ATP 3-90.15. Site Exploitation

Total Page:16

File Type:pdf, Size:1020Kb

ATP 3-90.15. Site Exploitation ATP 3-90.15 SITE EXPLOITATION July 2015 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. This publication supersedes ATTP 3-90.15, 8 July 2010. Headquarters, Department of the Army This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). To receive publishing updates, please subscribe at http://www.apd.army.mil/AdminPubs/new_subscribe.asp *ATP 3-90.15 Army Techniques Publication Headquarters No. 3-90.15 Department of the Army Washington, DC, 28 July 2015 Site Exploitation Contents Page PREFACE...............................................................................................................v INTRODUCTION ..................................................................................................vii Chapter 1 SITE EXPLOITATION ........................................................................................ 1-1 Introduction to Site Exploitation .......................................................................... 1-1 Considerations for Effective Site Exploitation..................................................... 1-6 Site Exploitation in the Operational Environment ............................................... 1-7 Chapter 2 SITE EXPLOITATION PLANNING .................................................................... 2-1 Planning Concepts in Site Exploitation ............................................................... 2-1 Information Collection ......................................................................................... 2-3 Roles in Planning Site Exploitation ..................................................................... 2-4 Site Exploitation and the Military Decisionmaking Process ................................ 2-5 Enabling Capabilities that Support Tactical Site Exploitation ............................. 2-8 Determine Constraints ...................................................................................... 2-10 Identify Critical Facts and Assumptions ........................................................... 2-10 Assess Risks .................................................................................................... 2-11 Determine the Commander’s Critical Information Requirements ..................... 2-11 Develop the Information Collection Plan .......................................................... 2-12 Write the Restated Mission ............................................................................... 2-12 Develop Courses of Action ............................................................................... 2-12 Chapter 3 TACTICAL SITE EXPLOITATION PREPARATION ......................................... 3-1 Preparing for Tactical Site Exploitation Overview .............................................. 3-1 Preparing for Tactical Site Exploitation .............................................................. 3-1 Chapter 4 TACTICAL SITE EXPLOITATION EXECUTION ............................................... 4-1 Tactical Site Exploitation Considerations ........................................................... 4-1 Tactical Site Exploitation Techniques ................................................................. 4-2 Technical Exploitation Techniques ..................................................................... 4-8 Information Obtained from Technical Exploitation ............................................. 4-9 Environmental Considerations for Site Exploitation ......................................... 4-10 Distribution Restriction: Approved for public release; distribution is unlimited. *This publication supersedes ATTP 3-90.15, 8 July 2010. i Contents Dissemination of Information and Intelligence .................................................. 4-10 Chapter 5 SITE EXPLOITATION ASSESSMENT ............................................................... 5-1 Assessment Techniques ..................................................................................... 5-1 Assessment Criteria ............................................................................................ 5-1 Measures of Effectiveness .................................................................................. 5-1 Appendix A TACTICAL SITE EXPLOITATION STANDING OPERATING PROCEDURE .. A-1 Tactical Site Exploitation Standing Operating Procedure Overview .................. A-1 Tactical Site Exploitation Team Composition and Responsibilities ................... A-1 Plan and Prepare Techniques ........................................................................... A-3 Tactical Site Exploitation Execution ................................................................... A-3 Post-Tactical Site Exploitation Activities ............................................................ A-4 Photography Techniques ................................................................................... A-4 Sketch Techniques ............................................................................................. A-5 Search Techniques ............................................................................................ A-6 Cache Site Search Techniques ......................................................................... A-8 Site Security ....................................................................................................... A-9 Key On-Site Activities ...................................................................................... A-10 Final Walk-Through Activities .......................................................................... A-11 Hasty Versus Deliberate Site Exploitation ....................................................... A-12 Forensic Materiel .............................................................................................. A-12 Collection Activities .......................................................................................... A-13 DA Form 4137 .................................................................................................. A-19 Custodian Procedures ..................................................................................... A-19 Voluntary Questioning Techniques .................................................................. A-19 Appendix B TACTICAL SITE EXPLOITATION KITS ........................................................... B-1 Baseline Kit ........................................................................................................ B-1 Enabler Kit .......................................................................................................... B-2 Appendix C EVIDENCE COLLECTION IN SUPPORT OF HOST-NATION RULE OF LAWC-1 Importance of Evidence Collection .................................................................... C-1 Collecting Evidence for Host-Nation Courts ...................................................... C-2 Appendix D WEAPONS CACHE CHECKLISTS ................................................................... D-1 Weapons Cache Basic Checklist ....................................................................... D-1 Weapons Cache Checklist ................................................................................. D-1 Weapons Inside Vehicle Checklist ..................................................................... D-2 Appendix E DEPARTMENT OF DEFENSE FORENSICS .................................................... E-1 Introduction to Department of Defense Forensics ............................................. E-1 Forensic Functions ............................................................................................. E-3 Forensic Operational Process ............................................................................ E-4 Forensic Exploitation Team Capability Overview .............................................. E-4 Appendix F SUPPORT FOR SITE EXPLOITATION ............................................................. F-1 Interagency Coordination .................................................................................... F-1 Overview of the U.S. Intelligence Community .................................................... F-1 Appendix G ATTACK SCENE INVESTIGATION .................................................................. G-1 Introduction to Attack Scene Investigation ......................................................... G-1 Initial Actions ...................................................................................................... G-1 ii ATP 3-90.15 28 July 2015 Contents Collection ............................................................................................................ G-4 Explosive Residue Collection ............................................................................. G-7 Crater Data Collection ........................................................................................ G-8 Attack Scene Soil Analysis ............................................................................... G-16 Attack Scene Closure ....................................................................................... G-22 Battlefield Vehicle Forensics ............................................................................ G-23 GLOSSARY .......................................................................................... Glossary-1 REFERENCES .................................................................................. References-1 INDEX .........................................................................................................
Recommended publications
  • MILITARY INTELLIGENCE PB 34-09-2 Volume 35 Number 2 April - June 2009
    MIPB April - June 2009 PB 34-O9-2 Operations in OEF Afghanistan FROM THE EDITOR In this issue, three articles offer perspectives on operations in Afghanistan. Captain Nenchek dis- cusses the philosophy of the evolving insurgent “syndicates,” who are working together to resist the changes and ideas the Coalition Forces bring to Afghanistan. Captain Beall relates his experiences in employing Human Intelligence Collection Teams at the company level in both Iraq and Afghanistan. Lieutenant Colonel Lawson provides a look into the balancing act U.S. Army chaplains as non-com- batants in Afghanistan are involved in with regards to Information Operations. Colonel Reyes discusses his experiences as the MNF-I C2 CIOC Chief, detailing the problems and solutions to streamlining the intelligence effort. First Lieutenant Winwood relates her experiences in integrating intelligence support into psychological operations. From a doctrinal standpoint, Lieutenant Colonels McDonough and Conway review the evolution of priority intelligence requirements from a combined operations/intelligence view. Mr. Jack Kem dis- cusses the constructs of assessment during operations–measures of effectiveness and measures of per- formance, common discussion threads in several articles in this issue. George Van Otten sheds light on a little known issue on our southern border, that of the illegal im- migration and smuggling activities which use the Tohono O’odham Reservation as a corridor and offers some solutions for combined agency involvement and training to stem the flow. Included in this issue is nomination information for the CSM Doug Russell Award as well as a biogra- phy of the 2009 winner. Our website is at https://icon.army.mil/ If your unit or agency would like to receive MIPB at no cost, please email [email protected] and include a physical address and quantity desired or call the Editor at 520.5358.0956/DSN 879.0956.
    [Show full text]
  • JP 2-02 National Intelligence Support to Joint Operations
    Joint Pub 2-02 National Intelligence Support to Joint Operations 28 September 1998 PREFACE 1. Scope from organizing the force and executing the mission in a manner the JFC deems most This joint publication describes national appropriate to ensure unity of effort in the intelligence organizations and their support accomplishment of the overall mission. to joint military operations. Also addressed is the special support and augmentation 3. Application available for joint operations by national joint elements such as the Military Intelligence a. Doctrine and guidance established in this Board, the National Military Joint Intelligence publication apply to the commanders and Center, and National Intelligence Support intelligence staff of combatant commands, Teams. This joint publication covers Service subordinate unified commands, joint task forces, intelligence organizations and centers, as combat support agencies, and subordinate well as nonmilitary agencies and components of these commands. These nongovernmental organizations. The principles and guidance also may apply when recommended target audience for this joint significant forces of one Service are attached to publication is commanders and intelligence forces of another Service or when significant staffs of combatant commands, subordinate forces of one Service support forces of another unified commands, joint task forces, combat Service. support agencies, and supporting Service components. b. The guidance in this publication is authoritative; as such, this doctrine (or JTTP) 2. Purpose will be followed except when, in the judgment of the commander, exceptional circumstances This publication has been prepared under dictate otherwise. If conflicts arise between the the direction of the Chairman of the Joint contents of this publication and the contents of Chiefs of Staff.
    [Show full text]
  • NIU-Factbook-2013.Pdf
    WLEDGE IS ENL O I N G H K T ENMEN T NATIONALNI INTELLIGENCEU U N I V E R S I T Y FACTBOOK ACADEMIC 2013 YEAR 2014 National Intelligence University FACTBOOK Academic Year 2013–2014 PREPARED BY: Director, Institutional Effectiveness National Intelligence University Joint Base Anacostia-Bolling 200 MacDill Blvd., Washington, DC 20340 1 National Intelligence University FACTBOOK Academic Year 2013–2014 Table of Contents Introduction and History ................................................................................................................... 3 Mission ............................................................................................................................................ 5 Mission Source Document ................................................................................................................. 5 Vision ............................................................................................................................................... 6 Strategic Goals .................................................................................................................................. 6 NIU Organization .............................................................................................................................. 6 NIU Board of Visitors ......................................................................................................................... 6 NIU Leadership ................................................................................................................................
    [Show full text]
  • AFIO Intelligencer
    The Intelligencer Journal of U.S. Intelligence Studies Volume 26 • Number 3 • $15 single copy price Summer-Fall 2021 C O N T E N T S I. Introduction V. AFIO Business and Events Activities During the Pandemic “AFIO Now” — Videos and Podcasts “AFIO Now” Interviews ............................... 3 for members-only and the public .............. 77 II. Current Issues Scholarships, Member Statistics .................. 83 The Evolving Nature of International Relations Chapters, Officers, Activities ....................... 84 and What It Means for Intelligence Intelligence Exhibits & Tours Norman A. Bailey PhD ............................... 5 in Washington Metro Area ...................... 121 Guarding Against Politicization VI. Deaths Robert M. Gates PhD ................................... 7 Deaths in the Intelligence Community ......... 91 Domestic Intelligence - An Enigmatic Piece of the National Security Puzzle VII. Professional Reading Patrick M. Hughes, LTG (USA, Ret.) .......... 15 Reviews by Peter C. Oleson North Korean Control Systems - Insights from a Kazeta: Toxic: A History of Nerve Agents, NKIS Intelligence Officer/Defector From Nazi Germany to Putin’s Russia ............ 119 Jihyun (Amanda) Won MPS and Kim Dong-sik PhD ................................... 35 Doughty: Invading Hitler’s Europe: From Salerno to the Capture of Göring – The Memoir of a U.S. III. Historical Context Intelligence Officer ..................................... 121 A Poem for Yakov Eisenberg — A CIA Operation to Determine If a Ukrainian Company Was Storey: Beating the Nazi Invader: Hitler’s Spies, Saboteurs and Secrets in Britain, 1940 ........... 122 Delivering Missile Parts to Iran Lester Paldy ............................................. 43 Kavanagh: Hitler’s Spies: Lena and the Prelude to Operation Sealion .................... 122 IV. Professional Insights When Intelligence Made a Difference - Assorted Books on China and Chinese Espionage ................................ 124 Part VI Intro — Peter Oleson ....................
    [Show full text]
  • Report of Investigation on Allegations Related to the Dod's Decision To
    INTEGRITY EFFICIENCY ACCOUNTABILITY EXCELLENCE Mission Our mission is to provide independent, relevant, and timely oversight of the Department of Defense that supports the warfighter; promotes accountability, integrity, and efficiency; advises the Secretary of Defense and Congress; and informs the public. Vision Our vision is to be a model oversight organization in the Federal Government by leading change, speaking truth, and promoting excellence—a diverse organization, working together as one professional team, recognized as leaders in our field. Fraud, Waste, & Abuse HOTLINE Department of Defense dodig.mil/hotline|800.424.9098 For more information about whistleblower protection, please see the inside back cover. Table of Contents I. INTRODUCTION ................................................................................................................. 1 II. OVERVIEW OF ALLEGATIONS AND THE DoD OIG INVESTIGATION .................... 4 A. Background and Specific Allegations ............................................................................ 4 B. The DoD OIG Investigation ............................................................................................ 7 III. BACKGROUND ................................................................................................................... 9 A. EUCOM Mission ............................................................................................................ 9 B. AFRICOM Mission .....................................................................................................
    [Show full text]
  • Usarmy-Soldiersurveillance.Pdf
    FOR OFFICIAL USE ONLY FM 2-91.6 SOLDIER SURVEILLANCE AND RECONNAISSANCE: FUNDAMENTALS OF TACTICAL INFORMATION COLLECTION October 2007 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies only because it requires protection in accordance with AR 380-5 and as specified by DCS G-3 Message DTG 091913ZMAR04. This determination was made on 30 March 2004. Contractor and other requests must be referred to ATTN: ATZS-CDI-D, U.S. Army Intelligence Center, Fort Huachuca, AZ 85613-7017, or via email at [email protected]. DESTRUCTION NOTICE––Destroy by any method that will prevent disclosure of contents or reconstruction of the document. Headquarters, Department of the Army FOR OFFICIAL USE ONLY This publication is available at Army Knowledge Online <www.us.army.mil> and the General Dennis J. Reimer Training and Doctrine Digital Library at <www.train.army.mil>. FOR OFFICIAL USE ONLY *FM 2-91.6 Field Manual Headquarters No. 2-91.6 Department of the Army Washington, DC, 10 October 2007 Soldier Surveillance and Reconnaissance: Fundamentals of Tactical Information Collection Contents Page PREFACE..............................................................................................................iii Chapter 1 INTRODUCTION ....................................................................................................1 Soldier Surveillance and Reconnaissance.............................................................1 Every Soldier is a Sensor .......................................................................................2
    [Show full text]
  • IMPROVING the LAW ENFORCEMENT-INTELLIGENCE COMMUNITY RELATIONSHIP Ndic PRESS Improving the Law Enforcement-Intelligence Community Relationship
    IMPROVING THE LAW ENFORCEMENT-INTELLIGENCE COMMUNITY RELATIONSHIP ndic PRESS ndic RELATIONSHIP COMMUNITY ENFORCEMENT-INTELLIGENCE LAW THE IMPROVING Improving the law Enforcement-Intelligence Community Relationship Can’t we all just get along? National Defense Intelligence College national defense intelligence college press PCN 5463 ISBN 978-1-932946-18-5 e Research nc e n g ii l ll ee tt nn I I c c June 2007 i i g g Washington, DC Washington, e e cial policy or position of the Department of t NDIC PRESS t a a Defense of the U.S. Government r r t t S S r o f r e t n e C r o f r e t n e C ect the offi National Defense Intelligence College The views expressed in this book are those of the authors and Can’t We All Just Get Along? All Just Get We Can’t do not refl Improving the Law Enforcement- Improving Intelligence Community Relationship The National Defense Intelligence College supports and encourages research on intelligence issues that distills lessons and improves Intelligence Community capabilities for policy-level and operational consumers. Can’t We All Just Get Along: Improving the Law Enforcement-Intelligence Community Relationship The FBI vs. CIA turf battles of the Cold War are the stuff of Washington legend. Things are much better now. They were getting better anyway, and then 9/11 accelerated the process. But…there is room for improvement. The fi rst essays here lay out some of the intelligence techniques that have proven effective in either Law Enforcement (LE) or the Intelligence Community (IC) and that might be useful to exchange and apply.
    [Show full text]
  • Human Intelligence Collector Operations, FM 2-22.3
    *FM 2-22.3 (FM 34-52) Field Manual Headquarters No. 2-22.3 Department of the Army Washington, DC, 6 September 2006 Human Intelligence Collector Operations Contents Page PREFACE vi PART ONE HUMINT SUPPORT, PLANNING, AND MANAGEMENT Chapter 1 INTRODUCTION 1-1 Intelligence Battlefield Operating System 1-1 Intelligence Process 1-1 Human Intelligence 1-4 HUMINT Source 1-4 HUMINT Collection and Related Activities 1-7 Traits of a HUMINT Collector 1-1 0 Required Areas of Knowledge 1-12 Capabilities and Limitations 1-13 Chapter 2 HUMAN INTELLIGENCE STRUCTURE 2-1 Organization and Structure 2-1 HUMINT Control Organizations 2-2 HUMINT Analysis and Production Organizations 2-6 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. NOTE: All previous versions of this manual are obsolete. This document is identical in content to the version dated 6 September 2006. All previous versions of this manual should be destroyed in accordance with appropriate Army policies and reyulations. 'This publication supersedeJyM 34-52, 28 September 1992, and ST 2-22.7, Tactical Human Intelligence and Counterintelligence Operations, April 2002. PENTAGON LmRARY \" "j MrtlTARY OOCUMENTI WASHINGTON, DC 20310 6 September 2006 FM 2-22.3 FM 2-22.3 ------------­ Chapter 3 HUMINT IN SUPPORT OF ARMY OPERATIONS 3-1 Offensive Operations ...............................•............................................................ 3-1 Defensive Operations 3-2 Stability and Reconstruction Operations 3-3 Civil Support Operations 3-7 Military Operations in Urban Environment.. 3-8 HUMINT Collection Environments 3-8 EAC HUMINT 3-9 Joint, Combined, and DOD HUMINT Organizations 3-10 Chapter 4 HUMINT OPERATIONS PLANNING AND MANAGEMENT .4-1 HUMINT and the Operations Process .4-1 HUMINT Command and Control .4-3 Technical Control.
    [Show full text]
  • FACTBOOK Academic Year 2011-2012
    National Intelligence University FACTBOOK Academic Year 2011-2012 PREPARED BY: Director, Institutional Effectiveness National Intelligence University Joint Base Anacostia-Bolling 200 MacDill Blvd. Washington, D.C. 20340 FACTBOOK 2011-2012 National Intelligence University FACTBOOK Academic Year 2011-2012 Table of Contents Introduction And History .......................................................................................................................... 1 Mission and Mission Source Document .................................................................................................... 2 Vision ........................................................................................................................................................ 3 Strategic Goals .......................................................................................................................................... 3 NIU Organization ..................................................................................................................................... 4 NIU Board of Visitors ................................................................................................................................ 4 NIU Leadership ......................................................................................................................................... 4 The NIU Faculty ........................................................................................................................................ 7 Faculty & Staff
    [Show full text]
  • Understanding the Globalization of Intelligence Also by Adam D.M
    Understanding the Globalization of Intelligence Also by Adam D.M. Svendsen Intelligence Cooperation and the War on Terror: Anglo-American Security Relations after 9/11 The Professionalization of Intelligence Cooperation: Fashioning Method out of Mayhem Understanding the Globalization of Intelligence Adam D.M. Svendsen Intelligence and Defence Strategist, Educator and Researcher © Adam D.M. Svendsen 2012 Softcover reprint of the hardcover 1st edition 2012 All rights reserved. No reproduction, copy or transmission of this publication may be made without written permission. No portion of this publication may be reproduced, copied or transmitted save with written permission or in accordance with the provisions of the Copyright, Designs and Patents Act 1988, or under the terms of any licence permitting limited copying issued by the Copyright Licensing Agency, Saffron House, 6–10 Kirby Street, London EC1N 8TS. Any person who does any unauthorized act in relation to this publication may be liable to criminal prosecution and civil claims for damages. The author has asserted his right to be identified as the author of this work in accordance with the Copyright, Designs and Patents Act 1988. First published 2012 by PALGRAVE MACMILLAN Palgrave Macmillan in the UK is an imprint of Macmillan Publishers Limited, registered in England, company number 785998, of Houndmills, Basingstoke, Hampshire RG21 6XS. Palgrave Macmillan in the US is a division of St Martin’s Press LLC, 175 Fifth Avenue, New York, NY 10010. Palgrave Macmillan is the global academic imprint of the above companies and has companies and representatives throughout the world. Palgrave® and Macmillan® are registered trademarks in the United States, the United Kingdom, Europe and other countries.
    [Show full text]
  • JP 2-0, "Doctrine for Intelligence Support to Joint Operations"
    Joint Publication 2-0 Doctrine for Intelligence Support to Joint Operations 9 March 2000 Intelligence plays a vital role in the conduct of successful joint operations. Proper employment of collection and analysis assets is essential if joint force commanders are to gain and maintain information superiority. Without accurate intelligence, our joint forces will lose the essential advantages of surprise, operational security, and flexibility. We must also be cognizant of the changing roles and missions facing the Armed Forces of the United States and ensure that intelligence planning keeps pace with the full range of military operations. The future battlefield will demand high levels of joint interoperability and force enhancement, and the value of intelligence support as an exploitable multiplier cannot be overstated. Joint force commanders, planners, and warfighters at all levels are encouraged to become thoroughly familiar with the doctrine in this publication and use it as a tool for meeting the Nation’s future challenges. HENRY H. SHELTON Chairman of the Joint Chiefs of Staff PREFACE 1. Scope 3. Application This publication is the keystone document a. Doctrine and guidance established in of the intelligence support to joint operations this publication apply to the commanders series. It describes doctrine for intelligence of combatant commands, subunified support to interagency, joint, and commands, joint task forces, and subordinate multinational operations. components of these commands. These principles and guidance also may apply when 2. Purpose significant forces of one Service are attached to forces of another Service or when This publication has been prepared under significant forces of one Service support the direction of the Chairman of the Joint forces of another Service.
    [Show full text]
  • United States Special Operations Command
    United States Special Operations Command Fiscal Year (FY) 2009 Budget Estimates February 2008 Procurement, Defense-Wide FEBRUARY 2008 UNITED STATES SPECIAL OPERATIONS COMMAND PROCUREMENT DOCUMENTATION FOR THE FISCAL YEAR (FY) 2009 BUDGET ESTIMATE Table of Contents Table of Contents....................................................................................................................................................................................................................................... Organizations ..................................................................................................................................................................................................................................... …… Acronyms........................................................................................................................................................................................................................................... …… Procurement Program, Exhibit P-1 ............................................................................................................................................................................................................ Procurement Program, Exhibit P-1R ......................................................................................................................................................................................................... Procurement Line Item Documentation Aviation Procurement Lines Rotary Wing Upgrades
    [Show full text]