*FM Headquarters. Department of the Anny. Washington. DC. 28 September INTELLIGENCE INTERROGATION. Table of Contents. Page. dures and techniques applicable to Army intelligence interrogations, applies to the psychological operations (PSYOP) contained in FM FM Intelligence Interrogation. Chapter 3. Interrogation Process. The interrogation process involves the screening and selection of sources for.
|Published (Last):||19 November 2017|
|PDF File Size:||17.17 Mb|
|ePub File Size:||13.33 Mb|
|Price:||Free* [*Free Regsitration Required]|
Recognize the Breaking Point. Enter Your Email Address. This process must be followed until the prisoner begins to answer pertinent questions. Each interrogation is different, but all approaches in interrogations have the following purposes in common: A careful assessment intelkigence the source is absolutely necessary to avoid wasting valuable time in the approach phase.
FM Intelligence Interrogation – Chapter 3
In some cases, he may be afraid to answer for fear of reprisals by the enemy. They require the source to supply a separate answer to each portion of the inyerrogation.
It is of intrrrogation importance to report accurate information to the using elements. He must possess a good voice and speak English and a foreign language idiomatically and without objectionable fn or impediment. Some circumstances that require an interrogation to be terminated are- The source remains uncooperative throughout the approach phase.
Question Guards Screeners should question guards about the source. The senior interrogator uses this evaluation to update the information he has about the interpreter. Showing kindness and understanding toward the source’s predicament.
Negative questions are questions which are constructed with words like intelligencce “none,” or “not. In many cases, he has to conduct interrogations under a variety of unfavorable physical conditions. On June 5,the Los Angeles Times reported that the Pentagon’s revisions would remove the proscription against “humiliating and degrading treatment”, and other proscriptions intelliegnce article 3 of the third Geneva Convention.
There are four primary factors that must be taken into consideration in selecting tentative approaches: The letter “A” represents a source who is very likely to possess information pertinent to the supported commander’s PIR. After asking about gm source’s circumstances of capture, the interrogator can further gain rapport by asking questions about his background.
There are two methods: Questioning Techniques Interrogatiion good questioning techniques throughout the questioning phase.
Repeated questions ask the source for the same information obtained in response to earlier questions. Category 3C sources are normally interrogated last. Interrogators do not “run” an approach by following intelligencf set pattern or routine.
Provide the name, rank, duty position and full unit designation of each person who provided hearsay information to the source. Available documents pertaining to the source screening reports, interrogation reports, and administrative documents, such as detainee personnel record see Appendix B prepared by the military police, can help the screener by providing information on the source’s physical and emotional status, knowledge, experience, and other background information. The interrogator must possess, or acquire through training and experience, special skills and knowledge.
FM provides information on enemy material and equipment. The only exception is to exploit a hot lead immediately. Enter Your Email Address.
Compound questions are questions which ask for at least two different pieces of information. The interrogator must keep this purpose firmly in interrrogation as he obtains the information. In many cases, he refuses to talk at all and offers a real challenge to the interrogator. Knowledge of a foreign language is necessary since interrogators work primarily with non?
During termination, the interrogator must make proper disposition of any documents captured with the source. The source possesses too much pertinent information for all of it to be exploited during the interrogation session. Both screening and interrogation involve complex interpersonal skills, and many aspects of their performance are extremely subjective. Follow-up questions are used to exploit intelligennce topic of interest.
Sources may be civilian internees, insurgents, EPWs, defectors, refugees, displaced persons, and agents or suspected agents.
FM 34-52 Intelligence Interrogation
The interrogator must issue a receipt to the source for any personal documents he decides to impound. Whatever the motivation, it is the most significant factor used by an interrogator to achieve success. Vague questions tend to confuse the source, waste time, are easily evaded, and result in answers that may confuse or mislead the interrogator.
He is aware constantly that his job is to obtain information, interrogatin impart it to the source. This may cause him to miss leads or fail to detect losses in rapport or control that are detectable only intelliyence clues provided by the source’s behavior.
The interpreter must not inject any of his own personality, ideas, or questions into the interrogation. On September 6,the U.
What is the source’s age and level of military or civilian experience. Point out inconsistencies to the source. The interrogator must remain in charge throughout the interrogation. The interrogator then resumes his questioning of the source at the same point where the hot lead was obtained.
They may also be used to break the source’s concentration, particularly, if the interrogator suspects that the source is lying. Their physical conditions may range from near death to perfect health, their intelligence levels may range from well below average to well above average, and their security consciousness may range from the lowest to the highest.
There are two types of leads that concern interrogators? The exploitation of the source’s emotion can be either harsh or gentle in application hand and body movements, actual physical contact such as a hand on the shoulder for reassurance, or even silence are all useful techniques that the interrogator may have to bring into play. After having established control of the source and having established rapport, the interrogator continually assesses the prisoner to see if the approaches, and later the questioning techniques, chosen in the planning and preparation phase will indeed work.