LN324-91
CHAPTER XIX
INVESTIGATION REPORT
INTRODUCTION:
As CI espionage agent you must have the knowledge of how to prepare an
investigation report. An investigation report is an accumulation of agent's
reports in a concise summary of basic interrogations in which only the facts
are written down.
GENERAL FACTS:
NOTE: Example #1 is the format for the investigation report.
A. PREPARE THE REPORT'S HEADING:
1. Write down the date in which the report was prepared in the block
"DATE SUBMITTED" in the report.
2. Write down the "focus" information if it applies in this report.
This block is pertinent if the report deals with an investigation of history.
If this is not an investigation of history, leave this block blank.
3. Write down the category of the case in block "CASE
CLASSIFICATION". (Example: Espionage, Sabotage, Subversion, etc).
B. If this is a Personal investigation of a SUBJECT (that is, in which
the SUBJECT is known) fill out blocks 1 to 10. If the SUBJECT is not know,
enter N/A (Not applicable) in these blocks.
1. Write down the name (last name in capital letters, first name, and
initial) of SUBJECT in block #1.
2. Write down the serial number, identity number, of the SUBJECT in
block #1.
3. Write down SUBJECT'S race in block #3.
4. Write down the rank, that is military or civilian, in block #4.
5. Write down the branch of the Armed Forces to which the SUBJECT
belongs, in block #5.
6. Write down the position that the SUBJECT occupies in block #6.
186
LN324-91
7. Write down the date of SUBJECT'S date of birth in block #7.
8. Write down the SUBJECT'S place of birth in block #8.
9. Write down the unit or the employment address of SUBJECT in block #9.
10. Write down the SUBJECT'S residential address in block #10.
C. If this is an INCIDENT case (Person or unknown persons), fill out
blocks 11 to 15. If this is not an INCIDENT case, write down N/A in these
blocks.
1. Write down the incident's title in block #11.
2. Write down the incident's date in block #12.
3. Write down incident's time in block #13.
4. Write down the place where the incident occurred in block #14.
5. Write down the register numbers or serial numbers of any equipment
that was involved in the incident in block #15.
D. Complete the Control Section:
1. Write down symbol/control number or the file number in block #16.
2. Write down the name of organizations that are involved in carrying
out the investigation in block #17.
3. Write down the name of the control office in block #18.
E. Complete "Investigation Facts" section:
1. Write down the name of the person or organization that requested
the report in block #19.
2. Write down the reason for which the investigation is being carried
out in block #20.
3. Write down the information about the date of investigation in
block #21:
a. Write the date in which the investigation started.
187
LN324-91
b. Write down the date in which the investigation ended (If it has
not ended yet, write down N/A in this space).
F. Write down the "Present Situation of the Case" in block #22:
1. CLOSED: An investigation is indicated as "CLOSED" when there is no
need for further investigative activities for the authorities to make a
decision upon the case.
2. FINISHED/ELIMINATED: An investigation is considered FINISHED when the
investigation has stopped for any reason that is not the conclusion of the
case.
3. SUSPENDED: An investigation is considered SUSPENDED when the
information obtained is not complete and all the tangible leads have been
exhausted, but there is a possibility yet that new information will spring up
in the future.
4. PENDING: An investigation is considered PENDING when the
investigation is continuous. (or that there are many facts and leads to be
resolved and developed yet).
F. Complete the "Synopsis" Section:
NOTE: THE Synopsis IS A SUMMARY, CONCISE, IN PARAGRAPH FORMAT, WRITTEN IN A
LOGICAL SEQUENCE OF INVESTIGATIVE ACTIONS, AND ANSWERING TO THE MOST COMPLETE
MANNER TO "WHO", "WHAT", , "WHERE", "WHY", AND "HOW" OF THE
INVESTIGATION. RECOMMENDATIONS, OPINIONS, OR CONCLUSIONS MUST NOT BE INCLUDED
IN THIS REPORT. THESE COMMENTARIES MUST BE INCLUDED IN THE TRANSMISSION
LETTER OF THE INVESTIGATION REPORT.
1. Margins:
a. Start the report three (3) lines below de black border in the
upper part of the Synopsis block.
b. The black border in this report will serve as the left margin of
the report.
2. Enumeration of Paragraphs: The paragraphs in the Synopsis Section
of this report will not be enumerated.
188
LN324-91
3. Classification of paragraphs: Each paragraph of the Synopsis will
have the Specific Classification of that paragraph at the beginning. This is
done by writing the classification of each paragraph in quotes at the start of
the paragraph. (Example:
(C) THE STUDENTS WERE
4. Convincing documents to the report:
a. All convincing documents (or additional documents) to the report will
be named in parenthesis within the Synopsis paragraph that these support. For
Example if Agent #1's report supports the first paragraph of the Synopsis, you
will include something like this within the paragraph: (Agent #1's report).
5. Classification of the report: The report will be classified
according to its content, and what is stipulated in the SOP.
G. Continuation pages: If the report could not be finished in the
first page, it is continued in another page in blank, using the normal margins
according to the SOP.
1. In the upper part of the continuation page, write the Title
(Theme), or the name of the SUBJECT in the lower part and the Date and number
of the file in the right portion of the paper. EXAMPLE:
BENITEZ, Wilfredo D. DATE: 1 May 1988
FILE NUMBER: 50-88-0-1
H. Complete the "Distribution" Section in block #24. The distribution
of the report will be made according to its SOP.
I. Complete the "Reviewed by" section in block #25. The typewritten
name and signature of the authority that reviewed the report is written down
in this section.
189
LN324-91
INVESTIGATION REPORT DATE SUBMITTED
_________________________________________________________________FOCUS
(HISTORY) CASE CLASSIFICATION
_____RAL _____RAG _____IAE _____IAI
_________________________________________________________
IDENTIFICATION DATA
1.LAST NAME FATH. MOTH. NAM., INIT. 2.I.D. 3.RACE 4.RANK 5.BRANCH
_________________________________________________________6 .POSITION7.
DATE OF BIRTH 8. PLACE OF BIRTH
_________________________________________________________
9. UNIT OR EMPLOYMENT ADDRESS 10. RESIDENTIAL ADDRESS
_________________________________________________________
11. INCIDENT'S TITLE 12. INCIDENT'S DATE 13. INCIDENT'S TIME
_________________________________________________________14.LOCAL
(BUILD. UNIT) 15. EQUIPMENT, ETC. SERIAL NUN.
_________________________________________________________
CONTROL DATA
16. CONTROL SYMBOL OR FILE NUMBER
__________________________________________________________________17.
INVESTIGATION DONE BY (ORG.) 18. CONTROL OFFICE
INVESTIGATION DATA 19. INVESTIGATION REQUEST BY20.
REASONS FOR INVESTIGATION
________________________________________
21. INVESTIGATION DATE
START COMPLETION
________________________________________
________________________________________
22. PRESENT CASE SITUATION
_____CLOSED _____FINISHED ______SUSPENDED ______PENDING
_______________________________________________________
23. SYNOPSIS
24. DISTRIBUTION
190
LN324-91
25. REVIEWED BY
NAME AND TITLE SIGNATURE
CHAPTER XX
PREPARATION OF SUMMARY REPORTS
INTRODUCTION:
A summary report (SR) is the vehicle used to summarize certain aspects
of an investigation, or give emphasis to key points of actions in an
investigation. This report is not as detailed and is not designed to replace
the Agent's Report. It is as the title implies, a summary. The (SR) must
contain certain favorable or derogatory (unfavorable) concise information
declarations, if it applies, this way the perspective of the case or
investigation will not be altered.
GENERAL FACTS:
A. Preparing the heading.
1. Write down the preparation date in the "Date" section.
2. Write down the identity of the "Preparing Office".
3. Write down the SUBJECT'S information using the same rules in the
Agent's Report.
a. Father and mother's last name in capital letters, name, initial.
b. Identification number.
c. Date and place of birth (FDLN).
EXAMPLE: PEREZ-RIVERA, Juan A.
I.D. NUMBER: 111-11-1101
PDOB: 1 January 1947, San Miguelito, ES
191
LN324-91
B. Write down the information to be reported in the "Summary Report"
section. The text starts in the third line of the black line in the upper part
of the block titled "Summary Report", leaving two lines in the upper part. The
line or black border to the left of the document is used as a margin for all
items.
1. Write down the numbers in sequence. For example:
1.
2.
3.
2. Write down the classification contained in each paragraph. For
example:
1. (C)
2. (S)
3. (NC)
3. Write down the evaluation code (key word) of the information
content of each paragraph using the evaluation system shown in the SR. The
evaluation code must be written down in the last line of the paragraph in the
right edge (Figure 1).
NOTE: If there is not enough space to write down the evaluation code in the
last line of the paragraph, the evaluation code will be written down in a line
below the last line of the paragraph and in the extreme right of the document.
Example:________________________________________________________________
_____________________________________________
________________________________________________________________________
______he left in a Toyota with Cuban license plates.
(F-6)
192
LN324-91
C. Information Sources.
Information sources normally are not revealed in the SR. If the report
is kept within military intelligence, the source could be identified if the
identification is necessary to establish the truth of the information. When
the source is not identified, for security purpose, an indication of the
access to the information could be included while the information about the
source is not as explicit that it identifies the source. When the SR does not
reveal the source's identity the copy of the office files should write down
the source(s) identity. A code number must be used when the source's identity
requires protection. Bibliographies of the sources could be added in the files
when using more than one source for the same report.
D. Information from other government agencies. Information obtained
form other government agencies, except from the Armed Forces, will not be
included in the SR. If other agencies outside the Armed Forces solicit the
information obtained in the SR, the originator or the source must give
permission for the information to be divulged. If the SR contains information
that has been authorized to be divulged to other agencies, this information
will be written in capital letters and underlined.
Example: THE SOURCE WHO IS CONSIDERED TRUSTWORTHY INFORMED THE
__________________________________
___________(Figure 1, Paragraph 4).
When this type of information appears in the SR, the following declaration
must be included and must appear as a non-numbered paragraph and at the end,
written in capital letters. (Figure 1, Paragraph 4).
Example: INFORMATION FROM OTHER SOURCES OUTSIDE THE SOURCES FROM THE ARMED
SOURCES ARE INCLUDED IN THIS SR. THIS INFORMATION WILL NOT BE DIVULGED TO ANY
OTHER AGENCY OUTSIDE THE ARMED FORCES.
E. Additional space. If you need additional space, two lines in the
lower part of the document will be left blank and the text will continue in
blank paper with normal margins. In the upper part of the white paper, the
SUBJECT'S block will be placed at left with the date and reference files.
193
LN324-91
Example: 1 August 86
PEREZ-RIVERA, Juan A.
I.D. NUMBER: 111-11-1101
PDOB: 1 January 1947, San Miguelito, ES
he came into the restaurant and sat down at the corner table where was
accompanied_____________________________________________
F. SR distribution. The last item of the SR is the distribution. The
distribution will be indicated according to the SOP. (Example in figure 1).
G. Closing the SR. The SR is not signed. The file copy will have the person s
name who prepared the SR typewritten in the upper part at the document's right
corner.
H. The SR will be classified according to its content.
194
LN324-91
____________________________________________________________ SUMMARY
REPORT DATE
____________________________________________________________
PREPARING OFFICE
____________________________________________________________
SUBJECT SOURCE'S EVALUATION CODE ABOUT THE INFORMATION
COMPLETELY TRUSTWORTHYA CONFIRMED BY OTHER
NORMALLY TRUSTWORTHY B SOURCES 1
COMFORTABLY TRUSTWORTHY C PROBABLE TRUTH 2
NORMALLY NON-TRUSTWORTHY D POSSIBLE TRUTH 3
NON-TRUSTWORTHY E DOUBTFUL TRUTH 4
TRUST NOT KNOWN F IMPROBABLE 5
TRUTH CANNOT
BE JUDGED 6
___________________________________________________________SUMMARY REPORT
___________________________________________________________________
DISTRIBUTION
___________________________________________________________________
195
LN324-91
CHAPTER XXI
SCRUTINY OF CI INFORMATION
INTRODUCTION:
The scrutiny process and CI interrogation allows us to identify and
explore the persons/targets of interest to CI. This process allows us to
detect these persons or targets, it helps us in the imposition of the same in
an effective manner.
GENERAL FACTS:
A. DETERMINE THE PURPOSE OF THE SCRUTINY AND CI INTERROGATION:
1. The CI scrutiny operations, submit, in a systematic way, the
civilians in the combat area to a series of
questioning/interviews/interrogations with the purpose of:
a. Find and segregate suspicious persons.
b. Identify persons of interest to the CI. (See Example #1).
NOTE: THE CI SCRUTINY OPERATIONS ARE CARRIED OUT TO INTERCEPT ENEMY
INTELLIGENCE AGENTS, SABOTAGE AGAINST, INSURRECTION TRYING TO INFILTRATE OUR
AREA OF OPERATIONS.
c. Obtain information of immediate value to the intelligence.
d. Obtain information that normally will not be available to the
intelligence units.
2. The CI interrogation operations are carried out to obtain the
maximum amount of information about the enemy's intelligence operations in the
least possible time.
B. Determine the types of scrutiny operations necessary to satisfy
search requirements and CI operations.
196
LN324-91
EXAMPLE #1
VARIED CATEGORIES OF PERSONS THAT ARE OF INTEREST TO CI
1. REFUGEES AND DISPLACED PERSONS
2. BORDER CROSSERS
3. ENEMY UNITS DESERTERS
4. CIVILIAN PRISONERS AND WAR PRISONERS
5. CONCENTRATION CAMP CAPTIVES
6. RESISTANCE ORGANIZATIONS MEMBERS WHO ARE INTERESTED IN JOINING OUR
LINES
7. ENEMY COLLABORATORS
8. CI TARGETS, SUCH AS THOSE APPEARING IN BLACK, GREY AND WHITE LISTS
9. VOLUNTARY INFORMANTS
10. PERSONS WHO HAVE TO BE INTERVIEWED BECAUSE THEY ARE UNDER
CONSIDERATION FOR EMPLOYMENT WITH THE DEFENSE FORCES OR WITH THE CIVILIAN
AFFAIRS OFFICE.
197
LN324-91
1. You must establish operations with a central scrutiny focus
normally in the area of collection of war prisoners. This central scrutiny
point:
a. Has as purpose to receive, segregate, investigate and classify war
prisoners, border crossers, refugees, etc.
b. Receive persons captured by combat troops, support and logistics
within the operations area.
2. Fixed checking points, are permanently occupied by combat troops
or military police with the support of interrogation agents or CI personnel,
in the entrance to towns, crossing of rivers, and in other similarly strategic
areas.
3. Mobile checking points, (in vehicle, or on foot) are used as a
mobile system for choosing persons of interest at random. This point must be
located in various places and should not be fixed in the same place for longer
than a day.
4. Wall in and search operations are used to segregate the town, area
or valley, investigate the inhabitants and search residences and public areas.
D. Determine the personnel requirements: The normal investigation
equipment are Military Police, combat troops, civilian affairs personnel,
interrogation agents and CI agents.
E. Determine the specific method of identifying persons of interest
to CI:
1. Carry out initials interrogations of chosen civilian and military
personnel.
2. Use the black, grey and white lists.
3. Use an informant/source who is infiltrated in prison cells or
detention centers/war prisoners.
4. Place recording or sound equipment in the detention areas of
refuges or war prisoners.
5. Distribute a list of CI indicators of interest among the military
police, interrogation agents, civilian affairs personnel and any other
personnel involved in investigations. (SEE EXAMPLE #2).
198
LN324-91
EXAMPLE #2
CI INDICATORS OF INTEREST
1. PERSONS IN MILITARY AGE
2. PERSONS WHO TRAVEL ALONE OR AS A COUPLE
3. PERSONS WITHOUT PERSONAL IDENTIFICATION
4. PERSONS WITH STRANGE DOCUMENTS
5. PERSONS WHO HAVE GREAT AMOUNTS OF MONEY, JEWELS IN THEIR POSSESSION.
6. PERSONS WHO SHOW UNUSUAL ACTIONS
7. PERSONS WHO TRY TO AVOID DETENTION OR INTERROGATION
8. PERSONS WHO USE ENEMY'S METHODS OF OPERATION
9. PERSONS KNOWN AS ENEMY SYMPATHIZERS
10. PERSONS WITH A SUSPICIOUS HISTORY BACKGROUND
11. PERSONS WITH RELATIVES IN THE ENEMY'S AREA
12. PERSONS WHO HAVE TECHNICAL SKILLS OR SPECIAL KNOWLEDGE
13. PERSONS WHO HAVE COLLABORATED
14. PERSONS WHO DISOBEY THE LAWS IN THE ENEMYS AREA
199
LN324-91
E. Examine the files of the data base from the infrastructure of the
enemy's intelligence so as to become familiar with:
1. Operation methods
2. Procedures/rules
3. Objectives
4. Offices and sub-offices
5. Known agents
F. Study the areas under the enemy's control so as to become familiar
with:
1. The geography
2. Points/historical or tourist areas
3. Distances and road conditions
4. Political situation
5. Social and economic traditions
6. Traditions and customs
7. Racial problems
G. Analyze the operations area to determine:
1. Curfews
2. Movement restrictions
3. Rationing
4. Obligatory service for army
5. Labor civilian programs
6. Requisite to become a member in political organizations
7. Other restrictions that have been imposed by the population
200
LN324-91
8. Acquiring knowledge of all the restrictions that have been imposed
to the population could help you to:
a. Detect discrepancies
b. Recognize changes in enemy activities
c. Maintain control
H. We must study the situation and the files of the order of battle
to become familiar with:
1. Enemy units in the area of operations
2. Enemy units adjacent to area of operations
3. Dispositions
4. Capacities
5. Weaknesses/vulnerabilities
6. Composition
7. Training
8. Equipment
9. Activities or recent operations
10. History
11. Personalities and commanders
I. Analyze the intelligence priority requirements of the commander to
recognize, detect, explore and report the facts of the Order of Battle (OB).
NOTE: THE CI AGENT DOES NOT QUESTION THE SUSPECTS WITH THE PURPOSE OF
OBTAINING INFORMATION FROM OB; NEVERTHELESS, EACH CI AGENT MUST FAMILIARIZE
HIMSELF WITH THE COMMANDER'S RPI/RI TO RECOGNIZE PERSONS WHO POSSIBLY HAVE THE
OB INFORMATION.
J. Prepare a list of indicators to help the investigations personnel
in identifying the hostile infiltrators/enemies.
201
LN324-91
L. Coordinate WITH:
1. The commander in regards to the segregation of refugees and war
prisoners in your area of operation.
2. The military police for the control of evacuation of refugees and
war prisoners.
3. WITH the G5 for the support of civilian affairs and psychological
operations.
4. The civilian authorities if the control of the area has been
returned to them.
5. WITH the interrogation agents to:
a. Agree on the categories of persons that will be transferred to CI
control for further questioning.
b. Decide where to place the CI interrogation agents and the methods
use to transfer the detained from one place to another.
M. To carry out the initial investigation of the persons:
1. You must segregate the detained, if they are more than one,
according to the following manner:
a. Civilians from military men
b. Officers from troop soldiers
c. You must segregate them even more if necessary according to:
1. Nationality
2. Sex
3. Rank
4. Branch of military service
NOTE: YOU SHOULD SEGREGATE PERSONS IF THERE IS ENOUGH PERSONNEL AVAILABLE TO
CARRY OUT THIS OPERATION.
202
LN324-91
2. Determine the apparent level of knowledge of the person evaluating
the following:
a. His physical appearance.
b. All documents, arms and equipment held that was captured WITH the
person.
3. Select personnel of CI interest, comparing the person WITH the
indicators in Example #2 and the type of persons in Example #1.
N. Carry out the interrogations of specific persons
O. Make a disposition of the persons:
1. Exploit persons who have access and are settled in areas of
interest.
2. Transfer these persons to the central point of investigation to be
reintroduced to the flow/group of war prisoners and refugees.
P. Complete the required reports.
203
LN324-91
CHAPTER XXII
CI INTERROGATION OF SUSPECTS
INTRODUCTION:
The CI (espionage) agent in combat could only have a minimum amount of
information with which to conduct the work or have minimum knowledge of the
situation and the area. In spite of his conclusions been based in that minimum
amount of information, he must be impartial in the search for facts. As a CI
espionage agent you must have two things in mind in working as an
interrogator, the detection and prevention of a threat and the security of the
armed forces and the collection of information of interest for the departments
of intelligence.
GENERAL FACTS:
A. Carry out an exhaustive study of all the material available in the
case under investigation:
1. The interrogation is the art of questioning and examining a source
to obtain the maximum quantity of useful information. The goat of
interrogation is to obtain true and useful information in a legal manner and
in the minimum amount of time possible.
2. To do effective work and carry out a logical sequence of
questions, you must always have in mind all that you know to that moment about
the case under investigation.
a. Identify yourself to all persons involved in the incident,
including witnesses, victims, and investigations.
b. Identify the exact circumstances of the incident occurred.
c. Determine where each incident happened or activity.
d. Identify how it happened.
e. Identify why it happened.
2. Pay particular attention to all the details of the case,
especially those details that are not of public knowledge as yet.
204
LN324-91
d. Become familiar WITH the legal aspects and procedures that apply
to the case.
a. Identify the elements of the crime that could help you determine
the objectives of the interrogation.
b. Identify the ilegal or prohibited methods. Do not use force,
mental torture, threats, insults or exposition to cruel or inhuman treatment
of any sort.
NOTE: IN CASE THAT THERE IS DOUBT IN REGARDS TO THE LEGALITY OF A METHOD,
CONSULT WITH AN AUTHORITY IN A HIGHER ECHELON TO CLARIFY THE DOUBTS.
B. Identify possible suspects for interrogation:
1. Become familiar completely WITH the history of the suspects.
History data of particular interest during the interrogation include:
a. Age, place of birth, nationality and race.
b. Rank, or position in the community.
c. Level of education.
d. Present and past occupations.
e. Habits.
f. Associates (business partners)
g. Criminal history.
NOTE: IF IT IS POSSIBLE TO OBTAIN THIS INFORMATION BEFORE THE INTERROGATION,
OBTAIN IT FROM THE SUSPECT DURING THE INITIAL PHASE OF THE INTERROGATION.
3. Use the history of the suspect information to:
a. Develop the best method of questioning
b. Prove the truthful intention of the suspect
205
LN324-91
c. Impress the fact to the suspect that the detailed fact is the
investigation of the case.
3. Determine the available information, what type of attitude is
expected from the suspect.
a. Cooperative and friendly: Offers little resistance and he will
talk freely about almost any theme.
b. Neutral and non-sharing: Will cooperate up to a certain point.
Direct questions and to the grain of the matter will have to be used to obtain
the answers.
c. Hostile and antagonistic: Frequently, will refuse to talk and will
offer much resistance.
4. Classify the suspects according to the following:
a. Persons WITH previous offenses and whose guilt is almost certain
according to information already available.
b. Persons whose guilt is doubtful or uncertain due to the weak
evidence available or the lack of essential facts.
5. If possible, carry out a visual observation of the suspect before
the interrogation takes place to identify weaknesses that could be exploited
during the interrogation.
C. Prepare an interrogation plan:
1. Identify the objective of the interrogation:
All interrogation must have a defined purpose. This purpose must be kept
in mind during the entire preparation process and when the interrogation is
carried out. But, it must not be concentrated so much in the objective as to
allow another valuable information to be overlooked during the interrogation.
2. Identify the type of interrogation:
a. Direct interrogation: The suspect knows that he is been
interrogated. Nevertheless perhaps he does not know the true objective of the
interrogation. This method takes less time than the other one.
206
LN324-91
b. Indirect interrogation: Obtain information through deception. The
suspect does not have any idea that he is been interrogated. This method
requires a careful planning, extreme discretion, and must be applied WITH much
skill.
3. Identify and obtain the helpful things required for interrogation:
a. Files
b. Documents
c. Maps/charts
d. Pencil, notebooks, tape recorder, etc.
e. Any other equipment that could facilitate the process of
interrogation.
4. Identify the approximation methods that will be used during the
interrogation:
NOTE: SELECTING AN INITIAL APPROXIMATION IS NECESSARY, BUT YOU MUST KEEP THE
FLEXIBILITY OF MOVING FROM ONE APPROXIMATION METHOD TO ANOTHER.
5. APPROXIMATION METHODS:
a. DIRECT APPROXIMATION: Do not try to hide the purpose of the
interrogation. It works better when it is used WITH persons whose guilt is
almost certain and WITH those persons that have little knowledge of what
security is. It is a good method to interrogate persons of low level or rank
in organizations. This method takes little time and is simple. This method
offers the best opportunity to demonstrate empathy and understanding to the
suspect. Act as if the offense is something that the suspect will not commonly
do. Treat the suspect as a rational person who was only exposed to the
circumstances of the case.
207
LN324-91
b. FILE AND DOSSIER: Prepare a file that contains all the information
collected about the suspect. A careful arrangement of the information in the
file could give the appearance of having much more information than it really
has. Put additional papers, although they do not contain information to just
give the appearance of an enormous file. Mark the file WITH different
sections/areas of interest about the history of the suspect. Confront the
suspect WITH the file and warn him that it contains detailed information of
his background history and activities and that it is useless for him to refuse
to cooperate in the interrogation. The triumph of this method depends upon the
immaturity of the suspect, the amount of information available, and the skills
used by the interrogation agent to convince the suspect.
c. WE KNOW IT ALL: Make questions based upon information that is
already known to us. When the suspect refuses to answer, hesitates, or
provides incorrect information, you yourself provide the information or
correct answer. If it is used correctly, you may convince the suspect that we
know it all and that his answers are not of real importance. When the suspect
starts to answer truthfully, weave other questions, of which we do not have
the answers. Always verify the truthfulness of the suspect starting to make
the questions of which we know the information. This method could be used WITH
or without the files and dossier method.
d. FUTILITY/USELESSNESS: You must convince the suspect that resisting
to answer to the interrogation is useless. Present true information to the
suspect in a persuasive and logical manner to exploit the psychological and
moral weaknesses of the persons.
e. QUICK SHOT: Make a series of questions to the suspect in a way
that he will not have time to answer one before the next one is made. Since
the suspect does not have time to formulate his answers he will get confused
and could contradict himself. Confront him WITH the inconsistence of his
answers, so that perhaps he may reveal more information than he wishes. This
provides leads to further questions. Prepare all questions beforehand. Use a
competent experienced interrogator. Use this method immediately after his
arrest to take advantage of his state of confusion.
208
LN324-91
f. INCENTIVE: To reward the suspect's cooperation and the fact of
telling the truth, this is attained normally by providing him WITH some
physical commodity, (cigarettes, sweet, coffee, etc.) that normally is not
given to him. Do not make promises or commitments that are beyond your ability
to fulfill. Use caution to avoid that the suspect gives false information WITH
the intention of getting the article he wishes. Never deny the basic articles
of human needs. Do not use the threat of taking food so as to obtain his
cooperation.
g. REPETITION: Make a question, wait for the answer, and repeat the
question and the answer several times. This is done WITH all questions until
the suspect is totally bored and starts to give unexpected answers so as to
break the boredom. This method works better WITH a hostile person. Generally
it does not work WITH an introverted or timid person.
h. MATT AND JEFF: You must use two experienced interrogators that
could develop two different personalities towards the suspect. The first
interrogator acts very formal, little sympathetic, and at times rude, noisy
and aroused. The second interrogator appears when the suspect feels lost and
alone. The second scolds the first interrogator for his poor professional
conduct and orders that he leaves the interrogation room. The second
interrogator apologizes WITH the suspect and tries to calm him. He shows
empathy WITH the suspect and tries to establish some common ground between the
two, for example: both are intelligent and sensitive, while the first
interrogator was not. The idea is that the first interrogator could return to
the interrogation and help if the suspect stops to cooperate.
i. PRIDE: This method could be used in two ways. Attack the pride of
the suspect accusing him of being weak or insinuating his poor ability to do
anything. The suspect who is proud will hurry to defend his abilities.
Frequently this will explain why he did or did not do something just to defend
his honor. You may obtain important information from his answers. The other
way to use this method is to praise the suspect until you get him to admit
certain information as a way of reclaiming responsibility/credit. This brings
the suspect an opportunity to boast what the has done.
209
LN324-91
j. SILENCE METHOD: Do not say anything to the suspect, but look at
him fixedly in the eyes. Do not move your gaze, but make him break the eye
contact. As the suspect gets nervous, he will start to make questions, but do
not break the silence until you are prepared to do so. Keep this method for
some time and the suspect will get nervous. When breaking the silence you must
question the suspect WITH questions that indicate his guilt.
k. CHANGE IN SCENARIO: Take the suspect out of the interrogation room
environment. Take the suspect to a more peaceful but controlled area that
could give the opportunity to have a peaceful and nice conversation during
which you may pull the necessary information from the suspect.
1. ESTABLISH HIS IDENTITY: It is alleged that the suspect is not the
person he claims to be, but that he is a person who the police authorities are
searching for political assassinations and acts of terrorism and treason, or
any serious accusation. In his intent to establish his identity, the suspect
could give valuable information and leads for further investigations.
m. EMOTIONAL: Determine what emotion motivates the suspect (hate,
love, vengeance, desire to make money) and exploit that emotion. This method
is very effective when you use immature and timid persons.
5. Develop detailed questions to use during the interrogation:
a. Develop questions that guarantee that the area of interest is
exploited.
b. Develop questions that establish all facts (who, what, when,
where, why and how).
c. Develop control questions of which the answers are already known.
d. Develop non-pertinent questions if the true objective of the
interrogation is been hidden from the suspect. Use non-pertinent questions to
break the suspect's concentration.
210
LN324-91
e. Develop repeated questions making the same questions but in a
different way.
f. Develop direct questions that require a narrative answer.
g. Develop follow-up questions that allow the expansion of
themes/areas as they become necessary.
D. Select the interrogation personnel based in the selected
approximation, type of suspect, and the ability of the interrogation agents.
1. Select an interrogation agent that has personality characteristics
that are adequate and an interest in human nature. Personal qualities desired
in an interrogation agent are:
1) Motivation
2) Be alert
3) Patience and tact
4) Objectivity
5) Credibility
6) Adaptability
7) Perseverance
8) Linguistic skills
2. Select an interrogation group, if possible. It is necessary to
have a group to successfully use much of the approximation methods already
discussed. Additionally, an interrogation agent could notice that he cannot
obtain the necessary information after having used various approximations and
techniques, or is tired in the middle of a long interrogation. This could
cause the loss of control of the interrogation and another interrogation agent
must replace the first.
E. Guide the interrogation group in the approximation methods already
selected and the role that each one will play in the interrogation.
211
LN324-91
F. Make all the arrangements in regards to the suspect:
1. Coordinate the arrest of the suspect.
a. Make arrangements WITH the police to detain the suspect.
2. Make the arrangements to locate the suspect and give him board
after the arrest.
3. Coordinate the use of facilities to give food to the suspect.
4. Coordinate the services of an interpreter if necessary.
5. If the suspect is of the opposite sex coordinate the presence of a
witness of the same sex if necessary. It is also good to coordinate the
presence of a witness to observe how the information is obtained; and so as to
avoid that the suspect accuses us of using ilegal tactics such as torture,
coercion and mental abuse.
a. Obtain the authorization of the commander to use a witness
in the interrogation.
NOTE: IF THE SUSPECT IS OF THE OPPOSITE SEX, INFORM HIM OR HER OF HIS OR HER
RIGHT TO HAVE A WITNESS OF THE SAME SEX PRESENT DURING THE INTERROGATION. IF
THE SUSPECT DOES NOT WISH TO HAVE A WITNESS OF THE SAME SEX PRESENT, OBTAIN A
SIGNED SWORN DECLARATION, INDICATING THIS WISH. (ALTHOUGH THE SUSPECT REFUSES
TO USE A WITNESS, PLACE A WITNESS OF THE SAME SEX AT A DISTANCE THAT COULD
LISTEN TO WHAT GOES ON DURING THE INTERROGATION WITHOUT BEEN SEEN BY THE
SUSPECT.
G. Select and prepare the interrogation room:
1. Select a room that gives privacy during the interrogation.
Eliminate all distraction possible.
2. Select a room that allows you to control the physical environment.
212
LN324-91
3. Select a room that has a nice constant temperature.
4. Arrange the furniture in the interrogation room. The furniture
must be only a small table to write, but that does not give an area in which
the suspect could hide under, and three chairs.
5. Place all material necessary during the interrogation in the room.
Materials such as paper, pencil, reference manuals and other interrogation
aids.
NOTE: DO NOT HAVE A TELEPHONE OR ANY ARTICLE THAT COULD BE USED AS AN ARM IN
THE INTERROGATION ROOM.
H. Install and test the recording equipment. Use the recording
equipment so that you could keep your concentration during the interrogation.
Taking notes during the interrogation could break the rhythm of the
questioning and it could cause you to loose the sequence of the questions and
the concentration.
1. Install the recording equipment so that it is looks as if it is
part of the furniture of the office.
NOTE: TO USE THE RECORDING EQUIPMENT, FIRST CONSULT WITH THE SUSPECT AND GET
HIS PERMISSION.
2. Test the equipment to make sure that it is functioning correctly.
I. Receive and identify the suspect:
1. During the initial contact keep a professional posture and try to
gain the trust of the suspect.
2. Verify the identity of the suspect and examine his personal
documents.
J. Identify yourself and the other members of the interrogation
equipment. Use your official badge to make sure that the suspect knows your
identity as a member of the military intelligence.
K. Explain to the suspect that the nature of the accusation is
against his behalf.
213
LN324-91
[page missing]
b. Try to identify contradictions and weaknesses in the history of
the suspect.
5. Change interrogation agents if the first interrogation agent
cannot obtain true information or a confession after having used various
approximation techniques.
6. If all the approximations fail with the suspect, confront him with
crime witnesses if possible.
7. If necessary, make a final convincing appeal against the suspect's
continuous resistance.
a. Insist in appealing the existence of all evidence against
him.
b. Confront the suspect with the contradictions and weaknesses
in his history.
Q. If the suspect admits culpability, obtain a sworn declaration
signed by him.
R. CLOSING PHASE OF THE INTERROGATION:
1. Close the interrogation for any of the following reasons:
a. If the suspect is sick, wounded, or advanced age and needs medical
attention.
b. Various interrogations are necessary to obtain all the necessary
information.
c. The suspect is bored and denies to cooperate.
d. All the questions have been answered and the requirements of the
interrogation have been satisfied.
e. The initiative has been lost and you as interrogation agent decide
to close the interrogation.
2. When the interrogation is closed, always consider the
possibility of interrogating the suspect again.
a. Finish the interrogation in a nice manner.
214
LN324-91
b. Re-emphasize the approximations used to gain confidence from the
suspect.
c. Give opportunity to the suspect to add additional information to
the one already given.
3. Use the time dedicated to the Closing to try to obtain information
that may have not been discussed during the interrogation. A suspect could
relax a little more after knowing that the interrogation has been finished and
he could reveal additional information.
S. Disposing of the suspect:
1. Have the police put him under custody.
2. Give the suspect to pertinent civil authorities.
3. Give the suspect to the commander's custody.
T. PREPARE THE REQUIRED REPORTS
215
Chapter 23
[Back to SOAW Home
Page] [Send email to
SOAW] [SOA Manuals]