dcsimg
This website is not affiliated with the U.S. government or military.

301-371-1200 (SL2) - Process Captured Materiel

Standards: Secured captured enemy materiel. Prepared a spot report on captured enemy materiel known or believed to be of intelligence value. Filled out and attached tag to the item of captured enemy materiel. Selected correct disposition procedure for each item of captured enemy materiel.

Conditions: This task can be performed in field and garrison locations under all conditions. Given captured enemy materiel consisting of a map, signal operation instructions, unidentified equipment, complete with reference manuals, captured enemy equipment tags, captured document tags, a sheet marked TECHDOC, blank spot reports, and unit SOP describing the processing and evacuation of captured enemy materiel.

Standards: Secured captured enemy materiel. Prepared a spot report on captured enemy materiel known or believed to be of intelligence value. Filled out and attached tag to the item of captured enemy materiel. Selected correct disposition procedure for each item of captured enemy materiel.

Performance Steps

1.   Safeguard the CEM.

a. Categorize the CEM into-

(1)  Captured enemy documents include any piece of recorded information, regardless of form, obtained from the enemy, which subsequently comes into the hands of a friendly force.  CEDs can be U.S. or allied documents that were once in the hands of the enemy.

(2)  Captured enemy equipment (CEE) �includes all types of foreign materiel which may have military application found on an enemy prisoner of war (EPW) or on the battlefield.

b. Protect the CEM from looting, loss, misuse, recaptures or destruction by placing under guard at all stages during the intelligence exploitation process.  Use the best method available to preserve the item in its original condition.

2.   Prepare a spot report on all time-sensitive information.

a. Identify time-sensitive information.  The TECHINT appendix to an intelligence annex will delineate time-sensitive technical items and reporting channels.

Note.  Time-sensitive information includes any significant intelligence information with either military or technical application, to include enemy order of battle, enemy maps, overlays, operation orders, signals, codes, cryptographic materiel, new weapons or equipment on the battlefield, information critical to successfully accomplishing friendly courses of action, or information that indicates a significant change in the enemy's capabilities or intentions.

b. Submit a spot report to notify higher commands of the capture or identification of enemy materiel believed to answer intelligence requirements.

(1)  Use S-A-L-U-T-E format to identify-

(a)   S - Size.

(b)   A - Activity.

(c)   L - Location.

(d)   U - Unit.

(e)   T - Time.

(f)    E - Equipment.

(2)  Report time-sensitive items by the least IMMEDIATE precedence.

3.   Tag each item of CEM.

a. Tag all CEM found on the battlefield with no known association to an EPW.

(1)  Use CEE Tag on each piece of equipment.

(2)  Use Captured Document Tag for each document.

b. Attach a sheet marked TECHDOC to flag the CED, if the CED is associated with a particular piece of CEM.

(1)  List the precise location, time, circumstances of capture and a detailed description of the materiel, on the sheet marked TECHDOC.

(2)  Treat all documents marked TECHDOC with the highest priority and forward them through the intelligence officer to the higher command until their value is determined.

c. Use special procedures for handling captured communication-encryption (C-E) equipment and documents marked TECHDOC.

(1)  Handle in close coordination with the communications staff.

(2)  Treat CEDs containing communications or cryptographic information as secret material.

(3)  Tag and evacuate through secure channels without delay.

d. Use field expedient method when no preprinted tags are available.  Ensure, as a minimum, to include the following information:

(1)  Provide date and time of capture.

(2)  Identify capturing unit and its designation.

(3)  Explain circumstances of capture.

(4)  Provide the identity of the CED or CEE captured.

(5)  Identify the location where the document was captured, including the six or eight digit grid coordinate.

e. Tag without defacing the item.

(1)  Ensure that all markings that appear on the materiel at the time of capture are preserved.

(2)  Ensure that items are tagged so as not to damage or destroy the documents or equipment.

(3)  Never write on the document itself.

(4)  Put tag, without damaging the CED, in a waterproof bag.

(5)  Attach tag to CEM so it will not come off.

4.   Select the correct disposition procedure for each item of CEM.

a. Identify all time-sensitive captured enemy materiel to be evacuated to the S2, who will screen for intelligence or technical value, and evacuate to the rear for examination and exploitation.   All enemy documents captured on the battlefield are sent immediately to the first intelligence staff officer in the chain.  The S2/G2 routes all enemy documents to the nearest interrogation element for tactical exploitation.  Interrogators screen the documents for immediate information and forward them to higher command, as required.

(1)  Evacuate CEM with any technical documents found that relate to its design or operation.  When the materiel cannot be evacuated, the documents should be identified with the materiel by attaching a sheet marked TECHDOC, and the following information:

(a)   List the precise location, time, and circumstance of capture.

(b)   List a detailed description of the materiel.

(c)   Take photographs of the equipment and evacuate with the document.

(d)   Take photographs of the materiel, placing an object of known size such as a ruler near the materiel to provide a size reference.

(e)   Protect equipment that is too large to evacuate.

(f)    Detail guards to safeguard the item until you receive further directions.

(g)   Keep photos with TECHDOC and evacuate.

(2)  Evacuate CEM through your chain of command to the S2, who will screen for intelligence or technical value, then evacuate to the rear for examination and exploitation.

b. Evacuate other CEM through similar logistic assets (for example route captured petroleum, oil, and lubricants [POL] through our POL points).

c. Protect the CEM that cannot be evacuated, until disposition instructions are received.

Evaluation Preparation:

Setup: Prepare samples of captured enemy documents. Prepare captured document tags for CEDs. Prepare captured enemy equipment tags for all unidentified equipment, complete with reference manuals. Provide a sheet marked TECHDOC, blank spot reports, and unit SOP.

Brief Soldier: Instruct the soldier to process and evacuate all CEDs and CEE using captured document tags, captured enemy equipment tags and a sheet marked TECHDOC, when necessary.

Performance Measures

GO

NO GO

1.   Safeguarded each item.

--

--

a. Used best method available to preserve the item in its original condition.

 

 

b. Protected the item from looting, loss, misuse, recapture or destruction by placing under guard at all stages during the intelligence exploitation process.

 

 

2.   Submitted a written or verbal spot report on time- sensitive information that included six of six S-A-L-U-T-E items identified correctly.

--

--

3.   Completed the appropriate tag for each item.

--

--

a. Used captured enemy equipment or captured document tag for CEM found on the battlefield.

 

 

b. Attached a sheet marked "TECHDOC" to any CED associated with a particular piece of CEM.  The cover sheet should list the precise location, time, circumstances of capture, and a detailed description of the materiel.  Took photos of the CEM with a size reference, if possible, and kept with TECHDOC.

 

 

c. Used field expedient method when no preprinted tags were available.

 

 

d. Tagged without defacing the item.

 

 

4.   Selected the correct disposition procedure for each item.

--

--

Evaluation Guidance: Score the soldier GO if all performance measures are passed. Score the soldier NO GO if any performance measure is failed. If the soldier scores NO GO, show him what was done wrong and how to do it correctly.

References

 

Required

Related

 

 

FM 3-19.40

 

 

FM 34-52

 

 

FM 34-54