Site Map

FM 34-52 INTELLIGENCE INTERROGATION -- SEPTEMBER 28, 1992

APPENDIX C:  S2 TACTICAL QUESTIONING GUIDE AND BATTLEFIELD EXPLOITATION OF CAPTURED ENEMY DOCUMENTS AND EQUIPMENT

History shows that EPWs, CEDs, and CEE are critical sources of combat intelligence. It has also shown the usefulness of information is directly proportionate to how fast a commander can get it.

OPERATIONS URGENT FURY, JUST CAUSE, and DESERT STORM proved that without workable procedures to handle captured persons or items, our combat effectiveness suffers because the evacuation chain jams the forward resupply effort. We also suffer because we have not exploited combat information sources at a low enough echelon to do that commander any good.

This guide is for battalion and brigade S2s. It explains standard procedures on what to do when the S2 --

  • Receives an enemy soldier.
  • Detains a civilian.
  • Finds an enemy document.
  • Discovers an unusual enemy weapon during tactical operations.

PERSONNEL HANDLING

There are two types of persons captured on the battlefield: combatants and noncombatants. PM 27-10 defines the two types. The capturing unit treats all combatants and noncombatants as EPWs until the division forward collecting point segregates them by category. This is whether they are soldiers, clergy, or medics (see Chapter 3).

Noncombatants are handled, questioned, detained, evacuated, and released in accordance with theater policy.

At the EPW's capture point, the capturing element performs the following steps, with the senior soldier responsible for ensuring they are done. The steps are referred to as the "five S's."

STEP 1. SEARCH

The POC unit's first job is to disarm, then search all EPW or detainees, and tie their hands behind their back. They gather all loose enemy documents and equipment in the area. They evacuate them with the EPW. Documents and personal and protective military equipment stay with the prisoner unless otherwise directed by the battalion S2.

STEP 2. SILENT

The capturing unit instructs or signals EPWs to be silent. If that does not work, the EPW is gagged. Guards give orders to EPWs, but do not talk nor give them comfort items.

STEP 3. SAFEGUARD

The POC unit immediately moves the EPWs out of the fire zone. They protect EPWs from reprisals and give them medical care as necessary. The POC unit tries to preserve the shock of capture until brigade interrogators have a chance to question the EPWs.

STEP 4. SEGREGATE

The POC unit orders the EPWs to sit on the ground. It separates officers from enlisted, senior from junior, male from female, and civilian from soldier. It prepares a captive tag and puts one on each EPW (Figure 3-4). Tagging procedures are discussed under equipment handling procedures below.

STEP 5. SPEED TO THE REAR

Lastly, the POC unit moves EPWs to the unit supply point for evacuation. All captured documents, personal effects, and portable enemy equipment go with the EPW. Also, one escort guard should know the EPW's circumstances of capture.

CAPTURED ENEMY DOCUMENTS FOUND ON ENEMY PRISONER OF WAR

The battalion S2, and subordinate unit commander, ensures CEOs found on EPWs are handled as follows. The POC unit will --

  • Search each EPW.
  • Return identification documents to EPW.
  • Write the following on the top and bottom half of the EPW captive tag: Number of documents taken; date and time, location and circumstances of capture; capturing unit's designation.
  • Put CED in a waterproof bag, one per EPW.
  • Affix Part C of the captive tag to the bag (see Figure 3-4).
  • Give CEDs to senior escort.
  • Direct senior escort to evacuate CEDs with the EPW.

CAPTURED ENEMY DOCUMENTS FOUND ON THE BATTLEFIELD

An example of CEDs found on the battlefield is paperwork discovered in an overrun CP, but not on an EPW's person. The POC unit will --

  • Put CEDs in a waterproof bag.
  • Follow the same procedures described above, and tag the bag.
  • Evacuate to battalion S2.
  • Battalion S2 evacuates all CEDs along EPW evacuation channels.

EQUIPMENT HANDLING PROCEDURES

CEE includes all types of foreign materiel found on an EPW or on the battlefield that may have military application. The POC unit --

  • Evacuates equipment with the EPW.
  • Confiscates, tags, and evacuates weapons and other equipment found on an EPW the same as CEDs.

ITEMS OF TECHINT VALUE

The capturing unit may recognize certain CEE as having possible TECHINT value. Such items include --

  • New weapons.
  • Radios.
  • Track vehicles.
  • Associated manuals.
  • All CEE known or believed to be of TECHINT interest.

The capturing unit's primary job when capturing a TECHINT item is to secure and report the capture to its S2 for disposition instructions. Figure C-1 provides a scenario for TECHINT items.

FIRST ECHELON BATTLEFIELD TECHINT EXPLOITATION

It is conceivable, although not likely, that the capturing unit leader or S2 may need to do field exploitation of a piece of CEE. If this happens --

  • It will usually be at the request of the battlefield TECHINT team attached to corps headquarters.
  • The small-unit leader or S2 follows the same procedures used to exploit a CED.

TAGGING PROCEDURES

There are two capture tags: A CEE tag and an EPW tag with a smaller tear-off document tag. The POC unit tags all captured personnel, CEDs, and CEE at the POC.

The battalion S2 or company commander is responsible for having sufficient CEE and EPW document tags as well as and waterproof bags prior to an operation.

When no standard tag forms are available, the following procedures will be used for expediency:

  • Use meals, ready-to-eat (MRE) cardboard or other type of paper.
  • Write the capturing unit's designation.
  • Write date and time of capture.
  • Write POC coordinates.
  • Write circumstances of capture.
  • Identify EPW, CED, or CEE captured.
  • Put tag, without damaging the CED, in a waterproof bag.
  • Attach EPW and CEE tags so they will not come off.
FROM THE FOXHOLE TO THE CMEC

The soldier either captures or observes an item of possible TECHINT interest The soldier quickly reports the encounter through his or her command to the Battalion S2. The soldier then either safeguards the item or continues the mission as directed.

Upon learning that a forward platoon or company has captured or encountered an item of possible TECHINT Interest, the Battalion S2 promptly --

  • Coordinates security or continued observation of the item with the S3 and ensures the item is not tampered with in any way. Components, control knobs, and switches on C-E equipment should not be touched until the equipment is photographed or positions recorded.
  • Examines and screens the item against PIR and IR and determines whether the item is known or believed to be of TECHINT interest; or, whether, in the soldier's opinion, the item deserves initiative reporting.
  • Spot reports the capture or encounter in the SALUTE format through higher headquarters to the first Battlefield TECHINT element in the chain of command.
  • Coordinates continued security or observation of the item until receipt of further instructions.
  • Identifies items requiring immediate screening for combat information by other supporting MI elements. This could include C-E system items like code books, radios, or technical documents such as operator manuals.

Intermediate echelons of command continue forwarding the spot reported encounter or capture to their supporting Battlefield TECHINT element.

The supporting Battlefield TECHINT element receives the spot report and compares the information to requirements and the existing data base to see if collection is necessary. The element then decides further action and notifies the capturing unit accordingly. The CMEC or Battlefield TECHINT team's options at this point include, but are not limited to --

  • Requesting the capturing unit to provide further information, such as detailed descriptions, sketches, photographs, or documents captured with the item.
  • On-site screening or exploiting.
  • Destroying the item.
  • Abandoning the item unharmed.
  • TECHINT team-supervised or routine evacuating.
  • Priority evacuating to EAC.
  • Recommending turning over initial exploitation to other MI elements, such as target exploitation or interrogators, for immediate tactical information screening.

TACTICAL QUESTIONING

This section provides "how to" instructions to enable the S2 to do tactical questioning (TQ) on EPWs. Following these will --

  • Achieve usable results.
  • Preserve the source for subsequent formal interrogation.
  • Keep the S2 from breaking the law.

WARNING

Improper, unlawful, or inept attempt at field exploitation can harm or destroy possible critical intelligence sources, and send US soldiers to prison. Any decision to attempt these procedures is a command responsibility, and only done by the S2.

Figure C2 is an example of the front and reverse sides of a CEE tag. It should be included as a tab to the TECHINT appendix in the Intelligence annex of an OPLAN plan or operations order (OPORD).

The purpose of TQ is to obtain combat information of immediate use to the battalion or subordinate unit by the S2. Sources of information can be an EPW and local or friendly civilians encountered in the operational area. (S2s use established procedures when questioning local or friendly civilians.)

LANGUAGE REQUIREMENT

TQ can be done only under one of following circumstances:

  • The S2 speaks the EPW's language well enough to ask direct questions and understand the answers. A language qualified interpreter is available to assist the S2.

WHERE TQ IS DONE

TQ is done as soon as possible after removing the EPW from fire zones. However, battalion or brigade commanders forced to deal with heavy EPW input may set up an organized TQ effort at the unit's EPW collecting point.

WHO ASKS THE QUESTIONS

Only the S2 is authorized to conduct TQ. The S2 asks every question himself, even when using another soldier or local national as an interpreter. If augmented by interrogators, the interrogation team supervises the TQ effort.

TIME CONSIDERATIONS

TQ is designed to be a quick procedure, lasting from 5 to 20 minutes. A command decision is required if source questioning interferes with mission accomplishment or delays a priority evacuation.

ITEMS NEEDED FOR TQ

TQ is authorized for collection of combat information critical to successful mission accomplishment. The questioner needs to know what information headquarters requires. Other items required for TQ are --

  • Maps.
  • Vehicle and aircraft identification guides.
  • Target language dictionary.
  • Report forms, stationery, capture tags, waterproof bags.
  • Interpreter or translator.

THE EXPLOITATION PROCESS

The exploitation process, discussed in Chapter 3, is the basis for all personnel examinations, to include TQ. It consists of three parts: screening, questioning, and reporting.

Figure C-2.  Front and Reverse sides of CEE tag.

SCREENING

If there is more than one EPW, the quickest method to pick who to question first is to --

  • Check the captive tag to see if your unit recently captured the EPW with unusual equipment; for example, a sniper rifle or booby trap in an area of operational interest.
  • Observe for high rank, key enemy unit patches, and unusual behavior.
  • Use established guidelines and rank the most likely EPWs first for questioning.

QUESTIONING

The key to questioning is brevity. Tactical questioners work fast until they find an EPW who will give useful combat information. To do this, the tactical questioner --

  • Ensures the EPW is under guard.
  • Briefs interpreter as necessary.
  • Has the EPW searched and obtains identity document.
  • Looks over EPW's identity document and CEDs.
  • Makes a mental questioning plan.
  • Presents military bearing. Preserves the shock of capture.
  • Asks military questions, intermixing biographical questions so as not to arouse the EPW's security training.
  • Compares answers given on the identity card and other items found on the EPW to check for truthfulness.
  • Ends questioning if the EPW stops or refuses to answer military questions.
  • Ends questioning if the EPW intentionally or unintentionally provides so much irrelevant military information instead of information pertinent to the tactical questioner's combat mission.
  • Never promises anything that cannot be delivered.

REPORTING

Tactical questioners report acquired information in SALUTE format (Figure 3-5). To do this, they --

  • Obtain combat information using the direct questioning technique (see Chapter 3).
  • Record combat information of interest to headquarters. This is recorded in SALUTE format as relevant answers are obtained.
  • Attempt to fill in all SALUTE report blanks before moving to another collection requirement or before ending the questioning.
  • End questioning by telling the EPW they will talk again, and return required items, such as the EPW's ID.

THE TACTICAL QUESTIONING PLAN

The questioning plan used during TQ is short, simple, and standard. The questioner can use it to uncover spot reportable information on any subject. An easy way to remember it is through the phrase "BIG 4 and JUMP."

  • BIG 4 is a nickname for the Geneva Convention's "name, rank, service number, and date of birth."
  • JUMP is an acronym for job, unit, mission, PIR, IR, and SIR, which is the sequence of the TQ plan.

More specifically, the TQ plan covers the following topics in sequence. Figure C-3 shows examples of the BIG 4 and JUMP questions.

  • EPW biographical data.
  • EPW duty position or job.
  • EPW unit or employer.
  • EPW present and future mission at time of capture.
  • Commander's collection requirements in order of priority.

BATTLEFIELD DOCUMENT EXPLOITATION

Battlefield DOCEX is a capturing unit procedure done by the S2 before interrogator exploitation. A combat unit without language-qualified personnel can perform limited battlefield DOCEX, mainly on maps and overlays. Units with linguists have the advantage of being able to do more.

What is your last name? First name? Middle name?
What is your rank? Service number? Dale of Birth?
****
What is your position (or job) in your unit (or firm)?
What unit are you in (or who do you work for)?
What was your mission (or what type of work were you doing) when you were captured?
What would your future mission have been (or what jobs or projects would you have had) had you not been captured? What other missions would you have had if you had not been captured?
****
Follow up on all given information items; in particular, ensure you have the source's full unit designation and thoroughly follow up on the source's missions. A good rule of thumb is to ask Who, What, When, Where, How, and Why to fully develop whatever information you obtain.

NOTE: Continue to ask questions based on collection requirements, phrasing them as direct questions. For example, "Where is the GATO cell's arm caches?' or "When will your unit attack SAN PABLO?"

Figure C-3. BIG 4 and JUMP question examples.

After capturing an EPW or enemy CP, the capturing unit needs to look for maps, encrypted items, OPORDs, overlays, and other documents. The capturing unit then notifies headquarters to request disposition instructions.

The small-unit leader safeguards the items pending disposition instructions. At the same time he --

  • Looks over the document.
  • Does not mark or harm it in any way.
  • Uses whatever resources are available to decipher it; for example, dictionaries and enemy map symbol guides. An example of Soviet and non-NATO symbols is at Figure C-5.
  • Looks for information that has a direct bearing on his current mission.

After finding information of possible value to the mission, the S2 extracts the combat information and uses the SALUTE format as a template to organize the information (see Figure 3-5).

Figure C-4.  Soviet and non-NATO map symbols.

Go to Next Page