LN324-91

                              CHAPTER XIX

                         INVESTIGATION REPORT

INTRODUCTION:

     As CI espionage agent you must have the knowledge of how to prepare an
investigation report. An investigation report is an accumulation of agent's
reports in a concise summary of basic interrogations in which only the facts
are written down.

GENERAL FACTS:

NOTE: Example #1 is the format for the investigation report.

     A.    PREPARE THE REPORT'S HEADING:

     1.    Write down the date in which the report was prepared in the block
"DATE SUBMITTED" in the report.

     2.    Write down the "focus" information if it applies in this report.
This block is pertinent if the report deals with an investigation of history.
If this is not an investigation of history, leave this block blank.

     3.    Write down the category of the case in block "CASE
CLASSIFICATION". (Example: Espionage, Sabotage, Subversion, etc).

     B. If this is a Personal investigation of a SUBJECT (that is, in which
the SUBJECT is known) fill out blocks 1 to 10. If the SUBJECT is not know,
enter N/A (Not applicable) in these blocks.

     1.    Write down the name (last name in capital letters, first name, and
initial) of SUBJECT in block #1.

     2.    Write down the serial number, identity number, of the SUBJECT in
block #1.

     3.    Write down SUBJECT'S race in block #3.

     4.    Write down the rank, that is military or civilian, in block #4.

     5.    Write down the branch of the Armed Forces to which the SUBJECT
belongs, in block #5.

     6.    Write down the position that the SUBJECT occupies in block #6.

                                  186

LN324-91 7. Write down the date of SUBJECT'S date of birth in block #7. 8. Write down the SUBJECT'S place of birth in block #8. 9. Write down the unit or the employment address of SUBJECT in block #9. 10. Write down the SUBJECT'S residential address in block #10. C. If this is an INCIDENT case (Person or unknown persons), fill out blocks 11 to 15. If this is not an INCIDENT case, write down N/A in these blocks. 1. Write down the incident's title in block #11. 2. Write down the incident's date in block #12. 3. Write down incident's time in block #13. 4. Write down the place where the incident occurred in block #14. 5. Write down the register numbers or serial numbers of any equipment that was involved in the incident in block #15. D. Complete the Control Section: 1. Write down symbol/control number or the file number in block #16. 2. Write down the name of organizations that are involved in carrying out the investigation in block #17. 3. Write down the name of the control office in block #18. E. Complete "Investigation Facts" section: 1. Write down the name of the person or organization that requested the report in block #19. 2. Write down the reason for which the investigation is being carried out in block #20. 3. Write down the information about the date of investigation in block #21: a. Write the date in which the investigation started. 187
LN324-91 b. Write down the date in which the investigation ended (If it has not ended yet, write down N/A in this space). F. Write down the "Present Situation of the Case" in block #22: 1. CLOSED: An investigation is indicated as "CLOSED" when there is no need for further investigative activities for the authorities to make a decision upon the case. 2. FINISHED/ELIMINATED: An investigation is considered FINISHED when the investigation has stopped for any reason that is not the conclusion of the case. 3. SUSPENDED: An investigation is considered SUSPENDED when the information obtained is not complete and all the tangible leads have been exhausted, but there is a possibility yet that new information will spring up in the future. 4. PENDING: An investigation is considered PENDING when the investigation is continuous. (or that there are many facts and leads to be resolved and developed yet). F. Complete the "Synopsis" Section: NOTE: THE Synopsis IS A SUMMARY, CONCISE, IN PARAGRAPH FORMAT, WRITTEN IN A LOGICAL SEQUENCE OF INVESTIGATIVE ACTIONS, AND ANSWERING TO THE MOST COMPLETE MANNER TO "WHO", "WHAT", , "WHERE", "WHY", AND "HOW" OF THE INVESTIGATION. RECOMMENDATIONS, OPINIONS, OR CONCLUSIONS MUST NOT BE INCLUDED IN THIS REPORT. THESE COMMENTARIES MUST BE INCLUDED IN THE TRANSMISSION LETTER OF THE INVESTIGATION REPORT. 1. Margins: a. Start the report three (3) lines below de black border in the upper part of the Synopsis block. b. The black border in this report will serve as the left margin of the report. 2. Enumeration of Paragraphs: The paragraphs in the Synopsis Section of this report will not be enumerated. 188
LN324-91 3. Classification of paragraphs: Each paragraph of the Synopsis will have the Specific Classification of that paragraph at the beginning. This is done by writing the classification of each paragraph in quotes at the start of the paragraph. (Example: (C) THE STUDENTS WERE 4. Convincing documents to the report: a. All convincing documents (or additional documents) to the report will be named in parenthesis within the Synopsis paragraph that these support. For Example if Agent #1's report supports the first paragraph of the Synopsis, you will include something like this within the paragraph: (Agent #1's report). 5. Classification of the report: The report will be classified according to its content, and what is stipulated in the SOP. G. Continuation pages: If the report could not be finished in the first page, it is continued in another page in blank, using the normal margins according to the SOP. 1. In the upper part of the continuation page, write the Title (Theme), or the name of the SUBJECT in the lower part and the Date and number of the file in the right portion of the paper. EXAMPLE: BENITEZ, Wilfredo D. DATE: 1 May 1988 FILE NUMBER: 50-88-0-1 H. Complete the "Distribution" Section in block #24. The distribution of the report will be made according to its SOP. I. Complete the "Reviewed by" section in block #25. The typewritten name and signature of the authority that reviewed the report is written down in this section. 189
LN324-91 INVESTIGATION REPORT DATE SUBMITTED _________________________________________________________________FOCUS (HISTORY) CASE CLASSIFICATION _____RAL _____RAG _____IAE _____IAI _________________________________________________________ IDENTIFICATION DATA 1.LAST NAME FATH. MOTH. NAM., INIT. 2.I.D. 3.RACE 4.RANK 5.BRANCH _________________________________________________________6 .POSITION7. DATE OF BIRTH 8. PLACE OF BIRTH _________________________________________________________ 9. UNIT OR EMPLOYMENT ADDRESS 10. RESIDENTIAL ADDRESS _________________________________________________________ 11. INCIDENT'S TITLE 12. INCIDENT'S DATE 13. INCIDENT'S TIME _________________________________________________________14.LOCAL (BUILD. UNIT) 15. EQUIPMENT, ETC. SERIAL NUN. _________________________________________________________ CONTROL DATA 16. CONTROL SYMBOL OR FILE NUMBER __________________________________________________________________17. INVESTIGATION DONE BY (ORG.) 18. CONTROL OFFICE INVESTIGATION DATA 19. INVESTIGATION REQUEST BY20. REASONS FOR INVESTIGATION ________________________________________ 21. INVESTIGATION DATE START COMPLETION ________________________________________ ________________________________________ 22. PRESENT CASE SITUATION _____CLOSED _____FINISHED ______SUSPENDED ______PENDING _______________________________________________________ 23. SYNOPSIS 24. DISTRIBUTION 190
LN324-91 25. REVIEWED BY NAME AND TITLE SIGNATURE CHAPTER XX PREPARATION OF SUMMARY REPORTS INTRODUCTION: A summary report (SR) is the vehicle used to summarize certain aspects of an investigation, or give emphasis to key points of actions in an investigation. This report is not as detailed and is not designed to replace the Agent's Report. It is as the title implies, a summary. The (SR) must contain certain favorable or derogatory (unfavorable) concise information declarations, if it applies, this way the perspective of the case or investigation will not be altered. GENERAL FACTS: A. Preparing the heading. 1. Write down the preparation date in the "Date" section. 2. Write down the identity of the "Preparing Office". 3. Write down the SUBJECT'S information using the same rules in the Agent's Report. a. Father and mother's last name in capital letters, name, initial. b. Identification number. c. Date and place of birth (FDLN). EXAMPLE: PEREZ-RIVERA, Juan A. I.D. NUMBER: 111-11-1101 PDOB: 1 January 1947, San Miguelito, ES 191
LN324-91 B. Write down the information to be reported in the "Summary Report" section. The text starts in the third line of the black line in the upper part of the block titled "Summary Report", leaving two lines in the upper part. The line or black border to the left of the document is used as a margin for all items. 1. Write down the numbers in sequence. For example: 1. 2. 3. 2. Write down the classification contained in each paragraph. For example: 1. (C) 2. (S) 3. (NC) 3. Write down the evaluation code (key word) of the information content of each paragraph using the evaluation system shown in the SR. The evaluation code must be written down in the last line of the paragraph in the right edge (Figure 1). NOTE: If there is not enough space to write down the evaluation code in the last line of the paragraph, the evaluation code will be written down in a line below the last line of the paragraph and in the extreme right of the document. Example:________________________________________________________________ _____________________________________________ ________________________________________________________________________ ______he left in a Toyota with Cuban license plates. (F-6) 192
LN324-91 C. Information Sources. Information sources normally are not revealed in the SR. If the report is kept within military intelligence, the source could be identified if the identification is necessary to establish the truth of the information. When the source is not identified, for security purpose, an indication of the access to the information could be included while the information about the source is not as explicit that it identifies the source. When the SR does not reveal the source's identity the copy of the office files should write down the source(s) identity. A code number must be used when the source's identity requires protection. Bibliographies of the sources could be added in the files when using more than one source for the same report. D. Information from other government agencies. Information obtained form other government agencies, except from the Armed Forces, will not be included in the SR. If other agencies outside the Armed Forces solicit the information obtained in the SR, the originator or the source must give permission for the information to be divulged. If the SR contains information that has been authorized to be divulged to other agencies, this information will be written in capital letters and underlined. Example: THE SOURCE WHO IS CONSIDERED TRUSTWORTHY INFORMED THE __________________________________ ___________(Figure 1, Paragraph 4). When this type of information appears in the SR, the following declaration must be included and must appear as a non-numbered paragraph and at the end, written in capital letters. (Figure 1, Paragraph 4). Example: INFORMATION FROM OTHER SOURCES OUTSIDE THE SOURCES FROM THE ARMED SOURCES ARE INCLUDED IN THIS SR. THIS INFORMATION WILL NOT BE DIVULGED TO ANY OTHER AGENCY OUTSIDE THE ARMED FORCES. E. Additional space. If you need additional space, two lines in the lower part of the document will be left blank and the text will continue in blank paper with normal margins. In the upper part of the white paper, the SUBJECT'S block will be placed at left with the date and reference files. 193
LN324-91 Example: 1 August 86 PEREZ-RIVERA, Juan A. I.D. NUMBER: 111-11-1101 PDOB: 1 January 1947, San Miguelito, ES he came into the restaurant and sat down at the corner table where was accompanied_____________________________________________ F. SR distribution. The last item of the SR is the distribution. The distribution will be indicated according to the SOP. (Example in figure 1). G. Closing the SR. The SR is not signed. The file copy will have the person s name who prepared the SR typewritten in the upper part at the document's right corner. H. The SR will be classified according to its content. 194
LN324-91 ____________________________________________________________ SUMMARY REPORT DATE ____________________________________________________________ PREPARING OFFICE ____________________________________________________________ SUBJECT SOURCE'S EVALUATION CODE ABOUT THE INFORMATION COMPLETELY TRUSTWORTHYA CONFIRMED BY OTHER NORMALLY TRUSTWORTHY B SOURCES 1 COMFORTABLY TRUSTWORTHY C PROBABLE TRUTH 2 NORMALLY NON-TRUSTWORTHY D POSSIBLE TRUTH 3 NON-TRUSTWORTHY E DOUBTFUL TRUTH 4 TRUST NOT KNOWN F IMPROBABLE 5 TRUTH CANNOT BE JUDGED 6 ___________________________________________________________SUMMARY REPORT ___________________________________________________________________ DISTRIBUTION ___________________________________________________________________ 195
LN324-91 CHAPTER XXI SCRUTINY OF CI INFORMATION INTRODUCTION: The scrutiny process and CI interrogation allows us to identify and explore the persons/targets of interest to CI. This process allows us to detect these persons or targets, it helps us in the imposition of the same in an effective manner. GENERAL FACTS: A. DETERMINE THE PURPOSE OF THE SCRUTINY AND CI INTERROGATION: 1. The CI scrutiny operations, submit, in a systematic way, the civilians in the combat area to a series of questioning/interviews/interrogations with the purpose of: a. Find and segregate suspicious persons. b. Identify persons of interest to the CI. (See Example #1). NOTE: THE CI SCRUTINY OPERATIONS ARE CARRIED OUT TO INTERCEPT ENEMY INTELLIGENCE AGENTS, SABOTAGE AGAINST, INSURRECTION TRYING TO INFILTRATE OUR AREA OF OPERATIONS. c. Obtain information of immediate value to the intelligence. d. Obtain information that normally will not be available to the intelligence units. 2. The CI interrogation operations are carried out to obtain the maximum amount of information about the enemy's intelligence operations in the least possible time. B. Determine the types of scrutiny operations necessary to satisfy search requirements and CI operations. 196
LN324-91 EXAMPLE #1 VARIED CATEGORIES OF PERSONS THAT ARE OF INTEREST TO CI 1. REFUGEES AND DISPLACED PERSONS 2. BORDER CROSSERS 3. ENEMY UNITS DESERTERS 4. CIVILIAN PRISONERS AND WAR PRISONERS 5. CONCENTRATION CAMP CAPTIVES 6. RESISTANCE ORGANIZATIONS MEMBERS WHO ARE INTERESTED IN JOINING OUR LINES 7. ENEMY COLLABORATORS 8. CI TARGETS, SUCH AS THOSE APPEARING IN BLACK, GREY AND WHITE LISTS 9. VOLUNTARY INFORMANTS 10. PERSONS WHO HAVE TO BE INTERVIEWED BECAUSE THEY ARE UNDER CONSIDERATION FOR EMPLOYMENT WITH THE DEFENSE FORCES OR WITH THE CIVILIAN AFFAIRS OFFICE. 197
LN324-91 1. You must establish operations with a central scrutiny focus normally in the area of collection of war prisoners. This central scrutiny point: a. Has as purpose to receive, segregate, investigate and classify war prisoners, border crossers, refugees, etc. b. Receive persons captured by combat troops, support and logistics within the operations area. 2. Fixed checking points, are permanently occupied by combat troops or military police with the support of interrogation agents or CI personnel, in the entrance to towns, crossing of rivers, and in other similarly strategic areas. 3. Mobile checking points, (in vehicle, or on foot) are used as a mobile system for choosing persons of interest at random. This point must be located in various places and should not be fixed in the same place for longer than a day. 4. Wall in and search operations are used to segregate the town, area or valley, investigate the inhabitants and search residences and public areas. D. Determine the personnel requirements: The normal investigation equipment are Military Police, combat troops, civilian affairs personnel, interrogation agents and CI agents. E. Determine the specific method of identifying persons of interest to CI: 1. Carry out initials interrogations of chosen civilian and military personnel. 2. Use the black, grey and white lists. 3. Use an informant/source who is infiltrated in prison cells or detention centers/war prisoners. 4. Place recording or sound equipment in the detention areas of refuges or war prisoners. 5. Distribute a list of CI indicators of interest among the military police, interrogation agents, civilian affairs personnel and any other personnel involved in investigations. (SEE EXAMPLE #2). 198
LN324-91 EXAMPLE #2 CI INDICATORS OF INTEREST 1. PERSONS IN MILITARY AGE 2. PERSONS WHO TRAVEL ALONE OR AS A COUPLE 3. PERSONS WITHOUT PERSONAL IDENTIFICATION 4. PERSONS WITH STRANGE DOCUMENTS 5. PERSONS WHO HAVE GREAT AMOUNTS OF MONEY, JEWELS IN THEIR POSSESSION. 6. PERSONS WHO SHOW UNUSUAL ACTIONS 7. PERSONS WHO TRY TO AVOID DETENTION OR INTERROGATION 8. PERSONS WHO USE ENEMY'S METHODS OF OPERATION 9. PERSONS KNOWN AS ENEMY SYMPATHIZERS 10. PERSONS WITH A SUSPICIOUS HISTORY BACKGROUND 11. PERSONS WITH RELATIVES IN THE ENEMY'S AREA 12. PERSONS WHO HAVE TECHNICAL SKILLS OR SPECIAL KNOWLEDGE 13. PERSONS WHO HAVE COLLABORATED 14. PERSONS WHO DISOBEY THE LAWS IN THE ENEMYS AREA 199
LN324-91 E. Examine the files of the data base from the infrastructure of the enemy's intelligence so as to become familiar with: 1. Operation methods 2. Procedures/rules 3. Objectives 4. Offices and sub-offices 5. Known agents F. Study the areas under the enemy's control so as to become familiar with: 1. The geography 2. Points/historical or tourist areas 3. Distances and road conditions 4. Political situation 5. Social and economic traditions 6. Traditions and customs 7. Racial problems G. Analyze the operations area to determine: 1. Curfews 2. Movement restrictions 3. Rationing 4. Obligatory service for army 5. Labor civilian programs 6. Requisite to become a member in political organizations 7. Other restrictions that have been imposed by the population 200
LN324-91 8. Acquiring knowledge of all the restrictions that have been imposed to the population could help you to: a. Detect discrepancies b. Recognize changes in enemy activities c. Maintain control H. We must study the situation and the files of the order of battle to become familiar with: 1. Enemy units in the area of operations 2. Enemy units adjacent to area of operations 3. Dispositions 4. Capacities 5. Weaknesses/vulnerabilities 6. Composition 7. Training 8. Equipment 9. Activities or recent operations 10. History 11. Personalities and commanders I. Analyze the intelligence priority requirements of the commander to recognize, detect, explore and report the facts of the Order of Battle (OB). NOTE: THE CI AGENT DOES NOT QUESTION THE SUSPECTS WITH THE PURPOSE OF OBTAINING INFORMATION FROM OB; NEVERTHELESS, EACH CI AGENT MUST FAMILIARIZE HIMSELF WITH THE COMMANDER'S RPI/RI TO RECOGNIZE PERSONS WHO POSSIBLY HAVE THE OB INFORMATION. J. Prepare a list of indicators to help the investigations personnel in identifying the hostile infiltrators/enemies. 201
LN324-91 L. Coordinate WITH: 1. The commander in regards to the segregation of refugees and war prisoners in your area of operation. 2. The military police for the control of evacuation of refugees and war prisoners. 3. WITH the G5 for the support of civilian affairs and psychological operations. 4. The civilian authorities if the control of the area has been returned to them. 5. WITH the interrogation agents to: a. Agree on the categories of persons that will be transferred to CI control for further questioning. b. Decide where to place the CI interrogation agents and the methods use to transfer the detained from one place to another. M. To carry out the initial investigation of the persons: 1. You must segregate the detained, if they are more than one, according to the following manner: a. Civilians from military men b. Officers from troop soldiers c. You must segregate them even more if necessary according to: 1. Nationality 2. Sex 3. Rank 4. Branch of military service NOTE: YOU SHOULD SEGREGATE PERSONS IF THERE IS ENOUGH PERSONNEL AVAILABLE TO CARRY OUT THIS OPERATION. 202
LN324-91 2. Determine the apparent level of knowledge of the person evaluating the following: a. His physical appearance. b. All documents, arms and equipment held that was captured WITH the person. 3. Select personnel of CI interest, comparing the person WITH the indicators in Example #2 and the type of persons in Example #1. N. Carry out the interrogations of specific persons O. Make a disposition of the persons: 1. Exploit persons who have access and are settled in areas of interest. 2. Transfer these persons to the central point of investigation to be reintroduced to the flow/group of war prisoners and refugees. P. Complete the required reports. 203
LN324-91 CHAPTER XXII CI INTERROGATION OF SUSPECTS INTRODUCTION: The CI (espionage) agent in combat could only have a minimum amount of information with which to conduct the work or have minimum knowledge of the situation and the area. In spite of his conclusions been based in that minimum amount of information, he must be impartial in the search for facts. As a CI espionage agent you must have two things in mind in working as an interrogator, the detection and prevention of a threat and the security of the armed forces and the collection of information of interest for the departments of intelligence. GENERAL FACTS: A. Carry out an exhaustive study of all the material available in the case under investigation: 1. The interrogation is the art of questioning and examining a source to obtain the maximum quantity of useful information. The goat of interrogation is to obtain true and useful information in a legal manner and in the minimum amount of time possible. 2. To do effective work and carry out a logical sequence of questions, you must always have in mind all that you know to that moment about the case under investigation. a. Identify yourself to all persons involved in the incident, including witnesses, victims, and investigations. b. Identify the exact circumstances of the incident occurred. c. Determine where each incident happened or activity. d. Identify how it happened. e. Identify why it happened. 2. Pay particular attention to all the details of the case, especially those details that are not of public knowledge as yet. 204
LN324-91 d. Become familiar WITH the legal aspects and procedures that apply to the case. a. Identify the elements of the crime that could help you determine the objectives of the interrogation. b. Identify the ilegal or prohibited methods. Do not use force, mental torture, threats, insults or exposition to cruel or inhuman treatment of any sort. NOTE: IN CASE THAT THERE IS DOUBT IN REGARDS TO THE LEGALITY OF A METHOD, CONSULT WITH AN AUTHORITY IN A HIGHER ECHELON TO CLARIFY THE DOUBTS. B. Identify possible suspects for interrogation: 1. Become familiar completely WITH the history of the suspects. History data of particular interest during the interrogation include: a. Age, place of birth, nationality and race. b. Rank, or position in the community. c. Level of education. d. Present and past occupations. e. Habits. f. Associates (business partners) g. Criminal history. NOTE: IF IT IS POSSIBLE TO OBTAIN THIS INFORMATION BEFORE THE INTERROGATION, OBTAIN IT FROM THE SUSPECT DURING THE INITIAL PHASE OF THE INTERROGATION. 3. Use the history of the suspect information to: a. Develop the best method of questioning b. Prove the truthful intention of the suspect 205
LN324-91 c. Impress the fact to the suspect that the detailed fact is the investigation of the case. 3. Determine the available information, what type of attitude is expected from the suspect. a. Cooperative and friendly: Offers little resistance and he will talk freely about almost any theme. b. Neutral and non-sharing: Will cooperate up to a certain point. Direct questions and to the grain of the matter will have to be used to obtain the answers. c. Hostile and antagonistic: Frequently, will refuse to talk and will offer much resistance. 4. Classify the suspects according to the following: a. Persons WITH previous offenses and whose guilt is almost certain according to information already available. b. Persons whose guilt is doubtful or uncertain due to the weak evidence available or the lack of essential facts. 5. If possible, carry out a visual observation of the suspect before the interrogation takes place to identify weaknesses that could be exploited during the interrogation. C. Prepare an interrogation plan: 1. Identify the objective of the interrogation: All interrogation must have a defined purpose. This purpose must be kept in mind during the entire preparation process and when the interrogation is carried out. But, it must not be concentrated so much in the objective as to allow another valuable information to be overlooked during the interrogation. 2. Identify the type of interrogation: a. Direct interrogation: The suspect knows that he is been interrogated. Nevertheless perhaps he does not know the true objective of the interrogation. This method takes less time than the other one. 206
LN324-91 b. Indirect interrogation: Obtain information through deception. The suspect does not have any idea that he is been interrogated. This method requires a careful planning, extreme discretion, and must be applied WITH much skill. 3. Identify and obtain the helpful things required for interrogation: a. Files b. Documents c. Maps/charts d. Pencil, notebooks, tape recorder, etc. e. Any other equipment that could facilitate the process of interrogation. 4. Identify the approximation methods that will be used during the interrogation: NOTE: SELECTING AN INITIAL APPROXIMATION IS NECESSARY, BUT YOU MUST KEEP THE FLEXIBILITY OF MOVING FROM ONE APPROXIMATION METHOD TO ANOTHER. 5. APPROXIMATION METHODS: a. DIRECT APPROXIMATION: Do not try to hide the purpose of the interrogation. It works better when it is used WITH persons whose guilt is almost certain and WITH those persons that have little knowledge of what security is. It is a good method to interrogate persons of low level or rank in organizations. This method takes little time and is simple. This method offers the best opportunity to demonstrate empathy and understanding to the suspect. Act as if the offense is something that the suspect will not commonly do. Treat the suspect as a rational person who was only exposed to the circumstances of the case. 207
LN324-91 b. FILE AND DOSSIER: Prepare a file that contains all the information collected about the suspect. A careful arrangement of the information in the file could give the appearance of having much more information than it really has. Put additional papers, although they do not contain information to just give the appearance of an enormous file. Mark the file WITH different sections/areas of interest about the history of the suspect. Confront the suspect WITH the file and warn him that it contains detailed information of his background history and activities and that it is useless for him to refuse to cooperate in the interrogation. The triumph of this method depends upon the immaturity of the suspect, the amount of information available, and the skills used by the interrogation agent to convince the suspect. c. WE KNOW IT ALL: Make questions based upon information that is already known to us. When the suspect refuses to answer, hesitates, or provides incorrect information, you yourself provide the information or correct answer. If it is used correctly, you may convince the suspect that we know it all and that his answers are not of real importance. When the suspect starts to answer truthfully, weave other questions, of which we do not have the answers. Always verify the truthfulness of the suspect starting to make the questions of which we know the information. This method could be used WITH or without the files and dossier method. d. FUTILITY/USELESSNESS: You must convince the suspect that resisting to answer to the interrogation is useless. Present true information to the suspect in a persuasive and logical manner to exploit the psychological and moral weaknesses of the persons. e. QUICK SHOT: Make a series of questions to the suspect in a way that he will not have time to answer one before the next one is made. Since the suspect does not have time to formulate his answers he will get confused and could contradict himself. Confront him WITH the inconsistence of his answers, so that perhaps he may reveal more information than he wishes. This provides leads to further questions. Prepare all questions beforehand. Use a competent experienced interrogator. Use this method immediately after his arrest to take advantage of his state of confusion. 208
LN324-91 f. INCENTIVE: To reward the suspect's cooperation and the fact of telling the truth, this is attained normally by providing him WITH some physical commodity, (cigarettes, sweet, coffee, etc.) that normally is not given to him. Do not make promises or commitments that are beyond your ability to fulfill. Use caution to avoid that the suspect gives false information WITH the intention of getting the article he wishes. Never deny the basic articles of human needs. Do not use the threat of taking food so as to obtain his cooperation. g. REPETITION: Make a question, wait for the answer, and repeat the question and the answer several times. This is done WITH all questions until the suspect is totally bored and starts to give unexpected answers so as to break the boredom. This method works better WITH a hostile person. Generally it does not work WITH an introverted or timid person. h. MATT AND JEFF: You must use two experienced interrogators that could develop two different personalities towards the suspect. The first interrogator acts very formal, little sympathetic, and at times rude, noisy and aroused. The second interrogator appears when the suspect feels lost and alone. The second scolds the first interrogator for his poor professional conduct and orders that he leaves the interrogation room. The second interrogator apologizes WITH the suspect and tries to calm him. He shows empathy WITH the suspect and tries to establish some common ground between the two, for example: both are intelligent and sensitive, while the first interrogator was not. The idea is that the first interrogator could return to the interrogation and help if the suspect stops to cooperate. i. PRIDE: This method could be used in two ways. Attack the pride of the suspect accusing him of being weak or insinuating his poor ability to do anything. The suspect who is proud will hurry to defend his abilities. Frequently this will explain why he did or did not do something just to defend his honor. You may obtain important information from his answers. The other way to use this method is to praise the suspect until you get him to admit certain information as a way of reclaiming responsibility/credit. This brings the suspect an opportunity to boast what the has done. 209
LN324-91 j. SILENCE METHOD: Do not say anything to the suspect, but look at him fixedly in the eyes. Do not move your gaze, but make him break the eye contact. As the suspect gets nervous, he will start to make questions, but do not break the silence until you are prepared to do so. Keep this method for some time and the suspect will get nervous. When breaking the silence you must question the suspect WITH questions that indicate his guilt. k. CHANGE IN SCENARIO: Take the suspect out of the interrogation room environment. Take the suspect to a more peaceful but controlled area that could give the opportunity to have a peaceful and nice conversation during which you may pull the necessary information from the suspect. 1. ESTABLISH HIS IDENTITY: It is alleged that the suspect is not the person he claims to be, but that he is a person who the police authorities are searching for political assassinations and acts of terrorism and treason, or any serious accusation. In his intent to establish his identity, the suspect could give valuable information and leads for further investigations. m. EMOTIONAL: Determine what emotion motivates the suspect (hate, love, vengeance, desire to make money) and exploit that emotion. This method is very effective when you use immature and timid persons. 5. Develop detailed questions to use during the interrogation: a. Develop questions that guarantee that the area of interest is exploited. b. Develop questions that establish all facts (who, what, when, where, why and how). c. Develop control questions of which the answers are already known. d. Develop non-pertinent questions if the true objective of the interrogation is been hidden from the suspect. Use non-pertinent questions to break the suspect's concentration. 210
LN324-91 e. Develop repeated questions making the same questions but in a different way. f. Develop direct questions that require a narrative answer. g. Develop follow-up questions that allow the expansion of themes/areas as they become necessary. D. Select the interrogation personnel based in the selected approximation, type of suspect, and the ability of the interrogation agents. 1. Select an interrogation agent that has personality characteristics that are adequate and an interest in human nature. Personal qualities desired in an interrogation agent are: 1) Motivation 2) Be alert 3) Patience and tact 4) Objectivity 5) Credibility 6) Adaptability 7) Perseverance 8) Linguistic skills 2. Select an interrogation group, if possible. It is necessary to have a group to successfully use much of the approximation methods already discussed. Additionally, an interrogation agent could notice that he cannot obtain the necessary information after having used various approximations and techniques, or is tired in the middle of a long interrogation. This could cause the loss of control of the interrogation and another interrogation agent must replace the first. E. Guide the interrogation group in the approximation methods already selected and the role that each one will play in the interrogation. 211
LN324-91 F. Make all the arrangements in regards to the suspect: 1. Coordinate the arrest of the suspect. a. Make arrangements WITH the police to detain the suspect. 2. Make the arrangements to locate the suspect and give him board after the arrest. 3. Coordinate the use of facilities to give food to the suspect. 4. Coordinate the services of an interpreter if necessary. 5. If the suspect is of the opposite sex coordinate the presence of a witness of the same sex if necessary. It is also good to coordinate the presence of a witness to observe how the information is obtained; and so as to avoid that the suspect accuses us of using ilegal tactics such as torture, coercion and mental abuse. a. Obtain the authorization of the commander to use a witness in the interrogation. NOTE: IF THE SUSPECT IS OF THE OPPOSITE SEX, INFORM HIM OR HER OF HIS OR HER RIGHT TO HAVE A WITNESS OF THE SAME SEX PRESENT DURING THE INTERROGATION. IF THE SUSPECT DOES NOT WISH TO HAVE A WITNESS OF THE SAME SEX PRESENT, OBTAIN A SIGNED SWORN DECLARATION, INDICATING THIS WISH. (ALTHOUGH THE SUSPECT REFUSES TO USE A WITNESS, PLACE A WITNESS OF THE SAME SEX AT A DISTANCE THAT COULD LISTEN TO WHAT GOES ON DURING THE INTERROGATION WITHOUT BEEN SEEN BY THE SUSPECT. G. Select and prepare the interrogation room: 1. Select a room that gives privacy during the interrogation. Eliminate all distraction possible. 2. Select a room that allows you to control the physical environment. 212
LN324-91 3. Select a room that has a nice constant temperature. 4. Arrange the furniture in the interrogation room. The furniture must be only a small table to write, but that does not give an area in which the suspect could hide under, and three chairs. 5. Place all material necessary during the interrogation in the room. Materials such as paper, pencil, reference manuals and other interrogation aids. NOTE: DO NOT HAVE A TELEPHONE OR ANY ARTICLE THAT COULD BE USED AS AN ARM IN THE INTERROGATION ROOM. H. Install and test the recording equipment. Use the recording equipment so that you could keep your concentration during the interrogation. Taking notes during the interrogation could break the rhythm of the questioning and it could cause you to loose the sequence of the questions and the concentration. 1. Install the recording equipment so that it is looks as if it is part of the furniture of the office. NOTE: TO USE THE RECORDING EQUIPMENT, FIRST CONSULT WITH THE SUSPECT AND GET HIS PERMISSION. 2. Test the equipment to make sure that it is functioning correctly. I. Receive and identify the suspect: 1. During the initial contact keep a professional posture and try to gain the trust of the suspect. 2. Verify the identity of the suspect and examine his personal documents. J. Identify yourself and the other members of the interrogation equipment. Use your official badge to make sure that the suspect knows your identity as a member of the military intelligence. K. Explain to the suspect that the nature of the accusation is against his behalf. 213
LN324-91 [page missing] b. Try to identify contradictions and weaknesses in the history of the suspect. 5. Change interrogation agents if the first interrogation agent cannot obtain true information or a confession after having used various approximation techniques. 6. If all the approximations fail with the suspect, confront him with crime witnesses if possible. 7. If necessary, make a final convincing appeal against the suspect's continuous resistance. a. Insist in appealing the existence of all evidence against him. b. Confront the suspect with the contradictions and weaknesses in his history. Q. If the suspect admits culpability, obtain a sworn declaration signed by him. R. CLOSING PHASE OF THE INTERROGATION: 1. Close the interrogation for any of the following reasons: a. If the suspect is sick, wounded, or advanced age and needs medical attention. b. Various interrogations are necessary to obtain all the necessary information. c. The suspect is bored and denies to cooperate. d. All the questions have been answered and the requirements of the interrogation have been satisfied. e. The initiative has been lost and you as interrogation agent decide to close the interrogation. 2. When the interrogation is closed, always consider the possibility of interrogating the suspect again. a. Finish the interrogation in a nice manner. 214
LN324-91 b. Re-emphasize the approximations used to gain confidence from the suspect. c. Give opportunity to the suspect to add additional information to the one already given. 3. Use the time dedicated to the Closing to try to obtain information that may have not been discussed during the interrogation. A suspect could relax a little more after knowing that the interrogation has been finished and he could reveal additional information. S. Disposing of the suspect: 1. Have the police put him under custody. 2. Give the suspect to pertinent civil authorities. 3. Give the suspect to the commander's custody. T. PREPARE THE REQUIRED REPORTS 215

Chapter 23

[Back to SOAW Home Page]    [Send email to SOAW]    [SOA Manuals]