FEAR APPROACH

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
06684582
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
3
Document Creation Date: 
December 28, 2022
Document Release Date: 
October 12, 2017
Sequence Number: 
Case Number: 
F-2017-01552
Publication Date: 
July 7, 2015
File: 
AttachmentSize
PDF icon fear approach[15326657].pdf115.54 KB
Body: 
Fear Approach- Intellipedia Approved for Release: 2017/10/11 C06684582 (IMFOU0) Fear Approach UNCLASSIFIED From 1ntellipedia You have new messages (last change). Interragators can use fear in a number of ways to get sources to give him information. Contents � 1 Increased Fear Up Approach � 1.1 Fear Up (Harsh) Approach � 1.2 Fear Up (Mild) Approach � 2 Decreased Fear Down Approach Increased Fear Up Approach " The increased fear up approach is most effective on the younger and more inexperienced source or on a source who appears nervous or frightened. It is also effective on a source who appears to be the silent, confident type. Sources with something to hide, such as the commission of a war crime, or having surrendered while still having ammunition in his weapon, or breaking his military oath are particularly easy to break with this technique. There are two distinct variations of this approach: the Fear Up Harsh Approach and the Fear Up Mild Approach. Fear Up (Harsh) Approach In the fear up (harsh) approach, the interrogator behaves in a heavy, overpowering manner with a loud and threatening voice. The interrogator may even feel the need to throw objects across the room to heighten the source's implanted feelings of fear. Great care must be taken when doing this so that any actions taken would not violate the Geneva Conventions. This technique is to convince the source that he does indeed have something to fear and that he has no option but to cooperate. A good interrogator will implant in the source's mind that the interrogator himself is not the object to be feared, but is a possible way out of the trap. The fear can be directed toward reprisals by international tribunals, the government of the host country, or the source's own forces. Shouting can be very effective in this variation of the fear up approach. Fear Up (Mild) Approach The fear up (mild) approach is better suited to the strong, confident type of interrogator as there is generally no need to raise the voice or resort to heavy-handed, table banging violence. It is a more correct form of blackmail when the circumstances indicate that the source does indeed have something to fear. It 1 of 3 7/7/2015 10:08 AM Approved for Release: 2017/10/11 C06684582 4 Approved for Release: 2017/10/11 C06684582 Fear Approach - Intellipeclia (b)(3) may be a result of coincidence; the soldier was caught on the wrong side of the border before hostilities actually commenced (he was armed, he could be a terrorist), or a result of his actions (he surrendered contrary to his military oath and is now a traitor to his country, and his own forces will take care of the disciplinary action). The fear up (mild) approach must be a credible distortion of the truth. A distortion that the source will believe. It usually involves some incentive; the interrogator can intimate that he might be willing to alter the circumstances of the source's capture, as long as the source cooperates and answers the questions. In most cases, shouting is not necessary. The actual fear is increased by helping the source to realize the unpleasant consequences that the facts may cause and then presenting an alternative, which of course can be effected by answering some simple questions. The fear up approach is deadend, and a wise interrogator may want to keep it in reserve as a trump card. After working to increase the source's fear, it would be difficult to convince him that everything will be all right if the approach is not successful. Decreased Fear Down Approach The decreased fear down approach is used primarily on a source who is already in a state of fear due to the horrible circumstances of his capture, or on a source who is in fear for his life. This technique is really nothing more than calming the source and convincing him that he will be properly and humanely treated, or that for him the war is mercifully over and he need not go into combat again. When used with a soothing, calm tone of voice, this often creates rapport and usually nothing else is needed to get the source to cooperate. While calming the source, it is a good idea to stay initially with nonpertinent conversation and to carefully avoid the subject which has caused the source's fear. This works quickly in developing rapport and communication as the source will readily respond to kindness. When using this approach, it is important that the interrogator meets the source at the source's perspective 'level and not expect the source to come up to the interrogator's perspective level. If a prisoner is so frightened that he has withdrawn into a shell or regressed back to a less threatening state of mind, the interrogator must break through to him. This may be effected by the interrogator putting himself on the - same physical level as the source and may require some physical contact. As the source relaxes somewhat and begins to respond to the interrogator's kindness, the interrogator can then begin asking pertinent questions. This approach technique may backfire if allowed to go too far. After convincing the source that he has nothing to fear, he may cease to be afraid and may feel secure enough to resist the interrogator's pertinent questions. If this occurs, reverting to a harsher approach technique usually will rapidly bring the desired result to the interrogator. Retrieved from Categories: Intelligence Terms and Definitions I Interrogation Techniques UNCLASSIFIED � This page has been accessed 703 times � 2 � This page was last modified 13:10, 29 August 2008 by (b)(3) gclinipedweb9j 2 of 3 7/7/2015 10:08 AM Approved for Release: 2017/10/11 C06684582 Fear Approach - Intellipedia Approved for Release: 2017/10/11 C06684582 (b)(3) Use of this US. Government system, authorized or unauthorized, constitutes consent to monitoring of this system. Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be usecifor administrative, criminal, or other adverse actions. .This page contains dynamic content-- Highest Possible Classification Is TOP SECRETUSUTKUNOFORN 3 of 3 7/7/2015 10:08 AM Approved for Release: 2017/10/11 C06684582