Covert interrogation

Last updated

Covert interrogation can refer to several interrogation techniques. [1] An example is the covert questioning of a subject in a neutral public place where people innocuously gather, with the intention of the unsuspecting subject not comprehending that the interrogation is occurring. The covert interrogator may present themselves toward an interrogation subject in a friendly manner, while concealing the ulterior motive of subtly questioning them. In this manner, law enforcement and military agencies can collect intelligence about various suspects, such as criminals and terrorists. Many additional types and techniques of covert interrogation and surveillance exist, and covert interrogation can occur for other various reasons, and by other types of actors.

Contents

The term covert interrogation also refers to interrogation techniques that may be overt in manner, but are hidden [2] from public, media, governmental, and other types of third-party oversight, for various reasons.

Devices

When the subject is unaware of it, the forensic examination of a subject's mobile phone and records is a type of covert interrogation. [3] This pertains to other devices, such as computers, and modes of communication, such as telephone records.

By country

United States

The United States government has engaged in the covert interrogation, surveillance and deportation of terrorism suspects. [4]

Black site covert interrogation facilities created and maintained by the CIA have existed. [5]

See also

Related Research Articles

<span class="mw-page-title-main">Abu Zubaydah</span> Saudi Arabian Guantanamo detainee

Abu Zubaydah is a Palestinian citizen and alleged terrorist born in Saudi Arabia currently held by the U.S. in the Guantanamo Bay detention camp in Cuba. He is held under the authority of Authorization for Use of Military Force Against Terrorists (AUMF).

<span class="mw-page-title-main">MKUltra</span> CIA program involving illegal experimentation on human subjects (1953–1973)

Project MKUltra was an illegal human experimentation program designed and undertaken by the U.S. Central Intelligence Agency (CIA) and intended to develop procedures and identify drugs that could be used during interrogations to weaken people and force confessions through brainwashing and psychological torture. It began in 1953 and was halted in 1973. MKUltra used numerous methods to manipulate its subjects' mental states and brain functions, such as the covert administration of high doses of psychoactive drugs and other chemicals without the subjects' consent, electroshocks, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, and other forms of torture.

<span class="mw-page-title-main">Human intelligence (intelligence gathering)</span> Intelligence gathered by means interpersonal contact

Human intelligence is intelligence gathered by means of human sources and interpersonal contact. It is distinct from more technical means of intelligence gathering such as signal interception. HUMINT can be conducted in a variety of ways, including via espionage, reconnaissance, interrogation, or witness interviews.

<span class="mw-page-title-main">Interrogation</span> Interviews by police, military or intelligence personnel

Interrogation is interviewing as commonly employed by law enforcement officers, military personnel, intelligence agencies, organized crime syndicates, and terrorist organizations with the goal of eliciting useful information, particularly information related to suspected crime. Interrogation may involve a diverse array of techniques, ranging from developing a rapport with the subject to torture.

<span class="mw-page-title-main">George Tenet</span> American Central Intelligence Agency Director (born 1953)

George John Tenet is an American intelligence official and academic who served as the Director of Central Intelligence (DCI) for the United States Central Intelligence Agency, as well as a Distinguished Professor in the Practice of Diplomacy at Georgetown University.

A covert operation or undercover operation is a military or police operation involving a covert agent or troops acting under an assumed cover to conceal the identity of the party responsible. Some of the covert operations are also clandestine operations which are performed in secret and meant to stay secret, though many are not.

Resistance to interrogation, RTI or R2I is a type of military training to British and other NATO soldiers to prepare them, after capture by the enemy, to resist interrogation techniques such as humiliation and torture.

<span class="mw-page-title-main">Phoenix Program</span> CIA-led effort to eliminate the Viet Cong during the Vietnam War

The Phoenix Program was designed and initially coordinated by the United States Central Intelligence Agency (CIA) during the Vietnam War, involving the American, Australian, and South Vietnamese militaries. In 1969, CIA responsibility was phased out, and the program was put under the authority of the Civil Operations and Revolutionary Development Support (CORDS).

<span class="mw-page-title-main">Waterboarding</span> Torture method simulating drowning

Waterboarding is a form of torture in which water is poured over a cloth covering the face and breathing passages of an immobilized captive, causing the person to experience the sensation of drowning. In the most common method of waterboarding, the captive's face is covered with cloth or some other thin material and immobilized on their back at an incline of 10 to 20 degrees. Torturers pour water onto the face over the breathing passages, causing an almost immediate gag reflex and creating a drowning sensation for the captive. Normally, water is poured intermittently to prevent death; however, if the water is poured uninterruptedly it will lead to death by asphyxia. Waterboarding can cause extreme pain, damage to lungs, brain damage from oxygen deprivation, other physical injuries including broken bones due to struggling against restraints, and lasting psychological damage. Adverse physical effects can last for months, and psychological effects for years. The term "water board torture" appeared in press reports as early as 1976.

Hooding is the placing of a hood over the entire head of a prisoner. Hooding is widely considered to be a form of torture; one legal scholar considers the hooding of prisoners to be a violation of international law, specifically the Third and Fourth Geneva Conventions, which demand that persons under custody or physical control of enemy forces be treated humanely. Hooding can be dangerous to a prisoner's health and safety. It is considered to be an act of torture when its primary purpose is sensory deprivation during interrogation; it causes "disorientation, isolation, and dread." According to the International Committee of the Red Cross, hooding is used to prevent a person from seeing, to disorient them, to make them anxious, to preserve their torturer's anonymity, and to prevent the person from breathing freely.

Ghost detainee is a term used in the executive branch of the United States government to designate a person held in a detention center, whose identity has been hidden by keeping them unregistered and therefore anonymous. Such uses arose as the Bush administration initiated the War on Terror following the 9/11 attacks of 2001 in the United States. As documented in the 2004 Taguba Report, it was used in the same manner by United States officials and contractors of the Joint Interrogation and Debriefing Center at the Abu Ghraib prison in Iraq in 2003–2004.

<span class="mw-page-title-main">Tradecraft</span> Espionage techniques

Tradecraft, within the intelligence community, refers to the techniques, methods, and technologies used in modern espionage (spying) and generally as part of the activity of intelligence assessment. This includes general topics or techniques, or the specific techniques of a nation or organization.

Extrajudicial prisoners of the United States, in the context of the early twenty-first century War on Terrorism, refers to foreign nationals the United States detains outside of the legal process required within United States legal jurisdiction. In this context, the U.S. government is maintaining torture centers, called black sites, operated by both known and secret intelligence agencies. Such black sites were later confirmed by reports from journalists, investigations, and from men who had been imprisoned and tortured there, and later released after being tortured until the CIA was comfortable they had done nothing wrong, and had nothing to hide.

The U.S. Army and CIA interrogation manuals are seven controversial military training manuals which were declassified by the Pentagon in 1996. In 1997, two additional CIA manuals were declassified in response to a Freedom of Information Act (FOIA) request filed by The Baltimore Sun. The manuals in question have been referred to by various media sources as the "torture manuals".

Covert hypnosis is an attempt to communicate with another person's unconscious mind without informing the subject that they will be hypnotized. It is also known as conversational hypnosis or sleight of mouth.. It is a term largely used by proponents of neuro-linguistic programming (NLP), a pseudoscientific approach to communication and interaction.

There are cases, both documented and alleged, that involve the usage of torture by members of the United States government, military, law enforcement agencies, intelligence agencies, health care services, and other public organizations both in and out of the country.

"Enhanced interrogation techniques" or "enhanced interrogation" was a program of systematic torture of detainees by the Central Intelligence Agency (CIA), the Defense Intelligence Agency (DIA) and various components of the U.S. Armed Forces at remote sites around the world—including Bagram, Guantanamo Bay, Abu Ghraib, and Bucharest—authorized by officials of the George W. Bush administration. Methods used included beating, binding in contorted stress positions, hooding, subjection to deafening noise, sleep disruption, sleep deprivation to the point of hallucination, deprivation of food, drink, and medical care for wounds, as well as waterboarding, walling, sexual humiliation, rape, sexual assault, subjection to extreme heat or extreme cold, and confinement in small coffin-like boxes. A Guantanamo inmate's drawings of some of these tortures, to which he himself was subjected, were published in The New York Times. Some of these techniques fall under the category known as "white room torture". Several detainees endured medically unnecessary "rectal rehydration", "rectal fluid resuscitation", and "rectal feeding". In addition to brutalizing detainees, there were threats to their families such as threats to harm children, and threats to sexually abuse or to cut the throat of detainees' mothers.

This article deals with the activities of the Central Intelligence Agency (CIA) of the federal government of the United States that constitute violations of human rights.

<span class="mw-page-title-main">Interrogational torture</span> Use of torture to obtain information in interrogation

Interrogational torture is the use of torture to obtain information in interrogation, as opposed to the use of torture to extract a forced confession, regardless of whether it is true or false. Torture has been used throughout history during interrogation, although it is now illegal and a violation of international law.

References

  1. "Congressional Record: Proceedings and Debates of the ... Congress". Volume 114, Part 10. U.S. Government Printing Office. 1968. p. 12986. Retrieved 26 March 2015.
  2. McCoy, A.W. (2012). Torture and Impunity: The U.S. Doctrine of Coercive Interrogation. Critical Human Rights. University of Wisconsin Press. p. 86. ISBN   978-0-299-28853-2.
  3. Buckley, J. (2013). Managing Intelligence: A Guide for Law Enforcement Professionals. Taylor & Francis. p. 374. ISBN   978-1-4665-8642-0.
  4. Purse, L. (2011). Contemporary Action Cinema. Edinburgh University Press. ISBN   978-0-7486-8840-1.
  5. Trenear-Harvey, G.S. (2014). Historical Dictionary of Intelligence Failures. Historical Dictionaries of Intelligence and CounterIntelligence. Rowman & Littlefield Publishers. p. xxii. ISBN   978-1-4422-3274-7.
  6. Javidi, B. (2001). Smart Imaging Systems. Press Monographs. SPIE Press. p. 70. ISBN   978-0-8194-3735-8.

Further reading