FAS

Sensitive Site Operations

04.26.07 | 1 min read | Text by Steven Aftergood

The U.S. Army yesterday issued a new Field Manual on “Sensitive Site Operations” (FM 3-90.15, 25 April 2007).

The document itself is restricted and the Army would not immediately provide a copy to Secrecy News. But a few blanks can nevertheless be filled in.

“A sensitive site is a designated, geographically limited area with special military, diplomatic, economic, or information sensitivity for the United States,” according to the Army Field Manual (2-0) on Intelligence (pdf).

“This includes factories with technical data on enemy weapon systems, war crimes sites, critical hostile government facilities, areas suspected of containing persons of high rank in a hostile government or organization, terrorist money laundering, and document storage areas for secret police forces.”

“Sensitive site exploitation consists of a series of activities inside a sensitive site captured from an adversary.”

“These activities exploit personnel, documents, electronic data, and material captured at the site, while neutralizing any threat posed by the site or its contents. While the physical process of exploiting the sensitive site begins at the site itself, full exploitation may involve teams of experts located around the world.”

For further background and description of some fairly recent sensitive site operations, see a seminar paper entitled “The Strategic Implications of Sensitive Site Exploitation” (pdf) by Col. Thomas S. Vandal, National Defense University, 2003.

See also “Managing Sensitive Site Exploitation — Notes from Operation Iraqi Freedom” (pdf) by Major Pete Lofy, 2003.

publications
See all publications
Government Capacity
Blog
Direct File Is the Floor, Not the Ceiling

“The first rule of government transformation is: there are a lot of rules. And there should be-ish. But we don’t need to wait for permission to rewrite them. Let’s go fix and build some things and show how it’s done.”

08.06.25 | 5 min read
read more
Emerging Technology
Blog
Creating A Vision and Setting Course for the Science and Technology Ecosystem of 2050

To better understand what might drive the way we live, learn, and work in 2050, we’re asking the community to share their expertise and thoughts about how key factors like research and development infrastructure and automation will shape the trajectory of the ecosystem.

08.06.25 | 4 min read
read more
Emerging Technology
Blog
Why Listening Matters for Moonshot Programs: ARPA-I’s National Tour

Recognizing the power of the national transportation infrastructure expert community and its distributed expertise, ARPA-I took a different route that would instead bring the full collective brainpower to bear around appropriately ambitious ideas.

08.05.25 | 7 min read
read more
Emerging Technology
day one project
Policy Memo
Establish a Network of Centers of Excellence in Human Nutrition (CEHN) to Overcome the Data Drought in Nutrition Science Research

NIH needs to seriously invest in both the infrastructure and funding to undertake rigorous nutrition clinical trials, so that we can rapidly improve food and make progress on obesity.

08.04.25 | 12 min read
read more