ATP 3-90.15. Site Exploitation

ATP 3-90.15. Site Exploitation

ATP 3-90.15 SITE EXPLOITATION July 2015 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. This publication supersedes ATTP 3-90.15, 8 July 2010. Headquarters, Department of the Army This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). To receive publishing updates, please subscribe at http://www.apd.army.mil/AdminPubs/new_subscribe.asp *ATP 3-90.15 Army Techniques Publication Headquarters No. 3-90.15 Department of the Army Washington, DC, 28 July 2015 Site Exploitation Contents Page PREFACE...............................................................................................................v INTRODUCTION ..................................................................................................vii Chapter 1 SITE EXPLOITATION ........................................................................................ 1-1 Introduction to Site Exploitation .......................................................................... 1-1 Considerations for Effective Site Exploitation..................................................... 1-6 Site Exploitation in the Operational Environment ............................................... 1-7 Chapter 2 SITE EXPLOITATION PLANNING .................................................................... 2-1 Planning Concepts in Site Exploitation ............................................................... 2-1 Information Collection ......................................................................................... 2-3 Roles in Planning Site Exploitation ..................................................................... 2-4 Site Exploitation and the Military Decisionmaking Process ................................ 2-5 Enabling Capabilities that Support Tactical Site Exploitation ............................. 2-8 Determine Constraints ...................................................................................... 2-10 Identify Critical Facts and Assumptions ........................................................... 2-10 Assess Risks .................................................................................................... 2-11 Determine the Commander’s Critical Information Requirements ..................... 2-11 Develop the Information Collection Plan .......................................................... 2-12 Write the Restated Mission ............................................................................... 2-12 Develop Courses of Action ............................................................................... 2-12 Chapter 3 TACTICAL SITE EXPLOITATION PREPARATION ......................................... 3-1 Preparing for Tactical Site Exploitation Overview .............................................. 3-1 Preparing for Tactical Site Exploitation .............................................................. 3-1 Chapter 4 TACTICAL SITE EXPLOITATION EXECUTION ............................................... 4-1 Tactical Site Exploitation Considerations ........................................................... 4-1 Tactical Site Exploitation Techniques ................................................................. 4-2 Technical Exploitation Techniques ..................................................................... 4-8 Information Obtained from Technical Exploitation ............................................. 4-9 Environmental Considerations for Site Exploitation ......................................... 4-10 Distribution Restriction: Approved for public release; distribution is unlimited. *This publication supersedes ATTP 3-90.15, 8 July 2010. i Contents Dissemination of Information and Intelligence .................................................. 4-10 Chapter 5 SITE EXPLOITATION ASSESSMENT ............................................................... 5-1 Assessment Techniques ..................................................................................... 5-1 Assessment Criteria ............................................................................................ 5-1 Measures of Effectiveness .................................................................................. 5-1 Appendix A TACTICAL SITE EXPLOITATION STANDING OPERATING PROCEDURE .. A-1 Tactical Site Exploitation Standing Operating Procedure Overview .................. A-1 Tactical Site Exploitation Team Composition and Responsibilities ................... A-1 Plan and Prepare Techniques ........................................................................... A-3 Tactical Site Exploitation Execution ................................................................... A-3 Post-Tactical Site Exploitation Activities ............................................................ A-4 Photography Techniques ................................................................................... A-4 Sketch Techniques ............................................................................................. A-5 Search Techniques ............................................................................................ A-6 Cache Site Search Techniques ......................................................................... A-8 Site Security ....................................................................................................... A-9 Key On-Site Activities ...................................................................................... A-10 Final Walk-Through Activities .......................................................................... A-11 Hasty Versus Deliberate Site Exploitation ....................................................... A-12 Forensic Materiel .............................................................................................. A-12 Collection Activities .......................................................................................... A-13 DA Form 4137 .................................................................................................. A-19 Custodian Procedures ..................................................................................... A-19 Voluntary Questioning Techniques .................................................................. A-19 Appendix B TACTICAL SITE EXPLOITATION KITS ........................................................... B-1 Baseline Kit ........................................................................................................ B-1 Enabler Kit .......................................................................................................... B-2 Appendix C EVIDENCE COLLECTION IN SUPPORT OF HOST-NATION RULE OF LAWC-1 Importance of Evidence Collection .................................................................... C-1 Collecting Evidence for Host-Nation Courts ...................................................... C-2 Appendix D WEAPONS CACHE CHECKLISTS ................................................................... D-1 Weapons Cache Basic Checklist ....................................................................... D-1 Weapons Cache Checklist ................................................................................. D-1 Weapons Inside Vehicle Checklist ..................................................................... D-2 Appendix E DEPARTMENT OF DEFENSE FORENSICS .................................................... E-1 Introduction to Department of Defense Forensics ............................................. E-1 Forensic Functions ............................................................................................. E-3 Forensic Operational Process ............................................................................ E-4 Forensic Exploitation Team Capability Overview .............................................. E-4 Appendix F SUPPORT FOR SITE EXPLOITATION ............................................................. F-1 Interagency Coordination .................................................................................... F-1 Overview of the U.S. Intelligence Community .................................................... F-1 Appendix G ATTACK SCENE INVESTIGATION .................................................................. G-1 Introduction to Attack Scene Investigation ......................................................... G-1 Initial Actions ...................................................................................................... G-1 ii ATP 3-90.15 28 July 2015 Contents Collection ............................................................................................................ G-4 Explosive Residue Collection ............................................................................. G-7 Crater Data Collection ........................................................................................ G-8 Attack Scene Soil Analysis ............................................................................... G-16 Attack Scene Closure ....................................................................................... G-22 Battlefield Vehicle Forensics ............................................................................ G-23 GLOSSARY .......................................................................................... Glossary-1 REFERENCES .................................................................................. References-1 INDEX .........................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    142 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us