FEAR APPROACH
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
06684582
Release Decision:
RIPPUB
Original Classification:
U
Document Page Count:
3
Document Creation Date:
December 28, 2022
Document Release Date:
October 12, 2017
Sequence Number:
Case Number:
F-2017-01552
Publication Date:
July 7, 2015
File:
Attachment | Size |
---|---|
![]() | 115.54 KB |
Body:
Fear Approach- Intellipedia
Approved for Release: 2017/10/11 C06684582
(IMFOU0) Fear Approach
UNCLASSIFIED
From 1ntellipedia
You have new messages (last change).
Interragators can use fear in a number of ways to get sources to give him information.
Contents
� 1 Increased Fear Up Approach
� 1.1 Fear Up (Harsh) Approach
� 1.2 Fear Up (Mild) Approach
� 2 Decreased Fear Down Approach
Increased Fear Up Approach
"
The increased fear up approach is most effective on the younger and more inexperienced source or on a
source who appears nervous or frightened. It is also effective on a source who appears to be the silent,
confident type. Sources with something to hide, such as the commission of a war crime, or having
surrendered while still having ammunition in his weapon, or breaking his military oath are particularly easy
to break with this technique. There are two distinct variations of this approach: the Fear Up Harsh
Approach and the Fear Up Mild Approach.
Fear Up (Harsh) Approach
In the fear up (harsh) approach, the interrogator behaves in a heavy, overpowering manner with a loud
and threatening voice. The interrogator may even feel the need to throw objects across the room to heighten
the source's implanted feelings of fear. Great care must be taken when doing this so that any actions taken
would not violate the Geneva Conventions. This technique is to convince the source that he does indeed
have something to fear and that he has no option but to cooperate. A good interrogator will implant in the
source's mind that the interrogator himself is not the object to be feared, but is a possible way out of the
trap. The fear can be directed toward reprisals by international tribunals, the government of the host
country, or the source's own forces. Shouting can be very effective in this variation of the fear up approach.
Fear Up (Mild) Approach
The fear up (mild) approach is better suited to the strong, confident type of interrogator as there is
generally no need to raise the voice or resort to heavy-handed, table banging violence. It is a more correct
form of blackmail when the circumstances indicate that the source does indeed have something to fear. It
1 of 3 7/7/2015 10:08 AM
Approved for Release: 2017/10/11 C06684582
4 Approved for Release: 2017/10/11 C06684582
Fear Approach - Intellipeclia
(b)(3)
may be a result of coincidence; the soldier was caught on the wrong side of the border before hostilities
actually commenced (he was armed, he could be a terrorist), or a result of his actions (he surrendered
contrary to his military oath and is now a traitor to his country, and his own forces will take care of the
disciplinary action). The fear up (mild) approach must be a credible distortion of the truth. A distortion that
the source will believe. It usually involves some incentive; the interrogator can intimate that he might be
willing to alter the circumstances of the source's capture, as long as the source cooperates and answers the
questions.
In most cases, shouting is not necessary. The actual fear is increased by helping the source to realize the
unpleasant consequences that the facts may cause and then presenting an alternative, which of course can
be effected by answering some simple questions. The fear up approach is deadend, and a wise interrogator
may want to keep it in reserve as a trump card. After working to increase the source's fear, it would be
difficult to convince him that everything will be all right if the approach is not successful.
Decreased Fear Down Approach
The decreased fear down approach is used primarily on a source who is already in a state of fear due to
the horrible circumstances of his capture, or on a source who is in fear for his life. This technique is really
nothing more than calming the source and convincing him that he will be properly and humanely treated, or
that for him the war is mercifully over and he need not go into combat again. When used with a soothing,
calm tone of voice, this often creates rapport and usually nothing else is needed to get the source to
cooperate. While calming the source, it is a good idea to stay initially with nonpertinent conversation and to
carefully avoid the subject which has caused the source's fear. This works quickly in developing rapport
and communication as the source will readily respond to kindness.
When using this approach, it is important that the interrogator meets the source at the source's perspective
'level and not expect the source to come up to the interrogator's perspective level. If a prisoner is so
frightened that he has withdrawn into a shell or regressed back to a less threatening state of mind, the
interrogator must break through to him. This may be effected by the interrogator putting himself on the -
same physical level as the source and may require some physical contact. As the source relaxes somewhat
and begins to respond to the interrogator's kindness, the interrogator can then begin asking pertinent
questions.
This approach technique may backfire if allowed to go too far. After convincing the source that he has
nothing to fear, he may cease to be afraid and may feel secure enough to resist the interrogator's pertinent
questions. If this occurs, reverting to a harsher approach technique usually will rapidly bring the desired
result to the interrogator.
Retrieved from
Categories: Intelligence Terms and Definitions I Interrogation Techniques
UNCLASSIFIED
� This page has been accessed 703 times
� 2
� This page was last modified 13:10, 29 August 2008 by
(b)(3)
gclinipedweb9j
2 of 3 7/7/2015 10:08 AM
Approved for Release: 2017/10/11 C06684582
Fear Approach - Intellipedia
Approved for Release: 2017/10/11 C06684582
(b)(3)
Use of this US. Government system, authorized or unauthorized, constitutes consent to monitoring of this system. Unauthorized use may subject you to
criminal prosecution.
Evidence of unauthorized use collected during monitoring may be usecifor administrative, criminal, or other adverse actions.
.This page contains dynamic content-- Highest Possible Classification Is TOP SECRETUSUTKUNOFORN
3 of 3 7/7/2015 10:08 AM
Approved for Release: 2017/10/11 C06684582