07.02.2015 Views

Educing Information: Interrogation - National Intelligence University

Educing Information: Interrogation - National Intelligence University

Educing Information: Interrogation - National Intelligence University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Background<br />

Our adversaries are often more sophisticated now than in the past and the U.S.<br />

advantage in high-tech surveillance capabilities has diminished over the years.<br />

Both practical and political considerations account for past trends away from<br />

development and use of human sources for intelligence collection and toward<br />

substantial reliance upon imagery and communications interception technology.<br />

First and foremost, this approach worked; in fact, for many years, it worked<br />

extremely well. It leveraged the huge technological and financial advantages of<br />

the United States over most of the rest of the world, providing data collection<br />

capabilities that allowed the <strong>Intelligence</strong> Community access almost anywhere it<br />

cared to look. Unfortunately (in this context), the technological disparity between<br />

countries has grown narrower. As a result, our competitors and adversaries better<br />

understand our capabilities, which allows them to develop countermeasures that<br />

have diminished the return on our technology-based collection methods.<br />

Our adversaries are different than in the past. While it still remains almost<br />

impossible for another nation to move an armored division without being<br />

seen, high-tech surveillance systems offer relatively little capacity to track the<br />

movements of individuals belonging to a terrorist organization.<br />

Given the dispersed nature and small size of terrorist organizations, direct<br />

interaction with people is required to develop the kinds of information needed<br />

to inform and direct intelligence operations. The challenge is to identify when<br />

information and sources developed through human contact are valid.<br />

Determining Veracity<br />

Methods of detecting when an individual is attempting to deceive a listener<br />

constitute a primary basis for assessing the potential utility and validity of<br />

information obtained from human sources. A significant amount of scientific<br />

study has focused on this topic. Overall, data to this point suggest that for all<br />

groups, novice to professional, accuracy in determining when someone is being<br />

deceptive is only marginally better than chance. 1-22<br />

The two primary approaches to detecting deception rely on psychophysiological<br />

and behavioral indicators. Psychophysiological methods involve monitoring and<br />

assessing physiological reactions to events; for instance, through use of heart rate<br />

and function monitors 23-26 , skin conductance sensors, 27,28 thermal photography,<br />

voice frequency analysis 29 , and brain activation patterns measured via electronic<br />

wave patterns 30-33 or via magnetic resonance imaging, etc. Detailed examinations<br />

of these and other methods appear elsewhere in the literature 16,34,35 or within papers<br />

sponsored through the current study on educing information, such as the study by<br />

Heckman and Happel in this document.<br />

The present review covers scientific findings regarding our current capacity<br />

to detect deception by using behavioral indicators: all actions, statements, or<br />

responses that another person can reasonably monitor through observation. It<br />

focuses only on those methods that can be used in person-to-person communication,<br />

without the aid of extensive technological support. While technologically based<br />

46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!