INTERROGATION OPERATIONS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
06684579
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
3
Document Creation Date: 
December 28, 2022
Document Release Date: 
October 12, 2017
Sequence Number: 
Case Number: 
F-2017-01552
Publication Date: 
July 7, 2015
File: 
Body: 
Interrogation Operations - Intellipedia Approved for Release: 2017/10/11 C06684579 (b)(3) (U) Interrogation Operations From Intellipedia Contents � 1 (U) Introduction to HUMINT Interrogation Operations � 1.1(U) Define Human Intelligence � 1.2 (U) Define Interrogation � 2 (U) Approved Interrogation Approaches � 2.1(U) 1. Direct Approach - � 2.2 (U) 2. Incentive Approach - � 2.3 (U) Emotional Approaches - � 2.4 Only with Unlawful Combatants � 2.5 Special Approval Needed � 3 (U) Approach Strategies � 4 (U) Types of Interrogation Operations � 5 (U) Interrogation Training Opportunities � 6 References (U) Introduction to HUMINT Interrogation Operations (U) HUMINT interrogation operations is part of the HUMINT collection process, which deals with many elements from Human Source Operations to interrogations of detainees, enemy prisoners of war, unlawful enemy combatants... (U) HUMINT interrogation is the systematic process of using approved interrogation approaches to question a captured or detained person to obtain reliable information to satisfy intelligence requirements, consistent with applicable law and policy.111 (U) Define Human Intelligence (U) Human Intelligence (HUMINT) The collection by a trained HUMINT collector of foreign information from people and multimedia to identify elements, intentions, composition, strength, dispositions, tactics, equip- ment, and capabilities.I21 �(U) Define Interrogation (U) Approved Interrogation Approaches (U) I. Direct Approach - I of 3 7/7/2015 9:44 AM Approved for Release: 2017/10/11 C06684579 Approved for Release: 2017/10/11 C06684579 � Interrogation Operations - Intellipedia (b)(3) (U) 2. Incentive Approach - (U) Emotional Approaches - � Emotional Love � Emotional Hate � Fear Up � Fear Down � Pride and Ego Up � Pride and Ego Down � Futility � We Know All � File and Dossier � Establish Your Identity � Repetition � Rapid Fire � Silence � Change of Scenery Only with Unlawful Combatants � Mutt and Jeff{31 � False Flag Special Approval Needed � Separation (U) Approach Strategies Approach strategies are as varied as there are interrogators. While working within the applicable laws and doctrine, each interrogator constructs a strategy that is unique to a specific detainee based on but not limited to factors such as circumstances of capture, captured documents, timescale of detention before a decision needs to be reached about retain or release of the detainee, number of other detainees captured and information produced from them thus far and PIR and IR for the given Area of Operations. Also, the interrogator's level of experience and knowledge of the culture of the detainee play a large part in the effectiveness of any approach strategy. (U) Types of Interrogation Operations (U) Interrogation Training Opportunities (U) 35M10, which is offerred to Army personnel at Ft. Huachucha, AZ; Ft. Devens, MA; Camp Williams, UT; (U) Interrogation Refresher Course: is a 2 week resident course, taught at Western Army Reserve Intelligence Support Center. This course is also part of MI Foundry Training (U) Joint Interrogation... 2 of 3 7/7/2015 9:44 AM Approved for Release: 2017/10/11 C06684579 ' Interrogation Operations - Intellipedia Approved for Release: 2017/10/11 C06684579 (b)(3) References I. I FM 2-22.3 Human Intelligence Collector Operations. 2. T IM 2-U intelligence 3- 1 MNF-I Policy 07-01 FM 2-22.3 Retrieved from Category: HUMiN I Classified By: Derived From. Declassify On: December 9, 2035 SE � This page has been accessed 1,189 times. � 3 witching users � This page was last modified 18:16, 9 December 2010 by (b)(6) Most recent editors: 1in1pedweb8s Use of this U.S. Government system, authorized or unauthorized, constitutes consent to monitoring of this system. Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative. criminal. or other adverse actions. This page contains dynamic content � Highest Possible Classification is-8e6RETAVAORN (b)(3) (b)(3) (b)(6) 3 of 3 Approved for Release: 2017/10/11 C06684579 7/7/2015 9:44 AM