Skip navigation

Usdod Rumsfeld Memo Re Counter Resistance Techniques April 16 2003

Download original document:
Brief thumbnail
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
THE SECRETARY OF DEFENSE
1000 DEF'ENSE PENTAGON
WASr.tINGTON. DC 20301-1000

\APR 162003
MEMORANDUM FOR mE COMMANDER. us SOUlliERN COMMAND

SUBJECT: Counter-Resistance Techniques in the War 'on Terrorism (S)
.

)

~ I have considered the report of the Working Group that I directed be
established on January 15. 2003.

~

I approve the use of spec11led counter-resistance techniques. subject
to the following:
/
(V) a. The techniques I authorize are those lettered A-X, set out at Tab A.
(U) b. These techniques must be used With all the safeguards described
at Tab B.
. (uW3J c. Use of these technJques Is limited to interrogations of unlawful
combatants held at Guantanamo Bay. Cuba.
w·~
~-i;;;.,
(LA~ d. Prior to the use of these techniques. the Chairman of the Working
j
Group on Detainee Interrogations in the Global War on Terrorism must briefyou
and your staff.
~) I reiterate that US Anned Forces shall continue to treat detainees
humanely and. to the extent appropriate and consistent with militmy necesstty,
in a manner consistent with the principles of the Geneva Conventions. In
addition. if you intend to use techniques B. I. 0. or X, you must specifically
dete~e that military necessity requires its use and notify me in advance.
~) If, in your view, you require additional interrogation teclmiques for a
particular detainee, you should provide me. via the Chairman of the Joint Chiefs
of Staff. a written request describing the proposed technique. recommended
safeguards. and the rationale for applying it with an identified detainee.

(u1st Nothing in this memorandum in any way restricts your existing authority
to maintain good order and discipline among detainees.
Attachments:
As stated

classified Under Authority of Executive Order 12958
Executive Secretary, Office of the Secretary of Defense
lliam P. Marriott, CAPT,USN
Ie 18,2004

NOT RELEASABLE TO
FOREIGN NATJONALS

III1Cl;IFIED lassified By: Secretary of
un
'.
' . , ' Reason:
1.5(a)
..
C.

.

sm.

"~Defense

Declassify On: 2 April 2013

•

.

I

(

-.

"

TAB A

INTERROGATION TECHNIQUES

[(..\)
-(BI/NFl The use of techniques A - X is subject to the general safeguards as
provided below as well as specific implementation guidel1nes to be provided by
the appropriate authortty, Spec1flc implementation guJdance with respect to
techniques A - Q is provided in Army Field Manual 34-52. Further
implementation guidance with respect to techniques R - X will need to be
developed by the appropriate authority. .
.

(~).

.

.'

f9t IN!")

Of the techniques set forth below. the polley aspects of certain
techmques should be considered to the extent those polley aspects retJect the
views of other major U.S. partner nations. Where applicable. the descnption of

the technique is annotated to include a summary of the poHcy Lssuc:s that
ShOU~)'be considered before apphcanon of the technique.
.'.
A.

'""'\
-

-~
/

l\

~

~

Directf Asking straightforward questions.

.'

B.
incentive/Removal of incentive: ProvIding a reward or removing a
privilege, above and beyond those that are required by the Geneva Convention.
from detainees. ICaution: Other nations that believe that detamees are enUUed
to POW protectionsmay consider that provision and retention ofrel1glous items
(e.g.. the Koran) are protected under international Jaw (see. Geneva 10. Article
34). Although the provisions of the Geneva Convention are not applicable to the
interrogation of unlawful combatants. constderatson should be given to' these
views prior to application of the technique.)
(LA)
.
.'
C~ f&H.Np) Emotional Love: Playing on the love a detainee has for an
Individual or group.

,(r~

D.
Emotional Hate: Playing on the hatred a detalnee has for an
individual or group.
.
(lA\
.
E. ~J INF) Fear Up Harsh:' Slgn1ficantly Increasing the fear level in a detainee.
(~)

. F. tslINF) Fear Up Mild: Moderately increastng the fear level in a detainee.
CIA) ,

.

'

G. fSI/NFl Reduced Fear: Reducing the fear level m a detainee.
(U)
H.

f-St-tNPJ

,

Pride and Ego. Up: Boosting the ego of a detainee.

Classified By:
Reason:
Declassify On:
NOT RELEASABLE TO
FOREIGN NATIONALS

secretary of Defense
1.5(a)

2 Apr1l2013

Tab A

t

(L{\

.

.

L ~ Pride and Ego Down: Attacking or insulting the ego of a detainee,
not beyond the limits that would apply to a POW. [Caution: Article 17 of
Geneva ill provides, "Prisoners of war who refuse to answer may not be.
threatened, insulted, or exposed to any unpleasant or disadvantageous.
treatment of any kind." Other nations that believe. that detainees are entitled to
POW protections may consider this technique inconsistent with the provisions
of Geneva. Although the provisions of Geneva are not applicable to the
interrogation of unlawful combatants, consideration should be given to these
views prior to application· of the technique.)

J.

~~}NPl
Futility: Invoking the feeling of futility of a detainee.
(tA)
...

.

K. t9f'tNP) We Know AD: Convincing the detainee that the interrogator knows
the answer to questions he asks the detainee.
..

~

L.
Establish Your Identity: Convincing the detainee that.the
interrogator has mistaken the detainee for someone else.

~

CO~tinUOUs1Y

M.
Repetition Approach:
repeating the same question to
the detainee within interrogation periods of normal duration.
-

(u)

-

..

. -

-

N.· fBI/NFl File and Dossier: Con~cingdetainee that the interrogator has a .
damning and inaccurate file, which must be fixed.

J/I~

o.
Mutt and Jeff: A team consisting ofa friendly and harsh
interrogator. The harsh interrogator might employ the Pride and Ego Down .
technique. (Caution: Other nations that believe that POW protections apply to
detainees may view this technique as inconsistent with Geneva m. Article 13
which provides that PaWs must be protected against acts of intimidation.
Although the provisions of
are not applicable to the interrogation of
unlawful combatants, consideration should be given to these views prior to
application of the technique.)

Geneva.

~

P.
Rapid F1re: Questioning in rapid succession without &Bowing
detainee to answer.
Q.

(JI/~

Silence: Staring at the detainee to encourage discomfort.

(~.

.

R. fSI/NP) Change of Scenery Up: Removing the detainee from the standard
interrogation setting (generally to a location more pleasant, but no worse).
(~)

..

. .

S. fSffNF)- Change of Scenery Down: Removmg the detainee from the standard
interrogation setting and placing him in a setting that may be less comfortable;
would not constitute a substantial change in environmental quality.

tS~/~

T.
Dletary Manipulation: Changing the diet of a detainee; no intended
deprivation of food or water; no adverse medical or cultural effect and without
intent to deprive subject of food or water, e.g., hot rations to MREs..
2

Tab A

(L-l)
U. (8//N¥) Environmental Manipulation: Altering the environment to create
moderate discomfort (e.g., ac:ljusting temperature or introducing an unpleasant
smell). Conditions would not be such that they would injure the detainee.
Detainee would be accompanied by interrogator at aU times. [Caution:· Based
on court cases in other countries, some nations may view application of this
technique in certain circumstances to be inhumane. Consideration of these
views should be given prior to use of this technique.]

·(S~t~P)

V.
Sleep Adjustment: AdjUSting" the sleeping times of the detainee
(e.g., reversing sleep cycles from night to day.) This technique is NOT sleep
deprivation.
.
_

(S~/Jp"

W.
False Flag: Convincing the detainee that individuals from a
country other than the United States are interrogating him.

(u ) .

- -

x. ~ Isolation: Isolating the detainee from other detainees while still
complying with basic standards of treatment. [Caution: -The use of isolation as
an interrogation techfdque requires detailed implementation instructions,
including ~cific guidelines regarding the length of isolation, medical and _
psychologicel review, and approVal for extensions of the length of isolation by
the appropriate level in the chain of command. This technique is not known to
have been generally used for interrogation purpoSes for lonser than 30 days.
Those nations that believe detainees are subject to POW protections may view
use of this technique as inConsistent with the requirements of Geneva m,
Article 13 which provides that roWs must be protected against acta of
intimidation; Article 14 Which provides that pow. are entitled to respect for
their person; Article 34 which prohibits coercion and Article 126 which ensures
access and basic standards of treatment. Although the provisions of Geneva
are not applicable. to the intC2:'Togalion of unlawful combatants, consideration
should be given to these views prior to application ·of the technique.]

UNelASSIFlfD

-

Tab A

TABS

t». '\

GENERAL SAFEGUARDS

. ..

I

.

..

~ Application of these interrogation techniques is subject to the folloWing
general safeguards: (1) limJted to use only at strategic 1nterrogatlon facilities; (u)

there tsa good basts to believe that the detainee possesses cr1Uca1 JnteDtgence;
(ill) the detainee is medically and operationally evaluated as suttable
(considering all techniques to be used in combination); (IV) interrogators are
speC1fically trained for the techruquets): (v) a sped1lc interrogation plan
(including reasonable safeguards. l1m1ts on duration. intervals between

applications, termination cnterta and the presence or avaiJab1llty of qual1fted
medical personnel) has been developed: (Vi) there Is appropriate supervisson,
and, (VU) there IS appropriate spedfied senior approval for use With any spec11ic
detainee (after considering the foregOing and receiving legal advice).
(U) The purpose of alfinterviews andinterrogatlons is to get the most
infonnation from a detainee with the least intrusive method. always applied In a
humane and lawful manner with sufficient oversight by trained Investigators or
interrogators. Operating instructions must be developed based on command
policies to insure uniform. careful. and safe application of any 1n.terrogauons of
de~ees.
.

( L.L\

.fSIIN~

Interrogations must always be planned. deliberate actions that take
mto account numerous, often interlocking (actors such as a detainee's current
and past performance In both detennon and interrogation. a detaJnee's .
emotlonal and physical strengths and weaknesses. an assessment of possible .
approaches that may work on a certain detaJnee in an eJfort to gam the trust of
the detainee, strengths and weaknesses of interrogators. and augmentatlon by
other personnel for a certain detainee based on other factors.

~

approach~

Interrogatlon
are desJgned to manipulate the detainee's
emotions and weaknesses to gain his W1ll1ng cooperation. lnterrogatton
operations are never conducted In a vacuum; they are conducted in close
cooperation with the units detaining the Indrvtduals, The policies establtshed
by the detaining units that pertain to searching. silencing. and segregattng also
playa role 10 the interroganon of a detainee. Detainee interrogation involves
developing a plan tailored to an 1Ddtv1dual and approved by senior
Interrogators. Stnct adherence to pohctes /etandard operating procedures
governing the administration of interrogation techniques and oversight is
essential. .
Class1fied By:

NOT RELEASABLE TO
FOREIGN NATIONALS

Secretary of Defense

Reason:

1.5(~)

Declassify On:

2 April 2013

TabB

UNClASSIHtu

..

~~
IINp) It is important that interrogators be provided reasonable latitude to
.

vary techniques depending on the detainee's culture. strengths. weaknesses.
environment. extent of training in resistance techniques as well as the urgency
of obtaining information that the detainee is mown to have.
.

~

While techniques are considered individually within this analysis, it
must be understood that in practice, techniques are usually used in
combination; the cumulative effect of all techniques to be employed must be
considered before any decisions are made regarding approval for particular .
situations. The title of a particular technique is not always fully descriptive of a
particular technique. With respect to the employment of any tecl>niquea
involving physical contact. stress or that could produce physical pain or harm,
a detailed explenaticn of that technique must be provided to the deciaion
.
authority prior to any decision.

VNCJjSS/FiED

TabB

,.:\'
:;',,\

FM 34·52

» ;

\

TIme permmtng, each interrogator should UDobtrusively observe the source to personally confirm his
identity and to check his personal appearance and behavior.
After the interrogator bas collected aU information
available about his assigned source, he analyzes it. He
looks for indicators of psychological or physical weakness that might make the source susceptible to one or
more approaches, .,..,hicb tadUtates his approach
strategy. He also uses the information he collected to
identify the type and level _of knowledge possessed by
the source pertinent to the element's collection mission.

• Combat effectiveness.

• Loglsncs,
• Electronic technical data.
• Miscellaneous.

As a result of the planning and preparation phase, the
interrogator develops a plan for CODdu~tiDg his usiped
interrogation. He must review this plan with the senior
interrogator, when possible. Whether written or oral,
the interrogation plan must contain at least the foU01lll·
ing items:

• Primary and alternate approaches.

The major topics that can be covered in an imerrogation are shown below in their normal sequence. How.
ever, the interrogator is free to modify this sequence a.o;

• Questioning techniques to be used or Why the interrogator selected only specific topics from the
basic questioning sequence,

.)

'/

-

• EPW's or detainee's identity, to inc:lude wual ob.
servauon of the EPW or detainee by the taterrogator.

.I.
"

'

• Interrogation tUne and place,

• Means C!f recording and reponing information ob.
lained.

• Missions.

The senior interrogator reviews each plan and makes
any changes he feels necessary based OD the
commander's PIR and IR. After the plan is approved,
the holding compound is notified when to bring tbe
source to the interrogation site. The interrogator col.
lects all available interrogation aids needed (maps,
charts, writing tools, - and reference materials) and
proceeds to the interrogation site.

• Composition.
• Weapons, equipment, strength.
• Dispositions.
• Tactics.

• Training,

The approach phase begins with initial contact between the EPW or detainee and interrogator. Extreme
care is required since the success or the interrogation
hinges, 10 B large degree, on the early development of
the EPW's or detainee's willingness to communicate,
The interrogator's objective during this phase is to establish EPW or detainee rapport, and to gain his willing
cooperation so he wilJ correctly answer pertinent questions to follow. The interrogaror• Adopts an appropriate attttude based on EPW or
detainee appraisal.
• Prepares for an attitude change, ifneeessary.

I

set
but

APPROACH PHASE

COl!

• Begins to use an approach technique.
The amount of time spent on this phase wiD mostly
depend on (he probable quantity and value or information the EPW or detainee possesses, tbe a'Vailability of
other EPW or detainee with knowledge OD the same
topics. and available lime. At the initial contact, a ; .
businesslike relationship sbould be maintained. As the ·fu
EPW or detainee assumes a cooperative aunude, a -,~.
more relaxed atmosphere may be advantageous. The in. -t,
terrogaror must Qlrefully determine which ot the 'i.
various approach techniques to employ.
Regardless of the type of EPW or detainee and his / ;
outward personality, be does possess 11VCaknCSle5 wIdell, ":j:t
('

:;~"f

3·10

.

i':"

• Interrogation objective.

The interrogator uses his estimate of the type and CI·
lent of knowledge possessed bythe source 10 modify the
basic topical sequence of questioning. He selects only
those topics in ",bieb he believes the source has pertinent knowledge. In this way, the interrogator refines
his element's overall objective into a ~et of specific interrogation subjects.

necessary.

I
I

•

•
•
71
even

cura
teon

JUN-22-2004

DUD GENERHL

11:04

~UUN~tL

FM 34-52
."".

jf. recognized by the interrogator, can be exploited.
These weaknesses are manifesled in personality traU'
:r~~';J SJJch as speech. mannerisms, facial erpresslons, physical
.~:..~:;,;;: .mevemeats, excessive perspiration, and other overt in'T.".:~,'~·:'.:·dicatiOnsthat vary from EPWor detainee.

\~''''

interrogator's questioDSJ not necessarily his cooperation.

)J'::~~7'"

The source mayor may not be aware he is providing
the interrogator with informatioa about etIemy forces.
Some approaches may be CX)mp)e~ wben the source
begins to answer questions. Others may have to be eonstantJy malntalne4 or reinforced throu_hout tbe mterrogation. '

From a psychological standpoint. the interrogator
following behaviors, People

·.l:f'> lend
must be cognizant of the
tot,.:.~,

,¥>:~}~\ .". Talk, especially after harrowing experiences.

,:)''''~I'·).'''.'

t.

•

~'; .:/,~~~;~:.•

;!'

'.

.;~; -:.. .
L~·;·.'~·l

Q ~"~~';::,
.:

:{
-,

Sbow deference when confronted by supenor
authority.

'

,~

:. ~~)~I\):.YI,"

Rationalize acts about which they feel guilty.
•

~ .f~;\i~:~·

Fai) to apply or remember lessons they may have
·t~~( .. been taught regarding s~urily it confronted with a
';r; disorganUed or strange SItuation.
" I

•

C,t;'

•

~. COoperate with those who h>~,ve control over them.

···~:~~tach less importance to a topic about whjclJ the
~hnteJTogator demonstrates identical or related esi~rience or lcnowleC2ge.
1'\.: ppreciate flattery and exoneration from gUUt.
,,' "ent having someone or something they respect
~'t~~ed, especially by someone tbey dislike.

_.~1ond to kindness and understanding during

· g circumstances.

j~

'-:

·.perate readily when given material rewards
~~as extra food or lUXUry items for their

per-

. ~lc:omforL
t,

,

. ; ,tors do not "run" an approach by following a
• ':or routine. Each interrogation is different J
wogation approaches have the following in

J

m~
,

.

".,-"

'1'~:~~b and

'r

..... \

."

tion,

maintain control over the source and

The techniques used in an approa~h can best be
defined as a series of events, not just verbal conversetion between the interrogator and the source. The Qploitation of the source's emotion can be barsh or
gentle in application. Some useful techniques used by
interrogators are-• Hand and body movem.ents.
• ActUal physic:al contact such as a hand on the
shoulder tOf reassurance.
• Silence.

RAPPORT POSTU~ES

There are two types of rapport postures determined
dUring planning and prepantioD: stern and sym.
pathetic.
In [he stem po6lure, the interrogator keeps the EPW
or detainee at attemion. The aim is to make the EPW
or detainee keenly aware
his belpless and inferior
status. Interrogarors we tbis posture whh officers,

or

NCOs. andsecurity-conscieus enlisted men.
In the sympathetic POSlUJe J tbe interrogator addresses
the EPW or deudnee in a friendly fasbJon. striving to

put him at ease, This posture is commonly used in interrogating older or younger EPWs. EPWs may be
frightened and confused. One variation of this posture
is "'heD rheInterrogator uks about tbe EPWs family.
Few EPWs will hesftate to discuss meir family.
Frightened persons, regardless of rank, will invariably
talk in order to relieve tension once they bear a sympathetic voice in their own tongue. To put the EPWat
ease, the interrogator may allow the EPW to sit down,
offer a cigarette, ask wbether or not he needJ medical
care, and otherwtse show interest in JUs case.

There are many variations of these basic posreres,
Regardless of the one used, the interrogator must
present a military appearance and sbow character and
energy. The interrogator must control bis temper at all
times, excepr when a display is planned. The inter-

3-11

.,

"

"

FM 34-52
rogator must not waste lime in pointless discussions or
make promises be cannot keep; for example, the
Interrogator's granting poUtical asylum.

When making promises in 3D etlon (0 establish rapport, great care must be taken to prevent implying that
rights guaranteed the EPW under International and US
law will be withheld if the EPW refuses to cooperate.
Under DO circumstances will the interrogator betray
surprise at anything the EPW might say. Many EPWs
will talk freely if they feel the information they are discussing is already known to tbe interrogator. If the interrogator acts surprised. the EPW may stop talking
immediately.
The interrogator encourages an)' behavior that
deepens rapport and increases the now of communication. At the same time. the interrogator must discourage any behavior that has the opRPsite e(fecL

The interrogator must alwaY$ be in control of the interrogation. I( the EPW or detainee challenges this
control, the interrogator must act qUickly and firmly.
Everything the interrogator says and does must be
within 'the limits ofthe GPW, Article 17.
DEVELOPING AAPPOln
Rapport must be maintained throughout the interrogation, not only in the approach phase. If tbe interrogator has established good rappon initially and tben
abandons the effort, the source woukl rigbtfully assume
the interrogator cares less and less about him as the information is being obtained. If this occurs, rapport is
lost and the source may cease answering questions.
Rapport maybe developed I?r• Asking about the circumstances ot capture. By
doing this, the interrogator can gain insight into
the prisoner'S actual state of mind and, more importantly. be can ascertain his possible breaking

points.
• ASking background queSlions. After asking about
the source's circumstances of capture, apparent interest can be buiJr by asking about the source's
family. civilian life, triends, Ukes. and dislikes. This
is to 4evelop rapport, but nonpeninent questions
may open new avenues for tbe approach and help
determine whether tentative approaches chosen in
the planning and preparation phase wiD be effec,.rive. If these questions shOW tbat the tentative appreaches chosen will not be effective, a flexible

3-12

\

,'.
,.

interrogator can r;hift the approacb direction
whhout the source being aware of the change.
Depending on the situation, and requests the source
may have made, the interrogator also can use the following [0 develop rapparL
• Offer realistic: incentives, such as-

-Immediate comfort items (cOffee, cigarettes).

~

-Shon-term (a meal, shower, send a letter home).

,.

-Long-term (repatriatiou, political asylum).

:i

• Feign experience similar to those of the source.
• Show concern for'the source through the use of
voice vitality and body Jangu.age.
• Help the source to rationalize his guilt.
• Show kindness and understanding toward the
source's predicament.
• Exonerate the source from guilt.
• Flatter the source.
Alter h8vin~ established control and rappon, the in-.'
terrogator continually assesses the source to see if the'
approaches-c-and later the questioning techniq'Ues-..'
chosen in the planning and preparation phase 9lill in-.
deedworJc.
.
.

Approaches chosen in plannIng and preparation are'
tentative and based on the sometimes- scanty informa
tion available from documents, guards, and personal ob.:.
servation, This may lead the interrogator to seJect
approaches "-hicb may be totally incorrect for obtainiD '
thJs source's willing cooperation. Thus, careful assess
ment of the source is critical to avoid -"astin, valuabl·.
time in the approach phase.

The questions can be mixed or separate. If. for

ample, tbe interrogator bas tentatively chosen a

I

a

a
t
J
a

n
T

el(

~love

0.
comrades" approach. he should ask the source quesdo .'
like "How did you gel along with your fellow sqU8:,
membersz" If tbe source answers they were all ve:
close and worked well as a team, the interrogator ~:
use this approach and be reasonably sure of its SUcc:l::ss.~·

Ho....ever. if the source answers, "'They all bated

t

iii
~

guts and] couldn't stand any of them; the inlerrogat,~

should abandon that approach and ask some quick. n~:
pertinent questions to give himself time to work out;('j .
new approacb.
.:~.
'Ii"~

·th

inl
je<
In'
the
Im
tht

.1'01

'an

:; ;~i1I
~,~

FM 34-62

r~:t:"

Smooth Transftlons
must guide the conversation
f.: ",~,r;$stDOOlbJy and logically. especially if he needs to move
itw'~fiPm one approacb technique to another. "Poking and
;; ~:"f,>'.·~··I}j'Opin( in (he approach may alen the prisoner to ploys
'~~~n'd will make the job more difficu)l
....

/~

.,jJ;.~:;'I.'.The Interrogator

.,I~"'\

J'.,

},:

<

I~.'·"

': ~ .ltll~{>: TIe-ins

(0 another approach can be made logically
, '":" ~~:;"~.~d smoothly by using transitional phrases. Logical tie\ '/~" ~,;J~ can be made by includiDg simple sentences which
~:i:{;'Connect tbe previously used approach with the basis for
l
/ ':4
~:'-~~be next one.

1.;.,

~~,:

:.;
Transitions an also be smoothly covered by leaving
, ,~rl'f.'i~tbe unsuccessful approach and going back to noaper: :"~X:"inent questions. By using nonpertinent conversaticn,
,: ,~';~~' the interrogator can move the conversadon in the
: ;~1f.:!:;~:,.'~esiIed direction and. as previously stated, sometimes
:' :~:~fSt;can obtain Jeacl& and hints about the source's stresses or
; ""':;~';;;:'weaknesses or other approacbstraregtes that may be
, ... 'r'
"
, :'·~fi7, more successful,
~

.:

~r.l·~':·

·n~~;:
';'~'f.:

:

Slnce,e and Convincing

, ,~,,;,:
" If an interrogator is using argument and reason to 0lIet
~(" ,
,the source to cooperate, he must be convincing and ap"pear sincere. All inferen~ of promises, Situations, and
, arguments, or other invented miilteriaJ must be believ.
:",,: able" What a source mayor may not believe depends on
:: . the interrogator's knowledge, experlence, aod training.
A good source assessment is the basis tor the approach
and vital to the success of the lnrerroganon effort.

>:A;:

:,
J

f

J
I
1
i
I

;

continue to work until he feels the source it near break-

ing.

Reeognlz8 the Breaking Point
Eve.ry source has a breaking poim, but an interrogator never knows what jt js until it has been reacbed.
There are, however, some good indicators the source is
near his breaking point or has already reached iL For
example, if during the approach, the source leaDS forward with his facial expression indicating an interest in
the proposal or is more hesitant in his argument, he js
probably nearing the breaking point The interrogator
must be alert to recognlze these signs.
Once the interrogator determines the source is breaking. be should interject a question pertinent to the objective of the interrogation. If the source answers it, tbe
interrogator can move into the questioning phase. It
the source does nOI answer or balks ar answering it, the
interrogator must realize the source was nOI as cJose to
the breaking pain I as thought, In this case, (he interrogator must continue with hi! approach, or switch to
an alternate approach or questioning technique and

The interrogator can ren it (he source has broken
only by interjecting pertinent qllestioDL TIlis process
must be fol1owed unlit the EPW 6r detainee begins to
answer pertinent questions. It is possible the EPW or
detainee may cooperate for a while and then balk at
answering further questions. U this occurs. the interrogator can reinforce the approathe" thai initially
gained the source's cooperation or move into a difIerenr
approaCh before returning to the questioning phase.
At this point, it is Important to note the amount of
time spent with a particular source depends on several

fadon:
• The banJefield slruation.
• Expediency which the supported commander's PlR
and IR requirements need to be answered.
• Source's willingness to talk,
The number or approaches used is limited only by tbe
Interrogator's sJcill. Almost any ruse or deception is
usable as Jong as the provisions of tbe GPW. as outlined
in Figure 1-4, are not violated.

An interrogator must not pass hhnself off as a medic,
chaplain, or as a member of the Red Cross (Red Qes-

or

cent
Red Lion). To eve.ryapproacb technique, there
arc literally hundreds of possiblevariarions, each of
which can be developed for a specific situation or
source.
The variations are limited only by tbo
interrogator's personality. experience, ingenuity, and
imagination.
APPROACH COMBINATIONS

With the exception of lhe direct approach. no other

approach is effective by itself. Interrogators use different approach tecbniques or combine them into a
cohesive. logical technique. Smootl.l transJlion~, sincerity, logic, and conViction almost al~ys make a
&lralegy work. The Jack of will undoub(edly dooms it to
failure. Some examples of combinations are--

• Direct-futility-incentive.

• Direct-futiJity-)ove of comrades.

• Direct-fear-up (mild}-incen(ive.
1lIe number of combinations are Unlimited. Interrogators must carefully choose the approach strategy in
(he planning and preparation phase and listen carefully

3-13

JUN-22-2004

11:06

DOD GENERAL COUNSt.L

FM 34-52

to what tbe source is sayillg (verbally or nonverbally) for
leads the strategy chosen will bot work. When this occurs, the interrogator must adapt to approaches he
believes wilJ work ib gaining the source's cooperation.
The approach technlques are not new nor are all tbe
possible or acceptable techDiquC8 discussed belo ....
Everything the interrogator says and does must be in
concert with tbe GWS, GPW, Gc, and UeMJ. The approaches which have proven effective are-e• Direct.
• Incentive.
• Emotional.
• Increased fear-up.
• Pride and ego.

Dlred Appro8ch ;:::.
The interrog81or-asks questions directly related to information sougbt, making no effort to conceal the
interrogation's purpose. The dira;t approach, always
the first to be anempted, is IJsed on EPWs or detainees
who the interrogator believC8 will cooperate.
This may occur when interrogating an EPW or
detainee who bas proven cooperative during inilial
screening or fiJ$t interrogation. Ir may also be used On
those with little Or no security uainlng. The direct approach works best on lower enlisted personnel, as tbey
have little or no resistance training and bave had minimal security training.·

The direct approach is simple to use, and i( is posslble
to obtain the maximum amount of information in tbe
minimum amount of time. II is frequently employed a(
lower echelons when the tscucal situation precludes
selecting other techniques, and where lbe EI'W's or
detainee's mental state is one of confusion or extreme
shock. Figure C3 contains sample questions used in
direct questioning.
The direct approach is the most effective. StatistiC3
show in World War II, it was 90 percent effective. In
Vietnam and OPERATIONS URGENT FURY, JUST
CAUSE, and DESERT STORM, it was 95 percent effective.
Incentive Approach

The incentive approach is based on the applic:ation at
inferred discomfort upon an EPW or detainee who lacb
IL'iJIpower. The EPW or detainee may display (ondness

for cenain IUXllty items such as candy, fruit. or cigarettes. This fondness provides the interrogator with a posi·
live means of rewarding the EPW or detainee for
cooperation and trutbfulness. as he may give or withhold sucb comfort Jtcms at his discretion. Caution must
be used when employing this technique beca~

52

si

e. Any pressure applied in this manner must Dot
amount to a denial ot basic human needs under
any circumstances. (NOTE: lJ'Ilerrogatol$. may not
Withhold a soura:', rights under tbe GPW, but
they can wilhlJoJd a source's privileges.] Granting
incentives must not infringe on these righlS, but·
they caD be things to which the source is already
entitled. This can be effective only if the source is
unaware of his rights or privileges.

wi

.TI
tb
m.

.ot
th

de
co

• The EPW or detainee might be templed to provide
false or inaccurate information to gain the desired
luxury item or to &top the interrogation,

an·
ITe

The GPW, Article 41, reqUires the posting of the convention contents in the EPW's own language, This 15 an

po
un
tht

MP responsibility.
Incentives must seem to be logical and possible. An
interrogator must not promise anything lhat cannot be
delivered. Interrogators do not make promises, but
usually infer them while sidestepping guarantees.
For eu.mple, it an interrogator made a promise he
could not keep and he or another interrogator had to
talk witb the source again, the source would not have
any trust and would probably not cooperate. Instead or
clearly promising a certain thing, such as political
asylum, an interrogator 9o'lU offer to do what he can to
help achieve the source's desired goa); as long as the
source cooperates.
As with developing rapport. the incentive approach
can be broken down into two inl:entives. The determination rests on wben the source expects (0 receive the
incentive offered.

at

'

lUr

1
apf
on

ces
dir'
ob;
rog
do'
cba

7
end

rogr
erne

• Short term-s-recelved immediately; for example,
letter home,seeing wounded buddies.
• Long term-received 'tIIlthin a period
example, political asylum.

pre

corr

[he:

time, for '.

5i

teml
rnus

Emotlona' Approach

Through EPW or detataee observation, the inter- .{
rogator caD often jd~nliIy dominant emotions \IIhich
motivate. The mot~tb1g emotion may be greed. love, ~':
bate, revenge, or others, The interrogator employs ver-

t

i·

.t,~
~. ,

1-14

b

E

obje
emo

If
for t

JUN-22-2004

11:07

DOD GENERHL CUUNScL

:; ~.::}.~)"

FM 34-52

.: ..~ t;fJ<·
.
('~"r""'" ,

:\. ";::;;:;'.1, and emotional ruses in applying pressure to tbe
~11$.:pw's or detainee's dominant emotions.

;~:

'::.! . ~~;~j~;.one major advantage of this technique is it is ver:f:: .2'~~t~iie .and all?~ the interro~a[or to use the same basic
';: ~'"~~ttUJItIOD positively and negslJvely.

;' .f'

'Por example, this technique can be used on the EPW
*~i:'~~~ has a great love for his unit and fell~w soldi~rs.

;:'

;:~'~e

,

interrogator may take advantage of thIS by telling

. );;if:1:~U;e EPW that by providing pertinent information, he

'~/ !j£i·~,may. shorten the war or battle in progress and save many

:~ :::;y~;X~~f' his comrades' lives, but hiS refusal to 1.81k may cause

: '.Ii~~\;~~eir deaths. This places file burden on the EPW or
" ,:, . ~~tZ!;aiLainee and may motivate him to seek relief through
t

,{/~:t.\

I

•

•

•

.: . ~!!Y~/cooperanon.
"~ !>{hr,.~

..'. ~1i(·

.

Conversely, (his technique can also be used on the
.: ;. (~~~.):$PW or detainee who bates h~ unlt because it withdrew
: '\~it'~nd left him to be captured, or who feels be was unfairJy
.':::;·:!'treated in his unit. In such cases; the interrogator can
~: ..point out that if the EPW cooperates and specifies the
:;\: unit'S location, the unit can be destroyed, tbus giving
.:f.?thC EPW an opportunity for revenge. The interrogator
,:'::;;. proceeds \lIith this method in a very formal manner.
.~J.\f II

.•.~' :.
." i·

I

This approach is likely to be effective with the imIna-

lure and timid EPW.

.<"" Emotional Loy~ Approacb. For the emotional love
. , approach to be successful, tbe interrogator must focus
on the anxiety felt by the source about lhe circumstuces in which be finds himself. The Interrogator must
direct the Jove the source feels toward the appropriate
object: family, homeland, or comrades. If the interrogator can show the source what the source himself caD
do to alter or improve his situation, the approach has a
chance of success,

1
t
f

1

!
!
\

ThiS approach usually Invoives some incentive such as

communication with the source's family or a quicker

end to the war to save his comrades' lives. A good interrogator will usually orchestrate some futility with an
emotional love approach to hasten the source's reaching
the breaking point,
Sincerity and conviction are critical in a successful atlove approach as the Interrogator
must show genuine concern for the source, and for the
Object at which the interrogator is direcling the source's
emotion.
tempt at an emotional

If the interrogator ascertains lhe source has great love
for his unit and fellow soldiers, the Interrogator can

er·

i
f

!

I

L

fectively exploit tbe 5ituation. This places a burden OD
the source and may motivate him to seek relief through
cooperation with tbe interrogator.
Emotional Hate ~proacb. Thet emotional bate approach focuses on any genuine hate"or possibly a deslre
for revenge, the source may ted. Thb interrogator must
ascertain exactly what it is the source may bate so the
emotion can be exploited to O'Ierride the source's ratioDal side. The source may have negative feelings
about ~ country's regime, immediate superiors, of.
ficers in general, or reuow soldiers.

This approach is usually most effective on members
of racial or religious minorities who have suffered dis.
crimination in mllitaJ}' and civilian life. H a source feels
he bas been treated unfairly i1I his unit, the interrogator
can point out tbat, it the source cooperates and dtvulges
the location ot tbat unit, the unit can be destroyed, thus
affording the source revenge.
By using a conspJraloriaJ tone of voice, the interrogator can enhance the value of this technique.
Phrases, such as "You owe them
loyalty for the wfl'J
they treated you,~ when used appropriately, can expedite
tbe success of this technique.

no

Do not immediately begi .. to berate a certain facet of
the source', background or lite unti! your assessmene ladicates the source feels a negative emotion toward it.
The emotional hate approach can be lUed more effectively by drawing out tbe soeree's negative emotioDS
with questions that elicit a tbought-provoldng response.
For example, "Why do you think they allowed you to be
captured?" or "Why do you think tbey left you to die?"
Do not berate the source's forces or homeland unless
certain negative emotions surface.

Many sources may have great Jove for their (Dun ny,
but may bate the regime in control. The emotional bate
approach is most errecti~ witb the immature or timid
source who may have no opportunity up to tbJs point
for revenge, or never hael the courage (0 voice his feeling$.
Fe.r-Up Approach

The fear-up approach is the exploitation of 8 source's
preexisting fear during the period of capture and Interrogation. The approach works best willi young, inexpenenced sources, or sources who exhibit a greater than
normal amount of fear or nervousness. A source's fear
may be justiJied OT unjustified. Por example, a source
who bas tommiuecl a war crime may justifiably fear
3-15

JUN-22-2004

11:07

UUU

u~NCKHL

~UUN~CL

...
..,.

FM 34·52

prosecution al14 punisbmenL By contrast, a source who
has been indoctrinated by enemy propaganda may unjustifiably fear that be will suffer torture or death in our
hands if captured.

This approach bas the greatest potential· to violate
(he law of war. Great care must be taken to avoid
threatening or coercing a source which is in violation of
the GPW, Article 17.

It is critical tbe interrogator distinguish what the
Source fears in order to exploit that fear. The way in
which the interrogator exploilS the source's fear
depends on whether tbe source's fear is justified Dr unjustified.
Fear-Up (Harsb). In this approach. [he Interrogator
behaves in an overpowering manner, with a lOUd and
threatening voice. The interrogator may even feel the
need to throw Objects across the room t(t'-'beighten the
source's implanted feelings of fear. Great care must be
taken when doing this so any acrions would not violate
the prohibition on coercion and threats containe4 in the
GPW. Article 17.
This technique is to convince tbe source be does in-

deed have something to fear; that he has no option but
to cooperate. A good interrogator will implant in the
source's mind that the interrogator himself is Dot the
object to be feared. but is a possible way out of the trap.

Use the confirmation of fear only on sources whose
fear is justified.. During this approach, confirm to the
SOUTce that he does indeed have a legitimate (ear. Then
convince tbe source that you are the source's best or
only hope in avoiding or mitigating tbe object of his
(ear, such as punishment for his crimes.

You must take great c::are to avoid promising actioDi
that are Dol in your power to grant, For example. if the
source has committed a war crime, intonn the source
that the crime has been reported to the appropriate
authorirles and that action is pendjn,. Next inform the
iource that, if he cooperates and tells the truth, you will
'eport that he cooperated and told the truth to the apircpriare authorities. You may add that you will also
eport his lack of cooperation. You may not promise
hat the charges againsr him will be dismissed because
011 have no authority to d~miss tile charges.

Few.Up (MWU- 'This approach is better suited to tbe
trong, confident typ( of interrogator; there is generally
o"necd to raise the voice or resort to heavy-handed.
lble~banging.

.

., .. .

For example, capture may be I result of coincidenee:--tbe soldier was caught on the wrong side of
the border before hostilities actually commenced (he
was armed. he CDuJd be a terrorist)--or as a result of his
actions (he surrendered contrary to his military oath
and fa now a traitor to his country, and his forces will
tab care of the disciplinat}' action).
The fear-up (mild) approach must be credible.
usually invo~ some logical incentive.

It

-~\

,

.te Ie

enol

Ifthl
usua

n
fear
actio

aJPpl

io.r<

In most cases, a loud voice is not necessary. The ac-

SOliI'

tual [ear is increased by helping the source realize the
unpleasant consequences the factS may cause and by
prc.senting an alternative. which. of course, can be
brought about by answering some simple queslions.

Ie,citi

The fear-up (harsh) approach is usually a dead end.
and a wise interrogator may want to keep it in reserve as
a (rump card. Af:ter working to increase the source's
fear. it would be difficult to convince him everything will
be all right if the approach is not successful.

Fe.r-Down Approach
This technique is nolbing more than calming the
source and convincing him be will be properly and
humanely treated, or teDing him the war for him is mercifully over and ~e' need not go into combat apln.
When used with a soothing, calm tone or voice, this
often creates rapport and .usually nothing else is needed
to get thesource to cooperate.

WhJle calming the source, it is a good idea 10 stay ini~
tlally Witb Donpertinent conversation and to avoid lbe
subject which has caused the source's fear. This works
quickly in developing rappen aDd QDmmunication, as
the source will readily respond to kindness.
When usin, [his approach, it is important the interrogator relate to the source at his perspective level and
DOl expect the source to come up to the interrogator's
leYel.
If the EPW or detainee is so frightened he has
withdrawn into a sheD or regressed to a less threatening
state of mind. the interrogator must break throup to
him. The interrogator can do this by putting himself on
(be same physicallcvel as the source; this may requ!re
some physical cootaa. As the source relaxes and begms
to respond to kindness, the intenogatoT can begin asking
pertinent quesuees,
This approaq. technique may backfire if allowed to

go too far. After a>nvincing the source he has nothing

~OJ

toa

red..
is tbl

direc
bew,

.torrn

n
binCl
sour.
tiall)
his I.
vina

mgc

n
into
ing t
weal
defi(
gl1~

this 1

n
Imp'

souro
Old)

othe
the c
coujl

river

n

ques
tioll·
vindJ
ODe,

DUU

u~N~~HL

~UUN~CL

. !.'., ':<~ ;J~'.'

.:i;~\~),: .:

~i(~u~'

,~

FM 34-52

;:i~~JeaT, be may cease to be afraid and may feel secure
,\\·bugll to resist the interrogators pertinent question.
, ":this occurs, reverting to a harsher approach technique
"ally will bring the desired result quickly_
"~v

:, ,: ~the fear-down approach works best if the source's
~.. \J:·.,~r is unjustified. During this approach, take specific
,~;·~/;~~tions to reduce the source's unjllSutied feat. For ex:1~:~~fPle. if the SOUTce believes that he wiD be abused lVhile
r:~?iJ9. your custody, make extra etIort5 to ~nsure thaI the
is
foT. fed, and appropnately treated.

J,·.2i:W"ce weU cared

l;.;:~.,~:,:,aonce the source is convinced that he has no
:t~;:!~~timate reason to ~ear you, he ~ill be more inclined
·t 2{~6 cooperare. The interrogator IS under no dury to
;: !i';::ieduce a source's unjustified fear. The, oDly prohibition
~ .r,. (~that the interrogator may not say or do anything thin
'.:. ,:~jrectly or indirectly communicates to the source: tbat
, .f!'1te will be harmed unless he provid~ the requested ill:.~1.fformatjon.
"l'r'

u.i\,\'.

:~~(

These appliCiitions of the fear approach may be comFor example. if 8
')sourc.e
has
justified
and
unjustitJed
fears,
you may jnj,;;e
',~1~ti8JIy reduce the source's unfounded rears, then confirm
J:,his legitimate fears. Again, the source sbould be COD.;~,vin~ the interrogator is his b~t or only hope in avoid::; ing or mitiga ling the object of his fear.
.~: bined to achieve the desired effect.

','

Pride and Ego Approach
The strategy of this approach is to trick the source
revealing desired information by goading or flattering him. It is effective with sources who have displayed
~ : weakness or feelings of inferiority. A real or imaginal)'
~
deficiency voiced about the source, loyalty to hiS orf)
gamzation, or any other feature can provide a basis for
this technique.
, intO

,

I

'
II .
I

!
t,

The interrogator accuses tbe source of weakness or
implies be is unable to do a certain thing. This type of
source is also prone to excuses and reasons why be did
OT did DOt do a certain thing, often shJfting Ihe blame to
others. An example is opening the interrogation with
the question, "Why did you surrender so easily when you
could have escaped by crossing the nearby ford in the
river?"
The source is likely to provide a basis for further
questions or to reveal signilianf inteUigence informa~
tion if he attempts to explain his surrender in order to
vindicate himself. He may give an answer such as, "No
one could cross the ford because il is mined,"

This technique can also be employed in another manner-by fianering the source into admitting certain information in order to gain credit Fqr example, while
iDlerrogati~g a suspected saboteur, ,Ihe interrogator

states; "'I'lm \VaS a smooth operation. I have seen many
previous attempts fail. 1 bet you planned Ihis. Who el&e
but a clever person like you would have planned it?
When did you first decide [0 do the job?This tc:ebnique is espeeiaUy effective with the source
who has bun looked down upon by his superiors. The
source has the opportunity 10 show someone be is intelligent.

A problem wilh the pride and ego approach is it relics
on trickery, The source Vo'iII eventuaUy realize he has
bun tricked and may refuse to cooperate funher. If this
occurs, the interrogator can easily move into a fear-up
approach and convince the source the questions he bu
already answered have committed him, and it would be
useless to resist furlber.
The interrogator can mention it will be reponed to
the source's forces that he has cooperated tully witla the
enemy,...m be co~idere4 a traitor, and has much to rear
if he is returned to his forces.
This may even offer the interrogator the option to go
into a love-of-family approach Where the source must
protect his family by preventing hia CoraS from learning
of his duplidry or collaboration. Telling the SOurce you
will nor report that he talked or (bat he was a severe discipline problem i5 an incenli'/e that may enhance the effecti~eness of the apJ)roach.
Pride and flO-Up ApproICb This apprbacb is most
effective on sources with UUle or DO intelligence, or
tbose who bave been looked down upon for a long rime.
II is very effective on low-ranking enlisted personnel
and junior grade officers, as it allows the source to finally show someone be does indeed have some "brains.•

on

The source is constantly Banered Into providiJa. eertain information in order to gain credit The interrogator must tate are to use a Dattering
somewhat-in-awe tone of voice, and speak ItigbJy of tbe
source throughout this approach. This quickly prO<luces
positive feelings on the source's pan, as he has probably
been looking fOT this type of remgnidon aU oC his life.
The tnrerrogaror may bloW thln£J out of proportion
using items from the source', background and making
them seem notewonhy or important. Aa everyone is
eager to hear praise. the source wiJJ eventuaJJy reveal

3-17

FM 34-52

pertinent information to solicit more laudalory comments from the interrogator.

tabJisb a different type of rapport witbout losing aIJ
credibility.

. Effective targets for II successful pride and ego-up approach are usually the sociaUy accepted reasons tor flattery, s1Jch as appearance and good miliwy bearing. The
interrogator should closely walcb the SOUfCe'S demeanor
tor indications the approach is working. Some indiations to look for are-

Futility
In tbis approach, [he interrogator convinces the
th~t resistance to questioning .is futile. Wben
employing this technique, the interrogator must have
factual information.
facts are presented by the interrogator in a persuasive, logical manner. He should
be aware of and able to exploit the source's psycbologtcal and moral weamesses t II wen as weaknesses inberent in his society.

source

These

• Raising of the head.
• A look of pride in the eyes.
• Swelling of the chest,

The futility approach is effective wheb the interrogator can play on doubts that already ellist in the
source', mind, There are ditferent variations of the
futility approach. For example:

• Stiffening of the back.
Pride and E~Q-Down APproach. This approach is
based on attacking the source's sense-of personal wortb.
Any source who shows any real or ima~ed inferiority
or weakness about himself, loyalty to hiS organization,
or captured under embarrassing circumstances, can be
easily broken with thiS approach technique.

• Futility of tbe personal situation-wyou are not
finished here until you answer the questions."

• Futility in tbar "everyone talla sooner or later,"
• Futility of the battlefield situation_

The objective is for tbe Interrcgatcr to pounce on the
source's sense of pride by atlackin,e his loyalty, intelligence, abilities, leadership quaUtie.t, slovenly appearance, or any other perceived weakness. This will
usually goad the source into becoming detensive, and he
will try to convince the Interrogator he is 'MTong. In bis
attempt to redeem his pride, the source will usuaUy involuntarily provide pertinent information in anemptine
to vindicate himself

• Futility in the sense if tbe source does not mind
talking about histoJY, why should be mind lalking
about lIis missions, they are also history.
If the source's umt had run out of supplies (ammunition, fOOd. or fuel), it would be somewhat easy to convince him all of his Cora:.s are baving tbe same logistical
problems. A soldier who has been ambushed may have
doubts as to how he was atlacked so suddenly. The interrogator should be able to talk him into believing tbat
the intetro,ator's forces knew of the EPW's unit location, as ,...~u as manymore unitJ.

A source susceptible to tbis approach is also prone to
make excuses and give reasons why be did or ~id not do
a certain thing, often shlfting tbe blame to others. If the
interrogator uses a sarcastic, caustic tone of voice 9'ith
appropriate expressions of distaste or disgust, the
source wjIJ readily believe him. Possible targets for the
pride 3nd ego-down approach are the seurce's->

Theinrerrogator might describe the sourtZ', frigJueDing rec:oUections of seeing deatb on the battlefield as an
eveJYdayoccurrence tor his forc:es. Factual or seemingly
factual information must be presented in a persuasive,
logical manner, and in a matter-of-fact tone of voice.

• Loyalty.

• Soldierly qualities.

• Appearance.
The pride and ego-dawn approach is also a dead end
n that, if unsuccessful, it is difficult for the Interrogator
o recover and .move to another approach and rees-

(

I

is cooperating with the interTQgator. When employing ~;
this technique, the interrogator must not only have rae- .,
tual information but also be aware of and exploit the.:.
source's psychological, moral, and sociological wea1c- .:

nesses.
'.1

Another way 01 using the futiUty approach is 10 blow :i~:
things out of proportion. U the source's unit was I~ .'~~~
on. or had exhausted, aU food supplies. he can be easily ~.
/

-18

I

I

Making the situation appear hopeleM allows tbe
source to rationalize his actions, especially if that aeLioD "

• Technical competence.
• Leadership abilities,

-,'

I.

C

-

'r
1

a
n

JUN-22-2004

11:09

VUV

u~NcKHL

~UUN~CL

2~f~~i

FM 34-52

I·tt~·lh~.
~'f~~••

>OJ I·,

to believe aU or his forces bad run out of food. If the
is hinging on ccoperarlng, it may aid the Inter. . :·1:T.ogation effort jf he is told all the other source's have
d:·Wone.ra ted.

~;';:11ed

~;r, ~

...'

'.::~source

r.

r:

;'): ; The futiliry approach must be orchestrated with other
',~
t?approach techniques (for exampJe, love of comrades).
:,:' ..i4,'J~ source who may '¥ant to help &a~ his comrades'lives
",t .:::i"q~,JnaY be convinced the battlefield situation is hopejess
..i i.~.t,and they will die without his assistance,
'i~~"

'"

~: ;~~il';f.

The futility approach is used to paint a bleak picture

.:A:f!ft~ (~r tbe prisoner, but it is not effective in and of itself in

:' ,',,.r;\"~ gaining tbe source's cooperation.
~·;i~;:.l:

;i.· 'f<'
·It.,\
. . ".
:. ':',

.

We KnowAll
. approach may b
l eoyd In
. conJUJlClJOD
.
Thl!
e emp

•h
WJt

... the -tile and dossier- technique (discussed below) or by

J;:1i.~~' itself. U used alone, the interrogaror must first become

, "{:tf~·.,

thoroughly familiar 90ith avaiJable data concerning the
source. ,To begin the interrogation, the interrogator
:.r~. asks questions based OD this known data. Wben the
')}?'~i;; :soura: ~esitatesJ refuses to answer, or provides a.n incor. . . fl;,;i .reer ,or Incomplete reply, the interrogator provides the

: i~!~;::

..

. ~~: ,detailed answer.
"'~~'
When the source begins to give accurate and com; ~~~: plete Informadon, the interrogator inlerjects questions
~!,~: designed 10 gain the needed information. Questions to
, ~r}r \which answers are already knOWD are also asked to test
,:::;(.the source's truthfulness and to maintain the d~ption
, .-;. that the information is already known. By repealing tJW
,
procedure, the interrogator convinces the source that
resistance is useless as everything is already know;n.

:, ')t{ "

.

the

After gaining tbe source's cooperation,
interrogator still tests the extent ot cooperation by periodically using questions 10 which he has the aD5WClSj
this is vel)' necessary. If the interrogator does not challenge the source when he is )ying, the source will know
evel)'thing is not known. and he has been tricked. He
may then provide incorrect 8mwen to the intenogators
questions,

,.
~

"

f

r

There are some inherent problems with the use of the
OIwe know all' approach. The interrogator is required to
prepare everythlng in detail. whi~ is time consuming.
He must commit much ot the information to memory,
as working from notes may show the Untig of tbe information actually known.

File

and D088ler

The tile and dossier approach ia 1I5ed when the Iaterrogator prepares a dossier coDtai'ling aU available information obtained from documents Qlncernin& the source
or his 0FJanizatiOD.
Careful ;arrangement of the
material WIthin the
may give the illusion it contains
more data tban aettlally there. The file may be padded
with extra paper, if necessal)'. Index tabs with titles such
as education, employment, criminal record, military setvice, and others are particularly effective•

me

The interrogator tonfroolS the source with the dossiers at the beginning of the interrogation and explaina
intelligence haA provided a complete record of every significant bappening in the source's life; therefore, it
\'would be useless to resist. The interrogator may read a
few selected bits of known data to funber impress the
source.
If the technique is successful, the source: will be in:'
timidated by the size of the me, conclude everything is
known, and resign himself to complete cooperation.
The success of this technique is largely dependent OD
[he naivete of [be source, volume of data on the subject•
and sIeHl ot the interrogator in convincing the source.

Eatabllah Your Identity
This approach is especially adaptable to interrogation, The interrogator insists the source has been correclly identified as aft infamous individual wanted by
higher alJthoritia Oil serious charges, and be is not t!le
person he purports 10 be, In an effort to clear himself or
this allegation, the source makes a genuine and detailed
effort to establiSh or substantiau: his true identity. In so
doing, be may provide the Interrogater lJIIith information
and leads for further development,
The -establish your identity" approach was effective in
Coni and in OPERATIONS

Viet N8.Q1 witb the Viet

JUSTCAUSE and DESERTSTORM.
This approach can be used at tactical echelons, The
interrogator must be aware jf it is used in conjunction
witb the file and dossier appr08cl1, as it may exceed the
tactical interrogators preparation resources,
The interrogator shouJd ini~ially refuse to believe the
source and insist he is the criminal wanted by tbe ambiguous higher authorities. This wiJJ torce lbe source to
give even more detailed information about his unit in
order to convince the interrogator he is who he sa}S he
is. This approach works weU when combined with the
"turility" or "we know
approach.

an·

1

;1

)
j-

l.

3·19

-- _....

-~

......

=M 3...52

Repetition

This approach is used 10 induce cooperation fro~ a
ostile source. In one variation of this approach, the inerrogator listens carefuJIy 10 a sour~'s answer to a
uestion, and then repeats the question and answer
everal limes. He does this with each succeeding ques-

on until the source becomes So thoroughly. bored wilh
ie procedure he answers questions. fully a.nd candidly 10
Itisfy the interrogator and gam relief from the
ionotony of this method.

The repetition technique must be judiciously used. as
will generally be ineffective whe!1 employed against
troverted sources or those having great self-control,
i fact, it may provide an opportuni~ for a s~urce to
gain his composure and delay the mterrogauon, In
is approach. the use of more than one_ interrogator or
rape recorder has proven'effective.
.

Rapid Fire

This approach involves a psychological ploy based
on the principles that-

• Everyone likes to be heard when he speaks.

• It is contusing to be interrupted in mid-sentence
with an unrelated question.
.

Fhis approach may be used by one or simultaneously
two or more interrogators in questioning the same
iree. In employing this technique, the interrogator
s a series of questions in such a manner that the
rce does not have time to answer a question eomtely before the next on~ is asked.

'his contuses the source and he will tend to conlict himself. as he has nnte ume to formulate his
....ers, The interrogator then confronts the source
I the inconsistencies causing furt~er contradictions.

many instances, the source will begin to talk freely
an attempt to explain himself and deny the
rrogator's claims of inconsistencies. In this attempt,
source is likely to reveal more than be intends, thus
ting additional leads for further expJoit2tioli. This
'oach may be orchestrated with the pride Bnd egon or fear-up approaches.

I

Besides extensive preparation, tbis approach requires
experienced and competent interrogator. with comprehensive case knowledge and fluency in the source's
language.

an

Silent
This approach may be successful when used agaiD.'lt
the nervous or confident source. When employing this
technique, tile interrogator says nothing to the source,
but looks him squarely in the eye, preferably with a
slight smile OD bis face. It is Important not to look aMy
from the source but force him to break eye contact first.
The source may become nervous. begin to shift in bi!
chair, cross and recross his legs, and Jook away. He may
ask questions, but the interrogator should not answer
until be is ready to break tbe silence. The source may
blun out questions such as, ·Come on now, what do you
want with me?"
When the interrogator is ready 'to break silence. he
may do so with some nonchalant questioD& sucb as,
·You planned this operation (or a long time, didn't you?
Was it your idea?" The interrogator must be patient
when using this technique. It may appear the technique
is not succeeding, but usually will when given a
reasonable chance.

Change of Scene
The idea in using this approach is to gel the source
al"ay froID the atmosphere ot an interrogation room or
setting. If the interrogator confronts a source who is apprehensive or frightened because of the interrogation
environment, this technique may prove effective.

In some circumstances, the interrogator may be able
to invite the source to a different sellin, for coUee and
pleasaat conversation, During the conversation in tlUi
more relaxed environment, tbe interrogator steers tbe
conversation to the topic of Interest, Througb this
somewhat indirect method, he attempts to elicit tbe
desired information. The source may never realize be is
being Interrogated,
Another example in this approach is an interrogat~r
as a compound guard and engages the s?urce 10
conversation, thus eliciting the desired information.

poses

QUESTIONING PHASE

.e interrogation effon has two primary goals: To
n information and to report it Developing and

; good questioning techniques enable the inter-

rogator to obtain accurate and pertinent information by
tollO\lling a logical s~uence.