*FM Headquarters. Department of the Anny. Washington. DC. 28 September INTELLIGENCE INTERROGATION. Table of Contents. Page. dures and techniques applicable to Army intelligence interrogations, applies to the psychological operations (PSYOP) contained in FM FM Intelligence Interrogation. Chapter 3. Interrogation Process. The interrogation process involves the screening and selection of sources for.

Author: Doshakar Yoktilar
Country: Tanzania
Language: English (Spanish)
Genre: Art
Published (Last): 20 March 2013
Pages: 218
PDF File Size: 10.3 Mb
ePub File Size: 15.7 Mb
ISBN: 643-5-13149-609-4
Downloads: 43727
Price: Free* [*Free Regsitration Required]
Uploader: Monris

Until he obtains all dispositions known by the source in the vicinity of the DCPR, the interrogator must repeat these questions and plot or record the information as it is provided by the source. Additionally, the inability to carry out a threat of violence or force renders an interrogator ineffective should the source challenge the threat.

Basic Concepts of Approaches The manipulative techniques within each approach are different, but there are some factors common to all approaches which affect the success or failure of the approach itself. The exploitation of the source’s emotion can be either harsh or gentle in application hand and body movements, actual physical contact such as a hand on the shoulder for reassurance, or even silence are all useful techniques that the interrogator may have to bring into play.

A response which is inconsistent with earlier responses or the interrogator’s available data is not necessarily a lie.

FM Intelligence Interrogation : Free Download, Borrow, and Streaming : Internet Archive

After these sources have been interrogated inrerrogation any information of immediate tactical value, as needed they are turned over to CI personnel lnterrogation quickly as possible. He may, then, gradually introduce significant topics into the discussion to gain important insight concerning the conditions and attitudes in the target country.

Enter Your Email Address. Transitions can also be smoothly covered jntelligence leaving the unsuccessful approach and going back to nonpertinent questions. The stronger the motivation, the more successful the interrogator.

  CHROMA 63804 PDF

McCain’s amendment passed, and is now called the Detainee Treatment Act. The interrogator then resumes his questioning of the source at the same point where the hot lead was obtained.

There are many types of questioning techniques. He is aware constantly that his job is to obtain information, not impart it to the source.

FM Intelligence Interrogation – Chapter 3

Analyze Information After the interrogator has collected all information available about his assigned source, he analyzes it. On October 20,Vice President Dick Cheney met with McCain to try to convince him to agree that his amendment should only apply to military interrogators. Available documents pertaining to the source screening reports, interrogation reports, and administrative documents, such as detainee personnel record see Appendix B prepared by the military police, can help the screener by providing information on the source’s physical and emotional status, knowledge, experience, and other background information.

If nonpertinent questions show that the tentative approaches chosen will not be effective, a flexible interrogator can easily shift the direction of his approach without the source being aware of the change. Order of Battle Information OB is defined as the identification, strength, command structure, and disposition of personnel, units, and equipment of any military force.

During the American War on TerrorSecretary of Defense Donald Rumsfeld issued a set of so-called ” enhanced interrogation techniques fn that authorized conduct widely considered to be torture. Properly uses repeated, controlled, prepared, and nonpertinent questions to interrogatiin interrogation and assess source. Both screening and interrogation involve complex interpersonal skills, and many aspects of their performance are extremely subjective.

The evaluation must cover the same points of information that the interrogator received from the senior interrogator.



All pertinent information has been obtained from the source. Once the interrogator is sure that he has obtained and recorded all the details known to the source, he issues interroyation SALUTE report.

As a rule, at lower echelons, it is considered unprofitable to expend excessive time and effort in interrogating hostile and antagonistic sources. Itnelligence actual number of combinations is limited only by the interrogator’s imagination and skill. A successful interrogation produces needed information which is timely, complete, clear, and accurate.

FM 34-52 Intelligence Interrogation

The senior interrogator reviews each plan and makes any changes that he feels necessary based on the commander’s PIR and IR. The assessment is recorded by means of a screening code. They are used primarily for interrogations which are technical in nature, require legal precision, or cover a number of specific topics.

In many cases, he refuses to talk at all and offers a real challenge to the interrogator.

He obtains all of the source’s pertinent knowledge in this topical area before moving on to the next topic in his sequence. Each interrogator, where feasible, begins his preparation by examining the situation map SITMAPthe OB data base, and inherrogation information contained in the interrogation element’s files.

Questioning Sequence An interrogator begins his questioning phase with the first topic in the sequence he tentatively established as part of his interrogation plan. Displaying impatience encourages the difficult source to think that if he remains unresponsive for a little longer, the interrogator will stop his questioning.