Professional Documents
Culture Documents
35-Why-Site-Exploitation
35-Why-Site-Exploitation
35-Why-Site-Exploitation
C
irca 1980s, the posting of the
warning order in the squad >Maj Pummell is a retired Explosive Ordnance Disposal Officer who spent the
area drove training and pa- majority of his career supporting Force Reconnaissance and Special Operations
trolling. This was a single- units. As a civilian, he was the Sensitive Site Exploitation Program Manager for
page outline, completed with grease MARSOC and currently serves as a MARSOC Strategist.
pencil or alcohol pen, providing the
situation, mission, and then general
instructions. Millions of patrols con- 1) ENEMY
B. MISSION:
this format. The general instructions C. GENERAL INSTRUCTIONS:
contained a column for “special org. 1. NAME
2. CHAIN OF
COMMAND
3. GEN ORG
(ELEMENTS)
4. SPEC ORG
(TEAMS) 5. DUTIES
6. ARMS, AMMO, 7. GEAR COMMON TO
EQUIP ALL A. WHEN B. WHAT
8. TIME SCHEDULE
C. WHERE D. WHO
or teams.” (See Figure 1.) One of the UTILITIES
SOFT COVERS
DRAW RATIONS
DRAW WEAPONS
D. SPECIFIC INSTRUCTIONS:
ing time-sensitive intelligence of value. 1. A. _____, YOU ARE SECOND IN COMMAND AND THEREFORE IN CHARGE AT ANY TIME DURING MY ABSENCE. I WANT YOU TO ASSIST ME AT ALL TIMES
THROUGHOUT THE DAY IN ENSURING THAT THE TIME SCHEDULE IS ADHERED TO. YOU WILL SUPERVISE PREPARATION AND DRAWING OF
This was the analog age, the age of EQUIPMENT. ENSURE COMPLIANCE WITH WARNING ORDER BY ALL MEMBERS.
B. ELEMENT LEADERS SUPERVISE PREPARATION OF RESPECTIVE ELEMENTS AND REPORT COMPLIANCE TO SECOND IN COMMAND.
grease pencils, acetate overlays, lensatic
2. SPECIAL PURPOSE TEAMS/KEY INDIVIDUALS:______________________________________________________________________________________
compasses, and PRC 77 VHF FM com-
munications. All forces operating today Figure 1. Patrol Warning Order format, note column 4 Special Organization Teams. This is
fully appreciate that we are now well where the Patrol Leader would identify “Search Teams.”
into the digital age. The patrol warning
order was replaced by the PowerPoint These tasks are commonly referred crimes sites, critical government facili-
concept of operations, the CONOP, in- to as sensitive site exploitation (SSE) ties, and areas suspected of containing
dividual GPS devices, tactical software or usually site exploitation (SE). These high value targets.1
applications on smartphones, and satel- tasks support identity intelligence (I2), Sensitive site exploitation. A series of
lite communications supporting today’s the type of intelligence that helps con- activities to recognize, collect, process,
patrols. nect the operations and intelligence fu- preserve, and analyze information, per-
Our enemies and adversaries have sion concept behind the intelligence- sonnel, and/or materiel found during
also progressed into the digital age. driven operations. the conduct of operation.2
Today’s pocket litter is contained on During Operations E NDURING Site exploitation. Systematically
thumb drives, cellular phones, and other F REEDOM and I R AQI F REEDOM , searching for and collecting informa-
electronic devices. The force must be exploitation became a common “post tion, material, and persons from a des-
trained and equipped to effectively assault” task. The terms SSE and SE ignated location and analyzing them to
triage collected exploitable material to were often used to describe the tasks not answer information requirements, facili-
determine value in order to drive imme- appreciating the difference in meaning. tate subsequent operations, or support
diate follow on targets and support the Sensitive site. A geographically lim- criminal prosecution. Site exploitation
higher headquarters deliberate targeting ited area that contains, but is not limited contributes to exploitation, defined as
process. to, adversary information systems, war taking full advantage of any informa-
artificial intelligence learning algo- are becoming broader and individual exploitation. Recent practices showed
rithms allows a positive identification information shared on the commercial the investigation of Hawalas showing
to be made from searching thousands of market when people purchase DNA funds to support weapons systems and
hours of recorded video footage within tests and associated reporting options components to cross-border facilita-
minutes. (e.g., “23andMe”). tors. Today, the use of crypto currency
Voice printing is based upon the voice Document and media exploitation is becoming more common as the cyber
spectrogram using the vocal tract unique (DOMEX) is the processing and anal- domain matures. The requirement for
to the person; it can also be based upon ysis of both hardcopy and electronic cyber dominance and the ability to fol-
speech patterns. Voice printing is anoth- media. DOMEX sub-categories consist low crypto-currency transactions on the
er emerging technology and currently of document exploitation, media exploi- dark net will be a requirement for the
not a primary forensic tool. tation, and cellular phone exploitation. success of military operations.
DNA profiling is the technique used These terms are often used by those not When conducting counterinsurgency
to assist in the identification of individu- familiar with the actual target material operations or operating in the gray zone
als by their prospective deoxyribonucleic and processes involved in DOMEX.15 the insurgent or proxy enemies use of
acid (DNA) profiles. DNA profiles are The scope of weapons technical intelli- the IED has become the norm. The
a series of numbers that reflect an indi- gence (WTI) relative to site exploitation intelligence value of the IED and associ-
vidual’s DNA makeup and are a unique is the technical collection and exploita- ated components are critical to attack-
identifier. The DNA molecule is com- tion of captured material associated to ing the network and having the ability
posed of two chains that coil around IEDs, improvised weapons, and other to attack the enemy “left of boom.”
each other to form the double helix. The weapons systems. WTI, in the broader Processing this material has an obvi-
double helix carries the unique genetic definition, also includes technical in- ous increased risk requiring additional
instructions. telligence on threat weapons systems, subject matter experts to perform the
Generally, DNA can be divided into and weapons seen for the first time in collection tasks. Explosive ordnance
two categories: nuclear DNA, which order to determine the capability, threat, disposal must render safe the IED and
is inherited from ancestors, and mito- and development of countermeasures. make the decision to gather items of
chondrial DNA, which is inherited from WTI is used strategically to conduct intelligence value; items must then be
a single lineage. The single lineage is exploitation of ordnance residue used by transported to a safe area for detailed
from the maternal link, whereas nuclear our enemies and adversaries to confirm exploitation after confirming it is safe
DNA is inherited from all ancestors. violations of international arms agree- to do so. The many variations of IED
Nuclear DNA is usually referred to as ments and embargos. are here to stay.
the more informative DNA.14 Threat financing is the investigation
DNA collected from tactical events of different forms of currency used to Exploitation Concept of Operations
can be from samples containing bodi- support enemy action against our Na- A solid exploitation concept of op-
ly fluid residue, skin, hair, or a buccal tion. Identifying the funding methods erations is required to ensure the in-
swab sample collected directly from an and key facilitators can severely limit the formation gathered from the various
individual. DNA is another emerging enemy’s capability, often forcing them exploitation modalities is incorporated
technology and can be cost prohibitive to operate in a stressed state that results into any unit’s battle rhythm, feeding
for routine collections. DNA databases in errors and opportunities for other the appropriate events such as the tar-
geting board. If exploitation does not
support the commander’s information
requirements, the “So what?” value is
questionable. In the early years of ex-
ploitation during Operations ENDUR-
ING FREEDOM and IRAQI FREEDOM,
it was a common perception that col-
lected exploitable material, specifically
IED components, disappeared into a
black hole. This perception—often
justified—drove the question of: Why
should an individual or unit take the
risk and time to exploit the area after
a significant activity? Fortunately, over
the years, the combined improvements
of technology, training, and procedures
specifically in the Special Operations
Command program of record that has
Figure 2. Legacy graphic depicting the process for HVI targeting. (Figure provided by author.) established a global architecture to man-
Notes
1. Joint Staff, Joint Publication 3-13, (JP 3-13)
DOD Dictionary of Military and Associated
Terms, (Washington, DC: January 2020).
2. Ibid.
Iraqi soldiers surrender during DESERT STORM . (Official U.S. Army photo.) 5. Department of the Army, FM 34-54, Techni-
cal Intelligence, (Washington, DC: November
shipped by established air, land, and sea to provide timely intelligence to answer 2009).
lines to a regional collection node and information requirements and support
potentially supporting agencies in the the targeting cycle. Not through lack 6. Jason M. Hardy, MACV SOG: Team History
of a Clandestine Army, (Las Vegas, NV: Hardy
continental United States. of effort, the early years of exploitation Publications, 2018).
Robust supporting systems utilizing 2004–2009 had a hard time in return-
innovative technology will be the criti- ing information of relative intelligence 7. FM 34-54, Technical Intelligence.
cal element for success. Artificial intel- value to the submitting unit. Today,
ligence and deep learning algorithms the list of tactical to strategic wins at- 8. Ibid.
utilized at the tactical level will reduce tributed to exploitation efforts is signifi-
the digital load significantly. As an ex- 9. Ibid.
ample, incorporating this technology
will reduce the time to review thou- 10. JP 2-0, Joint Intelligence.
sands of hours of full motion video to
Success across all
11. U.S. Special Operations Command, US-
complete collection tasks such as facial domains can only be SOCOM SOF Identity Intelligence Smartbook
recognition matching from hundreds of
hours to minutes. achieved by a tested Version 2015-01, (Tampa, FL).
Success across all domains can only joint solution ... 12. Ibid.
be achieved by a tested joint solution
including partnering with specific inter- 13. Ibid.
agencies. Established DOD programs
of record should be reassessed to ensure cant. Through the Special Operations 14. Ibid.
the scope meets the requirements then Command program of record, a global
assigned by the Joint Chiefs of Staff as supporting architecture is in place that 15. Ibid.
the coordinating authority to establish facilitates the sharing of information
16. JP 3-60, Joint Targeting.
a globally reliant and survivable archi- across the combatant commands and
tecture. inter-agency networks. Collection triage
and collaboration is at a performance >Author’s Note: Some terms used in this ar-
Forcing the Return on Investment level to provide results to the submitter ticle are specific to the USSOCOCOM SSE
This is the vital discussion that fa- in a timely manner. Depending on the Program of Record and currently being staffed
cilitates the answer to “So What?” How forensic modality, results range from for Joint use approval.
does a commander force the return on minutes to months. The effort contin-
the investment when taking the risk ues with the goal to provide near-time
and time to conduct exploitation re- exploitation results across the range of
lated tasks? The process, exploit, and military operations. Success will only
disseminate cycle must move at a pace be accomplished by the tried and true