Изображения страниц
PDF
EPUB

of his forces had run out of food. If the source is hinging on cooperating, it may aid the interrogation effort if he is told all the other source's have cooperated.

The futility approach must be orchestrated with other approach techniques (for example, love of comrades). A source who may want to help save his comrades' lives may be convinced the battlefield situation is hopeless and they will die without his assistance.

The futility approach is used to paint a bleak picture for the prisoner, but it is not effective in and of itself in gaining the source's cooperation.

We Know All

This approach may be employed in conjunction with the "file and dossier" technique (discussed below) or by itself. If used alone, the interrogator must first become thoroughly familiar with available data concerning the source. To begin the interrogation, the interrogator asks questions based on this known data. When the source hesitates, refuses to answer, or provides an incorrect or incomplete reply, the interrogator provides the detailed answer.

When the source begins to give accurate and complete information, the interrogator interjects questions designed to gain the needed information. Questions to which answers are already known are also asked to test the source's truthfulness and to maintain the deception that the information is already known. By repeating this procedure, the interrogator convinces the source that resistance is useless as everything is already known.

After gaining the source's cooperation, the interrogator still tests the extent of cooperation by periodically using questions to which he has the answers; this is very necessary. If the interrogator does not challenge the source when he is lying, the source will know everything is not known, and he has been tricked. He may then provide incorrect answers to the interrogator's questions.

There are some inherent problems with the use of the "we know all" approach. The interrogator is required to prepare everything in detail, which is time consuming. He must commit much of the information to memory, as working from notes may show the limits of the information actually known.

File and Dossier

The file and dossier approach is used when the interrogator prepares a dossier containing all available information obtained from documents concerning the source or his organization. Careful arrangement of the material within the file may give the illusion it contains more data than actually there. The file may be padded with extra paper, if necessary. Index tabs with titles such as education, employment, criminal record, military service, and others are particularly effective.

The interrogator confronts the source with the dossiers at the beginning of the interrogation and explains intelligence has provided a complete record of every significant happening in the source's life; therefore, it would be useless to resist. The interrogator may read a few selected bits of known data to further impress the source.

If the technique is successful, the source will be intimidated by the size of the file, conclude everything is known, and resign himself to complete cooperation. The success of this

technique is largely dependent on the naiveté of the source, volume of data on the subject, and skill of the interrogator in convincing the source.

Establish Your Identity

This approach is especially adaptable to interrogation. The interrogator insists the source has been correctly identified as an infamous individual wanted by higher authorities on serious charges, and he is not the person he purports to be. In an effort to clear himself of this allegation, the source makes a genuine and detailed effort to establish or substantiate his true identity. In so doing, he may provide the interrogator with information and leads for further development.

The "establish your identity" approach was effective in Viet Nam with the Viet Cong and in OPERATIONS JUST CAUSE and DESERT STORM.

This approach can be used at tactical echelons. The interrogator must be aware if it is used in conjunction with the file and dossier approach, as it may exceed the tactical interrogator's preparation resources.

The interrogator should initially refuse to believe the source and insist he is the criminal wanted by the ambiguous higher authorities. This will force the source to give even more detailed information about his unit in order to convince the interrogator he is who he says he is. This approach works well when combined with the "futility" or "we know all" approach.

Repetition

This approach is used to induce cooperation from a hostile source. In one variation of this approach, the interrogator listens carefully to a source's answer to a question, and then repeats the question and answer several times. He does this with each succeeding question until the source become so thoroughly bored with the procedure he answers questions fully and candidly to satisfy the interrogator and gain relief from the monotony of this method.

The repetition technique must be judiciously used, as it will generally be ineffective when employed against introverted sources or those having great self-control. In fact, it may provide an opportunity for a source to regain his composure and delay the interrogation. In this approach, the use of more than one interrogator or a tape recorder has proven effective.

Rapid Fire

This approach involves a psychological ploy based upon the principles that

Everyone likes to be heard when he speaks.

It is confusing to be interrupted in mid-sentence with an unrelated question.

This approach may be used by one or simultaneously by two or more interrogators in questioning the same source. In employing this technique, the interrogator asks a series of questions in such a manner that the source does not have time to answer a question completely before the next one is asked.

This confuses the source and he will tend to contradict himself, as he has little time to formulate his answers. The interrogator then confronts the source with the inconsistencies causing further contradictions.

In many instances, the source will begin to talk freely in an attempt to explain himself and deny the interrogator's claims of inconsistencies. In this attempt, the source is likely to reveal more than he intends, thus creating additional leads for further exploitation. This approach may be orchestrated with the pride and ego-down or fear-up approaches.

Besides extensive preparation, this approach requires an experienced and competent interrogator, with comprehensive case knowledge and fluency in the source's language.

Silent

This approach may be successful when used against the nervous or confident source. When employing this technique, the interrogator says nothing to the source, but looks him squarely in the eye, preferably with a slight smile on his face. It is important not to look away from the source but force him to break eye contact first.

The source may become nervous, begin to shift in his chair, cross and recross his legs, and look away. He may ask questions, but the interrogator should not answer until he is ready to break the silence. The source may blurt out questions such as, "Come on now, what do you want with me?"

When the interrogator is ready to break silence, he may do so with some nonchalant questions such as, "You planned this operation for a long time, didn't you? Was it your idea?" The interrogator must be patient when using this technique. It may appear the technique is not succeeding, but usually will when given a reasonable chance.

Change of Scene

The idea in using this approach is to get the source away from the atmosphere of an interrogation room or setting. If the interrogator confronts a source who is apprehensive or frightened because of the interrogation environment, this technique may prove effective.

In some circumstances, the interrogator may be able to invite the source to a different setting for coffee and pleasant conversation. During the conversation in this more relaxed environment, the interrogator steers the conversation to the topic of interest. Through this somewhat indirect method, he attempts to elicit the desired information. The source may never realize he is being interrogated.

Another example in this approach is an interrogator poses as a compound guard and engages the source in conversation, thus eliciting the desired information."

i. Finding 9:

(1) Finding: Interviewed leaders and Soldiers stated the unit's morale (71%) and command climate (68%) had steadily improved due to competent leadership, caring of Soldiers by leaders, and better working and living conditions as the theater matured.

(2) Standard: Army Regulation (AR) 600–20, Army Command Policy, 13 May 2002, Chapter 1, paragraph 1-5, subparagraph c (1) and (4)(c), prescribes the policies and responsibilities of command. The specific language in the regulation follows:

"c. Characteristics of command leadership.

(1) Commanders and other leaders committed to the professional Army ethic promote a positive environment. If leaders show loyalty to their soldiers, the Army, and the Nation, they earn the loyalty of their soldiers. If leaders consider their soldiers' needs and care for their wellbeing, and if they demonstrate genuine concern, these leaders build a positive command climate.

"(4) Professionally competent leaders will develop respect for their authority by

"(c) Properly training their soldiers and ensuring that both soldiers and equipment are in the proper state of readiness at all times. Commanders should assess the command climate periodically to analyze the human dimension of combat readiness. Soldiers must be committed to accomplishing the mission through the unit cohesion developed as a result of a healthy leadership climate established by the command. Leaders at all levels promote the individual readiness of their soldiers by developing competence and confidence in their subordinates. In addition to being mentally, physically, tactically, and technically competent, soldiers must have confidence in themselves, their equipment, their peers, and their leaders. A leadership climate in which all soldiers are treated with fairness, justice, and equity will be crucial to development of this confidence within soldiers. Commanders are responsible for developing disciplined and cohesive units sustained at the highest readiness level possible."

j. Finding 10:

(1) Finding: Detainee administration, internment, and intelligence exploitation policy and doctrine does not address detainee operations conducted in the current operating environment, which has a higher demand for human intelligence exploitation at the tactical level and the need for additional classifications of detainees.

(2) Standard: Standard of treatment for detainees in OPERATION ENDURING FREEDOM (OEF): Chairman, Joint Chiefs of Staff (CJCS) message dated 211933Z JAN 02 states that members of the Taliban militia and members of Al Qaida under the control of US Forces would be treated humanely and, to the extent appropriate and consistent with military necessity, in a manner consistent with the principles of the Geneva Conventions of 1949. The DAIG has therefore used the provisions of the Geneva Conventions as a benchmark against which to measure the treatment provided to detainees by U.S. Forces to determine if detainees were treated humanely. The use of these standards as benchmarks does not state or imply a position for the United States or U.S. Army on the legal status of its operations in OEF.

CJCS Message dated 211933Z JAN 02, provides the determination regarding the humane treatment of Al Qaida and Taliban detainees. Convention Relative to the Treatment of Prisoners of War of August 12, 1949 (GPW) is the international treaty that governs the treatment of prisoners of war; and Geneva Convention Relative to the Protection of Civilian Persons in Time of War (GC), August 12, 1949 is the international treaty that governs the treatment of civilian persons in time of war.

As the guidance did not define "humane treatment" but did state that the US would treat members of the Taliban militia and Al Qaida in a manner consistent with the Geneva Conventions, the DAIG determined that it would use Common Article 3 of the GCs as its floor measure of humane treatment, but would also include provisions of the Geneva Convention on the Treatment of Prisoners of War (GPW) and Geneva Convention Relative to the Protection of Civilian Persons in Time of War (GC) as other relevant indicia of "humane treatment." The use of this standard does not state or imply a position for the United States or U.S. Army on the legal status of its operations in OEF.

Standard of treatment for detainees in OPERATION IRAQI FREEDOM (OIF): OIF was an international armed conflict and therefore the provisions of the Geneva Conventions applied. Additionally, the United States was an occupying power and has acted in accordance with the obligations of an occupying power described in the Hague Convention No. IV Respecting the Laws and Customs of War on Land (H.IV), Oct. 18, 1907, including, but not limited to Articles 43-46 and 50; Geneva Convention Relative to the Treatment of Prisoners of War of August 12. 1949 (GPW), Geneva Convention Relative to the Protection of Civilian Persons in Time of War (GC), August 12, 1949. The GC supplements H.IV, providing the general standard of treatment at Article 27 and specific standards in subsequent Articles.

The minimum treatment provided by Common Article 3 of the Geneva Conventions is: (1) No adverse distinction based upon race, religion, sex, etc.; (2) No violence to life or person; (3) No taking hostages; (4) No degrading treatment; (5) No passing of sentences in absence of fair trial, and; (6) The wounded and sick must be cared for.

follows:

The specific language in the CJCS Message for OEF and the GPW/GC and H.IV

CJCS Message dated 211933Z JAN 02, "Paragraph 3. The combatant commanders shall, in detaining Al Qaida and Taliban individuals under the control of the Department of Defense, treat them humanely and, to the extent appropriate and consistent with military necessity, in a manner consistent with the principles of the Geneva Conventions of 1949."

GPW/GC, Article 3 (Common Article 3) - "In the case of armed conflict not of an international character occurring in the territory of one of the High Contracting Parties, each party to the conflict shall be bound to apply, as a minimum, the following provisions:

1. Persons taking no active part in the hostilities, including members of armed forces who have laid down their arms and those placed hors de combat by sickness, wounds, detention, or any other cause, shall in all circumstances be treated humanely, without any adverse distinction founded on race, color, religion or faith, sex, birth or wealth, or any other similar criteria.

To this end the following acts are and shall remain prohibited at any time and in any place whatsoever with respect to the above-mentioned persons:

(a) Violence to life and person, in particular murder of all kinds, mutilation, cruel treatment and torture;

(b) Taking of hostages;

(c) Outrages upon personal dignity, in particular, humiliating and degrading treatment;

« ПредыдущаяПродолжить »