INTERROGATION OPERATIONS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
06684579
Release Decision:
RIPPUB
Original Classification:
U
Document Page Count:
3
Document Creation Date:
December 28, 2022
Document Release Date:
October 12, 2017
Sequence Number:
Case Number:
F-2017-01552
Publication Date:
July 7, 2015
File:
Attachment | Size |
---|---|
![]() | 84.22 KB |
Body:
Interrogation Operations - Intellipedia
Approved for Release: 2017/10/11 C06684579
(b)(3)
(U) Interrogation Operations
From Intellipedia
Contents
� 1 (U) Introduction to HUMINT Interrogation Operations
� 1.1(U) Define Human Intelligence
� 1.2 (U) Define Interrogation
� 2 (U) Approved Interrogation Approaches
� 2.1(U) 1. Direct Approach -
� 2.2 (U) 2. Incentive Approach -
� 2.3 (U) Emotional Approaches -
� 2.4 Only with Unlawful Combatants
� 2.5 Special Approval Needed
� 3 (U) Approach Strategies
� 4 (U) Types of Interrogation Operations
� 5 (U) Interrogation Training Opportunities
� 6 References
(U) Introduction to HUMINT Interrogation Operations
(U) HUMINT interrogation operations is part of the HUMINT collection process, which deals with many
elements from Human Source Operations to interrogations of detainees, enemy prisoners of war, unlawful
enemy combatants... (U) HUMINT interrogation is the systematic process of using approved interrogation
approaches to question a captured or detained person to obtain reliable information to satisfy intelligence
requirements, consistent with applicable law and policy.111
(U) Define Human Intelligence
(U) Human Intelligence (HUMINT) The collection by a trained HUMINT collector of foreign information
from people and multimedia to identify elements, intentions, composition, strength, dispositions, tactics,
equip- ment, and capabilities.I21
�(U) Define Interrogation
(U) Approved Interrogation Approaches
(U) I. Direct Approach -
I of 3 7/7/2015 9:44 AM
Approved for Release: 2017/10/11 C06684579
Approved for Release: 2017/10/11 C06684579
� Interrogation Operations - Intellipedia
(b)(3)
(U) 2. Incentive Approach -
(U) Emotional Approaches -
� Emotional Love
� Emotional Hate
� Fear Up
� Fear Down
� Pride and Ego Up
� Pride and Ego Down
� Futility
� We Know All
� File and Dossier
� Establish Your Identity
� Repetition
� Rapid Fire
� Silence
� Change of Scenery
Only with Unlawful Combatants
� Mutt and Jeff{31
� False Flag
Special Approval Needed
� Separation
(U) Approach Strategies
Approach strategies are as varied as there are interrogators. While working within the applicable laws and
doctrine, each interrogator constructs a strategy that is unique to a specific detainee based on but not
limited to factors such as circumstances of capture, captured documents, timescale of detention before a
decision needs to be reached about retain or release of the detainee, number of other detainees captured and
information produced from them thus far and PIR and IR for the given Area of Operations. Also, the
interrogator's level of experience and knowledge of the culture of the detainee play a large part in the
effectiveness of any approach strategy.
(U) Types of Interrogation Operations
(U) Interrogation Training Opportunities
(U) 35M10, which is offerred to Army personnel at Ft. Huachucha, AZ; Ft. Devens, MA; Camp Williams,
UT; (U) Interrogation Refresher Course: is a 2 week resident course, taught at Western Army Reserve
Intelligence Support Center. This course is also part of MI Foundry Training (U) Joint Interrogation...
2 of 3 7/7/2015 9:44 AM
Approved for Release: 2017/10/11 C06684579
' Interrogation Operations - Intellipedia
Approved for Release: 2017/10/11 C06684579
(b)(3)
References
I. I FM 2-22.3 Human Intelligence Collector Operations.
2. T IM 2-U intelligence
3- 1 MNF-I Policy 07-01
FM 2-22.3
Retrieved from
Category: HUMiN I
Classified By:
Derived From.
Declassify On: December 9, 2035
SE
� This page has been accessed 1,189 times.
� 3 witching users
� This page was last modified 18:16, 9 December 2010 by
(b)(6)
Most recent editors:
1in1pedweb8s
Use of this U.S. Government system, authorized or unauthorized, constitutes consent to monitoring of this system. Unauthorized use may subject you to
criminal prosecution.
Evidence of unauthorized use collected during monitoring may be used for administrative. criminal. or other adverse actions.
This page contains dynamic content � Highest Possible Classification is-8e6RETAVAORN
(b)(3)
(b)(3)
(b)(6)
3 of 3
Approved for Release: 2017/10/11 C06684579
7/7/2015 9:44 AM