FM
stringclasses 43
values | page
int64 1
477
| text
stringlengths 6
8.45k
|
---|---|---|
2-22.3 | 301 | _________________________________________________________________________________FM 2-22.3
- Captured from Unit (enemy or warring faction) (including national
identifying letters in accordance with STANAG 1059).
- Summary of circumstances of capture.
- Associated CPERS.
e. CE and ATD to be used as evidence in legal proceedings against
CPERS suspected of crimes against humanity and war crimes will be kept
under guard separate from other CE and ATD. |
2-22.3 | 303 | FM 2-22.3
Appendix F
NATO System of Allocating Interrogation Serial Numbers
1. Every captured person selected for interrogation will be given an Interrogation Serial
Number. This number shall be allocated by the Interrogation Unit conducting the first
interrogation of the captured person.
2. The number should not be confused with the Prisoner of War Internment Serial Number
(ISN), which is to be used for administrative purposes only.
3. The purpose of the Interrogation Serial Number is to identify the source of information to
ensure its proper evaluation, processing, and follow-up action. It will also identify the nationality
and location of the interrogation unit.
4. The number shall be constituted as follows:
a. 2 letters to indicate the Nationality of the captured person (see para 6).
b. 2 letters to indicate the Service of the captured person (see para 7).
c. 1 letter to indicate the Arm of Service of the captured person (see para 8).
d. 4 numbers to indicate the Interrogation Sequence Number of the captured person (see
para 9).
e. 4 numbers to indicate the Day and Month of Capture.
f. A dash (-) to show a sequence break.
g. 4 letters to indicate the Nationality and Service of the Interrogation Unit (see para 10).
h. 4 letters to indicate the Interrogation Unit.
5. Each group shall be separated by a dash. The final number shall therefore appear as in the
following examples:
LS – NV – B – 0012 – 2105 – USNV – 0159
Liechtenstein – Naval prisoner – Seaman – 12th captured person interrogated -
captured 21 May – interrogated by US Navy – team 159
AN – AF – H – 0357 – 0211 – GEAF – 0007
Andorra – Air force prisoner – Intelligence – 357th captured person interrogated –
captured 2 Nov – interrogated by GE Air Force – team 7 |
2-22.3 | 304 | FM 2-22.3 _________________________________________________________________________________
SM – AR – X – 0431 – 0707 – UKAR – 0019
San Marino – Army prisoner – One star or above – 431st captured person interrogated –
captured 7 Jul – interrogated by UK Army – team 19
6. The two letters used for indicating the Nationality of the captured person will be in
accordance with established NATO Country codes in STANAG 1059.
7. The following list of letters is to be used to indicate the Service of the captured person:
AR - Army NI - Naval Infantry
NV - Navy AB - Airborne Forces
NA - Naval Air Arm SF - Special Purpose Forces
AF - Air Force PL - Police
IR - Irregular CV - Civilian (other than Police)
8. The following list of letters is to be used to indicate the Arm of Service of the captured person:
Navy Army Air Force Other/Partisan
(A) (B) (C) Forces
(D)
A. Aircrew Aircrew Aircrew Aircrew
B. Seamen Infantry Ground Crew Merchant Marine
C. Communications Signals Communications Radio
Officers/Operators
D. Weapons/ Electrical/Electronic Electrical/Electronic
Electronic Engineer Engineer Engineer
E. Mechanical/ Engineers Mechanical/Air
Marine/Engineers Frame/Engineers
F. Gunnery Artillery Ordnance Weapons/Ordnance
Explosives
G. *HQ Staff *HQ Staff *HQ Staff *HQ Staff
H. Intelligence Intelligence Intelligence Intelligence
I. Marines Airborne Forces Airfield Defense
J. Cooks/Stewards Catering Catering Catering
K. Legal/Political Legal/Political Legal/Political Legal/Political
L. Medical/Dental/ Medical/Dental/ Medical/Dental/ Medical/Dental/
Nursing Nursing Nursing Nursing
M. Electronic Electronic Warfare Electronic Warfare Electronic Warfare
Warfare
N. Operations Operations Operations Operations
O. Police Police Police Police
P. Supply Quartermaster Supply Supply
Q. Strategic Strategic Weapons Strategic Weapons Strategic Weapons
Weapons
R. Special Purpose Special Purpose Special Purpose Special Purpose
Forces Forces Forces Forces
S. Air Traffic Control Armored Air Traffic Control Air Traffic Control
T. *Unknown *Unknown *Unknown *Unknown |
2-22.3 | 305 | _________________________________________________________________________________FM 2-22.3
Navy Army Air Force Other/Partisan
(A) (B) (C) Forces
(D)
U. Instructors Education Education Instructors
V. Ministers of Ministers of Religion Ministers of Religion Ministers of Religion
Religion
W. *Submarines Artillery Spotters Forward Air Couriers, etc.
Controllers
X. *One Star + *One Star + *One Star + *Officers in Command
of Irregular Forces
Y. *Other *Other *Other *Other
*Notes: G – Headquarters staffs below one star rank
T – Captured Person’s arm of service not known to report writer
W – To be used in respect of all submarines regardless of arm or specialization
X – To be used in respect of all ONE STAR or above officers regardless of army
Y – PW arm of service not included in the appropriate list
9. The sequence number of the interrogated captured personnel shall be of four digits allocated
in numerical order of interrogation by the team first interrogating the captured person.
10. Country, services and team codes.
a. Country codes, as laid down in STANAG 1059, are to be used for indication of the
Nationality of the Interrogation Team.
b. The following lists of letters are to be used for indicating the Service of the Interrogation
Team:
ARMY - AR AIR FORCE - AF
NAVY - NV MARINE - MR
COAST GUARD - CG PARA-MILITARY - PM
c. NATO teams will use the following abbreviations: (These will be determined as
command changes are implemented and STANAG 1059 is revised).
SC EUROPE RC SOUTH
RC NORTH JHQ SOUTHWEST
JHQ NORTH JHQ SOUTH
JHQ NORTHEAST JHQ SOUTH CENTER
JHQ CENTER JHQ SOUTHEAST
CC AIR NORTH CC AIR SOUTH
CC NAV NORTH CC NAV SOUTH
SC ATLANTIC RC EAST
RC WEST STRIK FLTLANT
RC SOUTHEAST SUB ACLANT
11. Nations will allocate 4-digit serial numbers to their interrogation teams. NATO Commands
will issue similar numbers to subordinate national interrogation teams under their command. |
2-22.3 | 307 | FM 2-22.3
Appendix G
Questioning Quick Reference
This appendix offers a quick reference for the trained HUMINT collector. It is not meant to be
all-inclusive, nor instructive in proper questioning technique, but lays out frequently used
requirements grouped logically by OB factor. Proper formation of questions is covered in detail
in Chapter 9.
Missions: Mission questioning consists of three areas: Time of Capture Mission, Future
Mission, and Past Mission. Missions are questioned in that order, to ensure that the information
is collected in the order of importance to a supported commander. Logical follow-up questioning
may lead the collector into any of the OB factors at any time during questioning in order to
provide complete information.
Offensive Missions:
When will the enemy attack?
Where will they attack?
What is the main objective of the attack?
What units will participate in the attack?
What tactics will be employed?
What artillery, air, and other units will support the attack?
Defensive Missions:
Where will the enemy establish lines of defense?
What units have been assigned to the defensive lines?
What obstacles have been emplaced (mines, trenches, wire, etc.)?
What artillery support is there for the defensive operation?
Retrograde Operations:
What units will take part in the retreat?
What are the current positions of the retreating units?
When will they start to retreat?
What routes will be used?
What is the planned destination of the retreating units?
What units will cover the retreat?
Composition:
What is the command and control element of (the target unit)?
What types of units are directly subordinate to (the target unit)?
What is the designation of (each of the subordinate units)?
How many units of that type are directly subordinate to (target unit)?
What units are attached? When? Why? What unit(s) are they detached from?
What units are detached? When? Why? What unit(s) are they attached to now? |
2-22.3 | 308 | FM 2-22.3 _________________________________________________________________________________
Weapons and Equipment Strength:
Individual Weapons:
What individual weapons are there in (target unit)?
How many?
What is the distribution of the weapons?
Crew-Served Weapons: What crew-served weapons are in (target unit)?
How many?
What is the distribution of the weapons?
Other Weapons: What other weapons are there in (target unit)?
What types?
How many?
How are they distributed?
Vehicles: What armored vehicles are in (unit)?
How many?
What nomenclature?
What other vehicles are in (unit)?
Dispositions:
Disposition questioning is ideally done with the aid of a map.
Where is (the target disposition)?
Show (on the map) the location of (the target disposition).
What enemy units, activities, or equipment are at that location?
What security measures are being employed at that location?
Additionally, specific types of dispositions require additional follow-up:
Area-Type Dispositions: (Staging Areas, Assembly Areas, Trains, etc.)
Show on the map (or describe) the perimeter of the disposition.
Where are units or activities located within it?
Where are the approaches/entrance?
What unit is in charge?
What vehicles or equipment are located within the disposition?
What is the date of information?
Line-Type Dispositions: (Line of Departure, Artillery emplacement, etc.)
Show on the map (or describe) the location of the disposition.
Define and locate both ends of the disposition.
What equipment is located there?
In the case of artillery, describe the placement and orientation of the guns,
ammunition, radar, and support vehicles.
Tactics:
Offensive: What offensive tactics are being employed by (unit)?
What other units are involved?
When did (unit) begin employing these tactics?
What are the major objectives?
Defensive: What defensive tactics are being employed by (unit)?
What other units are involved?
When did (unit) begin employing these tactics?
Special Operations: What special operations tactics are being employed by (unit)?
What are the designations of the units employing special operations tactics? When did
(unit) begin employing special operations tactics?
Where/Why are these tactics being employed? |
2-22.3 | 309 | _________________________________________________________________________________FM 2-22.3
Training:
Individual Training: What individual training is being conducted by (unit)?
Who is being trained?
How effective is the training?
Where is the training conducted?
What are the training standards?
Unit Training: What unit training is being conducted by (unit)?
Who is being trained?
How effective is the training?
Where is the training conducted?
What are the training standards?
Specialized Training: What specialized training is being conducted by (unit)?
Who is being trained?
How effective is the training?
Where is the training conducted?
What are the training standards?
What specialized equipment is used in the conduct of the training?
Combat Effectiveness:
Losses:
Personnel: What personnel losses have been incurred by (unit)?
When? Where? How?
What were the duty positions/ranks of the lost personnel?
Equipment: What equipment losses have been sustained by (unit)?
What type of equipment was lost?
When? Where? How many?
How were they lost?
Replacements (Personnel):
Received: What replacements have been received by (unit)?
What replacements are available to (unit)?
How many?
From where were the replacements received?
Available: What personnel replacements are available to (unit)?
From where are replacements available?
How many? What ranks?
How long would it take for replacements to arrive once requested?
Replacements (Equipment):
Received: What equipment replacements have been received by (unit)?
How many?
From where were the replacements received?
How does the quality of the replacement equipment compare to that of the original
equipment?
What is the level of confidence in the replacement equipment, compared to the original?
Available: What equipment replacements are available to (unit)?
From where are replacements available?
How long would it take to receive replacement equipment once requested?
How many of each type of equipment are available? |
2-22.3 | 310 | FM 2-22.3_________________________________________________________________________________
Reinforcements:
Received: What reinforcements have been received by (unit)?
What type was the reinforcing unit?
What is the designation of the reinforcing unit?
What equipment did the reinforcing unit bring?
To which unit was the reinforcing unit further assigned?
Why did (receiving unit) receive reinforcements?
How long will the reinforcing unit be assigned as reinforcement to (unit)?
Available: What reinforcements are available to (unit)?
From where (parent unit/location) are reinforcements available?
What types of units are available to reinforce (unit)?
How long would it take for reinforcements to arrive, once requested?
Morale:
Describe the morale of the members of (unit).
How long has the morale been…?
What is the unit leadership doing to (maintain/improve) the morale?
What effect has (high/low) morale had on the behavior or performance of the unit
members?
Logistics:
Weapons: What is the condition of the (specific weapons) in (the unit)?
Why are (the weapons) in that condition?
What is being done to improve the condition of (the weapons)?
How often is maintenance performed? By whom?
Who inspects weapons? How often?
Is there an increased emphasis on maintenance? If so, why?
What is done to prevent/alleviate a shortage while weapons are being maintained?
What spare parts are there for weapons in (unit)?
What shortages of spare parts are there?
What problems are there with spare parts (quality, fit, delays, etc)?
Ammunition: What types of ammunition are available for the (weapon/weapon system)
in the (unit)?
What problems are being experienced with ammunition for (weapon or weapon system)
in (unit)? Why? Since when?
What is being done to correct the problem(s)?
What shortages of ammunition for (weapon or weapon system) are there in (unit)?
What is being done to correct the shortage?
When was the last issue of ammunition for the (weapon or weapon system) in the (unit)?
How much was issued?
When is the next issue of ammunition planned?
(For insurgents/irregulars - Where is funding obtained for ammunition/explosive
purchases?
Where are ammunition/explosives obtained?
How are ammunition/explosives transported/delivered?
Vehicles: What is the condition of the (specific vehicle) in (the unit)?
Why are (the vehicles) in that condition?
What is being done to improve the condition of (the vehicles)?
How often is maintenance performed? By whom?
Who inspects vehicles? How often? |
2-22.3 | 311 | _________________________________________________________________________________FM 2-22.3
Is there an increased emphasis on maintenance? If so, why?
What is done to prevent/alleviate a shortage while vehicles are being maintained?
What spare parts are there for vehicles in (unit)?
What shortages of spare parts are there?
What problems are there with spare parts (quality, fit, delays, etc)?
POL:
What problems have been experienced with the petroleum, oils, and lubricants (POL) for
the (vehicle type) in the (unit)?
Why are there problems?
Since when have there been problems?
What is being done to correct the problems?
What shortages of POL are there? Why?
What is being done to alleviate the shortages?
When was the last resupply of POL in (unit)? Where? How much?
When is the next resupply of POL planned?
Communications Equipment:
What is the condition of the (specific radio set) in (the unit)?
Why are (the radios) in that condition?
What is being done to improve the condition of (the radios)?
How often is maintenance performed? By whom?
Who inspects communication equipment? How often?
Is there an increased emphasis on maintenance? If so, why?
What is done to prevent/alleviate a shortage while radios are being maintained? What
spare parts are there for communication equipment in (unit)?
What shortages of spare parts are there?
What problems are there with spare parts (quality, fit, delays, etc)?
Medical:
Equipment: What individual medical equipment is in (unit)? How many?
What is the distribution?
What are the contents of individual medical kits in the (unit)?
What is the quality?
What shortages are there?
What problems are there with the individual medical equipment/supplies in (unit)?
What vehicular medical equipment is in (unit)? How many?
What is the distribution?
What are the contents of vehicular medical kits in (unit)?
What is the quality?
What shortages are there?
What problems are there with the vehicular medical equipment/supplies in (unit)?
Personnel: What medical personnel are assigned to (unit)?
What medical personnel are available to treat members of (unit)? How many? What are
the duty positions of the medical personnel?
What level of medical care are the medical personnel able to provide to members of
(unit)?
Facilities: What medical facilities are available to members of (unit)?
Where are the medical facilities?
What level of care is available there?
What higher echelons of medical care are available? |
2-22.3 | 312 | FM 2-22.3_________________________________________________________________________________
Medical Evacuation (MEDEVAC) Procedures: What MEDEVAC procedures are
available to members of (unit)?
Where are MEDEVAC collection points?
What different MEDEVAC procedures are used for more seriously wounded personnel,
compared to lightly wounded?
Food: What rations are members of (unit) eating?
What shortages are there of food?
What is the quality?
What problems have been encountered with the rations provided to (unit)?
When was the last issue of rations to members of (unit)?
When is the next issue?
What reserve stocks of field rations are there in (unit)?
Water: What is the source of drinking water for members of (unit)?
What problems have been encountered with quality, shortages, or contamination of
drinking water?
What water purification methods are available to members of (unit)?
Under what circumstances will they be used?
If water purification tablets are used, what color are they?
Electronic Technical Data:
Radio Frequencies: What are the primary and alternate frequencies for radios in
(each unit)?
Under what circumstances will alternate frequencies be used?
What networks operate on the various frequencies?
Call Signs: What is the call sign of (unit)?
What is the call sign of (each) person of authority in the unit?
When do call signs change?
What informal call signs are in use?
Miscellaneous:
Personalities: Question for name, rank, unit, duty position, and unit of key leaders.
Collect identifying characteristics such as age, height, weight, build, hair and eye color,
writing hand, facial hair and teeth.
Report contact information such as work and home addresses, telephone numbers, fax
number, and email address.
Complete biographical IIR format is in DIAM 58-12 (S//NF).
Code Names: What is the code name of (each unit)?
What code names are being used for specific operations?
Passwords: What is the current challenge/password for (unit)?
When did it go into effect?
When will it change?
What will the next challenge/password be?
What other (informal, “run in”) passwords are in use?
Obstacles:
Enemy: What obstacles have the enemy forces emplaced?
Where, when, what type of obstacles?
What safe lanes are there through or around the obstacles?
(If mine fields, collect type, pattern, quantity, and method of emplacement of mines.)
How are the obstacles being covered (artillery, ambush, etc.)? |
2-22.3 | 313 | _________________________________________________________________________________FM 2-22.3
Why have the obstacles been emplaced where they are (denial of terrain, canalization
into a fire sack, etc.)?
Friendly: What friendly obstacles have enemy forces encountered?
Where? When?
Have those obstacles been breached or otherwise neutralized?
What effect have the friendly obstacles had on enemy maneuver?
PSYOP:
Enemy: What PSYOP are being conducted by (unit)?
What is the text of the messages?
Who is the target audience?
Where are the PSYOP materials prepared?
Where and how are they delivered? What is the hoped-for effect?
Friendly: What PSYOP have members of (unit) encountered? Where? When?
What form of PSYOP was encountered?
What effect have the PSYOP had on the officers/NCOs/enlisted of (unit)?
What is the leadership of (unit) doing to counter the effects of friendly PSYOP? |
2-22.3 | 315 | FM 2-22.3
Appendix H
SALUTE Reporting
H-1. The SALUTE report format requires brief entries which require the
collector to break information down into basic elements: who, what, where,
when, why, and how. This allows for efficient reporting via electronic or
hardcopy medium. It also allows the analyst to quickly scan multiple reports
to find specific information.
H-2. Figure H-1 provides guidance and is not to be construed as strict
requirements. SALUTE reports of combat activity may only contain a word
or two in each entry, whereas Intelligence reports tend to include more
detail. |
2-22.3 | 316 | FM 2-22.3 _________________________________________________________________________________
TO: Usually the address of the supported S2/G2 (according to unit SOP)
FROM: Your unit or team designation, or your duty position, as appropriate
DTG: The date-time group of when the report is being submitted
Report Number: From local SOP
1. (S)ize/Who: Expressed as a quantity, and echelon, or size (e.g., 1 x BDE). If
multiple echelons are involved in the activity being reported, there can be multiple
entries (e.g.,1 x BDE; 2 x BN). Non-standard units are reported as such (e.g., bomb-
making class; support staff).
2. (A)ctivity/What: This line is the focal point of the report and relates to the PIR or
important non-PIR information being reported. It should be a concise bullet
statement.
3. (L)ocation/Where: Generally a grid coordinate, including the 100,000 meter grid
zone designator. The entry can also be an address, if appropriate, but still should
include an 8-digit grid coordinate. City names will always be followed by the two-
character country code. If the activity being reported involves movement (advance,
withdrawal, etc.) the location entry will include “From” and “To” entries. The route
used will be reported under “Equipment/How.”
4. (U)nit/Who: This entry identifies who is performing the activity described in the
“Activity/What” entry. Include the complete designation of a military unit,
identification of a civilian or insurgent group, or the full name of an individual, as
appropriate.
5. (T)ime/When: For a future event, this is when the activity will initiate. Past
events are usually not the subject of SALUTE reports, but if a past event is to be
reported, the Time/When entry will generally reflect when the event ended. Ongoing
events are reported as such. Reports of composition of forces, morale, and Electronic
Technical Data and other non-event topics are reported as ongoing. When reporting
on a disposition, the “Time/When” entry is generally the last time the source was at
the disposition.
6. (E)quipment/How: The information reported in this entry clarifies, completes,
and/or expands upon information reported in any of the previous entries. It includes
information concerning equipment involved, tactics used, and any essential elements
of information not reported in the previous paragraphs.
7. Remarks: Use this entry to report the source of the information, whether a person,
a CED, open-source media, or other source. Include the date of information and the
PIR that the reported information addresses. Map data for coordinates given in the
“Location/Where” entry are included, stating map series name, sheet number, scale
and edition. If there are enclosures to the SALUTE report, such as sketches, they are
annotated here.
Figure H-1. Example of a Written SALUTE Report. |
2-22.3 | 317 | FM 2-22.3
Appendix I
Document Exploitation and Handling
I-1. DOCEX is a vital information source in the development of the all-
source intelligence picture. Unless planned for and carefully monitored, the
volume of CEDs in all operations can rapidly overwhelm a unit’s capability to
extract meaningful information.
DEFINITIONS
I-2. A document, as defined by AJP 2.5, is any piece of recorded information,
regardless of form. Documents include printed material such as books,
newspapers, pamphlets, OPORDs, and identity cards as well as handwritten
materials such as letters, diaries, and notes. Documents also include
electronically recorded media such as computer files, tape recordings, and
video recordings and the electronic equipment which contains documents or
other vitally important intelligence. Examples include hard drives, operating
systems, and personal electronic devices, including phones, PDAs, and GPS
devices. A CED may be needed by several collection or exploitation activities
at the same time, requiring copies to be made. Collectors must have ready
access to copying equipment. Documents often must be evacuated through
two different channels for proper exploitation, which also makes copying
necessary. Such documents and equipment require special handling to
assure that they are returned to their owners.
I-3. DOCEX is the systematic extraction of information from threat
documents for the purpose of producing intelligence or answering IRs. A
threat document has been in the possession of the threat, written by the
threat, or is directly related to a future threat situation. DOCEX can occur in
conjunction with HUMINT collection activities or as a separate activity.
I-4. A CED is any document that was in the possession of an enemy force
that subsequently comes into the hands of a friendly force, regardless of the
origin of that document. There are three types of CEDs.
• Official - documents of government or military origin.
• Identity - personal items such as identification (ID) cards or books,
passports, driver licenses.
• Personal - documents of a private nature such as diaries, letters, and
photographs.
I-5. Open-source documents are documents that are available to the general
public including but not limited to newspapers, books, videotapes, public
records, and documents available on the Internet or other publicly available
electronic media. |
2-22.3 | 318 | FM 2.22.3 _________________________________________________________________________________
I-6. Source-associated documents are documents that are encountered on or
in immediate association with a human source. These may include both
official and personal documents. Documents associated with human sources
are normally exploited, at least initially, during the interrogation or
debriefing of the source. Interrogators typically use these documents during
planning and preparation for interrogation of the associated EPW. These
personal documents and source identification documents are therefore
evacuated in conjunction with the associated source and sent through
prisoner, detainee, or refugee evacuation channels rather than through
intelligence channels. If the duplication capability exists, collectors should
copy personal documents that contain intelligence information and evacuate
the copy through intelligence channels. The original personal document
should be evacuated with the detainee but not on his person until the
HUMINT collector has exploited it. Collectors evacuate official documents
through intelligence channels after initial exploitation. If possible, the
collector will copy official documents and evacuate the copy with, but not on,
the source.
OPEN-SOURCE INFORMATION
I-7. Open-source information is publicly available information appearing in
print or electronic form. Open-source information may be transmitted via
radio, television, newspapers, commercial databases, electronic mail
networks, or other electronic media like CD-ROMs. Whatever form they take,
open sources are not—
• Classified at their origin.
• Subject to proprietary constraints.
• The product of sensitive contacts with US or foreign persons.
I-8. In all operations, open-source collection can be a valuable addition to the
overall intelligence collection and each intelligence discipline’s efforts. Open-
source information supplements the HUMINT collection effort, and all types
of open sources must be considered for exploitation.
I-9. Open sources are evaluated and categorized as friendly, neutral, or
hostile. Certain high-value, open-source information sources may be
identified for continuous monitoring. Other open-source information sources
may be identified to screen for the presence or lack of specific indicators. In
addition, the information obtained from open sources is extremely helpful for
the HCT members to be current with the latest developments in the AO,
which enables them to establish rapport and effectively converse with their
sources. Open-source documents are exploited in the same manner as CEDs.
OPEN-SOURCE DOCUMENT OPERATIONS
I-10.Open-source document operations are the systematic extraction of
information from publicly available documents in response to command IRs.
Open-source document operations can be separate operations or can be
included as part of other ongoing operations. Open-source documents are
significant in the planning of all operations, especially during the execution |
2-22.3 | 319 | _________________________________________________________________________________FM 2-22.3
of stability and reconstruction operations and civil support operations. As
well as hard data, open-source information can provide valuable background
information on the opinions, values, cultural nuances, and other sociopolitical
aspects in AOIs. In evaluating open-source documents, collectors and
analysts must be careful to determine the origin of the document and the
possibilities of inherent biases contained within the document.
CAPTURED DOCUMENT OPERATIONS
I-11.One of the significant characteristics of operations is the proliferation of
recordkeeping and communications by digital methods (faxes, e-mails, typed,
or computer-generated documents). The rapid and accurate extraction of
information from these documents contributes significantly to the
commander’s accurate visualization of his battlefield. Documents may be
captured on or in immediate association with EPWs and detainees, may be
found on or turned in by refugees, line crossers, DPs or local civilians, or may
be found in abandoned enemy positions or anywhere on the battlefield.
DOCUMENT EVACUATION AND HANDLING
I-12.The rapid evacuation and exploitation of documents is a shared
responsibility. It originates with the capturing unit and continues to the
complete extraction of pertinent information and the arrival of the document
at a permanent repository, normally at the joint level, either within the
theater of operations or outside of it. Documents captured in association with
detainees and EPWs, with the exception of identity documents, are removed
from the individual to ensure that documents of intelligence interest are not
destroyed. These documents are evacuated through EPW evacuation
channels with, but not on the person of, the detainee. With the exception of
official documents, all documents are eventually returned to the detainee.
I-13.CEDs not associated with a detainee are evacuated through MI
channels, generally starting with the capturing unit’s S2. Depending on the
type of documents, they may eventually be evacuated to the National Center
for Document Exploitation. HUMINT collectors and translators can extract
information of intelligence interest from CEDs at every echelon; they will
make an attempt to exploit CEDs within their expertise and technical
support constraints. Collectors evacuate CEDs to different elements based
upon the information contained and the type of document concerned. For
example, documents related to criminal activity may be evacuated to the
nearest criminal investigative unit. Direct evacuation to an element outside
the chain of command takes place at the lowest practical echelon but is
normally done by the first MI unit in the chain of command. Document
evacuation procedures are outlined in Annex B (Intelligence) of the unit’s
OPORD and SOPs.
Actions by the Capturing Unit
I-14.Document accountability begins at the time the document comes into US
possession. Original documents must not be marked, altered, or defaced in
any way. The capturing unit attaches a DD Form 2745 (Enemy Prisoner of
War Capture Tag), Part C, to each document. Only in the case where a |
2-22.3 | 320 | FM 2.22.3 _________________________________________________________________________________
capturing unit does not have the time nor the manpower to mark each
document due to ongoing combat operations should the capturing unit fill out
one capture tag for a group of documents. In this case, the capturing unit
should place the documents in a weatherproof container (box or plastic bag).
The capturing unit should fill out two copies of the DD Form 2745, placing
one copy inside the container and attaching one to the outside of the
container. If these forms are not available, the capturing unit records the
required data on any piece of paper. Figure I-1 shows an example of a field
expedient tag. At a minimum, the capturing unit should record the
information as follows:
• Time the document was captured as a DTG.
• Place document was captured, including an 8-digit coordinate, and
description of the location. This should be as detailed as time allows.
For example, if a terrorist safe house was searched, documents might
be “bagged and tagged” based on what room of the house they were in,
what file cabinet, what desk, and so forth.
• Identity of the capturing unit.
• Identity of the source from whom the document was taken, if
applicable.
• Summary of the circumstances under which the document was found.
I-15.Document evacuation procedures are listed in Annex B (Intelligence) to
the OPORD. If the capturing unit does not contain a supporting HCT, it
forwards any CEDs found on the battlefield directly to its S2. The S2 extracts
PIR information as practicable, ensures that the documents are properly
tagged, and ensures speedy evacuation to the next higher echelon through
intelligence channels. Normally, a capturing unit will use any available
vehicle, and in particular empty returning supply vehicles, to evacuate
documents. Documents captured on or in association with detainees,
including EPWs, should be tagged and removed from the detainee. They are
evacuated with (but not on) the detainees to an MP escort unit or an EPW
holding facility.
I-16.When large numbers of documents are captured in a single location, it is
often more expedient for the capturing unit to request a DOCEX team or
HCT from the supporting MI unit be sent to the documents rather than
attempting to evacuate all the documents. This reduces the burden on the
capturing unit, facilitates the rapid extraction of information, and enables
the priority evacuation of documents of importance to higher echelons. This
method should only be used if the capturing unit can adequately secure the
documents until the arrival of the DOCEX team and if the battlefield
situation and MI resources permit the dispatch of a team. The capturing unit
should include in its request the following:
• The identification of the capturing unit.
• Its location and the location of the documents. |
2-22.3 | 321 | _________________________________________________________________________________FM 2-22.3
CCCAAAPPPTTTUUURRREEEDDD DDDOOOCCCUUUMMM EEENNNTTT TTTAAAGGG
NNNAAATTTIIIOOONNNAAALLLIIITTTYYY OOOFFF CCCAAAPPPTTTUUURRRIIINNNGGG FFFOOORRRCCCEEE
:::_________UUU ______SSS
________________________________________________________________________
_____________________________________________________________________________________________________________________________________________________________________________________________
DDDAAATTTEEE///TTTIIIMMMEEE CCCAAAPPPTTTUUURRREEEDDD:::_______________111___555___111___333___111___000___ZZZ___AAA______UUU___GGG___222___000___000___444_____________________________________________________________________
PPPLLLAAACCCEEE CCCAAAPPPTTTUUURRREEEDDD________________________BBB___HHH___555___666___333___222___111___777___888___555___,,,___ SSS___mmm______aaa___llllll___tttooo___www___nnn______,,, ___IIIZZZ___________________________________________________
CCCAAAPPPTTTUUURRRIIINNNGGG UUUNNNIIITTT:::__________________111___sss___ttt___PPP___lllttt___///BBB___ ___TTT___rrr___ppp___///111___---___111___ CCC______aaa___vvv_____________________________________________________________________
IIIDDDEEENNNTTTIIITTTYYY OOOFFF SSSOOOUUURRRCCCEEE (((IIIfff AAAppppppllliiicccaaabbbllleee))):::___ ____________MMM___AAA___JJJ___,,,___ RRR___eee___ppp___uuu___bbb___lll___iiiccc___aaa___nnn___ ___GGG___uuu___aaa___rrr___ddd__________________
___________________________________________________________________________________________________ _______________________________________________________________________________________
CCCIIIRRRCCCUUUMMMSSSTTTAAANNNCCCEEESSS OOOFFF CCCAAAPPPTTTUUURRREEE:::____________SSS___ ___uuu___rrrrrr___eee___nnn___ddd___eee___rrreee___ddd___ ___hhh___iiisss___ ___cccooo___mmm______ppp___aaa___nnn___yyy___ ttt___ooo_____________________
____________aaa___ ___ppp___aaa___sss___sssiii___nnn___ggg___ UUU______SSS___ ccc___aaa___vvv___aaa___lllrrr___yyy___ ppp___aaa___ttt___rrr___ooo___lll____________________________________________________________________________________________________________
DDDEEESSSCCCRRRIIIPPPTTTIIIOOONNN OOOFFF WWWEEEAAAPPPOOONNN///DDDOOOCCCUUUMMMEEENNNTTT:::_________111___ xxx___ ___PPP___SSS___YYY___OOO______PPP___ ddd___ooo___ccc___uuu___mmm______eee___nnn___ttt_____________________
_______________ppp___rrr___ooo___ddd___uuu___ccc___eee___ddd___ bbb___yyy___ ___UUU___SSS___ ___111___666___ttthhh ___PPP___SSS______YYY___OOO___PPP___ ___BBB___nnn___ _____________________________________________________________________________________________
Figure I-1. Example of a Field Expedient Capture Document Tag.
• The general description of the document site (such as an enemy
brigade headquarters).
• The approximate number and type of documents.
• The presence of captured computers or similar equipment.
I-17. The MI unit dispatching the team should notify the requesting team as
soon as possible to provide them an estimated time of arrival and to
coordinate the arrival of the team. There is no set time for how long any
particular echelon may keep a document for study. The primary aim of
speedy evacuation to the rear for examination by qualified DOCEX elements
remains. Each echelon is responsible to prevent recapture, loss, or
destruction of the CEDs.
ACTIONS BY THE FIRST HUMINT COLLECTION OR DOCEX UNIT
I-18. The first HUMINT collection or DOCEX unit to receive CEDs should
log, categorize, and exploit the documents to the best of its abilities based on
METT-TC factors. They should rapidly identify documents requiring special
handling or special expertise to exploit and evacuate those documents to the
appropriate agencies. The MI unit SOP or OPORD should list special
document evacuation requirements and priorities. |
2-22.3 | 322 | FM 2.22.3 _________________________________________________________________________________
Accountability
I-19.The capturing unit and each higher echelon take steps to ensure that
they maintain CED accountability during document evacuation. To establish
accountability, the responsible element inventories all incoming CEDs.
Anyone who captures, evacuates, processes, or handles CEDs must maintain
accountability. All CEDs should have completed captured document tags. An
incoming batch of documents should include a captured document
transmittal. Figure I-2 shows this format. The exact format for a document
transmittal is a matter of local SOP, but it should contain the information
listed below:
• The identity of the element to which the CEDs are to be evacuated.
• The identity of the unit forwarding the CEDs.
• The identification number of the document transmittal.
• Whether or not CEDs in the package have been screened and the
screening category. (If not screened, NA is circled.) Document
handlers should package documents that have been screened
separately, by category.
• A list of the document serial numbers of the CEDs in the package.
TTTTOOOO::::________________________________________________________________________________________________________ DDDDTTTTGGGG::::____________________________________________________________________________________________________________________
FFFFRRRROOOOMMMM::::____________________________________________________________________________________________ TTTTRRRRAAAANNNNSSSSMMMMIIIITTTTTTTTAAAALLLL NNNNOOOO::::____________________________________________________________________
SSSSCCCCRRRREEEEEEEENNNNEEEEDDDD:::: YYYYEEEESSSS //// NNNNOOOO CCCCAAAATTTTEEEEGGGGOOOORRRRYYYY:::: AAAA BBBB CCCC DDDD NNNNAAAA
CCCCEEEEDDDD SSSSEEEERRRRIIIIAAAALLLL NNNNUUUUMMMMBBBBEEEERRRRSSSS::::
Figure I-2. Example of a Captured Document Transmittal Sheet.
I-20.When a batch is received without a transmittal, the HUMINT collection
element contacts the forwarding units and obtains a list of document serial
numbers (if possible). The HUMINT collection element records all trace
actions in its journal. Accountability includes—
• Inventorying the CEDs as they arrive.
• Initiating necessary trace actions. |
2-22.3 | 323 | _________________________________________________________________________________FM 2-22.3
• Maintaining the captured document log. (See Figure I-3.)
I-21.When a collector includes intelligence derived from a CED in an
intelligence report, he references the identification letters and number of the
document concerned to avoid false confirmation.
Inventory
I-22.The receiving element conducts an initial inventory of incoming CEDs
by comparing the CED to the captured document tag and accompanying
transmittal documents. This comparison identifies—
• Transmittals that list missing CEDs.
• Document tags not attached to CEDs.
• CEDs not attached to document tags.
• CEDs not listed on the accompanying transmittal documents.
UUUUNNNNIIIITTTT::::________________________________________________________________________________________________________________________________________________________________________________________________________________________________
FFFFIIIILLLLEEEE RRRREEEECCCCEEEEIIIIVVVVEEEEDDDD DDDDOOOOCCCCUUUUMMMMEEEENNNNTTTT IIIINNNNCCCCOOOOMMMMIIIINNNNGGGG FFFFOOOORRRRWWWWAAAARRRRDDDDIIIINNNNGGGG RRRREEEECCCCEEEEIIIIVVVVEEEEDDDD DDDDTTTTGGGG AAAANNNNDDDD PPPPLLLLAAAACCCCEEEE
NNNNUUUUMMMMBBBBEEEERRRR DDDDTTTTGGGG SSSSEEEERRRRIIIIAAAALLLL #### TTTTRRRRAAAANNNNSSSSMMMMIIIITTTTTTTTAAAALLLL#### UUUUNNNNIIIITTTT BBBBYYYY OOOOFFFF CCCCAAAAPPPPTTTTUUUURRRREEEE
1111555500001111 111155550000888833330000AAAAUUUUGGGG99999999 0000111100002222333366668888 1111TTTT00008888 1111////88882222dddd AAAAbbbbnnnn DDDDiiiivvvv SSSSSSSSGGGG KKKKIIIIMMMM 111155550000555500000000AAAAUUUUGGGG99999999////EEEEKKKK000033330000999944449999
1111555500002222 111155550000999933330000AAAAUUUUGGGG99999999 0000111111110000444444443333 2222TTTT11111111 2222////88882222dddd AAAAbbbbnnnn DDDDiiiivvvv SSSSSSSSGGGG KKKKIIIIMMMM 111155550000666622220000AAAAUUUUGGGG99999999////EEEEKKKK000044445555888866660000
1111555500003333 111155550000999933330000AAAAUUUUGGGG99999999 1111000033339999999966664444 2222TTTT11111111 2222////88882222dddd AAAAbbbbnnnn DDDDiiiivvvv SSSSSSSSGGGG KKKKIIIIMMMM 111155550000777722225555AAAAUUUUGGGG99999999////EEEEKKKK000055558888333388883333
1111555500004444 111155550000999933330000AAAAUUUUGGGG99999999 1111111199992222555588883333 2222TTTT11111111 2222////88882222dddd AAAAbbbbnnnn DDDDiiiivvvv SSSSSSSSGGGG KKKKIIIIMMMM 111155550000777722225555AAAAUUUUGGGG99999999////EEEEKKKK000055558888333388883333
CCCCAAAAPPPPTTTTUUUURRRRIIIINNNNGGGG SSSSCCCCRRRREEEEEEEENNNNIIIINNNNGGGG DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN DDDDEEEESSSSTTTTIIIINNNNAAAATTTTIIIIOOOONNNN////
RRRREEEEMMMMAAAARRRRKKKKSSSS
UUUUNNNNIIIITTTT CCCCAAAATTTTEEEEGGGGOOOORRRRYYYY OOOOFFFF DDDDOOOOCCCCUUUUMMMMEEEENNNNTTTT TTTTRRRRAAAANNNNSSSSMMMMIIIITTTTTTTTAAAALLLL ####
CCCCoooo AAAA,,,, 1111////555500004444tttthhhh,,,, 1111 BBBBddddeeee,,,, 88882222dddd AAAA LLLLeeeetttttttteeeerrrr ooooffff pppprrrroooommmmoooottttiiiioooonnnn,,,, KKKKPPPP,,,, 1111PPPPgggg JJJJDDDDEEEECCCC,,,, 11115555TTTT00001111 SSSSAAAALLLLUUUUTTTTEEEE wwwwrrrriiiitttttttteeeennnn
CCCCoooo BBBB,,,, 2222////555500004444tttthhhh,,,, 2222 BBBBddddeeee,,,, 88882222dddd AAAA LLLLeeeetttttttteeeerrrr ddddeeeessssccccrrrriiiibbbbiiiinnnngggg aaaattttttttaaaacccckkkk,,,, RRRRUUUU,,,, 3333 PPPPgggg JJJJDDDDEEEECCCC,,,, 11115555TTTT00001111 SSSSAAAALLLLUUUUTTTTEEEE wwwwrrrriiiitttttttteeeennnn
CCCCoooo BBBB,,,, 2222////555500004444tttthhhh,,,, 2222 BBBBddddeeee,,,, 88882222dddd BBBB LLLLiiiisssstttt ooooffff ccccaaaallllllll ssssiiiiggggnnnnssss,,,, RRRRUUUU,,,, 1111PPPPgggg JJJJDDDDEEEECCCC,,,, 11115555TTTT00003333 NNNNoooonnnneeee
CCCCoooo BBBB,,,, 2222////555500004444tttthhhh,,,, 2222 BBBBddddeeee,,,, 88882222dddd CCCC PPPPeeeerrrrssssoooonnnnaaaallll lllleeeetttttttteeeerrrr,,,, KKKKPPPP,,,, 2222 PPPPgggg JJJJDDDDEEEECCCC 11115555TTTT00002222 TTTTrrrraaaannnnssssllllaaaattttiiiioooonnnn eeeennnndddd
Figure I-3. Example of a Captured Document Log.
Trace Actions
I-23.The receiving unit initiates trace actions on all missing CEDs, missing
captured document tags, and all information missing from the captured
document tags. They initiate trace actions by contacting elements from which
the documents were received. The receiving unit can complete this corrective
action swiftly if that unit's captured document log was filled out completely.
If necessary, the trace action continues to other elements that have handled
the document. If a captured document tag is unavailable from elements that
have previously handled the CED, the document examiner fills out a |
2-22.3 | 324 | FM 2.22.3 _________________________________________________________________________________
captured document tag for the document using whatever information is
available. Attempts to obtain missing CEDs are critical because of the
information those CEDs might contain.
Document Logs
I-24.The captured document log is a record of what an element knows about
a CED. After trace actions are initiated for any missing documents, the CEDs
are entered in the REMARKS section of the captured document log. This log
must contain the following:
• Name of capturing unit.
• File number (a sequential number to identify the order of entry).
• DTG the CED was received at this element.
• Document serial number of the captured document tag.
• Identification number of the transmittal document accompanying the
CED.
• Complete designation of the unit that forwarded the CED.
• Name and rank of individual that received the CED.
• DTG and place of capture (as listed on the captured document tag).
• Identity of the capturing units (as listed on the captured document
tag).
• Document category (after screening).
• Description of the CED. (At a minimum, the description includes the
original language; number of pages; type of document such as a map,
letter, or photograph; and the enemy's identification number for the
CED, if available.)
• Destination and identification number of the outgoing transmittal.
• Remarks to include any other information that can assist the unit in
identifying the CED including processing codes. These are set up by
local SOPs to denote all actions taken with the document while at the
element, including intelligence reports, translations, reproductions, or
return of the CED to the source from whom it was taken.
DOCUMENT SCREENING
I-25.Document screening is the rapid but systematic evaluation of documents
to determine which documents contain priority information. Selected priority
documents will be exploited immediately for PIR information and evacuated
expeditiously (often electronically) to a DOCEX facility. Document screening
can be done manually (requiring a linguist who is well versed in the current
collection requirements) or through the use of scanning devices with key
word identification capability. Document processing does not require the
complete translation of a document but requires sufficient translation to |
2-22.3 | 325 | _________________________________________________________________________________FM 2-22.3
determine the significance of the document. A non-linguist may be able to do
a degree of preliminary screening based on document format and the location
where the document was found.
I-26.As screeners screen each document, they assign one of four category
designations. The assigned category determines the document's priority for
exploitation and evacuation. Document screening requires that the screening
units receive the most current PIR and intelligence requirements; current
friendly and enemy situation update; and relevant OB information.
Screeners at higher echelons can re-categorize CEDs, to more accurately
reflect the requirements at that level or information that has past its LTIOV.
DOCUMENT CATEGORIES
I-27.Documents are divided into categories to prioritize their evacuation and
the extraction of information from them for intelligence purposes. Document
categories are discussed below.
Category A
I-28.Category A documents are those that require priority evacuation and/or
special handling because of their special intelligence value. They contain
SALUTE reportable information. Category A documents also include those
that are of interest to another command, collecting agency, or other agency
(for example, TECHINT, Air Force, Navy, PSYOP, Cryptography).
I-29. What determines if a document is a Category A document changes
according to the operational environment and will be set forth in each
DOCEX element's SOP and in Annex B (Intelligence) of the unit’s OPORD.
Documents that are evidence in legal proceedings against captured personnel
suspected of crimes against humanity and war crimes will be handled as
Category A documents. All Category A documents are handled as SECRET.
Standard Category A documents include but are not limited to—
• Unmarked maps.
•
Maps and charts containing any operational graphics, which are sent
to the G2/S2. From G2/S2, they would be evacuated to the all-source
analysis center.
•
Air Force related documents, which should go to the nearest Air Force
headquarters.
• Navy related documents, which should be sent to the nearest Navy
headquarters.
• TECHINT-related documents, which are evacuated to the nearest
TECHINT unit.
• Cryptographic and communications-related documents, which are
evacuated to the nearest SIGINT analysis unit.
• Documents constituting evidence to be used in legal proceedings
against persons suspected of crimes against humanity and war crimes, |
2-22.3 | 326 | FM 2.22.3 _________________________________________________________________________________
which will be marked “CRIMINAL EVIDENCE.” Such documents will
be kept separate from other documents and will be stored under guard
or in a secure area until turned over to a war crimes investigative unit.
SJA should be consulted concerning chain of custody requirements.
Category B
I-30.Category B documents contain information of intelligence interest to the
supported command. The lowest echelon possible exploits the documents and
evacuates them through intelligence channels. Category B documents are
handled as SECRET.
Category C
I-31.Category C documents and items contain no information of intelligence
interest but still require special administrative accountability (for example,
currency, works of art, narcotics). Currency is accounted for on DA Form
4137 (Evidence/Property Custody Document).
Category D
I-32.Category D documents contain no information of intelligence value.
Only the theater or higher document repository can categorize documents as
Category D.
GROUP DOCUMENTS
I-33.CEDs are first grouped according to their assigned screening category.
Personnel must be careful when sorting CEDs to ensure no CED is separated
from its associated documents. These large groupings can be broken down
into smaller groups. Each of these smaller groupings consists of CEDs that
were—
• Captured by the same unit.
• Captured in the same place.
• Captured on the same day at the same time.
• Received at the DOCEX element at the same time.
TRANSMITTAL OF CEDS FROM FIRST AND SUBSEQUENT MI UNITS
I-34.Unless they have an HCT in DS, most units that capture or find
documents normally have no way of evaluating, categorizing, or otherwise
differentiating documents. They are all tagged and evacuated together by the
most expedient means through MI channels. Once these documents arrive at
a HUMINT collection or DOCEX unit, the unit can screen, categorize, and
extract information from the documents. The degree that documents are
exploited at each echelon is dependent on mission priorities and available
resources. Document handlers must note any attempts to exploit CEDs on
the transmittal documents to prevent unnecessary duplication of effort by
higher echelons. |
2-22.3 | 327 | _________________________________________________________________________________FM 2-22.3
I-35.When transportation assets are limited, CEDs are evacuated according
to priority based on document categorization. All Category A CEDs will be
evacuated first, followed in order by Categories B, C, and D. Documents that
have not yet been screened will be evacuated as Category C documents, but
the transmittal slip will clearly indicate that the documents have not been
screened.
I-36.Documents will be evacuated in accordance with unit SOP and Annex B
(Intelligence) in the unit OPORD. Lower priority CEDs, no matter how old,
are never evacuated ahead of those with higher priority. CEDs are packaged
so that a package of documents contains CEDs of only one category. If the
CED cannot be screened because of time or language constraints, it should be
treated as a Category C, but kept separate from screened Category C CEDs.
I-37.When CEDs are evacuated from any echelon, a document transmittal
sheet is used (Figure I-2). A separate transmittal document is prepared for
each group of CEDs to be evacuated. The sending unit prepares a separate
transmittal document for each separate addressee. The transmittal
identification number is recorded in the captured document log (Figure I-3)
as part of the entry for each captured document. Copies of all translations
should accompany the documents to avoid duplication of effort. If the sending
unit submitted intelligence reports electronically, it should note the report
number or include a copy of the report with the document to avoid duplicate
reporting.
I-38.All CEDs being evacuated must be accompanied with the appropriate—
• Technical document (TECHDOC) cover sheet.
• SECRET cover sheet on Categories A and B documents.
• Translation reports and hardcopy reports accompanying translated
documents.
• Captured document tags.
JOINT DOCUMENT EXPLOITATION FACILITY
I-39.The Theater MI brigade or group is normally tasked with the
establishment of the theater JDEF. The JDEF is staffed by Army linguists,
supported by technical experts from the Army and from the other services,
and supplemented as required by military and civilian contract translators.
The JDEF will normally contain MI experts from SIGINT, CI, TECHINT,
and other areas as required to identify and exploit documents of interest to
these specialties.
I-40.Military and civilian translators must have security clearances
appropriate to their mission requirements. This normally equates to at least
a Secret clearance since the translators must be made aware of US collection
requirements to facilitate their work. The JDEF performs a final
examination of all documents of possible theater intelligence value before
storing or evacuating them. The DIA sets procedures for exploitation of
documents above theater Army level. |
2-22.3 | 328 | FM 2.22.3 _________________________________________________________________________________
DOCUMENT PROCESSING (RECOVERY AND TRANSLATION)
I-41.Units must normally process documents prior to exploiting them.
Document processing includes the translation of foreign language documents
into English, the recovery of damaged documents, the decryption of
encrypted documents, and the extraction of documents from electronic media
such as the extraction or downloading of files from a computer disc or hard
drive. This need for processing frequently limits the amount of DOCEX that
can be done outside a DOCEX facility.
DOCUMENT RECOVERY
I-42.At a minimum, the JDEF manning includes teams trained in extracting
and downloading information from electronic media such as computer hard
drives. These individuals work in conjunction with TECHINT personnel
responsible for the evaluation of captured computer hardware and software.
These teams are prepared to deploy forward as necessary to accomplish their
mission.
DOCUMENT TRANSLATION
I-43.Translations are not intelligence information reports. They are,
however, often a precondition for DOCEX. Once translated, intelligence
information can be extracted and reported on an IIR, SALUTE, or similar
report. A translation should accompany the original foreign language
document; a copy of the translation should accompany any copies of the
original foreign language document and, as required, the intelligence reports.
A translation report should contain the following information:
• Where the report will be sent.
• Which element prepared the report.
• DTG of the document translation.
• Report number as designated by local SOPs.
• Document number taken from the captured document tag.
• Document description including type of document, number of pages,
physical construction of document, and enemy identification number, if
applicable.
• Original captured document language.
• DTG document was received at element preparing the report.
• DTG document was captured.
• Place document was captured.
• Identity of capturing unit.
• Circumstances under which document was captured.
• Name of translator. |
2-22.3 | 329 | _________________________________________________________________________________FM 2-22.3
• Type of translation: full, extract, or summary.
• Remarks for clarification or explanation, including the identification of
the portions of the document translated in an extract translation.
• Classification and downgrading instructions in accordance with
AR 380-5.
TYPES OF TRANSLATION
I-44.There are three types of translations:
• Full—one in which the entire document is translated. This is both time
and manpower intensive, especially for lengthy or highly technical
documents. Normally only a DOCEX facility at theater or national
level will do full translations, and then only when the value of the
information, technical complexity, or political sensitivity of the
document requires a full translation. Even when dealing with Category
A documents, it may not be necessary to translate the entire document
to gain the relevant information it contains.
• Extract—one in which only a portion of the document is translated. For
instance, a TECHINT analyst may decide that only a few paragraphs
in the middle of a 600-page helicopter maintenance manual merit
translation, and that a full translation is not necessary. The analyst
would request only what he needed.
• Summary—one in which a translator begins by reading the entire
document. He then summarizes the main points of information instead
of rendering a full or extract translation. A summary translation is
normally written, but may be presented orally, particularly at the
tactical level. Summary translations may be done as part of the
document screening process. A summary translation requires a
translator have more analytical abilities. The translator must balance
the need for complete exploitation of the document against time
available in combat operations. Translators working in languages of
which they have a limited working knowledge may also use a summary
translation. For instance, a Russian linguist may not be able to
accurately deliver a full translation of a Bulgarian language document.
However, he can probably render a usable summary of its content.
TRANSLATOR SUPPORT TO DOCEX
I-45.When HUMINT collectors are not available due to shortages or other
mission requirements, DOCEX can be performed by military or civilian
linguists under the management of a cadre of HUMINT collectors.
SECURITY REQUIREMENTS
I-46.Document translators will usually need to have a clearance in order to
conduct document translation. An exception is that open-source document
translation does not require a security clearance unless the information
collected from the open-source documents is linked to specific US collection |
2-22.3 | 330 | FM 2.22.3 _________________________________________________________________________________
requirements, plans, or operations. In this case the translator will need a
clearance appropriate to the level of the particular contingency plan or
operation to which the information is linked. Individuals without a security
clearance should not be used in the exploitation of a closed source or CEDs.
By their very nature, the translation of these documents gives keys into the
level of US knowledge and the direction of US planning and intentions that
precludes their translation by individuals without a security clearance.
SOURCES OF TRANSLATORS
I-47.There are various sources that a commander can use to obtain the
linguists necessary to support DOCEX operations.
• RC and AC MI linguists. Dependent on their mission requirements,
any MI soldiers with the required language qualification may be used
as document translators. The advantage of using MI soldiers is that
they have the appropriate security clearance and have a firm grasp of
collection requirements. The DOCEX operation will usually require MI
officers to manage the administrative portions.
• Other linguists. Non-MI Army linguists include numerous soldiers who
have proficiency in a foreign language, regardless of MOS. US civilians
can be contracted to provide translator support as can local nationals.
Local national hires will provide the bulk of the translator support.
REQUIREMENTS FOR A DOCEX OPERATION
I-48.The number of personnel required to conduct DOCEX varies with the
echelon and with the volume of documents. Regardless of the size of the
operation, certain basic functions must occur:
• Supervision and Administration. These are the C2 and logistical
aspects of the DOCEX operation that ensure that operations are
smooth and uninterrupted.
• Accountability. Accountability includes logging documents in and out,
copying documents as required, storing documents, receiving and
transmitting documents, maintaining files, and other routine
activities. This ranges from a parttime task for one individual at a low
echelon, to warehouse-sized operations involving tons of documents at
an EAC document repository.
• Screening. Screening involves the review and categorization of all
documents, the prioritization for translation and exploitation, and the
identification of documents for special handling and immediate
transmittal to specialized units for exploitation. Screening requires
senior, experienced individuals well versed in the target language and
the collection requirements, capable of making rapid decisions based
on minimal information. The number of screeners required depends on
the document flow that may range from only a few per day at a low
echelon, to literally thousands of documents a day at a theater-level
activity. |
2-22.3 | 331 | _________________________________________________________________________________FM 2-22.3
• Security Requirements. Security requirements include ensuring that
the personnel dealing with the documents have the appropriate
security level and that they do not pose a security risk to the US. This
is particularly important when dealing with non-US translators.
Security also evolves ensuring that the documents are marked in
accordance with regulation and that proper security measures are in
place to prevent compromise of information. At higher echelons,
dealing with large numbers of non-US translators normally requires a
designated CI team conducting recurring personnel security
evaluations.
• Translation. This function involves the directed translation of
documents from the target language to English. It requires personnel
with the appropriate clearance level who have a working idiomatic
knowledge of the target language and English. Higher echelon
activities, such as the EAC document repository, group their
translation efforts by subject area. For example, one person or group
could translate all medical-related documents. At lower echelons, the
translators require a more general knowledge. At lower echelons, the
same person may translate a document, extract the pertinent
information, and report that information. At higher echelons, these are
often separate functions.
• Exploitation and Reporting. This task is the identification and
extraction of information in response to collection requirements and
requires a high level of expertise. The individual must be totally
knowledgeable of collection requirements and must be able to readily
identify indicators of activity or identify the significance of minute
pieces of information that could contribute to answering requirements.
Reporting involves placing that extracted information into a coherent,
properly formatted report so that the all-source analyst can add it to
the intelligence picture.
• Quality Control. This aspect includes ensuring that all aspects of the
DOCEX operation⎯including accounting for, screening, translating,
exploiting, and reporting––are functioning correctly.
REPORTING
I-49.Information collected from documents is normally reported in a
SALUTE report or an IIR. Reporting through other reporting formats is
discouraged. Intelligence reports are normally forwarded electronically or as
otherwise directed by SOPs and operational instructions. Normally an
electronic or hardcopy file of each report is maintained at the unit of origin;
one electronic or hardcopy is submitted through intelligence reporting
channels; and one is forwarded with evacuated documents to the next unit to
receive the document to prevent redundant reporting. In the event that the
document itself cannot be evacuated in a timely manner, a verified copy of a
translation report can be forwarded separately from the original document to
an exploitation agency. |
2-22.3 | 332 | FM 2.22.3 _________________________________________________________________________________
DOCUMENT EXPLOITATION IN SUPPORT OF HUMINT COLLECTION
I-50.Documents found on detainees, including EPWs––that can be exploited
more efficiently when combined with HUMINT collection––are forwarded
with the detainee to the next echelon in the EPW/detainee evacuation
channel. In exceptional cases, documents may be evacuated ahead of the
EPW or other detainee for advance study by intelligence units. A notation
should be made on the EPW’s capture tag or accompanying administrative
papers about the existence of such documents and their location if they
become separated from the detainee.
SOURCE-ASSOCIATED DOCUMENTS
I-51.Documents captured on or in association with a human source play an
important role in the HUMINT collection process. These documents may
contain reportable information the same as with any other CED. The
information is immediately extracted from the documents and forwarded in
the appropriate intelligence report. In addition to reportable information,
documents (in particular personal documents) may provide valuable insight
into the attitude and motivation of the source and can be effectively used by
the HUMINT collector in the approach process (see Chapter 8). Guidelines
for the disposition of the detainee's documents and valuables are set by
international agreements and discussed in more detail in AR 190-8 and
FM 19-4.
I-52.The capturing unit removes all documents, with the exception of the
source's primary identification document, from an EPW or other detainee to
prevent their destruction. These are placed in a waterproof container
(usually a plastic bag) and Part C of the capture tag is placed in the bag.
Documents from each source should be placed in a separate bag. These
documents are turned over to the first MP EPW handling unit in the chain of
command. The MPs will inventory all documents and prepare a handreceipt
and provide a copy to the EPW or detainee.
I-53.To ensure proper handling and expeditious disposition of these
documents, the first HUMINT collection element to see the detainee should
review the documents as part of the source screening process. If an official
document is confiscated and evacuated through MI channels, the HUMINT
collector must obtain a receipt for that document from the MPs. If possible,
the HUMINT collection unit copies any documents that contain information
of intelligence interest and forwards the copies through MI channels. With
the exception of an identification document, documents are normally kept
separate from the detainee until the detainee arrives at a permanent
confinement facility, at which time documents are returned to them per AR
190-8.
I-54.Three possible actions may be taken with documents captured with a
source. The documents may be confiscated, impounded, or returned to the
source. |
2-22.3 | 333 | _________________________________________________________________________________FM 2-22.3
Confiscated
I-55.Documents confiscated from a source are taken away with no intention
of returning them. Official documents, except identification documents, are
confiscated and appropriately evacuated. The intelligence value of the
document should be weighed against the document's support in the HUMINT
collection of the source. The HUMINT collector must comply with the
accounting procedures established for CEDs by the MPs in accordance with
AR 190-8.
Impounded
I-56.Some CEDs will contain information that must be exploited at higher
echelons. These documents may be impounded by the HUMINT collector and
evacuated through intelligence channels. The HUMINT collector must issue
a receipt to the source for any personal documents that he impounds. He
must comply with the accounting procedures established for CEDs
impounded by the MPs in accordance with AR 190-8. When a CED is
impounded, it is taken with the intent of eventual return. Personal
documents with military information will be impounded if the military value
is greater than the sentimental value. An example of a personal document
whose military value might outweigh the sentimental value could be a
personal photograph that includes military installations or equipment.
I-57.When a CED is impounded, it must be receipted. The receipt will
include an itemized list of all the items taken from the prisoner, and the
name, rank, and unit of the person issuing the receipt. Items of high value
may be impounded for security reasons. For instance, an EPW or detainee
apprehended with an unusually large amount of money would have the
money impounded and receipted. The MPs will establish and maintain a DA
Form 4237-R (Detainee Personnel Record) for impounded items. The register
will identity the owner of the impounded items and provide a detailed
description of the items impounded. A receipt will be given to anyone who
has items impounded. Also, the OIC or authorized representative will
complete and sign DA Form 1132-R (Prisoner's Personal Property List –
Personal Deposit Fund). A copy will be provided the source. See AR 190-8 for
procedures on handling personal effects.
Returned
I-58.Returned CEDs are usually personal in nature. They are taken only to
be inspected for information of interest and are given back to the source.
Personal documents belonging to a source will be returned to the source after
examination in accordance with the GPW. These documents are CEDs whose
sentimental value outweighs their military value and may be returned to the
source. Copies of these documents may be made and forwarded if deemed
necessary. Except for an identification document (which is always returned
to the source), documents are evacuated with the source, rather than on the
source, until the source reaches a permanent confinement facility at EAC. |
2-22.3 | 335 | FM 2-22.3
Appendix J
References
The following references are provided to assist HUMINT collectors, commanders, and
trainers in obtaining regulatory guidance for HUMINT collection operations. These and
other references are in the bibliography.
1. AR 350-1. Army Training and Education. 9 April 2003.
2. AR 380-5. Department of the Army Information Security Program. September 2000.
3. AR 380-10. Technology Transfer, Disclosure of Information, and Contacts with Foreign
Representatives. 15 February 2001.
4. AR 380-15. (C) Safeguarding NATO Classified Information. 1 March 1984.
5. AR 380-28. Department of the Army Special Security System. 12 December 1991.
6. AR 380-40. Policy for Controlling and Safeguarding Communications Security (COMSEC)
Material. 22 October 1990.
7. AR 380-49. Industrial Security. 15 April 1982.
8. AR 380-53. Telecommunications Security Monitoring. 29 April 1998.
9. AR 380-67. Personnel Security Program. 9 September 1988.
10. AR 381-1. Security Controls on Dissemination of Intelligence Information.
12 February 1990.
11. AR 381-10. U.S. Army Intelligence Activities. 1 July 1984.
12. AR 381-12. Subversion and Espionage Directed Against the US Army (SAEDA).
15 January 1993.
13. AR 381-14. Technical Counterintelligence (TCI). 30 September 2002.
14. AR 381-20. (U) US Army Counterintelligence Activities (S). 26 September 1986.
15. AR 381-45. Investigative Records Repository. 25 August 1989.
16. AR 381-47. (U) US Army Offensive Counterespionage Activities (S). 30 July 1990.
17. AR 381-100. (U) Army Human Intelligence Collection Program (S). 15 May 1988.
18. AR 381-102. (U) US Army Cover Support Program (S). 10 January 1991.
19. AR 381-143. Military Intelligence Nonstandard Material Policies and Procedures.
1 December 1986. |
2-22.3 | 336 | FM 2-22.3 _________________________________________________________________________________
20. AR 381-172. Counterintelligence Force Protection Source Operations and Low-Level Source
Operations. 30 December 1994.
21. AR 614-115. Military Intelligence Excepted Career Program. 12 April 2004.
22. AR 614-200. Military Intelligence Civilian Excepted Career Program. 30 September 2004.
23. DA Pam 381-15. Foreign Military Intelligence Collection Activities Program. 1 June 1988.
24. Executive Order 12333. United States Intelligence Activities. 4 December 1981.
25. DOD Directive 2310.1. DOD Program for Enemy Prisoners of War (EPOW) and Detainees
(Short Title: DOD Enemy POW Detainee Program). 18 August 1994.
26. DOD Directive 3115.09. DOD Intelligence Interrogations, Detainee Debriefings, and
Tactical Questioning. 3 November 2005.
27. DOD Directive 5100.77. DOD Law of War Program. 9 December 1998.
28. DOD Directive 5240.1. DOD Intelligence Activities. 3 December 1982.
29. DOD Instruction 3020.41. Contractor Personnel Authorized to Accompany the U.S. Armed
Forces. 3 October 2005.
30. The Under Secretary of Defense for Intelligence (USD(I) Memorandum, Guidance for the
Conduct and Oversight of Defense Human Intelligence (HUMINT) (U). 14 December 2004.
31. USD(I) Memorandum, Implementation Instructions for USD(I) Memorandum, Guidance
for the Conduct and Oversight of Defense Human Intelligence HUMINT (U). 7 September
2005.
32. DOD Regulation 5240.0-R. Procedures Governing the Activities of DOD Intelligence
Components That Affect United States Persons. December 1982.
33. Detainee Treatment Act of 2005, Public Law No. 109-163, Title XIV.
Further information and links to many of the above publications can be found at:
http://www.dami.army.pentagon.mil/offices/dami-cd/
ARTEPS, MTPs, and other intelligence training products are available at the Reimer
Digital Library http://www.adtdl.army.mil. |
2-22.3 | 337 | FM 2-22.3
Appendix K
Contract Interrogators
INTRODUCTION
K-1. Contractors are used increasingly to augment existing capabilities and
bridge gaps in the deployed force structure. With the increased use of
contractors comes the need to identify the doctrine and procedures affecting
their employment. Leaders and those working with contractors must
understand that contractors are civilians authorized to accompany the force
in the field and should be provided with an ID card as proof of their
authorization. In accordance with GPW Article 4, contractors are to be
accorded POW status if captured.
KEY TERMS
K-2. Contract Interrogator. A contract interrogator is a contractor who is
specifically trained and DOD certified for, tasked with, and engages in the
collection of information from individuals (HUMINT sources) for the
purpose of answering intelligence information requirements. Their
operations must be conducted in accordance with all applicable law and
policy. Applicable law and policy include US law; the law of war; relevant
international law; relevant directives including DOD Directive 3115.09,
“DOD Intelligence Interrogations, Detainee Debriefings, and Tactical
Questioning”; DOD Directive 2310.1E, “The Department of Defense
Detainee Program”; DOD instructions; and military execute orders
including FRAGOs. Contract interrogators will operate only in fixed
facilities and not in tactical operations. See DOD Instruction 3020.41 for
additional information.
K-3. External Support Contractor. Contract interrogators fall into the
category of External Support Contractor. They work under contracts
awarded by contracting officers serving under the command and
procurement authority of supporting headquarters outside the theater.
Their support augments the commander's organic capability.
K-4. Contracting Officer Representative (COR). A COR is the
contracting officer’s designated representative who assists in the technical
monitoring and administration of a contract. Typically, a COR is
responsible for assisting the contracting officer in contractor-employee day-
to-day management of issues that may affect contractor or unit
requirements.
K-5. Statement of Work (SOW) or Performance Work Statement:
• Contractor roles and functional requirements, as well as security
issues and the relationship to the military chain of command, must be
accurately and adequately defined in the SOW. The SOW should
include a description of the essential service and require the contractor |
2-22.3 | 338 | FM 2-22.3 _________________________________________________________________________________
to prepare contingency plans to reasonably ensure continuation.
Contractors are required to perform all tasks identified within the
SOW and all other provisions defined within the contract. The SOW
may also stipulate the appointment of a senior contractor at each
echelon or facility to be the point of contact for the commander and the
COR for resolving contract performance and scheduling challenges.
• The contract must stipulate whether the duty of a senior contractor is
an additional duty or the full-time job of the selected contractor.
Considering that contractors are “managed” rather than “commanded,”
having a senior contractor will assist the commander in managing the
contract. Without an onsite contractor supervisor, the default chain of
command for contract interrogators might otherwise reside in CONUS,
at the contractor’s headquarters.
CIVILIAN STATUS
K-6. A contract employee cannot be made to engage in any activity
inconsistent with his civilian status such as serving as a crew member on a
weapon system. Interrogations are presumptively consistent with civilian
contractor status, but other tasks should be vetted with the command’s
legal advisor to ensure they are legally permissible.
COMMAND CONSIDERATIONS
K-7. Theaters in which large-scale operations are conducted are very likely
to employ contract interrogators, due to limited numbers of Army HUMINT
collectors available. The presence of contractors in the AO adds an
additional dimension to the commander’s planning process. Force protection
is a critical issue. Even in "permissive" environments such as in the case of
humanitarian operations, contractors may be placed in danger. The
commander must protect his contractors since they have limited capacity to
protect themselves.
K-8. The commander has no command authority over contractor personnel.
Their relationship with the Government is governed by the terms and
conditions of their contract. In short, the commander must "manage"
contractor personnel through the contracting process. He has no authority
to command or discipline them unless it is a declared war, at which time
contractors may fall under the provisions of the UCMJ. This distinction
between command and management does not prohibit the commander from
directing contractors to carry out essential activities, such as activities
related to security and safety, consistent with the terms of their contracts.
K-9. The terms and conditions of any contract must be constructed so as to
include provisions requiring contractor personnel to abide by all guidance
and obey all instructions and general orders applicable to US Armed Forces
and DOD civilians including those issued by the Theater Commander. The
contractor can be required to "take reasonable steps" to ensure his
personnel comply with the above and to ensure "the good conduct" of his
employees. Furthermore, the contractor can be required to promptly
resolve, to the satisfaction of the COR, all contractor employee performance
and conduct problems identified by the COR. The COR can direct the |
2-22.3 | 339 | _________________________________________________________________________________FM 2-22.3
contractor, at the contractor's expense (for example, a non-allowable charge
to the contract) to remove and replace any contractor employee failing to
comply with the above. This provides a significant tool to aid in achieving
good order and discipline within an AO. The commander also has the
authority to initiate proceedings that could lead to charges under Military
Extraterritorial Jurisdiction Act (MEJA) or the War Crimes Act.
K-10. Contractors will be subject to the extraterritorial jurisdiction of the
United States and will comply with all applicable law and policy. Applicable
law and policy include US law; the law of war; relevant international law;
relevant directives including DOD Directive 3115.09, “DOD Intelligence
Interrogations, Detainee Debriefings, and Tactical Questioning”; DOD
Directive 2310.1E, “The Department of Defense Detainee Program”; DOD
instructions; and military execute orders including FRAGOs. Contractor
misconduct may be subject to prosecution under federal jurisdiction
pursuant to the MEJA or the War Crimes Act, or both. Procedures for
initiating investigation into such misconduct will normally be established
by the operational command.
K-11. The operational command will also establish procedures for referral
to federal civilian authorities and necessary pre-trial confinement.
Contractors normally will also be subject to the criminal jurisdiction of the
HN unless granted immunity from jurisdiction through the provisions of a
SOFA or equivalent agreement, or unless the HN waives jurisdiction. As a
general rule, contractors are not subject to the UCMJ (with the possible
exception for periods of formally declared war).
K-12. The commander should expect contractors to use all means at their
disposal to continue to provide essential services, in accordance with the
terms and conditions of contracts, until the military releases them. The
combatant commander determines when to execute contingency plans for
essential services and when to release a contractor.
INTERROGATOR CONTRACT CONSIDERATIONS
K-13. Contracts should be written with the following principles and
considerations:
• Contractors will be deployable under all operational scenarios. They
will be subject to the same time-phased force deployment data
requirements as deploying military units.
• The contractor information system will interface with the Standard
Army Management Information System at both retail and wholesale
levels. Army units should not have to contend with two separate
information systems.
• The contractors will provide interrogation support at fixed facilities as
needed. During deployments, the commander (subject to contract terms
and conditions) will determine where contractors operate in their AO.
• The contractors will not replace force structure. They will augment
Army capabilities and provide an additional option for meeting support
requirements. |
2-22.3 | 340 | FM 2-22.3 _________________________________________________________________________________
• Force protection, including the protection of contractors, is the
responsibility of commanders.
• The unit must integrate contractor support into the overall support
plan. Transportation of contractors on the battlefield must be planned.
• Command and control of contract personnel is dependent upon terms
and conditions of the contract. The contracting officer or his designated
representative is the appointed liaison for monitoring contractor
performance requirements and will ensure that contractors move
material and personnel according to the combatant commander’s plan.
A good technique is for the command to designate and train a unit
COR or Contracting Officer’s Technical Representative (COTR) at each
facility where contract interrogators will be working. Because
international and domestic law, including SOFAs, affect the
relationship between commanders and contract personnel,
commanders and CORs should seek legal advice concerning issues
arising during operations.
• The unit must establish a contractor personnel reporting and
accountability system. Again, a good technique is for the command to
designate and train a unit COR or TCOR at each facility where
contract interrogators will be working.
• During deployments, contractors will live and work in field conditions
comparable to those for the supported ARFOR. Living arrangements,
transportation requirements, food, medical, and other support services
will be provided according to the contract. These services may include
but are not limited to––
Non-routine medical and dental care.
Mess.
Quarters.
Special clothing, equipment, weapons, or training mandated by the
applicable commander.
Mail.
Emergency notification.
• Planning must be accomplished to ensure agreed upon support to
contractors is available to the responsible commander.
CONTRACT INTERROGATOR REQUIREMENTS
SELECTION AND EMPLOYMENT CRITERIA
K-14. Contract personnel must meet certain minimum requirements to be
qualified to work as contract interrogators. It is the responsibility of the
hiring contracting company to ensure that these criteria, set by the
Government, are met by the personnel they hire.
K-15. Policy will dictate employment criteria such as minimum education,
military service, security clearance, and previous training. Certain civilian
experience and training may also meet the policy requirements for contract |
2-22.3 | 341 | _________________________________________________________________________________FM 2-22.3
interrogator qualifications. Commanders and CORs should refer to the
current DA policy on contract interrogators for appropriate guidance.
TRAINING REQUIREMENTS
K-16. All contractor interrogators must successfully complete a training
program approved by the United States Army Intelligence Center and Fort
Huachuca, or the Defense HUMINT Management Office, which will serve
as validation to perform MI interrogations (see DODD 3115.09). The
organization Commander or Director initiating the contract must certify
that the training has been completed. The training program will ensure
that contract interrogators are trained and certified on—
• The most current TTP of interrogation as promulgated by DOD.
• The applicable law and policy related to the treatment of detainees.
Applicable law and policy include US law; the law of war; relevant
international law; relevant directives including DOD Directive
3115.09, “DOD Intelligence Interrogations, Detainee Debriefings, and
Tactical Questioning”; DOD Directive 2310.1E, “The Department of
Defense Detainee Program”; DOD instructions; and military execute
orders including FRAGOs.
K-17. Contract interrogators must also receive training on the supported
unit’s mission and Interrogation Counter-Resistance Policy pertinent to the
AOR they are supporting. This training will be conducted in-theater by the
gaining unit.
EQUIPMENT
K-18. Contractors must be issued personal protection gear appropriate for
the threat environment. This may include ballistic helmet, personal body
armor, NBC protective gear, and in certain circumstances a personal
weapon. Contract interrogators must have access to automation equipment
to support their mission of intelligence collection and reporting.
UTILIZATION
K-19. Only trained and certified contractors working under the supervision
of MI personnel are authorized to conduct interrogations. Contract
interrogators may conduct interrogations with an interpreter in the room;
however, an OIC or NCO will monitor the interrogation by personal
presence or by means of live video camera feed.
K-20. Contract interrogators—
• Will not supervise any military personnel or federal government
employees, nor will they be in charge of interrogation facilities.
• Will operate only in fixed facilities. This requirement provides a
measure of force protection to the contract interrogator and frees up
Army HUMINT collectors for tactical missions.
• Must submit a written interrogation plan to the OIC or NCOIC, and
receive approval for the plan, in advance of each interrogation. The
plan will specify the information desired and identify what techniques |
2-22.3 | 342 | FM 2-22.3 _________________________________________________________________________________
and approaches for obtaining information will be used to conduct the
interrogations.
WORK LOCATIONS
K-21. The commander may position contract interrogators in fixed
detention facilities anywhere in the theater, in accordance with the terms
and conditions of their contract.
ATTIRE
K-22. Contractors accompanying the force should be visibly distinct from
soldiers so as not to jeopardize their status. The JTF or combatant
commander may direct contract personnel to wear civilian clothing or a
uniform that says “civilian.” Specific items of military attire required for
safety or security may also be worn, such as chemical defense equipment,
cold weather equipment, or mission specific safety equipment.
FIRE ARMS
K-23. A contractor authorized to accompany the force in the field is not
entitled to be issued a firearm. However, a contract employee may be armed
only if all of following conditions are met:
• The theater commander grants his approval.
• The employee's corporate policy allows it.
• The employee agrees.
K-24. If all three conditions are met, then the employee must pass proper
military side-arm training and will be issued a military specification
weapon and ammunition (generally, a 9-millimeter pistol) for personal
protection. The contractor must also comply with all applicable DOD,
service, and local command policies on weapons.
RECOMMENDED READING
DOD Instruction 3020.41. Contractor Personnel Authorized to
Accompany the U.S. Armed Forces. 3 October 2005.
AR 715-9. Contractors Accompanying the Force. 29 October 1999.
DA Pamphlet 715-16. Contractor Deployment Guide. 27 February
1998.
FM 3-100.21. Contractors on the Battlefield. 3 January 2003.
FM 63-11. Logistics Support Element Tactics, Techniques, and Procedures.
8 October 1996.
AMC Pamphlet 715-18. AMC Contracts and Contractors Supporting
Military Operations. June 2000. |
2-22.3 | 343 | FM 2-22.3
Appendix L
Sample Equipment for HCT Operations
L-1. This materiel and equipment list is provided as a sample of what an
HCT may require to support the commander’s intelligence requirements.
Some of the equipment that is intended to be given to a source should be
considered expendable.
L-2. HCT Kit Bag - Assumes four-person configuration for each echelon.
Regardless of support relationship (Organic/DS/GS/GSR), HCTs inherently
require the following.
L-3. Movement/Survivability/Security:
• Two M998 1-¼ ton vehicle (or non-tactical vehicle as appropriate for
mission) per team.
• One crew/squad served weapon per team.
• One M16A2 per team.
• Three M4s per team.
• Four 9mms per team.
• M68 Aim-point System.
• One x body armor with protective plate per team member.
L-4. Collection and Reporting System - Hardware 1 x System per HCT:
• Scaleable collection and reporting tool that changes configuration
depending on where it is on the battlefield.
• Should include an individual collection and reporting tool.
• Should include a tool for stand-alone SIPRNET connectivity via satellite
or other.
L-5. Collection and Reporting System - Software 1 x per System:
• Simple, intuitive Graphic User Interface (GUI).
• Standardized Reports - SALUTE, IIR, Tactical Interrogation Report,
Contact Report, BSD Report. (Policy states that once filled out, the BSD
becomes classified; therefore, change policy or make the collection or
reporting tool classified as well.)
• Source Management Tool.
• CI Investigations Reports.
• Link Analysis (capable of interface with coalition systems––in this case,
Analyst Notebook).
• Mapping - Single, standardized tool (down to 1:12,500 scale maps,
operational graphics, GPS interface). |
2-22.3 | 344 | FM 2-22.3 _________________________________________________________________________________
• Biometrics Integration/Biometrics Enrollment Tools (Integrated
Automated Fingerprint Identification System [IAFIS]-compliant 10-print
fingerprint scanners, iris scanners, photographing station).
• Basic DOCEX application.
• Foreign Language Translation.
• Mission Planning Software.
• Query Tools: basic, advanced, multi-entity, multi-media, save user-
defined queries.
L-6. Collection and Reporting System - Peripherals 1 x HCT:
• Digital video/still.
• Printer with print and scanner head (photo quality with ports for flash
cards/memory sticks).
• Separate collection kit for biometrics (ink/card packets and/or IAFIS-
compliant live scanner, iris scanner). Must be FBI compliant and
portable).
• GPS.
• Digital voice recorder (Universal Serial Bus [USB] interface).
L-7. Communications - Requires organic communications systems to higher
and laterally (non-line of sight and line of sight):
• Intra-team communications - 1 x individual:
Secure or nonsecure (prefer secure).
Hands-free and/or handheld.
• Team to all - 1 x HCT:
Secure.
FM/UHF/Microwave.
Line of sight.
Non-line of sight.
Voice.
Digital.
Cellular telephone:
-Voice.
-Backup for transmitting data.
- GPS enabled.
Friendly force identification and tracking system.
• HCT to Source - 2 sets x HCT:
Phone cards.
Cell phones.
Radios.
Email or “Blackberry-like” communications.
One-way pager.
Clandestine signaling. |
2-22.3 | 345 | _________________________________________________________________________________FM 2-22.3
L-8. Source Support - 2 sets x HCT:
• Source tracking (blue-force tracker-like capability).
• Digital Voice Recorder (micro, USB interface).
• Digital video or still camera, with telephoto lenses.
• GPS.
• 1 x 1Gb Thumb Drive.
L-9. Data Storage - 1 x HCT:
• 2 x hard drives (one for UNCLASS, one for SECRET).
• 2 x Micro/Thumb, 1Gb drive (one for UNCLASS, one for SECRET).
L-10. Power Generation - 1 x liquid fuel generator or high-capacity (12
hour) (battery - silent, vehicle recharge), power source - 1 x HCT.
L-11. 1 x Universal Power Conversion Kit per HCT and OMT.
L-12. Vision Enhancement:
• 2 x night vision goggles (NVG) per HCT.
• 1 x thermal sensor per HCT.
• 1 x binoculars per individual (4 each).
• 1 x laser range finder per HCT. |
2-22.3 | 347 | FM 2-22.3
Appendix M
Restricted Interrogation Technique – Separation
INTRODUCTION
M-1. As part of the Army's efforts to gain actionable intelligence in the war
on terrorism, HUMINT collectors may be authorized, in accordance with this
appendix, to employ the separation interrogation technique, by exception, to
meet unique and critical operational requirements. The purpose of separation
is to deny the detainee the opportunity to communicate with other detainees
in order to keep him from learning counter-resistance techniques or
gathering new information to support a cover story; decreasing the detainee's
resistance to interrogation. Separation, further described in paragraphs M-2
and M-28, is the only restricted interrogation technique that may be
authorized for use. Separation will only be used during the interrogation of
specific unlawful enemy combatants for whom proper approvals have been
granted in accordance with this appendix. However, separation may not be
employed on detainees covered by Geneva Convention Relative to the
Treatment of Prisoners of War (GPW), primarily enemy prisoners of war
(EPWs). The separation technique will be used only at COCOM-approved
locations. Separation may be employed in combination with authorized
interrogation approaches—
• On specific unlawful enemy combatants.
• To help overcome resistance and gain actionable intelligence.
• To safeguard US and coalition forces.
• To protect US interests.
GENERAL
M-2. This appendix provides doctrinal guidance for the use of separation as
an interrogation technique. Separation involves removing the detainee from
other detainees and their environment, while still complying with the basic
standards of humane treatment and prohibitions against torture or cruel,
inhuman, or degrading treatment or punishment, as defined in the Detainee
Treatment Act of 2005 and addressed in GPW Article 3 (Common Article III).
Separation is to be distinguished from segregation, which refers to removing
a detainee from other detainees and their environment for legitimate
purposes unrelated to interrogation, such as when necessary for the
movement, health, safety and/or security of the detainee, or the detention
facility or its personnel. This appendix—
• Will be reviewed annually and may be amended or updated from time
to time to account for changes in doctrine, policy, or law, and to address
lessons learned.
•
Is not a stand-alone doctrinal product and must be used in conjunction
with the main portion of this manual. |
2-22.3 | 348 | FM 2-22.3_________________________________________________________________________________
M-3. Careful consideration should be given prior to employing separation as
an interrogation technique in order to mitigate the risks associated with its
use. The use of separation should not be confused with the detainee-handling
techniques approved in Appendix D. Specifically, the use of segregation
during prisoner handling (Search, Silence, Segregate, Speed, Safeguard, and
Tag [5 S's and a T]) should not be confused with the use of separation as a
restricted interrogation technique.
M-4. Members of all DOD Components are required to comply with the law of
war during all armed conflicts, however such conflicts are characterized, and
in all other military operations. Proper application of separation as a
restricted interrogation technique in selective cases involving specific
unlawful enemy combatants and in accordance with the safeguards outlined
in this manual is consistent with the minimum humane standards of
treatment required by US law, the law of war; and does not constitute cruel,
inhuman, or degrading treatment or punishment as defined in the Detainee
Treatment Act of 2005 and addressed in GPW Common Article III.
M-5. Use of separation for interrogation is authorized by exception.
Separation will be applied on a case-by-case basis when there is a good basis
to believe that the detainee is likely to possess important intelligence and the
interrogation approach techniques provided in Chapter 8 are insufficient.
Separation should be used as part of a well-orchestrated strategy involving
the innovative application of unrestricted approach techniques. Separation
requires special approval, judicious execution, special control measures, and
rigorous oversight.
M-6. Additionally, the use of separation as a restricted interrogation
technique shall be conducted humanely in accordance with applicable law
and policy. Applicable law and policy for purposes of this appendix include
US law; the law of war; relevant international law; relevant directives
including DOD Directive 3115.09, “DOD Intelligence Interrogations, Detainee
Debriefings, and Tactical Questioning”; DOD Directive 2310.1E, “The
Department of Defense Detainee Program”; DOD instructions; and military
execute orders including FRAGOs.
M-7. More stringent than normal safeguards must be applied when using the
separation technique. Use of separation is subject to USD(I) oversight.
Compared to approach techniques, there are two additional steps in the
approval process (see Figure M-l) for the use of the separation technique:
• First, the COCOM Commander approves (after SJA review) use of the
separation technique in theater.
• Second, following the COCOM Commander's approval, the first
General Officer/Flag Officer (GO/FO) in an interrogator's chain of
command approves each specific use of separation and the
interrogation plan that implements separation (this is non-delegable).
Interrogation supervisors shall have their servicing SJA review the
interrogation plan before submitting it to the GO/FO for approval. |
2-22.3 | 349 | _________________________________________________________________________________FM 2-22.3
SSSeeepppaaarrraaatttiiiooonnn TTTeeeccchhhnnniiiqqquuueee AAApppppprrrooovvvaaalll
CCCCCOOOOOCCCCCOOOOOMMMMM CCCCCooooommmmmmmmmmaaaaannnnndddddeeeeerrrrr
UUUUUSSSSSDDDDD(((((IIIII)))))
AAAAApppppppppprrrrrooooovvvvveeeeesssss ooooovvvvveeeeerrrrraaaaallllllllll uuuuussssseeeee ooooofffff
PPPPPrrrrrooooovvvvviiiiidddddeeeeesssss ooooovvvvveeeeerrrrrsssssiiiiiggggghhhhhttttt ooooofffff OOOOOSSSSSDDDDD PPPPPooooollllliiiiicccccyyyyy iiiiinnnnnttttteeeeerrrrrrrrrrooooogggggaaaaatttttiiiiiooooonnnnn aaaaapppppppppprrrrroooooaaaaaccccchhhhh ttttteeeeeccccchhhhhnnnnniiiiiqqqqquuuuueeeeesssss
iiiiinnnnn ttttthhhhheeeeeaaaaattttteeeeerrrrr.....
GGGGGOOOOO/////FFFFFOOOOO
AAAAApppppppppprrrrrooooovvvvveeeeesssss eeeeeaaaaaccccchhhhh iiiiinnnnnttttteeeeerrrrrrrrrrooooogggggaaaaatttttiiiiiooooonnnnn ppppplllllaaaaannnnn ttttthhhhhaaaaattttt iiiiinnnnncccccllllluuuuudddddeeeeesssss
AAAAAvvvvvaaaaaiiiiilllllaaaaabbbbbllllleeeee CCCCCOOOOOCCCCCOOOOOMMMMM-----aaaaauuuuuttttthhhhhooooorrrrriiiiizzzzzeeeeeddddd uuuuussssseeeee ooooofffff ssssseeeeepppppaaaaarrrrraaaaatttttiiiiiooooonnnnn.....
AAAAAdddddvvvvviiiiiccccceeeee::::: AAAAApppppppppprrrrrooooovvvvveeeeesssss aaaaallllllllll eeeeexxxxxttttteeeeennnnnsssssiiiiiooooonnnnnsssss ooooorrrrr aaaaaddddddddddiiiiitttttiiiiiooooonnnnnaaaaalllll iiiiittttteeeeerrrrraaaaatttttiiiiiooooonnnnnsssss.....
SSSSSJJJJJAAAAA,,,,,
BBBBBSSSSSCCCCC,,,,,
AAAAAnnnnnaaaaalllllyyyyyssssstttttsssss
IIIIInnnnnttttteeeeerrrrrrrrrrooooogggggaaaaatttttiiiiiooooonnnnn UUUUUnnnnniiiiittttt
RRRRReeeeevvvvviiiiieeeeewwwwwsssss iiiiinnnnnttttteeeeerrrrrrrrrrooooogggggaaaaatttttiiiiiooooonnnnn ppppplllllaaaaannnnnsssss ttttthhhhhaaaaattttt iiiiinnnnncccccllllluuuuudddddeeeee uuuuussssseeeee ooooofffff
CCCCCOOOOOCCCCCOOOOOMMMMM-----aaaaapppppppppprrrrrooooovvvvveeeeeddddd uuuuussssseeeee ooooofffff ssssseeeeepppppaaaaarrrrraaaaatttttiiiiiooooonnnnn..... PPPPPlllllaaaaannnnnsssss,,,,,
ppppprrrrreeeeepppppaaaaarrrrreeeeesssss,,,,, eeeeexxxxxeeeeecccccuuuuuttttteeeeesssss,,,,, aaaaannnnnddddd aaaaasssssssssseeeeesssssssssseeeeesssss ttttthhhhheeeeeiiiiirrrrr uuuuussssseeeee.....
IIIIInnnnnttttteeeeerrrrrrrrrrooooogggggaaaaatttttiiiiiooooonnnnn SSSSSuuuuupppppeeeeerrrrrvvvvviiiiisssssooooorrrrr
IIIIInnnnnttttteeeeerrrrrrrrrrooooogggggaaaaatttttooooorrrrr
RRRRReeeeevvvvviiiiieeeeewwwwwsssss iiiiinnnnnttttteeeeerrrrrrrrrrooooogggggaaaaatttttiiiiiooooonnnnn ppppplllllaaaaannnnn fffffooooorrrrr nnnnneeeeeccccceeeeessssssssssiiiiitttttyyyyy aaaaannnnnddddd
DDDDDeeeeevvvvveeeeelllllooooopppppsssss iiiiinnnnnttttteeeeerrrrrrrrrrooooogggggaaaaatttttiiiiiooooonnnnn ppppplllllaaaaannnnn bbbbbaaaaassssseeeeeddddd ooooonnnnn ssssscccccrrrrreeeeeeeeeennnnniiiiinnnnnggggg
aaaaapppppppppprrrrroooooppppprrrrriiiiiaaaaattttteeeeennnnneeeeessssssssss ooooofffff rrrrreeeeeqqqqquuuuueeeeesssssttttteeeeeddddd uuuuussssseeeee ooooofffff ssssseeeeepppppaaaaarrrrraaaaatttttiiiiiooooonnnnn.....
aaaaannnnnddddd aaaaasssssssssseeeeessssssssssmmmmmeeeeennnnnttttt ooooofffff sssssooooouuuuurrrrrccccceeeee’’’’’sssss iiiiinnnnnttttteeeeelllllllllliiiiigggggeeeeennnnnccccceeeee vvvvvaaaaallllluuuuueeeee
EEEEEnnnnnsssssuuuuurrrrreeeeesssss ttttthhhhhaaaaattttt ppppprrrrrooooopppppeeeeerrrrr sssssaaaaafffffeeeeeggggguuuuuaaaaarrrrrdddddsssss aaaaannnnnddddd sssssuuuuuppppppppppooooorrrrrttttt
aaaaannnnnddddd llllleeeeevvvvveeeeelllll ooooofffff cccccoooooooooopppppeeeeerrrrraaaaatttttiiiiiooooonnnnn.....
aaaaarrrrreeeee ssssstttttiiiiipppppuuuuulllllaaaaattttteeeeeddddd.....
Figure M-1. Separation Approval Process.
M-8. The employment of separation requires notification, acknowledgment,
and periodic review, in accordance with USD(I) Memorandum, "(S//NF)
Guidance for the Conduct and Oversight of Defense Human Intelligence
(HUMINT) (U)," dated 14 December 2004. This means that after the
separation is approved for use by COCOMs, the I&WS must be notified as
soon as practical. The Office of the Secretary of Defense will review these
activities periodically in accordance with DOD Directive 3115.09.
M-9. The planning process for the employment of standard interrogation
operations also applies to the employment of the separation technique
(see Chapter 4). |
2-22.3 | 350 | FM 2-22.3_________________________________________________________________________________
RESPONSIBILITIES
M-10. Commanders of interrogation or detention facilities and forces
employing the approved separation technique are responsible for compliance
with applicable law and policy. Commanders must understand that
separation poses a higher risk to the detainee than do standard techniques,
and so require strenuous oversight to avoid misapplication and potential
abuse.
M-11. The interrogation chain of command must coordinate the interrogation
plan with the detention operations commander. Close coordination must
occur between intelligence personnel and personnel responsible for detainee
operations, including MP, security forces, Master at Arms, and other
individuals providing security for detainees (hereafter referred to as guards).
Guards do not conduct intelligence interrogations and, in accordance with
DOD Directive 3115.09, will not set the conditions for interrogations. Guards
may support interrogators as requested for detainee custody, control, escort,
and/or additional security (for example, for combative detainees), in
accordance with paragraphs 5-57 through 5-66 and FM 3-19.40, JP 3-63, and
the approved interrogation plan.
M-12. The detention operations commander (in conjunction with the MI
commander) may convene a multidiscipline custody and control oversight
team including, but not limited to, MP, MI, BSC (if available), and legal
representatives. The team can advise and provide measures to ensure
effective custody and control in compliance with applicable law and policy.
M-13. Commanders must consider the following when employing separation:
• Is separation directed against the appropriate individual and is it
necessary for collecting important intelligence?
• Does separation complement the overall interrogation strategy and
interrogation approach technique or techniques?
• Is the application of separation with the specific detainee at issue
consistent with humane treatment and in accordance with applicable
law and policy?
M-14. Planning for the use of separation requires coordination with staff
elements that provide support to interrogation operations. Staff elements
that support interrogation facilities and forces employing separation will
comply with paragraphs 4-59 and 4-60 and all controls and safeguards
identified in paragraphs M-17 through M-26.
GENERAL CONTROLS AND SAFEGUARDS
HUMANE TREATMENT
M-15. All captured or detained personnel shall be treated humanely at all
times and in accordance with DOD Directive 3115.09, "DOD Intelligence
Interrogations, Detainee Debriefings, and Tactical Questioning"; DOD
Directive 2310.1E, “Department of Defense Detainee Program,” and no
person in the custody or under the control of the DOD, regardless of
nationality or physical location, shall be subject to cruel, inhuman, or
degrading treatment or punishment as defined in US law, including the |
2-22.3 | 351 | _________________________________________________________________________________FM 2-22.3
Detainee Treatment Act of 2005. All intelligence interrogations, debriefings,
or tactical questioning to gain intelligence from captured or detained
personnel shall be conducted in accordance with applicable law and policy.
M-16. Any inhumane treatment—including abusive practices, torture, or
cruel, inhuman, or degrading treatment or punishment as defined in US law,
including the Detainee Treatment Act of 2005—is prohibited and all
instances of such treatment will be reported immediately in accordance with
paragraph 5-69 thru 5-72. Beyond being impermissible, these unlawful and
unauthorized forms of treatment are unproductive because they may yield
unreliable results, damage subsequent collection efforts, and result in
extremely negative consequences at national and international levels. Review
by the servicing SJA is required prior to using separation. Each interrogation
plan must include specific safeguards to be followed: limits on duration,
interval between applications, and termination criteria. Medical personnel
will be available to respond in the event a medical emergency occurs.
FM 2-22.3 REQUIREMENTS
M-17. Separation must be employed in accordance with the standards in this
manual. These standards include the following:
• Prohibitions against abusive and unlawful actions (see para 5-75) and
against the employment of military working dogs in the conduct of
interrogation (see paras 5-59 and 8-2).
• Requirement for non-DOD agencies to observe the same standards for
the conduct of interrogation operations and treatment of detainees
when in DOD facilities (see para 5-55).
• Prohibition on guards conducting intelligence interrogations or taking
any actions to set the conditions for interrogations. Humane treatment,
evacuation, custody and control (reception, processing, administration,
internment, and safety) of detainees; force protection; and the
operation of the internment facility are discussed in paragraphs 5-57
through 5-66. (FM 3-19 .40 and JP 3-63 also thoroughly discuss
detainee operations.)
• Assignment of ISNs to all detainees in DOD control, whether or not
interrogation has commenced, as soon as possible; normally within 14
days of capture. (See AR 190-8 and Secretary of Defense Memorandum
dated 20 September 2005, "(S//NF) Policy on Assigning Detainee
Internment Serial Numbers (ISN)(U)."
• Access to detainees by the ICRC.
REPORTING OF ABUSES AND SUSPECTED ABUSES
M-18. As an interrogation technique, separation is particularly sensitive due
to the possibility that it could be perceived as an impermissible act.
Interrogators applying the separation technique and the chain of command
supervising must be acutely sensitive to the application of the technique to
ensure that the line between permissible or lawful actions and impermissible
or unlawful actions is distinct and maintained. Therefore, HUMINT
collectors should have heightened awareness and understanding of the risks, |
2-22.3 | 352 | FM 2-22.3_________________________________________________________________________________
control measures, and safeguards associated with the use of separation. Any
interrogation technique that appears to be cruel, inhuman, or degrading as
defined in US law; or impermissibly coercive, or is not listed in this manual,
is prohibited and should be reported immediately to the chain of command or
other appropriate channels for resolution. Orders given to treat detainees
inhumanely are unlawful. Every interrogator must know how to respond to
orders that the individual interrogator perceives to be unlawful
(see paras 5-80 through 5-82).
M-19. If the order is a lawful order, it should be obeyed. Failure to obey a
lawful order is an offense under the UCMJ.
COMMAND POLICY AND OPERATION ORDERS
M-20. The provisions of this appendix must be written into COCOM policy
and/or OPORDs when using the restricted interrogation technique of
separation.
MEDICAL
M-21. Commanders are responsible to ensure that detainees undergoing
separation during interrogation receive adequate health care as described in
greater detail in paragraph 5-91.
TRAINING AND CERTIFICATION
M-22. Only those DOD interrogators who have been trained and certified by
the United States Army Intelligence Center (USAIC), or other Defense
HUMINT Management Office (DHMO) designated agency, in accordance
with guidance established by USD(I) to use separation, are authorized to
employ this technique. The training must meet certification standards
established by the Defense HUMINT Manager in coordination with
applicable DOD components. Properly trained and certified contract
interrogators are authorized to initiate interrogation plans that request the
use separation, and, once the plan is approved, to employ the technique in
accordance with the provisions of this appendix and Appendix K. Contract
interrogators will always be utilized under the supervision and control of US
government or military personnel (see para K-19 and K- 20). Non-DOD
personnel conducting interrogations in DOD facilities must be certified by
their agency and separately gain approval (through their agency's chain of
command) for the additional technique described in this appendix. They must
present this written certification and agency approval to the COCOM before
use is permitted (see para 5-55).
PLANNING
M-23. Planning for the use of separation must include—
• An interrogation plan that addresses safeguards, limits of duration,
interval between applications, termination criteria, and presence of
qualified medical personnel for emergencies (see Figure M-2).
• A provision for detainees to be checked periodically in accordance with
command health care directives, guidance, and SOPs applicable to all
detainees.
• A legal review. |
2-22.3 | 353 | _________________________________________________________________________________FM 2-22.3
Figure M-2. Installation Plan for Restricted Separation Techniques.
Figure M-2. Installation Plan for Restricted Separation Techniques. |
2-22.3 | 354 | FM 2-22.3_________________________________________________________________________________
• Documentation of the use of separation, including photographs and/or
videotaping, if appropriate and available (see para 5-54).
M-24. Separation is only authorized for use in interrogation operations, not
for other Military Source Operations. Separation may be approved for use in
combination with authorized approach techniques. General controls and
safeguards contained in this manual must be applied during the use
separation, in conjunction with the safeguards specific to the separation
technique. Planning must consider the possible cumulative effect of
using multiple techniques and take into account the age, sex, and
health of detainees, as appropriate.
TECHNICAL CONTROL
M-25. Requests for approval of separation will be forwarded (for information
purposes only) via secure means through intelligence technical channels at
the same time as they are sent through command channels. Intelligence
technical channels are those used for forwarding of source information and
technical parameters of collection operations from lower to higher and
passing tasking specifics, source information, technical control measures, and
other sensitive information from higher to lower. The technical chain extends
from the HCT through the OMT and Operations Section (if one exists) to the
C/J/G/S2X.
APPLICATION OF SEPARATION TECHNIQUE
M-26. The purpose of separation is to deny the detainee the opportunity to
communicate with other detainees in order to keep him from learning
counter-resistance techniques or gathering new information to support a
cover story, decreasing the detainee's resistance to interrogation. Separation
does not constitute sensory deprivation, which is prohibited. For the purposes
of this manual, sensory deprivation is defined as an arranged situation
causing significant psychological distress due to a prolonged absence, or
significant reduction, of the usual external stimuli and perceptual
opportunities. Sensory deprivation may result in extreme anxiety,
hallucinations, bizarre thoughts, depression, and anti-social behavior.
Detainees will not be subjected to sensory deprivation.
M-27. Physical separation is the best and preferred method of separation. As
a last resort, when physical separation of detainees is not feasible, goggles or
blindfolds and earmuffs may be utilized as a field expedient method to
generate a perception of separation.
M-28. Objectives:
• Physical Separation: Prevent the detainee from communicating with
other detainees (which might increase the detainee's resistance to
interrogation) and foster a feeling of futility.
• Field Expedient Separation: Prolong the shock of capture. Prevent the
detainee from communicating with other detainees (which might
increase the detainee's resistance to interrogation) and foster a feeling
of futility. |
2-22.3 | 355 | _________________________________________________________________________________FM 2-22.3
M-29. Safeguards:
• Duration: Self-explanatory.
• Physical Separation: Limited to 30 days of initial duration.
• Field Expedient Separation: Limited to 12 hours of initial
duration at the initial interrogation site. This limit on duration does
not include the time that goggles or blindfolds and earmuffs are used
on detainees for security purposes during transit and evacuation.
• Oversight Considerations for Field Expedient Separation:
(cid:131) The intended use of field expedient means of separation must be
specified on the interrogation plan that is submitted to the GO/FO
for approval.
(cid:131) Detainees must be protected from self-injury when field expedient
means of separation are used. The effect of the application of field
expedient separation means on the detainee must be monitored to
detect any possible health concerns.
M-30. The following safeguards apply to both Physical Separation and Field
Expedient Separation.
• Break: Additional periods of separation will not be applied without the
approving GO/FO's determination of the length of a break between
iterations.
• Extension:
(cid:131) Physical Separation Method: Extensions of this technique past 30
days must be reviewed by the servicing SJA and approved by the
original approving GO/FO or his replacement in that position.
(cid:131) Field Expedient Method: Extensions past 12 hours of initial
duration at the initial interrogation site must be reviewed by the
servicing SJA and approved by the original approving/replacement
GO/FO.
(cid:131) Medical: Detainees will be checked periodically in accordance with
command health care directives, guidance, and SOPs applicable to
all detainees.
(cid:131) Custody and Control: The interrogation chain of command must
coordinate the interrogation plan with the Detention Operations
Commander. The Detention Operations Commander (in conjunction
with the MI commander) may convene a multidiscipline custody and
control oversight team including, but not limited to, MP, MI, BSC (if
available), and legal representatives. The team can advise and
provide measures to ensure effective custody and control in
compliance with the requirements of applicable law and policy.
• Oversight Considerations:
(cid:131) Use of hoods (sacks) over the head, or of duct tape or adhesive tape
over the eyes, as a separation method is prohibited.
(cid:131) If separation has been approved, and the interrogator subsequently
determines that there may be a problem, the interrogator should
seek further guidance through the chain of command before applying
the technique. |
2-22.3 | 356 | FM 2-22.3_________________________________________________________________________________
(cid:131) Care should be taken to protect the detainee from exposure (in
accordance with all appropriate standards addressing excessive or
inadequate environmental conditions) to—
− Excessive noise.
− Excessive dampness.
− Excessive or inadequate heat, light, or ventilation.
− Inadequate bedding and blankets.
− Interrogation activity leadership will periodically monitor the
application of this technique.
(cid:131) Use of separation must not preclude the detainee getting four hours
of continuous sleep every 24 hours.
(cid:131) Oversight should account for moving a detainee from one
environment to another (thus a different location) or arrangements
to modify the environment within the same location in accordance
with the approved interrogation plan.
M-31. Suggested Approach Combinations:
• Futility.
• Incentive.
• Fear Up. |
2-22.3 | 357 | _________________________________________________________________________________FM 2-22.3
Glossary
The glossary lists acronyms and terms with Army or joint definitions, and other selected terms.
Where Army and joint definitions are different, (Army) follows the term. Terms for which
FM 2-22.3 is the proponent manual (the authority) are marked with an asterisk (*) and followed
by the number of the paragraph (¶) or page where they are defined. For other terms, refer to the
manual listed. JP 1-02, Dictionary of Military and Associated Terms and FM 1-02 Operational
Terms and Graphics are posted on the Joint Electronic Library, which is available online and on
CD ROM.
• Use this URL to access JP 1-02 online:
http://atiam.train.army.mil/soldierPortal/atia/adlsc/view/public/11444-1/FM/1
02/TOC.HTM
• Use this URL to access FM 1-02 online:
http://atiam.train.army.mil/soldierPortal/atia/adlsc/view/public/11444-1/FM/1
02/TOC.HTM
• /jel/service_pubs/101_5_1.pdf
• Follow this path to access JP 1-02 on the Joint Electronic Library CD-ROM:
Mainmenu>Joint Electronic Library>DOD Dictionary.
• Follow this path to access FM 1-02 on the Joint Electronic Library CD-ROM:
Mainmenu>Joint Electronic Library>Service Publications>Multiservice Pubs>
FM 101-5-1.
*2X The *2X Staff conducts mission and RM for all HUMINT and CI
entities located within the designated AOIR. It coordinates,
deconflicts, and synchronizes all HUMINT and CI activities in the
designated AOIR. (“*2X” indicates 2X functions at all levels.)
AC Active Component
ACCO Army Central Control Office
ACE analysis and control element
ACT Analysis Control Team
ADA Air Defense Artillery
ADP automated data processing
ADCON administrative control
aka also known as
AMHS Automated Message Handling System
AMID allied military intelligence battalion
AO area of operations
AOI area of interest
AOIR area of intelligence responsibility
AOR area of responsibility |
2-22.3 | 358 | FM 2-22.3 _________________________________________________________________________________
approx approximately
ARNG Army Reserve National Guard
ASAS All-Source Analysis System
ASCC Army Service Component Command
ASD(C3I) Assistant Secretary of Defense (Command, Control,
Communications, and Intelligence)
ASI additional skill identifier
assn assassination
ATD associated technical document
BAT Biometric Automated Toolset
BCT brigade combat team
BDA battle damage assessment
BOS Battlefield Operating System
BSC Behavioral Science Consultant
BSD basic source data
C2 command and control
CA civil affairs
CAT category
CCIR commander’s critical information requirement
CCNY City College of New York
CDOC captured document
CDR commander
CGS common ground station
CE captured equipment (STANAG term)
CED captured enemy document
CEE captured enemy equipment
CENTCOM US Central Command
CFSO Counterintelligence Force Protection Source Operations
CHAMS CI/HUMINT Automated Management System
CHATS CI/HUMINT Automated Tool Set
CI counterintelligence
CIA Central Intelligence Agency
CICA Counterintelligence Coordination Authority
CIAC Counterintelligence Analysis Cell |
2-22.3 | 359 | _________________________________________________________________________________FM 2-22.3
CID Criminal Investigation Division
CIFA Counterintelligence Field Agency
C2X Coalition Intelligence Staff Officer
C/J2X LNO Coalition/Joint Intelligence Staff Liaison Officer
C/J/G2X Coalition/Joint/Corps/Division Intelligence Staff Officer
C/J/G/S2 Coalition/Joint/Corps/Division/Brigade and Below Intelligence
Staff Officer
C/J/G/S2X Coalition/Joint/Corps/Division/Brigade and Below Intelligence
Staff Officer
CMO civil-military operations
COA course of action
COCOM Combatant Command
COE common operating environment
COLISEUM Community On-Line Intelligence System for End Users and
Managers
COMMZ communications zone
CONUS continental United States
CONOP contingency operations
COP common operational picture
COR contracting officer representative
COT commercial off-the-shelf
COTR Contracting Officer’s Technical Representative
counterintelligence Information gathered and activities conducted to protect against
espionage, other intelligence activities, sabotage, or
assassinations conducted by or on behalf of foreign governments
or elements thereof, foreign organizations, or foreign persons, or
international terrorist activities. (FM 2-0)
Counterintelligence Subordinate to the J/G2X and coordinates all CI activities for a
Coordinating Authority deployed force. It provides technical support to all CI assets and
coordinates and deconflicts CI activities in the deployed AO.
(FM 2-0)
CP command post
CPERS captured personnel (JP-2.5)
CPR Common Point of Reference
CS combat support
CSS combat service support
CTF coalition task force |
2-22.3 | 360 | FM 2-22.3 _________________________________________________________________________________
DA Department of the Army
DCGS-A Distributed Common Ground System-Army
DCIS Defense Criminal Investigative Service
DCISS Defense Intelligence Agency CI Information System
DCP detainee collection point
DEA Drug Enforcement Agency
debriefing The systematic questioning of individuals to procure information
to answer specific collection requirements by direct and indirect
questioning techniques. (FM 2-0)
DED Data Element Dictionary
DH Defense HUMINT
DHMO Defense HUMINT Management Office
DHS Department of Homeland Security
DIA Defense Intelligence Agency
DII DOD Information Infrastructure
DISCOM Division Support Command
DOCEX document exploitation
document exploitation The systematic extraction of information from all media formats
in response to collection requirements. (FM 2-0)
DOD Department of Defense
DOE Department of Energy
DP displaced person
DRP Detainee Reporting
DRS Detainee Report System
DS direct support
DSCA defense support of civilian authorities
DSS decision support software
DST decision support template
DTG date-time group
EAC echelons above corps
EEFI essential elements of friendly information
EPW enemy prisoner of war
evaluating In intelligence usage, appraisal of an item of information in
terms of credibility, reliability, pertinence, and accuracy.
(FM 2-0) |
2-22.3 | 361 | _________________________________________________________________________________FM 2-22.3
EW electronic warfare
FBI Federal Bureau of Investigation
FEO forced entry operations
FFIR friendly force information requirement
FHA foreign humanitarian assistance
FISS Foreign Intelligence Security Service
Five S’s search, seize, segregate, safeguard, and silence
FORSCOM US Army Forces Command
FRAGO fragmentary order
FRN field reporting number
FSE fire support element
Gb gigabyte
GC Geneva Convention Relative to the Protection of Civilian Persons
in Time of War
GPS Global Positioning System
GPW Geneva Convention Relative to the Treatment of Prisoners of War
GRCS Guardrail Common Sensor
GRIFN Guardrail Information Node
GS general support
GSR general support-reinforcing
GUI graphic user interface
GWS Geneva Convention for the Amelioration of the Condition of the
Wounded and Sick in Armed Forces in the Field
HAC HUMINT analysis cell
HAT HUMINT analysis team
HCR HUMINT collection requirement
HCT HUMINT collection team
HET human exploitation team
HN host nation
HOC HUMINT operations cell
HSOC Homeland Security Operations Center
HQ headquarters
HQDA Headquarters, Department of the Army |
2-22.3 | 362 | FM 2-22.3_________________________________________________________________________________
human intelligence The collection by a trained HUMINT collector of foreign
information from people and multimedia to identify elements,
intentions, composition, strength, dispositions, tactics, equip-
ment, and capabilities. (FM 2-0)
HUMINT Human Intelligence
HUMINT Analysis Cell The “fusion point” for all HUMINT reporting and operational
analysis in the ACE and JISE. It determines gaps in reporting
and coordinates with the requirements manager to cross-cue
other intelligence sensor systems.
HUMINT Analysis Team Sub-element of the G2 ACE that supports the G2 development of
IPB products and developing and tailoring requirements to match
HUMINT collection capabilities.
HUMINT Operations Cell Assigned under the J/G2X to track all HUMINT activities in the
area of intelligence responsibility (AOIR). It provides technical
support to all HUMINT collection operations and deconflicts
HUMINT collection operations in the AO. (FM 2-0)
I&WS Deputy Under Secretary of Defense for Intelligence and
Warfighting Support
IAFIS Integrated Automated Fingerprint Identification System
IBS Integrated Broadcast Services
ICF intelligence contingency fund
ICRC International Committee of the Red Cross
ID identification
IED improvised explosive device
IG Inspector General
IIMG Interagency Incident Management Group
IIR intelligence information report
IMINT imagery intelligence
INTREP intelligence report
INTSUM intelligence summary
IPB intelligence preparation of the battlefield
IPF Intelligence Processing Facility
IPSP Intelligence Priorities for Strategic Planning
IR information requirements
ISA International Standardization Agreement
ISN Internment Serial Number
ISR intelligence, surveillance, and reconnaissance
IU Interrogation Unit (AJP-2.5) |
2-22.3 | 363 | _________________________________________________________________________________FM 2-22.3
J2 Joint Intelligence Directorate/Staff
J2X Joint Intelligence Staff Officer
J2X Responsible for controlling, coordinating and deconflicting all
HUMINT and CI collection activities and keeping the joint force
J2 informed on all HUMINT and CI activities conducted in the
joint force AOR. (*2X Staff Handbook) Umbrella organization
consisting of human intelligence operation cell and the task force
counterintelligence coordinating authority. The J2X is
responsible for coordination and deconfliction of all human
source-related activity. See also counterintelligence; human
intelligence. (JP 2-01)
J5 Joint Staff Directorate, Civil Affairs
J/G2 Joint/Corps/Division Intelligence Staff Officer
J/G/S2 Joint/Corps/Division/Brigade and Below Intelligence Staff Officer
J/G/S2X Joint/Corps/Division/Brigade and Below Intelligence Staff Officer
JAC Joint Analysis Center
JAO joint area of operations
JCMEC Joint Captured Materiel Exploitation Center
JDEF joint document exploitation facility
JDS Joint Dissemination System
JFC Joint Forces Commander
JIC Joint Interrogation Center
JIDC Joint Interrogation and Debriefing Center
JISE Joint Intelligence Support Element
JTF joint task force
JUMPS job, unit, mission, PIR and IR, and supporting information
JWICS Joint Worldwide Intelligence Communications System
KB knowledgeability brief
LCC Land Component Command
LDR Lead Development Report
LEA law enforcement agency
LNO Liaison Officer
LRS long-range surveillance
LTIOV latest time information is of value
MAGTF Marine Air-Ground Task Force
MASINT measurement and signature intelligence
MDMP Military Decisionmaking Process |
2-22.3 | 364 | FM 2-22.3_________________________________________________________________________________
MEDEVAC medical evacuation
MEF Marine expeditionary force
MEJA Military Extraterritorial Jurisdiction Act
METT-TC mission, equipment, terrain and weather, troops and support
available, time available, and civil considerations
MI Military Intelligence
MILO mission, identification, location, and organization
MSO military source operations
MOS military occupation specialty
MP Military Police
MTOE modified table of organization and equipment
MTW major theater war
NA not applicable
NAC national agency check
NAI named area of interest
NATO North Atlantic Treaty Organization
NBC nuclear, biological, and chemical
NCO noncommissioned officer
NCOIC noncommissioned officer in charge
NGA National Geospatial-Intelligence Agency
NGO non-governmental organization
NIP Notice of Intelligence Potential
NIST national intelligence support team
NOFORN no foreign dissemination
NRT near-real time
NSA National Security Agency
NVG night vision goggles
OB order of battle
OCONUS outside continental United States
OCR optical character recognition
OGA other government agencies
O/I operations and intelligence
OIC officer in charge
OMT operational management team |
2-22.3 | 365 | _________________________________________________________________________________FM 2-22.3
OPCON operational control
OPLAN operations plan
OPORD operations order
OSC operations support cell
OSD Office of the Secretary of Defense
OSINT open-source intelligence
OPTEMPO operational tempo
OVOP overt operational proposal
PDA Personal Digital Assistant
PIR priority intelligence requirement
PME peacetime military engagement
PMO Provost Marshal Office
POL petroleum, oils, and lubricants
POW prisoner of war
PRETECHREP preliminary technical report
priority intelligence Those intelligence requirements for which a commander has
requirements an anticipated and stated priority in the task of planning and
decisionmaking. (JP 1-02)
PSO peacetime stability operation (STANAG term)
PSYOP Psychological Operations
PVO private volunteer organization
PW Prisoner of War (as used in the GPW)
R reinforcing
R&S reconnaissance and surveillance
RC Reserve Components
RFI request for information
RM requirements management
ROE rules of engagement
RSR Resource Status Report
SALUTE Size, Activity, Location, Unit, Time, Equipment
SBI special background investigation
SCC Service Component Commands
SCI sensitive compartmented information
SCO Sub-Control Office
SDR Source-Directed Requirement |
2-22.3 | 366 | FM 2-22.3_________________________________________________________________________________
security detainee Those detainees who are not combatants, but who may be under
investigation or pose a threat to US forces if released.
SE southeast
SECDEF Secretary of Defense
SERE survival, evasion, resistance, and escape
S.F.P. Students for Peace
SIGINT signals intelligence
SII statement of intelligence interest
SIO senior intelligence officer
SIPRNET Secret Internet Protocol Router Network
SIR specific information requirement
SITMAP situation map
SJA Staff Judge Advocate
SME subject matter expert
SOF Special Operations Forces
SOFA Status of Forces Agreement
SOI signal operating instruction
SOP standing operating procedure
SOW statement of work
Source (DOD) 1. A person, thing, or activity from which information is obtained.
2. In clandestine activities, a person (agent), normally a foreign
national, in the employ of an intelligence activity for intelligence
purposes. 3. In interrogation activities, any person who furnishes
information, either with or without the knowledge that the
information is being used for intelligence purposes. In this
context, a controlled source is in the employment or under the
control of the intelligence activity and knows that the information
is to be used for intelligence purposes. An uncontrolled source is a
voluntary contributor of information and may or may not know
that the information is to be used for intelligence purposes. See
also agent; collection agency. (JP 1-02)
SQL structured query language
SSC small-scale contingency
Stability and Reconstruction
Operations Those operations that sustain and exploit security and control
over areas, populations, and resources. They employ military
capabilities to reconstruct or establish services and support
civilian agencies. Stability and reconstruction operations involve
both coercive and cooperative actions.
STANAG Standardization Agreement |
2-22.3 | 367 | _________________________________________________________________________________FM 2-22.3
TACON tactical control
tactical questioning The expedient initial questioning for information of immediate
tactical value. Soldiers conduct tactical questioning based on the
unit’s SOP, ROE, and the order for that mission. Unit leaders
must include specific guidance for tactical questioning in the
order for appropriate missions. The unit S3 and S2 must also
provide specific guidance down to the unit level to help guide
tactical questioning. (FM 2-0)
TCICA Theater Counterintelligence Coordination Authority
TCP traffic control point
TDA table of distribution and allowances
TDRC Theater Detainee Reporting Center
TECHDOC technical document
TECHNINT technical intelligence
TES Tactical Exploitation System
TF task force
THREATCON threat condition
TOE table of organization and equipment
TPFDDL Time-Phased Forces Deployment Data List
TTP tactics, techniques, and procedures
TS Top Secret
tvl travel
TWS Trusted Workstation
UCMJ Uniform Code of Military Justice
UNCLASS unclassified
unk unknown
USAR US Army Reserve
USB Universal Serial Bus
USCENTCOM US Central Command
USD(I) Under Secretary of Defense for Intelligence
UTM universal transverse mercator (grid)
UW unconventional warfare
WARNO warning order
WMD weapons of mass destruction
WO warrant officer
WTC World Trade Center |
2-22.3 | 369 | _________________________________________________________________________________FM 2-22.3
Bibliography
The bibliography lists field manuals by new number followed by old number,
as indicated.
DOCUMENTS NEEDED
These documents must be available to the intended users of this publication.
JP 0-2. Unified Action Armed Forces. 10 July 2001.
JP 2-0. Doctrine for Intelligence Support to Joint Operations. 9 March 2000.
JP 2-01.2. (U) Joint Doctrine and Tactics, Techniques, and Procedures for
Counterintelligence Support to Operations (S//NF). 13 June 2006.
JP 3-0. Doctrine for Joint Operations. 10 September 2001.
JP 3-63. Joint Doctrine for Detainee Operations. September 2005.
JP 4-0. Doctrine for Logistic Support of Joint Operations. 6 April 2000.
AR 40-25. Nutrition Standards and Education. 15 June 2001.
AR 715-9. Contractors Accompanying the Force. 29 October 1999.
DA Pam 715-16. Contractor Deployment Guide. 27 February 1998.
FM 1. The Army. 14 June 2005.
FM 1-02. Operational Terms and Graphics. 21 September 2004.
FM 2-0. Intelligence. 17 May 2004.
FM 3-0. Operations. 14 June 2001.
FM 3-100.21. Contractors on the Battlefield. 3 January 2003.
FM 5-0. Army Planning and Orders Production. 20 January 2005.
FM 6-0. Mission Command: Command and Control of Army Forces. 11 August 2003.
FM 27-10. Law of Land Warfare. July 1956.
FM 34-5. (U) Human Intelligence and Related Counterintelligence Operations (S//NF).
29 July 1994.
FM 34-130. Intelligence Preparation of the Battlefield. 8 July 1994.
FM 63-11. Logistics Support Element Tactics, Techniques, and Procedures. 8 October
1996.
FM 71-100. Division Operations. 28 August 1996.
FM 100-15. Corps Operations. 13 September 1989.
FM 101-5. Staff Organization and Operations. 31 May 1997.
AMC Pam 715-18. AMC Contracts and Contractors Supporting Military Operations.
June 2000. |
2-22.3 | 370 | FM 2-22.3_____________________________________________________________________________________
READINGS RECOMMENDED
These sources contain relevant supplemental information.
ARMY PUBLICATIONS
Most Army doctrinal publications are available online:
http://155.217.58.58/atdls.htm
AR 190-8. Enemy Prisoners of War, Retained Personnel, Civilian Internees and Other
Detainees. 1 October 1997.
AR 190-40. Serious Incident Report. 15 July 2005.
AR 195-5. Criminal Investigation Evidence Procedures. 28 August 1982.
AR 380-5. Department of the Army Information Security Program. September 2000.
AR 380-10. Technology Transfer, Disclosure of Information, and Contacts with
Foreign Representatives. 15 February 2001.
AR 380-15. (C) Safeguarding Classified NATO Information. 1 March 1984.
AR 380-28. Department of the Army Special Security System. 12 December 1991.
AR 380-40. Policy for Controlling and Safeguarding Communications Security
(COMSEC) Material. 22 October 1990.
AR 380-49. Industrial Security. 15 April 1982.
AR 380-53. Telecommunications Security Monitoring. 29 April 1998.
AR 380-67. Personnel Security Program. 9 September 1988.
AR 381-1. Security Controls on Dissemination of Intelligence Information.
12 February 1990.
AR 381-10. US Army Intelligence Activities. 1 July 1984.
AR 381-12. Subversion and Espionage Directed Against the US Army (SAEDA).
15 January 1993.
AR 381-14. Technical Counterintelligence (TCI). 30 September 2002.
AR 381-20. (U) US Army Counterintelligence Activities (S). 26 September 1986.
AR 381-45. Investigative Records Repository. 25 August 1989.
AR 381-47. (U) US Army Offensive Counterespionage Activities (S). 30 July 1990.
AR 381-100. (U) Army Human Intelligence Collection Program (S//NF). 15 May
1988.
AR 381-102. (U) US Army Cover Support Program (S). 10 January 1991.
AR 381-143. Military Intelligence Nonstandard Material Polices and Procedures.
1 December 1986.
AR 381-172. (U) Counterintelligence Force Protection Operations (CFSO) and Low
Level Source Operations (LLSO) (S//NF). 30 December 1994.
AR 385-10. The Army Safety Program. 23 May 1988.
AR 614-115. Military Intelligence Excepted Career Program. 12 April 2004. |
2-22.3 | 371 | _________________________________________________________________________________FM 2-22.3
AR 614-200. Military Intelligence Civilian Excepted Career Program.
30 September 2004.
AR 715-9. Contractors Accompanying the Force. 29 October 1999.
DA Pam 381-15. Foreign Military Intelligence Collection Activities Program.
1 June 1988.
DA Pam 385-1. Small Unit Safety Officer/NCO Guide. 29 November 2001.
TRADOC Reg 25-36. The TRADOC Doctrinal Literature Program (DLP). 1 October
2004.
FM 2-0. Intelligence. 17 May 2004.
FM 3-19.4. Military Police Leader’s Handbook. March 2002.
FM 3-19-40. Military Police Internment/Resettlement Operations. August 2001.
FM 4-02.21. Division and Brigade Surgeon’s Handbook of Tactics, Techniques and
Procedures. November 2000.
FM 5-0. Staff Organizations and Operations. 31 May 1997.
FM 19-4. Military Police Battlefield Circulation Control, Area Security, and Enemy
Prisoner of War Operations. 7 May 1993.
FM 27-10. Law of Land Warfare. July 1956.
FM 34-3. Intelligence Analysis. March 1990.
FM 34-7-1. Tactical Human Intelligence and Counterintelligence Operations.
April 2002.
FM 34-8. Combat Commander’s Handbook for Intelligence. September 1992.
FM 34-54. Technical Intelligence. January 1998.
FM 34-60. Counterintelligence. 3 October 1995.
FM 41-10. Civil Affairs Operations. 11 January 1993.
FMI 3-19.40. Military Police Internment/Resettlement Operations. 30 September
2005.
TC 25-20. A Leader’s Guide to After-Action Reviews. 30 September 1993.
ST 2-22.7. Tactical Human Intelligence and Counterintelligence Operations.
April 2002.
ST 2-33.5. US Army Intelligence Reach Operations. 1 June 2001.
ST 2-50. Intelligence and Electronic Warfare Assets. June 2002.
ST 2-91.6. Small Unit Support to Intelligence. March 2004.
OTHER PUBLICATIONS
JP 2-01. Joint Intelligence Support to Military Operations. November 1996.
AR 350-1. Army Training and Education. 9 April 2003.
DIAM 58-11. (U) DOD HUMINT Policies and Procedures (S//NF). August 1993.
DIAM 58-12. (U) DOD HUMINT Management Systems (S//NF). June 1997. |
2-22.3 | 372 | FM 2-22.3_____________________________________________________________________________________
AJP-2.5. Handling of Captured Personnel, Materiel, and Documents. September
2001.
DOD Directive 2310.1. DOD Program for Enemy Prisoners of War (POW) and Other
Detainees (Short Title: DOD Enemy POW Detainee Program). 18 August 1994.
DOD Directive 2310.1E. The Department of Defense Detainee Program.
DOD Directive 3115.09. DOD Intelligence Interrogations, Detainee Debriefings, and
Tactical Questioning. 3 November 2005.
DOD Directive 5100.77. DOD Law of War Program. 9 December 1998.
DOD Directive 5240.1. DOD Intelligence Activities. 3 December 1982.
DOD Directive 5525.5. DOD Cooperation with Civilian Law Enforcement Officials. 15
January 1986.
DOD Instruction 3020.41. Contractor Personnel Authorized to Accompany the U.S.
Armed Forces. 3 October 2005
DOD Regulation 5200.1-R. Information Security Program, 1977.
DOD Regulation 5240.0-R. Procedures Governing the Activities of DOD Intelligence
Components That Affect United States Persons. December 1982.
DOD SOP for Collecting and Processing Detainee Biometric Data. 11 February 05
Protocol 1 Additional to the Geneva Conventions. Part IV: Civilian Population,
Section 1: General Protection Against Effects of Hostilities. 1977.
Executive Order 12333, United States Intelligence Activities. 4 December 1981.
Under Secretary of Defense for Intelligence (USD(I) Memorandum, “Guidance for the
Conduct and Oversight of Defense Human Intelligence (HUMINT) (U).” 14
December 2004.
Implementing Instructions to the USD(I) Memorandum. “Guidance for the Conduct
and Oversight of Defense Human Intelligence (HUMINT) (U).” 7 September
2004.
SECDEF Memorandum, Policy on Assigning Detainee Serial Numbers (ISN) (U). 20
September 2005.
18 U.S.C. Posse Comitatus Act of 1878, § 1385.
Homeland Security Act of 2002.
Detainee Treatment Act of 2005, Public Law No. 109-163, Title XIV.
DA Form 1132-R. Prisoner’s Personal Property List – Personal Deposit Fund (LRA).
April 1986.
DA Form 4137. Evidence/Property Custody Document. July 1976.
DA Form 4237-R. Detainee Personal Record. August 1995.
DD Form 2745. Enemy Prisoner of War Capture Tag. May 1996.
Standardization Agreements (STANAG):
STANAG 1059. Distinguishing Letters for Geographic Entities for Use by
NATO Armed Forces. Edition 8. April 2003.
STANAG 2022. Intelligence Reports. 29 September 1988. |
2-22.3 | 373 | _________________________________________________________________________________FM 2-22.3
STANAG 2033. Interrogation of Prisoners of War (PW). Edition 6. December
1994.
STANAG 2044. Procedures for Dealing with Prisoners of War (PW). Edition 5.
June 1994.
STANAG 2084. Handling and Reporting of Captured Enemy Equipment and
Documents. June 1986. |
2-22.3 | 375 | FM 2-22.3
Index
Entries are by paragraph number
A Area of operations, 1-29 Change of Scenery Approach,
ACE. See analysis and control Assets, HUMINT Collection, 8-63
element. 4-40 Checkpoint Operations, 5-7,
AJP 2.5, Appendix E Association Matrix, 12-19, Figure 5-36, 5-42
12-2 CIA. See Central Intelligence
AO. See area of operations.
Audio recording, 9-29 Agency.
Activities matrix, 12-23,
Figure 12-3. See also Automation, 13-2 CICA. See Counterintelligence
Coordination Authority.
Automation analysis tools. Analysis tools, 13-13
CID. See Criminal Investigation
Analysis and control element, Requirements for collectors,
Division.
2-16 13-24
Civil Affairs (CA) Units, 4-47,
Analyst support, 9-30. Systems, 13-21, L-3
4-58
Analytical Workstation requirements,
Cold leads, 9-22
Support, 12-2 13-25
Collect, 1-2
Tools, 12-16
B Collection
Approach, 1-10, 7-15, 8-1
Objectives, 7-2
Basic Source Data Reports
Phase, 8-4
(BSD), 10-13 Priority, 4-45
Rapport, 8-9
Battlefield Operating System Requirements, 7-4
Strategies, 8-77
(BOS), 1-1 Combat Service Support Units,
Debriefing, 8-82 BEST MAPS, 5-45 4-58
Elicitation, 8-86 Biographic Intelligence, 5-45 Combatants, viii
Interrogation, 8-77 Biometrics, 13-4 Lawful, 6-18
Techniques, 8-17 Unlawful, 6-18
Transitions, 8-73 C Command Debriefing Team,
Approaches C2X, 2-4 2-13
Change of Scenery, 8-63 CA. See Civil Affairs. Command Relationships,
(HUMINT) 4-11
Direct, 8-19 Capabilities, 1-31
Army, Table 4-2
Emotional, 8-23 Capture Rates, 5-90
Joint, Table 4-3
Establish Your Identity, 8-58 Capture tag, Figure D-1
Common points of reference,
False Flag, 8-69 Captured document
9-39. See also Map tracking.
File and Dossier, 8-55 Handling, I-12
Communication requirements,
Incentive, 8-21 Log, I-24, Figure I-3
13-27, 13-30, L-7
Mutt and Jeff, 8-65 Transmittal sheet, I-19,
Contact reports, 10-14
Rapid Fire, 8-60 Figure I-2
Continuous Contacts, 5-16
Repetition, 8-59 Captured equipment handling,
Contractor, 1-7, K-1
Silent, 8-62 D-21
Control Questions, 9-10
We Know All, 8-53 Central Intelligence Agency,
Coordinates register, 12-41
3-24
Area Handbook, 7-4 |
2-22.3 | 376 | _________________________________________________________________________________ Index
Coordination with other units and Drug Enforcement Agency, 4-58 Restricted to Base Camp,
operations, 5-42, 5-56, 5-102 3-14
Counterintelligence E Hot leads, 9-21
Coordination Authority, 2-8 EAC HUMINT, 3-22 Human Intelligence, 1-4,
Functions, 1-7, Figure 1-2 Emotional Approach, 8-23 Structure, 2-1
Screening, 6-39, table 6-1 EPW HUMINT, 1-4
Courses of Action, 4-44 Serial number, 6-12, 6-13 Agencies, 3-24
Criminal Investigation Division, Status, 6-14 Analysis, 12-1
4-58, 4-60, 5-42 Early Entry Operations. See also Analysis Cell, 2-16
Cultural Awareness, 1-29, 8-4 HUMINT operations. Asset Capabilities, 4-17,
HUMINT Support of, 3-6 4-26, 4-45
D
Economic Intelligence, 5-45 HUMINT Collection, 1-8, 5-1
DEA. See Drug Enforcement Elicitation, 8-80 Aids, 9-28
Agency.
Establish Your Identity Constraints, 4-41
Databases, 12-46, 13-18 Approach, 8-58 In a Hostile Environment,
Debriefing, 1-21 Exploit dispositions, 9-43 3-21
Debriefing Operations, 1-21,
In Permissive Environment,
5-30 F 3-19
Legal Guidelines, 5-33 False Flag, 8-69 In Semi-permissive
Operational Considerations,
Field Interrogations Operations,
Environment, 3-20
5-34 5-95 Phases, 1-8
Deceit, 9-23, 9-25, 9-26 File and Dossier Approach, 8-55 Plan, 7-9
Defensive Operations, 3-7 Fingerprint scanner, 13-4 HUMINT Collection Team, 2-11
Detainee, 5-26 Five S’s, D-7 Allocation to maneuver
Geneva Convention
Forced Entry Operations. See
units, 5-96
categories, 6-14 also HUMINT operations. HUMINT Collector, 1-7
Security, 5-58, 5-78 HUMINT Support of , 3-5 Traits, 1-28
Interrogation Operations, Formal Contacts, 5-28 HUMINT Command and Control,
1-20
Friendly Force Debriefing
4-9
Direct Approach, 8-19 Operations, 1-21, 5-39 HUMINT Contacts, 5-5
Direct Questioning, 9-4 One Time Contact, 5-7
Document G Continuous Contacts, 5-16
Accountability, I-19 G2X, 2-4 Formal Contact, 5-28
Associated with a source, Geneva Conventions, 5-68, 5-72 HUMINT Control Organizations,
I-51 Categories of detainees, 2-3 through 2-14
Categories, I-27 6-15 HUMINT Collection and Related
Exploitation (DOCEX) Excerpts, Appendix A Activities, 1-14
Operations, 1-24, 4-51, HUMINT Methodology, 1-14,
E-12, I-1, I-11, I-48 H 1-18
Exploitation Team, 2-14 HCT, 2-11. See also HUMINT HUMINT Mission Planning, 4-35,
Evacuation, I-12 Collection Team. 4-44
Handling, I-14 As an Independent Patrol, HUMINT Operations, 1-23
Screening, I-25 3-14 Assessing, 4-8
Tag, I-14 Integrated with other Executing, 4-7
operations, 3-14
Translation, I-43 Planning, 4-3
Transmittal, I-34 Preparing, 4-5 |
2-22.3 | 377 | FM 2-22.3_______________________________________________________________________________
HUMINT Organization, Advantages, 11-2 M
Figure 2-1 Briefing, 11-18 Machine translation, 13-8
HUMINT Requirements Cautions, 11-4 Maneuver unit support, 4-9
Analysis, 4-18
Controlling and correcting, Map tracking, 9-35
HUMINT Requirements 11-24
Management, 4-16
Matrices, 12-18
Disadvantages, 11-3
HUMINT Source, 1-6
Measurement and Signals
Evaluating, 11-28 Intelligence (MASINT), 4-57
Database, 2-9, 12-7
Methods, 11-6, 11-7 Military geographic intelligence,
Collection Activities, 1-16
Placement, 11-21 5-46
Selection, 12-45
Techniques, 11-16 Military Intelligence
HUMINT Structure, 2-1 Organizations, 4-57
Interpreters, 11-1, 11-26
HUMINT Tasks, 1-5 Military Police in Association
Civilian, 11-15
HUMINT Technical Control, 4-10 with Interrogation Operations,
Evaluating, 11-28
5-56, Figure 6-2
I Military, 11-14 Internment/resettlement
INTSUM, 7-4 operations, 6-14,
Imagery Intelligence, 4-57
Iris scanner, 13-6 Figure 6-2
Incentive Approach, 8-21
ISR Plan (Integrated), 4-3, 4-27, Units, 4-58, 5-42
Information Dissemination, 4-32
4-28 Mutt and Jeff, 8-65
INSCOM, 3-22
Updating, 4-34
Intelligence Battlefield Operating N
System, 1-1
J
National level intelligence
Intelligence Estimate, 7-4
J2X, 2-4 agencies, 3-24
Intelligence information reports,
JIDC Analysis Section, 2-17 Notice of intelligence potential,
10-6
10-15
Joint HUMINT, 3-23, 5-91
Intelligence preparation of the
battlefield, 12-3 Joint Interrogation and O
Debriefing Center (JIDC),
Intelligence Process, 1-2,
5-102 OB Factors, 12-43
Figure 1-1
Joint interrogation operations, Offensive Operations, 3-2
Intelligence Production, 4-31
5-99 One-Time Contact, 5-7
Intelligence Reach, 7-5, 7-6
Open source documents, I-10
Interrogation, 1-20, 5-50 K
Operational analysis and
Of wounded detainees,
Knowledgeability Brief, 10-15 assessment, 12-8
5-91
Operational Coordination, 4-9
Priorities, Figure, 6-3 L
Operational Management Team
Prohibited techniques, 5-68,
Lawful enemy combatants, 6-18 (OMT), 2-10
5-74
Lead development report, 10-15 Team leader requirements,
Prohibition against use of
Leads, 9-20 13-23
force, 5-73
Levels of Employment, 3-14 Operational reports, 10-4
Serial number allocation,
Appendix F Liaison Operations, 1-22, 5-46 Operations Orders, 4-53
Interrogation Operations, 5-50 Link analysis diagram, 12-16, Operations Plans, 4-54
12-25, Figure 12-4 Operations Support Cell, 2-7
Field, 5-96
Limitations, 1-32 Orders
Joint, 5-100
Local civilian debriefing Illegal, 5-80, 5-82
Interpreter program, 11-28,
operations, 1-21
11-29, 11-30 Organizational Chart, 9-28,
Long-Range Surveillance, 5-42 Figure 2-1
Interpreter use, 11-2 |
2-22.3 | 378 | _________________________________________________________________________________ Index
P Repetition Approach, 8-59 Single-discipline HUMINT
Pattern analysis, 12-40, 12-42 Reporting, 1-13, 7-24, 10-1
analysis and production,
12-14
Plan, 1-2 Channels, 10-3, 10-16,
Figure 10-1
Situation Map (SITMAP), 7-4
Planning and Preparation, 1-9,
7-1 Evaluation, 4-33
Sociological Intelligence, 5-45
Political intelligence, 5-45 Principles, 10-2
SOF. See Special operation
forces.
Polygraph, 13-7 Report types, 10-3
SOR development, 12-5
Detainee status, 6-14 through Required areas of knowledge,
6-23, E-8 1-29
Source, 1-6
Pre-deployment planning, Research, 7-3
Administrative reports, 10-5
Appendix C Source-specific, 7-8, 7-25 Analysis, 12-11
Prepare, 1-2 Reserve component integration, Assessment, 6-36
Primary approach strategy, 7-15 4-50 Coverage overlay, 12-50
Process, 1-2 Restricted Interrogation Map reading skills, 9-38
Produce, 1-2 Techniques, 8-71 Profiles, 12-51
Protected persons, 6-17 Retained personnel, 6-22 Reliability matrix, B-1
Protocol I Additional to the Risk assessment, 4-43 Special Operation Forces, 5-42
Geneva Conventions, Stability and reconstruction
S
Appendix B operations, 3-9
Psychological Operations S2 Guide for Handling Staff coordination, 4-59
(PSYOP) Units, 4-58, 5-42 Detainees, Appendix D
Strategic Debriefing Operations,
S2X, 2-4 5-43
Q
SALUTE reports, 10-10 Subject matter expert (SME),
Questioning, 1-11 Format, Appendix H 7-4
Illiterates, 9-46 Science and technical Support Operations, 3-15
Plan, 7-18 intelligence, 5-45 Support Relationships
Principles, 9-2 Screening, 1-18, 6-1 (HUMINT), 4-13
Quick reference guide, Codes, Table 6-1 Direct Support, Table 4-2
Appendix G Community, 6-38 General Support, Table 4-2
Sequence, 7-19, 7-20 Documents, I-25 Support Scheme Development,
Questions, 9-2 Local employees, 6-37 4-27, 4-60
Direct, 9-4 Methodologies, 6-9
T
Follow Up, 9-7 MP support, 6-14, Figure
Non-pertinent, 9-8 6-2 Tactical Debriefing Operations,
5-35
Prepared, 9-12 Observations, 6-30
Tactical questioning, 1-17
Repeat, 9-9 Operations, 1-19, 6-7, 6-8
Target Folder, 4-39, 12-47
To avoid, 9-14 Prisoner of war and refugee,
6-9 , 6-13 Task Organization, 4-47
R Reports, 10-15 Taskings and Requests, 4-28
Rapid Fire Approach, 8-60 Requirements, 6-7 Technical expert support, 9-30
Reach. See Intelligence Reach. Sheet, Figure 6-1 Technical intelligence
(TECHINT), 4-57
Recording principles and Search engine, 13-14
Screening requirements for,
techniques, 9-29 Separation, M-1
6-42
References, Appendix J Signals Intelligence, 4-57
Support, 7-17
Refugee debriefing operations, Silent Approach, 8-62
Termination, 1-12
1-21, 5-31 |
2-22.3 | 379 | FM 2-22.3_______________________________________________________________________________
Phase, 8-84 Trusted Workstation (TWS), Warning Order, 4-37
Report, 10-15
13-3
W
Third-party information, 9-33
U
Time Event Chart, 9-28, 12-17, We Know All Approach, 8-53
Figure 12-1 Umbrella concept, 7-4 Web-based reporting, 13-15
Traits of a HUMINT Collector, Unit Augmentation, 4-58 Wounded detainees
1-28 Unlawful enemy combatant, viii, Interrogation of, 5-91,
Translation machines, 13-8 6-18 9-45
Translators, I-47 Urban Operations, 3-16
Transportation and
V
telecommunication
intelligence, 5-45 Video Recording, 9-29 |
2-22.3 | 381 | FM 2-22.3 (FM 34-52)
6 September 2006
I have approved FM 2-22.3 in accordance with DOD Directive 3115.09, DOD Intelligence
Interrogations, Detainee Debriefings, and Tactical Questioning.
STEPHEN A. CAMBONE
Under Secretary of Defense
for Intelligence
0516001
DISTRIBUTION:
Regular Army, Army National Guard, and the Army Reserve: To be distributed in accordance with |
3-21.38 | 1 | FM 3-21.38
Pathfinder Operations
APRIL 2006
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
Headquarters |
3-21.38 | 2 | This publication is available at
Army Knowledge Online (www.us.army.mil) and
General Dennis J. Reimer Training and Doctrine |
3-21.38 | 3 | *FM 3-21.38
Field Manual Headquarters
Department of the Army
No. 3-21.38
Washington, DC, 25 April 2006
Pathfinder Operations
Contents
Page
PREFACE............................................................................................................................................viii
Chapter 1 INTRODUCTION.......................................................................................................1-1
Employment .........................................................................................................1-1
Capabilities...........................................................................................................1-2
Limitations ............................................................................................................1-2
Equipment............................................................................................................1-2
Communications Security ....................................................................................1-5
Training ................................................................................................................1-5
Chapter 2 PLANS, ORGANIZATION, CONDUCT, AND THREAT...........................................2-1
Section I. PLANS .....................................................................................................2-1
Warning Order......................................................................................................2-1
Initial Preparations................................................................................................2-1
Coordination.........................................................................................................2-2
Linkup with Supported Unit..................................................................................2-4
Final Preparations................................................................................................2-4
Section II. ORGANIZATION FOR COMBAT...........................................................2-4
Insertion................................................................................................................2-4
Overland Movement.............................................................................................2-5
Stay-Behind Operation.........................................................................................2-6
Section III. CONDUCT OF OPERATIONS ..............................................................2-6
Daylight Assault....................................................................................................2-6
Night Assault........................................................................................................2-6
Extraction .............................................................................................................2-6
Staging Areas.......................................................................................................2-7
Artillery Displacement ..........................................................................................2-7
Support of Ground Operations.............................................................................2-7
Support of Air Force.............................................................................................2-7
Mixed Operations.................................................................................................2-7
Radio Communications........................................................................................2-8
Distribution Restriction: Approved for public release; distribution is unlimited.
*This publication supersedes FM 3-21.38, 1 October 2002. |
3-21.38 | 4 | Contents
Terminal Guidance by Supported Units............................................................... 2-9
Section IV. HIGH-THREAT ENVIRONMENT.......................................................... 2-9
Control and Navigation ........................................................................................ 2-9
Tactical Instrument Flights................................................................................... 2-9
Air Routes .......................................................................................................... 2-10
Chapter 3 AIR TRAFFIC CONTROL......................................................................................... 3-1
Section I. PATHFINDER AIR TRAFFIC .................................................................. 3-1
Safety ................................................................................................................... 3-1
Voice Control ....................................................................................................... 3-1
Formats................................................................................................................ 3-2
Numbers .............................................................................................................. 3-3
Phrases and Terms ............................................................................................. 3-4
Section II. LANDINGS ............................................................................................. 3-6
Traffic Patterns..................................................................................................... 3-6
Methods of Entry.................................................................................................. 3-6
Traffic Pattern Legs ............................................................................................. 3-8
Advisory Service .................................................................................................. 3-8
Spacing Techniques ............................................................................................ 3-9
Final Landing Instructions.................................................................................. 3-10
Taxiing Aircraft................................................................................................... 3-10
Minimum Aircraft Separation Requirements...................................................... 3-11
Section III. GROUND-TO-AIR COMMUNICATIONS ............................................ 3-12
Electronic Warfare Environment........................................................................ 3-12
Ground-to-Air Transmissions............................................................................. 3-13
Chapter 4 HELICOPTER LANDING ZONES............................................................................ 4-1
Section I. SELECTION OF LANDING SITES ......................................................... 4-1
Considerations..................................................................................................... 4-1
Alternate Sites.................................................................................................... 4-10
Section II. ORGANIZATION AND DUTIES........................................................... 4-10
Control Center ................................................................................................... 4-10
Landing Site Party ............................................................................................. 4-12
Section III. LANDING SITE OPERATIONS........................................................... 4-13
Communications ................................................................................................ 4-13
Flight Formations ............................................................................................... 4-14
Landing Zone and Obstacle Markings............................................................... 4-14
Air Assaults........................................................................................................ 4-14
Intercept Headings............................................................................................. 4-23
Section IV. LANDING ZONE OPERATIONS ........................................................ 4-23
Communications Checkpoint............................................................................. 4-23
Air Control Points............................................................................................... 4-25
Section V. NIGHT OPERATIONS.......................................................................... 4-25
Tactical Landing Lights...................................................................................... 4-26
External Loads................................................................................................... 4-28
Multihelicopter Operations................................................................................. 4-28
Night Vision Goggles ......................................................................................... 4-28 |
3-21.38 | 5 | Contents
Section VI. ENVIRONMENTAL CONSIDERATIONS............................................4-29
Pilot Input ...........................................................................................................4-29
Cold Weather .....................................................................................................4-29
Jungle.................................................................................................................4-32
Desert.................................................................................................................4-33
Mountains...........................................................................................................4-34
Section VII. APPROACH PATH CONSIDERATIONS...........................................4-35
Vertical Air Currents...........................................................................................4-36
Escape Routes...................................................................................................4-36
Terrain Contour and Obstacles..........................................................................4-36
Position of the Sun.............................................................................................4-36
Chapter 5 EXTERNAL LOADS..................................................................................................5-1
Landing Points......................................................................................................5-1
Types of Loads.....................................................................................................5-1
Unit Responsibilities.............................................................................................5-2
Equipment............................................................................................................5-2
Service Life of Aerial-Delivery Slings.................................................................5-10
Aircraft Load Limitations.....................................................................................5-15
Standard Weights...............................................................................................5-18
Air Items Required For Common Standard Loads.............................................5-19
Slingload Theory ................................................................................................5-20
Hookup and Release Procedures......................................................................5-21
Slingload Inspection Record ..............................................................................5-29
Chapter 6 DROP ZONES...........................................................................................................6-1
Section I. SELECTION FACTORS ..........................................................................6-1
Airdrop Airspeeds.................................................................................................6-1
Drop Altitude.........................................................................................................6-2
Type of Load ........................................................................................................6-3
Methods of Delivery..............................................................................................6-4
Obstacles .............................................................................................................6-6
Access..................................................................................................................6-8
Size ...................................................................................................................6-9
Approach and Departure Routes .......................................................................6-18
Section II. DROP ZONE SUPPORT TEAM ...........................................................6-18
Organization.......................................................................................................6-18
Missions .............................................................................................................6-18
Equipment Familiarization..................................................................................6-18
Coordination.......................................................................................................6-24
Support Requirements.......................................................................................6-25
Duties of the Leader...........................................................................................6-27
Control Center....................................................................................................6-29
Signals................................................................................................................6-29
Determination of Release Point Location...........................................................6-31
Ground-Marked Release System.......................................................................6-32
Army Verbally Initiated Release System............................................................6-37
Air Force Verbally Initiated Release System......................................................6-40 |
3-21.38 | 6 | Contents
Air Force Computed Air Release Point.............................................................. 6-40
Assault Zone Availability Report........................................................................ 6-46
AF IMT 3823, Drop Zone Survey....................................................................... 6-46
AF IMT 4304, Drop Zone/Landing Zone Control Log........................................ 6-53
Appendix A CLOSE AIR SUPPORT AND CLOSE COMBAT ATTACK.....................................A-1
Definitions............................................................................................................A-1
Purpose................................................................................................................A-1
Types of Aircraft...................................................................................................A-2
Target Types........................................................................................................A-3
Weapons Effects..................................................................................................A-3
Aircraft Weapons Types ......................................................................................A-4
Risk Estimated Distances....................................................................................A-5
Target to Weapons..............................................................................................A-5
Appendix B OPERATIONAL FORMATS.....................................................................................B-1
Planning Format ..................................................................................................B-1
Landing Zone and Drop Zone Control Records ..................................................B-2
Troop-Leading Procedures..................................................................................B-5
Appendix C ARMY HELICOPTER SPECIFICATIONS................................................................C-1
Observation Helicopters ......................................................................................C-2
Attack Helicopters................................................................................................C-4
Utility Helicopters.................................................................................................C-8
Cargo Helicopters..............................................................................................C-12
Appendix D DIGITIZATION SUPPLEMENT ................................................................................D-1
Definition..............................................................................................................D-1
Purpose, Advantages, and Capabilities...............................................................D-1
Appendix E AIR FORCE INSTRUCTION.....................................................................................E-1
Airdrop Airspeeds................................................................................................E-1
Drop Zone Size....................................................................................................E-2
Ground Marked Release System ........................................................................E-3
Point of Impact.....................................................................................................E-4
GLOSSARY...........................................................................................................................Glossary-1
REFERENCES...................................................................................................................References-1
INDEX ..........................................................................................................................................Index-1 |
3-21.38 | 7 | Contents
Figures
Figure 2-1. En route communication procedures with pathfinders in a landing zone.....................2-8
Figure 2-2. Comparison of air routes with and without a high-threat environment.......................2-11
Figure 3-1. Air traffic patterns..........................................................................................................3-7
Figure 3-2. 360-degree turnout. ......................................................................................................3-9
Figure 3-3. Traffic pattern extension.............................................................................................3-10
Figure 3-4. Minimum separation requirements.............................................................................3-11
Figure 4-1. Landing point sizes.......................................................................................................4-2
Figure 4-2. Standard flight and landing formations.........................................................................4-4
Figure 4-3. Determination of ground slope. ....................................................................................4-6
Figure 4-4. Maximum angle of approach (daylight). .......................................................................4-7
Figure 4-5. Maximum angle of approach (night)............................................................................4-8
Figure 4-6. Approach and exit path.................................................................................................4-8
Figure 4-7. Example completed DA Form 7461-R........................................................................4-12
Figure 4-8. Helicopter day landing site, staggered trail-right formation........................................4-16
Figure 4-9. Helicopter day landing site, echelon right formation...................................................4-17
Figure 4-10. Day or night slingload operation site. .........................................................................4-18
Figure 4-11. Day or night cargo landing site, "V" formation............................................................4-19
Figure 4-12. Night landing site with landing points for aircraft and slingloads...............................4-20
Figure 4-13. Utility helicopter night landing site, diamond formations. ...........................................4-21
Figure 4-14. Lighted night landing symbols as the pilot would see them from different
approach angles.........................................................................................................4-22
Figure 4-15. Intercept heading technique.......................................................................................4-23
Figure 4-16. Terrain flight modes....................................................................................................4-24
Figure 4-17. Placement of the inverted "Y" or NATO "T" at the number one touchdown point......4-26
Figure 4-18. Placement of additional touchdown point markings for night use..............................4-26
Figure 4-19. Placement of fifth light using inverted "Y," when coordinated....................................4-27
Figure 4-20. Emergency night lighting by vehicle headlights..........................................................4-27
Figure 4-21. Lessening the effects of loose snow on the ground...................................................4-30
Figure 6-1. Recommended safety zones for high-tension lines......................................................6-8
Figure 6-2. Example application of D=RT formula........................................................................6-12
Figure 6-3. Example application of T=D/R formula.......................................................................6-13
Figure 6-4. Example application of D=KAV formula. ....................................................................6-14
Figure 6-5. Raised-angle marker. .................................................................................................6-21
Figure 6-6. Drop zone coordination checklist................................................................................6-24
Figure 6-7. Drop zone cancellation and closing markers..............................................................6-30
Figure 6-8. Release point location. ...............................................................................................6-31
Figure 6-9. Panel emplacement....................................................................................................6-33
Figure 6-10. Horizontal clearance and marker construction...........................................................6-36
Figure 6-11. The 15-to-1 mask clearance ratio...............................................................................6-37 |
3-21.38 | 8 | Contents
Figure 6-12. Example Army VIRS offset......................................................................................... 6-38
Figure 6-13. Wind streamer vector count. ...................................................................................... 6-39
Figure 6-14. Example USAF VIRS transmission............................................................................ 6-40
Figure 6-15. Drop zone placement (day)........................................................................................ 6-41
Figure 6-16. Code letters................................................................................................................ 6-42
Figure 6-17. Drop zone placement (night)...................................................................................... 6-43
Figure 6-18. Area drop zone........................................................................................................... 6-44
Figure 6-19. Computation of circular drop zone. ............................................................................ 6-45
Figure 6-20A. Example completed AF IMT 3823 (front). .................................................................. 6-51
Figure 6-20B. Example completed AF IMT 3823 (back)................................................................... 6-52
Figure 6-21. Example completed AF IMT 4304.............................................................................. 6-56
Figure C-1. OH-58D Kiowa. ............................................................................................................C-3
Figure C-2. AH 64A Apache............................................................................................................C-5
Figure C-3. AH 64D Apache............................................................................................................C-7
Figure C-4. UH-1H Iroquois.............................................................................................................C-9
Figure C-5. UH-60A/L Blackhawk. ................................................................................................C-11 |
3-21.38 | 9 | Contents
Tables
Table 2-1. Air liaison officer's and ground unit commander's coordination of air movement
table..............................................................................................................................2-2
Table 3-1. Numbers transmitted by units or digits........................................................................3-3
Table 3-2. Phrases.........................................................................................................................3-4
Table 3-3. Terms............................................................................................................................3-5
Table 3-4. Traffic pattern legs........................................................................................................3-8
Table 3-5. A 360-degree turnout....................................................................................................3-9
Table 3-6. Light signals on or near a landing zone......................................................................3-13
Table 3-7. Information included in advisories..............................................................................3-15
Table 4-1. Landing point uses........................................................................................................4-3
Table 4-2. Length of minimum width area. ....................................................................................4-9
Table 5-1. Aerial delivery specifications for the Type XXVI sling. .................................................5-3
Table 5-2. Safe working loads (lift capacities) of polyester roundslings........................................5-9
Table 5-3. Large-capacity sling sets............................................................................................5-12
Table 5-4. POL for external loads only. .......................................................................................5-18
Table 5-5. Standard vehicle weights............................................................................................5-19
Table 5-6. Standard artillery weights. ..........................................................................................5-19
Table 6-1. Airspeeds for rotary-wing aircraft..................................................................................6-1
Table 6-2. Airspeeds for fixed-wing aircraft...................................................................................6-2
Table 6-3. Example calculation of drop altitude in feet indicated. .................................................6-2
Table 6-4. Airdrop altitudes for rotary- and fixed-wing aircraft.......................................................6-3
Table 6-5. Minimum aerial delivery altitudes. ................................................................................6-4
Table 6-6. Size criteria for tactical airlift drop zones, personnel, and heavy equipment...............6-9
Table 6-7. Size criteria for tactical airlift drop zones, Container Delivery System.......................6-10
Table 6-8A. Conversion chart for 10-gram helium (pilot) balloons. ...............................................6-16
Table 6-8B. Conversion chart for 30-gram helium (pilot) balloons. ...............................................6-17
Table 6-9. Forward throw distances for fixed-wing aircraft..........................................................6-17
Table 6-10. Surface wind limits for airdrops. .................................................................................6-28
Table 6-11. Favorable conditions for airdrops on tactically assessed DZs...................................6-47
Table A-1. CAS theater aircraft. .....................................................................................................A-2
Table A-2. Risk estimated distances..............................................................................................A-5
Table A-3. Target to weapons........................................................................................................A-5
Table C-1. Specifications for the OH-58D Kiowa. ......................................................................... C-2
Table C-2. Specifications for the AH 64A Apache......................................................................... C-4
Table C-3. Specifications for the AH 64D Apache. ....................................................................... C-6
Table C-4. Specifications for the UH-1H Iroquois. ........................................................................ C-8
Table C-5. Specifications for the UH-60A Blackhawk. ................................................................ C-10
Table C-6. Specifications for the CH-47 D Chinook.................................................................... C-12 |
3-21.38 | 10 | Contents
Table E-1. Airdrop airspeeds. ........................................................................................................E-1
Table E-2. Standard drop zone size criteria. .................................................................................E-2
Table E-3. Ground marked release system load drift constants (K)..............................................E-3
Table E-4. Ground marked release system forward throw distance. ............................................E-4
Table E-5. Standard point-of-impact placement............................................................................E-4 |
3-21.38 | 11 | Preface
This publication provides a foundation for training and employing pathfinder and terminal guidance personnel.
The tactics, techniques, and procedures that describe the conduct of the various missions are guides. The
pathfinder leader can modify them to suit the particular air assault operation.
This publication applies to the Active Army, the Army National Guard (ARNG), the Army National Guard of
the United States (ARNGUS), and the United States Army Reserve (USAR) unless otherwise stated.
The manual includes an extensive glossary of acronyms and terminology peculiar to air assault operations,
pathfinder operations, and Army-Air Force air traffic control. Using this glossary will help the reader
understand the text.
This publication prescribes DA Form 7461-R, Internal Net Record, and implements the following international
agreements:
• QSTAG 585, Marshaling Helicopters in Multinational Land Operations, 23 Apr 81
(see Chapter 4).
• STANAG 2863, Navigational and Communication Capabilities for Helicopters
in Multinational Land Operations, 26 Sep 88
(see Chapters 2 and 3).
• STANAG 3117, Aircraft Marshaling Signals, 17 Oct 85
(see Chapters 1 and 2).
• STANAG 3281, Personnel Locator Beacons, 3 Apr 78
(see Chapters 1, 3, and 4).
• STANAG 3570, Drop Zones and Extraction Zones--Criteria and Markings, 26 Mar 86
(see Chapters 2 and 6).
• STANAG 3619, Helipad Marking, 10 Jul 80
(see Chapter 4).
The proponent for this publication is the United States Army Training and Doctrine Command. The preparing
agency is the U.S. Army Infantry School. You may send comments and recommendations by any means, US
mail, e-mail, fax, or telephone, as long as you use or follow the format of DA Form 2028, Recommended
Changes to Publications and Blank Forms. You may also phone for more information.
E-mail [email protected]
Phone COM 706-545-3458 or DSN 835-3458
Fax COM 706-545-6489 or DSN 835-6489
US Mail Commandant, USAIS
ATTN: ATSH-TPP-H /Bldg 2767
Fort Benning, GA 31905-5593
Unless this publication states otherwise, masculine nouns and pronouns do not refer exclusively to the
male gender. |
3-21.38 | 13 | THIS CHAPTER IMPLEMENTS STANAGs 3117 AND 3281.
Chapter 1
Introduction
Army pathfinders mainly provide navigational aid and advisory services to military
aircraft in areas designated by supported unit commanders. The pathfinders’
secondary missions include providing advice and limited aid to units planning air
assault or airdrop operations.
EMPLOYMENT
1-1. The pathfinders provide navigational aid and air traffic advisories for Army aircraft. This occurs
at any phase of an air assault or ground operation that requires sustained support by Army aircraft. The
commander employs pathfinders on a short-term basis for some missions. He can redeploy the pathfinders
after they complete a major troop lift or airdrop.
PRIMARY
1-2. Ideally, the commander assigns a pathfinder team to each combat aviation battalion. This
enhances the relationship between aviators and pathfinders, who have to work well together and
understand each other to complete a mission successfully. Aviators and pathfinders must maintain a good
working relationship, despite the limited number of pathfinder units and the assignment of
pathfinder-coded positions to ground units.
1-3. Many units might have no trained pathfinder assets. In this case, higher headquarters must
temporarily assign pathfinder assets from an external source to train supported unit personnel and oversee
the conduct of pathfinder operations.
1-4. Non-pathfinder-qualified Soldiers receive training from the pathfinders and form a company-level
pathfinder team. Once trained, the team provides navigational aid, air traffic advisories, and any other
relevant information. Around the clock, the pathfinder team supports any type of air movement or resupply
operation conducted by or for the ground unit and supported by an aviation unit.
1-5. Trained, equipped pathfinders select, mark, improve, and control landing sites. Engineers in direct
support (DS) of lifted ground units may help pathfinders improve landing zones (LZs). In most situations,
pathfinders perform two or more of these jobs at the same time. In each case, they start out by setting up
ground-to-air radio communications. Combat lifesaver-qualified and emergency medical technician
(EMT)-qualified pathfinders also supplement internal medical support.
SECONDARY
1-6. When not performing duties for supported units, pathfinders remain with their equipment, near
and in communication with the supported ground unit command post (CP). While pathfinders await further
missions, the parent or supported CP may task them to help control the aviation unit base airfield; to
perform minor demolition work; or, in staff sections, to perform map and aerial photographic work.
However, before the pathfinders perform secondary missions, they must train and perform routine
maintenance on their equipment. |
3-21.38 | 14 | Chapter 1
CAPABILITIES
1-7. Appropriately equipped and trained pathfinders—
y Reconnoiter areas selected by supported unit commanders.
y Select helicopter land zones (HLZs) and drop zones (DZs).
y Infiltrate areas of operation by foot, vehicle, watercraft, or air.
y Rappel, fast rope, or parachute from aircraft.
y Prepare HLZs and DZs.
y Establish and operate visual and electronic navigation aids.
y Remove minor obstacles.
y Use ground-to-air (GTA) radio communications to guide pilots and advise them of air traffic
within the area of operations (AO).
y Coordinate directly with fire support units and keep pilots informed about friendly mortar and
artillery fires.
y Provide technical assistance in assembling supplies, equipment, and troops before loading the
aircraft for deployment to HLZs and DZs.
y Advise and provide limited physical assistance in preparing and positioning supplies,
equipment, and troops for air movement.
y Conduct limited chemical, biological, radiological, or nuclear (CBRN) monitoring and
surveying of designated areas.
y Provide limited weather observations, to include wind velocity and direction, cloud cover,
visibility, and approximate cloud ceiling.
y In the absence of a special tactics team (STT), by agreement with the United States Air Force
(USAF), operate DZs and airfields for USAF aircraft.
y Survey DZs for use by USAF and Army aircraft. In this situation, pathfinders might require
USAF-compatible ultra high frequency (UHF) or very high frequency (VHF) radios. Aviators
and pathfinders coordinate to make sure everyone knows the ground marking and radio
procedures.
LIMITATIONS
1-8. Pathfinders require augmentation when they guide aircraft or perform other, related primary tasks
such as the following:
y Provide security.
y Remove major obstacles.
y Recover and assemble equipment and supplies.
y Operate additional radio nets and telephones.
y Transport equipment.
y Conduct detailed CBRN monitoring and surveying.
EQUIPMENT
1-9. Pathfinders use a variety of equipment. Though the aviation unit standing operating procedures
(SOP) may specify the type of equipment pathfinders will use, the mission dictates what specific items of
equipment the pathfinders will take on the operation.
NAVIGATION AIDS
1-10. Pathfinders use navigation aids to help aviators find and identify an exact area. |
3-21.38 | 15 | Introduction
Electronic
1-11. With these aids, pathfinders can signal farther than they can with visual navigation aids.
Electronic navigation aids include—
y Homing beacons.
y Transponders.
y Radios.
y Any other electronic devices that can aid in aircraft navigation.
Visual
1-12. With these aids, pathfinders can designate specific areas or points on LZs and DZs. They use them
as GTA signals. Unfortunately, because visual aids are visible, the enemy can also see them.
Day
1-13. Visual navigation aids that can be used during the day include—
y Panels.
y Smoke.
y Signal mirrors.
y Colored gloves and vests for signalmen.
Night
1-14. Visual navigation aids that can be used during the night include—
y Light beacons.
y Lanterns.
y Baton flashlights.
y Strobe lights.
y Pyrotechnics.
y Chem-lights.
Day or Night
1-15. Pathfinders can make field-expedient visual aids for day or night.
Infrared
1-16. At night, pathfinders can use any infrared navigation aids that are compatible with their night
vision goggles (NVG).
COMMUNICATIONS
1-17. Pathfinders use FM radios with secure capability and limited wire equipment. These radios allow
pathfinders to communicate with aircraft, other pathfinder elements, and supported units. Incorporated
homing capabilities in these radios allow pathfinders to provide navigational aid to aircraft.
ASSEMBLY AIDS
1-18. Pathfinders use assembly aids to designate troop and supply assembly areas. Assembly aids
include electronic, visual, and infrared devices. The pathfinders can also use or make field-expedient |
3-21.38 | 16 | Chapter 1
devices to aid in assembly. Because assembly aids can attract the enemy’s attention, pathfinders must
carefully avoid compromise.
Electronic
1-19. These include radios and homing devices that work by radio signal. Enemy direction-finding
equipment detects electronic signals.
Visual
1-20. These simple-to-use aids allow positive identification of assembly areas. The enemy can also see
them. To ensure understanding, pathfinders must closely coordinate the use of visual assembly aids. (See
TM 9-1370-206-10, FM 21-60, and STANAGs 3117 and 3281.) Visual assembly aids include the
following:
Day
1-21. Visual assembly aids that can be used during the day, which include—
y Panels.
y Smoke.
y Armbands.
Night
1-22. Visual assembly aids that can be used during the night, which include—
y Lanterns.
y Flashlights.
y Light beacons.
y Strobe lights.
y Chem-lights.
y Pyrotechnics.
Infrared
1-23. Pathfinders can use infrared light sources as assembly aids, but if they do so, both the pathfinders
and the pilots must use night vision devices (NVDs).
MISCELLANEOUS
1-24. Pathfinder equipment also includes—
y Vehicles.
y Binoculars.
y Night vision devices.
y Nonelectric demolition kits.
y Wind-measurement equipment.
y Parachutes.
y Equipment for detecting CBRN.
y Thermal sights. |
3-21.38 | 17 | Introduction
COMMUNICATIONS SECURITY
1-25. Pathfinders and terminal guidance personnel must know about any hostile data collection and
exploitation activities. Such activities seek to disrupt, deceive, harass, or otherwise interfere with the
command and control of pathfinder operations.
ENEMY INTERCEPTION
1-26. The enemy can intercept, analyze, determine the direction of, and exploit electromagnetic energy
radiating from any signal equipment such as radios, radar, and more. He uses this intelligence for fire and
maneuver and for electronic countermeasures.
1-27. The enemy may collect pathfinder emissions data for immediate or later use. He may use jamming
or deception, or he may continue to monitor and analyze the data for later use.
1-28. Time-distance factors limit the enemy’s ability to exploit signal intelligence in support of his
ground operations. He may use a reaction force, or he may find the source of the signal using direction
finding (DF) equipment. If he uses DF equipment, he can also use electronic countermeasures (ECM) to
jam and deceive the pathfinder’s electronic aids.
PATHFINDER AWARENESS
1-29. Pathfinders must plan for the enemy’s DF capabilities. Automated DF systems determine line
bearings for each signal detected. The enemy continuously processes and compares line bearings and plots
fixes for pathfinder signals. Depending on the size of the DF base and the number of DF systems available,
the enemy may accurately locate a friendly position with little difficulty.
1-30. What the enemy does to gain signals intelligence (SIGINT) reveals his intent. In combating
enemy DF systems, pathfinders consider the following:
y The high priority of aviation-related missions.
y The length of time the pathfinders remain on the air.
y The number of pathfinder transmitters.
y The distance of friendly forces from enemy DF systems, enemy fire and maneuver elements,
and enemy collection and jamming resources.
y Friendly actions to mask pathfinder operations.
1-31. Strict signal security practices, to include electronic warfare (EW), greatly reduce the vulnerability
of signal devices to enemy exploitation. (FM 24-18 provides more information on communications.)
TRAINING
1-32. Personnel qualify as pathfinders only by completing the pathfinder course at the US Army
Infantry School, Fort Benning, Georgia.
GOALS
1-33. The pathfinder training program stresses—
y The development of individual proficiency in air traffic control procedures.
y That pathfinders learn and know the SOP of the aviation and ground units they support.
y Proficiency in slingload operations.
y Establishment of helicopter landing zones and drop zones. |
3-21.38 | 18 | Chapter 1
y Drop zone support team leader (DZSTL) and drop zone safety officer (DZSO) operations.
y Expertise in all aspects of long- and short-range communication (both of which are conducted
at unit level).
COMMANDER’S RESPONSIBILITIES
1-34. Major unit commanders who use pathfinders bear the responsibility for sustaining the pathfinders’
training and proficiency. Pathfinder training works best when integrated with the training of supported
aviation and ground units.
PATHFINDER’S RESPONSIBILITIES
1-35. The assigned, qualified, and trained pathfinder must ensure that any nonqualified Soldiers
assigned to his unit team receive adequate pathfinder training before going on a mission. |
3-21.38 | 19 | THIS CHAPTER IMPLEMENTS STANAGs 2863, 3117, AND 3570.
Chapter 2
Plans, Organization, Conduct, and Threat
Pathfinders conduct many different missions. Several of these supplement the ground
unit's operation.
SECTION I. PLANS
To ensure success of the ground mission, pathfinders plan their own missions in detail. The more time they
have to make plans, the more detailed plans they can make.
WARNING ORDER
2-1. As soon as he receives word of a pending operation, the senior pathfinder issues a mission alert.
He immediately follows with a warning order. He includes just enough information to allow the other
pathfinders to start preparing for the operation. This includes—
y Roll call.
y Enemy and friendly situations (in brief).
y Mission.
y Chain of command and task organization.
y Individual uniform and equipment (if not discussed in the SOP).
y Required equipment.
y Work priorities (who does what, when, and where).
y Specific instructions.
y Attached personnel.
y Coordination times.
INITIAL PREPARATIONS
2-2. On receiving the alert or warning order, pathfinders inspect and, as needed, augment personnel
and equipment. Pathfinders prepare equipment in the following order, from the most to the least important:
y Radios.
y Navigation aids (electronic and visual).
y Weapons.
y Essential individual equipment.
y Assembly aids.
y Other items as needed.
2-3. The pathfinder element leader (or his representative) and the air mission commander begin
coordinating with the supported aviation unit(s), ground unit(s), or both.
2-4. As the pathfinders receive more information, they reorganize personnel and equipment to
accomplish the mission better. If time permits, they rehearse. Rehearsals are the time to make sure the
members on the pathfinder team are completely aware of their duties for that specific mission. They use
available briefing aids, and they rehearse on terrain that most nearly resembles the AO. |
3-21.38 | 20 | Chapter 2
2-5. To succeed, an operation must have security. So, each person receives only the information he
must have to complete each phase of the operation. For example, the commander isolates any Soldiers who
know the details of the operation. The situation dictates the extent of security requirements.
COORDINATION
2-6. Ground and aviation commanders work together to coordinate and plan the details of operations
for which they require pathfinder assistance.
2-7. In any type of operation (combat assault, reinforcement, artillery displacement, resupply, or
evacuation), the pathfinders might have to recommend—
y Exact locations for DZs or LZs.
y A time schedule.
y Landing formations.
y Employment techniques.
2-8. Before selecting a DZ or LZ, the supported unit commander considers the factors of METT-TC
(mission, enemy, terrain and weather, troops, time, and civil considerations). He also considers what the
pathfinder and aviation commanders (or their representatives) suggest.
2-9. While preparing for an operation, air liaison officers (ALOs) and ground unit commanders
(GUCs) coordinate with pathfinders to make an air movement table. Table 2-1 shows who
coordinates what.
Sequence ALO GUC Coordinate with Pathfinders
1 X X Operational location (coordinates).
2 X Locations of the primary and alternate communications checkpoints
(coordinates).
3 X Location of release point.
• Coordinates.
• Whether manned or unmanned.
4 X X Time the site can begin operating.
5 X Aircraft information.
• Formation.
• Time interval.
• Time of flight.
• Drop speed.
• Drop altitude.
6 X Pathfinder transportation and time available for briefing.
7 X Pathfinder transportation station time.
8 X X Routes into the objective area.
Table 2-1. Air liaison officer's and ground unit commander's coordination
of air movement table. |
3-21.38 | 21 | Plans, Organization, Conduct, and Threat
Sequence ALO GUC Coordinate with Pathfinders
9 X X Call signs.
• Aircraft.
• Pathfinders.
• Supported units.
• Other friendly units.
10 X X Primary and alternate frequencies.
• Aircraft.
• Pathfinders.
• Supported units.
• Other friendly units.
• Homing beacon.
11 X X Fire support.
• Artillery.
• Tactical air support.
12 X Weather forecast.
• Ceiling.
• Visibility.
• Temperatures (high and low).
13. X X Logistical support, including locations of—
• Medical aid station.
• Prisoner collection point.
• Fuel.
• Ammunition.
• Rations.
14 X X Alternate plans (ALO and GUC).
• Evacuation plan.
• Escape and evasion.
15 X X Friendly unit locations.
16 X X Authority to implement mission change.
17 X Support personnel required.
18 X No-land or no-drop signals (day and night).
19 Markings for obstacles (only on request of flight commander).
20 X Marking of objective site for identification from the air.
21 X X Time allowed for approval.
Table 2-1. Air liaison officer's and ground unit commander's coordination of air movement table
(continued).
2-10. The pathfinder needs this information because he helps coordinate planning. He uses the
information to make final plans for the pathfinder phase of the operation. To make sure that he can safely
and efficiently control all aircraft in and around the DZs or LZs, he must know all about the operation's air
movement phase. Aviation and ground commanders inform pathfinders of all changes to plans and landing
sites, and about any emergencies. The pathfinder coordinates all activities with every agency or unit
involved, and then gives the information to all of the pathfinders involved in the operation.
2-11. When the pathfinder reaches the objective site, he may find it unsuitable. He evaluates the
coordinated landing formation, heading, drop altitude, and the ground site itself. Then he coordinates with |
3-21.38 | 22 | Chapter 2
the ground commander, aviation commander(s), or both to see whether any of the original requirements
have changed. Depending on the mission, enemy, terrain, troops, time, and civil considerations
(METT-TC), the commander(s) determines what, if any, changes to make to accomplish the mission. If for
any reason he cannot contact the GUC or aviation commander, the pathfinder can also coordinate for
authority to change requirements.
2-12. The pathfinder limits augmentation to that appropriate to the amount and type of transport. The
reinforced pathfinder team remains under the command of the pathfinder leader, who is responsible for
team functions. Based on the coordinated plans for the operation, the pathfinder requests augmentation in
personnel and equipment. He considers—
y Mission.
y Use of personnel and equipment for security.
y Requirement to help assemble the supported units' personnel, supplies, and equipment.
y Need for assistance in removing obstacles.
y Assistance required to transport and operate navigation aids under pathfinder direction.
LINKUP WITH SUPPORTED UNIT
2-13. Pathfinders join the supported unit early enough to allow final coordination between pathfinder,
aviation, and lifted ground unit representatives. Pathfinders designated to accompany and provide
continuous support to a ground unit can enter a DZ or LZ ahead of the assault echelon. After the initial
phase of the air movement, they link up with the supported unit.
FINAL PREPARATIONS
2-14. The pathfinder leader issues his operation order (OPORD). If he issues it before linking up with
the supported unit, he issues any changes as a fragmentary order (FRAGO). The order describes any
member's duties not covered in the unit SOP. Team members must have a chance to study maps, aerial
photos, and terrain models of the area. The order provides details about the location and operation of
proposed air delivery facilities, flight routes, flight formations, time schedules, release points (RPs), and
communication checkpoints (CCPs).
2-15. The pathfinder conducts a final, thorough check of equipment. The commander decides exactly
how to transport the equipment into the objective area. Then the pathfinders prepare all of the equipment
for rapid displacement.
2-16. Just before departure, at a final weather and operational briefing, the pathfinders and supported
units conduct final coordination.
SECTION II. ORGANIZATION FOR COMBAT
The pathfinder mission itself determines the specific requirements of the mission. In most operations, three to
six Soldiers comprise the pathfinder element supporting a DZ or an LZ or continuously supporting an Infantry
battalion. Seldom does a pathfinder section deploy as a unit from a single location. The pathfinder leader plans
for his elements to operate widely separated and disconnected.
INSERTION
2-17. Pathfinders can insert by a variety of air, sea, or land transportation modes.
HELICOPTER DELIVERY
2-18. Helicopters can deliver more personnel and equipment in a better state of operational readiness
than any other means. Even in marginal weather, helicopters allow more precise, flexible deliveries than |
3-21.38 | 23 | Plans, Organization, Conduct, and Threat
parachutes do. Some terrain does not allow helicopter landings. In these cases, trained Soldiers rappel or
fast rope from helicopters while the helicopters hover over the unsuitable landing areas. Personnel can
insert or withdraw by ladders suspended from hovering helicopters, or extract using special patrol
insertion-extraction system (SPIES) techniques. Helicopters can also—
y Rapidly shift or evacuate pathfinders.
y Carry nonparachutists to support pathfinders.
y Deliver when rain or low ceilings prohibit parachuting.
y Rapidly change insertion locations.
PARACHUTE DELIVERY
2-19. Parachute delivery by fixed-wing aircraft normally affords greater range and speed of movement
than landing by helicopter. In a short-distance operation, helicopters can serve as the jump aircraft.
2-20. Depending on wind conditions, pathfinders should compute their desired parachute RPs before
arriving over the DZ. For accuracy and security, the pathfinders jump at the lowest practical altitude.
Aircraft SOPs prescribe jump altitudes and personnel procedures. Such procedures vary in accordance with
(IAW) peacetime and wartime restrictions.
2-21. As highly trained parachutists, pathfinders can insert into unimproved and marginal DZs. They
know how to control the canopy of a maneuverable parachute, and they know how to make emergency
landings. They also know how to parachute into rough-terrain DZs. These skills give them some flexibility
in planning parachute delivery.
CAUTION
During preparation for the operation, pathfinders carefully arrange and
pad all essential items of operational equipment into appropriate
containers. Carrying this equipment with them when they insert
ensures they have it as soon as they land.
2-22. The best time to insert by parachute is during nonilluminated, nonsupported night operations that
emphasize secrecy.
2-23. Because fixed-wing aircraft need large, secure, obstacle-free landing areas, they seldom deliver
pathfinders.
WATER AND LAND DELIVERY
2-24. Delivering pathfinders by watercraft offers security only up to the point of debarkation from the
craft. The pathfinders still must move from the landing point (debarkation) to their final destination. To do
this, they infiltrate by land.
OVERLAND MOVEMENT
2-25. Because it limits small elements to short movements, infiltrating by land is the worst way to insert
pathfinders.
2-26. A well-organized, stable, close-knit enemy defense in depth can prohibit land infiltration. When
time allows, the pathfinders can increase infiltration security by combining overland infiltration with
parachute or airland infiltration.
2-27. Pathfinders infiltrate overland when the following conditions exist: |
3-21.38 | 24 | Chapter 2
y Limited visibility over difficult terrain.
y Overextended enemy lines.
y Fluid combat zone.
y Unsecured portions of enemy boundaries.
STAY-BEHIND OPERATION
2-28. In a stay-behind operation, pathfinder elements remain in the operational area while another
friendly force withdraws from the area. The commander can use stay-behind operations for the following
reasons:
y To lure enemy forces into a vulnerable position.
y To hold an area for reoccupation. If the commander plans to reoccupy a friendly area he knows
the enemy could overrun, he leaves a stay-behind force to hold it. If he leaves the stay-behind
force for this reason, then he must also plan an air assault to regain the area, if needed.
SECTION III. CONDUCT OF OPERATIONS
Pathfinders provide air traffic advisories and navigational aid for airplanes and helicopters. They also perform
limited physical improvement and CBRN monitoring and surveying within DZs or LZs. Pathfinder availability,
the tactical plan, the complexity of the operation, the terrain, and the air assault proficiency of the supported
ground unit dictate pathfinder support. However, every air assault operation requires positive aircraft control.
During an air-assault operation, pathfinders cross load before entering an LZ with the initial assault elements.
DAYLIGHT ASSAULT
2-29. In daylight operations, pathfinders insert into an LZ before the initial assault echelon only if the
LZ requires extensive improvement or if planners expect unusual control problems. Either way, the
pathfinders start setting up at once so they can provide air traffic control and other aid to all subsequent
lifts of troops, supplies, and equipment. They may have a few minutes or several hours to do this before the
other elements arrive. The tactical plan spells out exactly when and how the pathfinders will enter the area,
whether they will go in alone or not, and what time the next element will arrive.
NIGHT ASSAULT
2-30. Security and operational requirements determine the method of delivering pathfinders at night.
Pathfinders can move cross-country on foot, airdrop onto or near objective areas, airland in total blackout,
or airland with minimum natural illumination. When they do insert this way, they sometimes arrive before
the main body does. As soon as they arrive, the pathfinders reconnoiter the LZ, install visual and electronic
aids, and establish air traffic control. Soldiers from the supported ground unit sometimes accompany the
pathfinders. These additional Soldiers provide security and help clear obstacles. The on-site pathfinder
element remains concealed and observes the objective. Pathfinders analyze the planned landing formation,
heading, and assembly area. To avoid compromising the mission, no one on the DZ or LZ moves until an
incoming aircraft reaches the CCP.
EXTRACTION
2-31. As the ground force at the LZ shrinks, vulnerability to attack increases. Therefore, the commander
has pathfinders speed up the air assault extraction operations.
2-32. Planned artillery fires and air strikes as well as the need to maintain ground security to the last
minute require that ground controllers control supporting aircraft throughout the extraction. This means
they make sure aircraft land at specific points within the extraction site where ground security can cover |
3-21.38 | 25 | Plans, Organization, Conduct, and Threat
them. This speeds the operation and helps ensure the safe withdrawal of personnel, equipment, and aircraft
from the area.
2-33. Unless they land with the lifted unit, pathfinders must arrive at the extraction site in time to
reconnoiter thoroughly and coordinate with the lifted unit.
2-34. During the planning stage, the pathfinder team leader designates near and far rally points for use
in case the DZ or LZ becomes unusable. Pathfinders may have to fight their way to these rally points and
reorganize. To increase the chance of survival, evasion, resistance, and escape, the team leader designates
far rally points several kilometers from the DZ or LZ.
STAGING AREAS
2-35. In staging areas, in the absence of air traffic control (ATC) units, pathfinders can provide air
traffic advisories. They may also act as liaison between the aviation and ground units and help the ground
unit commander prepare and position troops, supplies, and equipment for air movement. When pathfinders
must set up a temporary staging area to support an operation of short duration, they move into the area
before the operation begins. This gives them enough time to reconnoiter, mark the site, coordinate, and set
up positive ATC. Safe, efficient, and rapid movement of helicopters or airplanes requires positive ATC in
staging areas. The need for positive ATC increases when the weather deteriorates, when the number of
aircraft increases, or when changes in the situation or plans require it.
ARTILLERY DISPLACEMENT
2-36. Pathfinders should help safely and rapidly displace artillery, day or night. Coordinating with
ground and aviation unit commanders and understanding their SOPs ensure pathfinders accurately and
efficiently deliver equipment, personnel, and ammunition.
SUPPORT OF GROUND OPERATIONS
2-37. During ground operations that require sustained Army aviation support, pathfinders might
continuously aid and control aircraft. The commander can attach pathfinders he has already attached to
Infantry battalions to companies as well. The pathfinders provide support consistent with the availability of
personnel and equipment. Continuous support improves operational efficiency and aviation safety during
all types of air assault operations. However, aviation units with limited pathfinder resources cannot provide
continuous support. In such cases, commanders usually employ pathfinders on a short-term, priority basis
wherever the pathfinders can help accomplish major unit missions. In the absence of pathfinders, selected
personnel in the ground units must receive enough training and preparation to allow them to provide
minimum aid to supporting aircraft.
SUPPORT OF AIR FORCE
2-38. By joint US Army and USAF agreement, in the absence of USAF STTs, Army pathfinders can
provide day or night control for USAF aircraft on airfields, DZs, and LZs. However, the pathfinders may
need UHF and VHF communications equipment that is compatible with USAF aircraft.
MIXED OPERATIONS
2-39. Some situations could require the simultaneous control of mixed air traffic at the same location,
such as resupply parachute drops into forward helicopter LZs. Fixed-wing airfields can expect helicopter
traffic. Mixed air traffic often presents difficult control problems, so controllers must apply strict control
measures. To ensure control, they designate, coordinate, and clearly identify landing, parking, loading,
unloading, refueling, and rearming areas. |
3-21.38 | 26 | Chapter 2
RADIO COMMUNICATIONS
2-40. For success, a pathfinder requires the essential element of communication by GTA voice radio.
The pathfinders place this into operation first at a DZ or LZ, and they take it out of operation last.
2-41. Pathfinders must thoroughly understand radio procedures. This includes the phraseology unique to
ATC (Chapter 3). They must send clear, concise, applicable, accurate, and correctly-timed
communications. To achieve speed and clarity of transmission, pathfinders and aviators practice radio
discipline. They transmit only necessary messages. Also, except in emergencies, they use pathfinder ATC
frequencies only for ATC (Figure 2-1).
2-42. Because they exchange a lot of vital information, aircraft crews normally record the important
parts of GTA messages. This helps them to make sure they understand and can follow instructions.
2-43. Pathfinders use electronic homing beacons, visual aids, and arm-and-hand signals to complement
voice communications. Pilots and transported troops must know the purpose and meaning of the aids used
and the techniques for using them (see STANAG 3570). (FM 21-60 discusses arm-and-hand signals and
visual aids.)
2-44. When possible, to keep informed about changing situations that could influence their operations,
pathfinders monitor supported unit command radio nets.
2-45. Pathfinders set up positive communications between pathfinder ATC facilities and collocated fire
support elements. This ensures aircraft receive timely and accurate information about friendly fires.
2-46. Pathfinder operations require the constant use of radios. This gives the enemy force many chances
to intercept, analyze, and exploit friendly transmissions. They try to gain intelligence and conduct
electronic jamming and deception. Defeating enemy jamming or imitative deception methods falls mostly
to the radio operator. He must know how to recognize and report this deliberate interference. To plan and
execute a tactical mission, he must know how to—
y Defend against and beat ECM using electronic counter-countermeasures (ECCM).
y Secure transmissions.
y Communicate using other means.
Figure 2-1. En route communication procedures with pathfinders in a landing zone. |
3-21.38 | 27 | Plans, Organization, Conduct, and Threat
TERMINAL GUIDANCE BY SUPPORTED UNITS
2-47. Terminal guidance refers to information and minimal guidance given to pilots by anyone in a
ground unit other than a qualified pathfinder. Selected personnel normally furnish terminal guidance within
the supported unit. To do so, they use both organic and improvised equipment.
2-48. When pathfinders accompany ground units, aviation unit SOP may direct that terminal guidance
personnel augment pathfinder elements.
2-49. Terminal guidance personnel should know the following:
y The supporting aviation unit SOP.
y How to operate electronic and visual navigation aids to help aircraft find DZs or LZs.
y To provide essential information through GTA radio to guide and control Army aircraft.
y To reconnoiter and recommend suitable DZs or LZs.
y To determine, recommend, or perform ground-clearing pioneer work to prepare DZs or LZs.
SECTION IV. HIGH-THREAT ENVIRONMENT
The threat comes in many forms. To ensure mission success, aviation and ground commanders must consider
all possibilities. They must consider a threat anything that could disrupt or delay the mission, or that could
otherwise cause the mission to fail.
CONTROL AND NAVIGATION
2-50. Pathfinders have limited voice control of aircraft. Thus, the ground unit commander and the air
mission commander must coordinate closely. Navigation presents special problems—aviators must fly low
to avoid detection. In a high-threat environment, critical factors include time, distance, routes, and tactical
instruments.
2-51. For example, two pathfinders with beacons could emplace along a route in advance of the initial
flight. They provide pilots with air control points. If the pilot needs the beacon turned on due to
navigational error, he can transmit a prearranged signal or code word.
2-52. Pathfinders might discover a threat, such as an antiaircraft weapon, along the primary route. If so,
they can alert pilots by prearranged code word or signal to change to an alternate route.
TACTICAL INSTRUMENT FLIGHTS
2-53. Flying under instrument meteorological conditions poses special problems in a high-threat
environment. This threat overrides the controlled instrument flight rules in the aviation-series manuals. It
forces aircraft to fly at altitudes well below the minimums for normal instrument flight.
2-54. Weather variances can create a tactical emergency. If so, the commander might have to use
aviation assets under instrument conditions and well below the altitudes specified by standard instrument
flight rules. The commander will only send aircraft on a mission in a high-threat environment under these
conditions when the situation meets the following criteria:
y The aviation and ground commanders cannot postpone the mission to wait for better weather.
y The pathfinders must conduct the mission in a high-threat environment.
y Low visibility en route precludes nap-of-the-earth flight.
2-55. Aviation and ground commanders employ tactical instrument flight whenever weather or time and
distance considerations prevent mission completion in other flight modes. Therefore, they must often use
tactical instrument flight during round-the-clock operations on the high-threat battlefield. Aircrews and
pathfinders must rehearse tactical instrument flight until they achieve proficiency. |
3-21.38 | 28 | Chapter 2
2-56. Pilots fly in one of two altitude modes.
MODE 1
2-57. When the air defense threat keeps flight altitudes below those established by AR 95-1
(for standard instrument flight), then pilots can fly at least 1,000 feet over mountainous terrain, and 500
feet over flat terrain.
MODE 2
2-58. When the threat limits flight altitudes to the least possible clearances, pilots can fly as low as 50 to
500 feet above the ground, regardless of terrain.
AIR ROUTES
2-59. Aircraft traffic management personnel (and pathfinders) can expect to move their equipment as
often as every four hours, depending on the threat. Terrain, weather, and, most importantly, whether the
enemy could intercept friendly aircraft from that location, determine when to move.
THREAT AND TERRAIN
2-60. In many instances, the threat and terrain prohibit a straight-line flight between the takeoff (liftoff)
point and the destination (Figure 2-2). This applies to both Modes 1 and 2.
FLIGHT MONITORING AND LANDING ZONE APPROACH
2-61. Enemy presence keeps the pathfinders from using nondirectional beacons. However, for pilots to
approach and land on the LZ visually, they need good visibility. Using radio homing signals for directional
guidance presents a dubious option. Whether or not aircraft traffic-management personnel decide to use
this electronic device, they should try to orient its signal away from the FEBA. This reduces the chance of
detection. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.