FM
stringclasses 43
values | page
int64 1
477
| text
stringlengths 6
8.45k
|
---|---|---|
2-22.3 | 96 | FM 2-22.3 _________________________________________________________________________________
The questioning of PWs shall be carried out in a language they
understand.
No physical or mental torture or any other form of coercion may be
inflicted on EPWs to secure from them information of any kind
whatever. PWs who refuse to answer may not be threatened,
insulted, or exposed to unpleasant or disadvantageous treatment of
any kind.
• Article 18 - All effects and articles of personal use, except arms, horses,
military equipment and documents, shall remain in the possession of
PWs, likewise their metal helmets and protective masks and like
articles issued for personal protection. Effects and articles used for
their clothing or feeding shall also remain in their possession, even if
such effects and articles belong to their regulation military equipment.
Badges of rank and nationality, decorations and articles having
above all a personal or sentimental value may not be taken from
PWs.
Sums of money carried by PWs may not be taken away from them
except by order of an officer, and after the amount and particulars of
the owner have been recorded in a special register and an itemized
receipt has been given, legibly inscribed with the name, rank, and
unit of the person issuing said receipt. (Note: Unit SOP should
require initial impounding of all sums of money from detainees,
properly documented and accounted for, in order to prevent
detainees from using money to buy influence of any kind, or
participate in black market or other improper activity.)
• Article 19 - PWs shall be evacuated, as soon as possible after their
capture, to camps situated in an area far enough from the combat zone
for them to be out of danger. Only those PWs, who, owing to wounds
and sickness, would run greater risks by being evacuated than by
remaining where they are, may be temporarily kept back in a danger
zone.
• Article 33 - Medical personnel and chaplains, while retained by the
Detaining Power with a view to assisting PWs, shall not be considered
as PWs. They shall, however, receive as a minimum, the benefits and
protection of the Geneva Convention. They shall continue to exercise
their medical and spiritual functions for the benefits of PWs.
5-74. All captured or detained personnel, regardless of status, shall
be treated humanely, and in accordance with the Detainee
Treatment Act of 2005 and DOD Directive 2310.1E, “Department of
Defense Detainee Program,” and no person in the custody or under
the control of DOD, regardless of nationality or physical location,
shall be subject to torture or cruel, inhuman, or degrading treatment
or punishment, in accordance with and as defined in US law. All
intelligence interrogations, debriefings, or tactical questioning to gain
intelligence from captured or detained personnel shall be conducted in
accordance with applicable law and policy. Applicable law and policy include
US law; the law of war; relevant international law; relevant directives
including DOD Directive 3115.09, “DOD Intelligence Interrogations,
Detainee Debriefings, and Tactical Questioning”; DOD Directive 2310.1E, |
2-22.3 | 97 | _________________________________________________________________________________FM 2-22.3
“The Department of Defense Detainee Program”; DOD instructions; and
military execute orders including FRAGOs. Use of torture is not only illegal
but also it is a poor technique that yields unreliable results, may damage
subsequent collection efforts, and can induce the source to say what he thinks
the HUMINT collector wants to hear. Use of torture can also have many
possible negative consequences at national and international levels.
Cruel, Inhuman or Degrading Treatment Prohibited
All prisoners and detainees, regardless of status, will be treated humanely. Cruel,
inhuman and degrading treatment is prohibited. The Detainee Treatment Act of 2005
defines “cruel, inhuman or degrading treatment” as the cruel unusual, and inhumane
treatment or punishment prohibited by the Fifth, Eighth, and Fourteenth Amendments to
the U.S. Constitution. This definition refers to an extensive body of law developed by the
courts of the United States to determine when, under various circumstances, treatment of
individuals would be inconsistent with American constitutional standards related to
concepts of dignity, civilization, humanity, decency and fundamental fairness. All DOD
procedures for treatment of prisoners and detainees have been reviewed and are consistent
with these standards, as well as our obligations under international law as interpreted by
the United States.1
Questions about applications not resolved in the field by reference to DOD publications,
must be forwarded to higher headquarters for legal review and specific approval by the
appropriate authority before application.
The following actions will not be approved and cannot be condoned in any circumstances:
forcing an individual to perform or simulate sexual acts or to pose in a sexual manner;
exposing an individual to outrageously lewd and sexually provocative behavior;
intentionally damaging or destroying an individual’s religious articles.
___________________________
1 Nothing in this enclosure should be understood to affect the U.S. obligations under the
law of war.
5-75. If used in conjunction with intelligence interrogations,
prohibited actions include, but are not limited to—
• Forcing the detainee to be naked, perform sexual acts, or pose in a
sexual manner.
• Placing hoods or sacks over the head of a detainee; using duct tape
over the eyes.
• Applying beatings, electric shock, burns, or other forms of physical
pain.
• “Waterboarding.”
• Using military working dogs.
• Inducing hypothermia or heat injury.
• Conducting mock executions.
• Depriving the detainee of necessary food, water, or medical care.
5-76. While using legitimate interrogation techniques, certain applications of
approaches and techniques may approach the line between permissible
actions and prohibited actions. It may often be difficult to determine where |
2-22.3 | 98 | FM 2-22.3 _________________________________________________________________________________
permissible actions end and prohibited actions begin. In attempting to
determine if a contemplated approach or technique should be considered
prohibited, and therefore should not be included in an interrogation plan,
consider these two tests before submitting the plan for approval:
• If the proposed approach technique were used by the enemy against
one of your fellow soldiers, would you believe the soldier had been
abused?
• Could your conduct in carrying out the proposed technique violate a
law or regulation? Keep in mind that even if you personally would not
consider your actions to constitute abuse, the law may be more
restrictive.
5-77. If you answer yes to either of these tests, the contemplated action
should not be conducted. If the HUMINT collector has any doubt that an
interrogation approach contained in an approved interrogation plan is
consistent with applicable law, or if he believes that he is being told to use an
illegal technique, the HUMINT collector should seek immediate guidance
from the chain of command and consult with the SJA to obtain a legal review
of the proposed approach or technique. (See paras 5-80 and 5-81 for
information on responding to illegal orders.) If the HUMINT collector
believes that an interrogation approach or technique is unlawful during the
interrogation of a detainee, the HUMINT collector must stop the
interrogation immediately and contact the chain of command for additional
guidance.
CAUTION: Although no single comprehensive source defines impermissible
coercion, certain acts are clearly prohibited. Certain prohibited physical
coercion may be obvious, such as physically abusing the subject of the
screening or interrogation. Other forms of impermissible coercion may be
more subtle, and may include threats to turn the individual over to others to
be abused; subjecting the individual to impermissible humiliating or
degrading treatment; implying harm to the individual or his property. Other
prohibited actions include implying a deprivation of applicable protections
guaranteed by law because of a failure to cooperate; threatening to separate
parents from their children; or forcing a protected person to guide US forces in
a dangerous area. Where there is doubt, you should consult your supervisor or
servicing judge advocate.
5-78. Security internees are detainees who are not combatants but who pose
a security threat, may be under investigation, or who pose a threat to US
forces if released. HUMINT collectors are required to treat all detainees
humanely. EPWs are entitled to additional protections guaranteed by the
GPW that security internees may not be eligible for. For example, allowing a
security internee to communicate with a family member (a right that an
EPW has under the Geneva Conventions) could allow him to pass
information that would compromise a sensitive investigation and endanger
the lives of soldiers and civilians. HUMINT collectors should consult with
their SJA for clarification of detainees’ status and rights.
5-79. HUMINT collectors are employed below brigade level when the combat
situation requires limited tactical interrogation at battalion or lower. |
2-22.3 | 99 | _________________________________________________________________________________FM 2-22.3
HUMINT collectors should also provide training in the area of tactical
questioning to designated S2 personnel. The potential for abuse of the
detainee is greatest at initial capture and tactical questioning phase. With
the excitement and stress of the battlefield, unskilled personnel may exercise
poor judgment or be careless and thus resort to illegal techniques to elicit
critical information. Personnel who are not trained HUMINT collectors will
not attempt to use approach techniques. Instructions must stress the
importance of the proper treatment of detainees. Emphasize that in addition
to legal requirements, the abuse of a detainee at the initial stage of contact
often renders future interrogation futile. All treatment of detainees must be
consistent with the Geneva Conventions. (See ST 2-91.6 for further
information on tactical questioning.)
5-80. Orders given to treat detainees in any way that violate the Law of War,
including the Geneva Conventions, or that result in detainees being treated
in any prohibited manner are unlawful. Every soldier must know how to
respond to orders that he perceives to be unlawful. If a soldier receives an
order that he knows to be unlawful, or that a person of ordinary sense and
understanding would know to be unlawful, or if the order is not clear enough
to determine if it is legal or not, he should follow the steps set out below
(preferably in the order listed):
• Ask for clarification.
• State that the order is illegal if he knows that it is.
• Use moral arguments against the order.
• State the intent to report the act.
• Ask the senior interrogator to stop the act.
• Report the incident or order if the order is not withdrawn or the act in
question is committed.
• If there appears to be no other recourse, refuse to obey the unlawful
order.
NOTE: If the order is a lawful order, it should be obeyed. Failure to obey a
lawful order is an offense under the UCMJ.
5-81. None of the above actions should be taken in the presence of any
detainee. Witnessing actions taken to determine the legality of an order may
lead to increased resistance of the detainee and could lead to increased
resistance throughout the detainee population if they believe they are being
treated unlawfully.
5-82. Illegal orders or incidents must be reported to the chain of command.
However, if the chain of command itself is implicated, report the incident or
order to the SJA, IG, chaplain, or provost marshal. |
2-22.3 | 100 | FM 2-22.3 _________________________________________________________________________________
OPERATIONAL CONSIDERATIONS AND REQUIREMENTS
EPW Evacuation System
5-83. The MPs are responsible for evacuating detainees, civilian internees,
and other detainees, as stipulated in AR 190-8. HUMINT collection assets
must be placed to take advantage of the evacuation system the MPs will put
into place. The evacuation of detainees and civilian internees normally is a
slow and cumbersome process that can severely tax a maneuver unit’s
resources. Appendix D explains the handling of detainees in detail, including
the 5Ss—Search, Silence, Safeguard, Segregate, and Speed to the Rear. The
5Ss are authorized with respect to handling detainees for the purposes of
movement of detainees and security. The 5Ss are not authorized for use as
interrogation approach techniques.
5-84. The initial evacuation of detainees and civilian internees is the
responsibility of the capturing unit. That unit is normally responsible for
moving the detainees and civilian internees from the point of capture to the
nearest DCP. Under MP doctrine, the MPs are responsible for the detention,
security, processing, safety, well-being, accountability, and humane
treatment of detainees and civilian internees.
5-85. Normally the MPs assume responsibility for the further evacuation of
the detainees and civilian internees; however, under certain circumstances,
other units could be charged with this task. The detainees are normally
evacuated from a DCP to a short-term collection facility and then finally to a
theater internment facility. Once the theater internment facility (joint) is
established, dependent on METT-TC factors, the internment facility escort
guard units may go forward as far as the initial collection points and escort
detainees and civilian internees to a short-term collection facility or straight
to a theater internment facility.
5-86. Senior MP commanders coordinate and synchronize transportation
and security requirements with MP divisional and BCT leaders. It may take
8 hours for a detainee to reach the DCP; 8 to 16 hours more to reach a short-
term collection facility; and 24 additional hours to reach the theater
internment facility. Mandatory timelines will be determined in command
policy guidance. Critical during this process is that MPs work closely with
MI, SJA, and interagency personnel to determine the proper status of
individuals detained. Determining whether an individual is an EPW, a
criminal insurgent, or in another status is crucial to facilitate the release or
transportation, holding, and security requirements. This determination will
be used when the individual’s biometric data is taken and entered into the
Biometric Automated Toolset (BAT).
5-87. The HUMINT collection assets need to be positioned to maximize their
collection potential and take advantage of the time available during
evacuation. The rapidity of operations and the need to facilitate the
commander’s situational understanding––coupled with the technological
innovations that link the HUMINT collector to databases, analysts, and
technical support from anywhere on the battlefield––require placing the
HCTs forward into brigade and even maneuver battalion areas to provide |
2-22.3 | 101 | _________________________________________________________________________________FM 2-22.3
immediate access to EPWs/detainees. EPWs/detainees are normally
interrogated for tactical information in the maneuver battalion trains areas
and then questioned in detail at the theater JIDC.
Security
5-88. When dealing with detainees, the HUMINT collector faces two security
considerations: his own physical security and information security.
Particularly when operating in support of tactical operations, the HUMINT
collector is in close contact with enemy soldiers who could attempt to escape
and may attack the HUMINT collector in doing so. Detainees during a
stability and reconstruction operation are often people committed to a cause
who find themselves in desperate circumstances. Although the detainees are
normally under guard, the HUMINT collector must always be alert to any
physical threat posed by these individuals. He must also ensure that his own
actions do not provide the detainee with the means with which to harm the
collector or anyone else.
5-89. The HUMINT collector should also be aware that EPWs and other
detainees may attempt to elicit information. Since HUMINT collectors, by
virtue of their position, may possess a great deal of classified information,
they must be careful not to reveal it unwittingly in the process of questioning
a detainee. |
2-22.3 | 102 | FM 2-22.3 _________________________________________________________________________________
PROHIBITION AGAINST USE OF FORCE
Acts of violence or intimidation, including physical or mental torture, or exposure to inhumane
treatment as a means of or aid to interrogation are expressly prohibited. Acts in violation of these
prohibitions may be a violation of US law and regulation and the law of war, including the Geneva
Conventions of 1949, and may be criminal acts punishable under the UCMJ and other US law.
Moreover, information obtained by the use of these prohibited means is of questionable value. If
there is doubt as to the legality of a proposed form of interrogation, the advice of the SJA must be
sought before using the method in question.
Limitations on the use of methods identified herein as expressly prohibited should not be confused
with psychological ploys, verbal trickery, or other nonviolent or non-coercive subterfuge used by the
trained HUMINT collector in the successful interrogation of hesitant or uncooperative sources. Use
of torture by US personnel would bring discredit upon the US and its armed forces while
undermining domestic and international support for the war effort. It also could place US and allied
personnel in enemy hands at a greater risk of abuse by their captors. Conversely, knowing the
enemy has abused US and allied POWs does not justify using methods of interrogation specifically
prohibited by law, treaty, agreement, and policy. In conducting intelligence interrogations, the
J2/G2/S2 has primary staff responsibility to ensure that these activities are performed in accordance
with these laws and regulations. [*The commander bears the responsibility to ensure that
these activities are performed in accordance with applicable law, regulations, and policy.
The unit must have an internal SOP for execution of the interrogation mission.]
The psychological techniques and principles in this manual should neither be confused with, nor
construed to be synonymous with, unauthorized techniques such as brainwashing, physical or
mental torture, including drugs that may induce lasting or permanent mental alteration or damage.
Physical or mental torture and coercion revolve around eliminating the source's free will, and are
expressly prohibited by GWS, Article 13; GPW, Articles 13 and 17; and GC, Articles 31 and 32.
Torture is an act committed by a person under the
color of law specifically intended to inflict severe
physical or mental pain and suffering (other than
pain or suffering incidental to lawful sanctions) upon
another person within his custody or physical
control. (Extracted from Title 18 of the United States
Code, Section 2340A).
*Emphasis added for use in this manual.
Capture Rates
5-90. Anticipating not only overall capture rates but also capture rates
linked to specific operations is vital to the correct placement of HUMINT
collectors supporting interrogation operations. Defensive and stability and
reconstructions operations normally provide a small but steady flow of
detainees while successful offensive operations can overwhelm HCTs. To be
successful, HUMINT collection support to tactical operations must be
carefully planned and prioritized. Available HUMINT collection assets must
be balanced against the operations objective, enemy situation estimate, and
projected EPW capture rates. The unit S2 is responsible for projecting
capture rates.
Interrogating Wounded and Injured Detainees
5-91. Commanders are responsible to ensure that detainees receive adequate
health care. Decisions regarding appropriate medical treatment of detainees
and the sequence and timing of that treatment are the province of medical
personnel. Detainees will be checked periodically in accordance with |
2-22.3 | 103 | _________________________________________________________________________________FM 2-22.3
command health care directives, guidance, and SOPs, applicable to all
detainees to ensure they are fit for interrogations. Detainees determined by
medical personnel to be medically unfit to undergo interrogation will not be
interrogated. Health care personnel will be on call should a medical
emergency arise during interrogation. Health care personnel will report
detainees’ conditions, as appropriate, to the commander. Health care
providers shall not be placed in a position to advise on the application or
duration of interrogation approach techniques.
5-92. Wounded and otherwise injured detainees can be a valuable source of
information. For evacuation purposes, medical personnel may classify
detainees as walking wounded or sick or as non-walking wounded or sick.
Walking wounded detainees are evacuated through normal evacuation
channels. Non-walking wounded are delivered to the nearest medical aid
station and evacuated through medical channels.
5-93. HUMINT collectors may interrogate a wounded or injured detainee
provided that they obtain permission from a competent medical authority
and that the questioning will not delay or hinder medical treatment.
Questioning will not delay the administration of medication to reduce pain or
the evacuation of the detainee to where they may receive medical treatment,
nor will interrogation be allowed if it would cause a worsening of the
condition of the detainee. In most cases, this simply requires the HUMINT
collector to ask the doctor, medic, or other medical personnel if it is all right
to talk to the detainee.
5-94. With the doctor’s permission, the HUMINT collector may talk to the
detainee before, after, or during medical treatment. The HUMINT collector
cannot at any time represent himself as being a doctor or any other type of
medical personnel. Nor can he state, imply, or otherwise give the impression
that any type of medical treatment is conditional on the detainee’s
cooperation in answering questions.
TYPES OF INTERROGATION OPERATIONS
5-95. There are two general categories of interrogation operations: field
interrogation operations and interrogation facility operations.
FIELD INTERROGATION OPERATIONS
5-96. Field interrogation operations constitute the vast majority of
interrogation operations at echelons corps and below. Field interrogations
include all interrogation operations not conducted at a fixed facility. Current
doctrine emphasizes the placement of HCTs forward with maneuver units to
provide immediate interrogation support while the information is fresh and
the detainee may still be susceptible to approaches, due to the shock of
capture. The rationale for this method of employment is twofold:
• First, the pace of the modern battlefield no longer allows the luxury of
waiting for a detainee to reach a collection point prior to interrogation.
Commanders need more timely information, including HUMINT. Also,
automated tools and improved communications now permit rapid
transmittal of information from forward-deployed HCTs. |
2-22.3 | 104 | FM 2-22.3 _________________________________________________________________________________
• Second, current MP doctrine has the theater level EPW escort
companies picking up detainees as far forward as the division forward
collection points and bypassing the intervening collection points.
5-97. An added benefit of placing the HCTs with maneuver units is that it
allows them to conduct other HUMINT collection activities, such as the
debriefing of local civilians and refugees concurrently with interrogation
operations. HCTs are allocated to maneuver units based on—
• The relative importance of that subordinate element’s operations to the
unit’s overall scheme of maneuver.
• The potential for that subordinate element to capture detainees,
documents, and materiel or encounter civilians on the battlefield.
• The criticality of information obtained from those sources to the
success of the parent unit’s overall OPLANs.
5-98. As the mission and situation change, the HCTs are redistributed. As
MI assets, they should never be kept in reserve.
5-99. During offensive and defensive operations, HCTs normally operate
with maneuver brigades and battalions. HUMINT collectors with battalions
or brigades should be equipped with vehicles and communications systems
that are compatible with the systems organic to the supported unit.
HUMINT collectors with brigades and battalions receive their collection
priorities from the S2 of the supported unit. In stability and reconstruction
operations, the HCTs normally operate in the AOs of battalion and brigade
TFs.
INTERROGATION FACILITY OPERATIONS
5-100. Joint interrogation operations are operations conducted at higher
echelons, usually at, and in coordination with, EPW and detainee internment
facilities. The Joint Forces Commander (JFC) normally tasks the Army
component commander to establish, secure, and maintain the EPW
internment facility system. The corps may have the mission of establishing
an interrogation facility when it is acting as the Army Forces (ARFOR) or
Land Component Command (LCC) element.
5-101. An echelon above corps (EAC) MP brigade normally operates the
theater internment facility. The subordinate JFC with a J2 staff lead
establishes a Joint Interrogation and Debriefing Center as an activity within
the theater internment facility. The MI Brigade Commander or other named
SIO is normally designated as the JIDC commander. Army interrogation
operations are normally carried out in an area of the MP-operated
internment facility set aside for that use.
5-102. The JIDC is normally administratively and operationally self-
sufficient. A JIDC will function as part of an overall detainee command and
control structure as outlined in FM 3-19.40 and/or by policy. Continuous
coordination between the JIDC commander and internment facility
commander is essential. The JIDC will—
• Normally consist of facility headquarters, operations, analysis,
editorial, interrogation, screening, and DOCEX elements. |
2-22.3 | 105 | _________________________________________________________________________________FM 2-22.3
• Collocate with the theater detainee internment facility.
• Organizationally structure itself to meet METT-TC requirements
within the theater.
• Include HUMINT collectors, CI personnel, technical experts, personnel
for CEDs and DOCEX, and intelligence analysts, as applicable, from
the Army, Air Force, Marine Corps, Navy, and other government
agencies.
• Maintain the capability to deploy HCTs forward, as needed, to conduct
interrogations or debriefings of sources of interest who cannot be
readily evacuated to the JIDC.
• Often establish a combined interrogation facility with allied HUMINT
collector or interrogator augmentation if operating as part of a
multinational operation.
• Receive collection guidance from the C/J/G2X and send its intelligence
reports to the C/J/G2X and to the supported C/J/G/S2.
5-103. The exact size and organizational structure of these elements will
vary dependent on METT-TC.
Headquarters Element
5-104. The activity headquarters provides all command, administrative,
logistic, and maintenance support to the JIDC. It coordinates with—
• Higher headquarters for personnel, intelligence, and operational and
logistical support prior to and after deployment.
• Theater J2 for reporting procedures, operational situation updates,
theater and national level intelligence requirements, and collection
priorities.
• Provost marshal for location of theater detainee internment facilities
and for procedures to be followed by HUMINT collectors and MPs for
the processing, interrogating, and internment of EPWs.
• Commanders of theater medical support units and internment facility
for procedures to treat, and clear for questioning, wounded EPWs.
• Commanders of supporting CI and TECHINT assets to establish
support requirements and procedures.
• The servicing SJA.
• Magistrate for Article 78 issues.
• Commanders of Air Force, Marine, Navy, and national level
organizations to arrange administrative and logistic interoperability.
Operations Element
5-105. The operations element controls the daily activities within the JIDC.
The JIDC operations element—
• Ensures that work areas are available for all JIDC elements.
• Establishes and maintains JIDC functional files, logs, and journals.
• Makes detainee files available to detainee release boards to assist the
board members in their determinations.
• Establishes interrogation priorities. |
2-22.3 | 106 | FM 2-22.3 _________________________________________________________________________________
• Disseminates incoming and outgoing distribution.
• Conducts coordination with local officials, adjacent and subordinate
intelligence activities, CI, MP, PSYOP, the Joint Captured Materiel
Exploitation Center (JCMEC), Plans and Policy Directorate (J5), and
provost marshal.
• Conducts coordination with holding area officer in charge (OIC) for
screening site, medical support, access, movement, and evacuation
procedures for detainees.
• Conducts operations briefings when required.
• Supervises all JIDC operations and establishes SOPs.
• Supervises all intelligence collection activities within the JIDC.
• Ensures observers are present when OGAs use the JIDC’s
interrogation rooms.
Analytical Element
5-106. The analytical element normally is directly subordinate to the
operations element. The JIDC analytical element ensures that collection
requirements are current and validated. It reviews reports to ensure that the
information reported is in response to validated collection requirements. In
addition, they ensure an up-to-date common operational picture (COP) by
maintaining digital mapping of the current tactical situation and with OB
updates to help HUMINT collectors maintain their situational awareness. At
locations where digital mapping is not possible, paper situation maps
(SITMAPs) are maintained. This element also––
• Obtains, updates, and maintains the database.
• Works with interrogators to provide collection focus for interrogations.
• Establishes and maintains OB workbooks and files including data
generated by intelligence information which has not been verified.
• Maintains digital or paper SITMAPs, as available, displaying enemy
and friendly situations.
• Catalogs, cross-references, and disseminates collection requirements to
JIDC collection elements.
• Reviews interrogation reports for inclusion into the database.
• Conducts situation briefings when required.
• Conducts intelligence reach with the J2 analytical cell and other
analytical elements, such as INSCOM Information Dominance Center,
for relevant information and analysis.
Editorial Element
5-107. The editorial element is normally directly subordinate to the
operations element. It reviews all outgoing reports for format, content, and
completeness.
DOCEX Element
5-108. At a minimum, the JIDC will contain a small DOCEX element to
translate, screen, and extract information from and report on information of |
2-22.3 | 107 | _________________________________________________________________________________FM 2-22.3
intelligence interest from source-associated documents. The theater joint
document exploitation facility (JDEF) may be collocated with the JIDC. In
this instance, the JDEF will translate, screen, categorize, and exploit all
types of CEDs.
Screening Element
5-109. The JIDC normally has a separate screening element to receive and
screen all incoming detainees and their personal effects. The screening
element will review previous screening reports, which should have been sent
along with the detainees; recommend priorities for interrogation; identify
individuals of interest to other agencies; and may conduct limited
interrogations for PIR information. The exact size of the element will vary
based on detainee capture rates and detainee flow. Interrogation elements
should use their most experienced interrogators as screeners in order to
quickly and effectively select the detainees for interrogation who are most
likely to possess useful information.
Interrogation Element
5-110. The interrogation element assigns HUMINT collectors to specific
detainees, uses interrogation and other HUMINT collection methods to
obtain information in response to intelligence requirements, and produces
intelligence reports (IIRs and SALUTE reports) as well as source-related
operational reports. The interrogation element may also debrief returning US
POWs and other personnel as deemed relevant. |
2-22.3 | 109 | FM 2-22.3
PART THREE
The HUMINT Collection Process
Part Three discusses the logical progression of phases involved in all HUMINT
collection. There are five phases and the related task of screening that are critical to
HUMINT collection. This remains consistent with previous doctrine as captured in
the interrogation process but adds screening as a phase and combines approach
and termination. The five phases are screening, planning and preparation, approach
and termination strategies, questioning, and reporting.
Chapter 6
Screening
6-1. Available human sources and documents almost always exceed the
qualified HUMINT collection assets and resources that can be applied
against them. Screening facilitates the efficient application of these limited
assets and resources to maximize the collection of relevant information.
HUMAN SOURCE SCREENING
6-2. As it applies to HUMINT operations, screening is the process of
evaluating and selecting human sources and documents for the prioritized
collection of information based on the collection requirements and mission of
the unit conducting the screening or its higher headquarters. Screening
categorizes and prioritizes sources based on the probability of a particular
source having priority information and the level of cooperation of the source.
Screening is also used to determine if a source matches certain criteria that
indicate that the source should be referred to another agency. Screening is
conducted at all echelons of command and in all operational environments.
There are two general categories of screening: human source screening and
document screening. Human source screening will be explained in depth in this
chapter. Document screening is explained in Appendix I.
6-3. The resources (time and personnel) allocated to screening must be
balanced against those required for interrogations, debriefings, and other
collection methodologies. Although screening is not in itself an information
collection technique, it is vital to the rapid collection of information. Through
screening, the effectiveness of limited collection assets can be maximized by
targeting those assets against the sources with the highest potential of
providing key information. Screening requires experienced individuals with |
2-22.3 | 110 | FM 2-22.3 _________________________________________________________________________________
maturity and judgment who are totally knowledgeable of the collection
requirements and able to make well-reasoned decisions based on limited
information. Collection (interrogation, debriefing, and elicitation) can be
integrated into screening activities; however, it slows the screening process
and decreases the number of potential sources that can be screened.
6-4. Human source screening is the evaluation of an individual or a group of
individuals to determine their potential to answer collection requirements or
to identify individuals who match a predetermined source profile. The
purpose of screening is to––
• Identify those select individuals among the target audience who have
information of potential value and who are willing or can be persuaded
to cooperate.
• Identify individuals who match certain criteria that indicate them as
being potential subjects for source operations or matching the profile
for collection by special interest groups such as TECHINT or CI.
6-5. Screening requires the development of criteria that are indicators of
potential information. These might include rank, position, gender, ethnic
group, appearance, and location.
6-6. Screening is an integral part to all HUMINT collection operations.
While questioning an individual source, a HUMINT collector may switch
between screening (finding out general source areas of knowledge) to
interrogation, debriefing, or elicitation (finding out detailed information
about a specific topic). In operations, such as EPW or refugee operations that
involve large numbers of potential sources, screening will normally be
conducted as a separate but collocated operation as part of the overall
interrogation or debriefing effort. The high number of potential sources being
dealt with in most human source screening operations requires a systematic
approach be developed and utilized to make the most effective use of the
personnel and resources being allocated to the source screening operation.
SCREENING OPERATIONS
6-7. Like all intelligence operations, human source screening operations are
focused on certain targets. Although the exact target population group will
depend on the requirements of the theater of operations, the target focus of
source screening operations is best described as the permanent and
transitory population in the AO. This definition includes local indigenous
populations, refugees, and travelers in the area, and detainees (including
EPWs). Specifically excluded from this definition are members of the HN
forces (military and paramilitary), members of allied forces, and members of
HN government agencies who are available to US forces through liaison
operations. Other personnel not indigenous to the AO (such as legitimate
NGOs, humanitarian organizations, UN personnel) are available to US forces
for voluntary debriefing and should be excluded from screening operations.
6-8. Screening operations may be conducted in a variety of situations and are
dependent on the operational situation and the population. Although every
source screening operation has the same basic purpose, each can be directed
against different segments of the population in different locations throughout |
2-22.3 | 111 | _________________________________________________________________________________FM 2-22.3
the AO. In order to accommodate the differences in the screening audience
and location, different types of source screening operations are employed.
• Tactical Screening. Tactical screening is conducted in support of
combat or contingency operations. It can include the screening of
EPWs or detainees at the point of capture, the screening of refugees, or
the screening of local civilians in cordon and search. At the tactical
level, there is no time for elaborate approach techniques so the degree
of cooperation becomes a prime concern. Tactical area screening is
characterized by rapidly changing requirements, the need to evacuate
noncombatants and detainees to a secure area, and the need to collect
priority tactical information while operations are in progress. Although
the most lucrative type of source is often the detainee, all available
sources should be screened for priority tactical information. In tactical
screening, the HUMINT collector normally accompanies the maneuver
force (OPCON or DS). If the HUMINT collector establishes that the
source has information of value during screening, he immediately
questions the source. Information collected is passed to the maneuver
commander, normally via SALUTE reports. The HUMINT collector
may recommend to the commander that individual sources be further
detained for additional questioning. Screening must be done accurately
in order that a commander can make a decision to detain or release
possibly hostile personnel, based on the recommendation of a HUMINT
collector.
• Checkpoint Screening. Checkpoints are often established to screen the
local populations as they transit through and within the AO or to
screen large numbers of individuals such as refugees or DPs as they
enter the AO. Screening checkpoints can be static or mobile. HUMINT
collectors must pay particular attention to refugees leaving the area
ahead of friendly forces (AO or AOI). It is likely that refugees can
provide information of tactical value more quickly and easily than
detainees. Refugees know the area and may be able to identify for the
collector anything that is out of the ordinary, such as insurgent or
terrorist activities.
• Local Population Screening. This refers to the screening of the local
population within their own neighborhoods. When HUMINT collectors
move into a new area, they must observe the local population and
determine who may be able and willing to provide the information they
have been tasked to collect. Once this determination is made, the
collectors must engage those individuals in conversation to assess their
level of knowledge.
• Collection Facility Screening. Screening is conducted as a normal part
of HUMINT collection operations at collection facilities such as theater
interrogation and debriefing facilities and refugee camps. Screening is
coordinated with the unit, normally an MP unit that is responsible for
the operation of the facility.
• Local Employee Screening. CI personnel periodically screen local
employees to determine possible security risks. Concurrently, local
employee screening may identify sources who can provide information
to answer the CCIRs. Close coordination between HUMINT and CI
collection assets is a must in local employee screening. |
2-22.3 | 112 | FM 2-22.3 _________________________________________________________________________________
• Variations and Combinations. All types of screening can be adapted to
meet specific circumstances slightly different from those for which they
were designed. Additionally, it is possible to use more than one type of
screening in an operation if the specific circumstances require it.
6-9. Screening of refugees, EPWs, and other detainees normally occurs at
two locations: initially at the point where friendly forces first encounter them
and again when they arrive at the theater and other holding areas or refugee
camps. The capturing or detaining forces should enforce segregation of EPWs
from refugees and other detained civilians; they should be screened in
separate operations, one screening for EPWs and one for refugees and other
detained civilians. Depending on METT-TC factors, segregation should be
conducted as follows:
• Refugees: Refugees, even if of the same nationality as the enemy, are
not treated as enemies exclusively based on their nationality and are
not automatically subject to control measures. If refugees are
encountered on the battlefield, they are segregated from EPWs and
screened separately. They are generally not detained further unless
some additional reason requires their detention. At a refugee camp,
screening will be done in coordination with the NGO operating the
refugee camp. If there is a reason to detain refugees for further
questioning for intelligence purposes, or because they pose a security
threat, they will then be treated as a detainee. Under all
circumstances, refugees will be treated humanely. If they are
transported to an internment facility, they will be in-processed by MPs
and their Geneva Conventions status will be determined. Their status
under the Geneva Conventions will afford them certain privileges.
• EPWs: Officers are segregated from enlisted. The enlisted are divided
into NCOs and lower enlisted. Males are segregated from females. This
segregation facilitates rapid screening for EPWs who may have
information to answer PIRs and IRs as well as prohibits officers from
influencing enlisted personnel to resist questioning.
• Other Detainees: Civilians should be screened separately from EPWs.
As with refugees, if there is a reason to detain civilians for further
questioning for intelligence purposes, or because they pose a security
threat, they will then be treated as a detainee. Whether or not civilian
detainees are released or detained further, screeners should ensure
that the civilian detainees are treated humanely. If the civilian
detainees are transported to an internment facility, they will be in-
processed by MPs and their Geneva Conventions status will be
determined. Once detainees are in-processed into an internment
facility, they are then considered to be civilian internees and their
status as such will afford them certain privileges under the Geneva
Conventions.
SCREENING AT FORWARD LOCATIONS
6-10. The initial screening and subsequent questioning should be
accomplished as far forward as is operationally expedient. If a HUMINT
collector is not available, the unit S2 must ensure initial screening and
questioning of sources are completed by qualified personnel. At this level, the
individual (military or civilian) is questioned for job, unit (if applicable), |
2-22.3 | 113 | _________________________________________________________________________________FM 2-22.3
mission, PIR and IR, and supporting information (JUMPS). If time allows,
the HUMINT collector may collect additional information, such as the
source’s name, to start a formal source file to preclude duplication at higher
echelons. S2s and personnel other than HUMINT collectors should not
attempt an approach at this stage.
6-11. HUMINT collectors will only use approach techniques as time and
circumstance allow. The prime requirement is to identify the individuals
with information of immediate tactical value, to collect that information
expediently, and to evacuate the source. In this case, tactical questioning is
normally integrated seamlessly into the screening process. This initial
screening can also be used to identify individuals for immediate evacuation
to a higher echelon facility for detailed questioning. Any screening reports or
information reports generated at this level must accompany the EPWs or
detainees as they are evacuated. Typically, battlefield screening reports, such
as the screening sheet shown in Figure 6-1, will be done on paper in order to
allow multiple screeners to work simultaneously. If automation support is
available for each screener, an electronic version of the screening report is
used, or the “KB Easy” (Figure 10-2), which allows the screener to easily
put screening information into a DIA report format and transmit it
electronically. (See Chapter 10 for a KB-EZ worksheet.)
6-12. US forces capturing enemy forces or detaining civilians on the
battlefield search each individual for weapons, documents, or other material
of intelligence interest. Each individual receives a Capture Tag which records
basic biographic data such as name, rank, serial number, unit of assignment
(military), location of capture, and any special circumstances concerning the
capture. (See Appendices E and F.) Each document or item removed from the
captive is also “bagged and tagged” to identify from whom it was taken. This
initial step is vital, as properly processing captives and their equipment
greatly simplifies the screening process. All documents associated with the
source and any possessions taken from him must be evacuated with the
source, but not on his person. This is to ensure that the next echelon of
screeners and interrogators will have the ability to exploit these items for
intelligence value, or to support determination of approach strategies.
SCREENING AT REFUGEE CAMPS OR DETENTION FACILITIES
6-13. When a detainee or refugee arrives at an internment facility, refugee
camp, or similar facility, a more extensive screening is conducted. The
screening sheet is used to facilitate this process. This screening is normally
done in conjunction with in-processing into the facility. During in-processing,
the MP will assign an Internment Serial Number (ISN) that is registered
with the Theater Detainee Reporting Center (TDRC). The ISN will be used to
track the detainee throughout the MP detention system. The ISN should not
be used in intelligence channels; however, HUMINT collectors should record
the ISN on the screening sheet to aid in locating the detainee again. For
intelligence reporting purposes, HUMINT collectors will assign the detainee
a source reporting number that will be used to identify the detainee and
information associated with him, regardless of whether or not the detainee is
transported to another facility. The J2 issues source reporting numbers to
HUMINT collectors through the OMT. |
2-22.3 | 114 | FM 2-22.3 _________________________________________________________________________________
MMMMMPPPPP IIIIISSSSSNNNNN NNNNNUUUUUMMMMMBBBBBEEEEERRRRR::::: EEEEEVVVVVAAAAACCCCCUUUUUAAAAATTTTTIIIIIOOOOONNNNN DDDDDAAAAATTTTTEEEEE:::::
LLLLNNNNAAAAMMMMEEEE((((PPPP)))):::: ____________________________________________________________________ CCCC DDDDAAAATTTTEEEE:::: __________________________________________________________________________________________
AAAA
LLLLNNNNAAAAMMMMEEEE((((MMMM)))):::: ____________________________________________________________________ TTTTIIIIMMMMEEEE:::: __________________________________________________________________________________________
PPPP PPPP
EEEE FFFFNNNNAAAAMMMMEEEE:::: ____________________________________________________________________ TTTT PPPPLLLLAAAACCCCEEEE:::: __________________________________________________________________________________________
RRRR MMMMNNNNAAAAMMMMEEEE:::: ____________________________________________________________________ UUUU CCCCAAAAPPPP UUUUNNNNIIIITTTT:::: __________________________________________________________________________________________
SSSS RRRR
SSSSVVVVCCCC////IIIIDDDD NNNNOOOO:::: ____________________________________________________________________ CCCCIIIIRRRRCCCCUUUUMMMMSSSSTTTTAAAANNNNCCCCEEEESSSS::::_________________________________________________________________
OOOO EEEE
NNNN DDDDOOOOBBBB:::: ____________________________________________________________________ __________________________________________________________________________________________
AAAA LLLLAAAANNNNGGGGUUUUAAAAGGGGEEEESSSS:::: ____________________________________________________________________ DDDD DDDDOOOOCCCCUUUUMMMMEEEENNNNTTTTSSSS::::__________________________________________________________________________________________
LLLL AAAA
MMMMAAAARRRRIIIITTTTAAAALLLL SSSSTTTTAAAATTTTUUUUSSSS:::: MMMM SSSS WWWW DDDD TTTT ___________________________________ __________ ____________________ _____________________________________________________________________________________
AAAA WWWWPPPPNNNNSSSS////EEEEQQQQUUUUIIIIPPPP::::__________________________________________________________________________________________
MMMM ====MMMMiiiilllliiiittttaaaarrrryyyy CCCC==== CCCCiiiivvvviiiilllliiiiaaaannnn _________________________ __________ ____________________ __________ _____________________________________________________________________________________
************ SSSSTTTTAAAATTTTUUUUSSSS::::
PPPP ==== PPPPaaaarrrraaaammmmiiiilllliiiittttaaaarrrryyyy ????==== OOOOtttthhhheeeerrrr
BBBBRRRRAAAANNNNCCCCHHHH:::: AAAAFFFF AAAARRRR CCCCGGGG MMMMCCCC NNNNYYYY ____________ PPPPHHHHYYYYSSSSIIIICCCCAAAALLLL CCCCOOOONNNNDDDDIIIITTTTIIIIOOOONNNN:::: SSSSEEEEXXXX::::MMMM FFFF
RRRRAAAANNNNKKKK:::: ____________________________________________________________________ ____ WWWWOOOOUUUUNNNNDDDDEEEEDDDD:::: YYYY NNNN ____________________________________________________
MMMM
IIII FFFFUUUULLLLLLLL UUUUNNNNIIIITTTTDDDDSSSSGGGG:::: ________________________________________________________________ RRRREEEEMMMMAAAARRRRKKKKSSSS:::: ________________________________________________________________________________
AAAA
LLLL ____________________________________________________________________________________________________ ________________________ SSSS _________________ _______________________________________________________________________________________________________
IIII
DDDDUUUUTTTTYYYY PPPPPPPPSSSSNNNN:::: ____________________________________________________________ ________ SSSS
TTTT MMMMEEEENNNNTTTTAAAALLLL CCCCOOOONNNNDDDDIIIITTTTIIIIOOOONNNN::::
EEEE
AAAA JJJJOOOOBBBB:::: ________________________________________________________________________________________ ________ ________ SSSS EEEEDDDDUUUUCCCCAAAATTTTIIIIOOOONNNN ==== ____________________________YYYYRRRRSSSS
RRRR SSSSTTTTAAAATTTTIIIIOOOONNNN:::: ________________________________________________________________________________________ SSSS IIIINNNNTTTTEEEELLLLLLLLIIIIGGGGEEEENNNNCCCCEEEE:::: AAAAVVVVGGGG++++ AAAAVVVVGGGG AAAAVVVVGGGG----
YYYY
SSSSKKKKIIIILLLLLLLLSSSS:::: ____________________________________________________________ ________________________________ MMMM
MMMMEEEENNNNTTTTAAAALLLL SSSSTTTTAAAATTTTEEEE::::________________________________________________________________
EEEE
EEEEXXXXPPPPEEEERRRRIIIIEEEENNNNCCCCEEEE:::: ____________________________________________ ________ ________________ ____
MMMM ________________________________________________________________________________________________________________________
TTTT
SSSSCCCCRRRREEEEEEEENNNNEEEERRRR:::: ____________________________________________________________________________
JJJJOOOOBBBB:::: ________________________________________________________________________ ____________________________
CCCC DDDD DDDDAAAATTTTEEEE::::____________________________________TTTTIIIIMMMMEEEE::::____________________________________________
IIII OOOORRRRGGGG:::: ________________________________________________________________________ ____________________________
VVVV DDDDUUUUTTTTIIIIEEEESSSS:::: ____________________________________________________________ ________________________________ AAAA TTTT CCCCOOOOOOOOPPPPEEEERRRRAAAATTTTIIIIOOOONNNN:::: 1111((((HHHHiiiigggghhhh)))) 2222 3333((((LLLLoooowwww))))
IIII ________________________________________________ ____________________________________________________________________________ AAAA KKKKNNNNOOOOWWWWLLLLEEEEDDDDGGGGEEEE::::AAAA((((HHHHiiiigggghhhh)))) BBBB CCCC((((LLLLoooowwww))))
LLLL
BBBBGGGGWWWW LLLLIIIISSSSTTTT::::YYYY NNNN BBBBGGGGWWWW CCCCOOOODDDDEEEE::::________________
IIII SSSSKKKKIIIILLLLLLLLSSSS:::: ____________________________________________________________________________________________
AAAA ________________________________________________________________________________________________________________________ SSSSOOOOUUUURRRRCCCCEEEE CCCCAAAATTTTEEEEGGGGOOOORRRRYYYY:::: AAAA BBBB CCCC DDDD
NNNN AAAAPPPPPPPPRRRROOOOAAAACCCCHHHH:::: ____________________________________________________________________________________
SSSSPPPPEEEECCCCIIIIAAAALLLLHHHHAAAANNNNDDDDLLLLIIIINNNNGGGG RRRREEEEQQQQUUUUIIIIRRRREEEEMMMMEEEENNNNTTTT CCCCOOOODDDDEEEESSSS::::________________________________________________________________________________________________________________________
____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
PPPP ________________________________________________________________________________________________________________________ ________________________________________________________________________________________________________________________
RRRR
IIII ________________________________________________________________________________________________________________________ ________________________________________________________________________________________________________________________
EEEE
RRRR
________________________________________________________________________________________________________________________ MMMM ________________________________________________________________________________________________________________________
________________________________________________________________________________________________________________________ AAAA ________________________________________________________________________________________________________________________
&&&&
RRRR
________________________________________________________________________________________________________________________ ________________________________________________________________________________________________________________________
KKKK
IIII ________________________________________________________________________________________________________________________ SSSS ________________________________________________________________________________________________________________________
RRRR
________________________________________________________________________________________________________________________ ________________________________________________________________________________________________________________________
Figure 6-1. Screening Sheet. |
2-22.3 | 115 | _________________________________________________________________________________FM 2-22.3
6-14. When a detainee is in-processed into an internment facility, MPs will
assign the detainee’s status as an EPW, retained person, protected person, or
other status under the Geneva Conventions. Figure 6-2 provides excerpts
from FMI 3-19.40 on MP internment and resettlement operations. In an
international conflict, individuals entitled to POW status (EPWs) include—
• Members of the regular armed forces.
• Other militias or volunteer corps, and organized resistance movements
of a State Party to a conflict, provided they meet each of the following
criteria:
Commanded by a person responsible for his subordinates.
■
Having a fixed distinctive sign recognizable at a distance.
■
Carrying arms openly.
■
Conducting operations in accordance with the law of war.
■
• Civilians who accompany the force.
• Crew members of the merchant marine and crews of civilian aircraft of
a State Party to the conflict, who do not benefit by more favorable
treatment under any other provisions of international law.
6-15. There are other categories specified in Article 4, GPW. Questions with
respect to an individual’s entitlement to EPW status should be directed to
your SJA.
6-16. Retained personnel (see Articles 24 and 26, GWS):
• Official medical personnel of the armed forces exclusively engaged in
the search for, or the collection, transport or treatment of wounded or
sick, or in the prevention of disease, and staff exclusively engaged in
the administration of medical units and facilities.
• Chaplains attached to the armed forces.
• Staff of National Red Cross Societies and that of other Volunteer Aid
Societies, duly recognized and authorized by their governments to
assist Medical Service personnel of their own armed forces, provided
they are exclusively engaged in the search for, or the collection,
transport or treatment of wounded or sick, or in the prevention of
disease, and provided that the staff of such societies are subject to
military laws and regulations.
6-17. Protected persons include civilians entitled to protection under the GC,
including those we retain in the course of a conflict, no matter what the
reason. A “civilian internee” is a person detained or interned in the United
States or in occupied territory for security reasons, or for protection, or
because they have committed an offense against the detaining power, and
who is entitled to “protected person” status under the GC.
6-18. The term “detainee” may also refer to enemy combatants. In general,
an enemy combatant is a person engaged in hostilities against the United
States or its coalition partners during an armed conflict. The term “enemy
combatant” includes both “lawful enemy combatants” and “unlawful enemy
combatants.”
• Lawful enemy combatants: Lawful enemy combatants, who are
entitled to protections under the Geneva Conventions, include
members of the regular armed forces of a State Party to the conflict; |
2-22.3 | 116 | FM 2-22.3 _________________________________________________________________________________
militia, volunteer corps, and organized resistance movements
belonging to a State Party to the conflict, which are under
responsible command, wear a fixed distinctive sign recognizable at a
distance, carry their arms openly, and abide by the laws of war; and,
members of regular armed forces who profess allegiance to a
government or an authority not recognized by the detaining power.
• Unlawful enemy combatants: Unlawful enemy combatants are
persons not entitled to combatant immunity, who engage in acts
against the United States or its coalition partners in violation of the
laws and customs of war during armed conflict. For purposes of the
war on terrorism, the term “unlawful enemy combatant” is defined to
include, but is not limited to, an individual who is or was part of
supporting Taliban or al Qaida forces, or associated forces that are
engaged in hostilities against the United States or its coalition
partners.
Excerpts from FMI 3-19.40, Military Police
Internment/Resettlement Operations
ACTIVITIES
The MPs assist MI screeners by identifying captives who may have answers that
support PIR and IR. Because MPs are in constant contact with captives, they see how
certain captives respond to orders and see the types of requests they make. The MPs
ensure that searches requested by MI personnel are conducted out of sight of other
captives and that guards conduct same-gender searches.
The MI screeners examine captured documents, equipment and, in some cases,
personal papers (journals, diaries, and letters from home). They are looking for
information that identifies a captive and his organization, mission, and personal
background (family, knowledge, and experience). Knowledge of a captive’s physical
and emotional status or other information helps screeners determine his willingness
to cooperate.
LOCATION
Consider the following when planning an MI screening site:
• The site is located where screeners can observe captives as they are segregated
and processed. It is shielded from the direct view of captives and is far enough
away that captives cannot overhear screeners’ conversations.
• The site has an operation, administrative, and interrogation area. The
interrogation area accommodates an interrogator, a captive, a guard, and an
interpreter as well as furniture. Lights are available for night operations.
• Procedures are implemented to verify that sick and wounded captives have
been treated and released by authorized medical personnel.
• Guards are available and procedures are implemented for escorting captives to
the interrogation site.
• Procedures are published to inform screeners who will be moved and when
they will be moved.
• Accountability procedures are implemented and required forms are available.
Figure 6-2. MP Support to Screening. |
2-22.3 | 117 | _________________________________________________________________________________FM 2-22.3
6-19. It may not be immediately evident in a particular theater of operation
whether an individual is an unlawful enemy combatant or is associated with
or supporting the unlawful enemy combatants of the United States. Consult
your J/G/S2 and servicing SJA for information relevant to your theater of
operations.
6-20. All captured or detained personnel, regardless of status, shall be
treated humanely, and in accordance with the Detainee Treatment Act of
2005 and DOD Directive 2310.1E, “Department of Defense Detainee
Program”, and no person in the custody or under the control of DOD,
regardless of nationality or physical location, shall be subject to torture or
cruel, inhuman, or degrading treatment or punishment, in accordance with
and as defined in US law. (See Appendix A, GPW Articles 3, 4, 5, 13, and 14.)
6-21. The rights of EPWs are stated in the GPW. They include the right to
quarters, rations, clothing, hygiene and medical attention, property, and
other rights. EPWs may not renounce their rights to renounce EPW status.
(See Appendix A, GPW Article 7, Section I.)
6-22. Retained personnel must receive at least the same benefits as EPWs.
They may only be required to perform religious or medical duties, and they
may only be retained as long as required for the health and spiritual needs of
the EPWs. Retained persons must be returned to their home country when
no longer needed.
6-23. Protected persons’ rights include protection from physical or moral
coercion and from being taken hostage. Protected persons are protected from
murder, torture, corporal punishment, mutilation, medical experimentation,
and any form of brutality. Protected persons rights are limited, though.
They do not have the right to leave captivity and are not immune from
prosecution. Protected persons can be screened and identified for intelligence
purposes.
SCREENING PROCESS
6-24. At the internment facility, the screening process normally is distinct
from the questioning (interrogation or debriefing) process. Dependent on the
criticality of the information identified, the source may be questioned
immediately for relevant information but will more likely be identified for
future questioning. The screening is a more formal process in which the
screener attempts to obtain basic biographic data, areas of general
knowledge, source cooperation, and vulnerability to select approach
techniques in addition to identifying knowledge of critical intelligence tasks.
Once the screener has established the basics (source identification,
cooperation, and knowledge), he normally passes the source on to the
personnel that conduct the questioning. The screener will complete a
screening report that will be forwarded in accordance with unit SOPs (see
Chapter 10). If a detainee’s knowledge is of Joint Forces interest, a
knowledgeability brief (KB) should be written and submitted electronically.
(A short form KB worksheet is shown at Figure 10-2.) Complete guidance on
KBs is contained in DIAM 58-12 (S//NF). |
2-22.3 | 118 | FM 2-22.3 _________________________________________________________________________________
6-25. If the source freely discusses information of PIR value, the screener
normally exploits the information fully and completes a SALUTE report. (See
Appendices H and I.) If the source’s knowledge of PIR information is
extensive and he is freely giving the information, the senior screener and the
OIC or noncommissioned officer in charge (NCOIC) of the interrogation or
debriefing element are notified immediately. They decide if the screener
should continue questioning the source or if the source should be handed off
to another HUMINT collector. If source-associated documents contain PIR
information, the collector will exploit them as fully as possible and write a
SALUTE report. (See Appendix H.)
6-26. The source normally is assigned a standard screening code. The
screening code is an alphanumeric designation that reflects the level of
cooperation expected from the source and the level of knowledgeability the
source may possess. Table 6-1 shows the codes for assessing sources. Those
sources assigned to the same category are interrogated in any order deemed
appropriate by the interrogation or debriefing element.
Table 6-1. Source Screening Codes.
CCOODDEE CCOOOOPPEERRAATTIIOONN LLEEVVEELL
11 RReessppoonnddss ttoo ddiirreecctt qquueessttiioonnss..
22 RReessppoonnddss hheessiittaannttllyy ttoo qquueessttiioonniinngg..
33 DDooeess nnoott rreessppoonndd ttoo qquueessttiioonniinngg..
KKNNOOWWLLEEDDGGEEAABBIILLIITTYY LLEEVVEELL
AA VVeerryy lliikkeellyyttoo ppoosssseessss PPIIRR iinnffoorrmmaattiioonn..
BB MMiigghhtt hhaavvee IIRR iinnffoorrmmaattiioonn..
CC DDooeess nnoott aappppeeaarr ttoo hhaavvee ppeerrttiinneenntt iinnffoorrmmaattiioonn..
6-27. Figure 6-3 shows the order in which detainees in the assessed
screening categories should be interrogated. Category 1-A sources normally
should be the first priority to be questioned. Category 1-B and 2-A would be
Priority II. Category 1-C, 2-B and 3-A would be next as Priority III sources,
with 2-C, and 3-B being in the fourth group to be interrogated. Category 3-C
sources are normally not questioned. This order ensures the highest
probability of obtaining the greatest amount of relevant information within
the available time. Screening codes may change with the echelon. The higher
the echelon, the more time is available to conduct an approach. Appendix B
discusses the reliability ratings of information obtained. |
2-22.3 | 119 | _________________________________________________________________________________FM 2-22.3
AMOUNT OF PERTINENT KNOWLEDGE
Most Least
1-A 1-B 1-C
2-A 2-B 2-C
3-A 3-B 3-C
Least
NOITAREPOOC
DETCEPXE
AMOUNT OF PERTINENT KNOWLEDGE
MMost Least
Priioorriitty
II IIII IIIIII IIVV VV
1-A 1-B 1-C
2-A 2-B 2-C
3-A 3-B 3-C
Least
NOITAREPOOC
DETCEPXE
AMOUNT OF PERTINENT KNOWLEDGE
ost Least
Pr
1-A 1-B 1-C
2-A 2-B 2-C
3-A 3-B 3-C
Least
NOITAREPOOC
DETCEPXE
PPrriioorriittyy
II IIII IIIIII IIVV VV
Figure 6-3. Interrogation Priorities by Screening Category.
SCREENING METHODOLOGIES
6-28. Depending on the specific operation or echelon, screening may be a
separate operation or may be integrated into a specific collection mission. For
example, a HUMINT collector accompanying a patrol encounters a civilian
who may have information that is relevant to collection requirements. The
HUMINT collector screens the source (that is, asks some general questions to
determine the source’s level of cooperation and knowledge). Upon receiving a
positive response, the HUMINT collector may debrief the civilian on a
specific topic or question him on areas of PIR interest. He then reverts to the
screening role to determine other relevant knowledge. If the HUMINT
collector determines through screening that the source either has no relevant
information or cannot be persuaded to cooperate within an operationally
expedient timeframe, he is not debriefed as part of the screening process. In
detainee or refugee operations, a separate element will normally conduct all
screenings. They establish a prioritized list of sources who are then
systematically questioned on specific topics by other HUMINT collectors or
other technical specialists. |
2-22.3 | 120 | FM 2-22.3 _________________________________________________________________________________
SCREENING REQUIREMENTS
6-29. In addition to potential sources, screening requires several components.
• Collection Requirements. Without a clear list of specific collection
requirements, screening becomes virtually impossible. The concept
behind screening is to rapidly identify source knowledgeability as it
relates to requirements. Screeners should obtain a copy of the
supported element's collection requirements and become familiar with
the intelligence indicators listed therein. Screeners must use their
experience and imagination to devise ways to identify EPWs and
detainees who might possess information pertinent to these indicators.
Vague requirements (such as “What is the threat doing?”) do not
provide the focus necessary to make a source selection. The HUMINT
collection element must break these SIRs into indicators if the
supported intelligence officer has not already done this. The indicators
must take into account the type of sources anticipated. For example, a
refugee probably will not know if the threat intends to defend a
particular ridgeline. However, he might know whether or not there are
threat forces on the ridge, if an improvised explosive device (IED) is
being employed on a route, if they are digging in, or if engineer type
equipment is in the area.
• Selection Criteria. After reviewing the collection requirements, the
HUMINT collection element will develop preliminary criteria to
identify the source type that will most likely have the required
information. The source type may include gender, appearance, military
rank, age, or occupation. Some of these criteria are determined by
visual observation, thereby saving time in not having to question
everyone. Other criteria such as occupation or place of residence may
require brief questions.
• Trained Screeners. Screening is possibly the most difficult HUMINT
skill. A HUMINT collector must use his experience, questioning skill,
cultural knowledge, and knowledge of human nature to decide in a
matter of minutes or possibly seconds whether limited HUMINT
collection assets and valuable time should be spent talking to an
individual based on the way he looks and the answers to a few
questions. A wrong decision will mean wasted assets and valuable
information missed.
• Language Capability and Cultural Awareness. Screening involves
more than asking a series of questions. The HUMINT collector must be
able to evaluate the answers, the specific language used, and other
clues such as body language to determine the value of an individual to
the collection effort. This requires a mature and experienced screener.
If the HUMINT collector does not possess the target language, he and
his interpreter must be able to work together quickly with mutual
trust and confidence.
• Area Conducive to Screening Operations. Effective screening
operations must allow the HUMINT collector to speak to the source
where the source is not exposed to outside influences or dangers that
may inhibit his responses. For that reason, sources should never be
screened within the sight or hearing of other potential sources. |
2-22.3 | 121 | _________________________________________________________________________________FM 2-22.3
HUMINT collectors can use rooms within a building, tents, or other
field-expedient methods to isolate the individual being screened.
Screening a source within view or hearing of other potential sources
may not only pose a danger to the source but also will tend to inhibit
the source from freely cooperating.
• Security. The personnel conducting the screening need to be able to
concentrate on the individual being screened. Although the collector is
ultimately responsible for his own personal security, screening is
facilitated by having dedicated personnel present (for example, MPs)
who are responsible for security. Screeners coordinate with MP or
other security personnel concerning their role in the screening process.
INITIAL DATA AND OBSERVATIONS
6-30. Screening is a filtering process whereby, under ideal circumstances, all
potential sources would be questioned to determine if they have information
of intelligence interest. In actuality this is often impossible. Screeners often
use visual and other aids to “prescreen” the sources in order to eliminate a
substantial portion of the target population before conducting detailed
screening. For example, if the HUMINT collector at a checkpoint is only
interested in information concerning a specific denied geographic area,
screeners may ask all refugees if they are from or have been in that denied
area recently. A less experienced screener could do this allowing the
experienced screener to conduct more extensive screening of the select target
audience.
6-31. If time and circumstances permit, screeners should question any
friendly personnel who have had extensive contact with the persons to be
screened. In the case of detainees, this could include holding area personnel
or personnel from the capturing unit. These personnel may be able to help
identify sources that might answer the collection requirements or who might
match a particular source profile.
6-32. Normally the screener will not have time to conduct any extended
observation of the person to be screened; however, the screener should make
a quick visual observation of the source prior to questioning him. He should
note anything in the source’s appearance and behavior that indicates he is
willing to cooperate immediately or is unlikely to cooperate. The screener
should also note any physical indicators that the source may have the type of
information or belong to a certain source profile category.
6-33. Physical indicators include overall appearance such as rank, insignia,
and condition of the uniform and type and condition of equipment for
military sources and general type and condition of dress (for example,
business suit as opposed to work clothes) for civilians. Certain physical
indicators (dress, medals such as religious medals, physical type) may be
indicators that the source belongs to a specific ethnic or religious group. The
source’s physical reactions may also indicate a willingness or lack of
willingness to cooperate. For example, does the source move forward in the
group or attempt to hide within the group; does he intentionally place
himself in the wrong segregation group; or does he show any overt signs of
nervousness, anxiety, or fright? |
2-22.3 | 122 | FM 2-22.3 _________________________________________________________________________________
6-34. The screeners will also examine all documents and possessions found
on the source (if any) and all documents pertaining to the source (if any). At
a minimum, a detainee should have a properly filled out capture tag,
which will indicate to the screener where the detainee was captured,
by which unit, and under what circumstance. (See para 6-12 and
Appendix D.) Documents such as personal letters, orders, rosters, signal
operating instructions (SOIs) and map sections can provide information that
identify the source, his organization, mission, and other personal background
information (family, knowledge, experience, education). They may in
themselves provide information, may identify a source for questioning, and
may provide information helpful in assessing a source’s susceptibility to an
approach.
6-35. Documents pertaining to the source, beginning at the point of capture
throughout the evacuation process, such as previous screening and
intelligence reports and administrative documents (such as source personnel
records prepared by the MPs) help the screener by providing information
concerning the source’s physical status, emotional status, level of knowledge,
level of experience, and other background data. Making timely use of reports
from lower echelons can be difficult for the screener, especially when dealing
with large numbers of potential sources.
SOURCE ASSESSMENT
6-36. Screeners use standard reporting formats to identify the results of
their screening (see Chapter 10). The determination must be made as to
whether the source is of any intelligence value to the HUMINT collector. The
HUMINT collector will basically place the source within one of four
categories.
• Of Immediate Intelligence Interest. This category includes personnel
who are assessed, based upon the screening process, who possess
information in response to requirements. They are interrogated or
debriefed (dependent on their status) to retrieve relevant information.
This questioning may be conducted by the same person conducting the
screening or by another HUMINT collector.
• Of Interest to Other Agencies. In most cases, the HUMINT collector
will be provided with collection requirements by other agencies or
disciplines such as TECHINT or CI. In this case the HUMINT collector
will question the source on these requirements and report the
information appropriately. However, in some instances, particularly in
the case of CI, the HUMINT collector may be given a list of topics or a
profile of personnel who are of interest to CI. The HUMINT collector
will notify the local CI representative when a person matching the “CI
profile” is identified. After the HUMINT collector has extracted any
relevant intelligence information, he will “pass” the individual off to
the CI agents. In many cases, particularly with individuals of
TECHINT or other specialized interest, the HUMINT collector will be
asked to conduct the questioning with the technical support of the
individual from the interested agency. This is coordinated through the
HUMINT collector’s OMT and the chain of command. |
2-22.3 | 123 | _________________________________________________________________________________FM 2-22.3
• Of Potential Interest as a Contact Source. On occasion, especially
during stability and reconstruction operations, the HUMINT collector
may identify an individual who has the potential to provide
information in the future, due to his placement or access. Although the
individual may not have information of immediate interest, the
HUMINT collector will pass his recommendation to the appropriate
office, normally the C/J/G/S2X, provided that source operations are
authorized (see Chapter 5).
• Of No Interest. This category includes sources who prove (based upon
the screening process) to be of no interest to the HUMINT collector or
other agencies. Their biographic data is recorded, but they are not
questioned further. This category will likely include the bulk of
individuals screened. Individuals who have been screened are kept
separated from those who have not yet been screened.
OTHER TYPES OF SCREENING OPERATIONS
LOCAL EMPLOYEE SCREENING
6-37. CI personnel conduct local employee screening, primarily to identify
individuals who may be a security risk. HUMINT collectors also can use local
employee screening as a means to obtain intelligence information or to
identify personnel with placement and access to answer information
requirements. Employee screening must be conducted in a secure
environment and out of the hearing and sight of other employees. Formal
written reports of the screening must be maintained.
LOCAL COMMUNITY OR AREA SCREENING
6-38. Local area screening is normally done in coordination with other
operations such as a cordon and search operation. The HUMINT collectors
accompany the forces conducting the operation and screen the general
population to identify individuals of intelligence or CI interest.
SCREENING FOR CI REQUIREMENTS
6-39. Before initiating the screening process, the HUMINT collector
establishes liaison with supporting CI agents. The CI element provides CI
requirements and provides a profile of personnel of CI interest. CI is
normally interested in personnel who––
• Have no identification documents.
• Have excessive or modified identification documents.
• Possess unexplainable large amounts of cash or valuables.
• Are illegal border-crossers.
• Attempt to avoid checkpoints.
• Are on the CI personalities list, which includes members of an
intelligence service.
• Request to see CI personnel.
• Have family in the denied area.
• Speak a different language or dialect than is spoken in the area. |
2-22.3 | 124 | FM 2-22.3 _________________________________________________________________________________
6-40. Personnel of CI interest include two general categories of people: The
first type of “person of interest” is any individual or group involved in
adversary intelligence collection operations or who is attempting to enter the
AO to conduct such operations. Examples of these individuals include but are
not limited to––
• Known or suspected members and/or supporters of foreign intelligence
and security services and known or suspected members and/or
supporters of the intelligence activities of non-state entities such as
organized crime, terrorist groups, and drug traffickers.
• Known or suspected hostile espionage agents, saboteurs, subversives,
or hostile political figures.
• Known or suspected enemy collaborators and sympathizers who may
pose a security threat to US forces.
• Personnel known to have engaged in intelligence, CI, security, police,
or political indoctrination activities.
• Known or suspected officials of enemy governments whose presence
poses a security threat to US forces.
• Political leaders known or suspected to be hostile to the military and
political objectives of the US or an allied nation.
6-41. The second type of “person of CI interest” is any individual who
possesses information concerning the identification, location, or activities of
personnel in the first category.
SCREENING FOR OTHER TECHNICAL COLLECTION REQUIREMENTS
6-42. Other technical areas such as TECHINT, SIGINT, IMINT, MASINT, or
other services need to supply the HUMINT collectors with a profile of the
individuals with whom they wish to speak. The HUMINT collectors upon
identifying such an individual will contact the requesting agency after
extracting PIR information. |
2-22.3 | 125 | FM 2-22.3
Chapter 7
Planning and Preparation
7-1. Planning and preparation is one of the five phases of HUMINT
collection. HUMINT collection, regardless of the methodology employed,
must be a systematic, carefully prepared enterprise. The HUMINT collector
engages in general preparation throughout his career. He focuses that
preparation to a specific area of the world, specific mission, and specific
collection requirements as those become available. Finally, the HUMINT
collector focuses his planning and preparation on a specific collection effort
with a specific source.
COLLECTION OBJECTIVES
7-2. Each HUMINT collection mission is conducted for a definite purpose.
The HUMINT collector must keep this purpose firmly in mind as he proceeds
to obtain usable information to satisfy the requirements, and thus
contributes to the success of the unit's mission. The HUMINT collector must
use the objective as a basis for planning and conducting questioning. The
HUMINT collector should not concentrate on the objective to the extent he
overlooks or fails to recognize and exploit other valuable information
extracted from the source. For example, during HUMINT collection, the
HUMINT collector learns of the presence of a heretofore unknown, highly
destructive weapon. Although this information may not be in line with his
specific objective, the HUMINT collector must develop this important lead to
obtain all possible information concerning this weapon.
RESEARCH
7-3. The key to good HUMINT collection is preparation on the part of the
collector. The HUMINT collector must understand the environment and
particularly its human component, the mission of the supported unit, that
unit’s intelligence requirements, his source, and the cultural environment.
The ultimate success of a questioning session is often decided before the
HUMINT collector even meets the source.
GENERAL RESEARCH
7-4. Due to the quickly changing world circumstances, it is impossible to
conduct all the specific research required immediately prior to questioning a
source. General research should be completed before entering an AO and
continues until operation completion. Areas of research include but are not
limited to––
• OPLANs and OPORDs. The HUMINT collector must be familiar with
the unit OPLAN and that of its higher headquarters. By thoroughly
understanding the unit OPLAN and OPORD, the HUMINT collector |
2-22.3 | 126 | FM 2-22.3 _________________________________________________________________________________
and HUMINT commanders and leaders can anticipate collection
requirements, develop source profiles, recommend deployment
strategies, and otherwise integrate HUMINT operations into the
overall unit operation. Although the OPORD needs to be read and
understood in its entirety, certain areas are of critical importance to
the HUMINT collection effort. They include––
Task organization. This will show where HUMINT C2, staff support,
and collection assets will fit into the organizational structure.
Situation. This gives the friendly and enemy situation.
Mission. This gives the HUMINT collectors insight into how their
operations will integrate into the parent unit’s operation.
Execution. The four execution subparagraphs explain the
commander’s intent on how the mission is to be carried out:
− Subparagraph 3a (Concept of Operation) includes how sub-
ordinate units’ operations will be included in the overall plan.
− Subparagraph 3a(3) (Reconnaissance and Surveillance) details
how HUMINT collection operations will integrate into the
overall ISR plan. Additional information on ISR is found in
Annex L.
− Subparagraph 3a(4) (Intelligence), along with Annex A (Task
Organization) and Annex B (Intelligence), explains how the
Intelligence BOS will support the scheme of maneuver.
− Subparagraph 3d (Coordinating Instructions) lists the CCIRs
and initial PIRs.
• Current events. The HUMINT collector must be knowledgeable about
current events in all potential operational areas, especially those
events that indicate the populace’s feelings or intentions toward the
US. This will facilitate a better understanding of the cultural, political,
and socio-economic conditions that could influence the attitude and
behavior of a source. This knowledge can be obtained and updated
through classified periodic intelligence publications and/or military or
civilian open sources, including both print and broadcast media, CA
and PSYOP databases, and the J/G/S2 analytical elements.
• SOPs. The HUMINT collector must be familiar not only with his own
unit's SOP but also with that of any supported unit. The HUMINT
collector will be able to obtain specific information about report
numbers and formats, as well as information about distribution
channels for reports from these SOPs. The SOP will also explain unit
policy on source exploitation and evacuation procedures, logistic and
maintenance functions, and other C2 and support issues.
• Umbrella concept. The TF commander through the J/G2 and J/G2X
issues an umbrella concept for HUMINT operations. When operating
under this concept, collection parameters will be established in writing,
and it is imperative that the HUMINT collector understands his role.
Types of sources will be outlined concerning placement, motivation,
and access. The umbrella concept will also specify the types of
information against which the HUMINT collector can collect. The
umbrella concept is governed by AR 381-100 (S//NF), AR 381-172
(S//NF), DIAM 58-11 (S//NF), and DIAM 58-12 (S//NF). |
2-22.3 | 127 | _______________________________________________________________________________ FM 2-22.3 5
• Legal guides, SOFAs, operations and execute orders, ROE, and other
legal and administrative requirements. The HUMINT collector must
be thoroughly familiar with all documents that may set the legal
parameters for his collection operations. These are available through
the chain of command and from the SJA office. He must know how
these requirements apply and to what type of sources each is applied.
• Collection requirements. The HUMINT collector needs not only to
know but also to understand the requirements that he will be
attempting to answer. These requirements can include CCIRs (PIRs
and IRs), essential elements of friendly information (EEFIs),
Intelligence Priorities for Strategic Planning (IPSP), specific requests
from national level consumers such as HUMINT collection
requirements (HCRs), SDRs, or even vocal orders given by the local
commander. These all will determine the objective of the questioning
plan.
• Databases. Intelligence databases can give the HUMINT collector
detailed information about the source's unit, its organization, and its
capabilities. They also have information on personalities. The
HUMINT collector will use information obtained from databases to
control the source and assess his answers for truthfulness. They will
also give the HUMINT collector ideas of other areas to research. For
example, if the threat is primarily a lightly armed insurgent force,
studying similar organizations will provide the HUMINT collector with
valuable insights into the possible methods of operation of the current
target organization.
• SITMAP and COP. The current situation, both friendly and enemy, is
vital for the movement of the HCT and for its collection operations. It
reflects enemy unit identification, disposition, and boundaries; major
roads or trails for movement of personnel, equipment, weapons; and
locations of artillery, minefields, roadblocks, entrenchments, obstacles,
staging areas, NBC contaminated areas, and ground surveillance
devices. All of this information can be used in source questioning as
control questions or in otherwise determining source veracity. The
HUMINT collector will be able to identify indicators and predict what
should be PIRs and IRs.
• INTSUM. The INTSUM provides a summary of the intelligence
situation covering a specific period as dictated by the commander. It is
already analyzed intelligence.
• Intelligence estimate. The intelligence estimate is derived from the
intelligence preparation of the battlefield (IPB). It is based on all
available intelligence and considers everything of operational
significance. It will help point out gaps in the intelligence database. It
is from these gaps that requirements are derived. It will provide
information on the mission, AO, weather, terrain, enemy situation,
enemy capabilities, and conclusions. It will cover all of the standard
OB topics.
• Weapons and equipment guides. Weapons and equipment guides can
assist the HUMINT collector in becoming familiar with the type of
equipment employed in the AO. Guides are available in hardcopy and
softcopy. |
2-22.3 | 128 | FM 2-22.3 _________________________________________________________________________________
• Area handbooks. These handbooks provide detailed information about
a specific area of the world. They provide information on political,
economic, sociological, cultural, military, biographic, transportation,
and geographic topics. The CIA and other agencies publish area
handbooks annually. The US Department of State website also has
continuously updated information on trouble spots around the world.
• Previous HUMINT reporting. The HUMINT collector should
familiarize himself with all previous relevant reporting from the AO.
This will provide him with insight into current operations, the types of
information collected, and may help identify information gaps.
• Photographs, maps, and other geospatial products. In conducting
general research, the HUMINT collector should become familiar with
the AOs. This not only will help identify specific areas of HUMINT
collection potential but also will be invaluable in both the questioning
of specific sources and the maneuver of the HCT.
• Subject matter experts (SMEs) and technical research. Before
deploying to an AO or before supporting on a particular mission, the
HUMINT collector may identify particular areas in which he lacks
critical knowledge. For example, a HUMINT collector who has
previously been operating in an area with a conventional enemy may
be deployed to an area with an unconventional threat from irregular
forces. Also, intelligence requirements may focus on equipment that is
unfamiliar to the HUMINT collector. In order to prepare himself, the
HUMINT collector contacts SMEs or analysts or uses technical
materials to gain background information.
• Other reports. Intelligence agencies publish numerous reports and
summaries that are readily available to the HUMINT collector.
CLOSED AND OPEN-SOURCE INFORMATION (USE OF REACH)
7-5. Reach is a process by which deployed military forces rapidly access
information from, receive support from, and conduct collaboration and
information sharing with other units and organizations (deployed in theater
and from outside the theater) unconstrained by geographic proximity,
echelon, or command. Intelligence support is established based on
requirements that will help the commanders (regardless of echelon) make
decisions. Reach can be accomplished in various ways. There is no
requirement for all intelligence functional areas or echelons to use the same
approach; hence, there is no common standard for all units to use. Each
organization or section should develop its strategy on using the various
intelligence reach components. Standard enabling tools will provide for
easier access than ever before (for example, access to the INSCOM
Information Dominance Center). |
2-22.3 | 129 | _______________________________________________________________________________ FM 2-22.3 5
INTELLIGENCE REACH COMPONENTS
7-6. Intelligence reach requires the G2/S2 to develop a strategy on how best
to support the unit’s mission with intelligence reach capabilities. There are
eight basic elements of the strategy:
• Push: Push occurs when the producers of intelligence or information
are knowledgeable of the customer’s requirements and are able to send
the desired intelligence to the customer without further requests. Push
is accomplished through the Joint Dissemination System (JDS) and/or
the Automated Message Handling System (AMHS).
• Pull: Pull occurs when the customer is familiar enough with existing
databases to be able to anticipate the location of the desired
information. Pull is greatly enhanced through the use of portals and
homepages with hyperlinks to the various categories of information
available to the user. This requires the establishment of such a
homepage at each echelon, thus enabling higher echelons to research
and pull from lower databases and homepages.
• Database Access: Access to local, theater, DOD, non-DOD, and
commercial databases allows analysts to leverage stored knowledge on
topics ranging from basic demographics to OB information. A validated
DIA Customer Number (acquired by the J2/G2/S2) in combination with
SIPRNET and Joint Worldwide Intelligence Communications System
(JWICS) connectivity establishes access to most of the databases
online.
• Integrated Broadcast Services (IBS): IBS is an integrated, interactive
dissemination system, focusing on tactical user’s information
requirements using a common message Data Element Dictionary
(DED) and J-series family of message formats. The goal of IBS is to
resolve the uncoordinated proliferation of “stovepiped” intelligence or
information broadcasts by providing the tactical commander with
integrated time-sensitive tactical information.
• Collaborative Tools: Collaborative tools are computer-based tools
(groupware) that help individuals work together and share
information. They allow for virtual on-line meetings and data sharing.
As much as possible, collaborative tools should be emplaced with all
necessary echelons and centers prior to deployment.
• Request for Information: Reach includes the ability of an intelligence
officer at any level to request information that is beyond what is
available at his location, using the Community On-Line Intelligence
System for End Users and Managers (COLISEUM) System. Once an
RFI is entered into the system every other user of that system can see
it. Hence, an echelon several echelons above the actual requester can
and often does become aware of the request and may, in fact, answer it.
Reach is also provided through INSCOM’s Information Dominance
Center and other nodes at J2 and G2.
• Leveraging Collection Management: The collection and ISR
management system is established to provide a mechanism for tasking
and managing collection assets for required information. Analysts who
are trained and familiar with the system and the various tasking
procedures can leverage the system for refined information. |
2-22.3 | 130 | FM 2-22.3 _________________________________________________________________________________
• Distributed Common Ground System-Army (DCGS-A): DCGS-A is the
ISR fusion and processing system for the future, as part of the
overarching DOD-directed DCGS-A surface system family of systems.
It will bring national and joint ISR capabilities down to JTF level,
corps and division levels and BCT level to provide leaders with NRT
information and visualization of threat, weather, and terrain
information and intelligence. DCGS-A consolidates the capabilities of
the following current-force ground processing systems:
All-Source Analysis System (ASAS).
Counterintelligence and Human Intelligence (CI/HUMINT) Single-
Source Workstation.
Tactical Exploitation System (TES).
Guardrail Information Node (GRIFN).
Guardrail Common Sensor (GRCS) Intelligence Processing Facility
(IPF).
Prophet Control.
Joint STARS Common Ground Sensor (CGS).
7-7. For more information on Intelligence Reach, see FM 2-33.5/ST.
SOURCE-SPECIFIC RESEARCH
7-8. Source-specific research is done immediately prior to questioning the
source. The HUMINT collector may have to respond spontaneously in the
case of a walk-in source in tactical operations, or if the HUMINT collector
has advanced warning as in the case of a planned meeting with a source, a
long-term debriefing, or an invitational source. Areas of research include but
are not limited to––
• Screening Reports, KBs, Other Reports: Reports about the source not
only can provide specific information about the type of information the
source can provide to answer specific collection requirements but also
can give the HUMINT collector extensive background information
about the source. This background information can give clues to
information the source might possess and to possible approach
techniques. Information contained in screening reports and KBs may
provide insight into––
Geographic Area: This area may show information about the source’s
ethnic background, political affiliation, religion, and customs.
Information can be obtained from databases, locally registered vital
statistics, and residence registries.
Languages: Determining the languages and dialects spoken, written,
and understood by a source can provide valuable insights into that
source’s geographic and ethnic or tribal background, education, and
social status. This determination of languages and dialects can be
facilitated by the use of “flash cards” specific to the battlefield.
Other Reports: This can include other reports collected from this
source at other echelons or reports from other sources from the same
unit or location as the source. It can also include reports or
documents published by the ACE at your request. |
2-22.3 | 131 | _______________________________________________________________________________ FM 2-22.3 5
Political Group: This area can provide information on the source’s
beliefs as well as provide information on political leaders and goals.
Additionally, political affiliation can sometimes provide information
about subversive groups and paramilitary ties. Knowing the goals of
the political organization can also assist the HUMINT collector in
choosing an approach or establishing rapport.
Religious Affiliation: The source’s religious affiliation may provide
insight into his motivation, moral strengths and weaknesses, and
other motivational factors.
Technical Field: Having knowledge about the source’s technical field
can assist the HUMINT collector in deciding upon which questions
to ask. It will also assist the HUMINT collector in verifying the
source’s truthfulness because the HUMINT collector will have an
understanding of the source’s specialty.
Employment: By researching the source’s employment history, the
HUMINT collector can discover other areas of information that the
source may be able to provide.
Education: The source’s education level and educational history can
not only give the HUMINT collector insight into the possible
information the source can provide but also provide insight into
possible approach strategies.
Social Status: Knowledge of the source’s social status may provide a
clue to a good approach strategy because the source may be
accustomed to a certain type of treatment. It may also provide a clue
to biographical information that the source may be able to provide.
Criminal Records: Criminal records may also indicate possible
approach strategies. Additionally, they may indicate which groups or
organizations the source may have knowledge about.
• Documents and Other Media Captured on or in Immediate Association
with a Detainee or Brought in by a Debriefing Source: Documents
captured with or otherwise pertaining to the source may give the
HUMINT collector information about the source, his unit, or his role
within that unit. They may answer requirements or indicate
knowledge of PIRs. Personal letters, for example, could be used during
the approach phase. If a source comes in voluntarily and provides
documents, they should be reviewed prior to debriefing the source.
• Photographs, Maps, and Other Geospatial Products: Maps and
photographs of the area about which the source is being questioned can
give the HUMINT collector an idea of where the source has been and
in what kind of terrain he operated, which might indicate knowledge or
use of certain tactics. If the HUMINT collector is not familiar with the
area the source was in, the HUMINT collector should take some time
to look over the map so he can more readily relate when the source
mentions locations or dispositions. Aerial photographs show more
detailed up-to-date information than maps. They will not normally be
as readily available as maps. Maps and other geospatial products will
also be needed for use in the map-tracking portion of an interrogation.
The HUMINT collector should work with the ACE of the supported
unit to obtain them for the AO. |
2-22.3 | 132 | FM 2-22.3 _________________________________________________________________________________
• SMEs: There will be occasions when the HUMINT collector will talk to
sources about subjects of which the HUMINT collector has no
knowledge. In that case, the HUMINT collector will want to talk to
personnel who are SMEs. Depending on the depth of knowledge that
the source is expected to have and the time available to prepare, the
HUMINT collector may arrange for a technical expert to support the
questioning (see Chapter 9).
• Technical Manuals: There are various weapon and equipment
identification guides available in hardcopy, softcopy, and off the
Internet that can assist the HUMINT collector in identifying any
equipment mentioned by the source.
• Source Physical and Mental Condition: HUMINT collectors should
observe the source prior to questioning if possible and also talk to
anyone available who has relevant information concerning the source.
MP guards can be an especially valuable source of information based
on source observation and should be debriefed periodically. This can
prevent surprises at the onset of the questioning session and can help
the HUMINT collector assess the source’s physical and mental
condition as well as provide insights to possible approaches.
• Databases: Collectors should review source information and reports
contained in the various databases available to them. The CHATS
system, BAT database, and other databases can provide collectors with
source information and previous reporting.
HUMINT COLLECTION PLAN
7-9. After conducting appropriate research, the HUMINT collector working
with an analyst, if available, develops a source-based collection plan. This is
geared to the specific source that is going to be questioned. The amount of
time spent in preparing this plan depends on the operational circumstances.
This may range from a quick mental review by an experienced HUMINT
collector in a tactical environment to a formal written plan submitted by a
subordinate to a team leader. The source collection plan will vary from source
to source. It will also vary with the conditions under which the source is
questioned. It serves as a checklist to ensure that all steps necessary to
prepare for questioning are conducted. Whether written or oral, the
HUMINT collection plan should contain at least the following items:
• HUMINT collection requirements.
• Serial number of EPW/detainee to be questioned.
• Location and time for the questioning.
• Primary and alternate approaches.
• Questioning plan including topics to be covered and the planned
sequence of these topics.
• Prepared questions for unfamiliar or highly technical topics.
• Method of recording and reporting information obtained. |
2-22.3 | 133 | _______________________________________________________________________________ FM 2-22.3 5
OBJECTIVE
7-10. The HUMINT collector will first determine the objective of his
questioning. The objective is the set of collection requirements that the
HUMINT collector will attempt to satisfy during the questioning session. A
number of circumstances including the intelligence requirements, the time
available, and the source will set the objective. Determining the objective
consists of three parts:
• Identify the intelligence requirements. The primary objective of any
questioning session is to answer or confirm PIR or other collection
requirements.
• Identify the subject: The HUMINT collector will want to consider the
source; for example, who he is, what he may know. The HUMINT
collector will also want to consider the legal and other restrictions
based on the type of source (contact source, EPW, refugee, strategic).
For a military source (EPW) this includes rank, position specialty, and
unit of assignment. For a civilian source it includes job, placement and
access, associations, area of residence, and employment.
• Identify the intelligence requirements that the source may be able to
answer. The HUMINT collector cannot normally waste time “fishing”
for information. He must determine based on screening, what
collection requirements the source can answer. The HUMINT collector
compares the information that he gathered through his general and
source-specific research and compares it to his list of collection
requirements. He compares that list to the identity of the source and
refines the list including all requirements that the source can be
expected to be able to answer. The HUMINT collector will approach
those areas first while staying aware of leads into other collection
topics.
LOCATION
7-11. In most cases, the location for the questioning will be determined by
operational requirements. However, the HUMINT collector should ensure
some basic requirements are met:
• Each questioning session should be conducted outside the hearing and
view of third parties. Even in the case of a source meeting in a public
place, the HUMINT collector should choose a location where they
cannot be overheard and where their meeting will not arouse
suspicion.
• The location should be in a place that has reasonable security for the
HUMINT collector and the source. In contact operations, the risk
cannot always be eliminated but the acceptable risk levels should be
based on the expected intelligence gain. In combat operations, most
questioning (interrogation, debriefing of civilians on the battlefield)
will take place in forward combat areas, but it cannot be done if it
increases the risk to the source. Safe evacuation of the sources has
priority over questioning.
• The location should provide ready access to the chosen method of
recording and reporting the information. |
2-22.3 | 134 | FM 2-22.3 _________________________________________________________________________________
7-12. When conducting military source operations, the location of the
questioning will have psychological effects on the source. The questioning
location should be chosen and set up to correspond to the effect that the
HUMINT collector wants to project and his planned approach techniques.
For example, meeting in a social type situation such as a restaurant may
place the source at ease. Meeting in an apartment projects informality while
meeting in an office projects more formality. Meeting at the source’s home
normally places him at a psychological advantage, while meeting in the
HUMINT collector’s work area gives the collector a psychological edge. The
HUMINT collector should consider the status and level of the source,
security, the workspace available, furnishings, the amount of lighting
provided, and the ability to heat or cool the room as needed.
TIME
7-13. Time to conduct questioning should be estimated based on the source,
the type of information that the HUMINT collector expects to get, and the
complexity of that information. Other considerations include expected
evacuation times for sources in tactical situations, the number of other
sources that need to be spoken to; and in contact operations, the estimated
time that the HUMINT collector can meet with the source without increasing
the risk.
7-14. The HUMINT collector must also consider the physical conditions of
the source and himself. After extended operations, there may be a limit on
how long either the HUMINT collector or source can concentrate on a given
subject. Even if the HUMINT collector has an unlimited time period (such as
at a joint interrogation and debriefing facility), he must break his
questioning down into topical sessions to maximize effectiveness. Time is
only an estimate and should be modified based on the circumstances. It may
be extended, for example, if the source has a greater than expected amount of
information, or critical information in unforeseen areas. The time may be
curtailed if the HUMINT collector has met his requirements, the source does
not possess the expected information, or a more valuable source is identified.
PRIMARY AND ALTERNATE APPROACHES
7-15. In most circumstances, if the HUMINT collector is meeting with the
source for the first time, he should select at least two alternate approaches to
use if the direct approach is unsuccessful (see Chapter 8). These approaches
need to be based on the HUMINT collector's source-specific research, his
general area research, knowledge of the current situation, and knowledge of
human nature. There are four primary factors that must be considered when
selecting tentative approaches:
• The source's mental and physical state. Is the source injured, angry,
crying, arrogant, cocky, or frightened?
• The source's background. What is the source's age and level of military
or civilian experience? Consider cultural, ethnic, and religious factors.
• The objective of the HUMINT collection. How valuable is the source’s
potential information? Is it beneficial to spend more effort convincing
this source to talk? |
2-22.3 | 135 | _______________________________________________________________________________ FM 2-22.3 5
• The HUMINT collector himself. What abilities does he have that can
be brought into play? What weaknesses does he have that may
interfere with the HUMINT collection? Are there social or ethnic
barriers to communication? Can his personality adapt to the
personality of the source?
7-16. If the HUMINT collector has a screening sheet or KB, he can use it to
help select his approaches. After reviewing the information, the HUMINT
collector will analyze the information for indicators of psychological and/or
physical weakness that would make a source susceptible to a specific
approach. The HUMINT collector also needs to consider his particular
strengths and weaknesses in conducting specific approaches. He must
consider what immediate incentives he may possibly need and ensure that
they are available. Also, if incentives had been previously offered or
promised, the collector needs to know if they were in fact provided. If the
HUMINT collector has previously questioned the source, he must evaluate
the approaches he used and decide if they need to be modified or if additional
approach techniques will be needed (see Chapter 8.)
ADDITIONAL SUPPORT REQUIRED
7-17. The HUMINT collector must decide if he will need technical support to
include interpreter support.
• Technical support. The HUMINT collector must decide if he will need
additional support including analytical, technical, or interpreter
support.
• Analytical or technical support. The HUMINT collector must decide if
he has the analytical or technical capability to question a specific
source. If not, he must decide what degree of support from advice to
participation is required of the analyst or technical expert. Any request
for analytical or technical support must be coordinated with the 2X. On
rare occasions, it may be desirable for the HUMINT collector to seek
polygraph support or support from a Behavioral Science Consultant
(BSC). BSCs are authorized to make psychological assessments of the
character, personality, social interactions, and other behavioral
characteristics of interrogation subjects and advise HUMINT collectors
of their assessments, as needed.
• Interpreter support. If the HUMINT collector does not speak the
needed language or does not speak the needed language well enough to
conduct questioning, an interpreter will be required. If the HUMINT
collector will need an interpreter, the HUMINT collector will also have
to consider the clearance needed to complete the questioning and the
availability of the interpreter, as well as the extra time necessary to
complete the questioning session. The HUMINT collector will also have
to brief the interpreter on the method of interpretation and the
HUMINT exploitation plan. Also, he should determine whether there
are any cultural aspects associated with the interpreter that may
enhance or detract from the success of the meet. (See Chapter 11 for
detailed information on HUMINT collection using an interpreter.) |
2-22.3 | 136 | FM 2-22.3 _________________________________________________________________________________
DEVELOP A QUESTIONING PLAN
7-18. The HUMINT collector must develop a plan that will guide his
questioning of the source. This includes general topics to be exploited and the
sequence in which they will be covered.
7-19. There are two general sequences used in questioning: topical and
chronological.
• Topical questioning is used when time is a prime concern, when the
source is believed to possess key information in a limited area, when
the questioning is concerning a technical topic, or when the source has
been talked to previously and this is a subsequent questioning to
expand on earlier topics.
• Chronological questioning normally is used when the HUMINT
collector is uncertain of the areas of source knowledge, when time is
not a factor in questioning, during initial questioning when the source
is believed to have knowledge on a large number of topics, and in
friendly force mission debriefing.
7-20. A topical sequence is an outline of topics to be questioned in a selected
sequence and is based on intelligence requirements or HCRs, as well as a
specific source’s potential to provide information pertinent to those
requirements. The plan serves as a checklist for the HUMINT collector to
ensure that all subjects pertinent to the collection objective are questioned in
an efficient and organized manner. The HUMINT collector uses his estimate
of the type and extent of knowledge possessed by the source to modify the
basic topical sequence of questioning. He selects only those topics in which he
believes the source has pertinent knowledge. In this way, the HUMINT
collector refines his element's overall objective into a set of specific HUMINT
collection subjects. In OB factors questioning in either a tactical or strategic
setting, and across the full spectrum of operations, the topics covered include
missions and the nine major OB factors:
• Composition.
• Strength.
• Dispositions.
• Tactics.
• Training.
• Combat effectiveness.
• Logistics.
• Electronic technical data.
• Miscellaneous.
7-21. See Appendix G for questioning quick reference examples of topics
covered under the nine OB factors.
7-22. In strategic and operational debriefing operations the relevant HCR or
SDR will guide the HUMINT collector. Regardless of which tasking
document is referenced, the topical sequence is established by collection
requirements, modified or sequenced, based on source knowledge and time.
7-23. The nine OB factors are not the only guideline that may be used by the
HUMINT collector. If the collection objective is something other than a |
2-22.3 | 137 | _______________________________________________________________________________ FM 2-22.3 5
military unit, many of the OB factors will not fit the collection plan. A helpful
memory aid, in this case, is mission, identification, location, and organization
(MILO). MILO gives a short, easily remembered structure for questioning
nonmilitary or strategic topics. The MILO factors can be questioned in any
order, but often the most logical sequence of MILO questioning is
identification, organization, location, and mission. Many of the nine OB
factors can also fit into the MILO format.
IDENTIFY MEANS OF RECORDING AND REPORTING
7-24. The HUMINT collector will want to decide upon a means of recording
the information obtained through source questioning. If the HUMINT
collector is planning to use a sound or video recorder, he will also have to
consider the availability of the equipment and its positioning (see Chapter 9).
Along with the method of recording the information, the HUMINT collector
will have to decide on the means of reporting the information (see Chapter
10). Tapes of interrogations must be safeguarded in accordance with DOD
Regulation 5200.1-R.
FINAL PREPARATIONS
7-25. After the source-specific questioning plan is developed, the HUMINT
collector takes some final preparatory steps.
• Review plan. The HUMINT collector should always go over his
collection plan with his supervisor. This review can be written or oral.
In addition to the obvious requirements to keep the chain of command
informed, this review helps identify any weaknesses in the plan and is
a means to effect required coordination and support.
• Collect questioning support materials. The HUMINT collector will
want to collect the various references and other guides that he will use
to support his questioning. These materials may include source
documents, maps, aerial photographs, imagery, OB data, extra lights,
extra tables, drawing templates, graph paper, questioning guides,
technical reference manuals, city plans and handbooks, and recording
devices.
• Conduct required coordination. The HUMINT collector coordinates any
support requirements including analytical, technical, or interpreter
support, questioning location, ICFs, recording equipment, security, and
transportation.
• Organize. The HUMINT collector organizes his materials in a logical
manner that will complement his topical sequence. By being organized,
the HUMINT collector will not waste time trying to locate the correct
manual or guide. Additionally, the HUMINT collector will present a
professional appearance to his source.
• Reconnoiter the questioning location. If the questioning location is to
be somewhere other than the HUMINT collector's normal AO, such as
a public restaurant, the HUMINT collector should conduct an
unobtrusive reconnaissance of the site. If at all possible, this should be
at the same time and day of the week as the planned meeting. This
allows the HUMINT collector to assess the possible security problems |
2-22.3 | 138 | FM 2-22.3 _________________________________________________________________________________
of the location, judge the traffic flow, and identify any other items that
might affect the questioning. He can also judge where within the
meeting site he can set up for maximum security and psychological
advantage. He must be careful that in doing so he does not set up
patterns of operation that will increase rather than decrease security
problems.
• Set up questioning site. If the HUMINT collector has control over the
site where the collection is being conducted, the last step in preparing
is the actual setup of the questioning site. The HUMINT collector will
want to decide on the placement of the furniture and lighting and
where everyone will be seated and decide where he will place his
technical support materials.
• Question guards. If the person to be questioned is a detainee, the
HUMINT collector should arrange to question MP guards who have
been in contact with the detainee to ascertain source behavior,
attitude, and other useful information that guards may be able to
provide.
• Check with medical personnel. If the detainee was injured or ill,
ensure that he was treated by medical authorities and released for
questioning.
7-26. The supervisor reviews each plan for legal considerations, appropriate
goals in accordance with the collection objectives of the supported unit, and
makes any changes he thinks are necessary. The supervisor ensures that
contract interrogators are utilized in accordance with the scope of their
contract and current policy. (See Appendix K.) After the plan is approved, the
collection operation is executed. Prior to execution, the supervisor ensures
mission brief back, rehearsal, and pre-combat inspections are conducted. |
2-22.3 | 139 | FM 2-22.3
Chapter 8
Approach Techniques and Termination Strategies
8-1. Regardless of the type of operation, the initial impression that the
HUMINT collector makes on the source and the approach he takes to gain
the source’s cooperation will have a lasting effect on the continuing
relationship and the degree of success in collecting information. The
approach used will vary based on the type of operation; the operational
environment; the status of the source; the personality, position, and identity
of the source; and the personality and experience level of the HUMINT
collector and the time available.
8-2. The MPs will not take any actions to set conditions for interrogations
(for example, “softening up” a detainee). Additionally, in accordance with
DOD Directive 3115.09, military working dogs, contracted dogs, or any other
dog in use by a government agency shall not be used as a part of an
interrogation approach nor to harass, intimidate, threaten, or coerce a
detainee for interrogation purposes. Leadership throughout the chain of
command is responsible to ensure that HUMINT operations are in
compliance with these governing regulations and guidelines, whether the
HUMINT collection is to take place as part of HCT operations or in an
internment facility.
8-3. The only authorized interrogation approaches and techniques are those
authorized by and listed in this manual, in accordance with the Detainee
Treatment Act of 2005. Two approaches, Mutt and Jeff and False Flag,
require approval by the first O-6 in the interrogator’s chain of command. The
restricted interrogation technique “Separation” requires COCOM commander
approval for use, and approval of each interrogation plan using “Separation”
by the first General Officer/Flag Officer (GO/FO) in the chain of command.
Coordination may also be required with the C/J/G2X, security, legal, or other
personnel. Regardless of the coordination efforts required, use of all
techniques at all locations must carefully comply with this manual and
additional instructions contained in the latest DOD and COCOM policies.
NOTE: The word “source” will be used in this chapter to mean any person who is
the objective of the HUMINT collector’s approach, and is applicable in any
collection situation unless otherwise noted in the text. This use of the term
“source” is consistent with US Army Intelligence Center HUMINT collector
training.
APPROACH PHASE
8-4. During the approach phase, the HUMINT collector establishes the
conditions of control and rapport to facilitate information collection. The
approach begins with initial contact between the source and the HUMINT
collector. Extreme care is required since the success of the collection effort |
2-22.3 | 140 | FM 2-22.3 _________________________________________________________________________________
hinges, to a large degree, on the early development of the source’s willingness
to communicate. Interrogators must have a deep understanding of the
cultural norms, anomalies, and emotional triggers of the person being
interrogated in order to select appropriate approach strategies and to
interrogate effectively.
8-5. The HUMINT collector's objective during this phase is to establish a
relationship with the source that results in the source providing accurate and
reliable information in response to the HUMINT collector’s questions. The
HUMINT collector adopts an appropriate persona based on his appraisal of
the source but remains alert for verbal and non-verbal clues that indicate the
need for a change in the approach techniques. The amount of time spent on
this phase will depend mostly on the probable quantity and value of
information the source possesses, the availability of other sources with
knowledge on the same topics, and available time. At the initial contact, a
businesslike relationship should be maintained. As the source assumes a
cooperative attitude, a more relaxed atmosphere may be advantageous. The
HUMINT collector must carefully determine which of the various approach
techniques to employ.
8-6. Sources will cooperate with the HUMINT collector for various reasons
ranging from patriotic duty to personal gain, such as material gifts or money.
They may also respond to emotion or logic. Regardless of the type of source
and his outward personality, every source possesses exploitable
characteristics that, if recognized by the HUMINT collector, can be used to
facilitate the collection process. These characteristics may be readily
apparent or may have to be extrapolated from the source’s speech,
mannerisms, facial expressions, physical movements, involuntary responses
(perspiration, changes in breathing, eye movement), and other overt
indications that vary from source to source. From a psychological standpoint,
the HUMINT collector must be cognizant of the following behaviors. People
tend to—
• Want to talk when they are under stress and respond to kindness and
understanding during trying circumstances. For example, enemy
soldiers who have just been captured have experienced a significant
stress-producing episode. The natural inclination is for people to want
to talk about this sort of experience. If the EPW has been properly
segregated and silenced, the HUMINT collector will be the first person
the EPW has a chance to talk to. This is a powerful tool for the
collector to use to get the subject talking. The desire to talk may also
be manifested in refugees, DPs, and even local civilians when
confronted by an unsettled situation.
• Show deference when confronted by superior authority. This is
culturally dependent but in most areas of the world people are used to
responding to questions from a variety of government and quasi-
government officials.
• Operate within a framework of personal and culturally derived values.
People tend to respond positively to individuals who display the same
value system and negatively when their core values are challenged.
• Respond to physical and, more importantly, emotional self-interest.
This may be as simple as responding to material rewards such as extra |
2-22.3 | 141 | _________________________________________________________________________________FM 2-22.3
food or luxury items for their personal comfort or as complex as
responding to support in rationalizing guilt.
• Fail to apply or remember lessons they may have been taught
regarding security if confronted with a disorganized or strange
situation.
• Be more willing to discuss a topic about which the HUMINT collector
demonstrates identical or related experience or knowledge.
• Appreciate flattery and exoneration from guilt.
• Attach less importance to a topic if it is treated routinely by the
HUMINT collector.
• Resent having someone or something they respect belittled, especially
by someone they dislike.
8-7. HUMINT collectors do not "run" an approach by following a set pattern
or routine. Each approach is different, but all approaches have the following
in common. They—
• Establish and maintain control over the source and collection effort.
This does not necessarily equate to physical control. Rather it means
that the HUMINT collector directs the conversation to cover the topics
that are of interest to him. This may be overt in a debriefing or an
interrogation or subtle in an elicitation. In a very basic sense, the
HUMINT collector is in control if he is asking questions and receiving
answers. If the source is asking questions, refusing to answer
questions, or directing or attempting to direct the exchange, he is
challenging for control. If the source challenges this control, the
HUMINT collector must act quickly and firmly to reestablish control.
• Establish and maintain a rapport between the HUMINT collector and
the source. Rapport is a condition established by the HUMINT
collector that is characterized by source confidence in the HUMINT
collector and a willingness to cooperate with him. This does not
necessarily equate to a friendly atmosphere. It means that a
relationship is established and maintained that facilitates the
collection of information by the HUMINT collector. The HUMINT
collector may establish a relationship as superior, equal, or even
inferior to the source. The relationship may be based on friendship,
mutual gain, or even fear.
• Identify the source’s primary emotions, values, traditions, and
characteristics and use them to gain the source’s willing cooperation.
8-8. The successful application of approach techniques, coupled with
measures to ensure source veracity, results in the source providing accurate
information in response to the HUMINT collector’s requirements. The source
may or may not be aware that he is providing the HUMINT collector with
needed information. The approach does not end when the source begins
providing information but is reinforced as necessary throughout the
questioning. |
2-22.3 | 142 | FM 2-22.3 _________________________________________________________________________________
DEVELOPING RAPPORT
8-9. The basis of rapport is source confidence in the HUMINT collector,
which leads to a willingness to cooperate. Rapport does not necessarily mean
a friendly relationship, although that may be the case. It means an
establishment of a relationship in which the HUMINT collector presents a
realistic persona designed to evoke cooperation from the source. The source
responds with relevant, truthful information. Rapport is established during
the approach and must be maintained throughout the questioning of the
source. If the HUMINT collector has established good rapport initially and
then abandons the effort, the source would rightfully begin to question the
HUMINT collector’s sincerity and may cease answering questions.
BUILDING RAPPORT
8-10. Building rapport is an integral part of the approach phase. The
establishment of rapport begins when the HUMINT collector first encounters
the source. Depending on the situation, the HUMINT collector may introduce
himself to the source. In debriefing and liaison operations, this will normally
be the collector’s true name and affiliation. In elicitation, the requirement
and type of introduction depends on the operation. In interrogation
operations, the HUMINT collector normally will not introduce himself unless
he is laying the groundwork for an approach. If he does introduce himself,
normally he will adopt a duty position and rank supportive of the approach
strategy selected during the planning and preparation phase. The HUMINT
collector must select a rank and duty position that is believable based on the
HUMINT collector’s age, appearance, and experience. A HUMINT collector
may, according to international law, use ruses of war to build rapport with
interrogation sources, and this may include posing or “passing himself off” as
someone other than a military interrogator. However, the collector must not
pose as—
• A doctor, medic, or any other type of medical personnel.
• Any member of the International Committee of the Red Cross (ICRC)
or its affiliates. Such a ruse is a violation of US treaty obligations.
• A chaplain or clergyman.
• A journalist.
• A member of the US Congress.
8-11. The HUMINT collector should seek advice from his SJA concerning
representing himself as holding any other sensitive position.
8-12. A good source assessment is the basis for the approach and vital to the
success of the collection effort. The HUMINT collector continually assesses
the source to see if the approaches—and later the questioning techniques—
chosen in the planning and preparation phase will indeed work. Approaches
chosen in planning and preparation are tentative and based on the limited
information available from documents, guards, and personal observation.
This may lead the HUMINT collector to select approaches that may be totally
incorrect for obtaining this source's willing cooperation. Thus, careful
assessment of the source is critical to avoid wasting valuable time in the
approach phase. Whether the HUMINT collector is using reasoned argument |
2-22.3 | 143 | _________________________________________________________________________________FM 2-22.3
or emotion to get the source to cooperate, he must be convincing and
believable and appear sincere.
RAPPORT POSTURE
8-13. Unless there is rationale for acting otherwise, the HUMINT collector
will begin his interaction with the source in a businesslike manner. He will
be neither hostile nor overly friendly. Based on the tentative approaches
developed during planning and preparation and the verbal and physical clues
from the source, the HUMINT collector will modify this posture to facilitate
collection.
8-14. Based on planning and preparation, the HUMINT collector may decide
to adopt a stern posture. He presents himself as a person in a superior
position to the interrogation source and demands proper deference and
obedience by the interrogation source. In the case of an EPW this is
manifested by having the source remain at attention and address the
HUMINT collector as “Sir.” This can be effective in dealing with lower
ranking military personnel or members of oppressed ethnic, tribal, or
religious groups who are conditioned to respond to authority or civilians in
lower economic or social positions who are used to responding to directions
from various bureaucrats and civilian superiors. This posture can have
negative results since many persons in the positions mentioned above have
developed mechanisms for dealing with superiors that mostly involve giving
minimal information and agreeing with whatever the authority figure says.
8-15. In most cases, either initially or after the interrogation source has
begun answering questions, the HUMINT collector will adopt a more relaxed
or even sympathetic posture. The HUMINT collector addresses the
interrogation source in a friendly fashion, striving to put him at ease.
Regardless of the posture selected by the HUMINT collector, he must stay
detached emotionally while maintaining the appearance of total involvement
and stay within his adopted persona. The HUMINT collector must control his
temper at all times. He must not show distaste, disgust, or unease at
anything the source says unless that reaction is a planned part of the
approach strategy. He should not show surprise at anything that the
interrogation source says since it might undermine source confidence in the
HUMINT collector and their relationship.
8-16. The HUMINT collector must support his verbal approaches with
appropriate body language. Just as the HUMINT collector is observing the
source to identify non-verbal clues that support or contradict the verbal
message, the HUMINT collector is being scrutinized by the source to identify
the same clues. The techniques used in an approach are a totality of effort,
not just verbal conversation between the HUMINT collector and the source.
Body language is in many instances culturally dependent. Standing at a
given distance from an individual may be perceived as comforting in some
societies and hostile in others. The HUMINT collector must adapt his body
language to the culture in which he is working rather than expect the source
to adapt to his. |
2-22.3 | 144 | FM 2-22.3 _________________________________________________________________________________
APPROACH TECHNIQUES
8-17. The approaches listed are not guaranteed solutions for every situation.
Some individual approaches that may be suitable for one operating
environment, such as when conducting HUMINT contact operations, may be
ineffective in another, such as interrogation. Some will be successful with
one source and ineffective with another. In any case, everything the
HUMINT collector says and does must be in compliance with the applicable
law and policy under which the HUMINT collector is operating. Applicable
law and policy include US law; the law of war; relevant international law;
relevant directives including DOD Directive 3115.09, “DOD Intelligence
Interrogations, Detainee Debriefings, and Tactical Questioning”; DOD
Directive 2310.1E, “The Department of Defense Detainee Program”; DOD
instructions; and military execute orders including FRAGOs.
8-18. There are 18 approach techniques that can be employed on any
detainee regardless of status or characterization, including EPWs.
Additionally, there is one restricted interrogation technique called separation
(see Appendix M). Separation cannot be employed on EPWs. With the
exception of the direct approach, which may be effective by itself, approach
techniques are used in combination with other approaches and techniques.
Transitions from one approach to another must be smooth, logical, and
convincing.
DIRECT APPROACH
8-19. (Interrogation and Other MSO) Almost all HUMINT collection begins
with the direct approach. The exception to this is during elicitation
operations that by their very nature are indirect. In using the direct
approach, the HUMINT collector asks direct questions (see Chapter 9). The
initial questions may be administrative or nonpertinent but the HUMINT
collector quickly begins asking pertinent questions. The HUMINT collector
will continue to use direct questions as long as the source is answering the
questions in a truthful manner. When the source refuses to answer, avoids
answering, or falsely answers a pertinent question, the HUMINT collector
will begin an alternate approach strategy. The fact that the source is
answering questions does not preclude the HUMINT collector from providing
an incentive to reward the source and continue his cooperation as long as
that incentive does not slow down the collection. For example, a HUMINT
collector might offer the source coffee or cigarettes to reward his cooperation.
See Chapter 9 for the use of Repeat and Control questions in detecting
deception.
8-20. Statistics from interrogation operations in World War II show that the
direct approach was effective 90 percent of the time. In Vietnam and in
Operations URGENT FURY (Grenada, 1983), JUST CAUSE (Panama, 1989),
and DESERT STORM (Kuwait and Iraq, 1991), the direct approach was 95
percent effective. The effectiveness of the direct approach in Operations
ENDURING FREEDOM (Afghanistan, 2001-2002) and IRAQI FREEDOM
(Iraq, 2003) are still being studied; however, unofficial studies indicate that
in these operations, the direct approach has been dramatically less
successful. The direct approach is frequently employed at lower echelons
when the tactical situation precludes selecting other techniques, and where |
2-22.3 | 145 | _________________________________________________________________________________FM 2-22.3
the EPW’s or detainee's mental state is one of confusion or extreme shock.
However, the HUMINT collector must remember that just because a source
is answering a direct question does not mean he is being truthful.
INCENTIVE APPROACH
8-21. (Interrogation and Other MSO) The incentive approach is trading
something that the source wants for information. The thing that you give up
may be a material reward, an emotional reward, or the removal of a real or
perceived negative stimulus. The exchange of the incentive may be blatant or
subtle. On one extreme, the exchange may be a formal cash payment for
information during some contact operations while on the other extreme it
may be as subtle as offering the source a cigarette. Even when the direct
approach is successful, the HUMINT collector may use incentives to enhance
rapport and to reward the source for cooperation and truthfulness. The
HUMINT collector must be extremely careful in selecting the options offered
to a detainee source. He cannot deny the detainee anything that he is
entitled to by law.
8-22. The HUMINT collector also should not offer anything that is not in his
power to give. Although this might be expedient in the short term, in the long
run it will eliminate source cooperation. When asked to provide something
beyond his authority, the HUMINT collector can agree to help, check into, or
otherwise support the request without committing himself to its successful
accomplishment. HUMINT collectors must be cautious in the use of
incentives for the following reasons:
• There is an inherent suspicion of the truthfulness of “bought”
information. Sources may manufacture information in order to receive
or maintain an incentive. Sources may also “hold back” information in
the hopes of trading it at a later date for greater incentives. They may
also hold back information if the incentive is not immediately available
or guaranteed.
• The incentive must be believable and attainable. The incentive must be
within the capability of the HUMINT collector’s assumed persona to
achieve. For example, if the detainee was captured after killing a US
soldier, an incentive of release would not be realistic or believable.
Likewise, if the interrogator is presenting himself as being a “harmless
clerk” at the detention center, it would be unrealistic to expect a
detainee to believe that a clerk could arrange to have the detainee’s
girlfriend brought to visit him. Such a visit might be possible, but the
interrogator’s assumed persona would not seemingly provide him with
the authority to make it happen.
• The HUMINT collector must provide any promised incentive. A simple
promise of an incentive may be sufficient to obtain immediate
cooperation. If, however, the HUMINT collector does not follow
through on providing the incentive, he will lose credibility and rapport
with his source. This may end the cooperation of not only that source
but also possibly any potential source who has contact with that
source.
• The HUMINT collector may not state or even imply that the basic
human rights guaranteed by applicable national and international |
2-22.3 | 146 | FM 2-22.3 _________________________________________________________________________________
laws, regulations, and agreements will be contingent on a detained
source’s cooperation. An incentive for cooperation is viable only if the
HUMINT collector has or is perceived to have the authority to
withhold the incentive if the source is not cooperative. A HUMINT
collector cannot promise an EPW that he will be treated in accordance
with the GPW if he cooperates. This statement implies that the EPW
will not be treated properly if he does not cooperate. Since the EPW
must be treated in accordance with the GPW whether he cooperates or
not, the HUMINT collector will rapidly lose credibility.
EMOTIONAL APPROACHES
8-23. (Interrogation and Other MSO) Emotional approaches are centered on
how the source views himself and his interrelationships with others. Through
source observation and initial questioning, the HUMINT collector can often
identify dominant emotions that motivate the EPW/detainee. The motivating
emotion may be greed, love, hate, revenge, or others. The emotion may be
directed inward (feelings of pride or helplessness) or outward (love of family).
The HUMINT collector employs verbal and emotional ruses in applying
pressure to the source’s dominant emotions. He then links the satisfaction of
these emotions to the source’s cooperation. Often, the presentation of like
experiences and presenting the source with an opportunity to express his
emotions is sufficient to result in cooperation. However, sometimes the
source must be presented with a specific action or tangible manifestation of
support.
8-24. Although the emotion is the key factor, an emotional approach is
normally worthless without an attached incentive. The incentive must meet
the criteria listed above for the incentive approach to ensure that the
incentive is believable and attainable. For example, this technique can be
used on the EPW/detainee who has a great love for his unit and fellow
soldiers. Simply having the source express this emotion is not enough. After
the source expresses this emotion, the HUMINT collector can take advantage
of this by telling the EPW/detainee that by providing pertinent information,
he may shorten the war or battle in progress and save many of his comrades'
lives, but his refusal to talk may cause their deaths. This gives the source the
alternatives of facing the status quo or expressing love of comrades through
cooperating with the HUMINT collector.
8-25. Religion is an especially difficult topic to use in any emotional
approach. An approach using religion may encourage the source to be further
motivated by love, remorse, futility, or even pride to cooperate with the
interrogator. On the other hand, an approach using religion may also
encourage the source to end any rapport and cooperation with the
interrogator. Although it is acceptable to use religion in all interrogation
approaches, even to express doubts about a religion, an interrogator is not
permitted to denigrate a religion’s symbols (for example, a Koran, prayer rug,
icon, or religious statue) or violate a religion’s tenets, except where
appropriate for health, safety, and security reasons. Supervisors should
carefully consider the experience level of their subordinates before permitting
the use of religion in any interrogation approach. |
2-22.3 | 147 | _________________________________________________________________________________FM 2-22.3
8-26. Similarly, supervisors should question the appropriateness of
demeaning any racial group, including the source’s, to elicit an emotional
response during an interrogation approach.
8-27. One common danger to the use of emotional approaches is the
development of an emotional attachment on the part of the HUMINT
collector. It is natural that a source will develop an emotional attachment to
the HUMINT collector. The HUMINT collector will often foster this
attachment. However, it is vital the HUMINT collector not develop a
corresponding emotional attachment to the source. This problem normally
develops when a HUMINT collector has contact with one source or a group of
similar sources over an extended period of time. There is transference of the
source’s problems to the HUMINT collector. For example, HUMINT
collectors working in a refugee camp frequently begin to view the welfare of
the refugees as a greater concern than HUMINT collection. The HUMINT
collector, while developing emotion within the source, must act believably but
at the same time he must remain detached. He must remember that the
emotion is a means to an end (that is, information collection). Supervisors
must carefully observe HUMINT collectors for signs of this emotional
attachment to the source and take appropriate action ranging from
counseling to reassignment.
8-28. The following are types of emotional approaches.
Emotional Love Approach
8-29. (Interrogation and Other MSO) Love in its many forms (friendship,
comradeship, patriotism, love of family) is a dominant emotion for most
people. The HUMINT collector focuses on the anxiety felt by the source about
the circumstances in which he finds himself, his isolation from those he loves,
and his feelings of helplessness. The HUMINT collector directs the love the
source feels toward the appropriate object: family, homeland, or comrades. If
the HUMINT collector can show the source what the source himself can do to
alter or improve his situation or the situation of the object of his emotion, the
approach has a chance of success.
8-30. The key to the successful use of this approach is to identify an action
that can realistically evoke this emotion (an incentive) that can be tied to a
detained source’s cooperation. For example, if the source cooperates, he can
see his family sooner, end the war, protect his comrades, help his country,
help his ethnic group. A good HUMINT collector will usually orchestrate
some futility with an emotional love approach to hasten the source's reaching
the breaking point. In other words if the source does not cooperate, these
things may never happen or be delayed in happening. Sincerity and
conviction are critical in a successful attempt at an emotional love approach
as the HUMINT collector must show genuine concern for the source, and for
the object at which the HUMINT collector is directing the source's emotion.
The emotional love approach may be used in any MSO where the source’s
state of mind indicates that the approach may be effective. |
2-22.3 | 148 | FM 2-22.3 _________________________________________________________________________________
Emotional Hate Approach
8-31. (Interrogation and Other MSO) The emotional hate approach focuses
on any genuine hate, or possibly a desire for revenge, the source may feel.
The HUMINT collector must clearly identify the object of the source’s hate
and, if necessary, build on those feelings so the emotion overrides the source's
rational side. The source may have negative feelings about his country's
regime, immediate superiors, officers in general, or fellow soldiers. The
emotional hate approach may be used in any MSO where the source’s state of
mind indicates that the approach may be effective.
8-32. The emotional hate approach may be effective on members of racial or
religious minorities who have or feel that they have faced discrimination in
military and civilian life. The “hate” may be very specific. For example, a
source may have great love for his country, but may hate the regime in
control. The HUMINT collector must be sure to correctly identify the specific
object of the hate. The emotional hate approach is most effective with the
immature or timid source who may have had no opportunity up to this point
for revenge, or never had the courage to voice his feelings.
8-33. As in the emotional love approach, the key to the successful application
is the linking of the emotion with a tangible manifestation of that emotion.
The HUMINT collector must be extremely careful that he does not promise
anything that would be contrary to national or international law or US
interests or goals. For example, if an EPW feels he has been treated unfairly
in his unit, the HUMINT collector can point out that, if the source cooperates
and divulges the location of that unit, the unit can be destroyed, thus
affording the source revenge. But he cannot promise that the unit if attacked
would not be allowed to surrender or that the unit if it surrenders will be
treated badly.
8-34. The HUMINT collector must be careful that he does not assume that
casual negative comments equate to a strong hate. Many soldiers will make
negative comments against their army but will support and defend their
army against any “outsider.” The HUMINT collector should also not assume
generalities; for example, assuming that a member of an ethnic minority
hates the ethnic majority just because most ethnic minorities hate those in
the ethnic majority.
Emotional Fear-Up Approach
8-35. (Interrogation and Other MSO) Fear is another dominant emotion that
can be exploited by the HUMINT collector. In the fear-up approach, the
HUMINT collector identifies a preexisting fear or creates a fear within the
source. He then links the elimination or reduction of the fear to cooperation
on the part of the source. The HUMINT collector must be extremely careful
that he does not threaten or coerce a source. Conveying a threat may be a
violation of the UCMJ. The HUMINT collector should also be extremely
careful that he does not create so much fear that the source becomes
unresponsive. The HUMINT collector should never act as if he is out of
control or set himself up as the object or focal point of the source’s fear. If the
HUMINT collector acts in this manner, it is extremely difficult to then act as |
2-22.3 | 149 | _________________________________________________________________________________FM 2-22.3
the outlet for the fear. Supervisors should consider the experience level of
their subordinates before approving their use of this approach.
8-36. If there is a justifiable fear, the HUMINT collector should present it
and present a plan to mitigate it if the source cooperates (combination of
emotional and incentive approaches). For example, an EPW source says that
he will not cooperate because if he does his fellow prisoners will kill him or, if
a contact source says that if people find out he is cooperating, his family will
suffer. In these cases, the HUMINT collector can point out that the source
has already placed himself at risk and he or his family may suffer whether he
cooperates or not (justified fear). But if he cooperates, the HUMINT collector
will do his best to ensure that either no one will find out or that he will be
protected (incentive).
8-37. If there is no justified fear, the HUMINT collector can make use of non
specific fears. “You know what can happen to you here?” A fear-up approach
is normally presented in a level, unemotional tone of voice. For example, “We
have heard many allegations of atrocities committed in your area and anyone
that was involved will be severely punished” (non-specific fear). “If you
cooperate with me and answer all of my questions truthfully, I can make sure
you are not falsely accused” (incentive). The source should demonstrate some
indication of fear, whether verbal or non-verbal, prior to using this approach.
If a fear is pre-existing, the approach will work and is legal. If there is no
indication of fear, another approach should be considered.
8-38. It is often very effective to use the detainee’s own imagination against
him. The detainee can often visualize exactly what he is afraid of better than
the HUMINT collector can express it.
8-39. The “fear-up” approach is frequently used in conjunction with the
emotional love or hate approaches. For example, the HUMINT collector has
already established that a detainee source has a strong love of family but is
now separated from them. He may state, “I wonder how your family is
getting along without you?” (fear of the unknown). He then promises to allow
the detainee more than the minimum two letters a month required by the
GPW.
Emotional Fear-Down Approach
8-40. (Interrogation and Other MSO) The emotion of fear may dominate the
source to the point where he is unable to respond rationally to questioning,
especially in interrogation sources. However, the fear-down approach may be
used in any MSO where the source’s state of mind indicates that it would be
an appropriate approach to use. In the fear-down approach the HUMINT
collector mitigates existing fear in exchange for cooperation on the part of the
source. This is not normally a formal or even voiced agreement. Instead, the
HUMINT collector through verbal and physical actions calms the source.
Psychologically, the source then views the HUMINT collector as the protector
or the one who is providing the calm and wishes to help the HUMINT
collector in gratitude and in order to maintain the HUMINT collector as the
protector. When used with a soothing, calm tone of voice and appropriate
body language, a fear-down approach often creates rapport and nothing else
may be needed to get the source to cooperate. At times, however, the |
2-22.3 | 150 | FM 2-22.3 _________________________________________________________________________________
HUMINT collector must describe concrete actions that he will take in order
to remove the source’s fear.
8-41. Frequently the object of the fear is too traumatic for the source to face
directly. While calming the source, the HUMINT collector may initially ask
nonpertinent questions and avoid the subject that has caused the source's
fear. This develops rapport and establishes communication. The HUMINT
collector must remember that his goal is collecting information, not concern
with the psychological well being of the source. He will be concerned with the
latter only insofar as it helps him obtain the former. This approach technique
may backfire if allowed to go too far. After convincing the source he has
nothing to fear, the source may cease to be afraid and may feel secure enough
to resist the HUMINT collector's pertinent question.
Emotional-Pride and Ego-Up Approach
8-42. (Interrogation and Other MSO) The emotional-pride and ego-up
approach may be used in any MSO. It exploits a source's low self-esteem.
Many HUMINT sources including EPWs and other detainees, retained
persons, civilian internees, or refugees may suffer from low self-esteem and
feelings of helplessness due to their immediate circumstances. Others, such
as individuals or members of social or ethnic groups that have been
discriminated against or low-ranking members of organizations (including
the military), may also show low self-worth. In this technique, the source is
flattered into providing certain information in order to gain credit and build
his ego. The HUMINT collector must take care to use a flattering somewhat-
in-awe tone of voice, and speak highly of the source throughout this approach
while remaining believable. This should produce positive feelings on the
source's part as he receives desired recognition. The source will eventually
reveal pertinent information to solicit more favorable comments from the
HUMINT collector.
8-43. This technique can also be employed in another manner––by flattering
the source into admitting certain information in order to gain credit. For
example, while interrogating a suspected saboteur, the HUMINT collector
states: "This was a smooth operation. I have seen many previous attempts
fail. I bet you planned this. Who else but a clever person like you would have
planned it? When did you first decide to do the job?"
8-44. A variation of this approach can also be used on individuals with strong
egos. It is based on the premise that everyone likes to talk about what they
do best. The HUMINT collector shows interest in and asks the source to
explain an aspect of his job. The questioning begins with nonpertinent
aspects of the source’s job. The HUMINT collector displays interest and asks
increasingly technical and pertinent questions. For example, if the source is
an EPW who was a pilot, the HUMINT collector might begin by asking him
what it is like to fly. As the source talks about this, the collector
demonstrates interest and gradually uses questions to lead the conversation
to capabilities of specific aircraft, specific missions that the pilot has flown,
tactics, or whatever topic is a priority for collection. |
2-22.3 | 151 | _________________________________________________________________________________FM 2-22.3
Emotional-Pride and Ego-Down Approach
8-45. (Interrogation) The emotional-pride and ego-down approach is based on
attacking the source's ego or self-image. The source, in defending his ego,
reveals information to justify or rationalize his actions. This information may
be valuable in answering collection requirements or may give the HUMINT
collector insight into the viability of other approaches. This approach is
effective with sources who have displayed weakness or feelings of inferiority.
A real or imaginary deficiency voiced about the source, loyalty to his
organization, or any other feature can provide a basis for this technique.
8-46. The HUMINT collector accuses the source of weakness or implies he is
unable to do a certain thing. This type of source is also prone to excuses and
rationalizations, often shifting the blame to others. An example of this
technique is opening the collection effort with the question, "Why did you
surrender so easily when you could have escaped by crossing the nearby ford
in the river?" The source is likely to provide a basis for further questions or
to reveal significant information if he attempts to explain his surrender in
order to vindicate himself. He may give an answer such as, "No one could
cross the ford because it is mined."
8-47. The objective is for the HUMINT collector to use the source's sense of
pride by attacking his loyalty, intelligence, abilities, leadership qualities,
slovenly appearance, or any other perceived weakness. This will usually goad
the source into becoming defensive, and he will try to convince the HUMINT
collector he is wrong. In his attempt to redeem his pride and explain his
actions, the source may provide pertinent information. Possible targets for
the emotional-pride and ego-down approach are the source's—
• Loyalty.
• Technical competence.
• Leadership abilities.
• Soldierly qualities.
• Appearance.
8-48. There is a risk associated with this approach. If the emotional-pride
and ego-down approach fails, it is difficult for the HUMINT collector to
recover and move to another approach without losing his credibility. Also,
there is potential for application of the pride and ego approach to cross the
line into humiliating and degrading treatment of the detainee. Supervisors
should consider the experience level of their subordinates and determine
specifically how the interrogator intends to apply the approach technique
before approving the interrogation plan.
Emotional-Futility
8-49. (Interrogation and Other MSO) The emotional-futility approach is
generally used in an interrogation setting, but may also be used for other
MSO, if indicated by the source’s state of mind. In the emotional-futility
approach, the HUMINT collector convinces the source that resistance to
questioning is futile. This engenders a feeling of hopelessness and
helplessness on the part of the source. Again as with the other emotional
approaches, the HUMINT collector gives the source a “way out” of the |
2-22.3 | 152 | FM 2-22.3 _________________________________________________________________________________
helpless situation. For example “it is hopeless for your forces to continue
fighting because they can no longer get supplies, but you can help end the
war and their suffering.” When employing this technique, the HUMINT
collector must have factual information. The HUMINT collector presents
these facts in a persuasive, logical manner. He should be aware of and able to
exploit the source's psychological and moral weaknesses, as well as
weaknesses inherent in his society.
8-50. The futility approach is effective when the HUMINT collector can play
on doubts that already exist in the source's mind. Factual or seemingly
factual information must be presented in a persuasive, logical manner, and
in a matter-of-fact tone of voice. Making the situation appear hopeless allows
the source to rationalize his actions, especially if that action is cooperating
with the HUMINT collector. When employing this technique, the HUMINT
collector must not only have factual information but also be aware of and
exploit the source's psychological, moral, and sociological weaknesses.
Another way of using the futility approach is to blow things out of proportion.
If the source's unit was low on, or had exhausted, all food supplies, he can be
easily led to believe all of his forces had run out of food. If the source is
verging on cooperating, it may aid the collection effort if he is told all the
other sources have cooperated.
8-51. The futility approach must be orchestrated with other approach
techniques (for example, love of comrades). A source who may want to help
save his comrades' lives may be convinced the battlefield situation is hopeless
and they will die without his assistance. The futility approach is used to
paint a bleak picture for the prisoner, but it is not normally effective in and
of itself in gaining the source's cooperation.
Other Approaches
8-52. There are numerous other approaches but most require considerable
time and resources. Most are more appropriate for use with sources who are
detainees, but some, such as change of scenery, may have application for
elicitation or MSO.
8-53. We Know All. (Interrogation) In the “we know all” approach
technique, the HUMINT collector subtly convinces the source that his
questioning of the source is perfunctory because any information that the
source has is already known. This approach may be employed in conjunction
with the "file and dossier" technique or by itself. If used alone, the HUMINT
collector must first become thoroughly familiar with available data
concerning the source and the current situation. To begin the collection
effort, the HUMINT collector asks questions based on this known data.
8-54. When the source hesitates, refuses to answer, or provides an incorrect
or incomplete reply, the HUMINT collector provides the detailed answer
himself. The HUMINT collector may even complete a source's answer, as if
he is bored and just “going through the motions.” When the source begins to
give accurate and complete information, the HUMINT collector interjects
pertinent questions. Questions to which answers are already known are also
asked periodically to test the source's truthfulness and to maintain the
deception that the information is already known. There are some inherent |
2-22.3 | 153 | _________________________________________________________________________________FM 2-22.3
problems with the use of the "we know all" approach. The HUMINT collector
is required to prepare everything in detail, which is time consuming. He
must commit much of the information to memory, as working from notes may
show the limits of the information actually known. It is also only usable
when sufficient prior information exists to convince the source that “we know
all.”
8-55. File and Dossier. (Interrogation) The file and dossier approach is a
variation of the “we know all” approach. The HUMINT collector prepares a
dossier containing all available information concerning the source or his
organization. The information is carefully arranged within a file to give the
illusion that it contains more data than actually there. The file may be
padded with extra paper if necessary. Index tabs with titles such as
education, employment, criminal record, military service, and others are
particularly effective. It is also effective if the HUMINT collector is reviewing
the dossier when the source enters the room and the source is able to read his
name on the dossier and sees the numerous topics and supposed extent of the
files.
8-56. The HUMINT collector proceeds as in the “we know all” approach. He
refers to the particular labeled segment of the dossier before, during, or after
asking a question. In the early stages of questioning, the HUMINT collector
asks questions to which he has the answer. He may answer along with the
source, complete the information for the source, or even show the source
where the information is entered in the dossier. He never lets the source
physically handle the dossier. As the source becomes convinced that all the
information that he knows is contained within the dossier, the HUMINT
collector proceeds to topics on which he has no or little information. In doing
so, he still refers to the appropriate section of the dossier and may even nod
his head knowingly or tell the source that the information the source is
providing still matches what is in the dossier.
8-57. This technique has several limitations and drawbacks. The preparation
time in developing the dossier is extensive. The success of this technique is
largely dependent on the naiveté of the source, volume of data on the subject,
and skill of the HUMINT collector in convincing the source that the dossier is
more complete than it actually is. There is also the risk that a less naïve
source will refuse to cooperate, claiming that, if the collector already knows
everything, there is no need for him to talk. Also with this technique, the
HUMINT collector is limited in the method he may use to record new
information. If the HUMINT collector writes down information, it destroys
the illusion that all the information has already been obtained. The
HUMINT collector is normally limited to using electronic recording devices or
his memory. The HUMINT collector can also arrange ahead of time for
another interrogator or analyst to take notes for him, undetected by the
source. This could be especially effective in a situation where a separate
monitoring area (for oversight) is used by the analyst.
8-58. Establish Your Identity. (Interrogation) In using this approach, the
HUMINT collector insists the detained source has been correctly identified as
an infamous individual wanted by higher authorities on serious charges, and
he is not the person he purports to be. In an effort to clear himself of this |
2-22.3 | 154 | FM 2-22.3 _________________________________________________________________________________
allegation, the source makes a genuine and detailed effort to establish or
substantiate his true identity. In so doing, he may provide the HUMINT
collector with information and leads for further development. The HUMINT
collector should initially refuse to believe the source and insist he is the
individual wanted by the ambiguous higher authorities. This will force the
source to give even more detailed information in order to convince the
HUMINT collector he is who he says he is.
8-59. Repetition. (Interrogation) The repetition approach is used to induce
cooperation from a hostile source. In one variation of this approach, the
HUMINT collector listens carefully to a source's answer to a question, and
then repeats the question and answer several times. He does this with each
succeeding question until the source becomes so thoroughly bored with the
procedure, he answers questions fully and candidly to satisfy the HUMINT
collector and gain relief from the monotony of this method. The repetition
technique must be judiciously used, as it will generally be ineffective when
employed against introverted sources or those having great self-control. It
may also provide an opportunity for a source to regain his composure and
delay the collection effort. In this approach, the use of more than one
HUMINT collector or a tape recorder has proven effective.
8-60. Rapid Fire. (Interrogation) The rapid-fire approach is based upon the
principles that—
• Everyone likes to be heard when he speaks.
• It is confusing to be interrupted in mid-sentence with an unrelated
question.
8-61. This approach may be used by one, two, or more HUMINT collectors to
question the source. In employing this technique, the HUMINT collectors ask
a series of questions in such a manner that the source does not have time to
answer a question completely before the next one is asked. This confuses the
source, and he will tend to contradict himself as he has little time to
formulate his answers. The HUMINT collectors then confront the source with
the inconsistencies causing further contradictions. In many instances, the
source will begin to talk freely in an attempt to explain himself and deny the
HUMINT collector’s claims of inconsistencies. In this attempt, the source is
likely to reveal more than he intends, thus creating additional leads for
further exploitation. This approach may be orchestrated with the emotional-
pride and ego-down or fear-up approaches. Besides extensive preparation,
this approach requires experienced and competent HUMINT collectors, with
comprehensive case knowledge and fluency in the source's language.
8-62. Silent. (Interrogation) The silent approach may be successful when
used against either a nervous or confident source. When employing this
technique, the HUMINT collector says nothing to the source, but looks him
squarely in the eye, preferably with a slight smile on his face. It is important
not to look away from the source but force him to break eye contact first. The
source may become nervous, begin to shift in his chair, cross and re-cross his
legs, and look away. He may ask questions, but the HUMINT collector should
not answer until he is ready to break the silence. The source may blurt out
questions such as, "Come on now, what do you want with me?" When the
HUMINT collector is ready to break silence, he may do so with questions |
2-22.3 | 155 | _________________________________________________________________________________FM 2-22.3
such as, "You planned this operation for a long time, didn't you? Was it your
idea?" The HUMINT collector must be patient when using this technique. It
may appear the technique is not succeeding, but usually will when given a
reasonable chance.
8-63. Change of Scenery. (Interrogation and Other MSO) The change-of
scenery approach may be used in any type of MSO to remove the source from
an intimidating atmosphere such as an “interrogation” room type of setting
and to place him in a setting where he feels more comfortable speaking.
Bringing a source into a formal setting to conduct an interrogation or
debriefing has psychological implications. On the positive side, it places the
HUMINT collector in a superior position since he is operating on his “home
turf” and has set the conditions for the meeting. It allows the HUMINT
collector control over the immediate environment including the positioning of
the participants, to establish the desired atmosphere for the approach.
8-64. However, there are potential negative factors in the conduct of
questioning in an “Interrogation Room” environment. The source may be
intimidated and more guarded; he may consider the formal setting in terms
of an adversarial relationship; and he may limit his answers as a mode of
self-protection. In some circumstances, the HUMINT collector may be able to
invite the source to a different setting for coffee and pleasant conversation.
When removed from the formal environment, the source may experience a
feeling of leaving the interrogation behind. The perceived reduced pressure
may lower his guard and allow him to attach less significance to conversation
that occurs outside the formal setting, even though pertinent information is
still being discussed. During the conversation in this more relaxed
environment, the HUMINT collector steers the conversation to the topic of
interest. Through this somewhat indirect method, he attempts to elicit the
desired information. The source may never realize he is still being
questioned.
8-65. Mutt and Jeff. (Interrogation) The goal of this technique is to make
the source identify with one of the interrogators and thereby establish
rapport and cooperation. This technique involves a psychological ploy that
takes advantage of the natural uncertainty and guilt that a source has as a
result of being detained and questioned. Use of this technique requires two
experienced HUMINT collectors who are convincing actors. The two
HUMINT collectors will display opposing personalities and attitudes toward
the source. For example, the first HUMINT collector is very formal and
displays an unsympathetic attitude toward the source. He may, for instance,
be very strict and order the source to follow all military courtesies during
questioning. Although he conveys an unfeeling attitude, the HUMINT
collector is careful not to threaten or coerce the source. Conveying a threat of
violence is a violation of the UCMJ.
8-66. At the point when the interrogator senses the source is vulnerable, the
second HUMINT collector appears (having received his cue by a signal,
hidden from the source, or by listening and observing out of view of the
source), and scolds the first HUMINT collector for his uncaring behavior and
orders him from the room. The second HUMINT collector then apologizes to
soothe the source, perhaps offering him a beverage and a cigarette. He |
2-22.3 | 156 | FM 2-22.3 _________________________________________________________________________________
explains that the actions of the first HUMINT collector were largely the
result of an inferior intellect and lack of sensitivity. The inference is that the
second HUMINT collector and the source share a high degree of intelligence
and sensitivity.
8-67. The source is normally inclined to have a feeling of gratitude towards
the second HUMINT collector, who continues to show sympathy in an effort
to increase rapport and control for the questioning that will follow. If the
source’s cooperation begins to fade, the second HUMINT collector can hint
that he is a busy person of high rank, and therefore cannot afford to waste
time on an uncooperative source. He can broadly imply that the first
HUMINT collector might return to continue the questioning. The Mutt and
Jeff approach may be effective when orchestrated with Pride and Ego Up and
Down, Fear Up and Down, Futility, or Emotional Love or Hate.
8-68. Oversight Considerations: Planned use of the Mutt and Jeff
approach must be approved by the first O-6 in the interrogator’s chain of
command. The HUMINT collector must include as a part of the interrogation
plan—
• No violence, threats, or impermissible or unlawful physical contact.
• No threatening the removal of protections afforded by law.
• Regular monitoring of the interrogation shall be performed by
interrogation personnel.
8-69. False Flag. (Interrogation) The goal of this technique is to convince
the detainee that individuals from a country other than the United States
are interrogating him, and trick the detainee into cooperating with US forces.
For example, using an interrogator who speaks with a particular accent,
making the detainee believe that he is actually talking to representatives
from a different country, such as a country that is friendly to the detainee’s
country or organization. The False Flag approach may be effectively
orchestrated with the Fear Down approach and the Pride and Ego Up.
8-70. Oversight Considerations: The interrogation chain of command
must coordinate an interrogation plan that uses the False Flag approach
with the legal representative and the 2X, and receive approval from the first
O-6 in the interrogator’s chain of command for each specific use of the False
Flag approach.
• The use of the False Flag approach must complement the overall
interrogation strategy and other approach techniques listed in the
interrogation plan.
• When a HUMINT collector intends to pose as a national of a third-
party country, that country must be identified in the interrogation
plan.
• No implied or explicit threats that non-cooperation will result in harsh
interrogation by non-US entities.
• HUMINT collectors will not pose or portray themselves as any person
prohibited by this manual, paragraphs 8-10 and 8-11 (for example, an
ICRC representative). |
2-22.3 | 157 | _________________________________________________________________________________FM 2-22.3
8-71. Separation. See Appendix M, Restricted Interrogation Technique –
Separation.
Selecting an Approach
8-72. There often is insufficient information available to determine an
approach other than the direct approach. In this case where the source
answers questions but will not discuss pertinent issues, the HUMINT
collector may ask direct but nonpertinent questions to obtain sufficient
information to develop an approach strategy. This technique is also useful in
debriefing to establish rapport. Nonpertinent questions may include––
• Asking about immediate past events. This includes asking an EPW
about the circumstances of his capture or asking a refugee about the
circumstances concerning his arrival at the refugee point or
checkpoint. By doing this, the HUMINT collector can gain insight into
the source’s current state of mind and, more importantly, he can
ascertain his possible approach techniques.
• Asking background questions. This includes asking about the source's
family, work, friends, likes, and dislikes. These types of questions can
develop rapport and provide clues as to the source’s areas of knowledge
or reveal possibilities for incentives or emotional approaches.
• Considering what are culturally and socially acceptable topics of
discussion. For example, asking an Arab male about his wife could be
considered extremely rude, whereas not asking an American the same
question might be seen as insensitive.
Making Smooth Transitions
8-73. With the exception of the direct approach, no other approach is
effective by itself. HUMINT collectors use different approach techniques or
combine them into a cohesive, logical technique. Smooth transitions,
sincerity, logic, and conviction are needed to make a strategy work. HUMINT
collectors must carefully assess the source's verbal or nonverbal clues to
determine when a change in approach strategy is required. The HUMINT
collector must guide the conversation smoothly and logically, especially when
moving from one approach technique to another. Using transitional phrases
can make logical and smooth tie-ins to another approach. By using
nonpertinent questions, the HUMINT collector can move the conversation in
the desired direction and, as previously stated, sometimes can obtain leads
and hints about the source's stresses or weaknesses or other approach
strategies that may be more successful.
Recognizing Source Cooperation
8-74. Each source has a point where he will begin to cooperate and answer
questions. Some sources will begin answering questions completely and
truthfully with no preparation; others might require hours or even days of
work. The amount of time that a HUMINT collector spends on an approach
depends on a variety of factors. These include–– |
2-22.3 | 158 | FM 2-22.3 _________________________________________________________________________________
• The quality and criticality of the information believed to be possessed
by the source.
• The presence or absence of other sources that probably possess that
information.
• The number of HUMINT collectors and sources available.
• The LTIOV that the HUMINT collector is attempting to obtain.
8-75. The HUMINT collector needs to identify the signs that the source is
approaching or has reached the point of cooperation. For example, if during
the approach the source leans forward with his facial expression indicating
an interest in the proposal or is more hesitant in his argument, he is
probably nearing the point where he will cooperate. The HUMINT collector
must also be aware of the fact that a source can begin to cooperate in certain
areas while continuing to resist strongly in other areas. The HUMINT
collector should recognize the reason for refusal, overcome the objection, and
stress the benefit of cooperating (reinforce the approach). Once the HUMINT
collector determines the source is cooperating, he should interject pertinent
questions. If the source does not answer the question, the HUMINT collector
should continue with his approach or switch to an alternate approach
technique and continue to work until he again believes the source will
cooperate. If the source answers the pertinent question, the HUMINT
collector continues asking relevant questions until the questioning session is
completed.
8-76. If a cooperative source balks at answering a specific line of questions,
the HUMINT collector must assess the reason for the refusal. The HUMINT
collector may have arrived at a topic that the source finds particularly
sensitive. Other reasons that might cause a source to stop answering
questions are fatigue or unfamiliarity with the new topic. If this topic is
critical, the HUMINT collector may have to reinforce the previously
successful approach or may have to use a different approach.
APPROACH STRATEGIES FOR INTERROGATION
8-77. Interrogation does not mean a hostile relationship between the
HUMINT collector and the source. In fact, most interrogation sources (90
percent or more) cooperate in response to the direct approach. Unfortunately,
those sources who have the placement and access to make them high priority
sources are also the ones with the highest degree of security awareness. A
source who uses counter-interrogation techniques such as delaying, trying to
control the conversation, or interrogating the HUMINT collector himself
may––
• Be an intelligence trained soldier.
• Be survival, evasion, resistance, and escape (SERE) trained.
• Be a terrorist.
• Have been a detainee or previously incarcerated.
8-78. In stability and reconstruction operations and civil support operations,
detainees are often politically motivated and resistant to most approaches. |
2-22.3 | 159 | _________________________________________________________________________________FM 2-22.3
8-79. EPWs are normally vulnerable to basic incentive and emotional
approach techniques. Most EPWs are traumatized to various degrees by the
events preceding or surrounding their capture. They tend to be disoriented
and exhibit high degrees of fear and anxiety. This vulnerable state fades over
time, and it is vital for HUMINT collectors to interrogate EPWs as soon as
and as close to the point of capture as possible. The earlier that an EPW is
questioned the more likely he is to cooperate. And the earlier that he begins
to cooperate, the more likely he is to continue to cooperate. It is also vital
that the HUMINT collector be the first person that the EPW has a chance to
talk to. This means that proper silencing and segregation of the sources by
whoever is transporting them is an important part of a successful approach.
8-80. The vulnerability of civilian detainees to approach techniques available
to the HUMINT collector may be dependent on the exact nature of the
conflict. US HUMINT collectors are obligated to treat all detainees in
accordance with applicable law and policy. Applicable law and policy include
US law; the law of war; relevant international law; relevant directives
including DOD Directive 3115.09, “DOD Intelligence Interrogations,
Detainee Debriefings, and Tactical Questioning”; DOD Directive 2310.1E,
“The Department of Defense Detainee Program”; DOD instructions; and
military execute orders including FRAGOs. Detainees and, in particular,
EPWs are guaranteed certain rights and privileges. The HUMINT collector
may not take any action to remove, state that he will remove, or imply that
he will remove any guaranteed right if a detainee fails to cooperate. Under
the GPW, EPWs cannot be denied their rights or their privileges accorded
them by rank as guaranteed by the GPW. Privileges afforded to them,
however, which are not guaranteed by the Geneva Conventions or other
applicable law or agreements, may be withheld. (See Appendix A, Section I.)
Consult your SJA for questions concerning rights and privileges.
8-81. The HUMINT collector is frequently under a great deal of pressure to
“produce results.” This situation, coupled with the facts that the HUMINT
collector is dealing with threat personnel who may have been attempting to
kill US personnel just minutes before questioning and the fact that the
source is in a vulnerable state, leads to a tendency to use fear-up techniques.
This may, in some circumstances, be the proper approach; however, the
HUMINT collector must ensure that in doing so he neither loses control of
his own emotions nor uses physical or mental coercion.
APPROACH STRATEGIES FOR DEBRIEFING
8-82. Sources who are debriefed vary even more widely than those who are
interrogated. Since debriefing is the systematic questioning of individuals not
in the custody of the questioning forces, the HUMINT collector needs to
engender an atmosphere of cooperation and mutual benefit. Some sources for
debriefing include members of the friendly forces and local personnel.
HUMINT collectors often believe that approach techniques are not required
for friendly forces and that friendly forces should view debriefing as part of
their duties and in their own best interest. However, this is not necessarily
the case. |
2-22.3 | 160 | FM 2-22.3 _________________________________________________________________________________
8-83. Many people see debriefing as an interruption in their normal duties
and a waste of their time. HUMINT collectors must be sure to stay focused on
the purpose and goals of the debriefing. They should be businesslike and
must maintain the proper relationship with the source based on his rank and
position. The HUMINT collector should allow senior sources more latitude to
interpose their opinions and evaluations. A change of scene often facilitates
the debriefing of a high-level source since it removes him from his normal
distractions, such as the telephone, and allows him to concentrate on the
topics being discussed.
8-84. Refugees and DPs are subject to many of the same anxieties and
trauma that are experienced by EPWs or other detainees, with the added
benefit to the HUMINT collector that they normally have an obvious vested
interest in cooperating. Basic incentives usually are sufficient to induce their
willing cooperation. The emotional support that can be provided by the
HUMINT collector by simply listening and commiserating with their
hardship is often sufficient to gain cooperation. The emotional approaches
such as love of family and hate toward those who made them refugees are
strong motivators toward cooperation.
8-85. The approach techniques used in the questioning of local civilians are
probably the most difficult. The approach techniques chosen must take into
consideration the attitude of the local population toward the US and its
presence and cultural considerations. The local population must see their
cooperation as self-beneficial.
APPROACH STRATEGIES FOR ELICITATION
8-86. Elicitation is a sophisticated technique used when conventional
collection techniques cannot be used effectively. Of all the collection methods,
this one is the least obvious. However, it is important to note that elicitation
is a planned, systematic process that requires careful preparation. It is
always applied with a specific purpose in mind. This objective is the key
factor in determining the subject (which source to question), the elicitor, and
the setting. The subject will be selected based on access to or knowledge of
the desired information.
8-87. Before approaching the subject, it is necessary to review all available
intelligence files and records, personality dossiers, and knowledge possessed
by others who have previously dealt with the subject. This will help
determine the subject’s background, motivation, emotions, and psychological
nature. It also may require unobtrusive observation of the subject to
establish such things as patterns of activity and likes and dislikes. The
setting can be any number of social or official areas. It is important to note
that the source should be approached in his natural surroundings, as this
will diminish suspicion.
8-88. The key to elicitation is the establishment of a rapport between the
elicitor and the source, normally based on shared interests. In the initial
stages of an elicitation, the collector confines his conversations to innocuous
subjects such as sports and social commentary. Dependent on the value of the
source, the collection environment, and the security consciousness of the |
2-22.3 | 161 | _________________________________________________________________________________FM 2-22.3
source the initial stage could last from a few minutes to numerous seemingly
accidental meetings over a period of weeks or months. The HUMINT collector
will gradually shift the conversation to topics of collection interest but will be
prepared to return to more unthreatening topics based on negative reactions
on the part of the subject. Once a topic of interest has been introduced, the
HUMINT collector keeps the conversation going by asking for clarification
(for example, “I agree, however, what did you mean by….?”) or expressing a
hypothetical situation.
8-89. There are two basic elicitation approaches: mild flattery and
provocation.
• Mild Flattery: Most people like talking about their interests and like
talking to those who are knowledgeable and interested in the same
topics. People also like to speak to someone who values their opinion on
shared interests. The HUMINT collector takes advantage of this. The
HUMINT collector leads the conversation into areas that he wishes to
collect but does it in such a way that it appears to the source that the
source is leading the conversation. Above all in elicitation, the
HUMINT collector plays the role of the rapt, attentive, and inquisitive
listener.
• Provocation: This is a more dangerous approach and, if used too early
in an operation, can alienate the source. Once the HUMINT collector
has established shared interests with the source, he can selectively
challenge some of the source’s statements, encouraging the source to
provide more information in support of his view. The HUMINT
collector can also insert bits of actual information into the conversation
to cause the source to confirm and expound on the topic. Care must be
taken so as not to give away more information than is gained.
TERMINATION PHASE
8-90. When it is necessary or prudent, the HUMINT collector will terminate
the questioning of a particular source. Whatever the reason for terminating,
the HUMINT collector must remember there is a possibility that someone
may want to question the source at a later date. There are many reasons why
a HUMINT collector may want or need to terminate questioning:
• The source remains uncooperative during the approach phase.
• The collection objective cannot be met in one questioning session.
• The HUMINT collector fails to maintain rapport and loses control of
the questioning.
• The collection objectives have been satisfied.
• The HUMINT collector or the source becomes physically or mentally
unable to continue.
• Information possessed by the source is of such value that his
immediate evacuation to the next echelon is required.
• The HUMINT collector's presence is required elsewhere.
8-91. There are many ways to conduct a termination, but the following points
must be conveyed to the source: |
2-22.3 | 162 | FM 2-22.3 _________________________________________________________________________________
• The HUMINT collector should sincerely and convincingly reinforce
successful approaches. All promised incentives should be rendered.
• The source must be told the information he gave will be checked for
truthfulness and accuracy. His reaction to this statement should be
closely monitored. The exact form of this statement will be dependent
on the situation. It should not be done in a manner to alienate a
cooperative source.
• The source must be told that the same or another individual may
speak to him again. This sets the stage for future contacts.
• Any identification must be returned to the source. If the HUMINT
collector has other documents or belongings of the detainee (such as
letters or photographs), he will either return them to the detainee, if
appropriate, or will turn them over to the MP guard. Depending on the
circumstances and the legal status of the detainee, the MPs will retain
the detainee’s property and return the property to him at the end of his
internment.
• In a debriefing, the HUMINT collector will normally ask the source not
to discuss the subject of the questioning for his own protection. In
interrogation operations, the HUMINT collector normally coordinates
with the holding area guards to have the detainees who have been
interrogated kept separate from sources who have not yet been
interrogated if the situation allows. |
2-22.3 | 163 | FM 2-22.3
Chapter 9
Questioning
9-1. Questioning is one of the five phases of HUMINT collection. Developing
and using good questioning techniques enable the HUMINT collector to
obtain accurate and pertinent information and to extract the maximum
amount of information in the minimum amount of time. The HUMINT
collector must know when to use different types of questions.
GENERAL QUESTIONING PRINCIPLES
9-2. Questions should be presented in a logical sequence to avoid neglecting
significant topics. The HUMINT collector begins the questioning phase with
the first topic in the sequence he tentatively established as part of his
questioning plan. He obtains all of the source's pertinent knowledge in this
topical area before moving on to the next topic in his sequence. The only
exception is exploiting a hot lead, which is discussed in paragraph 9-21.
9-3. The HUMINT collector must at all times remember that his mission is
the rapid collection and dissemination of accurate information. He must not
allow himself to be sidetracked into nonpertinent discussions or debates nor
should he express distaste or value judgments on the information being
supplied unless that is a planned part of his approach technique. The
HUMINT collector uses vocabulary that is clear, unambiguous, and
understandable by the source. The source may not be on the same
intellectual level or have the same degree of education as the HUMINT
collector, so the HUMINT collector must adapt his questioning to the level of
the source. The source may also have specific technical knowledge, more
education and/or a higher intellectual level than the HUMINT collector. In
this case, the HUMINT collector normally relies on prepared questions or
technical support for his questioning. Without good systematic questioning
techniques, even the most cooperative source may provide only minimal
usable information.
DIRECT QUESTIONS
9-4. Direct questions are basic questions normally beginning with an
interrogative (who, what, where, when, how, or why) and requiring a
narrative answer. They are brief, precise, and simply worded to avoid
confusion. The HUMINT collector must consider the probable response of the
source to a particular question or line of questioning and should not, if at all
possible, ask direct questions likely to evoke a refusal to answer or to
antagonize the source. |
2-22.3 | 164 | FM 2-22.3 _________________________________________________________________________________
TYPES OF DIRECT QUESTIONS
9-5. The HUMINT collector must be able to use the following types of direct
questions:
• Initial, topical.
• Follow-up.
• Nonpertinent.
• Repeat.
• Control.
• Prepared.
Initial Questions
9-6. The HUMINT collector begins his questioning with the first topic in his
collection plan and asks all the basic questions necessary to cover the topic.
The answers to the basic questions will determine the requirements for
follow-up questioning. The initial questions are directed toward obtaining the
basic information on the topic. In other words, they are the “who, what,
where, when, how, and why” of each topic.
Follow-up Questions
9-7. Follow-up questions are used to expand on and complete the information
obtained from the initial questions. Often even if the initial question is a
well-constructed direct question, it will elicit only a partial answer. For
example, when asked, “Who is going to attack?” The source might say, “My
unit.” Follow-up questions are used to determine precisely what the source
means by “my unit” and what other units may also attack. The answer to
follow-up questions may lead to more follow-ups until the source’s knowledge
on a given topic is exhausted. At a minimum, upon receiving a positive
answer to an initial question, the HUMINT collector needs to ask “Who
(what, where, when, why, how) else?” For example, if the HUMINT collector
asks the source, “Who, in the local government is collaborating with the
insurgents?” and is told a name in response, he will ask follow-up questions
to determine all the required information about this individual and then will
ask, “Who else, in the local government is collaborating with the insurgents?”
This will continue until the source’s knowledge in this area is exhausted.
Nonpertinent Questions
9-8. Nonpertinent questions are questions that do not pertain to the
collection objectives. They are used to conceal the collection objectives or to
strengthen rapport with the source. They are essential when the collector is
using the elicitation technique. Nonpertinent questions may be used to gain
time for the HUMINT collector to formulate pertinent questions and may
also be used to break the source's concentration, particularly, if the HUMINT
collector suspects the source is lying. It is hard for a source to be a convincing
liar if his concentration is frequently interrupted. |
2-22.3 | 165 | _________________________________________________________________________________FM 2-22.3
Repeat Questions
9-9. Repeat questions ask the source for the same information obtained in
response to earlier questions. They are a method to confirm accuracy of
important details such as place names, dates, and component parts of
technical equipment and to test truthfulness. Repeat questions should not be
exact repetitions of an earlier question. The HUMINT collector must
rephrase or otherwise disguise the previous question. The repeat question
also needs to be separated in time from the original question so that the
source cannot easily remember what he said. Repeat questions may also be
used to develop a topic the source had refused to talk about earlier.
Control Questions
9-10. Control questions are developed from recently confirmed information
from other sources that is not likely to have changed. They are used to check
the truthfulness of the source's responses and should be mixed in with other
questions throughout the questioning. If a source fails to answer a control
question as expected, it may be an indicator that he is lying. However, there
are other possible explanations. The source—
• Could have misunderstood the question.
• Could be making up information in order to please the questioner
and/or receive a promised incentive.
• Could have answered the question truthfully to the best of his ability,
but his information could be wrong or outdated.
• May be correct and the information that the control question was
based on is no longer true.
9-11. It is the responsibility of the HUMINT collector to determine, through
follow-up questions, which of the possibilities is the case. The HUMINT
collector should also consult with the HAT for assistance in verifying the
source reporting through all-source analysis.
Prepared Questions
9-12. Prepared questions are questions developed by the HUMINT collector,
normally in writing, prior to the questioning. Prepared questions are used
primarily when dealing with information of a technical nature or specific
topic, which requires the HUMINT collector to formulate precise and detailed
questions beforehand. The HUMINT collector may have to research
analytical or technical material or contact SMEs to assist him in preparing
questions. HUMINT collectors must not allow the use of prepared questions
or any limitations to their education or training to restrict the scope and
flexibility of their questioning. In many instances, the HUMINT collector
should have an analyst or technical expert “sit in” on the questioning as well.
9-13. The HUMINT collector must be able to use the different types of
questions effectively. Active listening and maximum eye-to-eye contact with
the source will provide excellent indicators for when to use follow-up, repeat,
control, and nonpertinent questions. The HUMINT collector must use direct
and follow-up questions to fully exploit subjects pertinent to his interrogation
objectives. He should periodically include control, repeat, and nonpertinent |
2-22.3 | 166 | FM 2-22.3 _________________________________________________________________________________
questions in order to check the truthfulness and consistency of the source's
responses and to strengthen rapport.
TYPES OF QUESTIONS TO AVOID
9-14. When using the questioning methodologies of interrogation, HUMINT
collectors should avoid using negative, compound, or vague questions.
Leading questions are usually to be avoided, but some special questioning
techniques, such as use of a polygraph, require the use of leading questions.
Leading Questions
9-15. Leading questions are questions that are constructed so as to require a
yes or no answer rather than a narrative response. They generally begin with
a form of the verb “to be” (such as “is,” “was,” “were,” “will,” “are”). For
example, “Is the mayor working with the insurgents?” Leading questions
should generally be avoided for the following reasons:
• They make it easier for the source to lie since the source only provides
minimal information.
• It takes longer to acquire information.
• A source, particularly one that is frightened or trying to get an
incentive, will tend to answer in the way that he thinks the HUMINT
collector wants him to answer.
9-16. Although normally avoided during questioning, an experienced
HUMINT collector may use leading questions when the technical nature of
the subject matter or the specific information needed leaves no alternatives.
Leading questions can be used to—
• Verify specific facts.
• Pinpoint map locations.
• Confirm information obtained during map tracking.
• Transition from one topic area to another.
Negative Questions
9-17. Negative questions are questions that contain a negative word in the
question itself such as, "Didn’t you go to the pick-up point?” If the source
says “yes,” the HUMINT collector is faced with the question of whether he
means “yes, I went to the pick-up point” or “yes, I didn’t go to the pick-up
point.” When the source answers, the HUMINT collector cannot be sure
what the answer means; therefore, he must ask additional questions. This
can be particularly confusing when working with an interpreter. Other
cultures may interpret a negative question in a way other than what the
HUMINT collector meant. Negative questions should never be used during
questioning unless they are being used deliberately during the approach to
make the source appear to contradict himself. In other instances, the
insertion of negative words within the question makes them impossibly open-
ended. For example, “Who didn’t attend the meeting?” |
2-22.3 | 167 | _________________________________________________________________________________FM 2-22.3
Compound Questions
9-18. Compound questions consist of two questions asked at the same time;
for example, "Before you were captured today, were you traveling north or
south?" Or “Where were you going after work and who were you to meet
there?” They are easily misunderstood and may confuse the source or force
him to give an ambiguous answer. Compound questions allow the source to
evade a part of the question or to give an incomplete answer.
Vague Questions
9-19. Vague questions do not have enough information for the source to
understand exactly what the HUMINT collector is asking. They may be
incomplete, general, or otherwise nonspecific and create doubt in the source's
mind. Vague questions confuse the source, waste time, and are easily evaded.
They result in answers that may confuse or mislead the HUMINT collector
and require further follow-up questions.
ELICITATION
9-20. Elicitation is the gaining of information through direct interaction with
a human source where the source is not aware of the specific purpose for the
conversation. Elicitation is a sophisticated technique used when conventional
questioning techniques cannot be used effectively. Of all the collection
methods, this one is the least obvious. However, it is important to note that
elicitation is a planned, systematic process that requires careful preparation.
Elicitation is always applied with a specific objective in mind and normally
directed toward a specific source.
LEADS
9-20. A lead is a statement made by a source spontaneously or in response to
questioning that leads the questioner to believe that the source has
information on a topic other than the one currently under discussion.
Documents captured with or on the source may also be exploited as sources of
leads. Leads are referred to as either “hot” or “cold.”
HOT LEADS
9-21. A hot lead is a statement made by a source either spontaneously or in
response to questioning that indicates he has information that could answer
intelligence requirements on a topic other than the one currently under
discussion. The lead could also be on a topic that although not listed as a
requirement is, based on the HUMINT collector’s experience, of critical
importance. Information on WMD and information on US personnel being
held by threat forces are normally considered hot leads even if not listed as
requirements. The HUMINT collector will normally question the source
immediately on a hot lead, unless he is already asking questions on another
topic. In this case, he completes questioning and reports the information on
the priority topic, as appropriate, and then immediately questions on the hot
lead. As soon as the HUMINT collector is sure he has obtained and recorded
all the details known to the source, he reports the hot lead information by the |
2-22.3 | 168 | FM 2-22.3 _________________________________________________________________________________
most expedient means available, normally in SALUTE report format. The
HUMINT collector then resumes his questioning of the source at the point
where the hot lead was obtained.
COLD LEADS
9-22. A cold lead is a statement made by a source either spontaneously or in
response to questioning that indicates he has information on a topic of
interest other than the one currently under discussion but that would not
answer PIRs. The HUMINT collector makes note of the cold lead and exploits
it after the planned questioning objectives have been satisfied or at the
appropriate time during the questioning sequence.
DETECTING DECEIT
9-23. HUMINT information often has the capability to be more accurate and
reliable than other disciplines. SIGINT information, for example, is not
always able to return to the original source of the information to determine
the reliability of the information, and interpretation of IMINT information
may be uncertain. However, while HUMINT can be reviewed for reliability,
determining the reliability of human sources is a continuous process
accomplished by carefully assessing not only the sources of information but
also assessing the information itself.
9-24. Detection of deception is not a simple process, and it normally takes
years of experience before a HUMINT collector can readily identify deliberate
deceit. Inconsistencies in the source’s actions or words do not necessarily
indicate a lie, just as consistency is not necessarily a guarantee of the truth.
However, a pattern of inconsistencies or unexplainable inconsistencies
normally indicate deceit.
TECHNIQUES FOR IDENTIFYING DECEIT
9-25. Techniques for identifying deceit include but are not limited to the
following:
• Repeat and control questions (see paras 9-9 and 9-10).
• Internal inconsistencies. Frequently when a source is lying, the
HUMINT collector will be able to identify inconsistencies in the
timeline, the circumstances surrounding key events, or other areas
within the questioning. For example, the source may spend a long time
explaining something that took a short time to happen, or a short time
telling of an event that took a relatively long time to happen. These
internal inconsistencies often indicate deception.
• Body language does not match verbal message. An extreme example of
this would be the source relating a harrowing experience while sitting
back in a relaxed position. The HUMINT collector must be careful in
using this clue since body language is culturally dependent. Failing to
make eye contact in the US is considered a sign of deceit while in some
Asian countries it is considered polite.
• Knowledge does not match duty position or access. Based on the
source’s job, duty position, or access the HUMINT collector should have |
2-22.3 | 169 | _________________________________________________________________________________FM 2-22.3
developed a basic idea of the type and degree of information that an
individual source should know. When the source’s answers show that
he does not have the expected level of information (too much or too
little or different information than expected), this may be an indicator
of deceit. The HUMINT collector needs to determine the source of
unexpected information.
• Information is self-serving. Reporting of information that is self-
serving to an individual or his group should be suspect. For example, a
member of one ethnic group reporting generic atrocities by an opposing
ethnic group or a source reporting exactly the right information needed
to receive a promised incentive should be suspect. That is not to say
that the information is necessarily false, just that the HUMINT
collector needs to be sure to verify the information.
• Lack of extraneous detail. Often false information will lack the detail
of truthful information, especially when the lie is spontaneous. The
HUMINT collector needs to ask follow-up questions to obtain the
detail. When the source is unable to provide the details that they
should know, it is an indicator of deceit. If the source does provide this
additional information, it needs to be checked for internal
inconsistencies and verified by repeat questions.
• Repeated answers with exact wording and details. Often if a source
plans on lying about a topic, he will memorize what he is going to say.
If the source always relates an incident using exactly the same
wording or answers repeat questions identically (word for word) to the
original question, it may be an indicator of deceit. In an extreme case,
if the source is interrupted in the middle of a statement on a given
topic, he will have to start at the beginning in order to “get his story
straight.”
• Source appearance does not match story. If the source’s physical
appearance does not match his story, it may be an indication of deceit.
Examples of this include the source who says he is a farmer but lacks
calluses on his hands or the supposed private who has a tailored
uniform.
• Source’s language usage does not match story. If the type of language,
including sentence structure and vocabulary, does not match the
source’s story, this may be an indicator of deceit. Examples of this
include a farmer using university level language or a civilian using
military slang.
• Lack of technical vocabulary. Every occupation has its own jargon and
technical vocabulary. If the source does not use the proper technical
vocabulary to match his story, this may be an indictor of deceit. The
HUMINT collector may require the support of an analyst or technical
expert to identify this type of deceit.
• Physical cues. The source may display physical signs of nervousness
such as sweating or nervous movement. These signs may be indicators
of deceit. The fact that an individual is being questioned may in itself
be cause for some individuals to display nervousness. The HUMINT
collector must be able to distinguish between this type of activity and
nervous activity related to a particular topic. Physical reaction to a |
2-22.3 | 170 | FM 2-22.3 _________________________________________________________________________________
particular topic may simply indicate a strong emotional response
rather than lying, but it should key the HUMINT collector to look for
other indicators of deceit.
• Failure to answer the question asked. When a source wishes to evade a
topic, he will often provide an answer that is evasive and not in
response to the question asked. For example, if the source is asked,
"Are you a member of the insurgent organization?” and he replies, “I
support the opposition party in the legislature,” he has truthfully
answered a question, but not the question that was asked. This is a
subtle form of deceit since the source is seemingly cooperative but is in
fact evading providing complete answers.
ACTIONS UPON IDENTIFYING INDICATORS OF DECEIT
9-26. The exact actions by the HUMINT collector when identifying possible
deceit are dependent on the type of collection, the circumstances of the
collection, the specific sign of deceit observed, the type of approach used, and
cultural factors. The HUMINT collector may—
• Question the topic in more detail looking for additional indicators.
• Reinforce the approach.
• Move to another topic and revisit the original topic later with repeat
questions. Ask control questions (confirmed by known data) and
questions to which the source should know the answer to see if he
answers honestly.
• Point out the inconsistency to the source and ask for an explanation.
• Seek assistance from a more experienced HUMINT collector, analyst,
or a technical expert on the culture or the topic being questioned.
• Conduct continuous assessments of source (see FM 34-5 (S//NF)).
• Research established databases.
• Ask yourself if the information makes sense; if not, conduct more
research.
• Consider how the information was obtained.
• Compare the information provided to the source’s placement and
access.
• Compare answers with other sources with similar placement and
access. Be aware that this method is merely a rough tool to check
veracity and should not be used by the collector to confirm intelligence.
• Use the polygraph.
• Consider that a source motivated primarily by money will likely be
tempted to fabricate information in order to get paid.
• Be aware that a source may read the local newspaper to report
information that is already known or may also be providing
information to another agency.
9-27. The one thing that the HUMINT collector cannot do is to ignore signs
of deceit. |
2-22.3 | 171 | _________________________________________________________________________________FM 2-22.3
HUMINT COLLECTION AIDS
9-28. There are numerous procedural and recording aids that can assist the
HUMINT collector in conducting rapid, accurate, yet systematic questioning.
They include––
• HUMINT Collector’s Guide. This guide is a pamphlet or notebook
designed to guide the HUMINT collector through the questioning. The
HUMINT team leader should ensure that team members prepare a
HUMINT collector’s guide, which could be included in the unit's SOP.
The guide is made based on the AO and supported command
intelligence requirements. The HUMINT collector and available
intelligence analysts should jointly prepare the guide. Appendix G
provides the basic topics and example questions that can be adapted to
construct a HUMINT collector’s guide. The guide must be updated for
each interrogation as part of planning and preparation. The guide
should contain information such as—
Intelligence requirements and ISR tasks.
Topical questioning sequence format.
Actual prepared questions to be used during questioning.
Guidelines for employing the various approach techniques.
Formats or samples of completed reports used by HUMINT
collectors.
• Time Event Chart. A timeline, or event chart, is a graphic display upon
which the HUMINT collector enters chronological information as it is
collected. This facilitates the HUMINT collector in understanding and
organizing the collected information. It also enables the HUMINT
collector to identify gaps in information, to sequence events properly to
facilitate follow-up questions, and to identify deception. The HUMINT
collector can develop a basic timeline prior to questioning. The source
should not be able to observe the timeline since doing so will help a
deceptive source “keep his story straight.” See Chapter 12 for how to
create and use a time event chart.
• Organizational Chart. An organizational chart is a graphic
representation of an organization. It is the equivalent of a military
line-and-block chart. This is used to facilitate the questioning of
organizations and in establishing their hierarchical and lateral
linkages. A basic chart can be developed prior to the questioning based
on the expected organizational questioning.
RECORDING TECHNIQUES
9-29. Accuracy and completeness are vital principles to reporting. However,
it is usually not possible to completely record all information in a questioning
session. Recording techniques may involve memory, handwritten or typed
notes, tape recordings, and video recordings. Each has its advantage and
corresponding disadvantage.
• Memory: Relying on one’s memory has certain advantages. It does not
require any equipment or extra time, and is the least intrusive method
of recording information. It allows maximum interaction with the
source and projects sincerity. An individual can train himself to |
2-22.3 | 172 | FM 2-22.3 _________________________________________________________________________________
remember highly detailed information. Often in elicitation, memory is
the only viable recording method. However, in general, using the
memory exclusively to record information is the most inaccurate
methodology. Particularly in a long questioning session, details are
forgotten and information tends to be generalized.
• Handwritten notes: Handwritten notes require minimal equipment (a
pad and pencil), are not intimidating to most sources, and can be as
detailed as the HUMINT collector desires. If an analyst or second
interrogator is present, he should also take notes. This second set of
notes can aid in report writing. The interrogator should not rely solely
on an analyst’s notes unless absolutely necessary. However, writing
notes while questioning an individual often interferes with the rapport
between the collector and the source. The collector loses eye contact
and can easily miss subtle body language that might indicate lying.
Detailed note taking can be extremely time consuming and many
sources will, over time, begin to limit their responses so they do not
have to repeat information or wait for the collector to write it down. It
is somewhat intrusive and inhibiting to the source and is totally
inappropriate in certain situations such as liaison and most casual
source contacts. Handwritten notes can also be inaccurate, have
limited details, and can be hard to read after the fact.
• Computer notes: With the proliferation of computer equipment,
particularly laptops and handheld devices, note taking on computers is
increasingly commonplace. A computer can provide access to data-
based information that may support questioning such as foreign
language dictionaries or technical support manuals, either through the
Internet (if connected) or on its harddrive. If the computer is linked to
a communications system, it also allows the HUMINT collector to
transmit data, including SALUTE reports, during the course of the
questioning. Notes taken on a computer, however, have many of the
same disadvantages as handwritten notes. In addition, computer
notetaking requires more equipment and technological support and
access to either electricity or a plentiful supply of batteries. Computers
may be intimidating to some sources and the fact that what the source
says is being entered into a computer may cause the source to alter the
information he is providing. Computers tend to isolate the collector
from the source by dividing the collector’s attention between the
computer and the source, and again may cause the collector to miss
critical body language clues. Finally, the computer is even more
inappropriate to casual and controlled source operations than are
handwritten notes.
• Audiotapes: If recording equipment is discrete and functioning
properly, audiotapes can be extremely accurate. Use of tapes also
allows the HUMINT collector to place his entire attention on the
source. This not only enhances rapport but also allows the HUMINT
collector to observe the source’s body language. Taping a questioning
session, if done overtly though, tends to be extremely inhibiting to the
source and may seriously curtail the information obtained.
Surreptitious taping can be illegal in some situations and dangerous in
some situations as well. Consult your legal advisor to determine if |
2-22.3 | 173 | _________________________________________________________________________________FM 2-22.3
taping is legal. Taped information can also be seriously affected by
ambient noise and the relative positioning of the source and collector to
the microphone. Writing a report based on a taped session can be
extremely time consuming, since it takes as long to listen to a tape as it
took to record it. This drawback can be reduced somewhat through the
use of voice activated recording devices. Exclusive dependence on
audiotapes tends to make the collector less attentive and more likely to
miss follow-up questions. Also, if the tape is lost or damaged or does
not function properly, the collector has no backup.
• Video recording: Video recording is possibly the most accurate method
of recording a questioning session since it records not only the voices
but also can be examined for details of body language and source and
collector interaction. It is also the most resource intensive requiring
proper lighting, cameras, viewing equipment, and possibly trained
operators. If done overtly, video recording can be by far the most
inhibiting to the source. Even if the source is willing to be videotaped,
there is a tendency for both the source and the collector to “play to the
camera,” creating an artificiality to the questioning. Consult your legal
advisor to determine the legality of overt or covert videotaping.
QUESTIONING WITH AN ANALYST OR A TECHNICAL EXPERT
9-30. The HUMINT collector may often find himself in the position where he
needs to use an analyst or a technical expert, or both, in order to conduct
questioning. Many of the techniques involved in using an analyst or technical
expert are the same as those with using an interpreter (see Chapter 11). The
HUMINT collector must pre-brief these supporting personnel. The degree to
which the analyst or technical expert is involved in the actual questioning is
dependent on the established relationship between the analyst or technical
expert and the HUMINT collector. The HUMINT collector will always
remain in charge of the questioning, be present throughout the questioning,
and ensure that the questioning follows his questioning plan. He must
ensure that the supporting analyst or technical expert has the proper
security clearance.
9-31. An analyst or technical expert can participate in the questioning to
various degrees listed below from least intrusive to most intrusive. As the
degree of participation by the analyst or technical expert increases, the
technical fidelity of the information collected usually increases but the
rapport between the HUMINT collector and the source decreases as does the
HUMINT collector’s ability to control the content and judge the truthfulness
of the information. The analyst or technical expert may provide—
• Advice Only: The HUMINT collector does the questioning. The expert
provides information prior to the meeting and may review the collected
information after the meeting. The technical expert is not present at
the actual questioning.
• Remote Support: The HUMINT collector does the questioning. In
addition to the above, the expert monitors the questioning and
provides input to the HUMINT collector after the questioning as
required. Based on the technological support, this can involve the
expert sitting in on, but not participating in the questioning (which |
2-22.3 | 174 | FM 2-22.3 _________________________________________________________________________________
may make the source uncomfortable), or the expert viewing and
listening to the questioning through a remote video and sound hook-
up.
• Local Support: The HUMINT collector does the questioning. The expert
sits in on the questioning and provides input to the HUMINT collector
during the course of the questioning. This can break both the source’s
and the HUMINT collector’s trains of thought and confuse the lines of
control in the questioning.
• Expert Participation: The HUMINT collector initiates the questioning,
but the expert participates throughout the questioning, asking for
clarification and additional information as required. Unless properly
trained, the expert can seriously taint the quality of the information
through the use of poor questioning techniques. The HUMINT collector
can lose rapport and control.
• Trained Expert Questioning: In rare instances, with particularly
difficult technical topics or those areas of questioning that require a
high degree of technical expertise, it may be easier to train the expert
in basic questioning techniques than it is to train the HUMINT
collector on the technical topic. In this instance, the HUMINT collector
sits in on the questioning to ensure proper procedures and techniques
are used and to advise the technical expert. The technical expert does
most of the questioning.
9-32. In any case, if the source is to receive compensation for his time, it
must come from the HUMINT collector, not the analyst or technical expert.
This continues to reinforce that the HUMINT collector is in charge, and does
not transfer the source’s trust to the expert.
THIRD-PARTY OFFICIAL AND HEARSAY INFORMATION
9-33. The source may have information that he did not observe firsthand.
While this information is not as reliable as firsthand knowledge, it is often
significant enough to report. The HUMINT collector must be careful to
identify this information as to its origin, type, and the time and manner that
the information was obtained by the source. This information will be entered
into the report as a source comment or a collector comment. This will
include—
• The origin of the information. This may be the name, rank, and duty
position or job of an individual or may be an official or unofficial
document such as an OPORD, official memorandum, or party
newspaper.
• The complete organization to which the person who provided the
information belongs or the identity of the organization that produced
the official or unofficial document from which the source obtained the
information.
• Date-time group (DTG) when the source obtained the information.
• The circumstances under which the source obtained the information.
9-34. Comparing the details of the hearsay information, such as DTG, where
the information was obtained and the circumstances under which the source |
2-22.3 | 175 | _________________________________________________________________________________FM 2-22.3
claimed to have received it, to the source’s known activities, may provide
indications of truthfulness or deception on the part of the source.
CONDUCTING MAP TRACKING
9-35. Map tracking is a specific questioning skill that the HUMINT collector
uses in all operations. It is a vital skill in supporting targeting and
operational planning. Map tracking identifies and verifies key information by
tracking the source's movement and activities within a specific area over a
fixed period using a map or similar graphic aid. The area and the time
involved are dependent on the collection requirements and the source’s
knowledge level. Map tracking can occur at any point in the questioning
process. Normally, the HUMINT collector begins map tracking as soon as his
questioning identifies a priority disposition or activity that the source’s
information can locate on the map.
9-36. Map-tracking techniques, if properly applied, can extract information
from friendly, neutral, or threat sources and can be used with individuals
ranging from those with detailed map skills to illiterates, and those who have
never seen a map. Through map tracking, the HUMINT collector pinpoints
locations of any threat activity, threat dispositions, or any other priority
terrain-related information, such as trafficability, known to the source.
9-37. The HUMINT collector will determine these locations with the degree
of fidelity needed to support operational requirements. The degree of detail
needed may range from an 8-digit grid coordinate for unit locations to
locations of specific buildings, rooms, or even items within a room. The
HUMINT collector uses a variety of map-tracking aids including standard
military maps, aerial photographs, commercial imagery, building blueprints
and diagrams, and commercial road maps. Some advantages to map-tracking
techniques include—
• The source is led through his memory in a logical manner.
• Discrepancies in the source's statements are easier to detect.
• Locations are identified to support targeting and battlefield
visualization.
• Map tracking is a four-step process:
Step 1: Determine the source’s map-reading skills.
Step 2: Establish and exploit common points of reference (CPRs).
Step 3: Establish routes of travel.
Step 4: Identify and exploit key dispositions.
DETERMINE THE SOURCE’S MAP-READING SKILLS
9-38. The first step in the map-tracking process is to determine the specific
map-reading skills of the source. This step only occurs the first time that the
HUMINT collector map tracks a particular source. This information will
determine what methodology will be used for the rest of the process. In this
step the HUMINT collector is determining existing skills; he should not
attempt to teach the source additional map skills at this time. The HUMINT
collector can use prior knowledge, such as the fact that the source is illiterate
or cannot read a map, to skip some of the specific parts of the process. Below |
2-22.3 | 176 | FM 2-22.3 _________________________________________________________________________________
is a detailed description of the process to establish the map-reading skills of
the source.
• The HUMINT collector asks the source if he can read the map being
used. If the source answers in the affirmative, the HUMINT collector
asks some key questions to verify this.
• If the source cannot read the map being used, the HUMINT collector
determines if the source can read another type of available map or
graphic representation. For example, a source may not be able to read
a military map but might be able to use a commercial map or an
imagery product.
• The HUMINT collector then establishes the method that will be used
to describe movement (direction and distance) on the map. If the source
knows how to use compass directions, that may be the most expedient
method for determining direction. Again, the HUMINT collector must
verify that the source knows how to use compass directions. This can
be done best by having the source tell the compass directions between
known points. Distance is normally determined by using the standard
units of measurement with which the source is familiar, such as
kilometers or miles. This can cause some problems, for example, if the
map is measured in kilometers and the source normally expresses
distance in miles. The HUMINT collector must make the adjustment
rather than trying to teach the source the unfamiliar system.
• Compass directions and standard units of measure are not the only
method or necessarily even the best method of indicating direction and
distance in all circumstances. When using an urban map, direction and
distance can often be described by indicating blocks traveled and turns
made (right or left) at intersections. Direction of travel can be indicated
in reference to key features such as going toward the downtown area or
moving toward the river. When describing the interior of a building,
references may be to upstairs, downstairs, floor number, or other
descriptive terms. When map tracking in rural areas, especially when
questioning someone who does not know how to use compass
directions, terrain association is normally the best method of
establishing direction of travel and distance. Questions such as “Were
you traveling uphill at that time?” “What prominent terrain features
could you see from that location?” “What was the nearest town?” or
“Was the sun behind you?” help to identify locations on the map. The
HUMINT collector should allow the source to use his own frames of
reference. However, the HUMINT collector must ensure he
understands the source.
ESTABLISH AND EXPLOIT COMMON POINTS OF REFERENCE
9-39. The second step of map tracking is to establish CPRs. It is important in
accurate map tracking to talk the source through his past activities in the
sequence in which they occurred and his movements in the direction in which
they were traveled. Attempting to track a source backward in time and space
is time consuming, inaccurate, and is often confusing to both the source and
the HUMINT collector. Future activities should be tracked in the direction in |
2-22.3 | 177 | _________________________________________________________________________________FM 2-22.3
which they are planned to occur. The HUMINT collector will normally
establish various CPRs throughout the questioning of the source.
9-40. For certain sources such as friendly forces, tasked sources, or other
instances where the starting and ending points of the mission being
questioned are easily established, the first point of reference is normally
where that source began the mission. For other sources such as detainees,
line crossers, informers, and refugees, it is often more difficult to establish a
“starting point.” In these instances the HUMINT collector uses a sequential
approach to the map tracking. He establishes a point of reference that is a
logical end point for the subject being discussed. This may be, for example,
the point of capture for a detainee, the point where a line crosser entered the
friendly force area, or where a refugee left the area of intelligence interest.
Second and subsequent points of reference are established during
questioning when the source mentions a disposition, activity, or location of
interest that can be located on the map. The HUMINT collector locates the
reference point on the map through direct questioning and terrain
association. He uses leading questions as necessary to establish an exact
location. He then establishes the route of travel.
ESTABLISH ROUTES OF TRAVEL
9-41. Once the CPR is established, the HUMINT collector questions the
source until he has extracted all pertinent information on the CPR and its
immediate surroundings. For past missions and activities, the HUMINT
collector then establishes the route the source traveled between the newly
established CPR and a previously established CPR and exploits the route.
For future missions or activities, the route is established from the previously
established CPR toward the future mission CPR.
9-42. The HUMINT collector should establish the route traveled by
determining the source’s direction and physical description of the route of
travel. The description should include details such as surface on which the
source traveled and prominent terrain features along the route of travel and
the distance the source traveled or, in the case of future locations, would
travel. The HUMINT collector should also identify any pertinent dispositions
or any activities of military significance, belonging to the opposition forces,
along or in the vicinity of the route of travel. For longer routes, the HUMINT
collector may divide the route into segments for ease of questioning.
IDENTIFY AND EXPLOIT KEY DISPOSITIONS
9-43. The HUMINT collector must obtain the exact location and description
of every pertinent disposition known to the source. This includes the
locations established as CPRs and any other pertinent disposition
established during map tracking. At a minimum, the collector should––
• Establish a physical description of the disposition. The degree of
fidelity will depend on the collection requirements. This may be as
detailed as the physical layout of a room to the general description of a
training area. This will include security measures and modus operandi
at the location as appropriate. |
2-22.3 | 178 | FM 2-22.3 _________________________________________________________________________________
• Identify and describe the significance of the disposition in terms of
ongoing and future threat operations.
• Identify and describe key activities, equipment, or organizations at the
location, as well as people and leaders.
• Identify and describe all pertinent collocated activities, locations, or
organizations, as well as people and leaders.
• Identify the basis (hearsay or personal experience) and DTG of the
source’s knowledge of each disposition.
SPECIAL SOURCE CATEGORIES
9-44. Questioning of every source is unique and requires specific preparation.
Special consideration and preparation must be made for some specific
categories of sources. Some examples of special source categories include but
are not limited to wounded or injured sources or illiterates.
WOUNDED OR INJURED SOURCES
9-45. HUMINT collectors may question (interrogate, debrief, or elicit
information from) a wounded or injured source provided that they obtain
certification from a competent medical authority that the questioning will not
delay or hinder medical treatment or cause a worsening of the condition of
the source. The HUMINT collector can question the source before, after, or
during medical treatment. The HUMINT collector cannot at any time
represent himself as being a doctor or any other type of medical personnel or
member of the ICRC. Nor can he state, imply, or otherwise give the
impression that any type of medical treatment is conditional on the source’s
cooperation in answering questions.
ILLITERATES
9-46. HUMINT collectors should never make the mistake of equating
illiteracy with a lack of intelligence or an inability to provide meaningful
information. In fact, many illiterates have developed extremely good
memories to compensate for their inability to rely on the written word. An
illiterate’s frame of reference does not include street signs, mile markers, and
calendars. It also will probably not include conventional time and distance
measurements. The HUMINT collector must compensate for these
differences. Map tracking, for example, must normally be accomplished by
terrain association. If the source cannot tell time, time of day can be
determined by the position of the sun. |
2-22.3 | 179 | FM 2-22.3
Chapter 10
Reporting
10-1. Reporting is the final and in many cases the most vital phase in
HUMINT collection. If the collected information is not reported accurately, in
a timely manner, in the proper format, and to the correct recipient, it cannot
become part of the all-source intelligence product or tip in time to affect
operational decisions. Information that would support targeting must be
reported by the fastest means possible.
REPORTING PRINCIPLES
10-2. The HUMINT collector must be able, in a written report, to convey to
the user the information obtained from a source. Therefore, the following
principles of good report writing are to be followed:
• Accuracy. Accurately reflect the information obtained from the source.
Reporter comments and conclusions must be clearly identified as such.
• Brevity. Report all relevant information; however, the report should be
brief, to the point, and avoid unnecessary words.
• Clarity. Use simple sentences and understandable language. Proper
grammar and punctuation are a must. Another team member, if
possible, should read the reports to ensure clarity.
• Coherence. Present the information in a logical pattern based on
standard reporting formats.
• Completeness. Report all information collected. The collector should
not filter information since all information is of interest to an analyst.
Report negative responses to pertinent topics to prevent a
misunderstanding or duplication of effort in subsequent questioning
based on SDRs.
• Timeliness. Report information as soon as operationally feasible. Most
collection requirements contain a LTIOV as part of the requirement.
While written reports are preferable, critical or time-sensitive
information is passed by the most expedient means available.
• Releasability. Include only releasable information in reports that are to
be shared with multinational units. When possible, reports to be
shared with multinational units should be kept to the appropriate
classification to ensure the widest dissemination of the reported
information.
REPORT TYPES
10-3. There are two major categories for reporting information: operational
reports and source administrative reports. Figure 10-1 shows the HUMINT |
2-22.3 | 180 | FM 2-22.3 _________________________________________________________________________________
reporting channels. Refer to DIAM 58-11 (S//NF) and DIAM 58-12 (S//NF) for
specific guidance in using these reports.
OPERATIONAL REPORTS
10-4. Operational reports is a broad category that encompasses all reports
that do not contain information collected in response to intelligence
requirements or the reporting of the technical, and usually sensitive, aspects
of HUMINT collection. It includes but is not limited to all administrative and
logistical reports. Unit SOPs and directives from higher headquarters
establish operational reporting requirements, formats, and procedures.
Operational reporting––
• Tells the commander where and when assets are conducting missions.
• Describes unit mission capability.
• Responds to administrative and logistical requirements.
• Describes support requirements.
• Includes but is not limited to unit status reports, mission planning
reports, mission status reports, and equipment status.
• Reports ICF usage at any echelon where the use of ICFs is authorized.
SOURCE ADMINISTRATIVE REPORTS
10-5. Source administrative reports include intelligence reports that are used
to pass or request information in order to answer intelligence requirements,
and reports that address the HUMINT collector’s contacts with the source.
Intelligence reports include but are not limited to IIRs and SALUTE reports.
Intelligence Information Reports
10-6. The IIR is used to report all HUMINT information in response to
collection requirements. It is used to expand on information previously
reported by a SALUTE report or to report information that is either too
extensive or not critical enough for SALUTE reporting. IIRs are written at
any echelon and “released” by the appropriate authority before they enter the
general Intelligence Community. Normally the G2X will be the release
authority for IIRs.
10-7. At the tactical level, the HUMINT collectors will fill out the complete
IIR; however, the requirements section may link the information collected
against a unit requirement rather than against national requirements. In
any case, the report will be forwarded to the OMT.
10-8. The team leader will review the IIR, place a copy of the IIR in the
detainee’s or source’s local file and forward the IIR to the OMT. (When a
detainee is transferred to another facility or evacuated to a higher echelon, a
copy of each IIR written from interrogations of that detainee is forwarded
with him.) The OMT reviews the report, requests additional information as
necessary from the originator, adds additional administrative detail, and
forwards the report to the HOC of the supporting C/J/G/S2X. The HOC and
the 2X review the report, request additional information as required, add any |
2-22.3 | 181 | _________________________________________________________________________________FM 2-22.3
final required information including linking it to national requirements, and
then the 2X releases the report.
10-9. In addition to the above, the text information from the IIR can be
forwarded to the unit’s analytical elements and when it contains critical time-
sensitive information, such as an impending attack, it is sent to units which
may be affected by the information; however, it must be clearly marked
“unevaluated information, not finally evaluated intelligence.” The use of IIRs
and the formats are covered in DIAM 58-12 (S//NF).
SALUTE Reports
10-10. The SALUTE report is a standard Army format used to report
information of immediate interest by individuals at any echelon. (See
Appendix H for a SALUTE report format.) The SALUTE report is the
primary means used to report combat information to units that could be
affected by that information. After review by the team leader, SALUTE
reports are sent simultaneously to the supported unit S2, to the OMT in
control of the HCT, and to the intelligence staff officer of any other tactical
unit that may be affected by the information contained in the SALUTE
report.
10-11. The OMT reviews the report and forwards it to the supporting HAT
and supporting J/G/S2X for inclusion in the analysis picture. The supported
S2 will––
• Review the information.
• Incorporate it into his unit intelligence products, as applicable.
• Forward the information to his higher echelon intelligence staff officer.
• Ensure that all affected units are notified.
10-12. Units must develop SOPs for the passing of information and
intelligence to multinational units. Report writers and editors must ensure
that reports that are to be shared with multinational units contain only
releasable information. This will enable reports to have the widest
dissemination. Arrangements are made through the C/J2X/LNO for
distribution. When possible, reports to be shared with multinational units
should be kept to the appropriate classification to ensure the widest
dissemination of the reported information.
Basic Source Data Reports
10-13. The basic source data (BSD) reports provide the HUMINT chain with
biographic and operational information related to a source. BSDs are used at
all echelons to collect biographic information on all contacts. The use of BSDs
and BSD formats are covered in DIAM 58-11 (S//NF).
Contact Reports
10-14. Collectors use contact reports to inform their technical chain (from
OMT through J/G/S2X) of all relevant information concerning specific
meetings with HUMINT sources. Information typically includes the
circumstances of the contact (purpose, locations, time), the operational |
2-22.3 | 182 | FM 2-22.3 _________________________________________________________________________________
matters relative to the contact (topics discussed, taskings given), reports
produced as a result of the contact, and logistics expended.
Other Reports
10-15. HUMINT collectors also use a number of other reports to administer
source contacts and to report information. Copies of the following reports
should be maintained in the detainee’s permanent file for future reference.
HUMINT collectors will review these reports when planning additional
collection activities; release committees or tribunals can use the reports to
help evaluate if a detainee can be released or not. These reports include––
• Screening Reports. Screening reports are used to report BSDs,
knowledge areas and levels, cooperation, vulnerabilities to approaches,
and other relevant source information between HUMINT collectors. It
is normally filled out either electronically or manually by the initial
HUMINT collector to speak to a source. The screening report is
normally forwarded electronically to higher echelon HUMINT
collection organizations and other MI organizations that might have
interest in the source. Higher echelon organizations may add
information to the screening sheet extracted through subsequent
screenings. Available digital screening reports contained in the
HUMINT collector’s mission support software (for example, BAT or
CI/HUMINT Automated Management System [CHAMS]) should be
used whenever possible to ensure rapid transfer of data. If screening
reports have to be handwritten, the information collected should
conform to theater requirements and local SOPs.
• Knowledgeability Briefs. The KB is used to inform the Intelligence
Community of a source’s full identity, past history, and areas of
knowledge, as well as to set a suspense date for the submission of
intelligence requirements. It is normally only used at the strategic and
operational echelons. When completed, a KB will be classified at least
Confidential in accordance with the DIA Classification Guide to protect
the identity of the source. The use of KBs and the formats are covered
in DIAM 58-11 (S//NF). See Figure 10-2 for an example of a short
form KB that can be used for screening at all echelons, and can also
be prepared and published like the full KB. This allows the entire
intelligence community to see who is either in custody or to whom US
intelligence has access so that SDRs can be issued to help focus the
intelligence collection effort.
• Notice of Intelligence Potential (NIP). A NIP is used to inform the US
Intelligence Community of the availability of a source of potential
interest and to notify them of what agency has responsibility for
questioning that source and where to forward questions and requests
for information from that agency. The use of NIPs and the formats
are covered in DIAM 58-11 (S//NF).
• Lead Development Report (LDR). The LDR is used to inform the
HUMINT chain of ongoing operations directed toward a specific source.
It notifies them as to what element spotted the potential source, the |
2-22.3 | 183 | _________________________________________________________________________________FM 2-22.3
current steps in assessing of the source, and the general information on
the potential source.
• Interrogation Summary. An interrogation summary may be written to
record relevant facts concerning the interrogation. The summary may
include the attitude of the source; approach techniques that were tried
and which ones were effective; incentives promised and whether or not
they were delivered yet; recommended topics for further exploitation;
and any other topics the HUMINT collector considers relevant. Local
SOPs will dictate the use of the interrogation summary.
• Interrogation Plan. The interrogation plan is a report prepared by the
HUMINT collector to organize his plan to approach and question a
source. It lists collection objectives, approach techniques, preparation
and liaison tasks, and interpreter usage plan. The interrogation plan
also has approval blocks for interrogation supervisor approval of
selected approaches and medical release for questioning. The last part
of the form has termination, approach effectiveness, recommendations
for further exploitation, and a summary of information obtained and
reports expected to be published. Figure 10-3 is an example of an
interrogation plan format.
• Termination Report. The termination report is used at all echelons to
inform the technical chain of the termination of a contact relationship
between a HUMINT collector and a source.
• Biographic Report. The biographic report is a formatted IIR used at all
echelons to report information collected from one human source about
another individual of actual or potential intelligence interest. The
biographic report format is found in DIAM 58-11 (S//NF).
REPORTING ARCHITECTURE
10-16. There are three basic reporting channels (see Figure 10-1):
• The operational reporting chain consists of primarily the C2 elements
for the HUMINT collection element. It includes the OMTs, unit
commanders, and unit S3 and operation sections.
• The technical chain includes the OMTs, HOC, and the C/J/G/S2X, and
in certain circumstances, the unit G2/S2s.
• The intelligence reporting chain includes the OMTs, HATS,
C/J/G/S2Xs, and unit G2/S2s.
10-17. Many elements serve multiple and overlapping functions within the
reporting architecture. Each element must be aware of its function within the
architecture to ensure that information is disseminated expeditiously to the
right place in the right format. This architecture should be established and
published prior to implementation in order to avoid confusion.
OPERATIONAL REPORTING
10-18. Operational reporting is sent via the organic communications
architecture (see Chapter 13). Operational reports are normally sent per unit
SOP or based on direction from higher headquarters. HCTs normally send all |
2-22.3 | 184 | FM 2-22.3 _________________________________________________________________________________
operational reports through their OMT to the command element of the unit to
which they are assigned. If an HCT is attached, it will normally send its
operational reports to the unit to which it is attached with courtesy copies to
their assigned unit as required. If there is an administrative or logistics
relationship established with the supported unit, HCTs that are in DS send
the principal copy of all related administrative and logistic reports to the
supported unit with a courtesy copy to their parent unit. If the HCT is
operating in GS, a courtesy copy of operational reports should be forwarded to
all affected unit commanders in the supported AO.
TECHNICAL REPORTING
10-19. Technical reporting includes the forwarding of source information and
technical parameters of collection operations from lower to higher and the
passing of tasking specifics, source information, technical control measures,
and other information from higher to lower. Technical reporting is conducted
through the technical chain that extends from the HCT through the OMT and
Operations Section (if one exists) to the C/J/G/S2X.
INTELLIGENCE REPORTING
10-20. The key to intelligence reporting is to balance the need for accurate
reporting with the need to inform affected units as quickly as possible. The
J/G/S2 and MI commander are key to ensuring the right balance. |
2-22.3 | 185 | _________________________________________________________________________________FM 2-22.3
JJJJ////GGGG2222
SSSSuuuuppppppppoooorrrrtttteeeedddd
JJJJ////GGGG2222XXXX AAAACCCCEEEE
SSSS2222
OOOOOttttthhhhheeeeerrrrr
MMMMMiiiiillllliiiiitttttaaaaarrrrryyyyy
GGGGGooooovvvvveeeeerrrrrnnnnnmmmmmeeeeennnnnttttt
AAAAAsssssssssseeeeetttttsssss
AAAAAgggggeeeeennnnnccccciiiiieeeeesssss
OOOOppppeeeerrrraaaattttiiiioooonnnnaaaallll OOOOppppeeeerrrraaaattttiiiioooonnnnaaaallll
MMMMaaaannnnaaaaggggeeeemmmmeeeennnntttt MMMMaaaannnnaaaaggggeeeemmmmeeeennnntttt
TTTTeeeeaaaammmm ((((GGGGSSSS)))) TTTTeeeeaaaammmm ((((DDDDSSSS))))
GGGGSSSS CCCCOOOO DDDDSSSS CCCCOOOO
HHHHUUUUMMMMIIIINNNNTTTT HHHHUUUUMMMMIIIINNNNTTTT
CCCCoooolllllllleeeeccccttttoooorrrr CCCCoooolllllllleeeeccccttttoooorrrr
TTTTeeeeaaaammmm((((ssss)))) TTTTeeeeaaaammmm((((ssss))))
LLLLeeeeggggeeeennnndddd::::
OOOOppppeeeerrrraaaattttiiiioooonnnnaaaallll RRRReeeeppppoooorrrrttttiiiinnnngggg
TTTTeeeecccchhhhnnnniiiiccccaaaallll RRRReeeeppppoooorrrrttttiiiinnnngggg
IIIInnnntttteeeelllllllliiiiggggeeeennnncccceeee RRRReeeeppppoooorrrrttttiiiinnnngggg
NNNOOOTTTEEE::: IIInnn aaaddddddiiitttiiiooonnn tttooo ttthhheee ssstttaaannndddaaarrrddd HHHUUUMMMIIINNNTTT rrreeepppooorrrtttiiinnnggg ccchhhaaannnnnneeelllsss,,, GGGSSS ttteeeaaammmsss wwwiiillllll sssiiimmmuuullltttaaannneeeooouuussslllyyy
ssseeennnddd SSSAAALLLUUUTTTEEE rrreeepppooorrrtttsss tttooo aaannnyyy uuunnniiitttsss iiinnn ttthhheeeiiirrr AAAOOORRR ttthhhaaattt mmmaaayyy bbbeee aaaffffffeeecccttteeeddd bbbyyy ttthhheee rrreeepppooorrrttteeeddd iiinnnfffooorrrmmmaaatttiiiooonnn...
Figure 10-1. HUMINT Reporting Channels. |
2-22.3 | 186 | FM 2-22.3 _________________________________________________________________________________
KKKBBB---EEEZZZ WWWOOORRRKKKSSSHHHEEEEEETTT
11111..... PPPPPEEEEERRRRRSSSSSOOOOONNNNNAAAAALLLLL DDDDDAAAAATTTTTAAAAA:::::
11111AAAAA..... NNNNNaaaaammmmmeeeee:::::
11111BBBBB..... SSSSSooooouuuuurrrrrccccceeeee NNNNNuuuuummmmmbbbbbeeeeerrrrr (((((CCCCCaaaaappppptttttuuuuurrrrriiiiinnnnnggggg UUUUUnnnnniiiiittttt))))):::::
11111CCCCC..... SSSSSooooouuuuurrrrrccccceeeee NNNNNuuuuummmmmbbbbbeeeeerrrrr (((((MMMMMPPPPPsssss))))):::::
11111DDDDD..... SSSSSooooouuuuurrrrrccccceeeee NNNNNuuuuummmmmbbbbbeeeeerrrrr (((((OOOOOttttthhhhheeeeerrrrr))))):::::
11111EEEEE..... SSSSSooooouuuuurrrrrccccceeeee NNNNNuuuuummmmmbbbbbeeeeerrrrr (((((MMMMMIIIII))))):::::
11111FFFFF..... CCCCCooooouuuuunnnnntttttrrrrryyyyy ooooofffff CCCCCiiiiitttttiiiiizzzzzeeeeennnnnssssshhhhhiiiiippppp:::::
11111GGGGG..... BBBBBiiiiirrrrrttttthhhhh CCCCCiiiiitttttyyyyy:::::
11111HHHHH..... BBBBBiiiiirrrrrttttthhhhh CCCCCooooouuuuunnnnntttttrrrrryyyyy:::::
11111IIIII..... BBBBBiiiiirrrrrttttthhhhh DDDDDaaaaattttteeeee:::::
11111KKKKK..... DDDDDaaaaattttteeeee DDDDDeeeeepppppaaaaarrrrrttttteeeeeddddd CCCCCooooouuuuunnnnntttttrrrrryyyyy ooooofffff OOOOOrrrrriiiiigggggiiiiinnnnn/////DDDDDaaaaattttteeeee ooooofffff CCCCCaaaaappppptttttuuuuurrrrreeeee:::::
11111NNNNN..... LLLLLaaaaasssssttttt CCCCCooooouuuuunnnnntttttyyyyy ooooofffff RRRRReeeeesssssiiiiidddddeeeeennnnnccccceeeee:::::
11111OOOOO..... LLLLLaaaaannnnnggggguuuuuaaaaagggggeeeee CCCCCooooommmmmpppppeeeeettttteeeeennnnncccccyyyyy:::::
22222..... EEEEEddddduuuuucccccaaaaatttttiiiiiooooonnnnn::::: (((((MMMMMooooosssssttttt RRRRReeeeeccccceeeeennnnnttttt tttttooooo OOOOO llllldddddeeeeesssssttttt)))))
22222AAAAA..... MMMMMiiiiillllliiiiitttttaaaaarrrrryyyyy ooooorrrrr CCCCCiiiiivvvvviiiiillllliiiiiaaaaannnnn:::::
22222BBBBB..... DDDDDaaaaattttteeeeesssss ooooofffff AAAAAtttttttttteeeeennnnndddddaaaaannnnnccccc eeeee:::::
22222CCCCC..... NNNNNaaaaammmmmeeeee ooooofffff IIIIInnnnnssssstttttiiiiitttttuuuuutttttiiiiiooooonnnnn:::::
22222DDDDD..... CCCCCiiiiitttttyyyyy LLLLLooooocccccaaaaatttttiiiiiooooonnnnn ooooofffff IIIIInnnnnssssstttttiiiiitttttuuuuutttttiiiiiooooonnnnn:::::
22222EEEEE..... CCCCCooooouuuuunnnnntttttrrrrryyyyy LLLLLooooocccccaaaaatttttiiiiiooooonnnnn ooooofffff IIIIInnnnnssssstttttiiiiitttttuuuuutttttiiiiiooooonnnnn:::::
22222FFFFF::::: CCCCCooooommmmmpppppllllleeeeetttttiiiiiooooonnnnn SSSSStttttaaaaatttttuuuuusssss/////DDDDDeeeeegggggrrrrreeeeeeeeee TTTTTyyyyypppppeeeee:::::
33333..... EEEEEMMMMMPPPPPLLLLLOOOOOYYYYYMMMMMEEEEENNNNNTTTTT::::: (((((MMMMMooooosssssttttt RRRRReeeeeccccceeeeennnnnttttt tttttooooo OOOOOllllldddddeeeeesssssttttt)))))
33333AAAAA..... DDDDDaaaaattttteeeeesssss ooooofffff EEEEEmmmmmpppppllllloooooyyyyymmmmmeeeeennnnnttttt:::::
33333BBBBB..... NNNNNaaaaammmmmeeeee ooooofffff PPPPPlllllaaaaaccccceeeee ooooofffff EEEEEmmmmmpppppllllloooooyyyyymmmmmeeeeennnnnttttt:::::
33333CCCCC..... CCCCCiiiiitttttyyyyy LLLLLooooocccccaaaaatttttiiiiiooooonnnnn ooooofffff PPPPPlllllaaaaaccccceeeee ooooofffff EEEEEmmmmmpppppllllloooooyyyyymmmmmeeeeennnnnttttt:::::
33333DDDDD..... CCCCCooooouuuuunnnnntttttrrrrryyyyy ooooofffff PPPPPlllllaaaaaccccceeeee ooooofffff EEEEEmmmmmpppppllllloooooyyyyymmmmmeeeeennnnnttttt:::::
33333EEEEE..... EEEEEmmmmmpppppllllloooooyyyyymmmmmeeeeennnnnttttt DDDDDuuuuutttttyyyyy PPPPPooooosssssiiiiitttttiiiiiooooonnnnn:::::
33333FFFFF..... SSSSSeeeeecccccuuuuurrrrriiiiitttttyyyyy CCCCCllllleeeeeaaaaarrrrraaaaannnnnccccceeeee:::::
Figure 10-2. KB-EZ Worksheet. |
2-22.3 | 187 | _________________________________________________________________________________FM 2-22.3
444... MMMIIILLLIIITTTAAARRRYYY SSSEEERRRVVVIIICCCEEE::: (((MMMooosssttt RRReeeccceeennnttt tttooo OOOllldddeeesssttt)))
444AAA... DDDaaattteeesss ooofff SSSeeerrrvvviiiccceee:::
444BBB... NNNaaammmeee ooofff PPPooosssttt///BBBaaassseee:::
444CCC... AAArrrmmmeeeddd SSSeeerrrvvviiiccceee CCCooommmpppooonnneeennnttt:::
444DDD... RRRaaannnkkk ooofff EEEqqquuuiiivvvaaallleeennnttt:::
444EEE... NNNaaammmeee ooofff UUUnnniiittt///GGGrrrooouuuppp:::
444FFF... CCCiiitttyyy LLLooocccaaatttiiiooonnn ooofff UUUnnniiittt///GGGrrrooouuuppp:::
444GGG... CCCooouuunnntttrrryyy LLLooocccaaatttiiiooonnn ooofff UUUnnniiittt///GGGrrrooouuuppp:::
444HHH... MMMiiillliiitttaaarrryyy///GGGrrrooouuuppp DDDuuutttyyy PPPooosssiiitttiiiooonnn///TTTiiitttllleee:::
444III... SSSeeecccuuurrriiitttyyy CCCllleeeaaarrraaannnccceee:::
555... CCCooommmmmmeeennntttsss::: (((CCChhhaaarrraaacccttteeerrr,,, iiinnnttteeelllllliiigggeeennnccceee,,, mmmoootttiiivvvaaatttiii ooonnn,,, pppeeerrrsssooonnnaaallliii tttyyy,,, cccoooooopppeeerrraaa tttiiivvv eeennneeessssss)))
555AAA... CCCIIIRRRCCCUUUMMMSSSTTTAAANNNCCCEEESSS OOOFFF CCCAAAPPPTTTUUURRREEE::: CCCaaappptttuuu rrreee dddaaattteee,,, cccaaappptttuuurrriiinnn ggg uuunnniiittt,,, ccciiirrrcccuuummmssstttaaannnccceeesss,,, dddooocccuuummmeeennntttsss,,,
wwweeeaaapppooonnnsss,,, aaannnddd eeeqqquuuiiipppmmmeeennnttt...
555BBB... AAASSSSSSEEESSSSSSMMMEEENNNTTT::: PPPhhhyyysssiiicccaaalll cccooonnndddiiitttiiiooonnn,,, mmmeeennntttaaa lll cccooonnndddiiitttiiiooonnn,,, iiinnnttteee lllllliiigggeeennnccceee,,, cccoooooopppeeerrraaatttiiiooonnn (((111,,, 222,,, 333))),,,
kkknnnooowwwllleeedddgggeeeaaabbbiiillliiitttyyy (((AAA,,, BBB,,, CCC))),,, pppeeerrrsssooonnnaaallliiitttyyy...
555CCC... AAADDDDDDIIITTTIIIOOONNNAAALLL PPPEEERRRSSSOOONNNAAALLL IIINNNFFFOOORRR MMMAAATTTIIIOOONNN::: (((SSSkkkiiillllllsss,,, eeexxxpppeeerrriiieeennnccceee,,, mmmaaarrriiitttaaalll ssstttaaatttuuusss,,, ooottthhheeerrr)))...
666... NNNAAAMMMEEE OOOFFF SSSCCCRRREEEEEENNNEEERRR:::
TTTTThhhhheeeeeaaaaattttteeeeerrrrr-----ssssspppppeeeeeccccciiiiifffffiiiiiccccc cccccooooolllllllllleeeeeccccctttttiiiiiooooonnnnn rrrrreeeeeqqqqquuuuuiiiiirrrrreeeeemmmmmeeeeennnnntttttsssss mmmmmaaaaayyyyy rrrrreeeeeqqqqquuuuuiiiiirrrrreeeee mmmmmooooodddddiiiiifffffiiiiicccccaaaaatttttiiiiiooooonnnnn ooooofffff ttttthhhhheeeee KKKKKBBBBB-----EEEEEZZZZZ fffffooooorrrrrmmmmmaaaaattttt.....
CCCCCooooonnnnnsssssiiiiidddddeeeeerrrrr aaaaaddddddddddiiiiinnnnnggggg eeeeennnnntttttrrrrriiiiieeeeesssss fffffooooorrrrr:::::
•••••RRRRRaaaaaccccceeeee
••••• EEEEEttttthhhhhnnnnniiiiiccccciiiiitttttyyyyy
••••• TTTTTrrrrriiiiibbbbbaaaaalllll AAAAAffffffffffiiiiillllliiiiiaaaaatttttiiiiiooooonnnnn
••••• RRRRReeeeellllliiiiigggggiiiiiooooonnnnn aaaaannnnnddddd SSSSSeeeeecccccttttt
••••• LLLLLaaaaannnnnggggguuuuuaaaaagggggeeeee aaaaannnnnddddd DDDDDiiiiiaaaaallllleeeeecccccttttt SSSSSpppppoooookkkkkeeeeennnnn
EEEEEnnnnntttttrrrrriiiiieeeeesssss fffffooooorrrrr “““““LLLLLooooocccccaaaaatttttiiiiiooooonnnnn””””” mmmmmaaaaayyyyy nnnnneeeeeeeeeeddddd tttttooooo iiiiinnnnncccccllllluuuuudddddeeeee aaaaa vvvvviiiiillllllllllaaaaagggggeeeee ooooorrrrr eeeeevvvvveeeeennnnn nnnnneeeeeiiiiiggggghhhhhbbbbbooooorrrrrhhhhhooooooooooddddd.....
Figure 10-2. KB-EZ Worksheet (continued). |
2-22.3 | 188 | FM 2-22.3 _________________________________________________________________________________ |
2-22.3 | 189 | _________________________________________________________________________________FM 2-22.3
PPPRRREEEPPPAAARRRAAATTTIIIOOONNN:::
CCCoooooorrrdddiiinnnaaattteee wwwiiittthhh MMMPPP fffooorrr aaacccccceeessssss tttooo ttthhheee dddeeetttaaaiiinnneeeeee...
PPPrrreeepppaaarrreee fffooorrr eeexxxpppllloooiiitttaaatttiiiooonnn tttooopppiiicccsss:::
OOObbbtttaaaiiinnn aaapppppprrroooppprrriiiaaattteee mmmaaappp ssshhheeeeeettt(((sss)))
OOObbbtttaaaiiinnn rrreeefffeeerrreeennnccceeesss
RRReeevvviiieeewww ppprrreeevvviiiooouuusss rrreeepppooorrrtttsss,,, dddeeetttaaaiiinnneeeeee cccooorrrrrreeessspppooonnndddeeennnccceee
RRReeessseeeaaarrrccchhh cccooolllllleeeccctttiiiooonnn tttooopppiiicccsss
PPPrrreeepppaaarrreee qqquuueeessstttiiiooonnnsss
PPPrrreeepppaaarrreee iiinnnttteeerrrrrrooogggaaatttiiiooonnn sssiiittteee (((fffuuurrrnnniiissshhhiiinnngggsss,,, llliiiggghhhtttiiinnnggg,,, cccllliiimmmaaattteee,,, ssseeecccuuurrriiitttyyy,,, mmmooonnniiitttooorrriiinnnggg)))...
AAAssskkk GGGuuuaaarrrddd QQQuuueeessstttiiiooonnnsss...
RRReeevvviiieeewww DDDeeetttaaaiiinnneeeeee DDDooocccuuummmeeennntttaaatttiiiooonnn:::
IIIDDD CCCaaarrrddd
CCCaaappptttuuurrreee TTTaaaggg
DDDooocccuuummmeeennntttsss cccaaappptttuuurrreeeddd wwwiiittthhh ttthhheee dddeeetttaaaiiinnneeeeee
PPPooosssttt---IIInnnttteeerrr rrrooogggaaatttiiiooonnn RRReeeppp ooorrrttt
EEEffffffeeeccctttiiivvveeennneeessssss ooofff AAApppppprrroooaaaccchhheeesss:::
AAAttttttiiitttuuudddeee aaannnddd BBBeeehhhaaavvviiiooorrr ooofff DDDeeetttaaaiiinnneee eee:::
SSSuuummmmmmaaarrryyy ooofff TTTooopppiiicccsss EEExxxppplllooo iiittteeeddd:::
EEExxxpppeeecccttteeeddd RRReeepppooorrrtttsss PPPrrroooddduuuccctttiiiooo nnn iiinnn RRReeessspppooonnnssseee tttooo RRReeeqqquuuiiirrreeemmmeeennntttsss:::
TTTeeerrrmmmiiinnnaaatttiiiooonnn:::
RRReeeaaasssooonnn:::
AAApppppprrroooaaaccchhh RRReeeiiinnnfffooorrrccceeeddd:::
IIInnnccceeennntttiiivvveee PPPrrrooommmiiissseeeddd:::
DDDeeellliiivvveeerrreeeddd:::
RRReeecccooommmmmmeeennndddaaatttiiiooonnn fffooorrr FFFuuurrrttthhheeerrr IIInnnttteeerrrrrrooogggaaatttiiiooonnn aaannnddd RRRaaatttiiiooonnnaaallleee:::
RRReeecccooommmmmmeeennndddeeeddd AAApppppprrroooaaaccchhh(((eeesss))):::
TTTooopppiiicccsss fffooorrr FFFuuurrrttthhheeerrr EEExxxpppllloooiiitttaaatttiiiooonnn (((LLLeeeaaadddsss))):::
DDDiiissspppooosssiiitttiiiooonnn ooofff SSSooouuurrrccceee:::_____________________________________________________________________________________________________________________________________________________________________________________________
AAAddddddiiitttiiiooonnnaaalll CCCooommmmmmeeennntttsss:::_____________________________________________________________________________________________________________________________________________________________________________________________
Figure 10-3. Interrogation Plan Format (continued). |
2-22.3 | 191 | FM 2-22.3
Chapter 11
HUMINT Collection With An Interpreter
11-1. The use of interpreters is an integral part of the HUMINT collection
effort. It is vital that the HUMINT collection skills be paired up with a
qualified interpreter. Use of an interpreter is time consuming and potentially
confusing. Proper use and control of an interpreter is a skill that must be
learned and practiced to maximize the potential of HUMINT collection. It is
also vital for the HUMINT collector to confirm that the interpreter he
intends to use holds the required clearance for the level of information that
will be discussed or potentially collected, and is authorized access to the
detainee. This chapter deals strictly with the use of interpreters to support
HUMINT collection; it is not intended to be applied to more routine uses of
interpreters in support of administrative, logistical, or other operational
requirements.
ADVANTAGES AND DISADVANTAGES OF INTERPRETER USE
ADVANTAGES
11-2. Interpreters are frequently a necessary aid to HUMINT collection.
There are certain advantages to using an interpreter. The most obvious is
that without an interpreter, a HUMINT collector without the proper
language or necessary proficiency in that language is severely limited.
Furthermore, if properly trained, briefed, and assessed, the interpreter can
be a valuable assistant to the HUMINT collector. The interpreter––
• Probably has a greater knowledge of the local culture and language
usage than could be developed by the HUMINT collector.
• Can identify language and culturally based clues that can help the
HUMINT collector confirm or refute the veracity of the source’s
statements.
• Can interpret not only the literal meaning of a statement but also the
intent and emotion of a sentence.
DISADVANTAGES
11-3. There are, however, several significant disadvantages to using
interpreters. Disadvantages may include—
• A significant increase in time to conduct the collection. Since the
interpreter must repeat each phrase, the time for a given questioning
session or meeting is normally at least doubled.
• Since there is now a third person in the communications loop, the
potential for confusion or misunderstanding increases significantly.
This is especially true when the interpreter is deficient in his command
of either language. |
2-22.3 | 192 | FM 2-22.3 _________________________________________________________________________________
• The establishment of rapport and the use of some approach techniques
(see Chapter 8) are made difficult or even impossible when working
through an interpreter.
• The ability of the HUMINT collector to interpret the source’s veracity
through the analysis of word usage, nuances of speech, and body
language is curtailed.
• The interpreter will have his own set of biases that could influence the
manner in which the dialogue is interpreted.
• The source may be culturally biased against the interpreter. This is
especially possible if the interpreter was locally hired and is of a
different ethnic, social, or religious group than the source.
• The interpreter may be culturally biased against the source and
intentionally misinterpret the meaning to obtain a desired effect.
• There may be mission or subject matter classification problems
involved.
CAUTIONS
11-4. Be careful of comments made in the presence of your interpreter.
Although you plan comprehensively with your interpreter, you should only
share information with your interpreter on a need-to-know basis. Obviously
the exchange of information concerning the “what, where, when, with whom,
and how” of each meeting must be discussed with your interpreter, but
sometimes the “real why” is none of his business! You may be meeting with a
source or contact because the commander believes this individual has lied.
The real purpose (the why) of the meeting is to pose control questions and to
determine whether the source or contact lied in the past or whether there
was simply a miscommunication.
11-5. Be careful of sensitive or personal conversations when the interpreter
is present. This applies to conversations en route to or from meetings,
conversations over lunch or dinner in the operational area, and conversations
in the team area. It is easy to get used to the presence of the interpreter and
to overlook his presence. An interpreter is a necessary tool but we must
remember that most are only very lightly screened for the sensitive access
they have. If your interpreter turned out to be working for the other side,
what information beyond “the necessary” could he provide?
METHODS OF INTERPRETER USE
11-6. There is a basic method and advanced method of interaction between
the HUMINT collector and the interpreter. As the collector and the
interpreter become experienced at working together and gain confidence in
each other’s abilities, they may use more advanced interactive techniques. It
is the HUMINT collector’s decision whether or not to use more advanced
techniques. |
2-22.3 | 193 | _________________________________________________________________________________FM 2-22.3
BASIC METHOD
11-7. The basic method of interaction is used when––
• The interpreter and HUMINT collectors have not worked together
extensively.
• The interpreter has language skills but no interpreter training or
experience.
• The interpreter’s skill in English or the target language is suspect.
• The HUMINT collector has limited experience using an interpreter.
• The interpreter’s capabilities, loyalty, or cultural knowledge are not
known or suspect.
11-8. Using the basic method, the interpreter is used solely as an
interpretation device. When initial contact is made, the interpreter instructs
the source to maintain eye contact with the HUMINT collector. The
interpreter is briefed on the general course of the collection but usually is not
advised of the specific purpose or collection goals. While the interpreter will
be instructed to reflect the attitude, behavior, and tone of voice of both the
collector and the source, he is told to not interpose comments or personal
opinions at all in the conversation.
11-9. The questioning phase is conducted in the same way it would be if no
interpreter were used with the obvious increase in time due to the
interpretation. The interpreter uses the same person and tense as the
HUMINT collector or source and neither adds nor subtracts anything from
the dialogue. He does his best to fade into the background. When reports are
written, the interpreter will only be asked questions based on the actual
translation of the dialogue.
ADVANCED METHOD
11-10. The advanced method of interaction requires additional training on
the part of the HUMINT collector and the interpreter, extensive experience
working together, and a rapport between the HUMINT collector and the
interpreter. The HUMINT collector must trust both the capabilities and the
judgment of the interpreter. At this level of interaction, the interpreter
becomes a more active participant in the HUMINT activities. The HUMINT
collector remains in charge and makes it clear to the interpreter that he (the
HUMINT collector) is responsible for the substance and direction of the
questioning. The interpreter is normally briefed as to the specific goals of the
collection.
11-11. The interpreter becomes a more active participant in the approach
and termination phases to the point of even making planned comments to the
source supportive of the HUMINT collector’s approach. For example, if the
HUMINT collector is using an incentive approach, the interpreter in an aside
to the source can tell him that the HUMINT collector always keeps his
promises. This type of technique should only be used if both planned and
rehearsed.
11-12. During the questioning phase, the interpreter supports the collector
by not only translating the word of the source but also cueing the collector
when there are language or culturally based nuances to what the source is |
2-22.3 | 194 | FM 2-22.3 _________________________________________________________________________________
saying that might add credence or doubt as to the veracity of the statements.
For example, the interpreter could point out that although the source claims
to be a factory worker, his language use indicates that the source has a
university education. In another example, the interpreter could indicate that
the dialect or pronunciation that the source is using does not match the area
that he claims to be from. During report writing, the interpreter supports the
HUMINT collector by not only answering questions on the literal
interpretation but also adds, when appropriate, comments on the significance
of both what was said and how it was said.
SOURCES OF INTERPRETERS
11-13. There are almost never sufficient interpreters to meet all unit mission
requirements. Interpreters in support of HUMINT collection require a
security clearance and knowledge of the operational situation. While any
qualified interpreter can be used to support HUMINT collection, the
HUMINT collectors maximize the collection potential if the interpreter has
received specific training. The number of interpreters needed to support a
HUMINT collection mission is METT-TC driven based primarily on the
number of HUMINT collectors, the dispersion of the HUMINT collectors in
the AO, and the number of sources. Normally one interpreter for every two
non-language qualified HUMINT collectors is sufficient; however, in
situations where a large number of high-value sources must be questioned in
a limited time, a ratio of 1 to 1 may be required. Interpreters are obtained
from within the military and from the US and local civilian populations or
other English-speaking countries.
MILITARY
11-14. There are many soldiers, including non-US citizens, who have native
language abilities due to their upbringing. Their parent unit may identify
these language abilities, or these soldiers may volunteer their abilities when
a contingency arises. The ARNG, USAR, other US military services, and even
coalition militaries, have language-trained and certified personnel in
Military Intelligence MOSs, such as 98G or 09L, who may be called upon to
serve as interpreters for the HUMINT collection effort.
CIVILIAN
11-15. Civilian corporations may be contracted by the military to provide
interpreters for an operation. These interpreters are divided into three
categories:
• CAT I Linguists - Locally hired personnel with an understanding of the
English language. These personnel undergo a limited screening and
are hired in-theater. They do not possess a security clearance and are
used for unclassified work. During most operations, CAT I linguists are
required to be re-screened on a scheduled basis. CAT I linguists should
not be used for HUMINT collection operations.
• CAT II Linguists - US citizens who have native command of the target
language and near-native command of the English language. These
personnel undergo a screening process, which includes a national |
2-22.3 | 195 | _________________________________________________________________________________FM 2-22.3
agency check (NAC). Upon favorable findings, these personnel are
granted an equivalent of a Secret collateral clearance. This is the
category of linguist most used by HUMINT collectors.
• CAT III Linguists - US citizens who have native command of the target
language and native command of the English language. These
personnel undergo a screening process, which includes a special
background investigation (SBI). Upon favorable findings, these
personnel are granted an equivalent of a Top Secret (TS) clearance.
CAT III linguists are used mostly for high-ranking official meetings
and by strategic collectors.
INTERPRETATION TECHNIQUES
11-16. During the planning and preparation phase, the HUMINT collector, in
collaboration with the interpreter, selects a method of interpretation. There
are two methods:
• Alternate Interpretation. The interpreter listens to the entire phrase,
sentence, or paragraph. The interpreter then translates it during
natural pauses in speech.
• Simultaneous Interpretation. The interpreter listens to the source and
translates what he says, just a phrase or a few words behind. The
HUMINT collector should select the simultaneous method only if all
the following criteria are met:
The sentence structure of the target language is parallel to English.
The interpreter can understand and speak English as well as the
target language with ease.
The interpreter has special vocabulary skills for the topics to be
covered.
The interpreter can easily imitate the HUMINT collector’s tone of
voice and attitude for the approaches and questioning technique
selected.
Neither the collector nor the interpreter tends to get confused when
using the simultaneous method of interpretation.
11-17. If any of the above-mentioned criteria in the simultaneous method
cannot be met, the HUMINT collector should use the alternate method. The
alternate method should also be used when a high degree of precision is
required.
TRAINING AND BRIEFING THE INTERPRETER
11-18. The HUMINT collector will need to train an individual who has no
interpreter experience as well as remind a trained and certified interpreter of
the basic interpreter requirements. The requirements include—
• Statements made by the interpreter and the source should be
interpreted in the first person, using the same content, tone of voice,
inflection, and intent. The interpreter must not interject his or her own
personality, ideas, or questions into the interview. |
2-22.3 | 196 | FM 2-22.3 _________________________________________________________________________________
• The interpreter should inform the HUMINT collector if there are any
inconsistencies in the language used by the source. The HUMINT
collector will use this information in his assessment of the source.
• The interpreter needs to assist with the preparation of reports and
administrative documents relevant to the source and meeting.
11-19. Once the HUMINT collector has chosen a method of interpretation, he
must brief the interpreter. This briefing must cover—
• The current situation.
• Background information on the source (if available).
• The administrative particulars of the meeting such as where it will be
held, the room setup, how long it will last.
• The specific positioning of the interpreter, collector, and source.
• The general or (if advanced method of interaction is being used) the
specific collection objectives.
• The selected approach and possible alternate approaches that the
HUMINT collector plans on using. If time allows, the collector and
interpreter should rehearse the approaches.
• Any special topic or technical language that is anticipated. If time
allows, the interpreter should research any anticipated technical
vocabulary with which he is unfamiliar.
11-20. Throughout the briefing, the HUMINT collector fully and clearly
answers questions the interpreter may have. This helps ensure the
interpreter completely understands his role in the HUMINT collection
process. With a more advanced interaction plan, the HUMINT collector and
the interpreter should “wargame” their plan and rehearse their actions as
necessary.
PLACEMENT OF THE INTERPRETER
11-21. The interpreter should be placed in a position that enhances the mood
or general impression that the HUMINT collector wants to establish. When
dealing with detainees or EPWs, the HUMINT collector generally wants to
establish a dominant position, maintain a direct relationship with the source,
and increase or at least maintain the anxiety level of the source. Having the
HUMINT collector and the source facing each other with the interpreter
located behind the source normally facilitates this. It allows the HUMINT
collector to maximize control of both the source and interpreter. If desired,
having the interpreter enter the room after the source, so the source never
sees the interpreter, can further heighten the anxiety of the source.
11-22. Having the interpreter sit to the side of the HUMINT collector creates
a more relaxed atmosphere. This is the norm for debriefings and official
meetings. Having the interpreter at his side also facilities “off line”
exchanges between the HUMINT collector and the interpreter. The collector
should avoid having the interpreter sit beside the source since this has a
tendency of establishing a stronger bond between the source and the
interpreter and makes “off line” comments between the collector and the
interpreter more difficult. |
2-22.3 | 197 | _________________________________________________________________________________FM 2-22.3
11-23. When conducting source meetings in a public setting, a more natural
appearance is desirable. The seating needs to conform to the norm at the
location where the meeting is taking place. For example, if meeting at a
restaurant, the HUMINT collector, interpreter, and source will sit naturally
around the table.
INTERACTIONS WITH AND CORRECTION OF THE INTERPRETER
11-24. The HUMINT collector must control the interpreter. He must be
professional but firm and establish that he is in charge. During a questioning
session, the HUMINT collector corrects the interpreter if he violates any
standards that the pre-mission briefing covered. For example, if the
interpreter interjects his own ideas into the meeting, he must be corrected.
Corrections should be made in a low-key manner as to not alienate the
interpreter, interrupt the flow of the questioning, or give the source the
impression that there is an exploitable difference of opinion between the
HUMINT collector and the interpreter. At no time should the HUMINT
collector rebuke the interpreter sternly or loudly while they are with the
source. The HUMINT collector should never argue with the interpreter in the
presence of the source. If a major correction must be made, the HUMINT
collector should temporarily terminate the meeting and leave the site
temporarily to make the correction. The HUMINT collector needs to
document any difficulties as part of his interpreter evaluation. The HUMINT
collector must always ensure that the conduct and actions of the interpreter
are within the bounds of applicable law and policy. Applicable law and policy
include US law; the law of war; relevant international law; relevant
directives including DOD Directive 3115.09, “DOD Intelligence
Interrogations, Detainee Debriefings, and Tactical Questioning”; DOD
Directive 2310.1E, “The Department of Defense Detainee Program”; DOD
instructions; and military execute orders including FRAGOs.
11-25. The HUMINT collector must be alert for any signs that the
interpreter is not performing as required. The following are some indicators
of possible problems.
• Long-to-short. If you take 20 seconds to express yourself and the
interpreter reduces it to a 3-second translation, it may indicate that
something has been omitted, and you should not proceed until you
have resolved the issue. There is nothing wrong with stating that you
would “prefer” the interpreter translate everything that was just said.
If you have trained your interpreter properly, this should not be an
issue. If it arises even with the training you have given the interpreter,
then it has significance and you must not let it pass.
• Short-to-long. If you take 5 seconds to express yourself and the
interpreter expands it to a 30-second translation, it may indicate that
something has been added, and you should not proceed until you have
resolved the issue.
• Body-language shift. If the interpreter’s body language suddenly has a
significant shift from his normal behavior, you should look for the
reason. (It is advisable for you to determine a base line of behavior for
your interpreter to facilitate recognition of the changes.) Perhaps he is
reluctant to translate what you just said. Be aware that the body shift |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.