1. Safeguard the CEM.
Categorize the CEM
documents include any piece of
recorded information, regardless
of form, obtained from the enemy,
which subsequently comes into the
hands of a friendly force.
CEDs can be U.S. or allied
documents that were once in the
hands of the enemy.
equipment (CEE) �includes all
types of foreign materiel which
may have military application
found on an enemy prisoner of war
(EPW) or on the battlefield.
Protect the CEM from
looting, loss, misuse, recaptures or
destruction by placing under guard
at all stages during the
intelligence exploitation process.
Use the best method available
to preserve the item in its original
2. Prepare a spot report on all time-sensitive
The TECHINT appendix to an
intelligence annex will delineate
time-sensitive technical items and
information includes any significant
intelligence information with either
military or technical application, to
include enemy order of battle, enemy
maps, overlays, operation orders,
signals, codes, cryptographic
materiel, new weapons or equipment on
the battlefield, information critical
to successfully accomplishing friendly
courses of action, or information that
indicates a significant change in the
enemy’s capabilities or intentions.
Submit a spot report to
notify higher commands of the
capture or identification of enemy
materiel believed to answer
Use S-A-L-U-T-E format
S – Size.
A – Activity.
L – Location.
U – Unit.
T – Time.
E – Equipment.
items by the least IMMEDIATE
3. Tag each item of CEM.
Tag all CEM found on the
battlefield with no known
association to an EPW.
Use CEE Tag on each
piece of equipment.
Use Captured Document
Tag for each document.
Attach a sheet marked
TECHDOC to flag the CED, if the CED
is associated with a particular
piece of CEM.
List the precise
location, time, circumstances of
capture and a detailed description
of the materiel, on the sheet
Treat all documents
marked TECHDOC with the highest
priority and forward them through
the intelligence officer to the
higher command until their value
Use special procedures
for handling captured
equipment and documents marked
Handle in close
coordination with the
Treat CEDs containing
communications or cryptographic
information as secret material.
Tag and evacuate
through secure channels without
Use field expedient
method when no preprinted tags are
Ensure, as a minimum, to
include the following information:
Provide date and time
Identify capturing unit
and its designation.
Provide the identity of
the CED or CEE captured.
Identify the location
where the document was captured,
including the six or eight digit
Tag without defacing the
Ensure that all
markings that appear on the
materiel at the time of capture
Ensure that items are
tagged so as not to damage or
destroy the documents or
Never write on the
Put tag, without
damaging the CED, in a waterproof
Attach tag to CEM so it
will not come off.
4. Select the correct disposition procedure for each
item of CEM.
time-sensitive captured enemy
materiel to be evacuated to the S2,
who will screen for intelligence or
technical value, and evacuate to the
rear for examination and
All enemy documents captured
on the battlefield are sent
immediately to the first
intelligence staff officer in the
The S2/G2 routes all enemy
documents to the nearest
interrogation element for tactical
Interrogators screen the
documents for immediate information
and forward them to higher command,
Evacuate CEM with any
technical documents found that
relate to its design or operation.
When the materiel cannot be
evacuated, the documents should be
identified with the materiel by
attaching a sheet marked TECHDOC,
and the following information:
List the precise
location, time, and circumstance
List a detailed
description of the materiel.
(c) Take photographs of the equipment and evacuate with
Take photographs of
the materiel, placing an object
of known size such as a ruler
near the materiel to provide a
that is too large to evacuate.
Detail guards to
safeguard the item until you
receive further directions.
Keep photos with
TECHDOC and evacuate.
Evacuate CEM through
your chain of command to the S2,
who will screen for intelligence
or technical value, then evacuate
to the rear for examination and
Evacuate other CEM
through similar logistic assets (for
example route captured petroleum,
oil, and lubricants [POL] through
our POL points).
Protect the CEM that
cannot be evacuated, until
disposition instructions are
1. Safeguarded each item.
Used best method
available to preserve the item in
its original condition.
the item from looting, loss, misuse,
recapture or destruction by placing
under guard at all stages during the
intelligence exploitation process.
2. Submitted a written or verbal spot report on time-
sensitive information that included
six of six S-A-L-U-T-E items
3. Completed the appropriate tag for each item.
a. Used captured enemy equipment or captured document tag for CEM
found on the battlefield.
Attached a sheet marked
"TECHDOC" to any CED
associated with a particular piece
The cover sheet should list
the precise location, time,
circumstances of capture, and a
detailed description of the
Took photos of the CEM with a
size reference, if possible, and
kept with TECHDOC.
field expedient method when no
preprinted tags were available.
without defacing the item.
4. Selected the correct disposition procedure for each