INDEX A Abu Ghraib, 130, 245, 253, 319 Accuracy, 4, 17, 19, 31, 32, 34, 35, 37, 46, 65-68, 70, 71, 73, 82, 83, 85, 107, 111, 137, 150, 163, 205, 231, 242, 248, 295, 302, 305, 307, 313, 320, 325 Affiliation, 117, 178, 279, 314 Agility, 257 All-seeing eye approach, 126 Alternative question methodology, 110, 111, 148, 183, 189, 190, 202, 207, 212, 224 Ambiguity, 102, 129, 134, 256, 258 Appreciation, 195, 244, 280 Approach avoidance, 22, 110 Army Field Manual 34-52, 6, 18, 126, 127, 303 Attitudes, 21, 22, 29, 33, 37, 47, 64, 107, 114, 116, 147, 150, 152, 178, 180, 184, 193, 202, 272, 292, 301, 312, 321, 326 Authority, 23, 36, 110, 116, 120, 151, 172, 175, 293, 297-299, 313, 324 Authority principle, 105, 112, 126 Autonomy, 279, 280 B Barriers to success, 3, 6, 115, 235, 236, 244, 247, 248, 250, 265 BATNA (Best Alternative To a Negotiated Agreement), 254, 275, 276, 281, 298, 299 Behavioral indicators, 5, 45, 46, 52, 308 Behavioral science, 1, 3, 4, 10, 17-19, 104, 249 Behavioral symptoms, 142, 174 Behavioral cues, 47, 48, 113 Biderman, Albert D., 33, 98, 132, 139, 311, 316, 317, 323 Bind-strain theory, 110 Body language (see Body movements) Body movements, 47, 68, 118, 122, 146, 213, 220, 238, 255, 265 Book of Five Rings, 263 Boston Police Department, 142, 144, 212, 214, 217, 228, 230 Boyd, Colonel John, USAF, 253, 257, 258, 263 Brain activation patterns (see Electroencephalography (EEG)) Breaking point, 30, 319, 322 Bush Administration, 320 329
C Camp 020 (MI-5), 318, 249, 254 Camp David negotiation, 273 Case study, 144, 218, 314 Casual empiricism, 10, 11 Centers of gravity, 104, 247 Chaos, 134, 256, 258 CIA (Central <strong>Intelligence</strong> Agency), 5, 75, 96, 106, 237, 311, 315, 320, 322 Cialdini, Robert B., 23, 105, 112, 119, 126, 128 Circular logic, 246 CITP (see Criminal Investigator Training Program) Clash of Civilizations, 244 Classes, 204, 212, 218 Coercion or coercive methods, 9-14, 19, 24-27, 35, 36, 96, 98, 102, 106, 114, 120, 123, 124, 130-133, 136, 137, 149, 174, 200, 201, 221, 222, 264, 306-309, 313, 316, 320-322, 325, 326 Coleman, Daniel, 214-217, 220, 230 Commitment (see also Irrevocable Commitments), 24,25, 36, 54,117, 125, 154, 273, 275, 282, 293, 297, 322 Communications (see also Non-verbal Communication), 13, 19-21, 26, 34, 36, 45, 46, 48, 104, 106, 118, 121, 136, 140, 147, 151, 177, 180, 183-185, 197, 208, 210, 212, 236, 238, 247-250, 255, 279, 280, 313, 323 Compliance, 17, 20, 22, 24, 25, 33, 35-37, 102, 103, 105, 109, 110, 114, 116, 119, 124, 126, 128-131, 137, 191, 196, 313, 316, 317 Confession (see also Oral Confession; Securing the Confession), 5, 6, 18, 39, 74, 99, 100, 110, 111, 118, 142, 144, 145-152, 155-159, 163-175, 183, 186-191, 193, 194, 200-204, 207, 209, 210, 212, 215-217, 220, 222, 224, 225, 227-232, 256, 304, 316, 319, 321 Confidence (see also Interviewer Confidence), 16, 47, 49, 85, 107, 111, 112, 119, 123, 172, 176, 181, 190, 200, 212, 224, 227, 238, 262, 275, 304 Confirmation bias, 304 Confusion, pressure caused by, 29, 129, 134 Consistency (see also Consistency principle and Internal consistency), 24, 36, 171, 185, 253-255, 262 Consistency principle (see also Consistency and Internal consistency), 112, 128 Consultation teams, 249, 261 Contentious tactics, 273 Contingency agreement, 272 Controlled exchange of information, 250, 251 Cooperate, 1, 13, 330
- Page 1 and 2:
Educing Information Interrogation:
- Page 3 and 4:
Dr. Margaret A. Hamburg Senior Scie
- Page 5 and 6:
The National Defense Intelligence C
- Page 7 and 8:
8. Negotiation Theory and Practice:
- Page 10 and 11:
Foreword Robert A. Destro* Educing
- Page 12:
that the interrogation of adverse p
- Page 15 and 16:
for interrogation. What kinds of
- Page 18 and 19:
Commentaries Educing Information: T
- Page 20 and 21:
to public execution. This saved the
- Page 22 and 23:
of principles and rules to guide th
- Page 24 and 25:
Educing Information: Interrogation
- Page 26 and 27:
move, but defecate and urinate on t
- Page 28:
in Korea and Vietnam. Important les
- Page 31 and 32:
(SLATT) Program. Dr. Borum is a Boa
- Page 33 and 34:
Rowe is married to the Study Direct
- Page 35 and 36:
than “interrogate,” which incre
- Page 37 and 38:
• Begun to map the relevance of n
- Page 39 and 40:
The effectiveness of standard inter
- Page 41 and 42:
complexity of our choices and the n
- Page 43 and 44:
contemporary experience of other co
- Page 45 and 46:
that it is widely believed to be th
- Page 47 and 48:
treatment would have some positive
- Page 49 and 50:
programs and strategies in the most
- Page 51 and 52:
information on our adversaries’ p
- Page 53 and 54:
communications, discourse analysis,
- Page 55 and 56:
4,405 published entries. Not surpri
- Page 57 and 58:
Reciprocity There is a powerful —
- Page 59 and 60:
using coercive strategies also has
- Page 61 and 62:
directives. If anything the case ag
- Page 63 and 64:
VI. Consume Resistance A longstandi
- Page 65 and 66:
Ketcham, 1994; Roediger and McDermo
- Page 67 and 68:
• General cognitive slowing (Ding
- Page 69 and 70:
in non-Western cultures, so there i
- Page 71 and 72:
References Bartlett, F.C. (1932). R
- Page 73 and 74:
Knowles, E. S., Butler, S., and Lin
- Page 75 and 76:
Schacter, D. (ed.) (1995). Memory D
- Page 78 and 79:
3 Research on Detection of Deceptio
- Page 80 and 81:
methods are potentially valuable to
- Page 82 and 83:
negative statements or complaints,
- Page 84 and 85:
younger and more limited in life ex
- Page 86 and 87:
in obtaining information. The pract
- Page 88 and 89:
References 1. Akehurst, L., R. Bull
- Page 90 and 91:
28. Raskin, D. C., Kircher, J. C.,
- Page 92 and 93:
55. Dulaney, E. F. (1982). “Chang
- Page 94:
82. Izard, C. E. (1994). “Innate
- Page 97 and 98:
methodological means for detecting
- Page 99 and 100:
The use of the polygraph for securi
- Page 101 and 102:
and potentially could interfere wit
- Page 103 and 104:
fixates when it pauses in a particu
- Page 105 and 106:
Potential Research has not yet esta
- Page 107 and 108:
the Korean War to release repressed
- Page 109 and 110:
consuming to emplace properly, and
- Page 111 and 112:
The differences in experimental des
- Page 113 and 114:
his government funding. Langleben h
- Page 115 and 116:
training duration, and inter-traini
- Page 117 and 118:
detection [emphasis in original]”
- Page 119 and 120:
References Abe, Nobuhito, Suzuki, M
- Page 121 and 122:
Elaad, E., and Ben-Shakhar, G. (199
- Page 123 and 124:
Kozel, F. A., Revell, L. J., Lorber
- Page 125 and 126:
Raskin, D. C., and Honts, C. R. (20
- Page 128 and 129:
5 KUBARK Counterintelligence Interr
- Page 130 and 131:
ests in the nature of two fundament
- Page 132 and 133:
not reach the depth required in an
- Page 134 and 135:
Qualities of an Effective Interroga
- Page 136 and 137:
thoughtful, systematic approach. In
- Page 138 and 139:
While the Joint Interrogation Facil
- Page 140 and 141:
generally sound tactics from the be
- Page 142 and 143:
source pool. The disciplined interr
- Page 144 and 145:
undermining the objectivity and acc
- Page 146 and 147:
The fundamental objective of an int
- Page 148 and 149:
generated inside the interrogatee.
- Page 150 and 151:
may be driven by intra- and/or inte
- Page 152 and 153:
as the sights and sounds of an outs
- Page 154 and 155:
to reliably filter out those indivi
- Page 156 and 157:
expressions), vocal cues (e.g., cha
- Page 158 and 159:
Second, there is the tactical error
- Page 160 and 161:
that it is typical of the other ser
- Page 162 and 163:
Alice in Wonderland: The Power of A
- Page 164 and 165:
The concept of regression appears t
- Page 166 and 167:
In general, direct physical brutali
- Page 168 and 169:
een accomplished would the interrog
- Page 170 and 171:
himself, and then projects the cont
- Page 172 and 173:
The U.S. interrogation effort must
- Page 174 and 175:
6 Custodial Interrogations: What We
- Page 176 and 177:
While few U.S. jurisdictions requir
- Page 178 and 179:
Factors Inhibiting Confession Gisli
- Page 180 and 181:
and the suspect’s anxiety to obta
- Page 182 and 183:
• Many criminal investigations ca
- Page 184 and 185:
are not based on what is objectivel
- Page 186 and 187:
almost nonexistent and interrogator
- Page 188 and 189:
inconsistent with information from
- Page 190 and 191:
Social Events The first type of soc
- Page 192 and 193:
and make them more responsive to in
- Page 194 and 195:
others within that environment.”
- Page 196 and 197:
that it is necessary to ask the que
- Page 198 and 199:
Study Country Type ofData Sample Co
- Page 200 and 201:
observe and document the interrogat
- Page 202 and 203:
2. Gender: Gudjonsson notes that ap
- Page 204 and 205:
legal advice. 349 Though not direct
- Page 206 and 207:
while unsuccessful interrogations w
- Page 208 and 209:
discuss them. 391 Moreover, one can
- Page 210 and 211:
learned to observe and interpret hu
- Page 212 and 213:
suspect. 426 In addition, the autho
- Page 214 and 215:
3. Establish confidence and friendl
- Page 216 and 217:
At the closing, Dillon suggests aga
- Page 218 and 219:
The Reid Technique text then review
- Page 220 and 221:
the suspect “man-to-man” rather
- Page 222 and 223:
Step 5 - Procurement and Retention
- Page 224 and 225:
Make Submission Tolerable The suspe
- Page 226 and 227:
• The Singleness of Purpose • T
- Page 228 and 229:
Good Cop/Bad Cop One interrogation
- Page 230 and 231:
suggested by Inbau et al., Royal an
- Page 232 and 233:
in mind the possibility that the pe
- Page 234 and 235:
in the police may be undermined, wh
- Page 236 and 237:
to the confession factors. Moreover
- Page 238 and 239:
1. Preparation: Agents are urged to
- Page 240 and 241:
should also be attentive to signs o
- Page 242 and 243:
studies have tested the specific FB
- Page 244 and 245:
Once the agents have completed thei
- Page 246 and 247:
that indicate deception, and to not
- Page 248 and 249:
implemented to ensure that any stat
- Page 250 and 251:
or even a seemingly random phone nu
- Page 252 and 253:
to know oneself and one’s limits
- Page 254 and 255:
educed the scope of coercive questi
- Page 256 and 257:
Finally, Sturgeon mentioned that al
- Page 258 and 259:
confess at lower rates than those n
- Page 260 and 261:
variation for different types of su
- Page 262 and 263:
suspicious of an overly friendly in
- Page 264 and 265:
1. Whether the Reid Technique and i
- Page 266:
to discuss and exchange techniques,
- Page 269 and 270:
Linguistic/Cultural Barriers Words
- Page 271 and 272:
field experience) the professional
- Page 273 and 274:
Operation ENDURING FREEDOM Language
- Page 275 and 276:
Contractors - Prior-Service Militar
- Page 277 and 278:
language pool, as advised by the Ho
- Page 279 and 280:
words and deeds that individuals or
- Page 281 and 282:
using SIM cards, 651 instant messag
- Page 283 and 284:
subject-matter experts observe the
- Page 285 and 286:
systems approach recognizes interro
- Page 287 and 288:
to find a better operational exempl
- Page 289 and 290:
Making Sense of Chaos and Ambiguity
- Page 291 and 292:
philosophy that advances the follow
- Page 293 and 294:
The OODA Loop. Source: Defense and
- Page 295 and 296:
Example of Action: The interrogator
- Page 297 and 298:
this technology fall far short of t
- Page 299 and 300:
Chiefs of Staff and Secretary of St
- Page 301 and 302:
This report, then, represents an ef
- Page 303 and 304:
The Pareto Curve. Source: Roger Fis
- Page 305 and 306:
claimed that a piece of land in the
- Page 307 and 308:
negotiation. Standards of legitimac
- Page 309 and 310:
that the other party will refuse to
- Page 311 and 312: face or, better yet, improve their
- Page 313 and 314: creatively; they improve the likeli
- Page 315 and 316: Commitments Commit to telling no or
- Page 317 and 318: Neale, M.A., Huber, V.L., and North
- Page 319 and 320: Introduction Any interaction betwee
- Page 321 and 322: first told that A and B have constr
- Page 323 and 324: house, namely, that they want to se
- Page 325 and 326: information, rather than to harm th
- Page 327 and 328: their beliefs about the “illegali
- Page 329 and 330: How and when an interrogator would
- Page 331 and 332: tactic might work if the source wil
- Page 333 and 334: Preparing with Respect to U.S. Inte
- Page 335 and 336: from the past, could be coded and a
- Page 337 and 338: After drilling a small hole in the
- Page 339 and 340: accuracy and/or usefulness of educe
- Page 341 and 342: Venue 3: Experiments with SERE Stud
- Page 343 and 344: Conclusion Experience and lessons l
- Page 345 and 346: This essay presents lessons that th
- Page 347 and 348: Bond, M. (2004). “The Prisoner.
- Page 349 and 350: Russian and Chinese methods and the
- Page 351 and 352: Goldberger, L. (1993). “Sensory D
- Page 353 and 354: McCoy, A. W. (2005). “Cruel Scien
- Page 355 and 356: A psychiatrist chronicles the decli
- Page 357 and 358: Hinkle Jr, L. E. (1963). Notes on t
- Page 359 and 360: Leo, R. A. (1992). “From Coercion
- Page 361: Krauthammer, C. (2005, 5 December).
- Page 365 and 366: Fear, 11, 24, 25, 29, 33, 36, 68, 6
- Page 367 and 368: L Language (see also Foreign langua
- Page 369 and 370: Positions (see also Perceptual posi
- Page 371 and 372: Strategy, 12, 20, 21, 26-29, 32, 10