Site exploitation: Difference between revisions

Content deleted Content added
m case fix (via WP:JWB)
No edit summary
Line 3:
facilitate subsequent operations, or support criminal prosecution."<ref>{{cite web |url=http://armypubs.army.mil/doctrine/DR_pubs/dr_a/pdf/attp3_90x15.pdf |title=Archived copy |accessdate=2014-04-14 |url-status=dead |archiveurl=https://web.archive.org/web/20140327003246/http://armypubs.army.mil/doctrine/DR_pubs/dr_a/pdf/attp3_90x15.pdf |archivedate=2014-03-27 }}</ref>
 
Sensitive site exploitation was conducted during the invasion of Iraq in [[Operation Iraqi Freedom]] when a key part of the Coalition Forces' mission was to discover [[weapons of mass destruction]] (WMDs). The "sensitive" of SSE referred to the possibility that sites searched might have contained [[CBRN (weapon)|chemical, biological, radiological, or nuclear]] (CBRN) materials inherent in WMDs. Later, an effort was made to refer to the practice as "SE" (site exploitation) instead of "SSE" because sites were still being searched and exploited, but more generally for intelligence gathering and not with the intent of locating WMDs.
 
The main intent of site exploitation is to extract as much potential intelligence as possible from the site of a raid or point of interest in hopes that the data collected will lead to further enemy targets or answer priority intelligence requirements (PIR). A secondary benefit is that this data can be used to help prosecute criminals, if done correctly in accordance with local law.
 
Site exploitation consists of the following phases: securing the site (usually through a raid), documenting the site, searching the site, prioritizing exfiltration, and exploiting materials found.