Army Tactics, Techniques, and Procedures ATTP 3-90.15 (FM 3-90.15) Site Exploitation Operations

Nonfiction, Reference & Language, Law, Evidence, Study Aids, Graduate & Professional, Armed Forces, Reference, Guides & Handbooks
Cover of the book Army Tactics, Techniques, and Procedures ATTP 3-90.15 (FM 3-90.15) Site Exploitation Operations by United States Government  US Army, eBook Publishing Team
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: United States Government US Army ISBN: 1230000128001
Publisher: eBook Publishing Team Publication: April 27, 2013
Imprint: Language: English
Author: United States Government US Army
ISBN: 1230000128001
Publisher: eBook Publishing Team
Publication: April 27, 2013
Imprint:
Language: English

This Army tactics, techniques, and procedures provides doctrinal guidance and considerations for Army forces conducting site exploitation operations. It replaces FM 3-90.15, Sensitive Site Operations, 25 April 2007. Site exploitation doctrine now includes all sites that have the potential to yield valuable information, whether or not they are designated as sensitive. Site exploitation is an enduring and integral mission in support of full spectrum operations.

This manual rescinds sensitive site exploitation as a doctrinal term. The former definition of sensitive site exploitation appeared in the 2007 edition of FM 3-90.15. That definition, which had originated as an Army term, also appeared in JP 1-02 but will be removed. This manual redefines site exploitation, which appeared in the 2007 edition of FM 3-90.15. The new definition of site exploitation will appear in the next revision of FM 1-02.

When joint or Army terms are used and their definitions included in the text, those terms are italicized, and the number of the proponent manual follows the definition.

This manual is organized into three chapters and two appendixes. Chapter 1 discusses conducting site exploitation operations, with an emphasis on the operations process, the purposes for site exploitation, and the framework for executing site exploitation operations. In chapter 1, this manual establishes the new doctrinal definition for the term site exploitation. Chapter 2 discusses specialized Army assets that support site exploitation. Chapter 3 discusses considerations related to sensitive sites. Sensitive sites are described in terms of a broad range of risks and challenges, not just weapons of mass destruction. Appendix A discusses joint and national organizations that support site exploitation. Appendix B discusses evidence collection, handling, and documentation, to support units that must handle evidence without the help of trained law enforcement personnel.

This publication applies to the Active Army, Army National Guard (ARNG)/Army National Guard of the United Stated (ARNGUS), and United States Army Reserve (USAR) unless otherwise stated. This manual does not apply to site exploitation operations conducted by special operations forces.

United States Army Training and Doctrine Command (TRADOC) is the proponent for this publication. The preparing agency is the Combined Arms Doctrine Directorate, U.S. Army Combined Arms Center.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This Army tactics, techniques, and procedures provides doctrinal guidance and considerations for Army forces conducting site exploitation operations. It replaces FM 3-90.15, Sensitive Site Operations, 25 April 2007. Site exploitation doctrine now includes all sites that have the potential to yield valuable information, whether or not they are designated as sensitive. Site exploitation is an enduring and integral mission in support of full spectrum operations.

This manual rescinds sensitive site exploitation as a doctrinal term. The former definition of sensitive site exploitation appeared in the 2007 edition of FM 3-90.15. That definition, which had originated as an Army term, also appeared in JP 1-02 but will be removed. This manual redefines site exploitation, which appeared in the 2007 edition of FM 3-90.15. The new definition of site exploitation will appear in the next revision of FM 1-02.

When joint or Army terms are used and their definitions included in the text, those terms are italicized, and the number of the proponent manual follows the definition.

This manual is organized into three chapters and two appendixes. Chapter 1 discusses conducting site exploitation operations, with an emphasis on the operations process, the purposes for site exploitation, and the framework for executing site exploitation operations. In chapter 1, this manual establishes the new doctrinal definition for the term site exploitation. Chapter 2 discusses specialized Army assets that support site exploitation. Chapter 3 discusses considerations related to sensitive sites. Sensitive sites are described in terms of a broad range of risks and challenges, not just weapons of mass destruction. Appendix A discusses joint and national organizations that support site exploitation. Appendix B discusses evidence collection, handling, and documentation, to support units that must handle evidence without the help of trained law enforcement personnel.

This publication applies to the Active Army, Army National Guard (ARNG)/Army National Guard of the United Stated (ARNGUS), and United States Army Reserve (USAR) unless otherwise stated. This manual does not apply to site exploitation operations conducted by special operations forces.

United States Army Training and Doctrine Command (TRADOC) is the proponent for this publication. The preparing agency is the Combined Arms Doctrine Directorate, U.S. Army Combined Arms Center.

More books from eBook Publishing Team

Cover of the book Army Regulation AR 190-56 Military Police The Army Civilian Police and Security Guard Program 15 March 2013 by United States Government  US Army
Cover of the book Field Manual FM 4-40 (FM 10-1) Quartermaster Operations October 2013 by United States Government  US Army
Cover of the book Army Tactics, Techniques, and Procedures ATTP 3-11.36 MULTI-SERVICE TACTICS, TECHNIQUES, AND PROCEDURES FOR CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR ASPECTS OF COMMAND AND CONTROL by United States Government  US Army
Cover of the book Military and Security Developments Involving the People’s Republic of China 2013 Annual Report to Congress by United States Government  US Army
Cover of the book Handbook for a New Military Spouse by United States Government  US Army
Cover of the book Army Regulation AR 380-49 Industrial Security Program 20 March 2013 by United States Government  US Army
Cover of the book 2012 US Department of Defense Strategic Guidance - Sustaining U.S. Global Leadership: Priorities for the 21st Century Defense by United States Government  US Army
Cover of the book The Soldier’s Blue Book: The Guide for Initial Entry Training Soldiers TRADOC Pamphlet 600-4 by United States Government  US Army
Cover of the book Field Manual FM 7-22 Army Physical Readiness Training October 2012 by United States Government  US Army
Cover of the book Campaign Planning Handbook – Academic Year 2013 – United States Army War College by United States Government  US Army
Cover of the book Army Techniques Publication ATP 4-02.5 Casualty Care May 2013 by United States Government  US Army
Cover of the book Accountability Review Board (ARB) Report on the September 11th attack in Benghazi by United States Government  US Army
Cover of the book Marine Corps Reference Publication MCRP 3-35.1A Small Unit Leader’s Guide to Mountain Warfare Operations US Marine Corps 21 May 2013 by United States Government  US Army
Cover of the book Training Circular TC 3-04.10 Aviation Life Support Maintenance January 2019 by United States Government  US Army
Cover of the book Army Tactics, Techniques, and Procedures ATTP 3-21.90 (FM 7-90)/MCWP 3-15.2 Tactical Employment of Mortars April 2011 by United States Government  US Army
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy