|
Sensitive Site Exploitation (SSE) Training Survey The United States Navy and Technical Support Working Group (TSWG) have funded the development of a computer/web-based training course that will make sensitive site exploitation (SSE) information and training accessible to more collectors, operators, analysts and any personnel who may need initial or refresher site exploitation training. Your participation in the initial analysis phase will help guide the design and development of the SSE training initiative. The goal of this survey is to identify and validate essential knowledge, skills and abilities required to successfully conduct the SSE mission. Results will be used to develop a training needs analysis survey that will be disseminated to personnel engaged in all phases of the SSE mission.
Survey Instructions
You have been selected to validate the Task List for SSE operations for accuracy and completeness. The training will be designed for use by a wide range of end users and situations. Please review the following Task List from your organizational perspective and rate each task appropriately. You are highly encouraged to add tasks which you consider are an essential capability in the overall SSE mission but have not already been addressed.
Please bear in mind as you review these tasks that the course:
- Is intended to serve a variety of communities, including the Department of Defense (DoD), intelligence community and law enforcement - Target audience will include operators, collectors and analysts - Is intended to address all areas of the world, including CONUS and all COCOMs and is not limited to one geographic area or theatre of operation. - Should address every aspect from collection, processing and producing to disseminating intelligence Please use the following criteria to validate each task:
Yes = Have organizational knowledge of the task and consider it important to the SSE mission No = Have organizational knowledge of the task but do not consider it important to the SSE mission N/A = Do not have the organization knowledge to validate or disqualify the task Survey Notes:
Please allow at least 30 minutes to complete the survey. You may not save the survey and return to finish it at a later time. Results are anonymous and will only be reported in the aggregate. If you have questions about this survey, please contact Eileen Fynan, [email protected]. |
| |
|
|
|
Basic (Declarative Knowledge) This section is intended to address basic Sensitive Site Exploitation (SSE) knowledge and concepts. |
| |
|
|
|
|
|
1.Define Sensitive Site Exploitation operations |
| |
|
|
|
|
2.Understand purposes of Sensitive Site Exploitation |
| |
|
|
|
|
3.Understand the three pillars of SSE – biometrics, forensics, and document and media exploitation (DOMEX) |
| |
|
|
|
|
4.Understand hasty versus deliberate SSE operations |
| |
|
|
|
|
| 5. Add Additional tasks below: | | |
|
|
|
|
|
|
6.Describe the role of SSE within the overall scope of operations |
| |
|
|
|
|
7.Describe strategic versus tactical contributions of SSE operations |
| |
|
|
|
|
8.Explain potential value-adds to overall mission success from SSE operations |
| |
|
|
|
|
9.Understand the importance of biometric enrollments |
| |
|
|
|
|
10.Explain SSE role in tactical questioning |
| |
|
|
|
|
| 11. Add Additional tasks below: | | |
|
|
|
|
|
|
12.Define SSE team organization |
| |
|
|
|
|
13.Define SSE team member roles |
| |
|
|
|
|
14.Explain the role of combat multipliers: interpreters, tactical human intelligence teams, host nation security forces (HNSF), civil affairs teams, etc. |
| |
|
|
|
|
15.Describe applications of logistical support (explosive testing equipment, metal detectors, X-ray, chemical/biological/radiological/nuclear/explosive (CBRNE) detectors, working dogs, females, cultural sensitivity, etc.) |
| |
|
|
|
|
16.Explain the importance of pre-mission planning |
| |
|
|
|
|
17.Describe use of intelligence, surveillance and reconnaissance in SSE |
| |
|
|
|
|
18.Explain threat evaluation |
| |
|
|
|
|
19.Describe mission, enemy, terrain and weather, troops and support available, time available, civil considerations (METT-TC) impact on SSE operations |
| |
|
|
|
|
20.Understand hasty versus deliberate SSE operations |
| |
|
|
|
|
21.Define objective boundaries |
| |
|
|
|
|
22.Explain the importance of contingency planning |
| |
|
|
|
|
23.Explain the need for rehearsals |
| |
|
|
|
|
24.Describe the sequence of actions in a standard SSE mission |
| |
|
|
|
|
25.Discuss the importance of good communications |
| |
|
|
|
|
26.Define operational environment and how it affects SSE operations |
| |
|
|
|
|
27.Explain safety considerations (hazardous materials, clandestine drug labs, homemade explosive labs, etc.) |
| |
|
|
|
|
28.Describe role of medical care on-site |
| |
|
|
|
|
29.Explain personnel under control handling |
| |
|
|
|
|
30.Understand the need for controlling the site (outer cordon, inner cordon) |
| |
|
|
|
|
31.Explain the importance of high quality photographic documentation |
| |
|
|
|
|
32.Explain advantages and disadvantages of sketching |
| |
|
|
|
|
33.Describe the effects of high and low explosives in conjunction with post blast investigation |
| |
|
|
|
|
34.Recognize classifications of homemade explosives (HMEs) |
| |
|
|
|
|
35.Describe common function of components in improvised explosive devices (IEDs) |
| |
|
|
|
|
36.Define trace chemistry analysis |
| |
|
|
|
|
37.Describe instrumentation for analysis of unknown samples |
| |
|
|
|
|
38.Understand the limitations of presumptive and confirmatory substance testing equipment |
| |
|
|
|
|
39.Describe significance of impressed evidence, tool marks and fracture marks |
| |
|
|
|
|
40.Understand the principle of operation of a comparison microscope |
| |
|
|
|
|
41.Understand the depositing, locating and processing of fingerprints |
| |
|
|
|
|
42.Describe the role of the Automated Fingerprint Identification System (AFIS) |
| |
|
|
|
|
43.Describe the major steps in biological (DNA) evidence processing |
| |
|
|
|
|
44.Understand the environmental effects on DNA material |
| |
|
|
|
|
45.Understand the potential outcomes of biological samples |
| |
|
|
|
|
46.Explain the importance of biometric enrollments of personnel under control |
| |
|
|
|
|
47.Understand isolation and protection of media/cellular devices |
| |
|
|
|
|
| 49. Add Additional tasks below: | | |
|
|
|
|
|
|
49.Understand the need and use of evidence bags |
| |
|
|
|
|
50.Understand the need and use of flashlight/head lamp |
| |
|
|
|
|
51.Understand the need and use of sketch pads |
| |
|
|
|
|
52.Understand the need and use of note taking paper |
| |
|
|
|
|
53.Understand the need and use of vision denial techniques/devices for personnel under control |
| |
|
|
|
|
54.Understand the need and use of flex cuffs |
| |
|
|
|
|
55.Understand the need and use of latex gloves |
| |
|
|
|
|
56.Understand the need and use of digital camera |
| |
|
|
|
|
57.Understand the need and use of tape measure, laser range finders and scales |
| |
|
|
|
|
58.Understand the need and use of swabs |
| |
|
|
|
|
59.Understand the need and use of GPS |
| |
|
|
|
|
60.Understand the need and use of technical equipment – biometric enrollment, CELLEX and MEDEX |
| |
|
|
|
|
| 61. Add Additional tasks below: | | |
|
|
|
|
Section 5: How Collected Information Is Used |
| |
|
|
|
62.Explain use of photographs in the analysis and exploitation process |
| |
|
|
|
|
63.Explain use of biologics results in the analysis and exploitation process |
| |
|
|
|
|
64.Explain use of tool marks, impression evidence and fracture marks in the analysis and exploitation process |
| |
|
|
|
|
65.Explain use of chemical analysis outcomes in the analysis and exploitation process |
| |
|
|
|
|
66.Explain use of fingerprint matching in the analysis and exploitation process |
| |
|
|
|
|
67.Explain use of iris scans in the analysis and exploitation process |
| |
|
|
|
|
68.Explain use of CELLEX outcomes in the analysis and exploitation process |
| |
|
|
|
|
69.Explain use of MEDEX outcomes in the analysis and exploitation process |
| |
|
|
|
|
| 70. Add Additional tasks below: | | |
|
|
|
|
Section 6: Limitations of SSE |
| |
|
|
|
71.Explain the importance of proper site documentation |
| |
|
|
|
|
72.Explain the importance of proper evidence collection techniques |
| |
|
|
|
|
73.Explain the importance of timely exploitation and dissemination of information |
| |
|
|
|
|
| 74. Add Additional tasks below: | | |
|
|
|
|
Ideal/Tactical (Procedural Knowledge - Skills)
This section is inteded to address specific SSE skills and tasks performed in ideal (no constraints) or tactical (METT-TC contrained) |
| |
|
|
|
|
|
|
|
76.Describe METT-TC impact on SSE operations |
| |
|
|
|
|
77.Check for unmanned aerial vehicle (UAV) availability |
| |
|
|
|
|
78.Describe intelligence information that can be obtained |
| |
|
|
|
|
79.Review Commander’s Critical Information Requirements (CCIRs) |
| |
|
|
|
|
80.Incorporate intelligence brief into mission planning |
| |
|
|
|
|
81.Use intelligence, surveillance and reconnaissance |
| |
|
|
|
|
82.Define the operational environment and effects |
| |
|
|
|
|
83.Identify limitations of search area |
| |
|
|
|
|
84.Identify SSE team organization |
| |
|
|
|
|
85.List the sequence of actions in a standard SSE mission |
| |
|
|
|
|
86.Conduct pre-mission planning |
| |
|
|
|
|
87.Define objective boundaries |
| |
|
|
|
|
88.Perform contingency planning |
| |
|
|
|
|
|
|
90.Use combat multipliers (interpreters, tactical human intelligence teams, HNSF, civil affairs teams, etc.) |
| |
|
|
|
|
91.Use logistical support (explosive testing equipment, metal detectors, X-ray, CBRNE detectors, working dogs, females, cultural sensitivity teams, etc.) |
| |
|
|
|
|
92.Develop communication plan |
| |
|
|
|
|
93.Observe safety considerations (HAZMAT, clandestine labs, HME labs, etc.) |
| |
|
|
|
|
94.Brief medical care on-site |
| |
|
|
|
|
95.Determine physical size of site |
| |
|
|
|
|
96.Observe and analyze site activities |
| |
|
|
|
|
97.Observe and analyze site “materials of interest” locations |
| |
|
|
|
|
| 98. Add Additional tasks below: | | |
|
|
|
|
Section 8: Secure the Scene |
| |
|
|
|
99.Ensure the scene is secured |
| |
|
|
|
|
100.Establish control of the site (outer cordon, inner cordon) |
| |
|
|
|
|
101.Receive briefing from on-scene commander |
| |
|
|
|
|
102.Establish entry and exit points |
| |
|
|
|
|
103.Prepare access control log |
| |
|
|
|
|
104.Request emergency service support |
| |
|
|
|
|
105.Observe locals for combat indicators |
| |
|
|
|
|
106.Establish personnel under control handling |
| |
|
|
|
|
107.Conduct search, tag, report evacuate, segregate, and safeguard (S.T.R.E.S.S.) of personnel under control handling (formally known as five S’s and T) |
| |
|
|
|
|
108.Observe medical considerations for personnel under control |
| |
|
|
|
|
110.Record personnel under control identification |
| |
|
|
|
|
111.Use tactical questioning in SSE operations |
| |
|
|
|
|
112.Use interpreters in processing of personnel under control |
| |
|
|
|
|
| 113. Add Additional tasks below: | | |
|
|
|
|
Section 9: Site Assessment |
| |
|
|
|
114.List team leader roles and responsibilities |
| |
|
|
|
|
115.Conduct biometric enrollments |
| |
|
|
|
|
116.Conduct systematic processing of a site |
| |
|
|
|
|
117.Describe significance and relationship of items found to each other |
| |
|
|
|
|
118.Number building, room and walls |
| |
|
|
|
|
119.Watch locals for combat or suspicious indicators |
| |
|
|
|
|
120.Evaluate all threats present |
| |
|
|
|
|
121.Conduct long range reconnaissance with binoculars/spotting scopes |
| |
|
|
|
|
122.Use same entry exit points/path |
| |
|
|
|
|
123.Determine electronic counter measures (ECM) being used |
| |
|
|
|
|
124.Search for command wires |
| |
|
|
|
|
125.Evaluate physical evidence possibilities |
| |
|
|
|
|
|
|
127.Evaluate time on target |
| |
|
|
|
|
128.Look for biological hazards |
| |
|
|
|
|
129.Look for structural hazards |
| |
|
|
|
|
130.Evaluate environmental conditions that may affect SSE |
| |
|
|
|
|
|
|
132.Identify appropriate personnel protective equipment (PPE) |
| |
|
|
|
|
| 133. Add Additional tasks below: | | |
|
|
|
|
|
|
134.Develop site specific search plan |
| |
|
|
|
|
135.List searcher roles and responsibilities |
| |
|
|
|
|
137.Perform attic/roof searches |
| |
|
|
|
|
138.Perform room searches |
| |
|
|
|
|
139.Perform stairway searches |
| |
|
|
|
|
140.Perform spiral search |
| |
|
|
|
|
141.Perform vehicle searches |
| |
|
|
|
|
142.Perform search using natural boundaries |
| |
|
|
|
|
143.Perform search for caches |
| |
|
|
|
|
144.Perform search of rooftops, trees and gutters |
| |
|
|
|
|
145.Perform search of crater in post blast SSE |
| |
|
|
|
|
146.Perform search using the quadrant method |
| |
|
|
|
|
147.Perform search using the line method |
| |
|
|
|
|
148.Perform search using the grid method |
| |
|
|
|
|
149.Sift debris for evidence |
| |
|
|
|
|
| 150. Add Additional tasks below: | | |
|
|
|
|
Section 11: Evidence Identification |
| |
|
|
|
151.Define primary components of IEDs |
| |
|
|
|
|
152.Identify pre-blast and post-blast IED components |
| |
|
|
|
|
153.List equipment consistent with manufacture of homemade explosives |
| |
|
|
|
|
154.State safety precautions specific to homemade explosives |
| |
|
|
|
|
155.Identify key features and components in clandestine drug and homemade explosive laboratories |
| |
|
|
|
|
156.Understand the safety precautions when operating in suspected clandestine drug and homemade explosive laboratories |
| |
|
|
|
|
157.List identification features for drug and homemade explosive precursors |
| |
|
|
|
|
159.List equipment consistent with manufacture of illicit drugs |
| |
|
|
|
|
160.State safety precautions specific to drug making laboratories |
| |
|
|
|
|
161.Identify types of tool marks, including those generated by scraping, pinching, shearing, slicing, and prying |
| |
|
|
|
|
162.Identify the basic concept of recognizing, collecting, and preserving tool marks and fractured items |
| |
|
|
|
|
163.Explain the steps involved in casting a tool mark |
| |
|
|
|
|
164.Examine weapons for safe condition |
| |
|
|
|
|
165.Contact EOD for ordnance condition determination (safe/armed/deteriorated) |
| |
|
|
|
|
166.Identify significant documents (identification, money, bank statements, etc., charred remains) |
| |
|
|
|
|
167.Identify digital media (computers, memory devices, floppy disks, MP3, PDAs, hard drives, voice recorders, DVD/CDs, video tapes, cassettes, cameras, GPS, unconventional, etc.) |
| |
|
|
|
|
168.Choose appropriate collection techniques for trace samples |
| |
|
|
|
|
169.Operate colormetric explosive test kits |
| |
|
|
|
|
170.Understand, strengths, weaknesses and limitations of colormetric explosive test kits |
| |
|
|
|
|
171.Operate colormetric drug test kits |
| |
|
|
|
|
172.Understand strengths, weaknesses and limitations colormetric drug test kits |
| |
|
|
|
|
173.Operate handheld field analysis equipment |
| |
|
|
|
|
174.Understand strengths, weaknesses and limitations of handheld field analysis equipment |
| |
|
|
|
|
175.Identify useful DNA materials to collect |
| |
|
|
|
|
176.Swab non-porous surfaces that are too big to transport |
| |
|
|
|
|
177.Label swab containers |
| |
|
|
|
|
| 178. Add Additional tasks below: | | |
|
|
|
|
Section 12: Scene/Evidence Documentation |
| |
|
|
|
179.List photographer roles and responsibilities |
| |
|
|
|
|
180.Use digital still cameras |
| |
|
|
|
|
181.Identify camera controls and available settings |
| |
|
|
|
|
182.Explain basic lighting strategies |
| |
|
|
|
|
183.Photograph overall scene |
| |
|
|
|
|
184.Photograph outside of site |
| |
|
|
|
|
185.Photograph entrance point |
| |
|
|
|
|
186.Photograph 360° pictures of each area |
| |
|
|
|
|
187.Photograph medium range pictures of areas of interest |
| |
|
|
|
|
188.Photograph items close up with/without scale reference before touching and packaging |
| |
|
|
|
|
189.Photograph hidden walls and caches |
| |
|
|
|
|
190.Photograph crowd and vehicles |
| |
|
|
|
|
191.Photograph footprints and tire tracks |
| |
|
|
|
|
192.Photograph crater in post blast SSE |
| |
|
|
|
|
193.Associate photographs with unique identifier |
| |
|
|
|
|
194.Minimize presence of on-site personnel in pictures |
| |
|
|
|
|
|
|
196.Identify camera controls and available settings |
| |
|
|
|
|
197.Describe basic lighting strategies |
| |
|
|
|
|
198.Perform deceased personnel photography |
| |
|
|
|
|
199.Perform detained personnel photography |
| |
|
|
|
|
200.Photograph latent prints developed with fingerprint powders before attempting to lift |
| |
|
|
|
|
201.Prepare photography log |
| |
|
|
|
|
202.List sketchers roles and responsibilities |
| |
|
|
|
|
203.List critical elements for sketches |
| |
|
|
|
|
204.Use “exploded views” in sketches |
| |
|
|
|
|
205.Scribe sketchers notes |
| |
|
|
|
|
206.Sketch location from safe area |
| |
|
|
|
|
207.Record owner of location |
| |
|
|
|
|
208.Label detainee locations when found |
| |
|
|
|
|
209.Obtain all available identifying data from detainees/deceased |
| |
|
|
|
|
210.Use laser range finder |
| |
|
|
|
|
211.Use biometric enrollment equipment on detainees/deceased |
| |
|
|
|
|
212.Prepare latent print log |
| |
|
|
|
|
213.Document weapons recovered |
| |
|
|
|
|
214.Document diameter, depth of crater in post blast SSE |
| |
|
|
|
|
215.Plot grid reference for post blast crater |
| |
|
|
|
|
216.Chain of custody form |
| |
|
|
|
|
217.Prepare sworn statement form |
| |
|
|
|
|
218.Prepare inventory sheets |
| |
|
|
|
|
|
|
|
|
| 221. Add Additional tasks below: | | |
|
|
|
|
Section 13: Evidence Collection |
| |
|
|
|
222.Use bags, containers, bottles and other containers |
| |
|
|
|
|
223.Use proper packaging materials to avoid damage to evidence |
| |
|
|
|
|
224.Mark container with personnel name, team name/number, contact information, day/time/group (DTG) and grid |
| |
|
|
|
|
225.Collect homemade explosives/unknown bulk explosives |
| |
|
|
|
|
226.Keep items from each incidence together |
| |
|
|
|
|
227.Identify and protect transient physical evidence |
| |
|
|
|
|
228.Wear latex gloves to protect evidence |
| |
|
|
|
|
229.Replace gloves when contamination is suspected |
| |
|
|
|
|
230.Use cans/multiple wraps to transport sharp items |
| |
|
|
|
|
231.Wear multiple layers of latex gloves |
| |
|
|
|
|
232.Seal containers with tamper resistant tape |
| |
|
|
|
|
233.Complete and maintain chain of custody documents |
| |
|
|
|
|
234.Absorb liquids onto clean swabs |
| |
|
|
|
|
235.Cut out dry samples from porous surfaces |
| |
|
|
|
|
236.Clean ammunition cans when used for packaging |
| |
|
|
|
|
237.Collect evidence from victim/suspect |
| |
|
|
|
|
238.Prepare evidence recovery log |
| |
|
|
|
|
239.Locate latent fingerprints |
| |
|
|
|
|
240.Locate impressed fingerprints |
| |
|
|
|
|
241.Locate patent fingerprints |
| |
|
|
|
|
242.Apply fingerprint powders to develop latent prints |
| |
|
|
|
|
243.Lift fingerprints with tape |
| |
|
|
|
|
244.Preserve and document lifted prints on backing cards |
| |
|
|
|
|
245.Preserve impressed fingerprints using Mikrosil/Accutrans |
| |
|
|
|
|
246.Use alternate light sources in print location and documentation |
| |
|
|
|
|
247.Application techniques for powders |
| |
|
|
|
|
248.Perform ten print record collection |
| |
|
|
|
|
249.Perform palm print collection |
| |
|
|
|
|
250.Collect potential fingerprint items in areas normally not touched in normal use |
| |
|
|
|
|
251.Package potential fingerprint items to prevent smudging or destroying prints |
| |
|
|
|
|
252.Collect items that may contain tool marks |
| |
|
|
|
|
253.Collect IED components |
| |
|
|
|
|
254.Use bottles for collection of soil samples |
| |
|
|
|
|
255.Identify items for potential DNA evidence |
| |
|
|
|
|
256.Swab dried evidence using sterile water on swab |
| |
|
|
|
|
257.Air dry evidence with suspected body fluids |
| |
|
|
|
|
258.Package air dried swabs in clean paper or other porous container |
| |
|
|
|
|
259.Package DNA evidence from different individuals separately |
| |
|
|
|
|
260.Prepare DNA samples for shipment off-site |
| |
|
|
|
|
261.Prepare DNA submission forms |
| |
|
|
|
|
262.Use Faraday bag to isolate cell phones from network |
| |
|
|
|
|
263.Use non-static producing containers for sensitive electronic equipment |
| |
|
|
|
|
264.Remove batteries from cell phones |
| |
|
|
|
|
265.Remove media storage devices (i.e hard drives, flash drives, CF cards, etc.) |
| |
|
|
|
|
|
|
267.Use triage dongle tools to copy hard drive information |
| |
|
|
|
|
268.Use portable cell phone exploitation equipment |
| |
|
|
|
|
269.Use handheld metal detectors |
| |
|
|
|
|
| 270. Add Additional tasks below: | | |
|
|
|
|
Section 14: Releasing the Site |
| |
|
|
|
271.Obtain disposition guidance for site from command authority |
| |
|
|
|
|
272.Return site as best possible to pre-exploitation conditions |
| |
|
|
|
|
273.Provide post exploitation civil affairs/public relations input |
| |
|
|
|
|
274.Maintain control and accountability for all items removed from site |
| |
|
|
|
|
275.Prepare narrative description of site/actions |
| |
|
|
|
|
276.Complete reports as appropriate |
| |
|
|
|
|
| 277. Add Additional tasks below: | | |
|
|
|