The U.S. Army yesterday issued a new Field Manual on “Sensitive Site Operations” (FM 3-90.15, 25 April 2007).
The document itself is restricted and the Army would not immediately provide a copy to Secrecy News. But a few blanks can nevertheless be filled in.
“A sensitive site is a designated, geographically limited area with special military, diplomatic, economic, or information sensitivity for the United States,” according to the Army Field Manual (2-0) on Intelligence (pdf).
“This includes factories with technical data on enemy weapon systems, war crimes sites, critical hostile government facilities, areas suspected of containing persons of high rank in a hostile government or organization, terrorist money laundering, and document storage areas for secret police forces.”
“Sensitive site exploitation consists of a series of activities inside a sensitive site captured from an adversary.”
“These activities exploit personnel, documents, electronic data, and material captured at the site, while neutralizing any threat posed by the site or its contents. While the physical process of exploiting the sensitive site begins at the site itself, full exploitation may involve teams of experts located around the world.”
For further background and description of some fairly recent sensitive site operations, see a seminar paper entitled “The Strategic Implications of Sensitive Site Exploitation” (pdf) by Col. Thomas S. Vandal, National Defense University, 2003.
See also “Managing Sensitive Site Exploitation — Notes from Operation Iraqi Freedom” (pdf) by Major Pete Lofy, 2003.
Researchers have many questions about the modernization of Pakistan’s nuclear-capable aircraft and associated air-launched cruise missiles.
The decision casts uncertainty on the role of scientific and technical expertise in federal decision-making, potentially harming our nation’s ability to respond effectively
Congress should foster a more responsive and evidence-based ecosystem for GenAI-powered educational tools, ensuring that they are equitable, effective, and safe for all students.
Without independent research, we do not know if the AI systems that are being deployed today are safe or if they pose widespread risks that have yet to be discovered, including risks to U.S. national security.