dbo:abstract
|
- Site exploitation (SE), also called tactical site exploitation or sensitive site exploitation (SSE), is a military term used by the United States to describe "collecting information, material, and persons from a designated location and analyzing them to answer information requirements, facilitate subsequent operations, or support criminal prosecution." Sensitive site exploitation was conducted during the invasion of Iraq in Operation Iraqi Freedom when a key part of the Coalition Forces' mission was to discover weapons of mass destruction (WMDs). The "sensitive" of SSE referred to the possibility that sites searched might have contained chemical, biological, radiological, or nuclear (CBRN) materials inherent in WMDs. Later, an effort was made to refer to the practice as "SE" (site exploitation) instead of "SSE" because sites were still being searched and exploited, but more generally for intelligence gathering and not with the intent of locating WMDs. The main intent of site exploitation is to extract as much potential intelligence as possible from the site of a raid or point of interest in hopes that the data collected will lead to further enemy targets or answer priority intelligence requirements (PIR). A secondary benefit is that this data can be used to help prosecute criminals, if done correctly in accordance with local law. Site exploitation consists of the following phases: securing the site (usually through a raid), documenting the site, searching the site, prioritizing exfiltration, and exploiting materials found. (en)
|
rdfs:comment
|
- Site exploitation (SE), also called tactical site exploitation or sensitive site exploitation (SSE), is a military term used by the United States to describe "collecting information, material, and persons from a designated location and analyzing them to answer information requirements, facilitate subsequent operations, or support criminal prosecution." Site exploitation consists of the following phases: securing the site (usually through a raid), documenting the site, searching the site, prioritizing exfiltration, and exploiting materials found. (en)
|