Army Tactics, Techniques, and Procedures ATTP 3-90.15 (FM 3-90.15) Site Exploitation Operations

Nonfiction, Reference & Language, Law, Evidence, Study Aids, Graduate & Professional, Armed Forces, Reference, Guides & Handbooks
Cover of the book Army Tactics, Techniques, and Procedures ATTP 3-90.15 (FM 3-90.15) Site Exploitation Operations by United States Government  US Army, eBook Publishing Team
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: United States Government US Army ISBN: 1230000128001
Publisher: eBook Publishing Team Publication: April 27, 2013
Imprint: Language: English
Author: United States Government US Army
ISBN: 1230000128001
Publisher: eBook Publishing Team
Publication: April 27, 2013
Imprint:
Language: English

This Army tactics, techniques, and procedures provides doctrinal guidance and considerations for Army forces conducting site exploitation operations. It replaces FM 3-90.15, Sensitive Site Operations, 25 April 2007. Site exploitation doctrine now includes all sites that have the potential to yield valuable information, whether or not they are designated as sensitive. Site exploitation is an enduring and integral mission in support of full spectrum operations.

This manual rescinds sensitive site exploitation as a doctrinal term. The former definition of sensitive site exploitation appeared in the 2007 edition of FM 3-90.15. That definition, which had originated as an Army term, also appeared in JP 1-02 but will be removed. This manual redefines site exploitation, which appeared in the 2007 edition of FM 3-90.15. The new definition of site exploitation will appear in the next revision of FM 1-02.

When joint or Army terms are used and their definitions included in the text, those terms are italicized, and the number of the proponent manual follows the definition.

This manual is organized into three chapters and two appendixes. Chapter 1 discusses conducting site exploitation operations, with an emphasis on the operations process, the purposes for site exploitation, and the framework for executing site exploitation operations. In chapter 1, this manual establishes the new doctrinal definition for the term site exploitation. Chapter 2 discusses specialized Army assets that support site exploitation. Chapter 3 discusses considerations related to sensitive sites. Sensitive sites are described in terms of a broad range of risks and challenges, not just weapons of mass destruction. Appendix A discusses joint and national organizations that support site exploitation. Appendix B discusses evidence collection, handling, and documentation, to support units that must handle evidence without the help of trained law enforcement personnel.

This publication applies to the Active Army, Army National Guard (ARNG)/Army National Guard of the United Stated (ARNGUS), and United States Army Reserve (USAR) unless otherwise stated. This manual does not apply to site exploitation operations conducted by special operations forces.

United States Army Training and Doctrine Command (TRADOC) is the proponent for this publication. The preparing agency is the Combined Arms Doctrine Directorate, U.S. Army Combined Arms Center.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This Army tactics, techniques, and procedures provides doctrinal guidance and considerations for Army forces conducting site exploitation operations. It replaces FM 3-90.15, Sensitive Site Operations, 25 April 2007. Site exploitation doctrine now includes all sites that have the potential to yield valuable information, whether or not they are designated as sensitive. Site exploitation is an enduring and integral mission in support of full spectrum operations.

This manual rescinds sensitive site exploitation as a doctrinal term. The former definition of sensitive site exploitation appeared in the 2007 edition of FM 3-90.15. That definition, which had originated as an Army term, also appeared in JP 1-02 but will be removed. This manual redefines site exploitation, which appeared in the 2007 edition of FM 3-90.15. The new definition of site exploitation will appear in the next revision of FM 1-02.

When joint or Army terms are used and their definitions included in the text, those terms are italicized, and the number of the proponent manual follows the definition.

This manual is organized into three chapters and two appendixes. Chapter 1 discusses conducting site exploitation operations, with an emphasis on the operations process, the purposes for site exploitation, and the framework for executing site exploitation operations. In chapter 1, this manual establishes the new doctrinal definition for the term site exploitation. Chapter 2 discusses specialized Army assets that support site exploitation. Chapter 3 discusses considerations related to sensitive sites. Sensitive sites are described in terms of a broad range of risks and challenges, not just weapons of mass destruction. Appendix A discusses joint and national organizations that support site exploitation. Appendix B discusses evidence collection, handling, and documentation, to support units that must handle evidence without the help of trained law enforcement personnel.

This publication applies to the Active Army, Army National Guard (ARNG)/Army National Guard of the United Stated (ARNGUS), and United States Army Reserve (USAR) unless otherwise stated. This manual does not apply to site exploitation operations conducted by special operations forces.

United States Army Training and Doctrine Command (TRADOC) is the proponent for this publication. The preparing agency is the Combined Arms Doctrine Directorate, U.S. Army Combined Arms Center.

More books from eBook Publishing Team

Cover of the book Air Force Pamphlet AFPAM 10-100 Airman’s Manual incorporating Change 1, 24 June 2011 by United States Government  US Army
Cover of the book Encyclopedia of Ethical Failure September 2018 Revision by United States Government  US Army
Cover of the book Air Force Follow-on Review – Protecting the Force: Lessons from Fort Hood – Preventing Violence … Enhancing Response by United States Government  US Army
Cover of the book A Military Guide to Terrorism in the Twenty-First Century Version 5 by United States Government  US Army
Cover of the book Army Tactics, Techniques, and Procedures ATTP 4-41 (FM 10-23) Army Field Feeding and Class I Operations by United States Government  US Army
Cover of the book Army Doctrine Reference Publication ADRP 3-09 Fires with Change 1 8 February 2013 by United States Government  US Army
Cover of the book February 12, 2013 State of the Union Address President Barack Obama with the Republican Response by Senator Marco Rubio, the Libertarian Party Response by Carla Howell, and the Tea Party Response by Senator Rand Paul by United States Government  US Army
Cover of the book Training Circular TC 3-22.23 (FM 23-23) M18A1 Claymore Munition November 2013 by United States Government  US Army
Cover of the book Department of the Army Pamphlet DA PAM 25-91 Information Management: Visual Information Procedures January 2019 by United States Government  US Army
Cover of the book Training Circular TC 3-34.80 Army Geospatial Guide for Commanders and Planners February 2019 by United States Government  US Army
Cover of the book Training Circular TC 3-55.93 Long-Range Surveillance Company Collective Task Publication August 2013 by United States Government  US Army
Cover of the book The Soldier’s Blue Book: The Guide for Initial Entry Training Soldiers TRADOC Pamphlet 600-4 by United States Government  US Army
Cover of the book Army Techniques Publication ATP 4-02.5 Casualty Care May 2013 by United States Government  US Army
Cover of the book Joint Publication JP 1 Doctrine for the Armed Forces of the United States 25 March 2013 by United States Government  US Army
Cover of the book Army Techniques Publication ATP 4-12 Army Container Operations May 2013 by United States Government  US Army
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy