This approach works well when combined with the futility or "we know all" approach. The futility … It is important not to look away from the source, but force him to break eye contact first. The direct approach usually achieves the maximum cooperation in the minimum amount of time and enables the interrogator to quickly and completely exploit the source for the information he possesses. Another way of using the futility approach is to blow things out of proportion. Key to Table — No reference to this specific technique. assessment indicates that the source feels a negative emotion toward it. “I say nothing goes better with the Beatles than a good beating,” joked Stephen Colbert as he introduced the theme of his show last night–music as torture. The Reid Technique is one of the primary interrogation techniques used by the police. In one variation of this technique the interrogator listens carefully to a source's answer to a question, and then repeats both the question and answer several times. After details emerged regarding the U.S. military’s use of torture during the Iraqi War, common methods of physical torture, including “waterboarding,” hooding, and physical abuse, came under immense national and global scrutiny. It is a very successful approach for sources who are naive, in a state of shock, or in a state of fear. The source may have negative feelings about his country's regime, his immediate superiors, officers in general, or his fellow soldiers. There is the futility of the personal situation "you are not finished here until you answer the questions," futility in that "everyone talks sooner or later," futility of the battlefield situation, and futility in the sense that if the source does not mind talking about history, why should he mind talking about his missions, they are also history. Index tabs with titles such as education, employment, criminal record, military service, and others are particularly effective."[2]. Repetition is used to induce cooperation from a hostile source. In January 2004, prompted by the notorious abuse photos, Lt. Gen. Ricardo Sanchez asked Maj. Gen. Antonio M. Taguba to conduct a secret investigation into allegations of detainee abuse and escapes at Abu Ghraib and lapses in accountability among the 800th Military Police (MP) Brigade. Incentives must seem to be logical and possible. In Vietnam, it was 90 percent to 95 percent effective. Chris Watts interrogation techniques Social Exchange The Futility Technique The Dossier Technique Ego up Technique How and Why Denial The Alternative Question Stopping denials immediately Leading suspect to state of mental exhaustion The "we know all" approach convinces the source that we already know everything. The futility approach is used to make the source believe that it is useless to resist and to persuade him to cooperate with the interrogator. When the source hesitates, refuses to answer, provides an incomplete response, or an incorrect response, the interrogator himself supplies the detailed answer. The interrogator should initially refuse to believe the source and insist that he is the criminal wanted by the ambiguous "higher authorities." There are some inherent problems with the use of the "we know all" approach. The fear up (mild) approach is better suited to the strong, confident type of interrogator as there is generally no need to raise the voice or resort to heavy-handed, table banging violence. Below is a series of Interrogation Techniques approved fro use at Guantanamo Bay. The pride and ego up approach is most effective on sources with little or no intelligence or on those who have been looked down upon for a long time. In the fear up (harsh) approach, the interrogator behaves in a heavy, overpowering manner with a loud and threatening voice. The interrogator may blow things out of proportion using items from the source's background and making them seen noteworthy or important. It is very effective on low ranking enlisted personnel and junior grade officers as it allows the source to finally show someone that he does indeed have some "brains." Through the careful use of the limited number of known details, the interrogator must convince the source that all information is already known; therefore, his answers are of no consequence. The goal of the technique is to make the source feel cut off from his friends. He must commit much of the information to memory as working from notes may show the limits of the information actually known. The subject of the first Special Interrogation Plan was told that his mother and sister were whores. Again, any documents actually shown to the prisoner must seem authentic, so it is most wise to falsify papers in the format of one's own side. attempt to reverse the significance of the suspect's objection and return to the interrogation theme without delay. This page was last modified 14:25, 22 April 2009. As everyone is eager to hear themselves praised, the source will eventually "rise to the occasion" and in an attempt to solicit more laundatory comments from the interrogator, reveal pertinent information. J. In an Establish Your Identity approach, he might point out errors as part of his defense, but that, in and of itself, will give the interrogators knowledge on how better to prepare the next forged document — unless a very sophisticated prisoner is engaging in deliberate disinformation to damage future document-based interrogation methods. This approach technique may backfire if allowed to go too far. There are two distinct variations of this approach: the fear up (harsh) and the fear up (mild). The emotional hate approach can be much more effectively used by drawing out the source's negative emotions with questions that elicit a thought-provoking response. Possible targets for the pride and ego down approach are the source's loyalty, technical competence, leadership abilities, soldierly qualities, or appearance. Was it your idea?" [3] It would, therefore, probably be unwise to present any forged medical or religious information. In fact, the earlier AFM, labeled 35-52 (pdf), was the basis of numerous accusations of documented abuse. A distortion that the source will believe. The interrogator confronts the source with the dossiers at the beginning of the interrogation and explains to,him that intelligence has provided a complete record of every significant happening in the source's life; therefore, it would be useless to resist interrogation. This tends to confuse the source, and he is apt to contradict himself, as he has little time to prepare his answers. Lawfulness of Interrogation Techniques under the Geneva Conventions. The Reid Technique interrogation phase includes nine steps, which are guilt-presumptive ... minimization, intimidation, and situational futility). Use of this technique for more than 30continuous days must be briefed to 205 lh MI BDE Commander prior to This technique may be used by an individual interrogator or simultaneously by two or more interrogators in questioning the same source. The futility approach must be orchestrated with other approach techniques. Custody November 20, 2008 For example, the first interrogator is very formal and displays an unsympathetic attitude toward the source. Do not berate the source's farces or homeland unless you are certain of his negative emotions. FM 34-52 describes multiple techniques for accomplishing the desired effect. Music torture is currently banned by the United National Convention Against Torture, but it is still permitt… An interrogator must not promise anything that cannot be delivered. Futility of Coercive Interrogation Techniques The US military base in Guantanamo Bay, which was used as detention facility and interrogation activities of suspected terrorists apprehended by US sequel to 9/11 attack in 2001 A good interrogator will usually orchestrate some futility with an emotional love approach to hasten the source's reaching the breaking point. In this technique, the interrogator insists that the source has been identified as an infamous criminal wanted by higher authorities on very serious charges, and he has finally been caught posing as someone else. Careful arrangement of the material within the file may give the illusion that it contains more data than what is actually there. The emotional hate approach focuses on any genuine hate, or possibly a desire for revenge, the source may feel. He then apologizes to soothe the source, perhaps offering him coffee and a cigarette. If the interrogator uses a sarcastic, caustic tone of voice with appropriate expressions of distaste or disgust, the source will readily believe him. It's entitled "Appendix M -- Restricted Interrogation Technique -- Separation". The techniques of interrogation The Geneva Conventions protecting POWs and civilians in times of occupation broadly prohibit torture and other inhumane treatment, but also specifically bar coercive interrogations -- the use of inhumane treatment in an attempt to extract information.