Sei sulla pagina 1di 30

FM 2-22.

3 (FM34-s2l
H U M A NI N T E L L I G E N C E
COLLECTOR OPERATIONS

HEADQUARTERS,
DEPARTMENT
OF THE ARMY

September2006

DISTRIBUTION : p p r o v e df o r p u b l i cr e l e a s e d; i s t r i b u t i oins u n l i m i t e d .
R E S T R I C T I O NA

N O T E :A l l p r e v i o u sv e r s i o n so f t h i s m a n u a la r e o b s o l e t eT. h i s d o c u m e n ti s i d e n t i c ailn c o n t e n t
t o t h e v e r s i o nd a t e d6 S e p t e m b e 2 r 0 0 6 .A l l p r e v i o u sv e r s i o n so f t h i s m a n u a ls h o u l db e
destroyedin accordancewith appropriateArmy policiesand regulations.

eovenruruerur
ESrBrT
z
!!

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 1 of 30


This publicationis availableat
ArrnyKnowledgeonline(,,'.,',\.'u,1..',-.'i1?"l.1'.!.
GeneralDennisJ. ReimerTrainingandDoctrine
':l:':,:.1t"i:,1:ii
D igital L i brary &t (':':, jl).
,i6tr-l:::;:
,,,71

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 2 of 30


F M2 - 2 2 . 3

Preface
'l'his
rnanual plovides doctrinal guidance, techniques, and proceclures governing the
e'ntployment of human intelligence (HLIMINT) collection and analytical assets in
strppolt of'the commander"s intelligence needs. It outlines-

. HLIN{IN'f opei'ations.
. The HIfNIINT collector's role within the intelligence operating system.
. 'fhe
i'oles and responsibilities of the HLIMINT collectors and the i'oles of those
pi'oviding the command, controi, and technical support of HLIMINT coliection
operations.
Tlris rnanual expands upon the inforrnation contained in FM 2-0. It
strpersedes FM 34-52 and rescinds ST 2-22.7. It is consistent with doctrine
in FM 3-0, FM 5-0, FM 6*0, and JP 2-0. In accordance with the Detainee
Treatment Act of 2005, the only interrogation approaches and techniques
that are authorized for use against any detainee, regardless of status or
characterization. Are those authorized and listed in this Field Manual.
Sorrre of'the approaches and techniques authorized and listed in this Field
Manual also require additional specified approval before irnplernentation.
'fhis
nrunual lvill be reviewed annually and may be amended ol updated frorn time to
t i n r e t o a c c o u r - t tf b r c h a n g e s i n d o c t l i n e , p o l i c y , o r l a w , a n d t o a d d r e s s l e s s o n s l e a r n e c l .

Tliis manual pi'ovicles the doctrinal guidance for HLIMINT collectors and
courmanclers anci staffs of the MI organizations i'esponsible for planning ancl
cxerctrting HIIMINT operations. This manual also serves as a reference fol pei'sonnel
cleveloping clocti'ine, tactics, techniques, and procedures (TTP), materiel and force
stnrcttrle; institutional and unit training; ancl standing operating procedures (SOPs),
lol HLINIINT operations at all anny echelons. In accordance with TRADOC
Iteguiation 25-i16, the docti'ine in this field manual is not policy (in and of itself), but
is "...:r bocly o{'thought on how Army foi'cesoperate....[t] provides an autholitatrve
gr.riclefol leaclers and soldiers, while allowing freedom to adapt to circumstances."

This manunl applies to the Active Army, the Ai'my National Guard/Army National
(iuzrrcl of' the Llnited States, and the Llnited States Army Reserve unless otherwrse
stated. This manual also applies to DOD civilian employees and contractors with
responsibility to engage in HIIMINT collection activities. It is also intended
fbr commanders and staffs of ioint and cornbined commands, and Service Component
Conrmands (SCC). Although this is Army doctrine, adaptations will have to be made
b)' other Vlilitary Depai'tments, based on each of their organizations and specific
rlocti'rne.

\ { a t c n a l i r - rt h i s m a n t r a l a p p l i e s t o t h e f u l l l a n g e o f r n i l i t a l y o p e l ' a t i o n s . P l i n c r p l e s
o t r t , l i n e . cal l s o a r e v a l i c l u n d e r c o n d i t i o n s i n v o l v i n g u s e o f e l e c t r o n i c w a i ' f a r e ( E W ) o r '
nucleai'. biological, ol chemical (NBC) weapons.
'f
hi.q nranlral is intencled for use by rnilitary, civilian, and civilian contractor
HLr\'lIN'l' collectors, as well as commanders, staff officers, and military intelligence
(\'11)personnel charged with the responsibility of the HTIMINT collection effort.

HII\"IINT opei'ations vary depending on the soul'ce of the information. It is essential


that all HLINIINT coilectoi's understand that, whereas operations and soulces may

Vi 6 September2006

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 3 of 30


F M2 - 2 2 . 3

difT'ei.,t5e 6andling ancl breatment of sources rnust be accomplishecl in accordance


rvitli arpplicable law ancl policy. Applicable law and poiicy include LIS law; the law of
n,ar.: i.elevant international law; r'elevant dilectives including DOD Directive 3115-09,
"DOD Intelligence Interrogations, Detainee Debriefings, and Tactical Questioning";
I)OD Dir,ective 2310.lE, "The Department of Defense Detainee Program"; DOD
instr.uctions; 2ncl rnilitaly execute orders including fragmentary ordei's (FRAGOs).

Inter.r'ogation, the HLIMINT subdiscipline i'esponsible for MI exploitation of enemy


specific information
1r"r..o.riul ancl their. clocuments to answer the supported
,.eq.,1re,1e1ts (SIRs), requires the HLIMINT collector to be fully familiar with both
t,he classificat,ion of the solrrce ancl applicable law. The principles and techniques of
HLI\,IINT collection are to be used within the constraints established by US law
inclr.rclingthe following:
'fhe
. Llnifbrrn Cocle of Military Justice (LICMJ).
. (rit,nevaConvention fbi the Arneholation of the Condition of' the Wountled ancl
Sicli ir-r.\r.mecl F-orces in the Fielcl (inclr,rding Cotnmon Article III), August 12,
1 9 1 9 : h e r e r n a f t e r r e f . e n ' e dt o a s G W S .
o Q6'11s1.a Convention Relative to the Ti'eatment of Pri.soners of War (incltrding
Conmon Article III), August 12. 1949; hereinafter referred to as GPW.
. Geneva Convention Relative to the Protection of Civilian Persons in Time of
War (incluciing Common Article III), August 12, 1949; hereinafter referled to as
GC
D e t a i n e . e T l e a t m e n t A c t o f 2 0 0 5 , P u b l i c L a w N o . 1 0 9 -1 6 3 , T i t l e X I V '
.
HLIN,{INT collectors rnust understand specific terms used to identify categories of
pc.r.solnel when refer.ring to the pi'inciples and techniques of inte|r'ogation.
I)etei.minatron of a cletainee's status may take a significant time and may not be
coprpletecl until well zrfter.the time of capture. Therefore, there will be no dif'ference
ir-rthe tr.eatment of a detainee of any status flom the motlent of capture until such a
rlctei.nination is rnacle. The following terms are presented here and in the glossary'
. Civilian Inter.net-.: A person detained or interned in the United States or in
occr.rpiedterritory fol security reasons, or for protection, or because he oI she has
colrmittecl an offense against the detaining power, and who is entitled to
"pi'otected person" status under the GC'
o Enerny Pi.isoner, of War' (BPW): A detained pelson, as definecl in Alticles 4 ancl
5 o f ' t 6 e G P W . I 1 p a r t i c u l a r , o n e w h o , w h i l e e n g a g e d i n c o m b a t u n d e r o r c l e i ' so f
6is or. her. gover,nment, is captuled by the armed forces of the enemy. As such,
h e ,o r . s h e ' i s e n t i t l e d t o t h e c o m b a t a n t ' s p r i v i l e g e o f i m m u n i t y f r o m t h e n r u n i c i p a l
lan,ot't5e captuiing state fbr warlihe acts that do not amount to breaches of the
l a r v o f ' a r . m e c lc o n { l i c t . F o l e x a m p l e , a n E P W m a y b e , b u t i s n o t l i m i t e c l t o , a n y
pelsonnel who have fallen
I ) e r . s o 1b e l o n g i n g t o o n e o f t h e f b l l o w i n g c a t e g o i ' i e s o f
i.to the powey of'the enemy; a mernber of the almed forces, organized militia o|
volunteer. cor.ps; a1person who accotnpanies the armed foi'ces, without actually
beir-rg a lrernber. thereof; a member of a merchant marine oi' civilian ailcraft
clew not qualifying for more favorable treattnent; or individuals who, on the
appi.oach of the enemy, spontaneously take up arms to resist invading forces'
. Othei. Dertainees. Persons in the custody of the US Armed Foi'ces who have not
beel classifiecl as an EPW (Article 4, GPW), retainecl pei'sonnel
( A r t r c l e 3 3 , G P W ) , a n c t C i v i l i a n I n t e r n e e ( A l t i c l e s 2 7 , 4 1 , - 1 8 ,a n d 7 8 , G C ) s h a l l
b e t r , e t r t e c la s E P W s u n t i i a l e g a l s t a t u s i s a s c e r t a i n e d b y c o m p e t e n t a u t h o r i t y ;
fot'exatnple, by Article 5 Tribunal.
. Retainecl Pei'sonnei: (See Articles 24 and 26, GWS')

vil
6 S e p t e m b e2r 0 0 6

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 4 of 30


F M 2- 22. 3

OfTiciril medical personnel of the armed forces exclusively engagecl in the


scai'cli fbi', oi' t,he collection. transport or tleatment of wounded or sicli, or rn
t h e 1 r i ' e v e n t i o no { ' d i s e a s e , a n d s t a f f e x c l u s i v e l y e n g a g e d i n t h e a d m i n i s t r a t i o n
o 1 'n r e r l i c a l u n i t s a n d f ' a c i l i t r e s .
('lrapluins attachecl to the armed fbi'ces.

Staff of National Red Cross Societies and that of other Volunteel Aid
Societies, cluly lecognized and authorized by theii' governments to assist
Nledical Service personnel of their own armed forces, provided they are
exclusively engaged in the search for', or the collection, transport or treatment
of lvouncled oi' sick, or in the prevention of disease, and provided that the
staff of such societies are subject to military laws and regulations.
. Protectecl Persons: Include civilians entitled to protection under the GC,
including those we retain in the course of a conflict, no rnattel what the i'eason.
. Enemy Conrbatant: In general, a person engaged in hostilities against tlie
Lhritecl States or its coalition pai'tners dui'ing an armed conflict. The term
"enemy conbatant" includes both "lawful enemy combatants" and "unlawful
enel]ly combatants." All captured or detained personnel, regardless of status,
shall be ti'eated humanely, and in accordance with the Detainee Treatment Act
of 2005 and DOD Directive 2310.1E, "Department of Defense Detainee
Progratn", and no person in the custody or under the control of DOD, regardiess
of nationality or physical location, shall be subiect to torture or cruel, inhuman,
oi' cleglatling treatment oi'punishment. in accordance with and as defined in LIS
law.
Lawful Eneml' Combatant: l,awfr-rl eneny combatants, who ale entitlecl t<-r
protections nnder the Geneva Conventions. include members of'the legular'
:rrmecl fbrces clf' a State Pai'ty to the conflict; militia, volunteei' corps. ancl
olganrzecl i'esistance movenlents belonging to a State Party to the conflict,.
u'hicli are uncler responsible command, wear a fixed distinctive sign
l'ercagni2r,bleat a distance, carry their arnrs openly, ancl abide by the laws ol
\var'; ancl members of regular armed forces who profess allegiance to a
govel'nment ol an authority not recognized by the detaining power'.

Unlawful Enerny Cornbatant: Unlawful enemy combatants ale persons not


entitled to combatant immunity, who engage in acts against the Uniterl
States ol its coalition partners in violation of the laws and cnstoms of wai'
cltrling an anued conflict. For the purposes of the war on ten'orism, the tei'nr
"unlaw{irl enerny combatant" is defined to include, but is not limited to. an
inclividual who is or was part of or supporting Taliban or al Qaeda forces, or'
nssociatecl fbrces that are engaged in hostilities against the United States or
its coalition partners.

Hearclcluartels, LI.S. Army Training and Doctrine Command (TRADOC) is the


ploponent fbi' this publication. The preparing agency is the US Arrny Intelligence
Centel and l-ort Huachuca, Fort Huachuca, AZ. Send written comments and
reconrnlenclations on DA tr'orm 2028 (Recommended Changes to Publications and
Blanli Folrns) directly to Commander, ATZS-CDI-D (FM 2-22.3), U.S. Army
Inte.lligence Center and Fort Huachuca,550 Cibeque Street, Fort Huachuca, AZ
8ir61;l-7017. Send comments and recommendations by e-mail to ATZS-FDT-
l ) ' r , ) h t t u . a t ' t n v . r t r i l .F o l l o w t h e D A F o r m 2 0 2 8 f o i ' r n a t o r s u b m i t a n e l e c t r o n i c D A F o r n r
2028.

U n l e s s o t h e l r v i s e s t a t , e c l ,n r a s c u l i n e n o u n s a n c l p r o n o l l n s d o n o L r ' e f e r e x c l u s i v e l y t o
nlerl. Lise of'the terms "he" ancl "hrm" in thrs manual should be reacl as i'efen'ing to
both ni:rles ancl fernales unless otherwise expresslv noted.

vill 6 September2006

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 5 of 30


FM 2-22 . 3

ChapterI

A p p r o a c hT e c h n i q u e sa n d T e r m i n a t i o nS t r a t e g i e s
8-1. Regai'dless of the type of operation, the initial impression that the
HUMINT collector makes on the source and the approach he takes to gain
the source's cooperation will have a lasting effect on the continuing
relationship and the degree of success in collecting information. The
a p p ro a c h u s e d wi l l vary based on the type of operati on; the operati onal
e n v i ro n m e n t; th e status of the source;the personal i ty,posi ti on, and i dentit y
o{' the sorrrce; and the personality and experience level of the HUMINT
collectorand the time available.
8-2. The MPs will not take any actions to set conditions for interrogations
(foi' example, "softening up" a detainee). Additionally, in accordancewith
DOD Directive 3115.09,military working dogs, contracted dogs, or any other'
dog in use by a government agency shall not be used as a part of an
interrogation approach nor to harass, intimidate, threaten, or coerce a
cletainee for interrogation purposes. Leadership throughout the chain of
comurand is responsible to ensure that HIIMINT operations are in
compliance with these governing regulations and guidelines, whethel the
H I| M IN T c o l l e c ti on i s to take pl ace as part of H C T operati ons or i n an
rn te l n m e n t fa c i l i ty.
S-i l . T h e o n l y a u t hoi ' i zecli ntei ' r' ogati onapproachesand techni quesare those
a trth o l i z e d b y a n d l i sted i n thi s manual , i n accordancew i th the D etai nee
'freattnent
Act of 2005. Two approaches, Mutt and Jeff and False F'lag,
require approvai by the first 0-6 in the interrogabor"schain of cornmand. The
lestrictecl interrogation technique "Separation" requires COCOM commander'
a p p ro v a i fo r u s e , and approval of each i nterrogati on pl an usi ng " separati o n"
by the filst General Officer'/FlagOfficer (GO/FO) in the chain of cornmand.
Coordination may also be required with the C/J/G2X, security, legal, or other
pet'sonnel. Regardless of the coordination efforts required, use of all
tt-'cittricluesat all locations must carefully cornply with this manual ancl
:rc l d i tro n ailn s tru cti onscontai nedi n the l atest D OD and C OC OM pol i ci es.

NO'I'E: The r,r'oi'd"sollrce"will be used in this chapter to mean any pelson who is
the obiective of the HIIMINT collector"sapproach, and is applicable in any
c:ollectionsituation unless otherwise noted in the text. This use of the term
"sourcc." is consistent with US Arrny Intellisence Center HUMINT collcctor
t,rair-ring.

APPROACH PHASE
8-4. Dtrring the approach phase, the HTIMINT collector establishes the
conclitions of' control and rapport to facilitate information collection. The
i tp p i ' o ttc hb e g i n s wi th i ni ti al contact betw een the source and the H U MIN T
collector. Extrerne cale is required since the successof' the collection ef1brt

6 S e p t e n r b e r2 0 0 6 8-1

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 6 of 30


F M 2- 22. 3

APPROACH TECHNIQUES
8-17. The appi'oaches listed are not guaranteed solutions for ever.y situation.
Sotne individual approaches that may be suitable for one operating
environment, such as when conducting HUMINT contact operations, may be
ineffective in another, such as interrogation. Some will be successful with
one sotlrce and ineffective with another. In any case, everything the
HLIMINT collector says and does must be in compliance with the applicable
larv ancl policy ttnder which the HUMINT collector is operating. Applicable
larv and policy inclucle LIS law; the law of war'; i'elevant inter.national law:
lelevant dii'ectives inchrding DOD Directive 3115.09, "DOD Intelligence
lntei'r'ogations. Detainee Debriefings, and Tactical Questioning"; DOD
Dilective 2310.1E, "The Depai'tment of'Defense Detainee Pr,ogram": DOD
instluctrons; and nrilitary execute orders including FRAGos.
'fhere
8-18. are 18 approach techniques that can be empioyecl on any
cletainee regarclless of status or characterrzatron, including EPWs.
Aclclitionally, there is one restricted interrogation technique called separation
(see Appendix M). Separation cannot be employed on EPWs. With the
exception of the direct approach, which may be effective by itself, appr.oach
techniques are ttsed in combination with other approaches and techniques.
Ti'ansitions from one apploach to another must be smooth, logical, and
convincing.

DIRECT APPROACH
8 -1 9 . (In te rro g a ti o n a n d Other MS O) A l most al l H U MIN T col l ecti onbegi ns
rvith the direct approach. The exception to this is during elicitation
opei'ations that by theii' very nature are indirect. In using the clirect
approach, the HUMINT collector asks direct questions (see Chapter g). The
initial questions may be administrative or nonpertinent but the HUMINT
collectoi' quickly begins asking pertinent questions. The HUMINT collector
will continue to use direct questions as long as the source is answering the
qtrestionsin a truthful manner. When the source refuses to answer.,avoicls
Itttstl'e|ing, ot' falsely answel's a pertinent question, the HUMINT collector
u'ill begir-ran iiltei'nate appi'oach strategy. The fact that the sour.ce is
tttrsweringquestions does not pleclr-rdethe HUMINT collector.fi,ornpr,oviding
arn incentive to i'eward the sottrce and continue his cooperation as long as
th a t i n c e n ti v e d o e s n o t sl ow dow n the col l ecti on.For exampl e, a H LIMIN T
collectol ntight off'erthe soui'cecoffeeor cigarettes to r.ewar.dhis cooper.ation.
See Chapter I for the use of Repeat and Control questions in cletecting
d e c e p ti o n .
8-20. Statistics from interi'ogation opelations in Worlcl War II show that the
clirect approach was effective g0 pei'cent of the time. In Vietnam and in
o p e i ' a ti o n sIJ R G E N T FU R Y (Grenada,1983),JU S T C A U S E (panama, 19g9),
a n rl D E SE R T S T O R M (K uw ai t and h.aq, 1gg1),the di r.ectappr.oachw as g5
Ilelcent eff'ective.The effectiveness of the direct approach in Operations
E N D U R IN G F R trE D o M (A fghani stan, 2001-2002)and IR A QI FR B trD oM
(Ii'aq, 2003) are still being studied; however',unofficial studies indicate that
in these operations, the direct approach has been dramaticaily Iess
sttccessful.The direct approach is frequently employed at lower. echelons
lvhen the tactical situation precludes selecting other techniques, and where

8-6 6 S e p t e m b e r2 0 0 6

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 7 of 30


FM 2-22. 3

the EPW's or detainee's mental state is one of confusion oi' extrerne shock.
However', the HIIMINT collector must remember that just because a sorn'ce
is answering a direct question does not mean he is being truthful.

INCENTIVE APPROACH
8-21. (Interrogation and Othel MSO) The incentive approach is trading
something that the source wants for information. The thing that you give up
may be a material reward, an emotional reward, or the removal of a real or'
perceived negative stimulus. Tire exchange of the incentive may be blatant or'
subtle. On one extreme, the exchange may be a formal cash payment for'
infbrrnation during some contact operations while on the other extreme it
may be as subtle as offering the source a cigarette. Even when the direct
approach is successful, the HUMINT collector may use incentives to enhance
rappolt and to reward the source for cooperation and truthfuiness. The
HUMINT collectol rnust be extremely careful in selecting the options offered
to a cletainee source. He cannot denv the detainee anvthine that he is
er-rtitled to b5r iaw.

8-22. The HIIMINT collector also should not off'er anything that is not in liis
powel to give. Altl-rough this might be expedient in the short term, in the long
i'trn it will eliminate soul'ce coopei'ation. When asked to provide sornet,hrng
bey'ond his authoi'ity, the HLIMINT collector can agree to help, clieck into, or'
otherwise suppolt the request without cornmittrng himself to its successf'ul
accornplishment. HLfMINT collectors must be cautions in the uscr of'
incentives for the following reasons:
. There is an inherent suspicion of the truthfulness of "bought"
infbi'rnation. Soulces lnay rnanufacture infoi'mation in orcler to receiver
ol maintain an incentive. Sources rnay also "hold bach" information in
the hopes of trading it at a later date for greater incentives. They rnay
also hold back infoi'mation if the incentive is not irnmediatelv available
or guaranteed.
. The incentive must be believable and attainable. The incentive rnust be
within the capability of the HUMINT collector"s assumed persona to
achieve. For exarnple, if the detainee was captui'ed after kiiling a LIS
soldier', an incentive of release would not be realistic or believable.
Likewise, if the interrogator is presenting himself as being a "harmless
clerk" at the detention center, it woulcl be unrealistic to expect a
cletainee to believe that a clerk could arrange to have the detainee's
girlfriend brought to visit hi.m. Such a visit might be possible, but the
intei'r'ogator'sassumed pelsona would not seemingly provide him with
the autl-rority to rnake it happen.
. Tl're HLIMINT collector must provide any promised incentive. A simpler
lrrornise of an incentive may be sufficient to obtain imnrecliate
coopei'ation. If, however'. the HLIMINT collectoi' does not fbllow
t,hrough on pi'oviding the incentive, he will lose ci'edibility and i'appolt,
rvith his sollrce. This may end the cooperation of'not only that source
but also possibly any potential source who has contact with that,
soul.ce.
. The HUMINT collector may not state or even imply that the basic
h u rn a n ri g h ts guaranteed by appl i cabl e nati onal and i nternati on al

6 S e p t e m b e r2 0 0 6 8-7

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 8 of 30


F M2 - 2 2 . 3

lurvs. i'r'gulations, and agreernents will be contingent on a cletarnerl


soul'ce'scoopelation. An incentive foi' coopelation is viable only if'the
HLIMINT collector has or is pelceived to have the authority to
r,vithhold the incentive if the source is not cooperative. A HLIMINT
collector cannot promise an EPW that he will be treated in accoi'dance
with the GPW if he cooperates. This statement implies that the BPW
will not be treated properly if he does not cooperate. Since the trPW
must be treated in accordance with the GPW whether he cooperates or'
not, the HUMINT collectoi'will rapidly lose credibility.

EMOTIONAL APPROACHES
8 - 2 3 . ( I n t e i ' r o g a t i o n a n d O t h e r M S O ) E m o t i o n a l a p p r o a c h e s a r e c e n t e i ' e c lo r r
how the soulce views himself and his interrelationships with others. Through
soulce obselvation and initial questi.oning, the HUMINT collecfor can often
identrfy dominant emotions that motivate the EPW/detainee. The motivating
ernotion may be greed, love, hate, l'evenge, or others. The emotion may be
clirected inwald (feelings of pride or helplessness) or outward (love of family).
The HLIMINT collector employs verbal and emotional ruses in applying
pressrlle to the source's dominant emotions. He then links the satisfaction of
these emotions to the soufce's cooperation. Often, the presentation of like
experrences and presenting the source with an opportunity to expi'ess his
erirotions is sufficient to i'esult in cooperation. However', sometimes t,he
source mtrst be plesented with a specific action or tangible rnanifestation of
support.

8-2.1.Althougli the ernotion is the liey factor', an emotional apploach is


r-rolmally' n'orthless without an attached incentive. The incentive rnust meet
t.he ci'itei'ia listed above fol the incentive approach to ensule that the
incentive is beliervable and attainable. For example, this techniqr"re can be
trsed on the EPWidetainee who has a great iove foi' his unit ancl fellow
soldiers. Simply having the source express this emotion is not enough. After'
the source expresses this emotion, the HUMINT collector can take advantage
of this by telling the EPW/detainee that by providing pertinent information.
he may shorten the war or battle in progress and save many of his contrades'
Iives. but his refusal to talk may cause their deaths. This gives the soui'ce the
albernatives of facing the status quo or expressing love of comrades through
cooperating with the HUMINT collector.

8-25. Religion is an especially difficult topic to use in any emotional


tupproach. An approach using religion may encourage the source to be fui'ther
motivated by love, remorse, futility, or even pride to coopei'ate with the
interlogator'. On the other hand, an approach using religion may also
enconrage the source to end any rapport and cooperation with the.
intelrogator. Although it is acceptable to use i'eligion in all interrogation
apploaches, even to express doubts about a religion, an interrogator is not
pemrittecl to denigrate a religion's symbols (for example, a Iioran, prayer rug,
icon, or religious statue) or violate a religion's tenets, except where
applopriate fbl health, saf'ety, and security I'easons. Supervisors should
cralefirllyconsiclel the experience level of tireir subordinates befole pennitting
l h e r r s eo f ' r ' e l i g i o ni n a n v r n t e n ' o g a t i o na p p r o a c h .

8-8 6 S e p t e m b e r2 0 0 6

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 9 of 30


FM 2-2 2. 3

8-26. Similarly, slrpervisors should question the appropriateness of


clemeaning any racial group, including the source's, to elicit an emotional
response during an interrogation approach.

8-27. One common danger to the use of ernotional approaches is the


deveiopment of an ernotionai attachment on the part of the HLfMINT
collectoi'. It is natural that a source will develop an emotional attachment to
the HLTMINT collector'. The HTIMINT collector will often foster this
att,achrnent. However', it is vital the HLIMINT collectoi. not develop a
c o i ' i ' e s p o l r c l i n ge t n o t i o n a l a t t a c h m e n t t o t h e s o u r c e . T h i s p r o b l e m n o n n a l l y '
clevelops when a HLIMINT collect,or has contact with one source or a group o{'
sinrilal sources over an extended peliod of'tirne. There is transf'erence of'the
sottl'ce's ploblerns to the HLIMINT collectoi'. For examlrle. HLfMINT
collectors woi'king in a refugee camp frequently begin to view the welfar.e of'
the i'efugees as a greater concern than HUMINT collection. The HLIMINT
coilectoi', while developing emotion within the source, must act believably but
at the same time he must remain detached. He must remember that the
ernotion is a means to an end (that is, information collection). Sultervisoi's
must carefully observe HUMINT collectors for signs of this ernotional
attachment to the source and take appropriate action ranging fi'om
c o r . r n s e 'nl ig t o r e a s s r g n m e n t .
'fhe
8-28. following ai'e types of emotional approaches.

Emotional Love Approach


8-29. (Interrogation and Other MSO) Love in its many forms (friendship,
comradeship, patriotism, love of farnily) is a dominant emotion for most
people. The HTIMINT collectoi'{bcuses on the anxiety felt by the source about
the circutnstances in which he finds himself, his isolation from those he loves,
ancl his f'eelings of helplessness. The HUMINT collector directs the love the
soul'ce f'eeis towarcl the appropriate object: family, horneland, ol collll'ades. If
the HLIMINT collectol can show the source what the source hirnself can do to
alterror irnplove his situation or the situation of the object of his enrotion, the
approach has a chance of success.
'fhe
8-30. key to the successful use of this appi'oach is to identify an action
that can realistically evoke this ernotion (an incentive) that can be t,ied to a
cletained solrrce's cooperation. For example, if the source cooperates, he can
see his family sooner', end the war', protect his comrades, help his countly,
help his ethnic group. A good HLIMINT collector will usually orchesti'ate
sorte fr"rtility with an emotional love approach to hasten the soui'ce's reaching
the breaking point. In other words if the source does not cooperate. these
things may never happen or be delayed in happening. Sincerity ancl
convrction are critical rn a successfr"rlattempt at an emotional love apploacl'r
as the HIIN{INT collectoi' nust show genuine concel'n fbrthe source, and lbr
the object at which the HUMINT collectoi' is directing the source's emobion.
The emoti.onal love approach may be used in any MSO whele the source's
state of mind indicates that the approach rnay be effective.

6 S e p t e m b e r2 0 0 6 8-9

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 10 of 30


F M 2- 22. 3

Ernotional Hate Approach


8-;ll. (Intei'rogation and Other MSO) The emotional hate approach fbcuses
on any genuine hate, or possibly a desire for revenge, the source may feel.
The HLIMINT collector rnust cleally identify the object of the source's hate
and, if necessary, build on those feelings so the ernotion overrides the source's
i'ational srde. The source may have negative feelings about his country's
i'egime, immediate superiors, officers in general, or fellow soldiet's. The
entotional hate approach may be used in any MSO where the soulce's state of
mind indicates that the approach may be effective.

8-32. The emotional hate appi'oach may be effective on members of racial or'
leligious rninoi'ities who have oi' feel that they have faced discrimination in
'lhe "hate"
rnilitai'y and civilian life. may be very specific. For example, a
sollrce rnay have great love for his country, but may hate the regime in
control. The HLIMINT collector rnust be snre to con'ectly identify the specific
objcct of'the hate. The ernotional hate approach is rnost efl'ective with the
itrtnriittu'e ol timid sollrce who rlaSr have had no oppoi'tunity up to this point
fbr revenge, ol never had the courage to voice his feelings.

8 - ; l ; 1 .A s i r - rt h e r e m o t i o n a l l o v e a p p r o a c h , t h e l i e y t o t h e s u c c e s s f u l a p p l i c a t i o n
is t,he linking of the emotion with a tangible manifestation of'that emotion.
Tlte HUMINT collector rnust be extremely careful that he does not plorlrrse
anything that would be contrai'y to national or international iaw or fJS
intelests or goals. Fol example, if an EPW feels he has been ti'eated unfailly
in his unit, the HIIMINT collectol can point out that, if the source cooperates
:rncl divulges the location of that unit, the unit can be clestroyed, thus
alTbi'ding the source revenge. But he cannot plornise that the unit if attacliecl
rvoulcl not be allowed to surrender or that the unit if it surrenders will be
t leated badly.

8-:1.1.The HUMINT collector must be careful that he does not assnme that
casttal negative comments equate to a strong hate. Many soldiels will make
negative comments against their arrny but will support and defend their
army against any "otttsider." The HLIMINT collector should also not assume
generalities; for example, assuming that a member of an ethnic minolity
hates the ethnic majority just because most ethnic minorities hate those in
the ethnic rnaiority.

Errot ional Fear-Up Approach


8 - 1 1 5 .( I n t e n ' o g a t i o n a n c l O t h e r M S O ) F e a r i s a n o t l - r e r d o m i n a n t e m o t i o n t h a t
ciur be exploit,ed by' tlte Ht.fMIN'f collectoi'. In the fear'-np approach. the
HtTNIINT collectoi'iclentifies a preexisting fear or creates a feal n'ithin the
sotu'ce.He then links the elimination or reduction of the fear to cooperation
on the part of the sottrce. The HLIMINT collector must be extremely carefirl
that he does not threaten or coerce a source. Conveying a threat may be a
violatior-r of the LfCMJ. The HUMINT collector should also be extrernely
carefirl that he does not create so much feal that the source becomes
unresponsive. The HUMINT collector should never act as if he is or-rt of
contlol ol set himself up as the obiect or focal point of the source's fear. If the
HUN'{INT collector acts in this manner, it is extremelv difficult to then act as

8-10 6 S e p t e m b e r2 0 0 6

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 11 of 30


FM 2-22. 3

the otrtlet lbr the fear. Supei'visors should consider the exper,iencelevel of'
their subordinates before approving their use of this appr.oach.

8-36. If thele is a justifiable fear', the HUMINT collector should pr,esent it


ancl pi'esent a plan to rnitigate it if the source cooperates (combination of'
emotional and incentive approaches). F or exarnple, an EPW source says that
he will not cooperate because if he does his fellow prisonels will kill him or., i{'
a contact solu'ce says that if people find out he is cooperating, his family will
suffei'. In these cases, the HUMINT collector can point out that the sour.ce
has ah'eady placed himself at risk and he or his farnily rnay suffei' whethei. he
cooperates ol not (lustified fear). But if he cooperates, the HIIMINT collector.
will do his best to ensure that eithel' no one will find out ol that he will be
protected (incentive).

8-37. If thei'e is no justified fear, the HIJMINT collector can make use of non-
specific feai's. "You know what can happen to you here?" A fear-up approach
is normally presented in a level, unemotional tone of voice. For example, "We
have heard many allegations of atrocities committed in your area and anyone
that was involved will be sevei'ely punished" (non-specific fear). "If you
cooperate with me and answer all of my questions truthfully, I can rnake sur,e
yotl are not falsely accused" (incentive). The source should demonstrate some
indication of'fear',whether velbal ol non-verbal, prior to using this appr.oach.
If a fear is pre-existing, the approach will woi'k and is legal. If'ther.e is no
r r - r c l i c a t i o no f ' f ' e a r ' ,a n o t h e r a p p r o a c h s h o u l d b e c o n s i d e r e r l .

8 - : 1 8 . I t , i s o f t e n v e l y e f f ' e c t i v e t o u s e t h e d e t a i n e e ' s o w n i r n a g i n a t i o r - ra g a i n s t
'fhe
hint. detainee can often visualize exactly what he is afraid of better. thar-r
t h e H U M I N T c o l l e c t o r c a n e x p l ' e s si t .
'lhe "f'eal'-up"
8-i19. approach is frequently used in conjunction with the
etuotional love oi' hate aplrloaches. For example, the HLIMINT coilector, has
ah'eacly established that a detainee source has a strong iove of family but is
now separated fi'ont them. He may state, "I woncler how youi' fanrily is
getting along without you?" (f'ear of the unknown). He then promises to allow
the detainee rlore than the rninimum two letters a month reqtrired by the
GPW.

Emotional Fear-Down Approach


8-'40. (Intelrogation and Other MSO) The emotion of fear may clorninate the
solrlce to the point where he is unable to respond rationaily to questioning,
especiaily in interrogation sources. However, the fear-down approach rnay be
trsed in any MSO where the source's state of mind indicates that it woulcl be
an applopriate approach to use. In the fear-down approach the HIJMINT
collector mitigates existing fear in exchange for cooperation on the par.t of the
sotlt'ce. This is not normally a formal or even voiced agreement. Instead, the
HLIMINT collector through verbal and physical actions calms the source'.
Psychologically, the source then views the HLIMINT collector as the pr,otector.
or the one who is ploviding the calm and wishes to help the HLIMINT
collectol in gratittrde and in order to maintain the HLfMINT collector as the
pt'otector'.When ttsed with a soothing, calm tone of' voice and appr.opr.iate
bocll' langr-rage, a fear'-down approach often creates rapport and nothing else
may be needecl to get the source to cooperate. At times, however, the

6 S e p t e m b e r2 0 0 6 8-11

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 12 of 30


F M2 - 2 2 . 3

HLrN'IINT collectol must describe concrete actions that he will take in order
to i'ernove the source's fear.

8-41. Frequently the object of the fear is too traumatic for the source to face
clirectly. While calrning the soui'ce, the HLfMINT collector may initially ask
n o n p e r t i n e n t q r . r e s t i o n sa n d a v o i d t h e s u b j e c t t h a t h a s c a u s e d t h e s o u r c e ' s
fe:ir'. This clevelops rappoi't ancl establishes communication. The' HITNIINT
collectol rnust remember that his goal is collecfing infoi'mation, not concern
rvith the psychological well being of the source. He will be concerned ivith the
Iatter onlS' insofai' as it helps hirn obtain the former'. This approach technique
nra5' baclifire if allowed to go too far. After convincing the source he has
r-rothing to fear', the source may cease to be aflaid and may feel secure enough
to lesist the HUMINT collector"s pertinent question.

Emotional-Pride and Ego-Up Approach


8-+2. (Interlogation and Othel MSO) The emotional-pride ancl ego-ull
apploach rnay be used in any MSO. It exploits a source's low self'-esteern.
Many HLfMINT solrrces including EPWs and other detainees, retainecl
llelsons, civilian internees, or refugees may suffer from low self-esteem ancl
f'eelings of helplessness due to their immediate circurnstances. Others, such
as inclivicluals ol members of social or ethnic glorU)s that have been
cliscrirlinated against or low-ranking members of organizations (including
the rnilitai'y), rnay also show low self-worth. In this technique, the source is
flattei'ed into providing certain information in order to gain credit ancl buiid
his ego. The HUMINT collector must take care to use a flattering somewhat-
in-awe tone of voice, and speak highly of the source throughout this approach
rvhile remaining believable. This should produce positive feeiings on the
source's pai't as he receives desired recognition. The source will eventually
leveal pertinent information to solicit more f'avorable comrnents fi'om the
HtfMINT collectoi'.

8 - - 1 ; 1T
. his techniclue can also be ernployed in another by flatterring
the source into admitting certain infblmation in oldei'to gain cleclit. For
example, n'hile intei'r'ogating a suspected saboteur', the HLIMINT collectoi'
sttrtes: "T'his was a smooth operation. I have seen many previous atternpts
Iail. I bet you planned this. Who else but a clever person like you would have
planned it'/ When did you first decide to do the job?"

8--14. A vai'iation of this approach can also be used on individuals with strong
egos. It is basecl on the prernise that everyone likes to talk about what they
clo best. The HUMINT collector shows interest in and asks the soui'ce to
explain an aspect of his iob. The questioning begins with nonpei'tinent
a s p e c t s o f t h e s o u l ' c e ' sj o b . T h e H U M I N T c o l l e c t o l d i s p l a y s i n t e r e s t a n c l a s k s
incleasingly technical and pertinent questions. For example, if the soui'ce is
an EPW who was a pilot, the HIJMINT collector rnight begin by asking him
r,vhat it is like to fly. As the source talks about this, the collector'
clemonstrates i.nterest and gradually uses questions to lead the conversation
to capabilities of specific aircraft. specific missions that the pilot has flown,
tactics, or whatever topic is a priority for collection.

8-12 6 S e p t e m b e r2 0 0 6

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 13 of 30


FM 2-22.3

Enrotional-Pride and Ego-Down Approach


8-45. (Intei'rogation) The emotional-pride and ego-down approach is based on
attacliing the source's ego or self'-image. The source, in defencling his ego,
reveals information to justify or rationalize his actions. This infonnation may
be valuable in answering collection requirernents or may give the HLIMINT
collector insight into the viability of other approaches. This approach is
effective with sources who have displayed weakness or feelings of inferiority.
A real or imaginary deficiency voiced about the source, loyalty to his
organization, or any other feature can provide a basis for this technique.
'lhe
8-46. HUMINT coliector accuses the source of weakness or implies he is
unabler to do a certain thing. This type of source is also prone to excuses ancl
rationalizations, often shifting the blarne to others. An example of' this
teclinique is opening the collection effort with the qr-restion, "Why clid you
sttrrentler so easily when you could have escaped by ci'ossing the nearby fbld
in the t'iver'?" The sotti'ce is likely to provide a basis for furtl-rel questions or'
to leveal significant infoi'rnation if' l-re attempts to explain his surlenclel rn
orcler to vindicate hirnself. He may give an answer strch as, "No one coulcl
cross the fbld because it is mined."

8-47. Tlie objective is for the HTIMINT collector to use the soui'ce's sense of
pi'icle by attacking his loyalty, intelligence, abilities, leadership qualities,
slovenly appearance, ol any other perceived weakness. This will usually goacl
the soui'ce into becorning defensive, and he will try to convince the HLIMINT
collector he is wrong. In his attempt to redeern his pi'ide and explain hrs
actions, the sottrce may provide pertinent information. Possible targerts lbr
the ernotional-pride ancl ego-down approach are the s6q1'ss's-
. Loyalty.
. Technical competence.
. Leadei'ship abilities.
. Solclierly qualities.
t Appearance.
'fhere
8-48. is a risk associated with this approach. If the ernotional-pride
ancl ego-down approach fails, it is difficult for the HIJMINT collector to
recovel ancl move to another approach without losing his credibility. AIso,
thei'e is potential foi' application of the pride and ego approach to cross the
I i r - r ei n t o h u m i l i a t i n g a n d d e g l a c l i n g t r e a t r n e n t o f t h e d e t a i n e e . S u p e r v i s o r s
shoulcl consider the experience level of their subordinates ancl det,errnine
specilically how the intelrogatol intends to apply the appi'oach technique
before appi'oving the interrogation plan.

Emot ional-Futility
8 -4 9 . (In te i ' r' o g ati onand Other MS O) The emoti onal -futi l i ty appi ' oach is
generally used in an interrogation setting, but may also be used for other'
MS O , i f i n d i c a ted by the sonrce' sstate of mi nd. In the emoti onal -futi l it y
a p p ro a c h , th e H U MIN T col l ector convi nces the source that resrstanceto
questioning is futile. This engenders a feeling of hopelessness ancl
h e l p l e s s n e s so n t he pai ' t of' the source.A gai n as w i th the otherremoti onal
approztches.the HUMINT collector gives the source a "way out" o{' the

6 S e p t e m b e r2 0 0 6 8-13

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 14 of 30


F M2 - 2 2 . 3

hclllless sittration. Fol example "it is hopeless for' 5'err folces to continue
lighting becattse they can no longer get supplies, but you can help encl the
war and their suffering." When employing this technique, the HUMINT
collectoi' tnttst have factual infonnation. The HIJMINT collector presents
these facts in a persuasive, Iogical manner. He should be aware of and able to
exploit the source's psychological and moral weaknesses, as well as
lveaknesses inhei'ent in his society.

8-50. The futility approach is effective when the HUMINT collectoi'can play
on doubts that already exist in the source's mind. Factual oi' seemingly
fhctual inforrnation must be presented in a persllasive, logical manner. ancl
in a matter-of-fact tone of voice. Making the situation appear hopeless allows
the sottrcer to rationalize his actions, especially if that action is cooperating
rvith the IfLIMINT collector. When employing this technique, the HLIMINT
collectoi' nust not only have factual information but also be aware of and
exploit the source's psychological, moral, and sociological weaknesses.
Anothei' way of'using the futility approach is to blow things out of proportion.
If the soul'ce's unit was low on, or had exhausted, all food supplies, he can be
casily led to believe all of his forces had run out of food. If the source is
vei'ging on cooperating, it rnay aid the collection effort if he is told all tlie
othel soul'ces have cooperatecl.

8-51. The fLrtility apploach mttst be orchestratecl u'ith othei' appi'oach


t i ' c h t r i c l t t e s( f o r e x a t n p l e . l o v e o f ' c o m r a c l e s ) . A s o u r c e r v h o m a y w a n t t o l i e l l r
s x 1 ' gh i s c o m r a c l e s 'l i v e s m a 5 t b e c o n v r n c e d t h e b a t t l e f i e l c l s i t u a t i o n i s h o p e l e s s
ancl thel'will clie il'ithout his assistance. The futility appi'oach is used to
ltaint a blc.ak pictr,rre for the pli'isoner',but it is not normally ef{'ective in and
o f i t s e l f i n g a i n i n g t h e s o u l ' c e ' sc o o p e r a t i o n .

Other Approaches
8-52. Ther:e are numerous other approaches but most requile considei'able
time and lesources. Most are more appropriate for use with sollrces who are
det,ainees, but some, such as change of scenel'y, lnay have application for'
elicitation oi'MSO.

8-53. We Know Alt. (Interi'ogation) In the "we know all" appi'oacli


technique, the HUMINT collector subtly convinces the solrlce that his
qtrestioning of the source is perfunctory because any information that the
soulce has is already known. This approach may be employecl in conjunction
with the "file and dossier'" technique or by itself. If used alone, the HLIMINT
collectol rnust first become thoroughly familiar with available data
coucerning the source and the current situation. To begin the collection
effolt. the HIIMINT collector asks questions based on this known data.

8-54. When the soulce hesitates, r'efuses to answer, or provides an incon'ect


r-rt'incomplete i'eply, the HLIMINT collector provides the detailed answer'
hirnself. The HLIMINT collectol may even complete a source's answel'. as if'
h e ' t s b o i ' e c la n c l i r - r s t" g o l n g t h l o u g h t h e m o t i o n s . " W h e n t h e s o t r r c e b e g i r - r st o
give zrccttt'ate ancl complete rnfbi'matron, the HIJNIINT collectol int,er';ects
f.iertinent cluestions. Questions to which answers are ah'ead5' known ar.e also
asliecl periodically to test the source's tmthfulness and to maintain the
cleception that the information is aiready known. There are some inhelent

8-14 6 S e p t e m b e r2 0 0 6

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 15 of 30


FM 2-22. 3

problems with the ttse of the "we know all" appi'oach. The HLIMINT collector'
is lequirecl to pl'epare evei'ything in detail, which is tirne consuming. He
urust cotnmit uruch of the information to merlol'y, as working from notes rnay
show the limits of the information actually known. It is also onl5' usable
when sr-rfficient prior inforrnation exists to convince the source that "we know
all."

8-55. File and Dossier. (Interrogation) The file and clossier apploach is a
variation of the "we know all" appi'oach. The HIJMINT collectclr plerpal'es a
dossier containing all available information concerning the source or his
oi'ganization. The information is carefully arranged within a file to give the
illusion that it contains rnore data than actually thei'e. The file may be
padded with extla papei' if necessary. Index tabs with titles such as
eclucat,ion, employment, crirninal record, military service, and others at'e
particularly effective. It is also effective if the HUMINT collectoi' is reviewing
the clossier when the source enters the room and the sollrce is able to lead his
n a l n e o n t h e d o s s i e r a n d s e e s t h e n u m e r o u s t o p i c s a n d s u p p o s e c le x t e n t o f ' t h e
liles.

8-56. The HLIMINT collector proceeds as in the "we know all" approach. He
refers to the particular Iabeled segment of the dossier before, during, or after
asking a qr,restion. In the early stages of questioning, the HLIMINT coliect,or
asks questions to which he has the answer. He may answer along with the
sotlt'ce, complete the information for the source, or even show the source
whele the information is entered in the dossier. He never lets the source
p h y s i c a l l y h a n d l e t h e d o s s i e r ' .A s t h e s o u i ' c e b e c o m e s c o n v i n c e d t h a t i i l l t . h e
infot'matiorl that he knows is contained within the dossiei'. the HLlN,llNT
c o l l e r c t o rp i ' o c e e d s t o t o p i c s o n w h i c h h e h a s n o o r l i t t l e i n f o r r n a t i o n . I n d o i n g
so. he still ref'ers to the appropriate section of the dossiei' ancl mav even nocl
his head knowingly ol tell the source that the infoi'mation the soulce rs
pi'oviding still matches what is in the dossier'.
'fhis
8-57. technique has several lirnitations and di'awbacks. The prepai'ation
tirne in developing the dossier is extensive. The success of this technique is
Ialgely dependent on the naivet6 of the sollrce, volume of'data on the subject,
ancl sliill of the HUMINT collector in convincing the source that the clossier is
nlol'e cornplete than it actnally is. Thele is also the risk tliat a less naive
soul'ce 'nvill refuse to cooperat,e. claiming that, if the collectoi' ah'eacly knows
everything, there is no need for hirn to talk. Also with this technique, thc
HLIMINT collector is limited in the method he rllay use to recoi'rl new
information. If the HUMINT collector writes down information, it destroys
the illusion that all the information has already been obtainecl. The
HLIMINT collector is norrnally lirnited to using electronic recording clevices ol
his memory. The HLIMINT collector can also arrange ahead of tirne for'
anotirer interrogator or analyst to take notes for him, undetected by the
source. Tiris could be especially effective in a situation where a separate
rnonitoi'ing area (for oversight) is used by the analyst.

8-58. Establish Your ldentity. (Interrogation) In using this approach, the


HLIMINT collector insists the detained source has been correctly identified as
an infiltnous individual wantecl by higher authoi'ities on serious chalges, ancl
he is r-rot t,he pei'sorl he pulpoi'ts to be. In an effoi't to clear himself'o{' this

6 S e p t e m b e r2 0 0 6 8-15

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 16 of 30


F M2 - 2 2 . 3

allegation, the sout'ce makes a genuine and detailecl effort to estabhsh or


substantiate his true identity. In so doing, he may provicle the H[IMINT
collectoi'with infoi'mation and leads for further development. The HUMINT
collector should initially refuse to believe the source and insist he is the
individual wanted by the ambiguous higher authoi'ities. This will force the
source to give even mol'e detailed information in order. to convince the
HLIX4INT collector.he is who he says he is.

8-59. Repetition. (Inten'ogation) The i'epetition appi'oach is used to inciuce


coopei'altion fi'otu a hostile source. In one vai'iation of this approac[. tficr
HLIN'{INT collector listens carefully to a source's answer. to a question, and
t h e n r e p e a t s t h e q u e s t i o n a n c l a n s w e r s e v e r a l t i m e s . H e c l o e st h i s w i t h e a c h
sttcceeding question trntil the source becomes so thoroughly borecl with the
lrrocedr.tle, he answers questions fully and candidly to satisfy the H[-IMINT
collector ancl gain relief from the rnonotony of this rnethocl. The r.epetition
techniclue mttst be judiciously used, as it will gener.aily be ineffective when
ernployed against introverted sources or those having great self-contr.ol. It
may also provide an opportunity for a source to regain his composure and
clelay the collection effoi't. In this approach, the use of mor.e than one
HLTMINT collecto. or a tape recorder has proven effective.

8-60. Rapid Fire. (Interi'ogation) The rapid-fii'e appi'oach is baserl upon tfie
principlest hat-

. Everyone lilies to be hearci when he speaks.


' It is confusing to be interlupted in mid-sentence with an uni.elatecl
qr-restion.

8-61. This approach rlay be r-tsedby one, two, or more HUMINT collector.s to
qtrestion the source. In employing this technique, the HUMINT collectors ask
a series of questrons in such a manner that the source does not have tirne to
elnswer a question completely befoi'e the next one is asked. This confuses the
sollrce, and he will tend to contradict himself as he has iittle time to
foi'tllttlate his answei's. The HUMINT collectors then confr.ont the source with
the inconsistencies cattsing furthei' contraclictions. In many instzrnces, the
sotll'cewill begin to talk fi'eely in an atternpt to explain himself and cleny the
H t I N { I N T c o l l e c t o i " s c l a i n r s o f i n c o n s i s t e n c i e s . I n t h i s a t t e m p t , t h e s o t r r , c ei s
lilierly t,o reveal rnore than he intencls, thus creating aclclitional leacls for
lirrther exploitation. This approach rnay be orchestrated with the emotional-
pride zlnd ego-down oI' fear-up approaches. Besides extensive prepar.ation,
this apploach reqttires expei'ienced and competent HLIMINT collectors, r.l,ith
comprehensive case knowleclge and fluency in the source's language.

8-62. Silent. (Intei'rogation) The silent approach rnay be successful when


ttsed against eithet' a nervous or confident source. When employing this
technique, the HUMINT collector says nothing to the sour.ce, but looks hili
squai'ely in the eye, preferably with a slight smile on his face. It is impor.tant
not to look away fi'om the source but force him to break eye contact first. The
source may becolne nervous, begin to shift in his chair, closs ancl r.e-cr.osshis
legs, ancl look away. He may ask questions, but the HLIMINT collector.shoulcl
not answer until he is ready to bi'eak the silence. The source may biur.t out
qtrestions such as, "Come on now, what do you want with nle?" When the
HLTMINT collector is ready to break silence, he may do so with questions

8-16 6 S e p t e m b e r2 0 0 6

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 17 of 30


FM 2-22. 3

sllch as, "You planned this operation for a long time, didn't you? Was it youl'
i d e a ' J " T h e H U M I N T c o l l e c t o r m u s t b e p a t i e n t w h e n u s i n g t h i s t e c l ' r n i q u e .I t
rnay appeai' the technique is not succeeding, but usually will when given u
reasonable chance.

8-63. Change of Scenery. (Interrogation and Other MSO) The change-of'-


scenery approacl-r may be nsed in any type of MSO to i'ernove the sotrlce fi'onr
an intimidating atrnosphere such as an "interrogation" room type of sett,ing
and to place him in a setting wirere he feels more comfortable speaking.
Bringing a source into a formal setting to conduct an inten'ogation or
debi'iefing has psychological implications. On the positive side, it places the
HUMINT collectol in a superior position since he is operating on his "home
tulf' and has set the conditions for the meeting. It allows the HUMINT
collectoi'conti'ol over the immediate environment including the positioning of
the participants, to establish the desired atrnosphere for the appi'oach.

8-6-1.However', there are potential negative factors in the conduct o{'


c l u e s t i o n i n g i n a n " I n t e r i ' o g a t i o n R o o m " e n v i r o n m e n t . T h e s o r - r l c er n a y b e
intinritlated ancl nrore guarded; he rnay consider tire folmal setting rn t,erurs
o1'an aclversarial relationship; and he may limit his answel's as a rnocleo{'
.slf'-protection. In some cii'cumstances, the HUMINT collector may be able to
invite the source to a diff'ei'ent setting fbi' coffee and pleasant convei'sation.
\\'hen renroved fi'om the foi'mal environment, the source may expei'ience a
I'eehng of leaving the inten'ogation behind. The perceived reduced pressllre
may lowei'his guarcl and allow hirn to attach less significance to conversation
that occurs outside the folmal setting, even though pertinent information is
still being discussed. During the conversation in this more relaxecl
envilonment, the HLIMINT collector steers the convei'sation to the topic of'
intelest. Thi'ough this somewhat indirect method, he attempts to elicit t,l-re
desired infbrmation. The source may never realize he is still berine
questioned.

8-65. lUutt and Jeff. (Interrogation) The goal of this technique is to malie
the source identify with one of the interrogators and thei'eby establish
rappolt and cooperation. This technique involves a psychological ploy that
takes advantage of the natural uncertainty and guilt that a soul'ce has as a
lesult of being detained and questioned. Use of this technique reqr.rii'estwo
experienced HIJMINT collectors who are convincing actors. The two
HUI\IINT coilectors will clisplay opposing personalities and attitucles towai'd
the soulce. For exarnple, the first HUMINT collector is vei'y folrnal and
d i s p l a y s a n u n s y m p a t h e t i c a t t i t u d e t o w a r d t h e s o u i ' c e .H e m a y , f o r i n s t a n c e ,
be very strict and order the source to follow all military cotrrtesies cluring
questioning. Although he conveys an unfeeling attitude, the HtIMINT
collect,olis cai'eful not to threaten or coerce the source. Conveying a threat of'
violence is a violation of the LICMJ.

8-66. At the point when the interrogator senses the source is vulnerable, the
second HLfMINT collectol appeals (having received his cue by a signal,
hidden fi'om the soui'ce, or by iistening and observing out of view of the
soulce), and scolds the first HLIMINT collector for his uncaling behavior and
orders him from the room. The second HLfMINT collector then apologizes to
soothe the source, perhaps offering him a beverage and a cigarette. He

6 S e p t e m b e r2 0 0 6 8-17

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 18 of 30


F M2 - 2 2 . 3

explains that the actions of the first HLIMINT collector were largely the
t ' t ' s r t l t o 1 ' a r - irn f e l i o r i n t e l l e c t a n c l l a c k o f ' s e n s i t i v i t y . T h e i n f e r . e n c e i s t h a t t h e
st'con(l HIIMINT collector and the soulce share a high degi'ee of intelligence
lund sensrtivity.

8-67. The source is norrnally inclined to have a feeling of gi.atittrcle towarcls


the seconcl HLIMINT coilector', who continues to show sympathy in an effor.t
to increase rapport and conti'ol for the questioning that will follow. If the
sotlrce's cooperation begins to fade, the second HLIMINT collector, can hint
that he is a busy person of high rank, and therefore cannot affor.d to waste
time on an uncooperative source. He can broadly imply that the fir.st
HUMINT coilector might return to continue the questioning. The Mutt and
Jeff approach may be effective when orchestrated with Pride and Ego LIp and
Down, Fear LIp and Down, Futility, or.Emotional Love or Hate.

8-68. Oversight Considerations: Planned use of the Mutt, and Jefi'


approach must be approved by the first 0-6 in the interrogator"s chain of
cotntnand. The HUMINT collector must include as a part of the intei.r.ogation
plan-

. No violence, threats, or irnpermissible or unlawful physical contact.


. No threatening the removal of protections afforded by law.
. Regtrlai' monitoring of the interrogation shall be per.for.mecl by
interrogation personnel.

8-69. False Flag. (Interrogation) The goal of this technique is to convincc'


t h e ' d e t a i n c e t h z r t i n c h v i d u a l s f i ' o m a c o u n t i . S ro t h e i . t h a n t h e U n i t e d S t a t e s
rlrc'int,elt'ogating hinr. and tnck the detainee into cooperating with tls fbrces.
F'ot' example, trsing an rnt,en'ogatoi'who speaks with a partictrlar. accent..
rnaking the cletainee believe that he is actually talking to repr.esentatives
fi'onr a different cotrntry, such as a country that is friendly to the detainee's
countr'5' or organization. The False Flag approach may be effect,ively
orchestrated with the F ear Down approach and the Pride and Ego IJp.

8-70. Oversight Considerations: The interrogation chain of command


tnust cooldinate an interrogation plan that uses the False Fiag appr.oach
wtth the legal representative :rnd the 2X, and receive approval flom the fii.st,
()-6 in the interrogator"s chain of command for each specific use of the False
Flag approach.
. T h e u s e o f th e Fal se Fl ag a p p r o a c h m u s t c o m p l e m e n t t h e o v e r . a l l
interrogation strategy and other approach techniques listed in the
i n te rro g a ti o np l an.
. When a HUMINT collector intends to pose as a national of a thii.cl-
part,y country, that country must be identified in the interrogation
plan.
. No irnplied or explicit thi'eats that non-cooperation will result in harsh
inteli'ogation by non-LIS entities.
. HLIMINT collectors will not pose or portray thernselves as any person
prohibited by this rnanual, paragi'aphs 8-10 and 8-11 (fol example. an
I CRC relrresentative).

8-18 6 S e p t e m b e r2 0 0 6

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 19 of 30


FM 2-22 . 3

B-71. Separation. See Appendix M, Restlicted Interrogation Technique -


Separation.

Selecrting an Approach
'lhere
8-i2. often is insuflicient information available to determine an
approach other than the direct approach. In this case where tl-re sorlrce
answels questions but will not discuss pertinent issues, the HIIMINT
collectol may ask direct but nonpertinent questions to obtain sufficient
infoi'rnation to develop an approach strategy. This technique is also useful in
debriefing to establish rapport. Nonpertinent questions may include-
. Asking about immediate past events. This includes asking an EPW
about the circumstances of his capture ol asking a i'efugee about tl're
cu'cumstances concerning his arrival at the refugee point ol'
checkpoint. By doing this, the HIJMINT collectol can gain insight into
the sollrce's current state of mind and, more irnportantly, he can
ascertain his possible approach techniques.
. Asking background questions. This inclucles asking about the source's
family, work, friends, likes, and dislikes. These types of questions can

3rui:'"1;:::,T,ii,:.';;Tl*:"ffi:3:J:*ilHff
,T:xi::u"o*'"n*u
. Considering what are culturally and socially acceptable topics of
cliscussion. For example, asking an Arab rnale about his wife coulcl be
consiclei'ed exti'emely rr-tde, whei'eas not asking an American the same.
qtrestion might be seen as insensitive.

Maliing Smooth Transitions


8-73. With the exception of the clirect approach, no other appi'oach is
effective by itself. HUMINT collectors use different approach techniques or'
combine thern into a cohesive, logical technique. Smooth transitions,
si.ncerity, logic, and conviction are needed to make a strategy work. HLIMINT
collectoi's must careiully assess the soulce's verbal or nonverbal ch-res to
determine when a change in approach strategy is required. The HTIMINT
collectoi' must guide the conversation smoothly and logically, especially when
rnoving fi'oni one apploach technique to another'. flsing transitional phlases
can nrake logical and smooth tie-ins to another apploach. By trsrng
nonpeltinent questions, tlie HUMINT collector can lnove the conversation rn
the desired clirection and, as previously stated, sometimes can obtain learls
and hints about the sonrce's stresses or weaknesses or other appi'oach
stlategies that may be more successful.

R ecogni zing Source Cooperation


8-74. Each source has a point where he will begin to cooperate ancl answer
questions. Some sollrces will begin answering questions completely ancl
truthfr.rlly with no prepalation; others might require hours or even days of'
woi'k. The amount of tirne that a HUMINT collector spends on an appi'oach
c l e p e n c l so n a v a r i e t y o f ' f a c t o r s . T h e s e i n c l u d e -

6 S e p t e m b e r2 0 0 6 8-19

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 20 of 30


FM 2-22.3

AppendixM

Technique- Separation
RestrictedInterrogation
INTRODUCTION
M-1. As part of the Army's efforts to gain actionable intelligence in the war
on terrorism, HUMINT collectors may be authorized, in accordancewith this
appendix, to employ the separation interrogation technique, by exception, to
meet unique and critical operational requirements. The purpose of separation
is to deny the detainee the opportunity to communicate with other detainees
in order to keep him from learning counter-resistance techniques or
gathering new information to support a cover story; decreasing the detainee's
resistance to interrogation. Separation, further described in paragraphs M-2
and M-28, is the only restricted interrogation technique that may be
authorized for use. Separation will only be used during the interrogation of
specific unlawful enemy combatants for whom proper approvals have been
granted in accordancewith this appendix. However, separation may not be
employed on detainees covered by Geneva Convention Relative to the
Treatment of Prisoners of War (GPIV), primarily enemy prisoners of war
(EPWs). The separation technique will be used only at CoCoM-approved
locations. Separation may be employed in combination with authorized
interrogation approaches-
. On specific unlawful enemy combatants.
. To help overcomeresistance and gain actionable intelligence.
. To safeguard US and coalition forces.
. To protect US interests.

GIINESAL
i\{-2. This appendix provides doctrinal guidance for the use of separation as
an interrogation technique. Separation involves removing the detainee from
other detainees and their environment, while still complying with the basic
standards of humane treatment and prohibitions against torture or cruel,
inhuman, or degrading treatment or punishment, as defined in the Detainee
Treatment Act of 2005 and addressedin GPW Article 3 (Common Article III).
Separation is to be distinguished from segregation, which refers to removing
a detainee from other detainees and their environment for legitimate
purposes unrelated to interrogation, such as when necessary for the
movement, health, safety and/or security of the detainee, or the detention
facility or its personnel. This appendix-
. Will be reviewed annually and may be amended or updated from time
to time to account for changes in doctrine, policy, or law, and to address
lessonslearned.
o Is not a stand-alonedoctrinal product and must be used in conjunction
with the main portion of this manual.

6 September 2006 M-1

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 21 of 30


F M 2- 22. 3

M-3. Careful consideration should be given prior to employing separation as


an interrogation technique in order to mitigate the risks associated with its
use. The use of separation should not be confused with the detainee-handling
techniques approved in Appendix D. Specifically, the use of segregation
during prisoner handling (Search, Silence, Segregate, Speed, Safeguard, and
Tag [5 S's and a T]) should not be confused with the use of separation as a
restricted interrogation technique.
M-4. Members of all DOD Components are required to comply with the law of
war during all armed conflicts, however such conflicts are characterized, and
in all other military operations. Proper application of separation as a
restricted interrogation technique in selective cases involving specific
unlawful enemy combatants and in accordancewith the safeguards outlined
in this manual is consistent with the minimum humane standards of
treatment required by US law, the law of war; and does not constitute cruel,
inhuman, or degrading treatment or punishment as defined in the Detainee
Treatment Act of 2005 and addressedin GPW Common Article III.
M-5. Use of separation for interrogation is authorized by exception.
Separation will be applied on a case-by-case basis when there is a good basis
to believe that the detainee is likely to possessimportant intelligence and the
interrogation approach techniques provided in Chapter 8 are insufficient.
Separation should be used as part of a well-orchestrated strategy involving
the innovative application of unrestricted approach techniques. Separation
requires special approval, judicious execution, special control measures, and
rigorous oversight.
M-6. Additionally, the use of separation as a restricted interrogation
technique shall be conducted humanely in accordance with applicable law
and policy. Applicable law and policy for purposes of this appendix include
US law; the law of war; relevant international law; relevant directives
irrcluding DOD Directive 3115.09,"DOD Intelligence Interrogations, Detainee
Debriefings, and Tactical Questioning"; DOD Directive 2310.1E, "The
Department of Defense Detainee Program"; DOD instructions; and military
execute orders including FRAGOs.
M-7. More stringent than normal safeguards must be applied when using the
separation technique. Use of separation is subject to USD(I) oversight.
Compared to approach techniques, there are two additional steps in the
approval process (see Figure M-l) for the use of the separation technique:
o First, the COCOM Commander approves (after SJA review) use of the
separation technique in theater.
. Second,following the COCOM Commander's approval, the first
General Officer/l'lag Officer (GO/FO) in an interrogator's chain of
command approves each specific use of separation and the
interrogation plan that implements separation (this is non-delegable).
Interrogation supervisors shall have their servicing SJA review the
interrogation plan before submitting it to the GO/FO for approval.

M-2 6 September 2006

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 22 of 30


FM 2-22.3

SeparationTechniqueApproval

COCOM Commander
usD(r) t \

--.-._, Approves overalluse of


Providesoversightof OSD Policy '/ interrogation
approachtechniques
in theater.

w GO/FO

Approveseach interrogation
COCOM-authorized
plan that includes
use of separation.
Approvesall extensionsor additionaliterations.

Interrogation Unit

Reviewsinterrogationplans that includeuse of


COCOM-approved use of separation.Plans,
prepares,executes,and assessestheir use.

InterrogationSu pervisor
Interrogator
Reviewsinterrogationplan for necessityand
Developsinterrogationplan basedon screening
appropriatenessof requesteduse of separation.
and assessmentof source'sintelligencevalue
Ensuresthat propersafeguardsand support
and levelof cooperation.
are stipulated.

Figure M-1. Separation Approval Process.

M-8. The employment of separation requires notifrcation, acknowledgment,


and periodic review, in accordance with USD(I) Memorandum, "(Si/NF)
Guidance for the Conduct and Oversight of Defense Human Intelligence
(HUMINT) (U)," dated 14 December 2004. This means that after the
separation is approved for use by COCOMs, the I&WS must be notified as
soon as practical. The Office of the Secretary of Defense will review these
activities periodically in accordancewith DOD Directive 3115.09.
M-9. The planning process for the employment of standard interrogation
operations also applies to the employment of the separation technique
(seeChapter 4).

6 September 2006 M-3

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 23 of 30


F M 2- 22. 3

RESPONSIBILITIES
M-10. Commanders of interrogation or detention facilities and forces
employing the approved separation technique are responsible for compliance
with applicable law and policy. Commanders must understand that
separation poses a higher risk to the detainee than do standard techniques,
and so require strenuous oversight to avoid misapplication and potential
abuse.
M-11. The interrogation chain of command must coord.inatethe interrogation
plan with the detention operations commander. Close coordination must
occur between intelligence personnel and personnel responsible for detainee
operations, including MP, security forces, Master at Arms, and other
individuals providing security for detainees (hereafter referred to as guards).
Guards do not conduct intelligence interrogations and, in accordance with
DOD Directive 3115.09,will not set the conditions for interrogations. Guards
may support interrogators as requested for detainee custody, control, escort,
and/or additional security (for example, for combative detainees), in
accordancewith paragraphs 5-52 through b-66 and FM B-19.40,Jp 8-68, and
the approved interrogation plan.
M-12. The detention operations commander (in conjunction with the MI
commander) may convene a multidiscipline custody and control oversight
team including, but not limited to, MP, MI, BSC (if available), and legal
representatives. The team can advise and provide measures to ensure
effective custody and control in compliance with applicable law and policy.
M-13. Commanders must considerthe following when employing separation:
o Is separation directed against the appropriate individual and is it
necessaryfor collecting important intelligence?
r Does separation complement the overall interrogation strategy and
interrogation approach technique or techniques?
o Is the application of separation with the specific detainee at issue
consistent with humane treatment and in accordancewith applicable
law and policy?
M-14. Planning for the use of separation requires coordination with staff
elements that provide support to interrogation operations. Staff elements
that support interrogation facilities and ?orces employing separation will
comply with paragraphs 4-59 and 4-60 and all controls and safeguards
identified in paragraphs M-17 through M-26.

GENERAL CONTROLS AND SAFEGUARDS


HUMANE TREATMENT
M-15. All captured or detained personnel shall be treated humanely at all
times and in accordancewith DOD Directive 3115.09, "DOD Intelligence
Interrogations, Detainee Debriefings, and Tactical euestioning"; DOD
Directive 2310.lE, "Department of Defense Detainee program," and. no
person in the custody or under the control of the DOD, regardless of
nationality or physical location, shall be subject to cruel, inhuman, or
degrading treatment or punishment as defined in US law, including the

M4 6 September2006

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 24 of 30


FM 2-22.3

Detainee Treatment Act of 2005. All intelligence interrogations, debriefings,


or tactical questioning to gain intelligence from captured or detained
personnel shall be conducted in accordancewith applicable law and policy.
M-16. Any inhumane treatment-including abusive practices, torture, or
cruel, inhuman, or degrading treatment or punishment as defined in US law,
including the Detainee Treatment Act of 2005-is prohibited and all
instances of such treatment will be reported immediately in accordancewith
paragraph 5-69 thru 5-72. Beyond being impermissible, these unlawful and
unauthorized forms of treatment are unproductive because they may yield
unreliable results, damage subsequent collection efforts, and result in
extremely negative consequencesat national and international levels. Review
by the servicing SJA is required prior to using separation. Each interrogation
plan must include specific safeguards to be followed: limits on duration,
interval between applications, and termination criteria. Medical personnel
will be available to respond in the event a medical emergency occurs.

FM 2-22.3 REQUIREMENTS
M-17. Separation must be employed in accordancewith the standards in this
manual. These standards include the following:
. Prohibitions against abusive and unlawful actions (see para 5-75) and
against the employment of military working dogs in the conduct of
interrogation (seeparas 5-59 and 8-2).
. Requirement for non-DOD agenciesto observe the same standards for
the conduct of interrogation operations and treatment of detainees
when in DOD facilities (seepara 5-55).
o Prohibition on guards conducting intelligence interrogations or taking
any actions to set the conditions for interrogations. Humane treatment,
evacuation, custody and control (reception, processing,administration,
internment, and safety) of detainees; force protection; and the
operation of the internment facility are discussedin paragraphs 5-57
through 5-66. (FM 3-19 .40 and JP 3-63 also thoroughly discuss
detaineeoperations.)
r Assignment of ISNs to all detainees in DOD control, whether or not
interrogation has commenced,as soon as possible; normally within 14
days of capture. (SeeAR 190-8 and Secretary of Defense Memorandum
dated 20 September 2005, "(S//NF) Policy on Assigning Detainee
Internment Serial Numbers (ISI$(U)."
. Accessto detainees by the ICRC.

REPORTING OF ABUSES AND SUSPECTED ABUSES


M-18. As an interrogation technique, separation is particularly sensitive due
to the possibility that it could be perceived as an impermissible act.
Interrogators applying the separation technique and the chain of command
supervising must be acutely sensitive to the application of the technique to
ensure that the line between permissible or lawful actions and impermissible
or unlawful actions is distinct and maintained. Therefore, HUMINT
collectors should have heightened awareness and understanding of the risks,

6 September 2006 M-5

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 25 of 30


FM 2-22.3

control measures, and safeguards associated with the use of separation. Any
interrogation technique that appears to be cruel, inhuman, or degrading as
defined in US law; or impermissibly coercive, or is not listed in this manual,
is prohibited and should be reported immediately to the chain of command or
other appropriate channels for resolution. Orders given to treat detainees
inhumanely are unlawful. Every interrogator must know how to respond to
orders that the individual interrogator perceives to be unlawful
(seeparas 5-80 through 5-82).
M-19. If the order is a lawful order, it should be obeyed. Failure to obey a
lawful order is an offense under the IICMJ.
COMMAND POLICY AND OPERATION ORDERS
M-20. The provisions of this appendix must be written into COCOM policy
and/or OPORDs when using the restricted interrogation technique of
separation.
MEDICAL
M-21. Commanders are responsible to ensure that detainees undergoing
separation during interrogation receive adequate health care as described in
greater detail in paragraph 5-91.
TRAINING AND CERTIFICATION
M-22. Only those DOD interrogators who have been trained and certified by
the United States Army Intelligence Center (USAIC), or other Defense
HUMINT Management Offrce (DHMO) designated agency, in accordance
with guidance established by USD(I) to use separation, are authorized to
employ this technique. The training must meet certification standards
established by the Defense HUMINT Manager in coordination with
applicable DOD components. Properly trained and certified contract
interrogators are authorized to initiate interrogation plans that request the
use separation, and, once the plan is approved, to employ the technique in
accordance with the provisions of this appendix and Appendix K. Contract
interrogators will always be utilized under the supervision and control of US
government or military personnel (see para K-19 and K- 2o). Non-DOD
personnel conducting interrogations in DOD facilities must be certified by
their agency.and separately gain approval (through their agency's chain of
command) for the additional technique described in this appendix. They must
present this written certification and agency approval to the COCOM before
use is permitted (seepara 5-55).

PLANNING
M-23. Planning for the use of separation must include-
. An interrogation plan that addressessafeguards, limits of duration,
interval between applications, termination criteria, and presenceof
qualified medical personnel for emergencies(see Figure M-2).
o A provision for detainees to be checkedperiodically in accordancewith
command health care directives, guidance, and SOPs applicable to all
detainees.
. A legal review.

M-6 6 September2006

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 26 of 30


FM 2-22. 3

Page _ of ___

INTERROGATION PLAN
F O RU S E O F
RESTRICTEDSEPARATIONTECHN]QUE
THISFORM
ISTOBECOMPLETEDINCONJUNCTIOH WITH,
AilDMAINTAINED
WITH,
THEBASE
INTERROGATION
PLAN,FIGURE
10.3,FM222.3.USEADDTTIONAL
FORilIS
ASNEDED.
C O C O I N i S E CODREDFE O
R RP L A N
#:
R E S T R I C TDET E C HN I Q UE S T M T E G Y :
JUSTIFICATION:

U S E DI N C O N J U N C T I OW
I II T HT H E F O T L O W I N A
GP P R O A C H
STRATEG]ES:

SPECIFIC
D E S C R I P T I OOTF{ T H E S E P A R A T I OTNE C H N I Q U E M P L O Y M E NSTT M T E G Y :

P R O P O S ED
DU R A T I O N : R E Q U I R EB
DR E A K :

S P E C I F ISCA F E G U A R DASH DO V E R S I G H T TBOE E M P L O Y E D :


GUARDS

INTERROGATORS:

OTHER:

DOCUMENTATIO
ONF U S E :( P H O T O SV, I D E ON
, OTES)

T E R M I N A T INOC R I T E R I A
TECHNIQ
UE :

REVIEW:lnterrogationSupervisor:_ _ Ml Unit Cdr:_____ GO/OFSJA

APPROVALAUTHORITY: PRINTEDNAME DTGOFAPPROVAL


G E N E R AO
L F F I C E F / F I AO
GF F I C E R
APPROVEF
DO R DURATIOH

M I U N I TC O M M A N D E R

INTERROGATION SUPERVISOR

Figure M-2.Installation Plan for Restricted Separation Techniques.

6 September 2006 M-7

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 27 of 30


FM 2-22.3

. Documentation of the use of separation, including photographs and/or


videotaping, if appropriate and available (see para 5-54).
M-24. Separation is only authorized for use in interrogation operations, not
for other Military Source Operations. Separation may be approved for use in
combination with authorized approach techniques. General controls and
safeguards contained in this manual must be applied during the use
separation, in conjunction with the safeguards specific to the separation
technique. Planning must consider the possible cumulative effect of
using multiple techniques and take into account the age, sex, and
health of detainees, as appropriate.

TECHNICAL CONTROL
M-25. Requests for approval of separation will be forwarded (for information
purposes only) via secure means through intelligence technical channels at
the same time as they are sent through command channels. Intelligence
technical channels are those used for forwarding of source information and
technical parameters of collection operations from lower to higher and
passing tasking specifics,source information, technical control measures, and
other sensitive information from higher to lower. The technical chain extends
from the HCT through the OMT and Operations Section (if one exists) to the
CIJIGISZX.

APPLICATION OF SEPARATION TECHNIQUE


M-26. The purpose of separation is to deny the detainee the opportunity to
communicate with other detainees in order to keep him from learning
counter-resistance techniques or gathering new information to support a
cover story, decreasing the detainee's resistance to interrogation. Separation
does not constitute sensory deprivation, which is prohibited. For the purposes
of this manual, sensory deprivation is defined as an arranged situation
causing significant psychological distress due to a prolonged absence, or
significant reduction, of the usual external stimuli and perceptual
opportunities. Sensory deprivation may result in extreme anxiety,
hallucinations, bizarre thoughts, depression, and anti-social behavior.
Detainees will not be subjected to sensory deprivation.
M-27. Physical separation is the best and preferred method of separation. As
a last resort, when physical separation of detainees is not feasible, gogglesor
blindfolds and earmuffs may be utilized as a field expedient method to
generate a perception of separation.
M-28. Objectives:
. Physical Separation: Prevent the detainee from communicating with
other detainees (which might increase the detainee's resistance to
interrogation) and foster a feeling of futility.
. Field Expedient Separation: Prolong the shock of capture. Prevent the
detainee from communicating with other detainees (which might
increase the detainee's resistance to interrogation) and foster a feeling
of futilitv.

M-8 6 September2006

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 28 of 30


FM 2-22. 3

M-29. Safeguards:
o Duration: Self-explanatory.
. Physical Separation: Limited to 30 days of initial duration.
r Field Expedient Separation: Limited to L2 hours of initial
duration at the initial interrogation site. This limit on duration does
not include the time that gogglesor blindfolds and earmuffs are used
on detainees for security purposes during transit and evacuation.
. Oversight Considerations for Field Expedient Separation:
' The intended use of field expedient means of separation must be
specified on the interrogation plan that is submitted to the GO/FO
for approval.
' Detainees must be protected from self-injury when field expedient
means of separation are used. The effect of the application of field
expedient separation means on the detainee must be monitored to
detect any possible health concerns.
M-30. The following safeguards apply to both Physical Separation and Field
Expedient Separation.
o Break: Additional periods of separation will not be applied without the
approving GO/FO's determination of the length of a break between
iterations.
o Extension:
' Physical Separation Method: Extensions of this technique past 30
days must be reviewed by the servicing SJA and approved by the
original approving GO/FO or his replacement in that position.
' Field Expedient Method: Extensions past 12 hours of initial
duration at the initial interrogation site must be reviewed by the
servicing SJA and approved by the original approving/replacement
GO/FO.
' Medical: Detainees will be checked periodically in accordancewith
command health care directives, guidance, and SOPs applicable to
all detainees.
' Custody and Control: The interrogation chain of command must
coordinate the interrogation plan with the Detention Operations
Commander. The Detention Operations Commander (in conjunction
with the MI commander) may convene a multidiscipline custody and
control oversight team including, but not limited to, MP, MI, BSC (if
available), and legal representatives. The team can advise and
provide measures to ensure effective custody and control in
compliance with the requirements of applicable law and policy.
. Oversight Considerations:
' IJse of hoods (sacks) over the head, or of duct tape or adhesive tape
over the eyes, as a separation method is prohibited.
' If separation has been approved, and the interrogator subsequently
determines that there may be a problem, the interrogator should
seek further guidance through the chain of command before applying
the technique.

6 September 2006 M-9

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 29 of 30


FM 2-22.3

. Care should be taken to protect the detainee from exposure (in


accordance with all appropriate standards addressing excessive or
inadequate environmental conditions) to-
- Excessivenoise.
- Excessivedampness.
- Excessiveor inadequate heat,light,or ventilation.
- Inadequatebeddingandblankets.
- Interrogationactivityleadership will periodicallymonitorthe
applicationof this technique.
. tlse of separation must not preclude the detainee getting four hours
of continuous sleep every 24 hours.
. Oversight should account for moving a detainee from one
environment to another (thus a different location) or arrangements
to modifu the environment within the same location in accordance
with the approved interrogation plan.
M-3 1. SuggestedApproach Combinations:
. Futility.
o Incentive.
o Fear Up.

M-10 6 September2006

Case 4:07-cr-00575-HCE Document 21-4 Filed 06/26/2007 Page 30 of 30

Potrebbero piacerti anche