This website is not affiliated with the U.S. government or military. All proceeds from the operation of this site are donated to veteran and other charities.

301-371-1200 (SL2) - Process Captured Materiel

Standards: Secured captured enemy materiel. Prepared a spot report on captured enemy materiel known or believed to be of intelligence value. Filled out and attached tag to the item of captured enemy materiel. Selected correct disposition procedure for each item of captured enemy materiel.

Conditions:
This task can be performed in field and
garrison locations under all conditions.
Given captured enemy materiel consisting of
a map, signal operation instructions,
unidentified equipment, complete with
reference manuals, captured enemy equipment
tags, captured document tags, a sheet marked
TECHDOC, blank spot reports, and unit SOP
describing the processing and evacuation of
captured enemy materiel.

Standards:
Secured captured enemy materiel. Prepared a
spot report on captured enemy materiel known
or believed to be of intelligence value.
Filled out and attached tag to the item of
captured enemy materiel. Selected correct
disposition procedure for each item of
captured enemy materiel.

Performance
Steps

1.   Safeguard the CEM.

a.
Categorize the CEM
into-

(1) 
Captured enemy
documents include any piece of
recorded information, regardless
of form, obtained from the enemy,
which subsequently comes into the
hands of a friendly force. 
CEDs can be U.S. or allied
documents that were once in the
hands of the enemy.

(2) 
Captured enemy
equipment (CEE) �includes all
types of foreign materiel which
may have military application
found on an enemy prisoner of war
(EPW) or on the battlefield.

b.
Protect the CEM from
looting, loss, misuse, recaptures or
destruction by placing under guard
at all stages during the
intelligence exploitation process. 
Use the best method available
to preserve the item in its original
condition.

2.   Prepare a spot report on all time-sensitive
information.

a.
Identify time-sensitive
information. 
The TECHINT appendix to an
intelligence annex will delineate
time-sensitive technical items and
reporting channels.

Note.  Time-sensitive
information includes any significant
intelligence information with either
military or technical application, to
include enemy order of battle, enemy
maps, overlays, operation orders,
signals, codes, cryptographic
materiel, new weapons or equipment on
the battlefield, information critical
to successfully accomplishing friendly
courses of action, or information that
indicates a significant change in the
enemy’s capabilities or intentions.

b.
Submit a spot report to
notify higher commands of the
capture or identification of enemy
materiel believed to answer
intelligence requirements.

(1) 
Use S-A-L-U-T-E format
to identify-

(a)  
S – Size.

(b)  
A – Activity.

(c)  
L – Location.

(d)  
U – Unit.

(e)  
T – Time.

(f)   
E – Equipment.

(2) 
Report time-sensitive
items by the least IMMEDIATE
precedence.

3.   Tag each item of CEM.

a.
Tag all CEM found on the
battlefield with no known
association to an EPW.

(1) 
Use CEE Tag on each
piece of equipment.

(2) 
Use Captured Document
Tag for each document.

b.
Attach a sheet marked
TECHDOC to flag the CED, if the CED
is associated with a particular
piece of CEM.

(1) 
List the precise
location, time, circumstances of
capture and a detailed description
of the materiel, on the sheet
marked TECHDOC.

(2) 
Treat all documents
marked TECHDOC with the highest
priority and forward them through
the intelligence officer to the
higher command until their value
is determined.

c.
Use special procedures
for handling captured
communication-encryption (C-E)
equipment and documents marked
TECHDOC.

(1) 
Handle in close
coordination with the
communications staff.

(2) 
Treat CEDs containing
communications or cryptographic
information as secret material.

(3) 
Tag and evacuate
through secure channels without
delay.

d.
Use field expedient
method when no preprinted tags are
available. 
Ensure, as a minimum, to
include the following information:

(1) 
Provide date and time
of capture.

(2) 
Identify capturing unit
and its designation.

(3) 
Explain circumstances
of capture.

(4) 
Provide the identity of
the CED or CEE captured.

(5) 
Identify the location
where the document was captured,
including the six or eight digit
grid coordinate.

e.
Tag without defacing the
item.

(1) 
Ensure that all
markings that appear on the
materiel at the time of capture
are preserved.

(2) 
Ensure that items are
tagged so as not to damage or
destroy the documents or
equipment.

(3) 
Never write on the
document itself.

(4) 
Put tag, without
damaging the CED, in a waterproof
bag.

(5) 
Attach tag to CEM so it
will not come off.

4.   Select the correct disposition procedure for each
item of CEM.

a.
Identify all
time-sensitive captured enemy
materiel to be evacuated to the S2,
who will screen for intelligence or
technical value, and evacuate to the
rear for examination and
exploitation.  
All enemy documents captured
on the battlefield are sent
immediately to the first
intelligence staff officer in the
chain. 
The S2/G2 routes all enemy
documents to the nearest
interrogation element for tactical
exploitation. 
Interrogators screen the
documents for immediate information
and forward them to higher command,
as required.

(1) 
Evacuate CEM with any
technical documents found that
relate to its design or operation. 
When the materiel cannot be
evacuated, the documents should be
identified with the materiel by
attaching a sheet marked TECHDOC,
and the following information:

(a)  
List the precise
location, time, and circumstance
of capture.

(b)  
List a detailed
description of the materiel.

(c)   Take photographs of the equipment and evacuate with
the document.

(d)  
Take photographs of
the materiel, placing an object
of known size such as a ruler
near the materiel to provide a
size reference.

(e)  
Protect equipment
that is too large to evacuate.

(f)   
Detail guards to
safeguard the item until you
receive further directions.

(g)  
Keep photos with
TECHDOC and evacuate.

(2) 
Evacuate CEM through
your chain of command to the S2,
who will screen for intelligence
or technical value, then evacuate
to the rear for examination and
exploitation.

b.
Evacuate other CEM
through similar logistic assets (for
example route captured petroleum,
oil, and lubricants [POL] through
our POL points).

c.
Protect the CEM that
cannot be evacuated, until
disposition instructions are
received.

Evaluation
Preparation:

Setup:
Prepare samples of captured enemy documents.
Prepare captured document tags for CEDs.
Prepare captured enemy equipment tags for
all unidentified equipment, complete with
reference manuals. Provide a sheet marked
TECHDOC, blank spot reports, and unit SOP.

Brief
Soldier:
Instruct the soldier to process
and evacuate all CEDs and CEE using captured
document tags, captured enemy equipment tags
and a sheet marked TECHDOC, when necessary.

Performance
Measures

GO

NO
GO

1.   Safeguarded each item.





a.
Used best method
available to preserve the item in
its original condition.

 


 


b.
Protected
the item from looting, loss, misuse,
recapture or destruction by placing
under guard at all stages during the
intelligence exploitation process.

 


 


2.   Submitted a written or verbal spot report on time-
sensitive information that included
six of six S-A-L-U-T-E items
identified correctly.





3.   Completed the appropriate tag for each item.





a. Used captured enemy equipment or captured document tag for CEM
found on the battlefield.

 


 


b.
Attached a sheet marked
"TECHDOC" to any CED
associated with a particular piece
of CEM. 
The cover sheet should list
the precise location, time,
circumstances of capture, and a
detailed description of the
materiel. 
Took photos of the CEM with a
size reference, if possible, and
kept with TECHDOC.

 


 


c.
Used
field expedient method when no
preprinted tags were available.

 


 


d.
Tagged
without defacing the item.

 


 


4.   Selected the correct disposition procedure for each
item.





Evaluation
Guidance:
Score the soldier GO if all
performance measures are passed. Score the
soldier NO GO if any performance measure is
failed. If the soldier scores NO GO, show
him what was done wrong and how to do it
correctly.

References

 

Required

Related

 

 

FM
3-19.40

 

 

FM
34-52

 

 

FM
34-54


Important Information: We strive to provide information on this website that is accurate, complete and timely, but we make no guarantees about the information, the selection of schools, school accreditation status, the availability of or eligibility for financial aid, employment opportunities or education or salary outcomes. Visit here for important information on these topics.