Page images
PDF
EPUB

d. What efforts have been made to recruit stay-behind agents from the local populace in each brigade sector?

e. What is the nomenclature or operating frequency of electronic emitters belonging to retreating enemy units in each brigade sector?

7. What deception efforts will be made to conceal the retreat?

a. What deception efforts have been ordered in conjunction with the retreat in each brigade sector?

b. What specific enemy units are conducting deception efforts in conjunction with the retreat in each brigade sector?

c. What special operations elements are involved in the deception efforts being conducted in each brigade sector?

d. What deception efforts are being cited in rumors about the retreat in each brigade sector?

e. What enemy units are rumored to be conducting deception efforts in conjunction with the retreat in each brigade sector?

8. What units comprise the enemy's second echelon?

a. What specific units are rumored to be part of the enemy's second echelon in each brigade sector?

b. How many units comprise the enemy's second echelon in each brigade sector?

c. What type of units comprise the enemy's second echelon in each brigade sector?

d. What special operations elements are attached to units in the enemy's second echelon?

e. What is the nomenclature and operating frequency of electronic emitters belonging to units in the enemy's second echelon in each brigade sector?

V. BATTLE DAMAGE ASSESSMENT.

1. What production loss has the enemy sustained?

a. How long will it take to recuperate?

b. What was the extent of battle damage?

c. What was the attack's total effect?

d. How much warfighting stock was lost?

c. How many personnel were lost?

f. What type, and how many pieces, of warfighting equipment were destroyed or damaged?

Figure B-2. Sample overall objective statement (IEW tasks) (continued).

FM 34-52

FM 34-52

g. How many craters are visible?

h. Where was the detonation point?

i. What contingency plans have been put into effect?

VI. INDICATIONS AND WARNING.

1. How stable is the current government?

a. What anti-allied demonstrations are planned?

b. Who, or what organization, is responsible for the unrest?

c. How well financed is the opposition?

d. What outside help is the opposition receiving?

e. What is the current economic situation?

f. What kind of treatment can foreign citizens expect?

Figure B-2. Sample overall objective statement (IEW tasks) (continued).

APPENDIX C

FM 34-52

S2 TACTICAL QUESTIONING GUIDE AND BATTLEFIELD EXPLOITATION OF CAPTURED ENEMY DOCUMENTS AND EQUIPMENT

History shows that EPWS, CEDs, and CEE are critical sources of combat intelligence. It has also shown the usefulness of information is directly proportionate to how fast a commander can get it.

OPERATIONS URGENT FURY, JUST CAUSE, and DESERT STORM proved that without workable procedures to handle captured persons or items, our combat effectiveness suffers because the evacuation chain jams the forward resupply effort. We also suffer because we have not exploited combat information

sources at a low enough echelon to do that commander any good.

This guide is for battalion and brigade S2s. It explains standard procedures on what to do when the S2

• Receives an enemy soldier.

• Detains a civilian.

• Finds an enemy document.

• Discovers an unusual enemy weapon during tactical operations.

PERSONNEL HANDLING

There are two types of persons captured on the battlefield: combatants and noncombatants. FM 27-10 defines the two types. The capturing unit treats all combatants and noncombatants as EPWS until the division forward collecting point segregates them by category. This is whether they are soldiers, clergy, or medics (see Chapter 3).

Noncombatants are handled, questioned, detained, evacuated, and released in accordance with theater policy.

At the EPW's capture point, the capturing element performs the following steps, with the senior soldier responsible for ensuring they are done. The steps are referred to as the "five S's."

STEP 1. SEARCH

The POC unit's first job is to disarm, then search all EPW or detainees, and tie their hands behind their back. They gather all loose enemy documents and equipment in the area. They evacuate them with the EPW. Documents and personal and protective military equipment stay with the prisoner unless otherwise directed by the battalion $2.

STEP 2. SILENT

The capturing unit instructs or signals EPWs to be silent. If that does not work, the EPW is gagged. Guards give orders to EPWs, but do not talk nor give them comfort items.

STEP 3. SAFEGUARD

The POC unit immediately moves the EPWs out of the fire zone. They protect EPWs from reprisals and give them medical care as necessary. The POC unit tries to preserve the shock of capture until brigade interrogators have a chance to question the EPWS.

STEP 4. SEGREGATE

The POC unit orders the EPWS to sit on the ground. It separates officers from enlisted, senior from junior, male from female, and civilian from soldier. It prepares a captive tag and puts one on each EPW (Figure 3-4). Tagging procedures are discussed under equipment handling procedures below.

STEP 5. SPEED TO THE REAR

Lastly, the POC unit moves EPWS to the unit supply point for evacuation. All captured documents, personal effects, and portable enemy equipment go with the EPW. Also, one escort guard should know the EPW's circumstances of capture.

[blocks in formation]

CEE includes all types of foreign materiel found on an EPW or on the battlefield that may have military application. The POC unit-

Evacuates equipment with the EPW.

Confiscates, tags, and evacuates weapons and other equipment found on an EPW the same as CEDs. ITEMS OF TECHINT VALUE

The capturing unit may recognize certain CEE as having possible TECHINT value. Such items include

• New weapons.

• Radios.

• Track vehicles.

• Associated manuals.

• All CEE known or believed to be of TECHINT interest.

The capturing unit's primary job when capturing a TECHINT item is to secure and report the capture to its 52 for disposition instructions. Figure C-1 provides a scenario for TECHINT items.

FIRST ECHELON BATTLEFIELD
TECHINT EXPLOITATION

It is conceivable, although not likely, that the capturing unit leader or S2 may need to do field exploitation of a piece of CEE. If this happens

• It will usually be at the request of the battlefield TECHINT team attached to corps headquarters.

• The small-unit leader or S2 follows the same procedures used to exploit a CED.

TAGGING PROCEDURES

There are two capture tags: A CEE tag and an EPW tag with a smaller tear-off document tag. The POC unit tags all captured personnel, CEDs, and CEE at the POC.

The battalion $2 or company commander is responsible for having sufficient CEE and EPW document tags as well as and waterproof bags prior to an operation.

When no standard tag forms are available, the following procedures will be used for expediency.

• Use meals, ready-to-eat (MRE) cardboard or other type of paper.

FM 34-52

FROM THE FOXHOLE TO THE CMEC

The soldier either captures or observes an item of possible TECHINT interest. The soldier quickly reports the encounter through his or her command to the Battalion S2. The soldier then either safeguards the item or continues the mission as directed.

Upon learning that a forward platoon or company has captured or encountered an item of possible TECHINT interest, the Battalion S2 promptly--

Coordinates security or continued observation of the item with the $3 and ensures the item is not tampered with in any way. Components, control knobs, and switches on C-E equipment should not be touched until the equipment is photographed or positions recorded.

• Examines and screens the item against PIR and IR and determines whether the item is known or believed to be of TECHINT interest; or, whether, in the soldier's opinion, the item deserves initiative reporting.

• Spot reports the capture or encounter in the SALUTE format through higher headquarters to the first Battlefield TECHINT element in the chain of command.

• Coordinates continued security or observation of the item until receipt of further instructions.

• Identifies items requiring immediate screening for combat information by other supporting MI elements. This could include C-E system items like code books, radios, or technical documents such as operator manuals.

Intermediate echelons of command continue forwarding the spot reported encounter or capture to their supporting Battlefield TECHINT element.

The supporting Battlefield TECHINT element receives the spot report and compares the information to requirements and the existing data base to see if collection is necessary. The element then decides further action and notifies the capturing unit accordingly. The CMEC or Battlefield TECHINT team's options at this point include, but are not limited to

• Requesting the capturing unit to provide further information, such as detailed descriptions, sketches, photographs, or documents captured with the item.

• On-site screening or explofting.

• Destroying the item.

• Abandoning the item unharmed.

• TECHINT team-supervised or routine evacuating.

• Priority evacuating to EAC

• Recommending turning over initial exploitation to other MI elements, such as target exploitation or interrogators, for immediate tactical information screening.

Figure C-L. Disposition of TECHINT items scenario.

« PreviousContinue »