Us army interagation manual


















Army has published this Field Manual in the interest of full transparency. The "FOUO" markings are no longer operative. John Kimmons, U. Army, holds up a copy of Army Field Manual Lack of heat at the Cobalt black site north of Kabul, Afghanistan, likely contributed to the death of a detainee, the Senate report added, and a senior CIA officer stated that Cobalt was itself an enhanced interrogation technique. The Office of the Secretary of Defense did not respond to a request for comment made Monday afternoon.

Kyle Rempfer is an editor and reporter who has covered combat operations, criminal cases, foreign military assistance and training accidents. Before entering journalism, Kyle served in U. Your Army. By Kyle Rempfer. May 25, Irregular warfare authorities expand in defense budget The authority is used to support foreign forces, groups or individuals helping U. Isthis source knowledgeable enough torequire a full OB interrogation? The interrogator himself. Interrogators should question guards aspart of their preparations.

The guards are in constant contact with the sources and may be able to provide the following types of information:. Physical condition. Analyze Information. After the interrogator has collected all information available about his assignedsource, he analyzes it. Modify Sequences of Questioning The interrogator uses his estimate of thetype and extent of knowledge possessed by the source to modify the basic topical DODD0A sequence of questioning. He selects only those topics in which he believes the source has pertinent knowledge.

In this way, the interrogator refines his element's overall objective into a set of specific topics for his interrogation. The major topics that can be covered in an interrogation are shown below in their normal sequence. He must review this plan with the senior interrogator when possible. Identity of the source. Reasons why the interrogator selected only specific topics from the basic questioning sequence. C Approach strategy selected. After the plan is approved, the holding compound is notified to have a guard bring the source to the interrogation site.

Interrogators do not "run" an approach by following a set pattern or routine. Establish and maintain control over the source and the interrogation. The successful application of approachtechniques eventually induces the source to willingly provide accurate intelligence information to the interrogator. The term"willingly" refers to the source answering the interrogator's questions, not necessarily his cooperation.

The source may or may not be aware that he is actually providing the interrogator with information about enemy forces. Others may have to be constantly maintained or reinforced throughout theinterrogation. The techniques used in an approach can best be defined as a series of events, not just verbal conversation between the interrogator and the source. Basic Concepts of Approaches. The interrogator should establish and maintain control, establish and develop rapport, assess the source, make smooth transitions, appear sincere, be convincing, and recognize the breaking point.

Establish and Maintain Control. The interrogator must always be in control, he must act quickly and firmly. Establish and Develop Rapport. It can involve showing kindness and humanity in an otherwise harsh situation, or it can mean badgering the source. Rapport is established when the source reacts to the interrogator's statement.

Rapport must be maintained throughout the interrogation, not only just in the approach phase. If the interrogator has established good rapport initially and then abandons the effort, the source would rightfully assume that the interrogator cares less and less about him as the information is being obtained.

If this occurs, rapport is lost and the source may cease answering questions. Rapport may be developed by— E Asking about the circumstances of capture. Asking background questions. Apparent interest can be built by asking about his family, civilian life, friends, likes, dislikes, and so forth.

Assess the Source. Remember that the approaches chosen in planning and preparation are only tentative and are based on the sometimes scanty information available from documents, the guards, and personal observation. This may lead the interrogator to select approaches which may be totally incorrect for obtaining this source's willing cooperation. A careful assessment of the source is absolutely necessary to avoid wasting valuable time in The questions can be mixed or they can beseparate.

If, for example, the interrogatorhad chosen a love of comrades approach, he should ask the source questions like "Howdid you get along with your fellow squad members? However, if the source answers, "They all hated my guts and I couldn't stand any of them! Make Smooth Transitions.

Tie-ins to another approach can be made logically and smoothly by using transitional phrases. Logical tie-ins can be made by the inclusion of simple sentences which connect the previously used approach with the basis forthe next one. Be Sincere and Convincing. If an interrogator is using argument and reason to get the source tocooperate, he must be convincing and appear sincere. All inferences of promises,situations, and arguments, or otherinvented material must be believable.

What a source may or may not believe depends on his level of knowledge, experience, and training. A good assessment of the source is the basis for the approach and is vital to the success of the interrogation effort. Recognize the Breaking Point. There are, however, some good indicators that the source is near hisbreaking point or has already reached it.

The interrogator must be alert and observant to recognize these signs in the approach phase. If the source does not answer or balks at answering it, the interrogator must realize that the source was not as close to the breaking point as was thought. The interrogator can tell if the source has broken only by interjecting pertinent questions. Approach Techniques Interrogation approach techniques areusually performed by one interrogator.

The number of approaches used is limited only by the interrogator's imagination and skill. Almost any ruse or deception is usable as long as the provisions of the Geneva Conventions are not violated. To every approach technique, there are literally hundreds of possible variations, each of which can be developed for a specific situation or source.

With the exception of the direct approach, no other approach is effective by itself. Smooth transitions, logic, sincerity, and conviction can almost always make a strategy work. The lack of will undoubtedly dooms it to failure. Some examples of combinations are-. Whenthis occurs, the interrogator must adapt himself to approaches that he now believes will work in gaining the source's cooperation.

Questions should be comprehensive enough to ensure that the topic of interest is thoroughly explored. Answers should establish the who, what, when, where, how, and when possible why.

In such instances, the interrogator should proceed with direct questions. Questioning Techniques. Use good questioning techniques throughout the questioning phase.

There are many types of questioning techniques. The direct questioning technique-. Uses only properly formed, direct questions. O Avoids confusing, ambiguous, and time-consuming questions. Characteristics of direct questions are- O Basic interrogatives who, what, when, where, and how, plus qualifier. Brief, concise, simply-worded, and address the looked-for information.

Produces the maximum amount of usable information and gives a greater number of leads to new avenues of questioning. Follow-up questions are used to exploit a topic of interest. Questions usually flow one-from-another based on the answer to previous questions.

Follow-up questions are also used to fully exploit a lead given by the source in his response. It is hard for a source to be a convincing liar if his concentration is frequently interrupted. Repeated questions ask the source for the same information obtained in response to earlier questions.

Repeated questions may be used to check the consistency of the source's previous responses. They may also be used to ensure the accuracy of important details such as place names, dates, and componentparts of technical equipment. The use of repeated questions may develop a topic thatthe source had refused to talk about earlier.

They may also be used as a means of returning to a topical area for further questioning. Control questions are developed from information which the interrogator believes to be true. Prepared questions are developed in advance of an interrogation to gain precise wording or the most desirable questioning sequence. Interrogators must not allow the use of prepared questions to restrict the scope and flexibility of their interrogations. Leading questions may prompt the source to answer with the response he believes the interrogator wishes to hear.

As a result, the response may be inaccurate or incomplete. Leading questions are generally avoidedduring interrogations, but they can be used by experienced interrogators to verify information. This is especially true during map tracking. Avoid vague questions as they do not have enough information for the source to understand exactly what is being asked by the interrogator. They may be incomplete, "blanket" or otherwise nonspecific, and create doubt in the source's mind.

Vague questions tend to confuse the source, waste time, are easily evaded, and result in answers that may confuse or mislead theinterrogator. The interrogator must use the different types of questions effectively.

A response which is inconsistent with earlier responses or the interrogator's available data is not necessarily a lie. The source's truthfulness should, then, be evaluated based on the plausibility of his explanation. There are two types of questions that an interrogator should not use. Compound questions are questions which ask for at least two different pieces of information.

They are, in effect, two or more questions combined as one. They require the source to supply a separate answer to each portion of the question. Compound questions should not be used during interrogations because they allow the source to evade a part of the question or to give an incomplete answer. They may confuse the source or cause the interrogator to misunderstand the response.

Negative questions are questions which are constructed with words like "no. They usually require additional questions to clarify the source's responses. SALUTE reportable information is any information that is critical to the successful accomplishment of friendly courses of action.

If an interrogator cannot decide whether or not a piece ofinformation is SALUTE reportable, he should act as though it is. The interrogator should then consult the senior interrogator for a final determination of the information's value. Hot and Cold Leads. Leads are signs which tell an interrogator that the source has additional pertinent information that can he obtained through further questioning.

Leads are provided by a source's response to the interrogator's questions. There are two types of leads that concern interrogators—hot and cold. An interrogator must exploit hot leads as soon as he identifies them.

Once the interrogator is sure that he has obtained and recorded all the details known -to the source, he issues a SALUTE report.

If the interrogator does not fully exploit all of the cold leads he obtains, he must include information on all the leads he did not exploit in his interrogation report. Hearsay Information. Hearsay information must include the most precise information possible of its source.

This will include the name, duty position, full unit designation of the person who provided the information, and the date time group of when the source obtained the information. Questioning Sequence. He obtains all of the source's pertinent knowledge in this topical area before moving on to the next topic in his sequence.

He maintains his established sequence of questioning to ensure that no topics are missed. The only exception is to exploit a hot lead immediately. Even then, however, he must resume his questioning at the same point in the same area at which the hot lead was first identified. Map Tracking The interrogator obtains informationconcerning the location of enemy activities through the use of map tracking.

Maptracking is performed in the order in which they are described. By following the sequence below, an interrogator ensures that all required details are obtained for each disposition known to the source:. Establish an initial common point of reference ICPR. Establish a destination common pointof reference DCPR. The DCPR can be the reference point furthest back in time, distance, or higher echelon.

This could be forward or to the rear of the ICPR. In any case, you must establish a route using the procedures, in thesequence shown, in the following illustration. Each sequence establishes a CPR.

Exploit the DCPR. Upon determining route of travel. Exploit dispositions not on route. The interrogator then treats thisby the source. Segment and exploit the route seg-other route segment, -exploiting it fully ments. The interrogator begins exploit-before moving on to the next segment ing the source's route with the segment of the original route.

The interrogator will exploit each rately. Correct performance of this task segment of the route by asking the results in the map used by the interrogator. Recording Information There are several reasons for recording information obtained during interrogations. Refresh the interrogator's memory on a topic covered earlier, such as when returning to a topic after exploiting a hot lead. The interrogator's own notes are the primary method of recording information.

When the interrogator takes his own notes, he has a ready reference to verify responses to repeated questions or to refresh his memory. They also provide him with the means to record cold leads for later exploitation. When taking his own notes, however, he cannot observe the source continually. This may cause him to miss leads or fail to detect losses in rapport or control that are detectable only through clues provided by the source's behavior.

It is possible to lose control and the source's willing cooperation by devoting too much of his concentration to note taking. The interrogator must avoid distracting thesource while taking notes.

Notes should be taken in such a way that the maximum amount of eye-to-eye contact with the sourceis maintained. The interrogator will not have enoughtime to record every word that the source says. He must use his past experiences to decide which items of information should be recorded.

He should organize his materials to avoid having to flip back and forth between references. The only information that should berecorded during the approach phase is that required by part 1 of the interrogation report format is shown in Appendix G.

All other information should not be recorded until after the source's cooperation has been obtained. All notes must be complete, accurate, andlegible. A separate piece of paper shouldbe used to record cold leads. Situations may arise that require one interrogator to finish another interrogator's interrogation. Using a Sound Recorder. The use of a sound recorder allows the interrogator to continually observe the source.

However, more time is required for report writing because the entire tape must be replayed to transfer information to the report. Place names, numbers, and otherpertinent, detailed information may be unclear on the recording. Sound recorders cannot provide a ready reference that can be used to compare answers to a repeated question, and the equipment maymalfunction. Although the termination phase is only the fourth phase of the five phases, it is the last phase in which the interrogator will actually deal with the source.

If the interrogator mishandles the termination phase and he later finds that the source haslied or he needs to question the source further, he must start again from scratch. A number of circumstances can cause an interrogation to be terminated. Some cir-cumstances that require an interrogation tobe terminated are-. The source remains uncooperative throughout the approach phase. O The interrogator's presence is requiredelsewhere.

Whatever the reason for terminating the interrogation, the interrogator must remember that there is a possibility that someone may want to question the source at a later date. He tells the source that he may betalked to again. He offers the opportunity for thesource to change or add to any information he has given.

A source'smilitary identity document must bereturned to him. If a source does not hold an identity card issued by his government, thesource will be issued a completed DA Form R see Appendix C by the military police.

Any such documents may be impounded by the interrogator and evacuated through intelligence channels. The interrogator must issue a receipt to the source for any personal documents he decides to impound.

The accounting procedures required for impounding documents captured with a source are time-consuming but necessary. Reports are submitted on all information of intelligence value that is obtained. Written reports are prepared to document electronic reports. The aim of any interrogation is toobtain information which will help satisfy a commander's intelligence requirements.

Since these requirements will differ in scopeat each level, when conducting PIR or IRinterrogations, nonapplicable paragraphsmay be deleted. Part 1 must always be Aninterrogation with an interpreter will go through all five phases of the interrogation process.

After the interrogation is over, theinterrogator will evaluate the interpreter. Methods of Interpretation During the planning and preparation phase, the interrogator selects a method ofinterpretation. There are two methods: the simultaneous and the alternate. Heanalyzes this information and talks to the interpreter before deciding which method to use. With the simultaneous method, the interpreter listens and translates at the same time as the person for whom he is interpreting, usually just a phrase or a few words behind.

With the alternate method, the interpreter listens to an entire phrase, sentence, or paragraph. The interpreter can easily imitate the interrogator's tone of voice and atti- tude for the approaches selected. Interpreter Briefing Once the interrogator has chosen a method of interpretation, he must brief hisinterpreter. This briefing must cover the-.

Current tactical situation. Background information obtained on the source. Conduct of the interrogation in that statements made by the interpreterand the source should be interpreted in. The interpreter must not inject any of his own personality, ideas, or questions into the interrogation.

Selected approach techniques and how they are to be applied. One example is a source who claims tobe an officer but who uses excessive slang and profanity.

The best layout is to havethe interrogator and the source facing each other with the interpreter behindthe source. This helps ensure that the interpreter completely understands his role in theinterrogation. Conduct the Interrogation. During the interrogation, the interrogatorcorrects the interpreter if he violates any ofthe standards on which he was briefed. For example, if. Corrections should be made in a low-key manner. At no time should theinterrogator rebuke his interpreter sternlyor loudly while they are with the source.

The interrogator should never argue withthe interpreter in the presence of the source. When initial contact is made with the source, the interpreter must instruct him to maintain eye contact with the interrogator. Since both rapport and control must be established, the interpreter's ability to closely imitate the attitude, behavior, and tone of voice used by both the interrogatorand the source is especially important.

Thequestioning phase is conducted in the sameway that it would be if no interpreter wasused. The interpreter assists the interrogator in preparing reports. He may be able to fill ingaps and unclear areas in the interrogator'snotes. He may also assist in transliterating,translating, and explaining foreign terms. Following the submission of all reports,the interrogator evaluates the performance of his interpreter. The evaluation must cover the same points of information thatthe interrogator received from the senior interrogator.

The senior interrogator uses thisevaluation to update the information he hasabout the interpreter. CEDs are important because they can provide information directly from the enemy. Usually, each document provides a small bit of a larger body of information.

Each CED, much like a single piece of a puzzle, contributes to the whole. In addition to their tactical intelligence value, technical data and political indicators can be extracted from CEDs that are important to strategic and national-level agencies. CEDs can also be helpful in exploiting sources. STANAG defines a document as any piece of recorded information, regardless of form, obtained from the enemy and that subsequently comes into the hands of a friendly force.

CEDs can be US or allied documents that were once in the hands of the enemy. CEDs are mainly acquired two ways. Some are taken from sources. Generally, CEDs are of two types: official and personal.

Official documents are of government or military origin. The accountability phase begins at thetime the document is captured. Documents must be clearly tagged. The capturing unit attaches a captured document tag to each document.

When a captured tag is not available, the same information recorded on any piece of paper is acceptable. O Identity of the source from whom the document was taken, if applicable.

Summary of the circumstances under which the document was found. Accountability is accomplished by anyone who captures,evacuates, processes, or handles CEDs.



0コメント

  • 1000 / 1000