The U.S. Army yesterday issued a new Field Manual on “Sensitive Site Operations” (FM 3-90.15, 25 April 2007).
The document itself is restricted and the Army would not immediately provide a copy to Secrecy News. But a few blanks can nevertheless be filled in.
“A sensitive site is a designated, geographically limited area with special military, diplomatic, economic, or information sensitivity for the United States,” according to the Army Field Manual (2-0) on Intelligence (pdf).
“This includes factories with technical data on enemy weapon systems, war crimes sites, critical hostile government facilities, areas suspected of containing persons of high rank in a hostile government or organization, terrorist money laundering, and document storage areas for secret police forces.”
“Sensitive site exploitation consists of a series of activities inside a sensitive site captured from an adversary.”
“These activities exploit personnel, documents, electronic data, and material captured at the site, while neutralizing any threat posed by the site or its contents. While the physical process of exploiting the sensitive site begins at the site itself, full exploitation may involve teams of experts located around the world.”
For further background and description of some fairly recent sensitive site operations, see a seminar paper entitled “The Strategic Implications of Sensitive Site Exploitation” (pdf) by Col. Thomas S. Vandal, National Defense University, 2003.
See also “Managing Sensitive Site Exploitation — Notes from Operation Iraqi Freedom” (pdf) by Major Pete Lofy, 2003.
At a time when universities are already facing intense pressure to re-envision their role in the S&T ecosystem, we encourage NSF to ensure that the ambitious research acceleration remains compatible with their expertise.
FAS CEO Daniel Correa recently spoke with Adam Marblestone and Sam Rodriques, former FAS fellows who developed the idea for FROs and advocated for their use in a 2020 policy memo.
In a year when management issues like human capital, IT modernization, and improper payments have received greater attention from the public, examining this PMA tells us a lot about where the Administration’s policy is going to be focused through its last three years.
Congress must enact a Digital Public Infrastructure Act, a recognition that the government’s most fundamental responsibility in the digital era is to provide a solid, trustworthy foundation upon which people, businesses, and communities can build.