Professional Documents
Culture Documents
Intel Interrrogation Sept 1992 Unposted
Intel Interrrogation Sept 1992 Unposted
Intel Interrrogation Sept 1992 Unposted
INTERROGATION
m a g o n iioraty (ANR-PL)
ARN: Military Documents Section
Room 1A518, Pentagon
Washington, DC 20310-6050
INTELLIGENCE INTERROGATION
Table of Contents
Page
PREFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv.
CHAPTER 1 .MILITARY INTELLIGENCE MISSIONS AND . . . . . . . . . . . . . . . . . . . . . . . . 1.1
INTELLIGENCE PREPARATION OF THE BATTLEFIELD
Warfighting Doctrine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1
The Intelligence Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1
Intelligence Disciplines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2
Intelligence and Electronic Warfare Operations . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Mission. Enemy. Troops. Terrain. and Time Available Factors . . . . . . . . . . . . . . . 1-5
Definition of Interrogation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.6
Definition of Prisoner of War and Enemy Prisoner of War . . . . . . . . . . . . . . . . . . 1.9
Pertinent Articles of Geneva Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.10
Types of Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.10
Personal Qualities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.12
Special Areas of Knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.14
Interrogator Capabilities and Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-15
Conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.16
Interrogation Missions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.17
Drug and Law Enforcement Agency Operations . . . . . . . . . . . . . . . . . . . . . . . . 1.17
iii
PREFACE
This manual provides doctrinal guidance, techniques, and procedures governing
employment of interrogators as human intelligence (HUMINT) collection assets in support of
the commander's intelligence needs. It outlines the interrogator's role within the intelligence
collection effort and the supported unit's day-to-day operations. Details are presented on how
interrogation assets accomplish their assigned collection mission.
Material in this manual applies to operations in low-, mid-, and high-intensity conflicts.
Principles outlined are valid under conditions involving use of electronic warfare (EW) or
nuclear, biological, or chemical (NBC) weapons.
This manual is intended for use by interrogators as well as commanders, staff officers, and
military intelligence (MI) personnel charged with the responsibility of the interrogation
collection effort. Unless otherwise stated, descriptions pertaining to duties, functions, and
responsibilities of the GI, G2, G3, G4, and G5 apply to equivalent positions at other
organizational echelons.
MI interrogation units are a proven and valued collection asset. This manual incorporates
the operational experiences and lessons learned. It builds upon existing doctrine and moves
interrogation into the 21st century.
These principles and techniques of interrogation are to be used within the constraints
established by the following:
Geneva Convention for the Amelioration of the Wounded and Sick in Armed Forces in
the Field of August 12,1949, hereinafter referred to as GWS.
Geneva Convention Relative to the Treatment of Prisoners of War of August 12,1949,
hereinafter referred to as GPW.
Doctrine in this publication conforms with and supports principles contained in Fh4 34-1.
This publication also complies with STANAG 1059 and Quadripartite Standardization
Agreements (QSTAGs) 170,523, and 528.
The use of the terms EPW, detainee, and source are interchangeable during interrogation
process.
Unless this publication states otherwise, masculine nouns or pronouns do not refer
exclusively to men.
The proponent of this publication is the US Army Intelligence Center. Send comments
and recommendations on DA Form 2028 (Recommended Changes to PubIications and Blank
Forms) to Headquarters, US Army Intelligence Center, A m ATSI-TDL-D, Fort
Huachuca, A Z 85613-6000.
CHAPTER 1
MILITARY INTELLIGENCE MISSIONS AND INTELLIGENCE PREPARATION
OF THE BATTLEFIELD
This manual is about interrogation operations. The capabilities and limitations of interrogation. It includes
purpose of this chapter is to define the interrogation information on the various levels of conflict, interroga-
mission and its critical elements; describe battlefield tion missions, intelligence preparation of the battlefield
operations, IEW operations, and the intelligence (IPB) and the intelligence cycle. The level of detail is
processes, disciplines, and the mission, enemy, troops, structured to assist you in understanding the interroga-
terrain, and time available (ME'IT-T) factors that shape tion tactics, techniques, and procedures described in the
and drive the interrogation process. remainder of the manual.
It also addresses the personal qualities and special
areas of knowledge of the interrogator and the
WARFIGHTING DOCTRINE
Battlefield operations demand seizing and maintain- Determine the enemy's capability and guard
ing the initiative. When operations are properly against that capability.
designed and executed, initiative accrues significant
Protect friendly forces and operations from enemy
benefits from the outset of an operation to final victory.
intelligence collection operations.
It permits attacking where, when, and what; while forc-
ing the enemy to react and try to adapt to our opera- Ensure the enemy is defeated.
tions.
o Use the weather and terrain to friendly advantage.
To gain the initiative, the commander must-
The commander uses defensive and offensive opera-
See the enemy early and determine the capabilities tions to destroy enemy first-echelon forces and deep-at-
and intentions of the enemy. tack to simultaneously delay, disrupt, and manipulate
enemy follow-on forces. The commander anticipates,
Find and track enemy follow-on echelons.
creates, and exploits windows of opportunity, using
Identify enemy high-value targets (HWs), which, flexible battle planning, to gain the initiative through of-
if successfully attacked, will contribute to the fensive operations.
degradation of important enemy battlefield func-
By effectively employing maneuver and fire support
tions.
assets, manipulating the enemy, and expertly using the
Identify, locate, and develop the required targeting weather and the terrain, the friendly commander can
data for the attack of high-payoff targets (HPTs), successfully defeat a superior enemy force. OPERA-
which, if successfully attacked, will contribute to TION DESERT STORM is an example of the success-
the success of friendly plans. ful application of this doctrine.
Detect enemy weaknesses and develop the neces- IEW support is vital to the successful planning and
sary data to support the exploitation of these execution of battlefield operations at all echelons. In-
weaknesses. telligence support at brigade and battalion levels
focuses primarily on close operations, while at division
use warfare (EW) assets to it focuses on close and deep operations. Corps is the
support battlefield operations while protecting
focal point for intelligence operations that support rear
friendly use of the electromagnetic spectrum.
and deep operations.
INTELLIGENCE DISCIPLINES
The IEW system includes three MI disciplines: sig- Interrogation cf EPWs, civilian detainees, insur-
nals intelligence (SIGINT), imagery intelligence gents, defectors, refugees, displaced persons, and
(IMINT), and HUMINT. Intelligence interrogation falls agents or suspected agents. -
within the realm of HUMINT.
Long-range sumeillance (LRS). patrols.
.
SlGlNT
Strategic debriefing.
SIGINT is derived from the intercept, analysis, and
exploitation of threat communications and noncom- @ Controlled collection operations.
munications radio-electronic emissions. Open-source exploitation, to include publications
IMlNT and broadcasts.
IMINT is obtained from the analysis of radar, Reports of contact from forward units.
photographic, infrared, and electro-optical imagery. Observation and listening posts.
HUMINT Low-level source operations (LLSO).
HUMINT is obtained from information collected
from human sources and consists of the following intel- HUMINT liaison contacts.
ligence collection operations: After World War 11, the US General Board on Intel-
ligence Sumeyed 54 division G2s, 18 corps G2s, and 7
Army G2s. It concluded that 43 percent of all intel- ligence interest, including order of battle (OB) factors,
ligence produced in the European theater of operations as well as scientific and technical (S&T) intelligence
was from HUMINT, and 84 percent of the HUMINT subjects. During OPERATION DESERT STORM, in-
was from interrogation. The majority of those surveyed terrogators collected information which helped to-
agreed that interrogation was the most valuable of all
Develop a plan to breach Iraqi defensive belts.
collection operations.
Confirm Iraqi supply-line interdiction by coalition
HUMINT is vital in all combat operations, regardless
air strikes.
of echelon or intensity of conflict. By nature, HUMINT
lends itself to the collection of information about the Identify diminishing Iraqi troop morale.
enemy's thought processes and intentions. HUMINT
Identify a US PW captured during the battle of
can provide information on almost any topic of intel-
Kafji.
INTELLIGENCE AND ELECTRONIC WARFARE OPERATIONS
The intelligence cycle supports six tasks which are entire environment of conflict, supporting contingency
common to all echelons and which must be worked, at as well as planning operations.
least in part, concurrently to satisfy the needs of the
At the strategic level, IPB focuses on all factors
commander. The commander may have to prioritize
that contribute to military potential and includes
these functions when resource and time constraints dic-
political, economic, sociological, and S&T aspects
tate.
of the enemy's ability and intent to conduct
INDICATIONS AND WARNING (I&W) military operations.
I&W identifies major shifts in enemy tactics, opera- At the operational level, IPB identifies the enemy's
tions, and strategy which will set or change the terms of political, economic or military center of gravity,
battle. They protect the commander from surprise and the lines of operation, and the points in time and
identify areas or times of risk by detecting enemy ac- geography where the decisive engagements of a
tions that are counter to planning assumptions. campaign will occur. It also predicts the courses of
At the operational level, they identify potential action (COAs) the enemy is likely to follow. This
enemy action and determine the need for a military is done by incorporating political, economic, so-
response and the probability of hostilities. cial, and geographical factors, as well as military
factors (such as his military potential and ability to
At the tactical level, they focus on the timing of apply air, ground, and naval power).
hostilities rather than on their probability.
At the tactical level, IPB focuses on the details of
I&W prevent surprise and minimize risk through the the terrain, weather, and enemy. It predicts and
early identification of enemy activities and capabilities. prioritizes the enemy's COAs and synchronizes the
INTELLIGENCE PREPARATION OF THE application of combat power on identified decisive
BAlTLEFIELD points.
IPB integrates the environment with the enemy's In mid-intensity conflict (MIC) to high-intensity con-
fighting doctrine and actions. It reveals his capabilities flict (HIC), IPB focuses on the traditional aspects of ter-
and vulnerabilities and allows the commander to sys- rain, weather, and enemy. Many of the factors evaluated
tematically predict his actions. It also allows him to un- in IPB at the strategic level are used during IPB for low-
derstand the battlefield and how to synchronize all of intensity conflict (LIC) at the operational and tactical
his battlefield operating systems for maximum effect. levels.
The results of IPB and staff wargaming are used to Social, economic, and political factors that affect the
coordinate and synchronize the intelligence system environment of conflict are considered in IPB. The
regardless of the echelon at which it is performed or the population must be examined in as much detail as the
intensity of conflict. IPB is more than preparation of enemy and the terrain to understand what an enemy can
the field of battle during hostilities. IPB considers the or cannot do. Figure 1-2 shows the intelligence cycle
using IPB.
Figure 1-2. Intelligence cycle using IPB.
SITUATION DEVELOPMENT campaign's effects on the enemy's economy and opera-
Situation development confirms or denies the enemy tional infrastructure as well as his military force struc-
COAs predicted in IPB. It confirms predicted centers of ture.
gravity and decisive points and identifies enemy BDA is focused on providing effects of particular
strengths and vulnerabilities. This enables the com- strikes and attacks, or a series of them. BDA is per-
mander to make timely decisions and effectively apply formed by the same collection assets used to satisfy the
his combat power. commander's intelligence and targeting priorities;
TARGET DEVELOPMENTAND TARGET therefore, BDA cannot be performed continuously
ACQUISITION without degradation of other capabilities, such as situa-
tion development and targeting. The commander must
Target development and target acquisition provide prioritize the BDA effort, identifying what he must
targets and targeting data for attacks by fire, maneuver, know and when he must know it, just as he does for his
and electronic means. They identify and locate those PIR and targeting priorities.
targets that will have the greatest impact on the
campaign's decisive engagements. These include deep FORCE PROTECTION
operational reserves, strategic and operational level Force protection identifies friendly vulnerabilities
command, control, and communications (c3) nodes, key and the enemy's efforts to exploit them. At the opera-
lines of communication, and air and naval staging tional level, it includes the early identification of sig-
facilities throughout the enemy's depth that contribute nificant improvements in weapon lethality, the
to his combat potential. introduction of weapons of mass destruction into the
At the tactical level, they address those HVTs that conflict, or the commitment of terrorist or other uncon-
directly contribute to the application of combat power ventional forces into friendly rear areas.
at decisive points on the battlefield. Force protection goes beyond countering enemy in-
BAlTLE DAMAGE ASSESSMENT (BDA) telligence and includes the protection of all forces that
contribute to our combat power. At the tactical level, it
BDA provides the commander with the effect of
emphasizes measures to counter the enemy's intel-
friendly operations on the enemy. It focuses on the
ligence collection capabilities and to protect the force
enemy's remaining military capabilities and potential.
from enemy action.
At the operational level, it also considers the
MISSION, ENEMY, TROOPS, TERRAIN,AND TIME AVAILABLE FACTORS
The MElT-T factors are important to the com- sive, interrogation elements must be highly mobile, with
mander when planning interrogation operations. secure communications to the supported G2 or S2.
MElT-T determines how the commander will use inter- They must be constantly prepared to move forward with
rogation assets. The effect of ME=-T on interrogation the element they are supporting. This limits time avail-
missions is discussed below. able for exploitation and dissemination.
MISSION SUPPORT On the other hand, if the mission is defensive, inter-
The supported force's mission bears directly on how rogation elements have more time to exploit individual
the interrogation element will be employed. In cordon sources. They may also have more flexibility to exploit
and search operations, commanders may determine in- EPWs or detainees and CEDs, to fulfill the
terrogators are best suited to screen the populace in commander's intent to construct operational graphics.
order to identify insurgents and their supporters. In Collection requirements vary according to echelon.
counter-drug operations, commanders may use inter- Strategic echelon requirements reflect the wide scope of
rogators to exploit documents and to train US and interest of the theater and national command authority
foreign agents in interrogation techniques. In all con- (NCA); whereas, tactical PIR and IR--and resultant
flicts, the focus will be on EPW interrogation and CED SIR--reflect the immediate, more narrowly focused in-
exploitation. telligence interest of the maneuver commander.
The mission influences interrogation operations in
other ways. For example, if the force's mission is offen-
ENEMY through the Assistant Chief of Staff, G1 (Personnel).
The enemy, and our knowledge of the enemy, can in- They can also augment their interrogators by requesting
fluence interrogator assignments and the complexity of other available linguists within the supported command
the exploitation process. One factor which affects inter- to serve as interpreters:
rogation operations is the type of opposing enemy force. Another troop-related factor which affects interroga-
The techniques and procedures used to collect from in- tion operations is the training of all soldiers on EPW
surgents in a LIC may differ from those used to collect handling and evacuation. EPW treatment during the
from regular enemy forces in a MIC to HIC. early stages of capture is critical to the success of sub-
For example, an EPW from a regular forces unit may sequent interrogations. The availability of military
have undergone political indoctrination, but his com- police (MP) support at brigade and above can enhance
mitment to his unit may not be as strong as that of the interrogation activities. Interrogation operations are
insurgent who is passionately committed to an ideal. more effective in a controlled environment where EPWs
Thus, interrogators may have more difficulty persuading are adequately guarded.
the insurgent to talk. TERRAIN
Another factor affecting interrogation operations is Terrain and weather are relevant to interrogator
our current intelligence holdings on the enemy force operations an& affect site deployments, communica-
and the interrogator's understanding of the threat. Our tions, and mobility. MP must ensure proper shelter and
intelligence holdings on the composition of a newly security for the EPW facility if it is collocated or imme-
formed insurgent organization usually will not be as diately adjacent to the EPW collecting point or intern-
complete as holdings on the composition of a regular ment facility.
enemy force. Thus, the focus of interrogation efforts in
TIME AVAILABLE
the early stages of a LIC may be on enemy force com-
position; whereas, the focus in a MIC or HIC may be on Information collected through interrogation opera-
enemv force missions or intentions. tions is valuable only if it is reported in a timely manner.
Exploitation procedures may need to be adjusted to
Cultural aspects also affect interrogation missions. make the most use of time available. At the tactical
The employment of some basic interrogation techniques level, interrogations will be brief, PIR driven, and
will differ based on the ethnic and cultural background reported in concise formats such as size, activity, loca-
of the enemy, and our failure to understand and adapt tion, unit, time, equipment (SALUTE).
to this could h a m ~ e the
r collection effort.
At the operational and strategic levels, time will
TROOPS generally allow for a more expanded interrogation effort
The number, experience level, and language and flexible reporting format, such as the intelligence
proficiency of interrogators affect the tactical employ- information report (IIR).
ment of interrogation elements. Due to the limited
The challenge is for interrogators to be proficient lin-
number of interrogators at any echelon, interrogation
guists and skilled members of a highly organized collec-
element commanders have to pick from available inter-
tion activity. This ensures the acquisition of the
rogators. They must manage personnel to ensure the
maximum amount of pertinent information regardless
most experienced are used to the best advantage (for ex-
of time available.
ample, to exploit complex enemy documents) and select
EPWs most likely to answer SIR. Like other intelligence assets, interrogators must
serve the commander. Interrogation operations are of
Interrogation element commanders often have to
no value unless they contribute to the accomplishment
contend with a mismatch between language-qualified
of the supported commander's mission. To understand
personnel assigned to the unit and languages needed to
the interrogator's role in mission accomplishment, one
perform the mission. They overcome the mismatch by
must understand the interrogation process.
acquiring local national (LN) interpreter support
DEFINITION OF INTERROGATION
Interrogation is the process of questioning a source to The goal of any interrogation is to obtain reliable infor-
obtain the maximum amount of usable information. mation in a lawful manner, in a minimum amount of
,,time, and to satisfy intelligence requirements of any may not be in line with his specific objective, the inter-
echelon of command. Sources may be- rogator must develop this important lead to obtain all
possible information concerning this weapon. It be-
1 e Civilian internees.
comes obvious an interrogation objective can be
Insurgents. changed as necessary or desired.
I EPWs. PROHIBITION AGAINST USE OF FORCE
Defectors. The Intelligence Staff Officer (J2, G2, or S2) has
responsibility for all command intelligence functions.
Refugees. He assists the commander by-
Displaced persons. e Supervising the collection, evaluation, and inter-
Agents or suspected agents. pretation of all intelligence information.
Other non-US personnel. Disseminating intelligence to appropriate higher,
lower, and adjacent units.
A good interrogation produces needed information
which is timely, complete, clear, and accurate. An inter- Assuming primary responsibility to ensure that all
rogation involves the interaction of two personalities- command intelligence functions are conducted in
the source and interrogator. Each contact between accordance with international, US, and other ap-
these two may differ because of individual charac- plicable law and policy. Specifically, the J2, G2, or
teristics and capabilities of the participants. Further- S2 is responsible to ensure the GWS, GPW, and
more, the circumstances of each contact and physical GC are not violated by intelligence personnel.
environment vary. One of the significant means used by the intelligence
Other forms of intelligence interrogations include in- staff is the interrogation of the following:
terviews, debriefings, and elicitations. There are certain EPWs.
principles which generally apply to all types of inter-
rogations; namely, the objective, the prohibition against Captured insurgents.
use of force, and security. Civilian internees.
OBJECTIVE Other captured, detained, or retained persons.
Each interrogation must be conducted for a definite
Foreign deserters or other persons of intelligence
purpose. The interrogator must keep this purpose firm-
interest.
ly in mind as he proceeds to obtain usable information
to satisfy the assigned requirement, and thus contribute These persons are protected by the Geneva Conven-
to the success of the unit's mission. tions for the Protection of War Victims of August 12,
1949, as they relate to Captured wounded and sick
The objective may be specific-Establish the exact
enemy personnel (GWS), retained enemy medical per-
location of an ammunition storage facility. Or it may be
sonnel and chaplains (GWS), enemy prisoners of war
general--Seek to obtain OB information about a
(GPW), and civilian internees (GC). Captured insur-
specific echelon of the enemy forces.
gents and other detained personnel whose status is not
In either case, the interrogator must use the objective clear, such as suspected terrorists, are entitled to PW
as a basis for planning and conducting the interrogation. protection until their precise status has been deter-
He should attempt to prevent the source from becoming mined by competent authority.
aware of the true objective of the interrogation. The in-
In conducting intelligence interrogations, the 52, G2,
terrogator should not concentrate on the objective to
or S2 has primary staff responsibility to ensure these ac-
the extent he overlooks or fails to recognize and exploit
tivities are performed in accordance with the GWS,
other valuable information extracted from the source.
GPW, and GC, as well as US policies, regarding the
For example, during an interrogation, the inter- treatment and handling of the above-mentioned per-
rogator learns of the presence of a heretofore unknown, sons.
highly destructive weapon. Although this information
The GWS, GPW, GC, and US policy expressly to extract a confession or information, or for sadistic
prohibit acts of violence or intimidation, including pleasure.
physical or mental torture, threats, insults, or exposure
Examples of physical torture include--
to inhumane treatment as a means of or aid to inter-
rogation. Electric shock.
Such illegal acts are not authorized and will not be Infliction of pain through chemicals or bondage
condoned by the US Army. Acts in violation of these (other than legitimate use of restraints to prevent
prohibitions are criminal acts punishable under the escape).
UCMJ. If there is doubt as to the legality of a proposed
Forcing an individual to stand, sit, or kneel in ab-
form of interrogation not specifically authorized in this
normal positions for prolonged periods of time.
manual, the advice of the command judge advocate
should be sought before using the method in question. Food deprivation.
Experience indicates that the use of prohibited tech- Any form of beating.
niques is not necessary to gain the cooperation of inter-
Examples of mental torture include--
rogation sources. Use of torture and other illegal
methods is a poor technique that yields unreliable Mock executions.
results, may damage subsequent collection efforts, and
Abnormal sleep deprivation.
can induce the source to say what he thinks the inter-
rogator wants to hear. Chemically induced psychosis.
Revelation of use of torture by US personnel will Coercion is defined as actions designed to unlawfully
bring discredit upon the US and its armed forces while induce another to compel an act against one's will. Ex-
undermining domestic and international support for the amples of coercion include-
war effort. It also may place US and allied personnel in
@ Threatening or implying physical or mental torture
enemy hands at a greater risk of abuse by their captors.
to the subject, his family, or others to whom he
Conversely, knowing the enemy has abused US and al-
owes loyalty.
lied PWs does not justify using methods of interrogation
specifically prohibited by the GWS, GPW, or GC, and Intentionally denying medical assistance or care in
US policy. exchange for the information sought or other
cooperation.
Limitations on the use of methods identified herein
as expressly prohibited should not be confused with Threatening or implying that other rights guaran-
psychological ploys, verbal trickery, or other nonviolent teed by the GWS, GPW, or GC will not be
or noncoercive ruses used by the interrogator in the provided unless cooperation is forthcoming.
successful interrogation of hesitant or uncooperative
Specific acts committed by US Army personnel may
sources.
subject them to prosecution under one or more of the
The psychological techniques and principles in this following punitive articles of the UCMJ:
manual should neither be confused with, nor construed
Article 78 - Accessory after the fact.
to be synonymous with, unauthorized techniques such
as brainwashing, physical or mental torture, or any Article 80 - Attempts (to commit one of the fol-
other form of mental coercion to include drugs that may lowing offenses).
induce lasting and permanent mental alteration and
Article 81 - Conspiracy (to commit one of the fol-
damage.
lowing offenses).
Physical or mental torture and coercion revolve
Article 93 - Cruelty and maltreatment.
around eliminating the source's free will, and are ex-
pressly prohibited by GWS, Article 13; GPW, Articles Article 118 - Murder.
13 and 17; and GC, Articles 31 and 32. Torture is
defined as the infliction of intense pain to body or mind Article 119 - Manslaughter.
Article 124 - Maiming.
! Article 127 - Extortion. The approaches, psychological techniques, and other
/
I
,
Article 128 - Assault (consummated by battery;
with a dangerous weapon; or intentionally inflict-
principles presented in this manual must be read in light
of the requirements of international and US law as dis-
cussed above.
I ing grievous bodily harm).
Article 134 - Homicide, negligent: Authority for conducting interrogations of personnel
detained by military forces rests primarily upon the
-- Misprision of a serious offense traditional concept that the commander may use all
(taking some positive act to conceal a serious crime available resources and lawful means to accomplish his
committed by another). mission and to protect and secure his unit.
-- Soliciting another to commit an of- It is the stated policy of the US Army that military
fense. operations will be conducted in accordance with the law
of war obligations of the US. The GWS, GPW, and G C
-- Threat, communicating.
establish specific standards for humane care and treat-
See Appendix A for the text of these offenses. ment of enemy personnel captured, retained, o r
detained by US military forces and its allies. Suspected
While using legitimate interrogation techniques, cer-
o r alleged violations of these standards will be reported,
tain applications of approaches and techniques may ap-
investigated and, if appropriate, referred to competent
proach the line between lawful actions and unlawful
actions. It may often be difficult to determine where authority for trial or other disposition. Violations of
the GWS, GPW, or G C committed by US personnel
lawful actions end and unlawful actions begin. In at-
normally constitute violations of the UCMJ.
tempting to determine if a contemplated approach or
technique would be considered unlawful, consider these The commander is responsible for ensuring that the
two tests: forces under his command comply with the GWS, GPW,
and GC. Should violations occur in the conduct of war-
0 Given all the surrounding facts and circumstances,
fare, the commander bears primary responsibility for in-
would a reasonable person in the place of the per-
vestigating and prosecuting violations.
son being interrogated believe that his rights, as
guaranteed under both international and US law, SECURITY
are being violated or withheld, or will be violated The interrogator, by virtue of his position, possesses a
or withheld if he fails to cooperate. great deal of classified information. H e is aware his job
If your contemplated actions were perpetrated by is to obtain information, not impart it to the source. H e
the enemy against US pws, you would believe such safeguards military information as well as the source of
actions violate international or US law. that information.
If you answer yes to either of these tests, do not This becomes very clear when one considers that
engage in the contemplated action. If a doubt still among those Persons with whom the interrogator has
remains as to the legality of a proposed action, seek a Contact, there are those attempting to collect informa-
legal opinion from your servicing judge advocate. tion for the enemy. The interrogator is alert to detect
any attempt made by the source to elicit information.
Where they fail to comply with a summons made individual as such. The determination whether an in-
to them with a view to internment. dividual qualifies as a PW is a Staff Judge Advocate
(SJA) function, but has a direct impact on the interroga-
Obvi0usl~,there are many ~ e r whos qua''@ ~ for~ ~ ~ effort
tion ~ due to GPW requirements. 1t is especially
and require treatment as PWs. If there is any question important in LICs to distinguish between PWs and
whether a person should be treated as a PW, treat the criminals.
PERSONAL QUALITIES
An interrogator should possess an interest in human devote time to study and practice. Some desirable per-
nature and have a personality which will enable him to sonal qualities in an interrogator are discussed below.
gain the cooperation of a source. Ideally, these and
other personal qualities would be inherent in an inter- MOTIVATION
rogator; however, in most cases, an interrogator can cul- Motivation is the most significant factor to achieve
t i ~ a t ethese qualities if he has the desire and is willing to Success. Without motivation, other qualities lose their
significance. The stronger the motivation, the more
successful the interrogator. An interrogator may be rewards when promised may adversely affect future in-
motivated by several factors; for example: terrogations. The importance of accurate reporting
An interest in human relations.
cannot be overstressed, since interrogation reports are
often the basis for tactical decisions and operations.
A desire to react to the challenge of personal inter-
OBJECTIVITY
play.
The interrogator must maintain an objective and dis-
An enthusiasm for the collection of information. passionate attitude, regardless of the emotional reac-
A profound interest in foreign languages and cul- tions he may actually experience or simulate during the
tures. interrogation. Without objectivity, he may uncon-
sciously distort the information acquired. He may also
ALERTNESS be unable to vary his interrogation techniques effective-
The interrogator must be constantly aware of the ly.
shifting attitudes which normally characterize a source's
SELF-CONTROL
reaction to interrogation. The interrogator-
The interrogator must have exceptional self-control
@ Notes the source's every gesture, word, and voice to avoid displays of genuine anger, irritation, sympathy,
inflection. or weariness which may cause him to lose the initiative
Determines why the source is in a certain mood or during the interrogation. Self-control is especially im-
why his mood suddenly changed. It is from the portant when employing interrogation techniques which
source's mood and actions the interrogator deter- require the display of simulated emotions or attitudes.
mines how to best proceed with the interrogation. ADAPTABILITY
Watches for any indication the source is withhold- An interrogator must adapt to the many and varied
ing information. personalities which he will encounter. He should try to
Watches for a tendency to resist further question- imagine himself in the source's position. By being
ing, diminishing resistance, contradictions, or adaptable, he can smoothly shift his techniques and ap-
other tendencies, to include susceptibility. proaches during interrogations according to the opera-
tional environment. In many cases, he has to conduct
PATIENCE AND TACT interrogations under unfavorable physical conditions.
The interrogator must have patience and tact in creat- PERSEVERANCE
ing and maintaining rapport between himself and the
source, thereby enhancing the success of the interroga- A tenacity of purpose can be the difference between
tion. The validity of the source's statements and mo- an interrogator who is merely good and one who is su-
tives behind these statements may be obtainable only perior. An interrogator who becomes easily dis-
through exercise of tact and patience. Displaying im- couraged by opposition, noncooperation, or other
patience may- difficulties will neither aggressively pursue the objective
to a successful conclusion nor seek leads to other valu-
@ Encourage the difficult source to think if he able information.
remains unresponsive for a little longer, the inter-
rogator will stop questioning. APPEARANCE AND DEMEANOR
The interrogator's personal appearance may greatly
Cause the source to lose respect for the inter-
influence the conduct of the interrogation and attitude
rogator, thereby reducing his effectiveness.
of the source toward the interrogator. Usually a neat,
An interrogator, with patience and tact, is able to ter- organized, and professional appearance will favorably
minate an interrogation and later continue it without influence the source. A firm, deliberate, and
arousing apprehension or resentment. businesslike manner of speech and attitude may create a
proper environment for a successful interrogation. If
CREDIBILITY
the interrogator's manner reflects fairness, strength, and
The interrogator must maintain credibility with the efficiency, the source may prove cooperative and more
source and friendly forces. Failure to produce material receptive to questioning.
However, depending on the approach techniques (see The source, especially if detained by military forces
Chapter 3), the interrogator can deliberately portray a during tactical operations, normally has undergone a
different (for example, casual or sloven) appearance and traumatic experience and fears for his life. This anxiety
demeanor to obtain the cooperation of the source. is usually intensified by the source's lack of knowledge
and understanding of what is about to occur (fear of the
INITIATIVE
unknown), or by the unfounded fear he will be tortured
Achieving and maintaining the initiative are essential or executed.
to a successful interrogation just as the offense is the
key to success in combat operations. The interrogator The interrogator has a position of authority over the
must grasp the initiative and maintain it throughout the source. The source realizes this fact, and, in some cases,
interrogation. believes his future might depend upon his association
with the interrogator.
CONFLICTS
HICs are conflicts between two or more nations and Are waged by combining and employing political,
their respective allies, where the belligerents employ economic, informational, and military instruments.
modern technology complemented by intelligence;
Are often localized, generally in the Third World,
mobility; firepower (to include NBC weapons); service
but contain regional and global security implica-
support; and c3resources.
tions.
MICs are conflicts between two or more nations and
their respective allies, where the belligerents employ LIC operational intelligence requirements are
modern technology complemented by intelligence; HUMINT intensive and demand detailed familiarity
mobility; firepower (without NBC); c3;and service sup- with the military, political, and front organizations of
port resources for limited objectives under definitive the insurgent enemy, and the environment in which he
policy limiting employment of destructive power and operates.
geography involved. The interrogator's familiarity with the areas of opera-
LICs are political-military confrontations between tions (AOs) must include an understanding of the insur-
contending states or groups below conventional war and gency, its objectives, history, successes, and failures.
above the routine, peaceful competition among states. This understanding is required not only on a general
They- countlywide basis but also on an expanded basis within
the interrogator's particular AO. Therefore, it is essen-
Frequently involve protracted struggles of compet- tial the interrogator grasps the importance the insur-
ing principles and ideologies. gent organization places on accomplishing political
Range from subversion to the use of armed force. objectives as opposed to military successes.
One measure of the interrogator's effectiveness is his @ Counterinsurgency and insurgency support.
ability to apply appropriate interrogation techniques to Combatting terrorism.
the personality of the source. Interrogations associated
with LIC operations dictate the need for skill in the full Peacekeeping and peacetime contingency opera-
range of interrogation techniques so the interrogator tions.
can conduct the many types of interrogations demanded.
HUMINT is a major LIC source because of the neces-
Warfighting doctrine IEW principles apply for LIC; sity to exploit the local populace and to know and un-
however, intelligence indicators for insurgent activity derstand enemy intentions. In LIC, interrogators
are unique. Anything insurgents can do to influence exploit EPWs and CEDs. For example, in addition to
and direct a society toward overthrowing its government conducting EPW operations at collecting points, inter-
is reflected by some action or indication, no matter how rogators may participate in cordon and search and
subtle. Some MI advisors may be required to assist roadblock operations, tactical check points, and low-
paramilitary and nonmilitary elements in developing level collection missions in conjunction with the sup-
HUMINT sources and exploiting their information. porting CI unit (see FM 34-60A(S)). Interrogators may
also provide support to drug and law enforcement agen-
As US forces are committed to the LIC operation, in-
cy (DLEA) operations.
terrogation support will more closely adhere to the
traditional tactical environment. Qpical LIC missions
are-
INTERROGATION MISSIONS
Interrogators perform various types of missions. As LLSO linguist support.
discussed previously, the two main missions are person-
Psychological operations (PSYOP) linguist sup-
nel and document exploitation. There are other func-
port.
tions for which interrogators are ideally suited because
of their language ~ ~ ~ - H U M Itraining.
NT These in- @ Civil Affairs (CA) linguist support.
clude--
Treaty verification and observer duties.
Linguist support to hostage negotiations, counter-
drug, and special operation forces (SOF) opera-
tions.
Figure 2-4. MI Company Operations Support Platoon for ACR and Separate Brigade.
SPECIAL FORCES GROUP Interrogation teams may be combined with the CI sec-
a special Group (Airborne) (SFGA), inter- tion when not conducting interrogation operations.
rogators are assigned to the Military Intelligence
Detachment (MID). Figure 2-5 shows this structure.
CORPS FACILITIES
The corps EPW holding area is established and operations and interrogation areas with separate,
operated by MP under the supervision of the corps enclosed interrogation booths or rooms. If possible,
provost marshal. The Corps Interrogation Facility there should be a separate DOCEX area. Figure 2-12
(CIF) will usually be a more permanent type facility shows a sample CIF.
than at echelons below corps. It should consist of
2-10
The commander, CI Interrogation Company, MI Bat- EDITORIAL PERSONNEL
talion (TE), MI Brigade (Corps), is the CIF com- The senior interrogator may assign interrogators to
mander. CIFs are the principal establishment for the edit INTREPs. They also may use the organizational
exploitation of captured personnel and CEDs. Func- chain of command to ensure quality control of report-
tions of the centers include- ing. When OB analysts are available, the commander
Conducting tactical and strategic interrogations may task them to edit reports.
based on the intelligence requirements and specific DOCEX SECTION
guidance of the corps G2 section.
The DOCEX section receives documents taken from
Screening to select sources suited for further ex- captured personnel, battlefield casualties, and positions
ploitation at a higher echelon interrogation center. abandoned by the enemy. It processes captured docu-
Screening of EPW and other sources of specific CI ments; for example, screens for intelligence value,
interest. categorizes, and translates. It forwards translation
reports on information of immediate tactical value.
Interrogating sources of interest to PSYOP intel- (Chapter 4 describes document categories.)
ligence based on their requirements.
SPECIALIZED INFORMATION
Preparing and disseminating interrogation reports.
The scope of interrogations at corps is widened by the
Continuous coordination between the CIF com- commander's intelligence requirements, SIR of the
mander and EPW holding area commander is essential. numerous technical service staff agencies, and other in-
At a sub-level, it is also important for interrogators to telligence agencies and services. All such special needs
maintain a good working relationship with MP at the for information are coordinated by the corps G2 sec-
holding area. tion. Interrogators must be aware of these overall intel-
ligence requirements to adequately exploit captured
MP, who are in constant contact with EPWs or
personnel.
detainees, can provide interrogators valuable informa-
tion on individual sources. By properly handling Because of the range of specialized information re-
prisoners at all times, they also contribute to the success quired, interrogation at corps level should be conducted
of interrogation operations by helping to reduce resis- by interrogators who specialize in fields such as armor,
tance by the sources. engineering, medicine, and other specialized subject
areas.
The CIF should be administratively and operationally
self-sufficient and located within or adjacent to the To extract detailed EPW information, the senior in-
EPW holding area, close enough to facilitate opera- terrogator will assign some interrogators as screeners
tions. and others to specialized areas. However, he must coor-
dinate, for example, with technical intelligence
ADEQUATE INTERROGATION FACILITIES
(TECHINT) assets. This is to prevent duplication or
At corps level, particular emphasis should be placed gaps in information obtained.
on providing facilities adequate for the interrogation of
EPWs of higher positions or rank. Because interroga- Continuous coordination is required between all
tions will normally last longer than at division, a greater echelon interrogators to ensure a smoothly functioning
degree of comfort should be provided, if possible. In operation.
other respects, the type of interrogation facilities and The corps MI brigade applies the technical expertise,
equipment parallels those found at division. intelligence manpower, and equipment needed by G2 to
08 SECTION produce integrated combat intelligence. The corps
commander has OPCON, while the G2 has staff super-
OB analysts are a valuable interrogation facility asset. vision over the MI brigade.
They ensure PIR, IR, and SIR are updated, and report-
ing is in response to them. In addition, they maintain a
situation map (SITMAP) and OB updates to keep inter-
rogators current on tactical situations.
ECHELONS ABOVE CORPS FACILITIES
At echelons above corps (EAC), the MI company Have intelligence analysts to handle requirements
(ME), MI battalion ( M E ) or (I&E), MI brigade and keep interrogators informed of changes in the
(EAC), will form the Theater Interrogation Facility operational or strategic situation.
.d
AMPHIBIOUS OPERATIONS
The assault landing team is the basic subordinate task ligence officer, and employed at his direction. Small in-
organization of the assault echelon of a landing force. terrogation teams may be formed, which will embark on
Regardless of whether a battalion or brigade landing separate ships. Communication silence will place an ef-
team is the basic element, it will operate independently fective barrier between these teams until that silence is
during the first stages of the landing, and be organized lifted.
to land, overrun beach defenses, and secure terrain ob-
When the assault begins, organizational artillery, air
jectives. support, and naval gunfire depend primarily on shore
The interrogation element, along with CI teams, units for accurate target information. As a result, inter-
should participate in all aspects of the planning phase rogators may be required to concentrate their efforts on
affecting the landing force to which it is attached. Inter- target acquisition.
rogators should conduct specialized training. The chief
The importance of information obtained from cap-
interrogator should coordinate with the landing force
tured enemy personnel is magnified when establishing a
intelligence officer on all matters concerning inter-
beachhead. This is because the commander is unable to
rogators after the landing has been made.
undertake probing actions to "feel out" the enemy as he
The interrogators obtain as much background infor- can during a more conventional land operation.
mation about the enemy as possible to interrogate cap-
INITIAL INTERROGATIONS
tured enemy personnel. Interrogators should study-
Interrogators should conduct initial interrogations
@ All maps, charts, and photographs of the terrain near the landing beach close to the CP to communicate
and defenses of the landing areas. information without delay. If necessary, interrogators
All INTREPs on the enemy armed forces in that may be sent forward to operate with assault companies.
area. EPW are turned over to the landing force shore party
for custody and eventual evacuation.
Available information on enemy reserves, as well
as on civilians residing in the area. Further instructions on interrogations and EPW han-
dling are in the intelligence annex of the landing force
Interrogators should engage in other phases of train- operations order (OPORD). The interrogation of
ing, including rehearsals, to smoothly execute embarka- civilians for information of intelligence value also is an
tion, movement, and debarkation operations. important part of the interrogation mission.
The interrogation element attached to an amphibious
landing force will be OPCON to the landing force intel-
ESTABLISH AND OPERATE The shore party or helicopter support teams operate
When headquarters of the next higher echelon above EPW collecting points in the vicinity of the landing
the landing force has landed and established its CP, beaches. EPW are evacuated from these points to
some of the interrogators may be returned to the com- designated ships by landing craft, helicopter, or am-
mand level from which they were originally detached. phibious vehicle. Retention in the objective areas is
At this time, collecting points and interrogation begun as increased facilities, supplies, and personnel
facilities can be established and operated as in ordinary permit, consistent with reasonable EPW safety from
ground operations. enemy action.
AIRBORNE OPERATIONS
The functions and basic methods of operations by in- Interrogators should spend sufficient time coordinat-
terrogation personnel with airborne operations are ing with other intelligence specialists, particularly
similar to that of an infantry division. However, the analysts, to provide a realistic and complete picture of
method of employment of interrogators is somewhat the enemy situation.
different. Interrogators who are to operate with air-
They must study enemy units identified in the objec-
borne units must understand the peculiarities in opera-
tive area, as well as significant terrain features, to pro-
tions, as well as in training.
vide a background for more comprehensive inter-
The most significant difference between airborne and rogations when the first EPWs are captured. Prior to
normal ground operations is airborne operations are the actual airborne assault, interrogators must know CP
usually carried out behind enemy lines. Before the locations of the division and its subordinate units.
operation, airborne qualified interrogators must-
Interrogators involved in airborne operations must
* Gain a realistic and complete picture of the enemy anticipate the numerous problems which will affect the
situation. interrogation mission. For example, it is conceivable
during the assault phase that no basic transportation
Study enemy units identified in the objective area,
will be available to interrogation personnel; thus,
and those capable of moving to counterattack our
flexibility is critical in planning and executing airborne
forces.
operations.
Locate significant terrain features in the objective
COLLECTING POINTS AND INTERROGATION
area. FACILITIES
The command echelon to which interrogators will be Collecting points and interrogation facilities are es-
attached depends on each airborne battalion for the as- tablished and operated as in other operations when-
sault phase. Interrogators move into the objective area
with the unit they are supporting. They are OPCON to Headquarters of the next higher echelon above the
the unit intelligence officer. assault units have been airdropped.
As soon as the objective areas and the missions of the Assault units have established physical contact
respective units within an airborne force are designated, with higher headquarters.
the interrogators who are to take part in the operation AIR ASSAULT (AIRMOBILE) OPERATIONS
must receive details on most aspects of the operation.
Air assault operations are characterized by a high de-
Interrogators must be provided with-
gree of tactical mobility. They are conducted by
The SIR and proposed
- .
H-hour. transporting infantry and field artillery units, with the
necessary combat support (CS) and combat service sup-
* Maps, photographs, and other data required for in-
port (CSS), into battle by helicopter. Once deployed on
terrogations.
the ground, air assault infantry battalions fight like
All information on enemy units which are outside other infantry battalions. The essence of air assault tac-
the objective area, but are capable of being tics is a rapid tempo of operations over extended ranges.
employed to counterattack US forces. In division air assault operations, to support more than
one brigade, there must be corps augmentation. FM 71- After assault units have established a ground link-up,
101 describes air assault operations. some or all of the interrogators may be returned to the
Security of aircraft enroute to landing zones (LZs) is echelon of command from which they were detached.
a major concern. Friendly aircraft and air defense sup- Interrogators supporting the early stages of an air as-
port must ensure air routes are free of enemy aircraft sault operation must be provided with the SIR, which
and air defense systems. are critical to the operation's success. Interrogators
When remotely monitored battlefield sensor systems must plan ahead on how to question EPWs to satisfy
(REMBASS) are available, friendly ground assets immediate collection requirements.
emplace REMBASS along likely enemy ground ap- ARMORED AND MECHANIZED JNFANTRY
proach routes in the L Z to detect and report ground OPERATIONS
movement. Ground surveillance radar (GSR) is Armored units normally operate on extensive fronts,
employed to warn of enemy movement on friendly with deep zones of action and dispersed formations. Be-
flanks. cause of the mobility and wide range of action of ar-
Air assault operations require extensive HUMINT mored units, interrogation normally is not as detailed as
support in operation planning. CI analysis is critical to in other divisions. Interrogators must remain mobile,
ensure OPSEC measures are taken to prevent divulging operate with minimum facilities, and be alert for sudden
critical information, such as- changes in the tactical situation.
8 Date and time of operation. Planning and Operation
8 Size of force to be employed. With a few exceptions, the planning and preparation
necessary for interrogators supporting armored units is
8 Air routes to and from planned LZs. the same as for those supporting regular infantry units.
8 Planned LZ locations. Since radio is the normal means of communication, all
interrogation team members must be familiar with voice
CI must also support staging area actions to prevent radio procedures and know how to operate radio equip-
espionage, sabotage, and acts of terrorism which could ment common to armored units.
adversely affect the operation.
Interrogator Employment
Interrogation is a primary source of information for Interrogator personnel who support armored or
air assault operations IPB. Interrogation support of ini- mechanized units will come under OPCON of the 52,
tial stages of the operation may be critical to its success. G2, or S2 of the supported unit. Interrogators at all
The assault force commander needs immediate and levels of armored or mechanized units must be able to
current enemy intelligence. Lack of immediate ques- operate during fluid situations, and remain mobile at all
tioning of EPWs captured in securing the LZs or in fol- times. Because of this mobility, liaison with the 52, G2,
low-up actions may cause failure of the operation. or S2 will not be as frequent as in other units.
Planners must consider the difficulty in getting EPWs Interrogators must operate with maximum efficiency
back to a support area during the early stages of an air on the basis of radio communications, messages, and
assault operation. Interrogators should support the air written reports. As in other type units, interrogation
assault elements as soon as possible. This may mean an personnel remain OPCON to the G2 until operations
interrogation team is included in the air assault force to begin. At that time, the division MI battalion will at-
operate at a forward EPW collecting point established tach interrogation personnel to subordinate units.
in the vicinity of the LZ. After an operation is completed, interrogation person-
nel will revert to division control, pending a future mis-
Normally, one interrogation team should support sion.
each air assault battalion during the assault phase. If
the air assault battalion is using more than one LZ, the Normally, interrogations within armored units will be
team may be split to support each LZ. limited to interrogating EPWs for location and deploy-
ment of antitank weapons and defenses, enemy
roadblocks, and presence of enemy armor. In fast
moving offensive operations, interrogators are best CAPTURE RATES
, employed with the forward elements of the units. US military involvement in tactical operations during
Limited Interrogations
- and since World War I1 has shown that conflict
generates large numbers of EPWs, other detainees, and
EPWs are questioned briefly at the point of capture
CEDs. The higher the intensity of conflict, the larger
(POC), and evacuated to division EPW forward collect-
the number of EPWs, detainees, and CEDs.
ing- -points, or are turned over to division MP for evacua-
tion. Interrogators with battalions and brigades in In OPERATION DESERT STORM, EPWs were
armored operations should have vehicles equipped with captured, and surrendered, in such great numbers that
radios so they can communicate with the respective in- many with information had little or no contact with in-
telligence officers and other intelligence agencies. terrogators until they were transported to rear area col-
lecting points. By this time, any tactical information
General exploitation techniques and procedures are
they had was of limited use.
modified to fit the environment and objectives of each
interrogation. In LIC operations in Grenada and Panama, the EPW
capture rate was lower, but the detainee rate was higher.
EPWs are a primary source of information during tac-
The following factors contributed to an extreme chal-
tical operations. The ability to exploit that source is a
lenge for interrogation operations:
critical factor in mission success. EPWs are first-hand
and last-minute observers of enemy operations. They Limited size of US forces.
represent one of the few forms of directassociation with
Limited number of language-qualified inter-
the enemy and usually possess valuable information.
rogators.
Other sources of information are enemy and friendly
The focus on local populace.
civilians, refugees, defectors, captured agents, and in-
formers. Because these sources may have lived in or Massive amounts of CEDs.
passed through areas occupied or controlled by the
To be successful, interrogation support to tactical
enemy, they can provide valuable information.
I operations must be carefully planned. Available inter-
I CEDs are another important source of information rogation assets must be balanced against the operations
which interrogation personnel will exploit in tactical objective, enemy situation estimate, and projected EPW
operations. Documents will be found in the possession capture rates.
of EPWs or other detainees and on the battlefield.
The formulas in Table 2-1 are used to estimate the
Often, they provide critical and sometimes detailed
approximate division-level EPW capture rates. These
enemy information.
formulas could vary according to type of conflict and
mission.
INSURGENCY COUNTERINSURGENCY
Interrogate EPWs and detainees. Interrogate EPWs and detainees.
Exploit CEDs. Exploit CEDs.
Provide PSYOP linguistic support. Train HN forces in interrogation techniques.
Train insurgent combatants in interrogation tech- Provide linguistic support to other US forces,
niques. advisors, and trainers.
COMBATTING TERRORISM Provide PSYOP linguistic support.
Provide PSYOP linguistic support directed against Provide CA Linguistic support.
terrorists.
In counter-drug operations-
Provide CA linguistic support.
-Train HN personnel in interrogation
Provide linguistic support for liaison with military techniques.
or paramilitary HQ.
-Exploit and analyze drug-related
Provide linguistic support during PW exchanges. documents.
Debrief members of US peacekeeping forces for PEACETIME AND PEACEKEEPING OPERATION
intelligence purposes. Provide PSYOP linguistic support.
Debrief knowledgeable civilians being
evacuated from danger zones during NEO.
Support counter-drug operations by-
-Training HN personnel in interroga-
tion techniques.
-Exploiting and analyzing narcotics-
related documents.
THEATER INTERROGATION FACILITY
The EAC interrogation facility will normally be desig- A TIF is organized into a headquarters section,
nated as the TIF. A TIF is staffed by US Army inter- operations section, and two interrogation and DOCEX
rogators and analysts, with support from Air Force, sections. It will normally have an attached TSA section
Navy, Marine Corps, and other US national agencies as from Operations Group, and a liaison team from the
required. In a multinational operation, a combined in- Joint Captured Materiel Exploitation Center (JCMEC).
terrogation facility may be established with allied inter- The JCMEC liaison team assists 'in exploiting sources
rogator augmentation. In addition to conventional who have knowledge of captured enemy weapons and
theater Army operations, a TIF may be established to equipment.
support a joint or unified command to meet theater re-
The headquarters section provides all command, ad-
quirements during crisis or contingency deployments.
ministrative, logistical, and maintenance support
-- to the
MI battalion companies, MI brigade (EAC) provide TIF. It coordinates with-
US Army interrogation support to-the EAC ?Ik. The
e Commander, MI Battalion (ME) for personnel
mission of the TIF is to-
status, administrative support, and logistical sup-
Establish liaison with host nation (HN) com- port prior to deploymentr -
manders to achieve critical intelligence informa-
Battalion S3 for deployment of interrogation as-
tion in response to theater and national level
sets.
intelligence
- collection requirements.
Theater J2 for reporting procedures, operational
Ensure communication between HN and US situation update, and theater and national level in-
military TIF commanders, and establish rapport telligence requirements.
with HN interrogation
- activities.
Provost marshal for location of theater EPW
Coordinate for national level collection require- camps, and for procedures to be followed by inter-
ments. rogators and MP for processing, interrogating, and
Interrogate PWs, high-level political and military internment.
personnel, civilian internees, defectors, refugees, Commanders of theater medical support units and
and displaced persons. internment facility for procedures to treat, and
Participate in debriefings of US and allied person- clear for questioning, wounded EPWs.
nel who have escaped after being captured,-or who Commander, CI company, for CI requirements and
have evaded capture. joint interrogation and CI procedures.
Translate and exploit selected CEDs. OPERATIONS SECTION
Assist in technical support activity (TSA) opera- This section (where ideally the officer in charge [OIC]
tions (see FM 34-5(S)). has the 3Q additional skill identifier) is organized into
The MI battalion (I&E) has an HHC for c3,and the operations, OB,and communicatiofls elements. The
three interrogation companies, of which one is Active operations section-
Component (AC) and the other two are RC. The com- e Designates work areas for all TIF elements.
panies consist of two MI companies, I&E (EPW sup-
port) and one MI company, I&E (GS-EAC). Establishes and maintains TIF functional files.
The two MI companies support EPW compound Establishes interrogation priorities.
operations. Their elements are primarily for GS at Maintains a daily log and journal.
EAC, but may be deployed for DS at corps and division.
The MI company (ME) (GS-EAC) provides priority in- Disseminates incoming and outgoing distribution.
terrogation and DOCEX support to corps and divisions, Conducts liaison with local officials, adjacent and
to the TIF, and to temporary EPW compounds as re- subordinate intelligence activities, CI, MP,
quired. PSYOP, the JCMEC, Plans and Policy Directorate
(JS), and provost marshal.
Conducts coordination with holding area OIC or mission as required. The interrogation element re-
enclosure commander for screening site, medical quires the contact to ensure it receives current guidance,
support, access, movement, and evacuation proce- direction, and assistance in solving collection problems.
dures for EPWs.
ALL SOURCE ANALYSIS SYSTEM (ASAS)
Conducts operations briefings when required. This system provides assistance to the J2, G2, or G3
Manages screening operations. and MI unit commanders who collect and analyze intel-
ligence and perform CI and EW functions. The follow-
Manages EPW access for intelligence collection. ing elements feed into the ASAS.
Assigns control numbers (see DIAM 58-13). Imagery Exploltatlon
Supervises all intelligence collection activities Interrogators should maintain close contact with im-
within the TIF. agery exploitation elements. Interrogators may be re-
OB ELEMENT quired to identi9 items on air photographs and should
report information of interest to the imagery analysts.
This element- Imagery analysts can aid interrogation personnel by fur-
@ Obtains the initial data base and updates and nishing photographs for use in connection with inter-
maintains it. rogation and by verifying leads originally obtained
through interrogation.
Establishes and maintains OB workbooks and files
to include data generated by intelligence informa- TECHINT Personnel
tion which has not been verified. Normally, interrogation elements coordinate with the
Maintains SITMAPs displaying enemy and friendly TECHINT sections of the RC battalion (TE). The
situation. TECHINT section, and its field teams, furnishes
guidance and requirements to the interrogation ele-
Catalogs, cross-references, and disseminates col- ments through questionnaires and interrogation guides.
lection requirements to TIF collection elements. These are valuable aids to the interrogator in obtaining
Reviews INTREPs for inclusion into data base. specific TECHINT information.
Conducts OB briefings when required. Interrogators notify the nearest TECHINT personnel
to obtain detailed technical information and guidance.
OTHER MI ELEMENTS At tactical levels, this is the exception rather than the
Collection missions are tailored and assigned by the rule, but it may be necessary when information is of im-
CM&D section subordinate to the G2 at corps and mediate tactical value.
division. The same functions are performed at brigade COUNTERINTELLIGENCE
and battalion by the battlefield information control cen-
ter (BICC). These elements must ensure the assigned Coordination between CI and interrogation elements
collection mission is passed by secure means, through is always necessary. This coordination is effected con-
established channels, to the interrogation element. tinuously, directly or indirectly, and at the discretion of
the intelligence officer. CI elements are active in the
If interrogators are deployed in a GS role, the CM&D security screening of refugees and civilians in the com-
section will pass its interrogator taskings to the MI bat- bat zone.
talion TOC. If interrogators are deployed in a DS role,
they will receive taskings directly from the BICC. CI personnel and interrogators must work together to
ensure proper interrogation of enemy civilians or per-
The CM&D section (through the MI battalion TOC) sonnel speaking the enemy's language. Interrogator
or the BICC must maintain close contact with the inter- personnel can further assist the CI effort by-
rogation element. This contact allows a two-way flow of
communication. @ Furnishing leads on suspected enemy agents and
intelligence personnel.
The CM&D or BICC element needs the contact to
accomplish the preceding three steps. They also use the .Informing CI elements concerning enemy person-
contact to revise the interrogation element's collection nel dressed in other than enemy uniforms.
Referring to CI elements, or making available to guards on a continuing or as required basis. These
them for interrogation, all EPWs and other sources guards may also be attached to EPW and processing
of CI interest. CI personnel are trained for inter- reception camps as needed.
rogation in cases of suspected espionage, sabotage,
EPW administrative processing is done by MP PW
or subversion. Their knowledge of the CI situation
processing units. includes personnel
(to include hostile intelligence activities) enhances
preparation, fingerprint and identity cards (if needed),
full exploitation of appropriate sources.
and internment serial number assignment.
-
MILITARY POLICE
PSYOP
The corps MP commander operates the corps EPW
Normally, interrogation elements coordinate with
area and provides escort guard to
PSYOP elements to obtain information concerning the
divisions for EPW evacuation in routine or medical
motivational factors and cultural value systems of the
channels. EPWs are evacuated from the corps holding
to be interrogated.
area to the next higher
- echelon with the least possible
delay. PSYOP units, as a part of their normal operations,
develop detailed analysis concerning psychological and
The MP commander also arranges and coordinates cultural factors of friendly and hostile elements in the
transportation requirements to include rations and
AO. Such information will help interrogation person-
water, if required, for the movement to include number nel to understand the source's attitude, value system,
of vehicles, railroad or passenger cars, or aircraft with
and perception; it will also help to obtain information
the time and place of departure. more rapidly, and at the same time, PSYOP information
Expeditious EPW evacuation is provided by the prior on current conditions in enemy country or among
dispatch of escort guards to establish a ready reserve at enemy forces. A PSYOP PIR would be established to
the supported divisions. This reserve evacuation cover this requirement.
capability is maintained by sending additional escort
SUPPORT RELATIONSHIPS
Successful interrogation operations require support dling and evacuation. This plan must satisfy the inter-
from elements within their echelon of assignment, in- ests of all other staff officers and provide for-
cluding all major staff organizations. These elements e Humane treatment of all sources.
are collectively responsible for the planning that creates
the overall environment for interrogators. The intel- Prompt evacuation from the combat zone.
ligence staffs (J2, G2, or S2) direct contribution to in-
Opportunities to interrogate sources.
terrogation operations has already been discussed. Its
general responsibilities are outlined below, along with Integration of procedures for the evacuation, con-
those of other staff and support elements. trol, and administration of sources with other CS
and CSS operations (through the provost mar-
PERSONNEL (GI AND S1)
shal).
The G I and S1 are responsible for-
e Training for all troops on the provisions of inter-
Supervising the medical support furnished to sour- national agreements and regulations relating to
ces. sources.
Maintaining a list (by language and proficiency) of Ensuring delivery of EPW and detainee mail.
qualified linguists within their command.
Maintaining- EPW and detainee statistics.
Coordinating with the G5 for procurement and
payment of other interpreters and translators Administration and control of EPW currency and
needed to perform intelligence and nonintel- pay records, to include coordination with ap-
ligence duties. propriate intelligence authorities about investiga-
tion of large sums of money.
The G1 and S1 ensure the echelon's operations plan
(OPLAN) contains complete provisions for source han-
INTELLIGENCE (52, G2, AND S2) Evaluate, in coordination with the G 2 and G5,
The J2, G2, and S2 are responsible for supervising ap- enemy PYSOP efforts and effectiveness of friendly
propriate censorship activities relating to sources. They PSYOP on target groups.
also- SUPPLY (G4 AND S4)
@ Coordinate with the G 3 to ensure plans for inter- The G4 and S4 are responsible for storing and main-
rogation, CI, PSYOP, and CA operations are in- taining supplies and equipment needed by subordinate
cluded in unit training plans and OPLANs. units to conduct source handling operations, as well as
Draft instructions for MI handling, evacuating, and delivering them to subordinate units as they are needed.
exploiting captured enemy personnel and CEDs. The G4 and S4 also supervise-
(They coordinate with the G 3 to ensure draft in- @ Command policy for evacuation and internment of
structions are included in the command SOP, captured enemy personnel, and evacuation and
OPLANs, and supplementary orders.) safekeeping of CEM and CEDs.
Project source capture flows. Real estate acquisition and construction of source
Determine the number of interpreters and trans- holding area facilities.
lators needed to perform intelligence duties. Collection and distribution of captured enemy sup-
Control the procedures used to process and grant plies. (This is coordinated with the intelligence
clearances to the interpreters and translators who and operations staffs.)
need them. Procurement and distribution of rations to source
Coordinate with G 5 on screening of non-suspect holding areas. (Captured enemy rations will be
local nationals and displaced persons. used when possible.)
EPW and detainee transportation.
OPERATIONS (G3 AND S3)
The G 3 and S3 are responsible for operations, plans, Determination of requirements for use of source
organization, and training. Where MP assets are not labor for the logistical support needed in source
available, or insufficient, they are responsible for ob- handling operations.
taining, organizing, and supenrising employment of ad- Logistical support to interpreter personnel.
ditional personnel as guards. The G 3 and S3-
CIVIL-MILITARY OPERATIONS (G5 AND S5)
Prepare, coordinate, and publish the command
SOP, OPLANs, and supplementary orders. This The G5 and S5 are responsible for CA. They-
includes instructions for handling, evacuating, and @ Advise, assist, and make recommendations that re-
exploiting captured enemy personnel and CEDs, Tate to civil-military operations (CMO) and CA
which are drafted by the G2. aspects of current or proposed operations.
Incorporate interrogation operations into future Prepare estimates and conduct studies and
plans and operations. analyses for CMO activities.
Ensure subordinate units are trained in proper Prepare the portions of operations, administrative,
handling and evacuation of captured enemy per- and logistics plans and orders for CMO activities.
sonnel, captured enemy materiel (CEM), and
CEDs. Determine requirements for resources to ac-
complish command CMO activities, including CA
Train guard personnel. units and personnel.
Provide G 2 and S2 with details of planned opera- Coordinate with local US government, G I and S1
tions. representatives, and HN armed forces for procur-
Plan and supervise all PSYOP activities in support ing native linguists for interpreter support.
of tactical operations. Recommend command policy on obligations be-
tween civil and military authorities; on the A 0
population; and on the works and activities arising NBC Protection
from treaties, agreements, international law, and All EPWs will be provided NBC protection. If EPWs
US policy. do not have their own NBC protection equipment, or
Provide civil support for tactical and CSS opera- their equipment is not usable, the detaining forces must
tions and prevent civilian interference with these provide them with proper NBC gear.
operations. Chaplain Support
Coordinate military support of populace and The unit ministry team, consisting of the chaplain and
resource control programs. chaplain assistant, provides religious support. The team
Provide technical advice and assistance in reorien- coordinates with the G5 and S5 to provide religious
tation of sources and enemy defectors. support for refugees, displaced persons, and indigenous
civilians. It provides services for EPWs o r assists
Coordinate MI aspects of CMO activities with the detained clergy of enemy forces and other detained cler-
G2 or S2. gy. The team provides burial rites according to the
ADDITIONAL SUPPORT religious rites of combatants. Religious preference of
EPWs will be obtained from DA Form 4237-R
Besides the major staff elements, an interrogation (Detainee Personnel Record) (see Chapter 3).
element requires support from several other elements in
order to conduct operations. These elements are dis- Inspector General
cussed below. This element is a channel for reporting known o r
Communications suspected war crimes.
Secure, reliable communication must be available at Public Affairs officer
or -near the interrogation element's deployment site. The public affairs officer advises and informs the
Priority access to these communications must be ar- commander of public affairs impact inherent in planned
ranged to support contact with collection management. or implemented EPW operations.
Staff Judge Advocate Engineer Officer
This element can provide legal support and advice on The engineer officer assists in planning the construc-
the interpretation and application of international tion of EPW enclosures. H e also assists the G2 and S2
regulations and agreements about handling sources. It in developing obstacle intelligence (OBSTINTEL)
is also a channel for reporting known or suspected war during the IPB. OBSTINTEL requirements are
crimes. reflected in the PIR and IR. Much of the IR is technical
Health Service Support in nature and warrants direct coordination with the in-
' terrogator to ensure the right questions are asked.
This element must clear all sick and wounded sources Through the J2, G2, and S2, he will also analyze the in-
before they can be interrogated. Seriously sick or formation collected and its impact on the maneuver and
wounded sources are evacuated through medical chan- engineer plan.
nels. If adequate facilities are not available in EPW
hospitals, EPWs are admitted to military or civilian Military Band Unit
medical facilities where treatment can be obtained. At division and corps, the band may augment the MP
Each EPW is medically examined and weighed at by providing security at central collecting points and
least once a month. Provisions are made for the isola- corps holding areas.
tion of communicable cases, disinfection, and inocula-
tions. Retained medical personnel and EPWs with
medical training are used to care for their own sick and
wounded.
CHAPTER 3
THE INTERROGATION PROCESS
Criteria for selecting personnel to be interrogated ments, n u m b e r and conditions of detainees, and
vary with the- time restrictions.
Commander's collection requirements. The interrogation process involves screening of sources
for interrogation and the use of interrogation techni-
Time limitations.
ques and procedures. Screening and interrogation in-
Number and types of potential sources available. volve complex interpersonal skills, and many aspects of
their performance are subjective. Each screening and
Exact circumstances surrounding the e m ~ l o ~ m e n t
interrogation is unique because of the interaction be-
of US Forces.
- and the source.
tween the interrogator
In this regard, source selection is important in
The five interrogation phases-planning and prepara-
conducting interrogation a t tactical echelons of
tion, approach, questioning, termination, and report-
command because of the proximity to enemy ele-
ing-are discussed later in this chapter.
COLLECTION PRIORITY
Interrogators are trained to exploit sources and clinging to very basic values (love of family and loyalty
CEDs. This allows the all-source collection manager to friends o r comrades).
three exploitation options for interrogation assets:
Since humans are adaptable, this initial vulnerability
They may exploit sources alone, exploit CEDs, or ex-
passes quickly. An individual's established values begin
ploit both simultaneously.
to assert themselves again within a day or two. When
In the past, it was assumed interrogators could ac- this happens, much o f an individual~s~susceptibilityto
complish the dual collection mission no matter what interrogation is gone.
type of combat operations were being supported. This
Memory stores information in two areas: short-term
may no longer be true. Unit staffing, coupled with the
and long-term memory. The five senses constantly
amount of CEDs and sources, may prevent exploitation
transmit information to the brain's short-term memory
of sources and CEDs simultaneously.
temporarily and then shifts to the brain's long-term
The density of interrogation assets and command em- memory. The time at which this transfer takes place
phasis on the collection effort determine mission re- varies, but research shows a great amount of detail is
quirements. The feasibility of a dual collection mission lost during that transfer. The percentage of information
may also be the result of initial IPB by the commander's lost beyond recall varies from study to study, but 70 per-
intelligence staff. If an echelon cannot conduct a dual cent is a conservative estimate.
collec~oneffort, interrogating sources receives the
Much of the information of value to the interrogator
priority for two reasons:
is information the source is not aware he has. Although
The greater intelligence potential of a source. no research data is available in this area, it is likely this
type of information will be lost quickly.
The rate at which people forget detailed informa-
tion. CEDs, while not affected by memory loss, are often
time-sensitive and thus are screened quickly for possible
An individual's value system is easier to bypass i m m e
exploitation (see Chapter 4).
diately after undergoing a significant traumatic ex-
perience. The circumstances of capture are traumatic The supported echelon's intelligence officer deter-
for most sources. Many former PWs indicated extreme mines the guidelines for priority of exploitation. The
disorientation immediately after capture. Capture commander's intelligence needs and the JTs, GTs, or
thrusts them into a foreign environment over which they S2's estimate of the enemy's intentions dictate the ex-
have no control. Their mores were of no use to them tent to which these guidelines can be applied. Exploita-
during this period. Most of them survived this phase by tion priorities are reviewed and changed when needed.
SCREENING
Screening is the selection of sources for interrogation. ing of information is one indicator of EPW's or
It must be conducted at every echelon to- detainee's cooperation.
Determine source cooperativeness and When examining documents, screeners should iden-
knowledgeability. tify topics on which EPWs and detainees have pertinent
information. Screeners should make a note of any
Determine which sources can the
documents captured with specific EPWs and detainees
commander's PIR and IR in a timely manner.
that may contain indications of pertinent knowledge
PREPARE TO CONDUCT SCREENINGS and potential cooperation.
Screeners should obtain a copy of the element's over- PERSONNEL SCREENING
all objective statement from the PIR, IR, and SIR and If time permits, screeners should question holding
become familiar with the intelligence indicators listed area personnel about the EPWs and detainees. Since
there. Screeners must use their experience and imagina- these personnel are in almost constant contact with the
tion to devise ways to identify EPWs and detainees who EpWs and detainees, their descriptions of ones
might possess information pertinent to these indicators. can help identify sources who might answer the sup-
For example, one group of indicators may concern ported commander's PIR and IR.
new enemy units moving along a specific avenue of ap- Screeners should identify and note those EPWs and
proach. In this case, a screener may want to concentrate detainees whose appearance and behavior indicate they
first On screening EPWs and detainees near
are willing to cooperate immediately or are unlikely to
that location' When he questions those EPWs Or
cooperate ever. Unless time is critically short, screeners
detainees, the screener might try to determine what should-
units are due to arrive in that area in the near future.
The ability to recognize branch of service and rank in- Personally observe the EPWs and detainees.
signia can be of great assistance to screeners. Pay attention to rank and branch of service insig-
Screeners coordinate with MP holding area guards on nias, and condition of uniform and equipment.
their role in the screening process. The guards are told Carefully observe the behavior demonstrated by
where the screening will take place, how EPWs and other EPWs and detainees.
detainees are to be brought there from the holding area,
and what types of behavior on their part will facilitate Look for things like attempts to talk to the guards,
the screenings. intentional placement in the wrong segregation
group, or any overt signs of nervousness, anxiety,
DOCUMENT SCREENING
I
-
or fright.
If time permits, screeners should go to the holding
area and examine all available documents pertaining to Note any EPW or detainee whose appearance or
the EPWs and detainees. They should look for signs behavior indicates willingness to talk.
that certain EPWs and detainees are willing, o r can be CI SCREENING
induced, to cooperate with the interrogator. Previous Before initiating the screening process, the inter-
screening and interrogation reports and EPW personnel
rogator establishes liaison with supporting CI agents.
records are important.
The CI element, through the CM&D, provides PIR of
Interrogation reports identify EPWs and detainees CI interest. During the screening process, interrogators
who have been cooperative in the past. Prior screening identify sources of CI interest. After these sources have
reports indicate EPWs and detainees who appear been interrogated for any information of immediate tac-
cooperative. During EPW inprocessing, MPs prepare a tical value (as needed), they are turned over to CI. CI is
DA Form 4237-R, which is prescribed by AR 190-8. A interested in sources who-
sample is shown at Figure 3-1. D A Form 4237-R con-
Have no identification documents.
tains additional information not required by the GWS,
GPW, and GC, but which the EPWs and detainees may Have excessive or modified identification docu-
have volunteered during inprocessing. The volunteer- ments.
DETAINEE PERSONNEL RECORD
For us0 of thl8 form. u A R 1808. the proponant agency Is O O Z S P E R .
PART I - TO BE COMPLETED A T T I M E OF MOCESSINC
26 WON
None.
PHOTO PHOTO
(Front V k w ) ( R l l h l PmlUr)
n d A A
Figure 3-1. DA Form 4237-R (Detainee Personnel Record) (front).
FM 34-52
h A-
P A R T I1 - T O RE M A I N T A I N F D B Y U N I T H A V I N C C U S T n D V
41. L A S l NAME D FIRS1 N A M E S
CH OE '
43. I N T E R N M E N T S E R I A L N U M B E R
H N N - SIK -.
US-1501-23176
44. MEDICAL RECORD
r . I M M U N I Z A T I O N I V a c c l n o l l o n r and l n n o c u l a l ~ o n .w i t h D~IPSJ
Smallpox - 15 APR 98
b. M A J O R I L L N E S S E S A N 0 P H Y S I C A L D E F E C T S (Wlth I J a f r r J c . B L O O D GFIOUP
NONE. B POS
45. I N T E R N M E N T E M P L O Y M E N T ( I U A L I F I C A T I D N S
FARMER
46. S E R I O U S OFFENSES. P U N I S H M E N T S . A N D ESCAPES ( W t t h U a f r r l
NONE.
C. LOCATION d DATC
60. F I N A N C I A L S T A T U S A T T I M E OF S E C O N D l N T t R N A T I O N A L T R A N S F E R
I . C E R T I F I C A T E O F C R E D I T B A L A N C E I S S U E 0 T O EPW l ~ m o u n ~t n ~ ~ . o r A , j b A M T I N f IGuRES
C. LOCATION d DATE
-
61. REPATRIATION
r . REASON
b. M O D E c. D A T E
I?. F I N A N C I A L S T A T U S A T T I M C OF R E P A i R I A T I O N
r . C E R T I F I C A T E O F C R E D I T B A L A N C E I S S U F D TO EPW IAma,unl ~nwords) b. A M T I N F l C U R t S
M
RNK WOUNDED: Y @
1 FULL UNIT DSG: s 2/47 3c0 A REMARKS:
L S
:
A
DUmPSN:
JOB:
BUT]/a A D / s H
R~fLGrn~hj
S ,
E MENTAL CONDITION:
EDUCATION= 8 YRS
Y
STATION: M INTELLIGENCE: AVG + AVG @
SKILLS: s~ A R P ' H ~ ~ T E R E MENTALSTATE: ~/ERI/OLLS
N
EXPERIENCE: ~ f ' f 7 flus-
. T
SCREENER: Sfc ~ ~ Y C E
C JOB: JTUD#f
I D DATE: TIME:
V ORG: A COOPERATION: @ ( ~ i ~ h ) 2 3 (low)
I DUTIES:
L KNOWLEDGE: A (High) @ C (low)
A
I BGW LIST: Y @ BGW CODE.
A SKILLS: dod&- SOURCE CATEGORY: A I3 @
D
N
APPROACH: DI @C.j; Tdc& 7-1d&
P
I R
R E
M
84
A
R
-
I K
R S --- -
--
Least
?
-
3. Segregate By tank. sex. and nat~onal~ty
4.
- -
Safeguard To pevent harm of escape.
5. S p e d Evacua:a from the ccur~tatzone
OOCUMEKTRPECIAL EOUIPYENTI
WlUPONS CARD (Part C)
A m tM1 put of trg to EPWs r o t a M proparty.
iDonotmnomCFom~.J
As a mlnimwn. the tag must inckde Lhe lollow~ng
- n ~ l . ~ r d ~ o l ~ e .
-- //an8. crpbring vut.
Hem 9, place ol cqHwe (grni coordinates).
- Hem lo. c i r u m m e s of capture (how the
EPW was W U I ~ ) .
0 0
,
Figure 3-4. DA Form 5976 (Enemy Prisoner of War Capture Tag).
The source's background. What is the source's age The interrogator must consider in advance obstacles
and level of military or civilian experience. and limitations which may affect the interrogation.
These obstacles and limitations may include-
The objective of the interrogation. How much
time is available for the interrogation? Is the com- EPW or detainee legal status.
mander interested only in specific areas (PIR, IR,
Time and facilities available for interrogation.
SIR)? Is this source knowledgeable enough to re-
quire a full OB interrogation? The military situation.
The interrogator himself. What abilities does he Knowledgeability.
have that can be brought into play? What weak-
Language restrictions.
nesses does he have that may interfere with the in-
terrogation? Can his personality adapt to the e Physical condition.
personality of the source?
Psychological aspects.
The interrogation may require the interrogator con-
Other issues which may appear during the course
duct research to obtain detailed data on a specific
of the interrogation.
geographic area, political group, weapons system, or
technical field. In the technical field, TECHINT per- Logistical requirements include-
sonnel assist the interrogator.
Billets.
There are various weapons identification guides to as-
Office space.
sist the interrogator in identifying any weapons men-
tioned by the source. However, the source should not Heat.
be shown this guide until he has thoroughly described
Light.
the items, or has drawn a picture of the weapons.
Messing and detention facilities.
The interrogator may require maps, . documents,
recording and photographic equipment, screening Transportation which may be required in support
reports, and other aids to facilitate the interrogation. of the interrogation.
From these aids, he must select those best suited to ac-
The various staff sections of the supported command
complish the objective, determine their availability, and
may be called upon to furnish the necessary logistical
arrange for their procurement well in advance of .the in-
items mentioned above. All support requests will be
terrogation. Some aids the interrogator may use are-
coordinated with the appropriate staff officer by the
DA Form 5976. EPW or detainee camp or collecting point commander.
Previous interrogation reports. Interrogators should question guards about the sources,
time permitting, as part of preparation. Since the
Documents found on an EPW or detainee or on
guards are in constant contact with the sources, they
the battlefield.
may be able to provide information on-
Maps.
e Their physical condition.
Imagery or aerial photographs.
Demonstrated attitude and behavior.
i OB data.
Contact made with other guards or sources.
Guards.
How the source has been handled since capture.
CA and PSYOP personnel.
Hearsay (HIS) information from others who have
Informants. handled the source.
Physical aids (such as lights, tables, drafting tools). Confirmation of capture data, especially the cir-
cumstances under which the source was captured.
Interrogation guides.
Time permitting, each interrogator should un- Combat effectiveness.
obtrusively observe the source to personally confirm his
Logistics.
identity and to check his personal appearance and be-
havior. Electronic technical data.
After the interrogator has collected all information Miscellaneous.
available about his assigned source, he analyzes it. H e
As a result of the planning and preparation phase, the
looh for of P ~ Or physicalY weak- ~interrogator~ develops a~plan for conducting
~ his ~assigned ~
ness that might make the source susceptible to one or
interrogation. H e must review this plan with the senior
more which lacilitates his
interrogator, when possible. Whether written or oral,
strategy. H e also uses the information he collected to
the interrogation plan must contain at least the follow-
identify the type and level of knowledge possessed by
ing items:
the source pertinent to the element's collection mission.
Interrogation objective.
The interrogator uses his estimate of the type and ex-
tent of knowledge possessed by the source to modify the EPW's or detainee's identity, to include visual ob-
basic topical sequence of questioning. H e selects only servation of the EPW or detainee by the inter-
those topics in which he believes the source has per- rogator.
tinent knowledge. In this way, the interrogator refines
Interrogation time and place.
his element's overall objective into a set of specific in-
terrogation subjects. Primary and alternate approaches.
The major topics that can be covered in an interroga- Questioning techniques to be used or why the in-
tion are shown below in their normal sequence. How- terrogator selected only specific topics from the
ever, the interrogator is free to modify this sequence as basic questioning sequence.
necessary.
Means of recording and reporting information ob-
Missions. tained.
Composition. The senior interrogator reviews each plan and makes
any changes he feels necessary based on the
Weapons, equipment, strength.
commander's PIR and IR. After the plan is approved,
Dispositions. the holding compound is notified when to bring the
source to the interrogation site. The interrogator col-
Tactics.
lects all available interrogation aids needed (maps,
Training. charts, writing tools, and reference materials) and
proceeds to the interrogation site.
APPROACH PHASE
The approach phase begins with initial contact be- Begins to use an approach technique.
tween the-^^^ or detainee and interrogator. Extreme
The amount of time spent on this phase will mostly
care is required since the success of the interrogation
depend on the probable quantity and value of informa-
hinges, to a large degree, on the early development of
tion the EPW or detainee possesses, the availability of
the EPW's or detainee's willingness to communicate.
other EPW or detainee with knowledge on the same
The interrogator's objective during this phase is to es-
topics, and available time. At the initial contact, a
tablish EPW or detainee rapport, and to gain his willing
cooperation so he will correctly answer pertinent ques- businesslike relationship should be maintained. As the
tions to follow. The interrogator- EPW or detainee assumes a cooperative attitude, a
more relaxed atmosphere may be advantageous. The in-
Adopts an appropriate attitude based on EPW or terrogator must carefully determine which of the
detainee appraisal. various approach techniques to employ.
Prepares for an attitude change, if necessary. Regardless of the type of EPW or detainee and his
outward personality, he does possess weaknesses which,
if recognized by the interrogator, can be exploited. interrogator's questions, not necessarily his coopera-
These weaknesses are manifested in personality traits tion.
such as speech, mannerisms, facial expressions, physical
The source may or may not be aware he is providing
movements, excessive perspiration, and other overt in-
the interrogator with information about enemy forces.
dications that vary from EPW or detainee.
Some approaches may be complete when the source
From a psychological standpoint, the interrogator begins to answer questions. Others may have to be con-
must be cognizant of the following behaviors. People stantly maintained or reinforced throughout the inter-
tend to- rogation.
e Talk, especially after harrowing experiences. The techniques used in an approach can best be
defined as a series of events, not just verbal conversa-
Show deference when confronted by superior
tion between the interrogator and the source. The ex-
authority.
ploitation of the source's emotion can be harsh or
Rationalize acts about which they feel guilty. gentle in application. Some useful techniques used by
interrogators are-
Fail to apply or remember lessons they may have
been taught regarding security if confronted with a Hand and body movements.
disorganized or strange situation.
Actual physical contact such as a hand on the
Cooperate with those who have control over them. shoulder for reassurance.
Attach less importance to a topic about which the Silence.
interrogator demonstrates identical or related ex-
RAPPORT POSTURES
perience or knowledge.
There are two types of rapport postures determined
Appreciate flattery and exoneration from guilt. during planning and preparation: stern and sym-
Resent having someone or something they respect pathetic.
belittled, especially by someone they dislike. In the stem posture, the interrogator keeps the EPW
Respond to kindness and understanding during or detainee at attention. The aim is to make the EPW
trying circumstances. or detainee keenly aware of his helpless and inferior
status. Interrogators use this posture with officers,
Cooperate readily when given material rewards NCOs, and security-conscious enlisted men.
such as extra food or luxury items for their per-
sonal comfort. In the sympathetic posture, the interrogator addresses
the EPW or detainee in a friendly fashion, striving to
Interrogators do not "run" an approach by following a put him at ease. This posture is commonly used in in-
set pattern or routine. Each interrogation is different, terrogating older or younger EPWs. EPWs may be
but all interrogation approaches have the following in frightened and confused. One variation of this posture
common. They- is when the interrogator asks about the EPW's family.
Establish and maintain control over the source and Few EPWs will hesitate to discuss their family.
interrogation. Frightened persons, regardless of rank, will invariably
Establish and maintain rapport between the inter- talk in order to relieve tension once they hear a sym-
rogator and source. pathetic voice in their own tongue. To put the EPW at
ease, the interrogator may allow the EPW to sit down,
Manipulate the source's emotions and weaknesses offer a cigarette, ask whether or not he needs medical
to gain his willing cooperation. care, and otherwise show interest in his case.
The successful application of approach techniques There are many variations of these basic postures.
eventually induces the source to willingly provide ac- Regardless of the one used, the interrogator must
curate intelligence information to the interrogator. The present a military appearance and show character and
term "willingly" refers to the source's answering the energy. The interrogator must control his temper at all
times, except when a display is planned. The inter-
rogator must not waste time in pointless discussions or interrogator can shift the approach direction
make promises he cannot keep; for example, the without the source being aware of the change.
interrogator's granting political asylum.
Depending on the situation, and requests the source
When making promises in an effort to establish rap- may have made, the interrogator also can use the fol-
port, great care must be taken to prevent implying that lowing to develop rapport.
rights guaranteed the EPW under international and US
Offer realistic incentives, such as-
law will be withheld if the EPW refuses to cooperate.
-Immediate comfort items (coffee, cigarettes).
Under no circumstances will the interrogator betray
surprise at anything the EPW might say. Many EPWs --Short-term (a meal, shower, send a letter home).
will talk freely if they feel the information they are dis-
-Long-term (repatriation, political asylum).
cussing is already known to the interrogator. If the in-
terrogator acts surprised, the EPW may stop talking Feign experience similar to those of the source.
immediately.
Show concern for'the source through the use of
The interrogator encourages any behavior that voice vitality and body language.
deepens rapport and increases the flow of communica- Help the source to rationalize his guilt.
tion. At the same time, the interrogator must dis-
courage any behavior that has the opposite effect. Show kindness and understanding toward the
source's predicament.
The interrogator must always be in control of the in-
terrogation. If the EPW or detainee challenges this Exonerate the source from guilt.
control, the interrogator must act quickly and firmly. Flatter the source.
Everything the interrogator says and does must be
within the limits of the GPW, Article 17. After having established control and rapport, the in-
terrogator continually assesses the source to see if the
DEVELOPING RAPPORT
approaches-and later the questioning techniques-
Rapport must be maintained throughout the inter- chosen in the planning and preparation phase will in-
rogatioh, not only in the approach phase. If the inter- deed work.
rogator has established good rapport initially and then
abandons the effort, the source would rightfully assume Approaches chosen in planning and preparation are
the interrogator cares less and less about him as the in- tentative and based on the sometimes scanty informa-
formation is being obtained. If this occurs, rapport is tion available from documents, guards, and personal ob-
lost and the source may cease answering questions. servation. This may lead the interrogator to select
Rapport may be developed by- approaches which may be totally incorrect for obtaining
this source's willing cooperation. Thus, careful assess-
e Asking about the circumstances of capture. By ment of the source is critical to avoid wasting valuable
doing this, the interrogator can gain insight into time in the approach phase.
the prisoner's actual state of mind and, more im-
portantly, he can ascertain his possible breaking The questions can be mixed or separate. If, for ex-
points. ample, the interrogator has tentatively chosen a "love of
comrades" approach, he should ask the source questions
Asking background questions. After asking about like "How did you get along with your fellow squad
the source's circumstances of capture, apparent in- members?" If the source answers they were all very
terest can be built by asking about the source's close and worked well as a team, the interrogator can
family, civilian life, friends, likes, and dislikes. This use this approach and be reasonably sure of its success.
is to develop rapport, but nonpertinent questions
may open new avenues for the approach and help However, if the source answers, "They all hated my
determine whether tentative approaches chosen in guts and I couldn't stand any of them," the interrogator
the planning and preparation phase will be effec- should abandon that approach and ask some quick, non-
tive. If these questions show that the tentative ap- pertinent questions to give himself time to work out a
proaches chosen will not be effective, a flexible new approach.
Smooth Transltions continue to work until he feels the source is near break-
The interrogator must guide the conversation ing.
smoothly and logically, especially if he needs to move The interrogator can tell if the source has broken
from one approach technique to another. "Poking and only by interjecting pertinent questions. This process
hoping" in the approach may alert the prisoner to ploys must be followed until the EPW or detainee begins to
and will make the job more difficult. answer pertinent questions. It is possible the EPW or
Tie-ins to another approach can be made logically detainee may cooperate for a while and then balk at
and smoothly by using transitional phrases. Logical tie- answering further questions. If this occurs, the inter-
ins can be made by including simple sentences which rogator can reinforce the approaches that initially
connect the previously used approach with the basis for gained the source's cooperation or move into a different
the next one. approach before returning to the questioning phase.
Transitions can also be smoothly covered by leaving At this point, it is important to note the amount of
the unsuccessful approach and going back to nonper- time spent with a particular source depends on several
tinent questions. By using nonpertinent conversation, factors:
the interrogator can move the conversation in the The battlefield situation.
desired direction and, as previously stated, sometimes
can obtain leads and hints about the source's stresses or Expediency which the supported commander's PIR
weaknesses or other approach strategies that may be and IR requirements need to be answered.
more successful. Source's willingness to talk.
Sincere and Convincing The number of approaches used is limited only by the
If an interrogator is using argument and reason to get interrogator's skill. Almost any ruse or deception is
the source to cooperate, he must be convincing and ap- usable as long as the provisions of the GPW, as outlined
pear sincere. All inferences of promises, situations, and in Figure 1-4, are not violated.
arguments, or other invented material must be believ- An interrogator must not pass himself off as a medic,
able. What a source may or may not believe depends on chaplain, or as a member of the Red Cross (Red Cres-
the interrogator's knowledge, experience, and training. cent or Red Lion). To every approach technique, there
A good source assessment is the basis for the approach are literally hundreds of possible variations, each of
and vital to the success of the interrogation effort. which can be developed for a specific situation or
Recognize the Breaking Point source. The variations are limited only by the
interrogator's personality, experience, ingenuity, and
Every source has a breaking point, but an inter-
imagination.
rogator never knows what it is until it has been reached.
There are, however, some good indicators the source is APPROACH COMBINATIONS
near his breaking point or has already reached it. For With the exception of the direct approach, no other
example, if during the approach, the source leans for- approach is effective by itself. Interrogators use dif-
ward with his facial expression indicating an interest in ferent approach techniques or combine them into a
the proposal or is more hesitant in his argument, he is cohesive, logical technique. Smooth transitions, sin-
probably nearing the breaking point. The interrogator cerity, logic, and conviction almost always make a
must be alert to recognize these signs. strategy work. The lack of will undoubtedly dooms it to
Once the interrogator determines the source is break- failure. Some examples of combinations are-
ing, he should interject a question pertinent to the ob-
jective of the interrogation. If the source answers it, the
interrogator can move into the questioning phase. If Direct-futility-love of comrades.
the source does not answer or balks at answering it, the
interrogator must realize the source was not as close to
the breaking point as thought. In this case, the inter- The number of combinations are unlimited. Inter-
rogator must continue with his approach, or switch to rogators must carefully choose the approach strategy in
an alternate approach or questioning technique and the planning and preparation phase and listen carefully
to what the source is saying (verbally or nonverbally) for for certain luxury items such as candy, fruit, or cigaret-
leads the strategy chosen will not work. When this oc- tes. This fondness provides the interrogator with a posi-
curs, the interrogator must adapt to approaches he tive means of rewarding the EPW or detainee for
believes will work in gaining the source's cooperation.. cooperation and truthfulness, as he may give o r with-
The approach techniques are not new nor are all the hold such comfort items at his discretion. Caution must
be used when employing this technique because-
possible or acceptable techniques discussed below.
Everything the interrogator says and does must be in Any pressure applied in this manner must not
concert with the GWS, GPW, GC, and UCMJ. The ap- amount to a denial of basic human needs under
proaches which have proven effective are- any circumstances. [NOTE:Interrogators may not
withhold a source's rights under the GPW, but
Direct.
they can withhold a source's privileges.] Granting
Incentive. incentives must not infringe on these rights, but
they can be things to which the source is already
Emotional.
entitled. This can be effective only if the source is
Increased fear-up. unaware of his rights or privileges.
Pride and ego. The EPW or detainee might be tempted to provide
false or inaccurate information to gain the desired
Direct Approach
luxury item or to stop the interrogation.
The interrogator asks questions directly related to in-
formation sought, making no effort to conceal the The GPW, Article 41, requires the posting of the con-
interrogation's purpose. The direct approach, always vention contents in the EPW's own language. This is an
the first to be attempted, is used on EPWs or detainees MP responsibility.
who the interrogator believes will cooperate. Incentives must seem to be logical and possible. An
This may occur when interrogating an EPW or interrogator must not promise anything that cannot be
detainee who has proven cooperative during initial delivered. Interrogators do not make promises, but
screening or first interrogation. It may also be used on usually infer them while sidestepping guarantees.
those with little or no security training. The direct ap- For example, if an interrogator made a promise he
proach works best on lower enlisted personnel, as they could not keep and he or another interrogator had to
have little or no resistance training and have had mini- talk with the source again, the source would not have
mal security training. any trust and would probably not cooperate. Instead of
The direct approach is simple to use, and it is possible clearly promising a certain thing, such as political
to obtain the maximum amount of information in the asylum, an interrogator will offer to do what he can to
minimum amount of time. It is frequently employed at help achieve the source's desired goal; as long as the
lower echelons when the tactical situation precludes source cooperates.
selecting other techniques, and where the EPW's or As with developing rapport, the incentive approach
detainee's mental state is one of confusion or extreme can be broken down into two incentives. The deter-
shock. Figure C-3 contains sample questions used in mination rests on when the source expects to receive the
direct questioning. incentive offered.
The direct approach is the most effective. Statistics Short term-received immediately; for example,
show in World War 11, it was 90 percent effective. In letter home, seeing wounded buddies.
Vietnam and OPERATIONS URGENT W R Y , JUST
CAUSE, and DESERT STORM, it was 95 percent ef- Long term-received within a period of time; for
fective. example, political asylum.
QUESTIONING PHASE
The interrogation effort has two primary goals: To rogator to obtain accurate and pertinent information by
obtain information and to report it. Developing and following a logical sequence.
using good questioning techniques enable the inter-
The questioning phase starts when the source begins Prepared.
to answer questions pertinent to interrogation objec- Direct Questions
tives.
Questions should be presented in a logical sequence
QUESTIONING TECHNIQUES to avoid neglecting significant topics. A series of ques-
Good questioning techniques must be used tions following a chronological sequence of events is
throughout the interrogation. The interrogator must frequently employed, but this is not the only logical
know when to use different types of questions. Good method of asking questions. Adherence to a sequence
questioning techniques enable the interrogator to ex- should not deter the interrogator from exploiting infor-
tract the maximum amount of information in the mini- mational leads as they are obtained.
mum amount of time. The interrogator must be able to The interrogator must consider the probable
use the following types of questions: response of the source to a particular question or line of
Direct. questioning and should not, if at all possible, ask direct
questions likely to evoke a refusal to answer or to an-
tagonize the source.
Nonpertinent.
Experience has shown that in most tactical interroga-
Repeated. tions, the source is cooperative. In such instances, the
interrogator should proceed with direct questions.
Control.
Good, direct questions-
(CLASSIFICATION)
SPOT REPORT
TO: G2, X Corps DATE: 171105FEB99
FROM: Team 2, IPW Section, 213th MI Bn REPORT NO: 02-314
25th Div (Armd), X Corps
1. SIZETWHO: Squad.
2. ACTIVITY/WHAT: Reconnaissance.
3. LOCATIONIWI~ERE:NB 576472 (Huy intersection).
4. UNITTWHO: 1MRSP MRCD MRBl44 MRRl56 MRD.
5. TIMETWHEN: No later than 171800FEB99.
6. EQUIPMENT/HOW: Using assigned weapons and equipment, recon forward areas to determine avenues
of approach for elements of 2 MRB.
7. REMARKS:
a. SOURCE: EPW, Interrogation serial number US-AR-23.035-73.
b. MAP DATA: GERMANY, EISENACH-HUNFELD, 1:50,000, USACGSC 50-242, Edition 5.
c. HIS, CPT ANRUF, CO, 3 MRCD MRBl44 MRRl56 MRD, DOI: 170100FEB99.
(CLASSIFICATION)
.
Figure 3-5. Sample spot report (SALUTE).
3-21 .
Begin with a basic interrogative: Who, What, previous question may be rephrased or otherwise dis-
When, Where, Why, and How. guised. The use of repeated questions may develop a
Require a narrative answer. One which cannot be topic the source had refused to talk about earlier.
answered by a simple Yes or No. This type of Repeated questions may also be used to-
question requires the source to think about his Check source reliability.
answer in order to respond correctly.
Ensure accuracy of important details such as place
Provide a maximum amount of information in the names, dates, and component parts of technical
least amount of time, and the greatest number of equipment.
leads to other information.
Return to a topical area for further questioning.
Are brief, precise, and simply worded to avoid con-
fusion. Control Questions
Control questions are developed from recently con-
(NOTE: The source may not be on the same intellec- firmed information that is not likely to have changed.
tual level as the interrogator and some may be illiterate. They are used to check the truthfulness of the source's
Some words or phases in English do not translate into a responses and should be mixed in with other questions
foreign language.) throughout the interrogation.
Follow-Up Questlons Prepared Questions
Follow-up questions are used to obtain complete in- Prepared questions are used primarily when dealing
formation on a topic that pertains to the interrogation with information of a technical nature, or specific topic,
objective. They are used to exploit leads obtained from which requires the interrogator to formulate questions
the source on information not directly related to the beforehand;-the interrogator prepares them in writing
primary interrogation objective. Exploitation of these to be used during the interrogation. The interrogator
leads is discussed later. There are two types of leads: may have to research technical material or contact
Hot-information that could affect the immediate TECHINT personnel to assist him in preparing ques-
tactical situation in your AO. This type of lead tions. Interrogators must not allow the use of prepared
should be exploited immediately, and a spot report questions to restrict the scope and flexibility of their in-
submitted as soon as possible. Figure 3-5 is a terrogations.
sample of a spot report in a SALUTE format. The interrogator must use the different type of ques-
Cold-information of intelligence value that will tions effectively. Active listening and maximum eye-to-
not affect the immediate tactical situation. This eye contact with the source will provide excellent
type of lead is recorded and exploited after the in- indicators for when to use follow-up, repeated, control,
terrogation objective has been satisfied or at the and nonpertinent questions.
appropriate time during the interrogation se- The interrogator must use direct and follow-up ques-
quence. tions to fully exploit subjects pertinent to his interroga-
Nonpertinent Questlons tion objectives. H e should periodically include control,
repeated, and nonpertinent questions in order to check
Nonpertinent questions are used to conceal the
the sincerity and consistency of the source's responses
interrogation's objectives or to strengthen rapport with
and to strengthen rapport.
the source. They may also be used to break the source's
concentration, particularly, if the interrogator suspects A response which is inconsistent with earlier respon-
the source is lying. It is hard for a source to be a con- ses or the interrogator's available data is not necessarily
vincing liar if his concentration is frequently inter- a lie. When such a response is obtained, the inter-
rupted. rogator should reveal the inconsistency to the source
and ask for an explanation. The source's truthfulness
Repeated Questions
should then be evaluated based on the plausibility of his
Repeated questions ask the source for the same infor- explanation.
mation obtained in response to earlier questions. They
may be exact repetitions of the previous question, or the
QUESTIONS TO AVOID INTERROGATORS GUIDE
Interrogators should avoid the following types of An Interrogators Guide is a pamphlet or notebook
questions. designed to guide the interrogator through the inter-
rogation. The IPW senior interrogator should ensure
Leading Questions
team members prepare an interrogators guide, which
Leading questions require the source to answer Yes could be included in the unit's SOP. The guides are
or No. They do not elicit narrative answers. They also made based on the A 0 and supported command intel-
prompt the source to answer the question in a way he ligence requirements. They should be jointly prepared
thinks the interrogator wants to hear it; for example, by the interrogator and available intelligence analysts.
"Did you go to the command post last night?" Although The guides contain information such as-
normally avoided during the interrogation, leading
questions may be used to- PIR and IR.
Verify facts. Topical sequence question format.
Pinpoint map locations. Actual prepared questions to be used during the
interrogation.
Confirm information obtained during map track-
ing. Leading questions are used sparingly during Guidelines for employing the various approach
map tracking. techniques.
Negative Questions Formats or samples of completed interrogation
reports used by interrogators.
Negative questions should never be used during an in-
terrogation. They imply the source should reply in the SPOT REPORTABLE INFORMATION
negative, and this sometimes confuses or leads the Spot reportable information is critical to the success-
source to provide false information; for example, ful accomplishment of friendly COAs. Information may
"You're not in the 1st Company, are you?" Negative be spot reportable even when an interrogator cannot
questions usually require additional questions to clarify determine its immediate intelligence value. Spot
the source's responses. reportable information is always time sensitive in that
Compound Questions its value depends on the speed with which it is reported
and processed.
Compound questions are never used during an inter-
rogation. They are two questions asked at the same If an interrogator obtains information he thinks is
time; for example, "Before you were captured today, spot reportable, he must compare the information with
were you traveling north or south?" They are easily his element's overall objective statement. Items of in-
misunderstood and may confuse the source or force him formation relating to any of the intelligence indicators
to give an ambiguous answer. Compound questions listed in the objective statement are spot reportable. In-
allow the source to evade a part of the question or to formation relating to indicators not listed may still be
give an incomplete answer. They may confuse the spot reportable.
source or cause the interrogator to misunderstand the The key to identifying spot reportable information is
response. recognizing its potential value. If the information indi-
Vague Questions cates a significant change in the enemy's capabilities or
intentions, it is spot reportable. Information inconsis-
Vague questions do not have enough for
tent with current OB holdings should be spot reported
the source to understand exactly what is being asked by
if the inconsistency concerns an important item and the
the interrogator. They may be incom~lete,general, 0' source has given a plausible explanation for it.
otherwise nonspecific and create doubt in the source's
mind. Vague Gestions confuse the source, waste time, If an interrogator cannot decide if a piece of informa-
are easily evaded, and result in answers that may confuse tion is spot reportable, he should act as though it is.
or mislead the interrogator. This means he should exploit it fully and record all per-
tinent information. The interrogator should then con-
sult the senior interrogator for a final determination of
the information's value. Spot reportable information is source's pertinent knowledge in this topical area before
transmitted by the interrogator either written or orally moving on to the next topic in his sequence. H e main-
in the SALUTE format (Figure 3-5). tains his established questioning sequence to ensure no
topics are missed. The only exception is exploiting a hot
LEADS
lead.
-.
- - -
TERMINATION PHASE
When it is necessary or prudent, the interrogator will The approaches used to "break" the source must be
terminate the interrogation. There are many ways to reinforced. Any promised incentives should be
conduct a termination, but the following points must be rendered. The reinforcement must be sincere and
conveyed to the source:
FM 34-52
....
1
;iiiiii.;;;!i?
.....
.....
"' -n
Z
,65K
HElGnT
BROWN
COLOR OF H A I R
I o
N
1 1.70 m BLACK
x
Y, 2 BLOOD T Y P E RELIGION
0 B POS
9 NONE
- m
0 . n NOTICE
m 0 '
2 9 a
2 CI Thk c u d ia L u e d to prironcrr or
-n
n
I
4-m( w u in the c u t o d y of the Unikd
> S t r t u Army. T h t c u d must be
i curitd at dl t i m u by the EPW
0
z x to whom it k k u e d .
Rm- of DA Form 2 6 6 2 . R . M a y 8 2
REVERSE
DOCUMENT CATEGORIES
The category assigned to each CED must be recorded Contain significant intelligence information.
as part of the Captured ~ o c u m e n Log
t entry for that May be critical to successfully accomplishing
CED. Interrogators should also enter a brief descrip- friendly COAs.
tion of that CED. This description should identify the
type of document (such as sound recording, written Significant intelligence topics include enemy OB, new
material, painting, engraving, imagery); and what lan- weapons or equipment on the battlefield, and may con-
guage was used in the CED. tain information that indicates a significant change in
the enemy's capabilities or intentions.
This entry should also specify the physical construc-
tion of the CED (such as typed, printed, handwritten, When a document is identified as Category A, the
tape cassette, photographs, film) and give some indica- document examiner immediately ceases screening
tion of its size (such as the number of pages, rolls of operations and submits a spot report in SALUTE for-
film, cassettes). The categories are discussed below. mat of the critical information from the document. The
examiner then resumes screening operations.
CATEGORY A 3
Category A documents- CATEGORY B
Category B documents contain information pertain-
Contain spot reportable information.
ing to enemy cryptographic or communication systems.
Are time sensitive. Once a document is identified as Category B, it is clas-
EPWs OR SOURCES
sified SECRET. This is done to limit the number of Category C documents may be of interest or value to
people having knowledge of the capture or contents. other agencies. When identified as Category C, they re-
quire exploitation, regardless of content.
Category B documents may contain spot reportable
information, thereby requiring immediate exploitation. CATEGORY D
In every case, these documents will be transferred Category D documents appear to contain information
through secure channels to the technical control and of no intelligence value. Documents are not identified
analysis element (TCAE) or TSA as soon as possible. as Category D until after a thorough examination by
CATEGORY C document translation specialists at the highest com-
mand interested. This is accomplished at EAC.
Catego~yC documents contain no spot reportable or
Category D documents are to be disposed of as directed
time-sensitive information, but do contain information
by the appropriate authority.
of general intelligence value that does not indicate sig-
nificant changes in enemy capabilities or intentions.
DOCUMENT HANDLING
The accountability phase begins at the time the docu- Place document was captured, including the six- or
ment is captured. Original documents must not be eight-digit coordinate, and description of the loca-
marked, altered, or defaced in any way. Documents tion of capture.
must be clearly tagged. The capturing unit attaches a
Identity of the capturing unit.
captured document tag (DA Form 5976, Part C) to each
document; multiple CEDS are bundled o r bagged Identity of the source from whom the document
together. The capture data is always recorded on a cap- was taken, if applicable.
tured document tag. Figure 4-2 shows a format to use
Summary of the circumstances under which the
when a capture tag is not available; record the required
document was found.
data on any-paper.
.*
EVACUATION
The captured document tag should be assigned a se-
auential number at the first formal emloitation ~ o i n t . CED intelligence value will be determined and ex-
ihoaing the nationality of the by nation- ploited as early as possible. The document must be for-
a1 letters prescribed in STANAG 1059. The capturing warded immediately to higher headquarters-
unit will record the information as follows:
8 Time document was captured, recorded as a DTG.
and a detailed description of the materiel. If pos- coming batch of documents includes a CED transmittal.
sible, photographs should be taken of the equip- Figure 4-3 shows this format. The exact format for a
ment and evacuated with the document. An object document transmittal is a matter of local SOP, but it
of known size such as a ruler should be placed should contain the information listed below:
close to the materiel and photographed with it to
provide a size reference. The identity of the element to which the CEDs are
to be evacuated.
CEDs containing communications or cryp-
tographic information are handled as secret The identity of the unit forwarding the CEDs.
material and are evacuated through secure chan- The identification number of the document trans-
nels to the TCAE at division and the TSA at EAC. mittal.
ACCOUNTABILITY Whether or not CEDs in the package have been
At each echelon, starting with the capturing unit, screened and the screening category. (If not
steps are taken to ensure CED accountability is main- screened, NA is circled.)
tained during document evacuation. To establish ac- A list of the document serial numbers of the CEDs
countability, the responsible element inventories all in the package.
incoming CEDs. Thorough accountability procedures
at each echelon ensure CEDs are not lost. To record When a batch is received without a transmittal, the
each processing step as it occurs helps correct mistakes interrogation element contacts the forwarding unit and
in CED processing. obtains a list of document serial numbers.
Accountability is accomplished by anyone who cap- The interrogation element records all trace actions in
tures, evacuates, processes, or handles CEDs. All CEDs its journal.
should have completed captured document tags. An in-
Maintaining the CED log. Identity of the capturing units (as listed on the cap-
tured document tag).
When intelligence derived from a CED is included in
a unit or information INTREPs, the identification let- Document category (after screening).
ters and number of the document concerned are quoted Description of the CED (at a minimum the
to avoid false confirmation. All CEDs are shipped with description includes the original language; number
any associated documents. of pages; type of document such as a map, letter, or
INVENTORY
photograph; and the enemy's identification num-
ber for the CED, if available).
An inventory of incoming CEDs is conducted initially
by comparing the CED to the captured document tag Destination and identification number of the out-
and accompanying transmittal documents. This com- going transmittal.
parison identifies- Remarks (other information that can assist the
Transmittals that list missing CEDs. unit in identifying the CED to include processing
codes. These are set up by local SOPSto denote all
Document tags not attached to CEDs. actions taken with the document while at the ele-
CEDs not attached to document tags. ment, including spot (SALUTE) reports, transla-
tions, reproductions, or return of the CED to the
CEDs not listed on the accompanying transmittal source from whom it was taken).
documents.
Accountability for the CED should be established at
LOG each echelon once the actions described above have
The captured document log, shown at Figure 4-4, is a been done.
record of what an element knows about a CED. After TRACE ACTIONS
trace actions are initiated, the CEDs are entered in the
remarks section of the captured document log. This log When necessary, the receiving unit initiates a CED
must contain the following: trace action. Trace actions are initiated on all missing
CEDs, captured document tags, and all information
Name of capturing unit. missing from the captured document tag. Trace actions
File number (a sequential number to identify the are initiated by contacting elements from which the
order of entry). documents were received. This corrective action can be
completed swiftly if that unit's captured document log
DTG the CED was received at this element. was filled out completely.
Document serial number of the captured docu- If necessary, the trace action continues to other ele-
ment tag. ments that have handled the document. If a captured
Identification number of the transmittal document document tag is unavailable from elements that have
accompanying the CED. previously handled the CED, the document examiner
fills out a captured document tag for the document
Full designation of the unit that forwarded the using whatever information is available. Attempts to
CED. obtain missing CEDs are critical because of the infor-
Name and rank of individual that received the mation those CEDs might contain.
CED.
DOCUMENT EXPLOITATION
As incoming CEDs are accounted for, the exploita- CED screening to determine potential intelligence
tion phase for intelligence information begins. Ex- value.
ploitation includes-
Extracting pertinent information from the CED.
UNIT: /b zfl D I I / (4)
FILE RECEIVED DOCUMENT INCOMING TRANS- FORWARDING RECEIVED BY TIME AND PLACE
NUMBER DTG SERIAL NUMBER MISSION NUMBER UNIT OF CAPTURE (DTG)
I
A 0pu'U 0/9../3
Reporting the extracted information.
CEDs are processed and exploited as soon as possible SPECIAL DOCUMENT HANDLING
within the constraints of the unit's mission. The main TECHDOG are given special handling to expedite
mission of some units is to exploit human sources rather exploitation and evacuation. TECHDOG are handled
than to translate CEDs; therefore, manpower con- as Category A CEDs until screened by TECHINT per-
straints may limit time for translation. sonnel. Generally, TECHDOCs accompany the cap-
However, translating CEDs is necessary at any tured equipment until the intelligence exploitation is
echelon where interrogators and translators are as- completed. TECHDOG include maintenance hand-
signed. Therefore, it is important that interrogation books, operational manuals, and drawings. Examples of
elements possess qualified personnel to provide the TECHDOG i n c l u d e
translation support required. Intelligence units ensure Air Force documents (AIRDOG). These are
there is no delay in CED exploitation. documents of any category captured from crashed
Qualified personnel or document copying facilities enemy aircraft, particularly if related to enemy
should be available to handle CEDs; personnel should anti-aircraft defense or air control and reporting
be available to exploit the volume or type of documents systems. AIRDOCs are transmitted to the nearest
concerned. If not, documents are forwarded immedi- Air Force headquarters without delay.
ately to the next higher echelon. Copying availability is Navy documents (NAVDOG). These are docu-
determined by the echelon in question, as well as mis- ments taken from ships (for example, code books,
sion and mobility considerations. call signs, frequency tables, and identification sym-
CED SCREENING bols). NAVDOG are forwarded without delay to
the nearest Navy headquarters.
Document exploitation begins when CEDs are
screened for information of immediate intelligence in- Maps and charts of enemy forces. Captured maps
terest. As each document is screened, it is assigned one and charts containing any operational graphics are
of four category designations. The category assigned evacuated immediately to the supporting all-
determines the document's priority for exploitation and source analysis center. Captured maps and charts
evacuation. without graphics may be transmitted to the
topographical intelligence section attached to
CED screening procedures include receiving the corps.
latest PIR, IR, and SIR, current friendly and enemy
situation update; relevant OB; and review. SCREENING AT HIGHER ECHELONS
Brigade and division interrogators get this informa- CEDs can be recategorized during screening con-
tion from the supported J2, G2, or S2. Corps and ducted at higher echelons. The information may have
theater DOCEX elements receive this information from become outdated, or the echelon currently exploiting
their parent MI battalion or brigade. The DOCEX ele- the document may have different intelligence require-
ments are responsible for obtaining and providing such ments.
operational intelligence information to their DOCEX
teams.
TRANSLATING
Once a CED has been screened, the document must Full-one in which the entire document is trans-
be exploited. The translation must be clearly and ac- lated. It is time-intensive and requires manpower,
curately typed or handwritten; this ensures usability. especially for lengthy documents or TECHDOCs.
Also, as part of interrogation duties, the interrogator It is unlikely many full translations will be per-
may have previously translated a document by sight to formed at corps or below. Even when dealing with
help gain a source's cooperation. Category A documents, it may not be necessary to
translate the entire document to gain the informa-
TYPES OF TRANSLATIONS
tion it contains.
There are three types of translations:
Extract-one in which only a portion of the docu- Originator, which is the element that prepared the
ment is translated. For instance, a TECHINT report.
analyst may decide a few paragraphs in the middle
Date of preparation showing the DTG.
of a 600-page helicopter maintenance manual
merit translation, and a full translation is not Report number as designated by local SOP.
necessary. The analyst would request only what he
Document number taken from the captured docu-
needed.
ment tag.
Summary--one in which a translator begins by
Document description including type of document,
reading the entire document. He then summarizes
number of pages, physical construction of docu-
the main points of information instead of render-
ment, and enemy identification number, if ap-
ing a full or extract translation.
plicable.
A summary translation requires a translator have
Original CED language.
more analytical abilities. The translator must balance
the need for complete exploitation of the document DTG document was received at element preparing
against time available in combat operations. the report.
A summary translation may also be used by trans- DTG document was captured.
lators working in languages in which they have not been Place document was captured.
formally trained. For instance, a Russian linguist may
not be able to accurately deliver a full translation of a Identity of capturing unit.
Bulgarian language document. However, he can Circumstances under which document was cap-
probably render a usable summary of the information it tured.
contains.
Rank and last name of translator.
TRANSLATION REPORTS
Fxcept for SALUTE spot reports, all information Type of translation: full, extract, or summary.
resulting from document exploitation activities will be Remarks for clarification or explanation, including
reported in a translation report. After all required the identification of the portions of the document
SALUTE reports have been submitted, the translator translated in an extract translation.
will prepare required translation reports.
Classification and downgrading instructions, ac-
CEDs that contain information of intelligence value cording to AR 380-5.
that was not SALUTE reported are the subject of trans-
lation reports. Translation reports are prepared on all DISSEMINATION AND RECORDS
Category C CEDs and include portions of Category A, The translator records each exploitation step taken in
TECHDOCs, and Category B CEDs not SALUTE the captured document log. Transmission of spot and
reported. translation reports is entered in the element's journal.
The priorities for preparing translation reports are- At least two copies are prepared for each spot
(SALUTE) and translation report. One copy is placed
@ Category k in the interrogation elements's files. The other accom-
TECHDOCs. panies the CED when it is evacuated. When the CED
cannot be fully exploited, a copy of the CED should be
Category B. made and retained. The original CED is forwarded
Category C. through evacuation channels. Even when copies of an
unexploited CED cannot be made, the original CED is
A translation report, shown at Figure 4-5, should con- still forwarded through evacuation channels without
tain the following information: delay.
Destination, which is the element to which the
report will be forwarded.
(CLASSIFICATION)
TRANSLATION REPORT
TO: G2,23d Inf Div (MECH) DATE: 291130ZAUG99
FROM:IPW Sec, I&S Co, 231st MI Bn REPORT NUMBER: 08-0356
PART I. CONTROL DATA:
1. DOCUMENT NUMBER: US-WAIBVO-03093.
2. DOCUMENT DESCRIPTION: Personal letter, 1page, handwritten.
3. DOCUMENT'S ORIGINAL LANGUAGE: Russian.
4. DATE AND TIME RECEIVED: 290510ZAUG99.
5. DATE AND TIME OF CAPTURE: 290120ZAUG99.
6. PLACE OF CAPTURE: vic NB146122.
7. CAPTURING UNIT: Co.A, 2d Bn, 1st Inf Bde, 23d Inf Div.
8. CIRCUMSTANCES OF CAPTURE: During ambush.
9. TRANSLATOR: SGT Royce.
10. TRANSLATION TYPE: Full.
PART 11. TRANSLATION TEXT:
My dear Serezhen'ka:
It has been a long time since I received a letter from you. How are you and where are you? The last
time you wrote that fighting was going on around you all the time, and this worries me a lot. Take
care of yourself. There have been many changes at home. Your mother, despite her age, had to go
to work in the factory. They make tanks there, but the sign over the entrance says this is a sugar plant.
I don't know why they do this. At the school where I work, we were also told to go and work at the
same plant. They are going to close the school. Everyone has to go to the front or work in the war
industry. I would be more at ease if I knew you are alive and well. Please write as soon as you can.
Your KATHY.
RIFLEMEN
Depending on assignment and experience, riflemen Possible identifications of support mortar, artillery,
can be expected to have tactical information concerning and armored units.
mission, organization, and locations of enemy i n f a n t i
Status of food, ammunition, and other supplies.
units. Topics for interrogation include-
Troop morale.
Identification of source's squad, platoon, company,
battalion, regiment, and division. Casualties.
Organization, strength, weapons, and disposition of Defensive and protective items of NBC equipment;
squad, platoon, and company. status of NBC training and defensive NBC instruc-
tions, and offensive capability of NBC operations.
Number of newly assigned personnel in unit within
last 30 days. Status of immunizations; new shots, booster shots
more frequently than normal.
Location and strength of men and weapons at
strongholds, outposts, and observation posts in Stress on care and maintenance of NBC protective
source's immediate area. equipment.
Source mission immediately before capture as well Issuance of new or different NBC protective equip-
as mission of source's squad, platoon, company, ment.
and higher echelons. Morale and esprit de corps of civilians.
Location and description of defensive installations,
Civilian supply.
such as missile sites, antitank ditches, and emplace-
ments, minefields, roadblocks, and barbed wire en- Health of civilians, and medicine availability.
tanglements in source's area before capture.
Night maneuvers, rehearsals, unit size, night vision
Description of weapons in which these locations
devices, and special equipment.
are covered.
Names and personality information of small unit
commanders known to source.
MESSENGERS
Messengers are frequently chosen on the basis of names of persons who originated these messages,
above-average intelligence, ability to observe, and to and names of persons to whom messages were
remember oral messages and instructions. Messengers, directed. Description of duty positions of such per-
who have an opportunity to travel within the immediate sonalities.
combat zone, generally, will have a good picture of the
Information as to extent which messengers are used
current situation, and are excellent prospects for tactical
in the applicable enemy unit, routes of messengers,
interrogation on the following:
and location of relay posts.
Nature and exact contents of messages he has been
Locations of message center and communications
carrying over a reasonable period of time, as well as
lines.
Conditions of roads, bridges, and alternate routes. Description of terrain features behind enemy lines.
Location of CPs and names of commanders and NBC weapons, installations, and units.
staff officers. Morale and esprit de corps of civilians.
Location of artillery, mortars, and armor seen Relocation of movement of civilians.
during messenger's movement through the combat
area. Civilian supply.
Location of minefields and other defensive installa- Health of civilians and medicine availability.
tions. Use of radio equipment in applicable enemy units.
Location of supply and ammunition dumps.
Questions directed to captured EPW drivers of com- e Location of supply points and types of military and
mand and staff vehicles, supply vehicles, and vehicles civilian vehicles carrying supplies.
- -
LIAISON OFFICERS
The liaison officer is the commander's agent for ac- Locations of observation posts and outposts.
complishing coordination among the headquarters of Assembly areas for troops and location of supply
lower, adjacent, and higher units. The liaison officer points.
also may be called upon to effect coordination between
infantry units and supporting or supported armor and Disposition of regiments, battalions, and com-
artillery, engineer, and reconnaissance units. panies of a division.
Contents of field orders, such as composition of at- @ Identification and disposition of reserves.
tacking forces--location and direction of attack; Status of supplies of all types.
missions of individual units; objectives; plans for
attack, defense, or withdrawals; and plansfor com- Civilian social and economic conditions.
munication and coordination among units. Evacuation or movement of civilians.
Location of lower, adjacent, higher, and supporting
unit CPs as well as location of supply and com-
munications installations.
ARMORED TROOPS
Armored troops are good interrogation prospects Effect of weather on tank operations.
concerning enemy tank tactics, communications, logis- Armored reconnaissance missions.
tics, and based on combat experience, mines, traps, and
ambushes. Topics for interrogation should cover- @ Number of newly assigned personnel in unit within
last 30 days.
Unit identifications.
Morale and esprit de corps of civilians.
Designation and strength of supporting or sup-
ported infantry units. @ Relocation or movement of civilians.
Types and characteristics of tanks employed. Civilian supply.
Mechanical and tactical weaknesses of these tanks. Health of civilians and availability of medicine.
e Means of communications between tanks and be- e Status of ammunition and POL resupply.
tween tanks and infantry. Location of ammunition supply points.
Missions and objectives. Ammunition supply to include type in the basic
Routes of approach. load or on hand; for example, chemical ammuni-
tion.
Armored units in reserve.
Measures for defense against NBC and radiological
Location of tank parks and assembly areas. attack, to include type of NBC defensive equipment
Location of impassable terrain features. installed in the tank.
Methods of mortar, artillery, and tank coordina- Night maneuvers, rehearsals, unit size, night vision
tion. devices, and special equipment.
Location of tank repair depots and petroleum, oils,
and. lubricants (POL) dumps (to include resupply
and refueling techniques).
ARTILLERYMEN
Topics to be covered when questioning captured artil- Targets for various types of fire during different
lerymen are broken down as follows by forward ob- phases of combat.
servers, artillery firing battery personnel, and air defense Nature of the infantry artillery communication net.
artillerymen.
Type and location of artillery fire requested by in-
FORWARD OBSERVERS
fantry units.
Location, organization, and number of guns of the
batterv or battalion whose fire the source was ob- Identification of corps or other supporting artillery
serving units.
- and directing.
Location of front lines, outposts, and observation Plan of attack, defense, or withdrawal of enemy
posts. units.
Deployment of artillery.
iRoutes of approach and their condition. Charac-
Characteristics of guns, including caliber and range. teristics of terrain features.
Methods of observing and directing artillery fire, Counterbattery protection for artillery installa-
including information such as types of aircraft tions.
employed. Effect of friendly counterbattery fire.
Methods of counterbattery fire and protecting Location of battery ammunition points.
enemy positions from counterbattery fire.
Disposition of local security weapons.
Use and location of dummy artillery positions.
Direction and elevation of fire.
Types of artillery ammunition used for various tar-
gets, new types of ammunition, conservation of Instructions concerning ammunition use.
fires and reasons for conservation. Names of battery and other commanders.
Location of artillery and infantry unit CPs. Detailed description of artillery weapons used.
Trafficability of routes appropriate for movement Status of weapons crew training.
of heavv artillery.
Information on food supplies and morale of
Names of commanders, staff officers, and their at- military and civilians.
titudes toward each other and infantry com-
manders. Measures for defense against NBC attack.
Number of newly assigned personnel to the unit Types and amount of ammunition, to include
within last 30 days. chemical and nuclear, in basic load or on hand.
Effect of our artillery upon enemy units. Location of chemical and biological ammunition.
Location and numbering of defensive Location targets marked for chemical and biologi-
concentrations. cal fires.
Location of ammunition supply points. AIR DEFENSE ARTILLERYMEN
Radio channels used for fire control nets. Location and number of air defense weapons.
Identification and location of supporting bat- @ Detailed description and characteristics of air
talions. defense guns and missiles used.
Availability of nuclear fire support. Shape, size, and location of ground radars.
Morale and esprit de corps of civilians. Organization of air defense units.
Relocation or movement of civilians. Types of areas defended.
Civilian supply. Nuclear capability.
Health of civilians and availability of medicine. Methods of attack against friendly aircraft, by type
of aircraft.
ARTILLERY FIRING
BAlTERY PERSONNEL Avenues of approach and altitudes most and least
advantageous to enemy air defense.
Measures of defense against friendly artillery fire.
Methods of identifying unknown aircraft.
MEDICAL CORPSMEN
Although medical personnel are entitled to special Number of casualties over a given phase of combat
protective measures under international agreements, operations.
they can be and are interrogated without infringement Weapons accounting for most casualties.
of any existing laws or rules of warfare. The following
questions could be asked: Key personnel who have been casualties.
Conditions of health and sanitation in enemy units. Information on mass sickness or epidemics in the
enemy forces.
Ratio of dead to wounded.
W e s of treatment and medication for NBC casual-
Commander's tactics in relation to number of ties.
casualties.
Supply and availability of materials used in treat-
Adequacy and efficiency of casualty evacuation. ment of NBC causalities.
Weapons most feared by the enemy. Special training or treatment of NBC casualties.
Location and staffing of aid stations and hospitals. New or recent immunizations.
Organization of division, regiment, and battalion Morale and esprit de corps of civilians.
medical units.
Relocation or movement of civilians.
Status and types of medical supplies.
Civilian supply.
Use and characteristics of newly developed
medicine or drugs. Health of civilians and availability of medicine.
Data on wounded, sick, or dead in enemy hands. Location and present condition of civilian hospi-
tals, factories-producing medical supplies, and
Skill of enemy medical personnel. warehouse and stores containing medical supplies.
ENGINEER TROOPS
Engineer personnel are prime interrogation can- Location of camouflaged positions and installa-
didates for information concerning bridges, fortifica- tions.
tions, minefields, and coordination between infantry Water supply and locations of water points.
--
and supported units. Topics to be covered are-
Organization, strength, and weapons of engineer
Mission of supported unit. units.
Exact location and pattern of existing minefields, Presence of other than organic engineer units at
location of bridges, buildings, airfields, and other the front, and mission of such units.
installations ~ r e ~ a r efor
1 I
d demolition, and m.*e s of
mines of explosives used. Number of trucks, tractors, and other engineer
vehicles available.
Doctrine pertaining to the use of mines and booby
traps to include types of mines, characteristics of Location of new or repaired bridges.
firing devices, and minefields patterns. Use of demolitions.
Location of roadblocks and tank traps and how Morale and esprit de corps of civilians.
they are constructed.
Relocation or movement of civilians.
Conditions of roads, bridges, and streams or rivers
for trafficability of personnel, vehicles, and armor; Civilian supply.
weight-carrying capacity of bridges and location Health of civilians and availability of medicine.
and description of fords.
Location and present conditions of civilian power
Location of engineer materials and equipment such plants, water works, and sewage disposal plants.
as road material, bridge timber, lumber, steel, ex-
plosives, quarries, rock crushers, sawmills, and Night maneuvers, rehearsals, unit size, night vision
machine shops. devices, and special equipment.
Location of dummy vehicles and tank and gun posi-
tions.
RECONNAISSANCE TROOPS
Reconnaissance personnel and degree of activity are Routes of approach used by the unit.
a.
good indicators o n enemy intentions. Topics for ques- Identification, composition, organization, strength,
tioning are- and disposition of the main body of troops and
The reconnaissance plan, march order, time reinforcements. Routes to be used.
schedule, and specific- missions of all elements, General quality of troops of the reconnaissance
means of coordination and communication be- unit and of the main body.
tween elements, and unit and higher headquarters.
Radio communication equipment and frequencies
Nature of orders received from higher head- used.
auarters.
1
Night maneuvers, rehearsals, unit size, night vision
Identification, organization, composition, strength, devices, and special equipment.
means of transportation, and weapons of the unit.
LOCAL CMLIANS
Civilians who recently left enemy-held areas normally Condition of roads, bridges, and major buildings.
have important information, and often give this infor- Enemy policy and attitude toward local civilians.
mation readily.
Human and material resources of the area.
This information is usually important to CA and
PSYOP personnel. The following questions could be Morale and esprit de corps of local civilians.
asked: Data on important civilian personalities remaining
Location of enemy front lines and major defensive in enemy areas.
positions. Health and medical status of local populace.
Location of artille~ypositions. Effect of friendly- operations on civilian populace.
-
Location and nature of minefields in enemy rear Instructions to prepare for defensive measures
area. against NBC attack.
Description of key terrain. Recent immunizations.
GUERRILLA PERSONNEL
Guerrilla personnel, depending of assignment, can be strength, equipment, leadership, and local influence or
expected to have information concerning activities, support. Topics to be covered are-
Area of activities. Leadership.
Nature of activities. Reliability.
Strength. Contacts.
Equipment. External direction or support.
Motivation.
NBC OPERATIONS
The following topics are of interest when interrogat- What is the size and composition of NBC specialist
ing personnel about NBC operations: troop units? Where are they located? Why?
What items of NBC protective equipment have Have troops been issued any special precautionary
been issued to troops? Is there any differentiation instructions concerning consumption of food and
in issue of items for particular areas? If so, what water or handling of livestock in areas that may be
items for what areas? overrun by enemy forces?
Are there any new or recent immunizations indi- What training, if any, have troops received in the
cated by sources during interrogations? use of incapacitating-type agents and their dissemi-
What immunizations have troop units received, as nation?
indicated in captured immunization records? What items of chemical detection equipment have
Are troops equipped with protective masks? Is the been issued to troops? Are the items operated
individual required to carry the mask on his per- continuously, irregularly, or not at all? Is there any
son? Are there any sectors where the mask is not differentiation made regarding their use in certain
required equipment for the individual? What ac-, areas?
cessory equipment is issued with the mask? What type radiation-measuring instruments are is-
Is protective equipment issued to troops? If so, sued to troop units and what is their range or limit?
what type of clothing or articles? If special clothing How are they distributed?
is used, is it for any particular geographic area? How many hours of training with radiation-
Have troop units constructed NBC protective shel- measuring instruments have monitoring and survey
ters? If so, what type? personnel received?
Are fortification, individual and collective, How many hours of NBC training have troops
provided with overhead cover? received? How many hours of individual training
are devoted to chemical, biological, and radiologi-
Are troops issued any protective footwear or other cal operations? Have troops received any special
means to provide protection against penetration by or accelerated training above what is considered
liquid agents? routine?
Are tanks and armored vehicles provided with spe- Do units have decontamination materials on hand?
cially installed protective equipment to protect the If so, what type and quantity?
crew in case of chemical attack?
Have you observed decontamination stations or in-
Are troops issued any type of individual protective stallations established in your area? If so, what are
items for first aid, such as antidotes or protective their location and composition?
ointment?
Are troop units issued biological sampling kits or
Are there any areas for which additional or unusual devices? If so, what is their type and composition?
NBC safety precautions have been established?
Have you observed any cylinders or containers
which might contain bulk chemical agents?
Have you observed any tactical aircraft equipped
with accessory tanks which indicated a spray
capability?
Are you aware of location of dumps of chemical-
filled ammunition, bombs, clusters, and bulk What types of tunnels, caves, and modifications are
chemical agents? used in defense against riot control agents and ex-
plosive gases?
Do artillery, mortar, or rocket units have chemical
ammunition on hand? What defensive material and instructions are issued
for defense against riot control agents?
@ At what radiological exposure or dose are troops
required to relocate? What defensive measures are taken against defolia-
tion and anticrop agents?
Are there any problem areas or shortcomings in
NBC material?
FM 3452
INFORMATION REQUIREMENTS
I. SUPPLY POINTS.
1. What types of ammunition is the enemy stockpiling?
2. What are the types of POL the enemy is stockpiling?
3. Where are these supply points located?
4. What units are serviced by these supply points?
5. How much materiel is currently stockpiled at these locations?
11. WLNERABILITIES.
1. What malfunctions are occurring with the enemy's--
a. Weapons?
b. Vehicles?
c. Communications?
d. Ammunition?
2. What are the enemy's major supply routes?
3. How often are supplies transported over these routes?
4. What transportation priority has the enemy assigned to each category of
supplies?
5. What choke points has the enemy identified along his own lines of
communications?
PERSONNEL HANDLING
There are two types of persons captured on the bat- STEP 2. SILENT
tlefield: combatants and noncombatants. FM 27-10 The capturing unit instructs or signals EPWs to be
defines the two types. The capturing unit treats all com- silent. If that does not work, the EPW is gagged.
batants and noncombatants as EPWs until the division Guards give orders to EPWs, but do not talk nor give
forward collecting point segregates them by category. them comfort items.
This is whether they are soldiers, clergy, or medics (see
Chapter 3). STEP 3. SAFEGUARD
Noncombatants are handled, questioned, detained, The POC unit immediately moves the EPWs out of
evacuated, and released in accordance with theater the fire zone. They protect EPWs from reprisals and
policy. give them medical care as necessary. The POC unit tries
to preserve the shock of capture until brigade inter-
At the EPW's capture point, the capturing element rogators have a chance to question the EPWs.
performs the following steps, with the senior soldier
responsible for ensuring they are done. The steps are STEP 4. SEGREGATE
referred to as the "five S's." The POC unit orders the EPWs to sit on the ground.
STEP 1. SEARCH It separates officers from enlisted, senior from junior,
male from female, and civilian from soldier. It prepares
The POC unit's first job is to disarm, then search all a captive tag and puts one on each EPW (Figure 3-4).
EPW or detainees, and tie their hands behind their Tagging procedures are discussed under equipment han-
back. They gather all loose enemy documents and dling procedures below.
equipment in the area. They evacuate them with the
EPW. Documents and personal and protective military STEP 5. SPEED TO THE REAR
equipment stay with the prisoner unless otherwise Lastly, the POC unit moves EPWs to the unit supply
directed by the battalion S2. point for evacuation. All captured documents, personal
effects, and portable enemy equipment go with the
EPW. Also, one escort guard should know the EPW's
circumstances of capture.
CAPTURED ENEMY DOCUMENTS FOUND ON ENEMY PRISONER OF WAR
The battalion S2, and subordinate unit commander, Put CED in a waterproof bag, one per EPW.
ensures CEDs found on EPWs are handled as follows. e Affix Part C of the captive tag to the bag (see Fig-
The POC unit will- ure 3-4).
Search each EPW. Give CEDs to senior escort.
e Return identification documents to EPW.
Direct senior escort to evacuate CEDs with the
Write the following on the top and bottom half of EPW.
the EPW captive tag: Number of documents taken;
date and time, location and circumstances of cap-
ture; capturing unit's designation.
TACTICAL QUESTIONING
This section provides "how to" instructions to enable A language qualified interpreter is available to as-
the S2 to do tactical questioning (TQ) on EPWs. Fol- sist the S2.
lowing these will-
WHERE TQ IS DONE
Achieve usable results. TQ is done as soon as possible after removing the
Preserve the source for subseauent formal inter- EPW from fire zones. However, battalion or brigade
rogation. commanders forced to deal with h&vy EPW input may
set up an organized TQ effort at the unit's EPW collect-
Keep the S2 from breaking the law. ing point.
WHO ASKS THE QUESTIONS
WARNING
Only the S2 is authorized to conduct TQ. The S2 asks
Improper, unlawful, or inept attempt at field exploita- every question himself, even when using another soldier
tion can harm or destroy possible critical intelligence or local national as an interpreter. If augmented by in-
sources, and send US soldiers to prison. Any decision terrogators, the interrogation team supervises the TQ
to attempt these procedures is a command respon- effort.
sibility, and only done by the S2.
TIME CONSIDERATIONS
TQ is designed to be a quick procedure, lasting from 5
to 20 m i n u k . A command decision is required if
Figure C-2 is an example of the front and reverse sides Source questioning interferes with mission acmmplish-
of a CEE tag. It should be included as a tab to the merit or delays a priority evacuation.
TECHINT appendix in the intelligence annex of an
OPLAN plan or operations order (OPORD). ITEMS NEEDED FOR TQ
The purpose of TQ is to obtain combat information of TQ is authorized for collection of combat information
immediate use to the battalion or subordinate unit by critical to successful mission accomplishment. The
the S2. Sources of information can be an EPW and questioner needs to know what information head-
local or friendly civilians encountered in the operational quarters requires. Other items required for TQ are-
area. (S2s use established procedures when questioning Maps.
local or friendly civilians.)
Vehicle and aircraft identification guides.
LANGUAGE REQUIREMENT
Target language dictionary.
TQ can be done only under one of following cir-
cumstances: Report forms, stationery, capture tags, waterproof
bags.
The S2 speaks the EPW's language well enough to
ask direct questions and understand the answers. Interpreter or translator.
T O B E A F F I X E D TO
CAPTURED ENEMY EQUIPMENT
TECH INTEL USE
ONLY
DO NOT D I S T U R B
NOMENCLATURE; flT-/do-A TIME OF RECEIPT:
SERIAL. NO: /R3+56 7 -
DATE OF RECEIPT:
DATEIPLACE 99E D
CAPTUR :~~S~
C A /23454 INSPECTED BY:
C A P T U R I N G UNIT :lzdFf0/~/3&%7 NAME H A N 6
QUANTITY: Q d E EACH
DISPOSITION:
B E L O W FOR U S E B Y T E C H I N T E L
UNITS ONLY
-a
3o NOTICE c
;C
u
THIS EQUIPMENT I S BEING HELD
2
-4
FOR:
ANALYSIS
f DO NOT D I S T U R B
CT
4
c UTlLlZATlCN
2 THIS E Q U I P M E N T
0
CP
VI DESTRUCT13N
m
Y)
PROPERTY U.S. G O V E R N M E N T
3
4
BY AUTHORITY OF 1 1 . i JOINT
+
rn
= U.S. F O R C E S C O M M A N D E R . r
a=
-
Y PERSONNEL TAMPERING WITH
3e CL
rn 0
Z: IIONATUHL PAIUIEO n r ~ t Q;
L
THIS E Q U I P M E N T W I L L B E
UNIT GAT^
SUBJECT T O PROSECUTION UNDER
Do ARTICLE 103,UCMJ
After capturing an EPW or enemy CP, the capturing Uses whatever resources are available to decipher
unit needs to look for maps, encrypted items, OPORDs, it; for example, dictionaries and enemy map symbol
overlays, and other documents. The capturing unit then guides. An example of Soviet and non-NATO sym-
notifies headquarters to request disposition instruc- bols is at Figure C-5.
tions.
Looks for information that has a direct bearing on
The small-unit leader safeguards the items pending his current mission.
disposition instructions. At the same time he-
After finding information of possible value to the mis-
Looks over the document. sion, the S2 extracts the combat information and uses
the SALUTE format as a template to organize the in-
Does not mark or harm it in any way.
formation (see Figure 3-5).
FM 34-52
I OTHER SYMBOLS
I
CONTAMINATED CHEMICAL MEDIC DECONTRUCK
AREA (OR RESERVE) TROOPER
I
CONCRETE 'DRAGON 'TEETH
BRIDGE PREPARED
FOR DESTRUCTION
ENEMY TIMBER AND
L
EARTH BUNKER
SMALL ARMS
UGHT MACHINEGUN
-
FORTIFIED BUILDING
COMPANY MACHINEGUN
BARBED OR CONCERTINA WIRE
MEDIUM MACHINEGUN
+
HEAW MACHINEGUN HEAW AA MACHINEGUN ANTI-TANK RECOILESS
ANTI-TANK RIFLE
GRENADE LAUNCHER
I
Figure C-4. Soviet and non-NATO map symbols.
L
ARTILLERY
I
I I
GUN
1 1
HOWrrZER
1 1
ADA ANTI-TANK MULTIPLE ROCKET MORTAR ARTILLERY BAlTERY
+ i + a fi
LAUNCHER IN FIRING POSITION
Ad$%L f E F
SQD LDR PLT LDR CO CDR RN CDR BN HQ RGMT HQ BDE HQ DIV HQ
HELICOPTERS
W CBT X
CBT
b
OTHER x( d7+
RADAR TRANSCEIVER
-
FLASH IMMEDIATE PRIORITY ROUTINE (Underline and transmit the
precedence of this message.)
TOP SECRET SECRET CONFIDENTIAL (Underline and transmit the
security classification of
CLEAR UNCLASSIFIED this message.)
SALUTE REPORT
1. SIZE ~QufiD (Enter the size of the unit
or target.)
2. ACTIVITY (Enter a description of the
activity detected.)
3. LOCATION CR /a3 4 s 6 (Enter the target location
[UTMI.)
4. UNIT MR~I+'~,I~Y/~~ (Enter the unit identity or
type.)
5. TIME n/17 /7/802F.09? (Enter the time of the
sighting.)
6. EOUIPMENT dA (Enter the name of any
equipment sighted.)
7. DIRECTION dA (Enter the direction if
target is moving in degrees
or mils.)
8. TIME //057 (Enter hour-minute-zone.
See NOTE.)
9. AUTHENTICATION IS / 70225 (Enter message authentication
See NOTE.)
10. OVER
NOTE: The message DTG is used when required to identify message time of origin.
Authentication will be in accordance with joint task force procedures.
-
- --
FM 34-52
(CLASSIFICATION)
TACTICAL INTERROGATION REPORT
NAME OF PRISONER: KLEYMENOV INTERROGATOR: SGT ROYCE.
CATEGORY: A@C D UNITFORMATION TO WHICH
INTERROGATOR ATTACHED: Intg Sec,
Intel-Surv Co, 231st MI Bn, 23d Inf Div
INTG SERIAL NQ: US-AR-1234-1 MAPS USED: GERMANY, 1:50,000,
EISENAC HUNFELD, Ed #2.
DTG OF INTG: 221700ZNOV99 LANGUAGE USED: Russian
INTG REPORT NO: PT-001 INTERPRETER: None
PART I - INTELLIGENCE POTENTIAL OF ENEMY PRISONER OF WAR (EPW)
A. PERSONAL PARTICULARS:
1. Rank, full name, service number, and position: JrLT, Dimitar KLEYMENOV,
No. 0506031, Plt Ldr.
2. Date and place of birth: 23 May 72, TBILISI, Georgian SSR, USSR.
3. Nationality: Soviet (Ethnic Rumanian) (Religion: Orthodox).
4. Knowledge of languages and proficiency: Russian (N).
5. Unit, formation, or organization: 2 MR Plt (MRP), 2 MR Co (MRC), 3 MR Bn
(MRB), 62 MR Regt (MRR), 34 MR Div (MRD)(2MRP/2/3/62/34MRD).
6. Datettime, placelgrid references, capturing unit and circumstances of capture:
221330ZNOV99, Hill 457 (NB625305), A/1/2/3, captured after taking Hill 457.
B. CAREER:
1. Premilitary: Gymnasium graduate, attended 1year at
University of Moscow.
Vocational training: None.
Paramilitary training: None.
2. Military: 5 years military service, attended OCS Oct97; previous military jobs:
Assistant Platoon Leader.
DOWNGRADINGPECLASSIFICATIONDATA:
(NOTE: This report is UNCLASSIFIED.
The word "CLASSIFICATION"is used for training purposes
to denote lines which may carry classification markings on an
actual report.)
(CLASSIFICATION)
FM 34-52
(CLASSIFICATION)
(3) PAST: Assaulted Hill 457 (NB625305).
c. UNIT: (2MRCl3162134MRD).
(1) PRESENT: To continue offensive operation east on highway.
(2) FUTURE: To link up with the 3MRB in ALSFELD (NB1922) NLT 27NOV99.
(3) PAST: Crossed international border 18NOV99 to liberate oppressed populace.
2. COMPOSITION: (62MRRl34MRD).
a: 62MRR had 2xMRB, dsg 1and 3. lxArty Btry, dsg unk. 2xEngr Bn, dsg unk.
b. 2MRBl62MRR had 3xMRC dsg 1,2, and 3.
c. 2MRCl3162MRR had lxHq Section and 3xMRP dsg 1,2,3.
d. Ea MRPl213162MRR had 3xMRS, dsg 1,2,3.
3. STRENGTH: (2MRC).
a. Personnel: (2MRC).
(1) 2MRC had 93xpersonnel(6xOff/87xEM).
(2) Hq SecJ2MRChad 6xpersonnel(3xOff - CO, PO, T013xEM lSG, BMP
driverlmechanic, BMP commanderlgunner).
(3) Ea MRPl2MRC had 29xpersonnel(lxOff - Plt Ldr128xEM - lxPlt SGT and 27xPlt
mbrs).
(4) Ea MRSIea MRPl2MRC had 9xEM ( M q d Ldr, 8xSqd mbrs).
b. WEAPONS AND EQUIPMENT: (2MRPl2MRC).
(1) Individual Weapons: (2MRP).
(a) 7x9mm pistol ( W l t Ldr, lxea RPG-16 gunner, lxea BMP driverlmechanic).
(b) 16x5.45mm AK-74 rifles (lxea remaining EM except RPK-74 gunners).
(c) 1x7.62mm SVD sniper rifle carried by sniper, 2MRP.
(2) Crew-served Weapons: (2MRP).
(a) 6x5.45mm RPK-74 LMG (2xea MRSl2MRP).
(b) 3x58mm RPG-I6 ATGL (lxea MRSl2MRP).
(3) Other Weapons: (2MRP) Ea mbrl2MRP carried unk no RGD-5 and F-1 hand
grenades.
(4) Armored Vehicles: (2MRP) (3xBMP, ea armed with lx73mmsmoothbore gun,
lx7.62mm coaxial MG, and IxAT-3 SAGGER ATGM, lxea MRSl2MRP).
(5) Other Vehicles: Unk.
(CLASSIFICATION)
-
Figure E-3. Sample TIR (continued).
fk
FM 3 4 5 2
(CLASSIFICATION)
(1) Personnel: 5xEM received by 2MRS/1/2MRC to replace losses.
(2) Equipment: lxBMP received by 2MRS/l/2MRC within 8 hours of loss.
c. Reinforcements: Unk to EPW.
d. Combat experience: Unk to EPW.
e. Morale: (2MRPI2MRC) Morale was good due to offensivegoing as planned and faith
in leaders. PO, 3MRB162134MRC gives good political indoctrination.
f. Electronic technical data: Unk to EPW.
8. LOGISTICS: (2MRP/2/3/62/34MRD).
(a) Weapons and Ammunition: (2MRP).
(1) Weapons: (2MRP) All weapons were in excellent condition due to inspection in
early Nov99. Spare parts for all weapons were stored in BMPs. No shortages of
weapons or spare parts.
(2) Ammunition: (2MRP) All ammunition were in excellent condition as it was
issued new and also was inspected in early Nov99. No shortages.
(b) Vehicles and POL: (2MRP).
(1) Vehicles: (2MRP) All BMPs were in good conditions due to regular
maintenance. Ea BMPl2MRP carried its own spare parts and tool kit. No
shortages of vehicle spare parts.
(2) POL: (2MRP) POL was resupplied ea evening by a U/I tanker truck at
approximately 1800. No shortages.
(c) FoodlWater: (2MRP).
(1) Food: (2MRP) All personnel eating field rations since offensive began. Each
member eats 2xcanned rations each day. Resupply every 3xdays. Last resupply on
2ONOV99. No shortages.
(2) Water: (2MRP) Water was obtained from local sources. Each memberf2MRP
has purification tablets to be used as necessary. No shortages.
(d) Communication Equipment: (2MRP) All transceivers are in good working order as
they were inspected in early Nov99. Spare parts are stored in BMPs.
(e) Medical: (2MRP) Each member had Mrst-aid kit.
(0 NBC Equipment: (2MRP) All NBC gear was in excellent condition as it was
inspected in late Oct99.
9. MISCELLANEOUS: (3MRB).
a. Personalities: (3MRBI62134MRD).
(CLASSIFICATION)
/
/ -
I 0 I
\
Attach to
/ \
101 \
/ I
I
I
I \PW/ I I
I \
/ \ / \
I
Part A I I REMRRKS: I
I Serial No. of Tag: R ~ L I % /I ~i Include any information that I
I
I I may assist in the intell- I
I
I
Capturing Unit: d&-/)/(/~/3
I I Associated PW captured at
I : same time/location. PW
I I Power Served, etc.
I
I
I
I WIG of Capture: / / O h 45 z A W 9 9 I I I
I I
I I
I Location of capture:CAl23#5& I I I
I
; rw -: I I
I I
FiORZ5, Jmd I
I
I
I I
, First, MI) I I I
I I I
I I
I I
I
r PWDOB: / S M f i Y 29 I
I I I
I I
I Part B attached II I I
I or Dccuments: I
I I I
I
!----------------------------------I I----Perforation-------------- I
I
part B I 0 1 I I 0 I
I Serial Number of T a g : 0 ~ 6 ~ ~ \I 7 IiAttach
1 I I I
1- I
to PW equipment I
I PW Rank: VT I
I I I
I
RE'P~6ilc I I I
/ MG or capture j / D b ~ 5 gAM? 97 :
I I I I I
I I
: I I
I
I I
I I
I I
I
I I
I I
I
I I
I I
II I
I
Figure E-4. Standardized EPW and personal equipment and document captive tag
(STAMG 2044).
FM 34-52
(CLASSIFICATION)
FM G Z , /d.T/t/FB/V
TO G a, XI/
INFO G 2, X GafPs
CLASSIFICATION/CAVEATS
SERIAL: (U).
COUNTRY: (U).
SUBJ: IIR b f l 8 4 7 / A- @
DOI: (U).
REQS: (U).
SOURCE: (&.
SUMMARY: (&).
TEXT: (a.
COMMENTS: (a.
//IPSP: (U) 87- 11.
IICOMSOBJ: (U) 37- 11.
PROJ: (U).
COLL: (U) (OPTIONAL).
PREP: (U).
ENCL: (g) TO FOLLOW. 1ENCLOSURES. (OPTIONAL). WARNING:
(U) REPORT CLASSIFIED (CLASSIF'ICATION/CAVEATS WITH CAVEATS
SPELLED OUT).
DECL: OADR ##
FM 3452
.
Figure E-7.Format for a knowledgeability brief.
FM 34-52
2B-2E. (Include these subparagraphs as needed using format above.)
3. (Classification) EMPLOYMENT:
3A. W-W: (Employment installation in 76-characters including blanks; geographic
coordinates in 15-characterswithout blanks; city name in 30-characters including blanks;
country code in 2-characters; employment position and duties in 30-characters including
blanks; security clearance in 1character.)
3B-3G. (Include these subparagraphs as needed using format above.)
4. (Classification) MIL SERVICE:
4A. W-YY: (Military installation in 76-characters including blanks; geographic
coordinates in 15-characterswithout blanks; service component in Zcharacters; rank in
2-characters; unit in 30-characters including blanks; city name in 30-characters including
blanks; country code in 2-characters; military specialty and duties in 30-characters
including blanks; security clearance in 1character.
4B-4T. (Include these subparagraphs as needed using format above.)
5. (Classification) SPECIFIC KNOWLEDGEABILITY: Freeltext variable length
(maximum 6,900-characters or 100 message lines) to address full source knowledgeability.
The last two elements or paragraph, list applicable military equipment and IPSP codes, as
follows:
//MILEQUIP: Two 8-CHARACTER CODE; CODE; CODE; CODE; CODE; CODE//
(6-CODE LIMIT).
//IPSP: Six 7-CHARACTER CODE; CODE; CODE; CODE; CODE; CODE; CODE;
CODE// (8-CODE LIMIT).
6. (Classification) COLLECTOR'S COMMENTS: Free textlvariable length (maximum
1,380-characters or 20 message lines) to address collection capability.
7. (Classification) GUIDE: Free textlvariable length (maximum 1,380-characters or 20
message lines) to address desired method of intelligence tasking.
DECL: OADR
SOURCE NAME
~ o c m u CAPTURED
r ~ WISOURCE AK- 4F, AGLREOF H )T ~ ~ K R
M~LITARYCAREER RI F ~ L f l AId
SPECIALIST KNOWLEDGE NDA/E
(CLASSIFICATION)
STANDARDS
The goal for any language maintenance program is to romance languages belong to Category I (easiest), while
have all linguists perform critical wartime mission tasks most of the Asian languages belong to Category IV
proficiently. Scoring 2/2/2 or better on the listening, (hardest). Therefore, a 2 on the DLPT for Korean does
reading, and speaking portion of the Defense Language not correspond to a 2 for French.
Proficiency Test (DLPT) is the minimum standard for
There are several versions of the DLPT for each lan-
foreign language proficiency. However, there are
guage. A 2 result on a version I examination is not the
several reasons why this should not be the sole criteria
same as a result on a version 111 examination, even in
for judging the effectiveness of a language maintenance
the same language. There are different forms (For ex-
program nor an individual's proficiency.
ample, A, B, or C) within each examination version.
Languages have different degrees of difficulty. The
Nevertheless, unless there is a qualified native speaker
Defense Language Institute, Foreign Language Center
who can evaluate language proficiency, the DLPT can
has divided languages into four categories
be used to evaluate language maintenance program ef-
according to difficulty for an English speaker. The
fectiveness.
METHODS
The best method of learning and maintaining a There is satellite communications for learning which
foreign language is total immersion. Opportunities for transmits in-language news broadcasts from countries
total immersion include in-country temporary duty and around the world.
teaching institutions. Unfortunately, in-country ex-
An effective CLP begins with the commander. He
perience is not readily available for all languages, and
must have a clear and accurate picture of his language
immersion courses can be cost prohibitive.
mission requirements and be accountable for the CLP.
A substitute for immersion training is one-on-one in-
A command language council is formed to assist the
struction or conversation with a native speaker. This
commander. Council recommendations should become
can be part of the formal instruction at DLIFLC,
policy following command endorsement. This council-
Presidio of Monterey, CA; at the Foreign Language
Training Center, Europe (FLTCE), Garmisch, Ger-
many; and university refresher training courses or a DA- Consists of unit members who have a CLP interest.
sponsored institute. It can also be done through hiring
Consists of members who are appointed on orders.
native speakers at unit locations.
Should meet at least quarterly and follow an agen-
The most prevalent, but probably least effective, da.
method is through self-study materials, such as US
Army Forces Command Language Maintenance Should prepare and disseminate meeting minutes
Refresher and Improvement Course (FLAMRIC) and to unit linguists.
foreign language tapes. Most of these materials are
The CLP manager (CLPM) chairs the CLP council.
available from DLIFLC or local language learning
Units commanded by a colonel should have a full-time
centers.
CLPM. In lieu of rank and duty position, the CLPM
should be appointed based on academic credentials or
experience. The CLPM's tenure should be at least one Monetary support for language maintenance
year or longer. programs comes mainly from REDTRAIN funds.
These funds are normally located at major Army com-
The CLPM should maintain an individual linguist
mands and are available to subordinate units. How-
data base, with the following information:
ever, this should not preclude use of a unit's regular
Duty assignment. funds to support language sustainment when available.
Primary military occupational specialty (MOS). Funding to support CLPs must be identified and
documented regularly. These requirements must be ad-
On-going language training. dressed in annual budget planning. The CLP should
Post-DLIFLC language training. also be represented in long-range budget planning.
CLP requirements should be separate from other train-
Expiration term of service (ETS) date.
ing budgets.
Permanent change of station (PCS) and date
A good incentive is the FLPP for qualified linguists,
eligible for return from overseas (DEROS) date (if
depending on how they score on their DLPT. Only
applicable). qualified linguists are eligible to receive FLPP.
Foreign language proficiency pay (FLPP) status. A state-of-the-art language training vehicle is the
DLPT dates and scores, to include which version. teletraining network, or commonly referred to as video
Required DLPT test.
teletraining(v.
The VTT' system was used by DLIFLC to teach Arabic
Individual training plan. to troops being deployed to Southwest Asia. DLIFLC
Year-to-year test results. broadcasts Arab language instruction to Fort Hood and
Fort Huachuca. Other critical instruction was passed
Current DA Form 330 (Language Proficiency
through the system.
Questionnaire).
The V'TT is versatile and has many applications.
The command should have a detailed SOP covering Video and audio can be transmitted from one site to any
all CLP aspects. It should be specific in task assign- number of receiving sites. In a two-way interactive
ments and self-explanatory. It is updated regularly and mode, two sites can hold a bidirectional video and audio
becomes an integral part of the unit or command SOP. conference. In the multipoint mode, up to eight loca-
Unit language training time, governed by AR 611-6, is tions can hold a conference. The host site transmits the
designated at regular intervals on the training schedule, video and audio, while other locations receive the host's
and should take priority over competing and un- audio and video, plus all audio from the remaining sites.
scheduled training. Each linguist should have the op- Any site can request, during the conference, to become
portunity to attend a specified amount of language the host site.
training with established objectives and goals. DLIFLC is committed to the VJT concept. It is ready
Units should have a refresher language training pro- to assist units having VTI" capability with their remedial
gram. Self-study materials should be available, and off- foreign language sustainment and enhancement
duty use encouraged. programs.
The CLPM should be aware of adult language educa- For information concerning VIT language training,
tion courses in the community. Both duty-hour and off- contact DLIFLC's Distance Education Division at DSN
duty hour attendance are encouraged. 878-5746/5747; Commercial (408) 647-574615747; or
FAX at DSN 878-5512 or Commercial (408) 647-5512.
Opportunities for operational readiness . training
(REDTRAIN) should be used in support of the CLP. V'IT is a proven cost effective and viable language
These opportunities include, but are not limited to, for- training tool; for example, training soldiers in their
ward area training, live environment training, and sum- units with qualified native speakers, which dramatically
mer language programs. reduces travel and per diem costs.
APPENDIX G
INDIVIDUAL AND COLLECTIVE TRAINING
"In no other profession are the penalties for employ- designed to make the interrogation unit commander
ing untrained personnel so appalling or so irrevocable aware of aspects to consider when developing unit train-
as in the military."-General Douglas MacArthur. ing programs.
Interrogator employment during OPERATION There are no commissioned interrogation officers.
DESERT STORM demonstrated that units whose mis- The commissioned interrogation specialty was
sion training plans (MTPs) were battle focused and eliminated in 1970. The Interrogation Warrant Officer
based on the principles of training outlined in FM 25- (351E), and the Senior Enlisted Interrogator (97E4L)
100 and FM 25-101, accomplished the EPW and advise the commander on the training and employment
DOCEX mission more efficiently and timely. of interrogators. They provide the technical expertise
required to develop the unit mission-essential task list
The commander bears the ultimate responsibility for
(METL) and training plans and exercises to support
training his soldiers to fight and win. This appendix is
that METL.
MISSION-ESSENTIALTASK LIST
To train interrogators in the areas critical to theaunit's When developing the METL, the commander keeps
mission accomplishment, the commander (CIDnterroga- in mind, regardless of echelon, that interrogators have a
tion Company or I&S Company) develops a complete mission to perform at the next lower echelon as GS or
and accurate METL. During the METL development DS. For this reason, they must train and practice per-
process, the commander- forming their mission at the assigned and lower echelon,
and deploy with both echelons.
Analyzes the MI battalion commander's restated
wartime mission and approved METL, identifies In addition to understanding the METL of your unit,
specified and implied tasks. you must be familiar with the METL of supported staffs
and units. Other unit METLs to consider are--
Uses situation training exercises ( S l X ) and field
training exercises (FIXs) in ARTEP 34-298-10- Supported S2s and the maneuver brigade and bat-
MTP to determine collective tasks in support of talion staffs to which they belong. Train with these
critical wartime missions. staffs during FIXs and command post exercises
(CPXs) to facilitate team cohesiveness for combat.
Sequences collective tasks as he expects them to The S2 should know and train with his interroga-
occur during the execution of the company's war- tion support team to prepare for wartime opera-
time mission. tions.
Obtains battalion commander's approval of the Train and deploy with CI personnel. Interrogation
company METL. and CI personnel should cross-train on each others
Briefs company leadership (officers and NCOs); respective wartime critical tasks.
uses soldiers training publications, soldiers
Train with combat arms units. Interrogators
manuals, and MTPs to identify leader and soldier
should train and emphasize the importance of tag-
tasks to support the collective critical tasks which ging and evacuating EPWs and CEDs. Stress that
comprise the METL.
EPWs and CEDs provide information that saves
lives.
JOINT MILITARY INTELLIGENCEAND MILITARY POLICE TRAINING
OPERATIONS URGENT FURY, JUST CAUSE, operations. Without integrating the two METLs, you
and DESERT STORM demonstrated the need for in- cannot develop scenarios that allow soldiers to train in a
terrogators and MP to conduct integrated training with battle-focused environment. The two units must learn
regard to EPW and civilian internee operations. to work together and understand the requirements and
functions each unit will have to perform in wartime.
For effective, meaningful training to occur, com-
Members of the band are trained and may be employed
manders must plan, develop, and coordinate many tasks.
as augmentees to the holding area perimeter security
Interrogators must be familiar with the METL of the
force.
MP unit assigned to your echelon with regard to EPW
EXERCISE REQUIREMENTS
In addition to normal personnel and equipment re- PERSONNEL
quired of any unit exercise, the following must be
planned for and considered. Additional personnel must be employed to make an
interrogation exercise successful. Personnel will be
SCENARIO needed to serve as EPWs, civilian internees, medical
The most time consuming and complicated portion of personnel, interpreters, CI teams, and EPW civilian in-
an interrogation exercise is scenario development. In- ternee guards for lower echelon units. The numbers of
cluded in the scenario must be reasonable actions of personnel needed can be varied and personnel may be
enemy and friendly forces. reinserted any number of times, in any number of roles.
Stories must be developed for EPWs and civilian in- The minimum number of personnel serving as EPWs
ternees; for example, as in the technical support pack- and civilian internees at any one time should not be al-
ages and interrogator comprehensive evaluation. These lowed to go below 10 to 15. Personnel should be able to
stories should be entered into an automated HUMINT speak a foreign language; preferably, languages of as-
data base, and should interact with each other at least signed interrogators. This allows for optimum training
minimally. For example: and practice in performing the actual job of an inter-
rogator.
Units should cross match.
Possible sources for linquistically capable EPW and
Missions should fit together. civilian internee role players include--
Some degree of personality (names of leaders and Other interrogation units.
soldiers) should be shared by personnel.
EW and CI personnel.
It is not necessary that all EPWs and civilian internees
have stories that include information of intelligence PYSOP personnel.
value nor that stories be complete in all aspects. There MP personnel.
should be enough material in the stories to provide a
realistic "skeletonnon which role players can build. e CA personnel.
If possible, interrogators should develop or assist with Linquistically capable personnel may also be in other
story development. The stories should tie into real MOSS and units not normally associated with foreign
world exercise play and provide indicators of enemy language capabilities.
COAs to the G2. Tying EPW and CI stories to exercise Another source of linquistic support is the US Army
play facilitates incorporating EPW play into G2 exercise Reserve (USAR) and the Army National Guard
planning and execution. This will help identify and fix (ARNG) units for AC units and vice versa. A few per-
many shortcomings in the stories. sonnel with languages not indigenous to the unit should
be included so interpreters can be trained when used.
If possible, at least one insertion of mass numbers of For example, location to simulate a medical aid sta-
EPWs and civilian internees should occur. The number tion should also be included along with personnel to
of personnel should be at least double the number of simulate medical personnel. This allows personnel to
available interrogators. One way of simulating this is practice interrogating EPWs and civilian internees in
to- the medical evacuation system. Having multiple loca-
tions selves several purposes.
Insert a large quantity of individuals.
Both interrogation and MP units have functions
Allow a short time for MP and interrogator person-
that must be performed at a lower echelon.
nel to work with this.
Interrogators must be able to support the lower
0 Remove a portion of the personnel. echelons with interrogations. This means teams
Immediately reinsert them as new EPWs and must be able to deploy and act without normal unit
civilian internees. The knowledgeability and leadership.
cooperativeness of the sources should be mixed; for Coordination must be affected with the supported
example, some may be of CI interest, some may lower echelon unit.
have no information, and a few may refuse to
break. Reports must be transmitted to the supported unit
and accompany EPWs being evacuated.
DOCUMENTS
Documents present another time consuming and dif- MP must receipt and receive EPW and civilian in-
ficult consideration for interrogation operation exer- ternees from lower echelons and guard them during
cises. Documents should be in foreign languages; the evacuation process from lower echelon to as-
numerous documents should be relevant to scenario signed echelon.
documents which are developed to interact with the There is also a need to practice having multiple EPW
EPWs and civilian internees and as stand-alone intel- and civilian internee facilities at the assigned echelon.
ligence sources. When these are established, MP and interrogation as-
The number of documents used during an exercise sets must be divided in order to operate the additional
should be excessive; large quantities of documents facilities.
should be input into the scenario at the same time An additional aspect of using additional locations is
EPWs are being inputted. This allows simulation of training of interrogation and MP units to function with
EPWs and civilian internees, and documents arriving on reduced staffing necessitated by performing multiple
the same sources of transportation. missions simultaneously.
MULTIPLE EXERCISE LOCATIONS OTHER SUPPORT
In order to exercise evacuation of EPWs and civilian For corps int&rogation platoon exercises, a food ser-
internees, support to lower echelons' multiple exercise vices section of the HHS company should be deployed
locations is necessary. These locations do not need to in support of the exercise. This allows the food service
be drastically separated, but should not be within sight section to practice operating two separate mess facilities
of each other. required by doctrine.
GLOSSARY
I
AC Active Component
ACE analysis and control element collection management and
ACR armored cavalry regiment dissemination
ADA air defense artillery CMEC Captured Materiel Exploitation Center
'41 area of interest CMO civil-military operations
AIRDOC Air Force document co company
A0 area of operations COA course of action
armd armored coll collection
ARNG Army National Guard CONUS continental United States
ARTEP Army Training Evaluation Program CP command post
ASAS All-Source Analysis System CPR common point' of reference
ASPS all-source production section CPT captain
ATGM antitank guided missile CPX command post exercise
CS combat support
CSS combat service support
BICC battlefield information control center
BIRTCRTY birth country
BIRTCITY birth city DA Department of the Army
BIRTDT birth date DCPR destination common point of reference
bn battalion DECL declassify
BSA brigade support area DEROS date eligible for return from overseas
BT message break indicator DIA Defense Intelligence Agency
I DISCOM division support command
DISUM daily intelligence summary
CA Civil Affairs div division
CAP civic action program DLEA drug and law enforcement agency
c3 command, control, and DLPT Defense Language Proficiency Test
communications DLIFLC Defense Language Institute Foreign
command, control, communications, Language Center
and intelligence doc document
C-E communications-electronics DOCEX document exploitation
C&E collection and exploitation DOD Department of Defense
CEE captured enemy equipment DO1 date of information
CCIF combined corps interrogation facility DOS disk operating system
CED captured enemy document DPOB date and place of birth
CEM captured enemy materiel DPRK Democratic People's Republic of
CHA central holding area Korea
CI counterintelligence DS direct support
CID Criminal Investigation Division DSA division support area
CIF Corps Interrogation Facility dsg designation
CLP Command Language Program DSN digital support network
CLPM Command Language Program DST decision support template
Manager DTG date-time group
ea each hq headquarters
EAC echelons above corps HHC headquarters and headquarters
ECB echelon corps and below company
ECM electronic countermeasures HHS headquarters, headquarters and
EM enlisted member service
encl enclosure HIC high-intensity conflict
engr engineer HPT high-payoff target
EPW enemy prisoner of war HIS hearsay
equip equipment HUMINT human intelligence
ETS expiration term of service HVT high-value target
EW electronic warfare hwy highway
Armv Publications
DOCUMENTS NEEDED
A
approach phase. See also interrogation phases. debriefings
approach combinations, 3-13 through 3-20 OPSEC requirement, 3-31
developing rapport, 3-12,3-13 responsibilities during, 3-31
part of interrogation phase, 3-5,3-10 strategic, 3-31
rapport postures, 3-11 E
B enemy. See ME=-T factors.
battle damage assessment (BDA). See IEW tasks.
enemy prisoner of war (EPW)
BEST MAPS, 3-32,3-33 as sources of information, 2-17
at CIF, 2-10
briefings, 3-30 at TIF, 2-12
C evacuating and guarding, 2-9
when wounded, 2-12
captured enemy documents
accountability of, 4-6 F
as sources of information, 2-17,3-1,4-1,4-13 force protection. See IEW tasks.
definition and types of, 1-12,4-1,4-9 G
disposal of, 4-13
evacuation of, 4-4,4-12,4-14 Geneva Conventions. See GWS, GPW, and GC.
exploitation of, C-1
GWS, GPW, and GC, 1-14,l-16
grouping of, 4-12
inventory of, 4-7 command responsibilities, 1-7, 1-9
logging of, 4-7,4-8 coordinating with SJA, 1-9,3-14
tracing of, 4-7 definition of, iv, v, 1-11
posting Articles of, 3-14
transmittal of, 4-6,4-12
protected persons rights vs security needs, D-1
violations of, 3-16
CED. See captured enemy documents.
GORDON R. SULLIVAN
General, United States Army
Chief of Staff
OFFICIAL:
MILTON H. HAMILTON
Administrative Assistant to the
Secretary of the Army
02404
DISTRIBUTION:
Active Army, USAR, and ARNG: To be distributed in accordance with DA Form 12-11El
requirements for FM 34-52, Intelligence Interrogation (Qty rqr block no. 1130).