Content deleted Content added
m case fix (via WP:JWB) |
No edit summary |
||
Line 3:
facilitate subsequent operations, or support criminal prosecution."<ref>{{cite web |url=http://armypubs.army.mil/doctrine/DR_pubs/dr_a/pdf/attp3_90x15.pdf |title=Archived copy |accessdate=2014-04-14 |url-status=dead |archiveurl=https://web.archive.org/web/20140327003246/http://armypubs.army.mil/doctrine/DR_pubs/dr_a/pdf/attp3_90x15.pdf |archivedate=2014-03-27 }}</ref>
Sensitive site exploitation was conducted during the invasion of Iraq in [[Operation Iraqi Freedom]] when a key part of the Coalition Forces' mission was to discover [[weapons of mass destruction]] (WMDs).
The main intent of site exploitation is to extract as much potential intelligence as possible from the site of a raid or point of interest in hopes that the data collected will lead to further enemy targets or answer priority intelligence requirements (PIR).
Site exploitation consists of the following phases: securing the site (usually through a raid), documenting the site, searching the site, prioritizing exfiltration, and exploiting materials found.
|