Army field manual 19 interrogation methods


















More In Your Army. In change, Army to allow file downloads for Army email on personal devices Users should see changes take effect "in the next few days," said the Army's top IT official. Hunt Companies settles housing fraud claim at Dover Air Force Base A whistleblower lawsuit alleged Hunt Companies officials submitted false maintenance information to the Air Force in order to get higher performance incentive payouts.

In Other News. Cyber innovation and partnerships are key to future deterrence Most people naturally think of deterrence in terms of weaponry. GI Bill eligibility for Guard, reserve would expand under House-passed measure The bill still must be approved by the Senate before becoming law.

When necessary, the receiving unit initiates a CED trace action. Trace actions are initiated on all missing CEDs, captured document tags, and on all information missing from the captured document tag. This corrective action can be completed swiftly if that unit's captured document log was filled out completely. The captured document log, ingeneral, must contain the entries listed below:. File number a sequential number to identify the order of entry.

J DTG and place of capture as listed onthe captured document tag. Identity of the capturing units as listed on the captured document tag.

O Remarks other information that canassist the unit in identifying the CEDto include processing codes. Accountability for the CED should beestablished at each echelon once the actions described above have been accomplished. Communications and Cryptographic Documents. CEDs containing communications orcryptographic information are handled assecret material and are evacuated through secure channels to the technical control and analysis element TCAE. Exploitation includes-. CED screening to determine potentialintelligence value.

CEDs are processed and exploited as soonas possible within the constraints of theunit's mission. Intelligenceunits ensure that there is no delay in the exploitation of CEDs. Qualified personnel or document copying facilities should be available to handle CEDs, and personnel should be available to exploit the volume ortype of documents concerned. If not, the documents are forwarded immediately to the next higher echelon.

Document Categories Category A. The examiner then resumes screening operations. Category B. Once a document is identified as categoryB, it is considered to be classified secret. This is done to limit the number of peoplehaving knowledge of either the capture or its contents.

In every case, category B documents will betransferred through secure channels to the TCAE as soon as possible. Category C. A category C document may be of interest or of value to other agencies. When identified as category C, it requires exploitation, regardless of the content. Category D. Category D documents appear to contain only information that is of no intelligence value. This is accomplished at EAC. Category D documents are to be disposed of as directed by the appropriate authority.

Special Document Handling. Technical Documents. Air Force-Related Documents. Maps and Charts of Enemy Forces. Navy-Related Documents. Documents taken from ships code books, call signs, frequency tables, identification symbols, and so forth are forwarded without delay tothe nearest Navy headquarters.

Recording Document Category. The entry includes abrief description of the CED. This description-. Identifies the CED by type sound recording, written material, painting,engraving, imagery, and so forth. Specifies the physical construction ofthe CED typed, printed, handwritten,tape cassette, photographs, film, andso forth. Gives some indication of the size number of pages, rolls of film, cassette, and so forth.

The translatormust be able to translate the document. Types of Translations. Full Translation. A full translation is one in which the entire document is translated. It is very manpower- and time-intensive, Extract Translation. For instance, a technical intelligence analyst may decide that a few paragraphs in the middle of apage helicopter maintenance manual merit translation and a full translation of the manual is not necessary.

Therefore, hewould request an extract translation of theportion of the text in which he has an interest. Summary Translation. The translator must balance the need for complete exploitation of the document against the time available in combat operations.

A summary translationmay also be used by translators working in languages in which they have not been formally trained. For instance, a Russianlinguist may not be able to accurately deliver a full translation of a Bulgarianlanguage document. Translation Reports. My dear Serezhen'ka: It has been a long time since I received a letter from you.

How are and where are you? The last time you wrote that fighting was going on around you all the time, and this worries me alot. Take care of yourself. There have been many changes at home. They make tanks there, but the sign over the entrance says this is a sugar plant.

I don't know why they do this. At the school where I work, we were also told to go and work at the same plant. They are going to close the school.

Everyone has either to go to the front or work in the war industry. This is necessary in order to speed up the victory over the enemy of our country. I would be more at ease if I knew that you are alive and well. Please write as soon as you can. The priority for the preparation of translation reports is-.

Category A. O Document description including number of pages, type of document, and enemy identification number. DTG document was received at the element preparing the report.

O Place document was captured. O Classification and downgrading instructions, according to AR Dissemination and Records. Recording in Captured Document Log. The translator records each exploitation step taken in the captured document log.

Reports Dissemination and Records. One copy is placed in the interrogation element's files. The other accompanies the CED when it is evacuated. The original CED isforwarded through evacuation channels. Even when copies of an unexploited CED cannot be made, the original CED is still forwarded through evacuation channels without delay. If a document is not sent to the element most capable of exploiting it, time will be lost.

Any time lost in exploiting the document may reduce or even negate the value of the information. CEDs are normally evacuated from echelon to echelon through the intelligence organizational chain. The capturing unitevacuates the CEDs to the first intelligence section, usually the battalion S2.

Depending on the type of documents they may, then, be evacuated to the National Center for Document Exploitation. Take care to protect the document from weather, soil, and wear. Interrogators and translators can exploit CEDs at every echelon and will make an attempt to exploit CEDs within their expertise and technical support constraints. Some CEDs are evacuated to different elements based upon the information con-tained and the type of document concerned.

Direct evacuation to an element outside the chain of command takes place at the lowest practical echelon.

When transportation assets are limited, CEDs are evacuated according to priority. The priority is the category assigned to the CED.

CEDs that are not evacuated are held until the next transportation arrives. These remaining CEDs are combined with anyother CEDs of the same category that have arrived and have been processed in the meantime. When determining evacuation priorities, interrogators consider all CEDs that are ready for evacuation. A package of documents contains documents of only one category. All unscreened CEDs are handled as category C documents, but they are not packaged with screened category C documents.

CEDs in a single package must have the samedestination. The exact format for a docu-ment transmittal is a matter of local SOP, but it should contain the information listed below: C The identity of the element to which the CEDs are to be evacuated. If not screened, NA is circled. All CEDs being evacuated must be accompanied with the appropriate-. These large groupings can then be broken down into smaller groups. Each of these smaller groupings consists of CEDs that were-.

Captured by the same unit. The documents captured with a sourceplay a very important role in the interroga-tion process and can contain reportable.

The interrogator uses various pieces of information in forming his interrogationplan. Guidelines for the disposition of thesource's documents and valuables are set by international agreement and discussed inmore detail in AR and FM Additionally, one way the source's trust andcontinued cooperation can be gained is through fair and equitable handling of hispersonal possessions. Whenthe interrogation element assumes controlof documents, they process them accordingto established procedures.

When documents are captured with a source, the immediate reaction is to take In general, this is good, but there is one major exception. When documents are taken from a source, it is necessary to ensure the source from whom they were taken can be identified. The easiest way to accomplish this is with the source's captive tag see standardized captive tag in Appendix D. The bottom portion of the tag is designed to be used for marking equipment or documents. Confiscation Documents confiscated from a source are taken away with no intention of returning them.

The intelligence value of the document should be weighed against the document's support in the interrogation of the source. Category A documents require exploitation and should be copied. If copying facilities are not available, a decision should be made on whether to evacuate the document with the source or evacuate it separately.

Impounded Impounded CEDs are taken away with the intention of returning them at a later time. When a document is impounded, the source must be given a receipt. The receipt must contain a list of the items impounded and the legible name, rank, and unit of the person issuing the receipt. A copy will beprovided the source. Returned Returned CEDs are usually personal in nature, taken only for inspection and information of interest, and immediately given back to the source. Copies of such papers may be made and forwarded if considered appropriate.

An identification document must be returned to the source. Final disposition of these documents maynot he made until the source is evacuated at least as far as the corps holding area.

Some documents captured with a source will aidin the interrogation of the source. Others, particularly category A documents, shouldhe copied and evacuated separately. One copy can then remain with the source to aid in the interrogation, and the other can be translated and exploited separately. This ismore easily done when the interrogation. For more efficient exploitation of CEDsand sources, documents captured with a source are normally evacuated with the source.

A document of great significancemay be evacuated ahead of the source, but areproduction should be made and kept withthe source.

If reproduction is not possible,the captured document tags should beannotated as to where the document was sent. The bottom portion isused to list documents captured with the source. These documents are categorized as category A, B, C, or D. Category C documents are exploited.

A category C document may also requirecopying and evacuation. Official documentsshould be evacuated through document evacuation channels. If they would aid inthe interrogation of a source, personaldocuments may require similar copying.

Skip to main content. The Afterlives of Government Documents. Friday, May 8, Thursday, December 30, Conversely, the interrogator should not accept all DODDOA information as the truth: he views all information obtained with a degree of doubt.

Neutral and Nonpartisan A neutral and nonpartisan source is cooperative to a limited degree. Hostile and Antagonistic A hostile and antagonistic source is most difficult to interrogate. A firm,deliberate, and businesslike manner of r DODD0A speech and attitude may create a proper environment for a successful interrogation. During the questioning phase, OB elements assist the interrogator in verifying the accuracy of the information obtained and can be used as an effective tool to gain new DODD0A information.

Operate across the entire width and depth of the battlefield. Synchronize the operations of their subordinates. Specific Information Requirements Tactical intelligence operations beginwith the commander. Battalion Specific Information Requirements Battalion commanders need specific information and accurate intelligence from the brigade and higher headquarters to plan their operations.

Disposition and strength of enemy de-fensive positions and fortifications. Possibility of special weapons. Probability of enemy use of NBC weapons.

Air threat. Enemy use of NBC. Location of REC units. Location of reserve maneuver forces. Regimental and battalion CPs. Fire direction control centers. O Command observation posts. Radio and radar reconnaissance sites. REC sites. Assisting in the development of friendly force profiles.

What specific means of C3 are beingused by the enemy? Information that describes the tactics in use, or planned for use, by specific enemy units. Combat effectiveness. Information that describes the ability and fighting quality of specific enemy units. Question Guards Screeners should question guards about the source. Have excessive identification documents. Have modified identification documents.

Possess unusually large amounts of cash or valuables. Attempt to avoid checkpoints. Are on the black, gray, or white list. Interrelation of Planning and Preparation and Approach The planning and preparation phase andthe approach phase are interrelated.

He may ask questions, but the [interrogator] should not answer until he is ready to break the silence. The source may blurt out questions such as, "Come on now, what do you want with me? Was it your idea? The United States government may no longer be permitted to use dogs, cold temperatures or waterboarding to get terrorist suspects to reveal their plans, but the Army Field Manual offers a myriad of other interrogation methods that encourage U.

As official prescriptive military documents go, the Army Field Manual is surprisingly readable. Even if the United States doesn't torture, shouldn't its citizens know what the U. See A Photographic Farewell to Bush. Read "Extracts from an Interrogation Log". Send to Kindle. This manual is about interrogation operations. S Army Field Manual on. Share; He noted that the Army field manual contends that harsh interrogation is a The Army field manual in banned certainty about what is and is not.

Intelligence Collector Operations, carefully distinguishes While the U. Army and CIA interrogation manuals ipfs. Army field manual interrogation Army field manual interrogation U.



0コメント

  • 1000 / 1000