
organizations.
A-2. Successful site exploitation (SE) operations coordinate with Department of Defense (DOD) and other
government agencies. Often, the joint force commander supports another government agency; that
organization may support a partner nation or intergovernmental organization. In particular, SE operations
require significant interagency and intergovernmental coordination. Commanders may use a joint
interagency coordination group or a joint interagency task force to coordinate the agencies operating in the
operational area.
without having to maintain those assets individually. Paragraphs A-7 through A-37 discusses organizations
that commonly support SE operations.
A-12. To accomplish the mission, Central Intelligence Agency works closely with the rest of the
intelligence community and other government agencies. Together they ensure that intelligence
consumers—whether administration decisionmakers, diplomats, or military commanders—receive the best
intelligence possible. The Central Intelligence Agency is organized into four mission components called
directorates. These directorates carry out the intelligence process—the cycle of collecting, analyzing, and
disseminating intelligence. The directorates include—
The National Clandestine Service.
The Directorate of Intelligence.
The Directorate of Science and Technology.
The Directorate of Support.
A-13. The National Clandestine Service is the clandestine arm of the Central Intelligence Agency. Its core
mission is to support our country’s security and foreign policy interests by conducting clandestine activities
to collect information that is not obtainable through other means. The information the collected is reviewed
for reliability before its dissemination to decisionmakers. This directorate also conducts counterintelligence
activities abroad and special activities as authorized by the President.
A-14. The Directorate of Intelligence supports the President, administration decisionmakers, the Congress,
Pentagon planners, law enforcement agencies, and negotiators. This directorate provides timely,
comprehensive all source intelligence analysis on national security issues. The Directorate of Intelligence
into-grates, analyzes, and evaluates information collected through clandestine and other means, including
open sources, to generate value added insights. By working closely with the National Clandestine Service
and other collectors, this directorate enhances the quality and timeliness of intelligence support.
A-15. The Directorate of Science and Technology works closely with the National Clandestine Service and
Directorate of Intelligence to access, collect, and exploit critical intelligence. This directorate applies
innovative scientific, engineering, and technical solutions. By maintaining extensive contacts with national
scientific and technical communities, this directorate can rapidly assemble experts from many fields to
bring the technological prowess of the United States to solve pressing intelligence and national security is-
sues.
A-16. The Directorate of Support provides integrated, mission critical support to the entire intelligence
community. This directorate’s core support disciplines include human resources, financial and logistic op-
elations, medical support, contracts and acquisitions, security, secretarial and administrative support,
facilities, and integrated information technology support.
It collects, analyzes, and shares intelligence with military commanders, government officials, and other
intelligence agencies.
A-21. Defense Intelligence Agency also serves as the executive agency for the U.S. intelligence
community’s prisoner of war and missing in action analytic cell. This unit provides actionable, national
level intelligence support to locate missing, isolated, evading, or captured U.S. military or U.S. government
personnel.
A-22. Defense Intelligence Agency’s underground facility analysis center houses the nation’s intelligence
and other technical resources. It coordinates the intelligence community’s efforts to detect, identify, and
assess buried underground facilities and their associated programs worldwide.
A-23. Defense Intelligence Agency’s Missile and Space Intelligence Center is the DOD authority on the
man portable air defense system. It develops scientific and technical intelligence on foreign missile systems
such as:
Short-range ballistic missile system.
Surface to air missile system.
Antitank guided missile system.
Antiballistic missile system.
Ground based antisatellite system.
Associated command and control systems.
A-24. Defense Intelligence Agency’s National Center for Medical Intelligence provides medical profiles of
foreign countries. It assesses real and potential health hazards to support U.S. forces worldwide to include
humanitarian operations.
A-25. To support the growing demand for intelligence agility and global collaboration, Defense
Intelligence Agency maintains the Joint Worldwide Intelligence Communications System. This system
incorporates advanced networking technologies that permit a secure, high bandwidth system providing
video teleconferencing and data exchange for the entire intelligence community.
A-26. Defense Intelligence Agency also assumes responsibility for managing intelligence information
technology for the combatant commands. This initiative creates greater efficiency and promotes
information sharing. It also encourages a single DOD data standard for information metadata tagging and
ensures that every DOD system will track, tag, and store data the same way. This consolidated resource
management ensures an even more integrated and interoperable intelligence information architecture.
Geospatial Intelligence Agency provides support to civilian and military leaders and contributes to the state
of readiness of U.S. forces. This agency also contributes to humanitarian efforts such as tracking floods,
tracking fires, and keeping the peace. The agency ensures access to geospatial intelligence and provides
tailored, customer specific geospatial intelligence analysis, services, and solutions.
A-31. The National Geospatial Intelligence Agency’s strategy supports operational readiness through a set
of geospatial foundation data. These may include controlled imagery, digital elevation data, and selected
information. This information can be readily augmented and fused with other spatially referenced
information such as intelligence, weather, and sustainment data. The result is an integrated, digital view of
the mission space.
with our customers. This mandate for change firmly establishes signals intelligence and information
assurance as major contributors to information superiority for U.S. warfighters and decisionmakers.
MARINE CORPS
A-39. Within Marine Corps doctrine, intelligence is considered the foundation on which the operational
effort is built and the premise on which all training, doctrine, and equipment are developed. Intelligence en-
compasses the policy, planning, direction, collection, processing, dissemination, and use to meet Marine
Corps missions in maritime, expeditionary, land, and air warfare.
A-40. The Marine Corps participates in three component programs of the National Intelligence Program:
The Consolidated Cryptologic Program.
The Foreign Counterintelligence Program.
The General Defense Intelligence Program.
A-41. The Consolidated Cryptologic Program funds the majority of Marine Corps participation in the
National Security Agency/Central Security Service activities worldwide. The Foreign Counterintelligence
Program provides Marines to the Naval Criminal Investigative Service for counterintelligence activities.
The General Defense Intelligence Program funds Marine Corps participation in the Defense Human
Intelligence Service, combatant command staff; manning of the Joint Intelligence Center and Joint Analysis
Center; and Defense Intelligence Agency distributed production functions of the Marine Corps Intelligence
Activity.
NAVY
A-42. The Navy intelligence organization is known as the Office of Naval Intelligence. It supports a variety
of missions including U.S. military acquisition and development, counterterrorism, counterproliferation,
counternarcotics, customs enforcement and, through partnerships and information sharing agreements with
the U.S. Coast Guard and U.S. Northern Command, Homeland Security and Homeland Defense.
A-43. The Navy’s cryptologic professionals, who form the maritime component of the Unified Cryptologic
System, are fully integrated with the Navy’s warfighting organizations, from major combatants to fleet
command staffs. This integration includes Navy and national cryptologic field locations worldwide.
AIR FORCE
A-44. Air Force intelligence also provides the nation with technical collection against foreign ballistic
missile development using a global network of airborne, shipborne, and ground based collectors.
A-45. The Air Force is the executive agent for technical analysis of opponent aircraft, long-range ballistic
missiles, and space-based technologies. Air Force intelligence, surveillance, and reconnaissance provides
persistent surveillance, available worldwide and on demand providing an unmatched asymmetric ad-
vantage. The Air Force achieves these capabilities by increasing its investment in measurement and
signatures intelligence to identify specific threats.
COAST GUARD
A-46. The Coast Guard is a military, multimission, maritime Service within the Department of Homeland
Security. Coast Guard missions are executed in any maritime region in which maritime interests may be at
risk, including international waters and America’s coasts, ports, and inland waterways.
A-47. Because the Coast Guard employs unique expertise and capabilities in the maritime environment—
in domestic ports, coastal waters, offshore regions, and even in foreign ports—where other U.S.
government agencies typically are not present, the opportunity exists to collect intelligence that supports
not only Coast Guard missions, but other national security objectives as well.
A-48. The Coast Guard’s Intelligence and Criminal Investigations Program includes its National
Intelligence Element, the Criminal Investigations Service, the Counterintelligence Service, and the
Cryptologic Service. Its mission is to direct, coordinate, and oversee intelligence and investigative
operations and activities that support all Coast Guard objectives by providing actionable (timely, accurate,
and relevant) intelligence, to strategic decisionmakers, as well as operational and tactical commanders. The
Coast Guard’s Intelligence and Criminal Investigations Program also supports the National Strategy for
Homeland Security and applicable National Security objectives.
A-49. The Coast Guard’s role is the lead federal agency in maritime homeland security. That role includes
missions related to port security, search and rescue, maritime safety, counternarcotics, alien migration
interdiction, living marine resources protection, and homeland security. The Coast Guard stands ready to
protect the nation and provide unique intelligence to ensure that the ports, waterways, and coasts remain
safe and secure.
A-55. National Ground Intelligence Center’s mission is to produce all source analysis for biometrics to on
the ground individuals and provide training for deploying units. National Ground Intelligence Center works
closely with Armed Forces DNA Identification Laboratory and the FBI’s Terrorist Explosive Device
Analytical Center to get the information into an operational area and make any available matches.
A-56. The mission of the Naval Criminal Investigation Service is to provide investigation and intelligence
services and forensic support through major crime-scene response teams and consultant programs. The
Naval Criminal Investigation Service is experienced in crime-scene processing. It is developing
expeditionary laboratory facility capability.
A-57. The FBI created the National Media Exploitation Center in 2001. The National Media Exploitation
Center coordinates FBI, Central Intelligence Agency, Defense Intelligence Agency, and National Security
Agency/Central Security Service efforts to analyze and disseminate information obtained from documents
and media seized by the U.S. military and intelligence community in foreign lands.
B-4. Once a perimeter is established, entrance to and exit from the scene are from the same egress point,
not from any other location. This is especially important when securing an external or open area as a crime
scene.
B-9. This appendix does not attempt to give a detailed or prescriptive description of searching. The
following limited discussion of searching provides context for collecting and handling physical evidence.
B-10. During a preliminary walk through, Soldiers note obvious items of evidence to be collected.
However, leaders first determine how items will be collected and processed. Leaders define the method to
use, what items should be collected, and associated tasks. If the exploitation mission extends beyond the
immediate site, additional Soldiers may be requested from other units.
PHOTOGRAPHS OF EVIDENCE
B-19. It is not always possible or practical to bring a piece of evidence into judicial proceedings.
Photographic media, x-rays, replicas of hazardous material, sketches, and graphs are examples of
demonstrative evidence. Demonstrative evidence is evidence consisting of a representation of the actual
piece of evidence to establish context among the facts presented in a case. A demonstrative exhibit must
accurately represent the actual object at the relevant time of collection.
B-20. Units take as many photographs as possible of as much evidence as possible. The photographs are
used to show the judges what happened and where it happened. Photographs aid the witnesses when
testifying. Photographs provide an accurate representation of the scene as found and a permanent record of
fragile and perishable evidence. A picture is worth a thousand words. Table B-3 lists specific guidelines for
photographing evidence.
Table B-3. Guidelines for photographing evidence
Photographs must—
• Be clear, sharp, and free of distortion.
• Be taken from a stable position at eye level (average height).
• Include the date, time, and location when photographs were taken. (Digital cameras
must be correctly programmed for the date and time.)
• Be processed by the unit intelligence section if not taken with digital cameras.
Take photographs of—
• 360-degree exposure of the entire area, room, or four corners.
• Each piece of suspected evidence, with and without measuring device (small ruler).
• Close-ups in which the evidence will fill the frame.
• Victims, suspects, and witnesses.
• The crowd and any vehicles in the area.
• A reference point of view depicting the physical dimensions of the site, building, and
items collected.
• A broad point of view that establishes the location of the crime scene by including
landmarks or reference points.
• Anything that may be considered evidence (such as weapons, ammunition, money, or
detonators). (If ever in doubt, photograph it; more is better than less.)
• Detainees with the evidence that associates them with the illegal activity (in the same
picture) at the location in question. Display under the detainee's face in the photograph
name; father's name (if appropriate, for identification); village; tribe; date of birth;
objective, building, and room; and date of photo.
Follow established guidelines for photographs showing—
• Weapons of mass destruction.
• Toxic industrial chemicals.
B-23. The guidelines for initial handling of detainees are sometimes known as the five Ss and T. Table B-5
lists these guidelines.
Table B-5. Guidelines for initial handling of detainees
Search:
Conduct a thorough search of the individuals for weapons and documents.
Silence:
Do not allow detainees to communicate with one another, either verbally or with
gestures.
Segregate:
Keep civilians and military separate and further divide them by rank, gender, and
nationality, ethnicity, or religion.
Safeguard:
Provide security for and protection for the enemy prisoners of war and detainees.
Speed:
Move detainees to the rear as quickly as possible.
Tag:
Ensure detained individuals are tagged with DD Form 2745. The tag is distributed
as follows:
• Part A remains with the captive.
• Part B is maintained with the capturing unit.
• Part C remains with the captive property.
PRESERVING EVIDENCE
B-28. Preserving evidence requires protecting it from change. Organic materials always undergo some
change and inorganic materials may undergo change from weather or other unavoidable actions. Table B-6
shows guidelines Soldiers follow to minimize change during evidence handling.
Table B-6. Guidelines for minimizing change to evidence
• Wear rubber gloves during searches and handling of evidence.
• Handle the evidence as little as possible and prevent accidental scratches or bending. If
evidence is touched and fingerprints are left, that fact should be noted and lab personnel
informed.
• Use only clean containers to collect and store evidence. This reduces the chance of
chemical or bacterial contamination. Containers should also be air tight to prevent
spillage, evaporation, and seepage.
• Clean, suitable containers may include paper bags, heat-sealed bags, pillboxes,
envelopes, or jars.
• Avoid cross contamination, such as placing a piece of evidence that will be examined for
paint in contact with other painted surfaces at the crime scene.
• Wear personal protective equipment such as a surgical mask to avoid cross
contamination caused by talking, sneezing, and coughing.
• Change gloves between collections of samples in different areas.
• Ensure evidence that requires special considerations such as refrigeration is not left
unattended in an unsuitable environment.
B-29. When encountering electronic devices, forces on-site do not attempt to retrieve data. Table B-7 lists
guidance for handling electronic devices.
Table B-7. Guidelines for handling electronic devices
Desktop computer:
• Do not turn a desktop computer off.
• Disconnect the power cord from the back of the computer.
Laptop computer:
• Do not turn a laptop computer off.
• Disconnect the power cord from the back of the computer.
• If laptop does not turn off when disconnected, remove the battery.
PDAs and cell phones:
• Leave them as found, whether on or off. (Turning them off could enable a password.)
• Collect all cords.
• Keep them charged if possible or have them analyzed as soon as possible.
Other removable media devices:
• Collect compact disks, digital video disks, secure digital cards, memory sticks, etc.
• Keep media away from magnets, radios, and transmitters.
B-30. When encountering possible DNA evidence, forces take special precautions. Table B-8, page B-9,
gives guidelines for handing DNA evidence.
TAGGING EVIDENCE
B-31. Forces tag evidence at the scene as it is being collected or at the place where it is received. Forces
attach a self-adhesive DA Form 4002 (Evidence/Property Tag) to each item of evidence or evidence
container at the earliest opportunity to identify and control it. A DA Form 4002 is attached directly to the
item of evidence or evidence container, or it may be affixed to a blank shoe tag, which is attached to the
item. Merely attaching a completed DA Form 4002 to an item of evidence does not meet the requirements
of AR 195-5. Each item of evidence or sealed evidence container must also be marked itself for future
identification. If evidence is placed in a heat-sealed bag, the tag on the bag may replace the adhesive label.
B-32. The DA Form 4002 is the tag attached to the evidence or evidence container. It is not to be confused
with DA Form 4137. DA 4137 is used to maintain the chain of custody—documentation of every
transfer—and serves as an inventory and accountability record for the evidence.
B-33. When like items are grouped together (such as a box containing tools), only one DA Form 4002 is
used. There is no need to remove or mark each individual item. The box or container is collected as one
item and placed in a container that is then sealed. The container is marked with the time, date, and initials
representing the appropriate indicator. A DA Form 4137, in this situation, is annotated sealed container
received, contents not inventoried (or SCRCNI).
B-34. Each Soldier is responsible for the care, safekeeping, and preservation of evidence under his or her
control. When a piece of evidence is acquired, a DA Form 4137 must be prepared. Regardless of how
evidence is obtained, forces inventory and account for all physical evidence on DA Form 4137. This form
serves as a receipt for the piece of evidence, lists the names of the individuals that were in its chain of
custody, and is the authority and witnessing document for its final disposition or destruction.
are responsible for maintaining the chain of custody until the evidence is released to the appropriate
evidence custodian.
Administrative Section
B-40. In the administrative section, forces write the reason, time, place, and date evidence was obtained.
STORING EVIDENCE
B-44. Forces store acquired evidence in a key-locked field safe or other high-security container for
temporary storage outside of normal duty hours. An evidence custodian is responsible for evidence when it
is not under the control of authorized personnel involved in the investigation (for example, trial counsel).
Forces ensure evidence that requires special considerations, such as refrigeration, is not left unattended in
an unsuitable environment.
SECTION II – TERMS
*site exploitation
Systematically searching for and collecting information, material, and persons from a designated
location and analyzing them to answer information requirements, facilitate subsequent operations, or
support criminal prosecution.
RELATED PUBLICATIONS
These documents contain relevant supplemental information.
ARMY PUBLICATIONS
Most Army doctrinal publications are available online:
<http://www.army.mil/usapa/doctrine/Active_FM.html>.
AR 195-5. Evidence Procedures. 25 June 2007.
DA Pam 27-1.Treaties Governing Land Warfare. December 1956.
FM 2-22.401. Multiservice Tactics, Techniques, and Procedures for Technical Intelligence
Operations. 9 June 2006.
FM 2-91.6. Soldier Surveillance and Reconnaissance: Fundamentals of Tactical Information
Collection. 10 October 2007.
FM 3-0. Operations. 27 February 2008.
FM 3-07. Stability Operations. 6 October 2008.
FM 3-19.13 (FM 19-20). Law Enforcement Investigations. 10 January 2005.
FM 3-24.2 (FM 90-8, FM 7-98), Tactics in Counterinsurgency. 21 April 2009.
FM 3-34.210 (20-32). Explosive Hazards Operations. 27 March 2007.
FM 3-90. Tactics. 4 July 2001.
FM 3-90.31. Maneuver Enhancement Brigade Operations. 26 February 2009.
FM 3-90.119 (FMI 3-34.119). Combined Arms Improvised Explosive Device Defeat Operations.
21 September 2007.
FM 3-34.5. Environmental Considerations in Military Operations. 6 July 2010.
FM 5-0. The Operations Process. 26 March 2010.
FM 5-19 (FM 100-14). Composite Risk Management. 21 August 2006.
FM 6-0. Mission Command: Command and Control of Army Forces. 11 August 2003.
FM 27-10. The Law of Land Warfare. 18 July 1956.
FMI 2-01.301. Specific Tactics, Techniques, and Procedures and Applications for Intelligence
Preparation of the Battlefield. 31 March 2009.
OTHER PUBLICATIONS
Intelligence Reform and Terrorism Prevention Act of 2004. PL 108-458. 17 December 2004.
PRESCRIBED FORMS
None.
REFERENCED FORMS
DA forms are available on the APD website (www.apd.army.mil). DD forms are available on the OSD
website (www.dtic.mil/whs/directives/infomgt/forms/formsprogram.htm).
DA Form 2028. Recommended Changes to Publications and Blank Forms.
DA Form 2823. Sworn Statement.
DA Form 4002. Evidence/Property Tag.
DA Form 4137. Evidence/Property Custody Document.
DD Form 2745. Enemy Prisoner of War (EPW) Capture Tag.
planning, SE and (continued) site exploitation. See SE. forensic organizations and,
sensitive sites and. See support for SE, Army, 2-1–2-56 A-50–A-57
sensitive sites, planning for. ad hoc organizations and, 2-47 joint interagency coordination
staff’s role and, 1-62–1-65 Asymmetric Warfare Group group and, A-3
and, 2-45–2-46 joint interagency task force
preparation, SE and, 1-103–1-107 and, A-4–A-5
CBRN requirements and, 2-6–
S 2-15 Marine Corps and, A-39–A-41
engineer assets and, 2-16 National Geospatial-
SE, context of, 1-4
environmental considerations Intelligence Agency and,
defined, 1-1
and, 2-4–2-5 A-29–A-31
purposes of, 1-5
explosive ordnance disposal multiagency ad hoc
results of, 1-29–1-33
and, 2-35–2-37 organizations and, A-58–
search dog teams. See support A-60
geospatial assets and, 2-17
for SE, Army. National Reconnaissance
maneuver enhancement
searching, SE execution brigade and, 2-54–2-56 Office and, A-32–A-34
framework and, 1-3, 1-111– military intelligence and, 2-18– National Security
1-122 2-30 Agency/Central Security
sensitive sites, 3-1–3-20. military police and, 2-31–2-34 Service and, A-35–A-37
characteristics of, 3-1–3-13 search dog teams and, 2-40 Navy and, A-42–A-43
deliberate and hasty special operations forces and, Office of Intelligence Analysis,
operations for, 3-9–3-13. 2-42–2-44 Department of Homeland
See also deliberate and tactical mobile robots and, Security and, A-27–A-28
hasty operations and SE. 2-39 T
evidence of war crimes and, technical escort unit and, 2-53
technical intelligence and, tactical mobile robots. See
3-19–3-22. See also war
2-49–2-56 support for SE, Army.
crimes, evidence handling
and preservation for. support for SE, non-Army, A-1–A– task-organizing, SE and, 1-101,
examples of, 3-2 60 figure 1-2. See also sensitive
planning for, 3-3–3-4 Air Force and, A-44–A-45 sites, task-organizing for.
research and development Central Intelligence Agency threat, nature of, 1-11–1-12
facilities and, 3-15–3-18 and, A-11–A-16
special challenges for, 3-14– Coast Guard and, A-46–A-49 W
3-22 Defense Intelligence Agency war crimes, evidence handling
special risks of, 3-3–3-8 and, A-17–A-26 and preservation for, 1-128–
task-organizing for, 3-23–3-25 Director of National 1-131, B-1–B-44. See also
terminating operations at, Intelligence and, A-7–A-10 sensitive sites, evidence of war
3-26–3-29 crimes and
Official:
JOYCE E. MORROW
Administrative Assistant to the
Secretary of the Army
1019408
DISTRIBUTION:
Active Army, Army National Guard, and United States Army Reserve: Not to be distributed; electronic
media only.
PIN: 086123-000