Document Exploitation

Last updated

U.S. Army 82d Airborne Division paratroopers securing documents after a raid in Afghanistan during the War in Afghanistan 82ASWEEP118.oef.ea.jpg
U.S. Army 82d Airborne Division paratroopers securing documents after a raid in Afghanistan during the War in Afghanistan
An 82nd Airborne Division paratrooper examining documents found in a raid in Iraq during the Iraq War Iraq-3 146.gd.jpg
An 82nd Airborne Division paratrooper examining documents found in a raid in Iraq during the Iraq War

Document Exploitation (DOCEX) is a set of military intelligence procedures used by the United States Armed Forces to discover, categorize, and use documents seized in combat operations. [1] It is similar to, but otherwise separate from, Document and Media Exploitation (DOMEX), which is used by the U.S. Intelligence Community and the U.S. government. [2]

Contents

DOCEX was formulated during the War on Terror, during which U.S. military personnel frequently discovered large volumes of documents in various formats and languages. When documents are found that could have potentially valuable intelligence, DOCEX helps military units rapidly and accurately analyze and interpret the documents for information.

A DOCEX facility was also operated by the Secure Evidence Unit (SEU) of the Iraqi High Tribunal to extract evidence from documents seized from Saddam Hussein's Ba'athist government. Over 6 million pages were processed, mostly from the 1980s, that resulted in numerous execution orders and other incriminating ocuments being made available to the court.

Process

The DOCEX process occurs at the lowest echelons possible to ensure the information gained from the documents can be understood and used as swiftly as possible. U.S. military personnel learn DOCEX in common skills training, such as the U.S. Army's Basic Leader Course.

The initial intake of captured enemy documents (CED) is performed at the company level by a DOCEX Site Exploitation Team, and first analysis of CED is performed by intelligence personnel assigned to battalion- or brigade-level DOCEX Support Teams. Actionable information gained from this analysis is reported back to the original unit as soon as possible.

The processing of CED progresses from the lowest echelon to the highest, undergoing multiple information extraction applications that increase in complexity and sophistication until the information is categorized as DOMEX under the auspices of the U.S. Intelligence Community and the Director of National Intelligence. The sequence of events in the DOCEX process as performed by a DOCEX Site Exploitation Team is as follows:

  1. Receive, Tag
  2. Categorize, Inventory, Log
  3. Screen
  4. Sight Translation (Hybrid Translation/Interpretation)
  5. Analyze
  6. Report

1. Tag

Document accountability begins the moment the document is received into U.S. possession. Original documents must not be marked, altered or defaced and the capturing unit must attach a DD Form 2745 (Enemy Prisoner of War Capture Tag) to each document. Ongoing combat operations suspends this requirement (to tag a document) until cessation of hostilities. All CEDs are placed in weatherproof containers and the containers are marked with a DTG, name of the capturing unit, identity of the source(s) of the CEDs, and a summary of conditions and circumstances under which the CEDs were obtained.

2. Categorize, Inventory, Log

The first DOCEX unit to receive CEDs will categorize and inventory all CEDs. Captured enemy documents are assigned file numbers and the following information is logged: name of capturing unit, file number, DTG the CEDs were received by the DOCEX unit, description of the CEDs, destination of outgoing transmittals of CEDs and pertinent remarks. Proper categorization and inventory of captured enemy documents ensures strict accountability and preserves evidentiary value.

3. Screen

Document screening is the rapid but systematic evaluation of documents to determine which documents contain priority information. Selected priority documents will be exploited immediately to meet intelligence collection management priorities. For screening purposes, CEDs are considered unclassified unless originated in the U.S. and/or allied nation(s), and are marked classified. The document screening phase is an integral step in the DOCEX process as screening determines applicability of a variety of exploitation treatments and procedures. Interpreters and qualified intelligence analysts working alongside communications and information technology specialists decide the DOCEX course of action during the screening phase. Complete translation is not required at this phase of the DOCEX process, but sufficient translation of documents is required to determine significance and relevance to priority intelligence requirements.

4. Translate

Translations in and of themselves are not intelligence reports, but translation is a precondition for DOCEX. Translation reports must include: where the report will be sent, which unit prepared the report, DTG of the translation, document serial number and description of the document, name of translator, type of translation (full, extract or summary), remarks for clarification and classification (if applicable).

5. Analyze

Analysis of CEDs produces intelligence and involves three steps: assessment, integration and deduction.

6. Report

Information collected from CEDs is normally reported in a SALUTE report or Intelligence Information Report (IIR) (SALUTE = Size, Activity, Location, Unit, Time, Equipment). The IIR is the most widely recognized and accepted format within the Intelligence Community, and is typically generated at higher echelons, such as division, corps or theater commands. SALUTE reports are also referred to as SPOT reports or SPOTREPS and are expeditious reports to provide timely intelligence or status updates regarding events that could have an immediate and significant effect on current planning and operations. Tactical commanders, interrogators and intelligence analysts contribute content for SALUTE reports and IRRs.

Related Research Articles

<span class="mw-page-title-main">Military intelligence</span> Information about military opponents

Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination.

<span class="mw-page-title-main">Reconnaissance</span> Military observation of enemy activities

In military operations, military reconnaissance or scouting is the exploration of an area by military forces to obtain information about enemy forces, the terrain, and civil activities in the area of operations. In military jargon, reconnaissance is abbreviated to recce and to recon, both derived from the root word reconnoitre.

<span class="mw-page-title-main">Imagery intelligence</span> Intelligence gathered by means of imagery

Imagery intelligence (IMINT), pronounced as either as Im-Int or I-Mint, is an intelligence gathering discipline wherein imagery is analyzed to identify information of intelligence value. Imagery used for defense intelligence purposes is generally collected via satellite imagery or aerial photography.

In modern use, the order of battle of an armed force participating in a military operation or campaign shows the hierarchical organization, command structure, strength, disposition of personnel, and equipment of units and formations of the armed force. Various abbreviations are in use, including OOB, O/B, or OB, while ORBAT remains the most common in the United Kingdom. An order of battle is distinct from a table of organisation, which is the intended composition of a given unit or formation according to the military doctrine of its armed force. Historically, an order of battle was the order in which troops were positioned relative to the position of the army commander or the chronological order in which ships were deployed in naval situations.

The Foreign Military Studies Office, or FMSO, is a research and analysis center for the United States Army that is part of the United States Army Combined Arms Center at Fort Leavenworth. It manages the Joint Reserve Intelligence Center there.

<span class="mw-page-title-main">Operations security</span> Counterespionage safety procedures and practices

Operations security (OPSEC) is a process that identifies critical information to determine whether friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information.

An Operation Order, often abbreviated to OPORD, is a plan format meant to assist subordinate units with the conduct of military operations. An OPORD describes the situation the unit faces, the mission of the unit, and what supporting activities the unit will conduct in order to achieve their commander's desired end state. Normally an OPORD is generated at the battalion, regimental, brigade, divisional, or corps headquarters and disseminated to its assigned or attached elements. The issuance of an OPORD triggers subordinate unit leadership to develop orders specific to the role or roles that the unit will assume within the operation. This more narrowly focused order borrows information from the original, or base, order and adds additional details that pertain more to the minutiae of the actions a unit is tasked to conduct in support of the overarching operation.

Battlespace or battle-space is a term used to signify a military strategy which integrates multiple armed forces for the military theatre of operations, including air, information, land, sea, cyber and outer space to achieve military goals. It includes the environment, timeframe and other factors, and conditions that must be understood to successfully apply combat power, protect the force, or complete the mission. This includes enemy and friendly armed forces, infrastructure, weather, terrain, and the electromagnetic spectrum within the operational areas and areas of interest.

Intelligence collection management is the process of managing and organizing the collection of intelligence from various sources. The collection department of an intelligence organization may attempt basic validation of what it collects, but is not supposed to analyze its significance. There is debate in U.S. intelligence community on the difference between validation and analysis, where the National Security Agency may try to interpret information when such interpretation is the job of another agency.

Intelligence cycle management refers to the overall activity of guiding the intelligence cycle, which is a set of processes used to provide decision-useful information (intelligence) to leaders. The cycle consists of several processes, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination and integration. The related field of counterintelligence is tasked with impeding the intelligence efforts of others. Intelligence organizations are not infallible but, when properly managed and tasked, can be among the most valuable tools of management and government.

Intelligence dissemination management is a maxim of intelligence arguing that intelligence agencies advise policymakers instead of shaping policy. Due to the necessity of quick decision-making in periods of crisis, intelligence analysts may suggest possible actions, including a prediction of the consequences of each decision. Intelligence consumers and providers still struggle with the balance of what drives information flow. Dissemination is the part of the intelligence cycle that delivers products to consumers, and intelligence dissemination management refers to the process that encompasses organizing the dissemination of the finished intelligence.

National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:

<span class="mw-page-title-main">Special reconnaissance</span> Intelligence gathering discipline

Special reconnaissance (SR) is conducted by small units, such as a recon team, made up of highly trained military personnel, usually from special forces units and/or military intelligence organizations. Special reconnaissance teams operate behind enemy lines, avoiding direct combat and detection by the enemy. As a role, SR is distinct from commando operations, but both are often carried out by the same units. The SR role frequently includes covert direction of airstrikes and indirect fire, in areas deep behind enemy lines, placement of remotely monitored sensors, and preparations for other special forces. Like other special forces, SR units may also carry out direct action and unconventional warfare, including guerrilla operations.

<span class="mw-page-title-main">140th Military Intelligence Battalion (United States)</span> Military unit

The 140th Military Intelligence Battalion of the United States Army Reserve was constituted on 16 July 1986, assigned to the 63rd Army Reserve Command, and activated with headquarters at the General George Smith Patton Jr. United States Army Reserve Center, located at 5340 Bandini Boulevard in Bell, California. The battalion inactivated in 1995.

The reconnaissance mission within the United States Marine Corps is divided into two distinct but complementary aspects; Marine Division Recon and Force Reconnaissance.

Technical Intelligence (TECHINT) is intelligence about weapons and equipment used by the armed forces of foreign nations. The related term, scientific and technical intelligence, addresses information collected or analyzed about the broad range of foreign science, technology, and weapon systems.

Advanced Digital Forensic Solutions, Inc. is a company based in Reston, Virginia, that develops tools for scanning suspect computers and digital devices to locate and extract data, a process known as digital forensics. Digital forensic tools scan mobile phones, computers and digital devices to collect intelligence or evidence of a crime to identify computers that contain content relevant to an investigation.

<span class="mw-page-title-main">Counter-IED efforts</span>

Counter-IED efforts are done primarily by military and law enforcement with the assistance of the diplomatic and financial communities. It involves a comprehensive approach of countering the threat networks that employ improvised explosive devices (IEDs), defeating the devices themselves, and training others. Counter-IED, or C-IED, is usually part of a broader counter-terrorism, counter-insurgency, or law enforcement effort. Because IEDs are a subset of a number of forms of asymmetric warfare used by insurgents and terrorists, C-IED activities are principally against adversaries and not only against IEDs. C-IED treats the IED as a systemic problem and aims to defeat the IED threat networks themselves.

The Fourth Department (4PLA) of the Chinese People's Liberation Army General Staff Department (GSD) is also known as the Electronic Countermeasures and Radar Department. It was charged with the Chinese People's Liberation Army's offensive electronic warfare (EW) and information warfare (IW) missions, to include offensive cyber operations. In 2016, its functions were transferred to the Network Systems Department of the PLA Strategic Support Force.

<span class="mw-page-title-main">203rd Military Intelligence Battalion</span> Technical intelligence unit of US Army

The 203rd Military Intelligence Battalion (Technical Intelligence) is the sole technical intelligence (TECHINT) collection and foreign material exploitation unit of the United States Department of Defense and a battalion in the United States Army Reserve. The 203rd obtains and exploits captured enemy materials, maintains one of the premier test and evaluation inventories of adversary equipment and weaponry in the US military, and supports specialized tasking including counter-terrorism, special reconnaissance, and direct action missions. Much of the units work is conducted in close collaboration with the National Ground Intelligence Center. The battalion's intelligence products provide TECHINT support to INSCOM, the Defense Intelligence Enterprise, the broader US Intelligence Community (IC), the Five Eyes, NATO, and foreign allies and partners.

References

  1. "Army Public Affairs" (PDF). Archived from the original (PDF) on 26 February 2017. Retrieved 13 February 2009.
  2. FAS