Covert interrogation
Covert interrogation can refer to several interrogation techniques.[1] An example is the covert questioning of a subject in a neutral public place where people innocuously gather, with the intention of the unsuspecting subject not comprehending that the interrogation is occurring. The covert interrogator may present themselves toward an interrogation subject in a friendly manner, while concealing the ulterior motive of subtly questioning them. In this manner, law enforcement and military agencies can collect intelligence about various suspects, such as criminals and terrorists. Many additional types and techniques of covert interrogation and surveillance exist, and covert interrogation can occur for other various reasons, and by other types of actors.
The term covert interrogation also refers to interrogation techniques that may be overt in manner, but are hidden[2] from public, media, governmental, and other types of third-party oversight, for various reasons.
Devices
When the subject is unaware of it, the forensic examination of a subject's mobile phone and records is a type of covert interrogation.[3] This pertains to other devices, such as computers, and modes of communication, such as telephone records.
By country
United States
The United States government has engaged in the covert interrogation, surveillance and deportation of terrorism suspects.[4]
Black site covert interrogation facilities created and maintained by the CIA have existed.[5]
See also
- Agent provocateur
- Baiting
- Black project
- Enhanced interrogation techniques
- Entrapment
- Frameup
- Informant
- Intelligence assessment
- Labor spy
- Lidar (laser radar) – offers potential for covert surveillance[6]
References
- ↑ "Congressional Record: Proceedings and Debates of the ... Congress". Volume 114, Part 10. U.S. Government Printing Office. 1968. p. 12986. Retrieved 26 March 2015.
- ↑ McCoy, A.W. (2012). Torture and Impunity: The U.S. Doctrine of Coercive Interrogation. Critical Human Rights. University of Wisconsin Press. p. 86. ISBN 978-0-299-28853-2.
- ↑ Buckley, J. (2013). Managing Intelligence: A Guide for Law Enforcement Professionals. Taylor & Francis. p. 374. ISBN 978-1-4665-8642-0.
- ↑ Purse, L. (2011). Contemporary Action Cinema. Edinburgh University Press. ISBN 978-0-7486-8840-1.
- ↑ Trenear-Harvey, G.S. (2014). Historical Dictionary of Intelligence Failures. Historical Dictionaries of Intelligence and CounterIntelligence. Rowman & Littlefield Publishers. p. xxii. ISBN 978-1-4422-3274-7.
- ↑ Javidi, B. (2001). Smart Imaging Systems. Press Monographs. SPIE Press. p. 70. ISBN 978-0-8194-3735-8.
Further reading
- Newburn, T.; Williamson, T.; Wright, A. (2012). Handbook of Criminal Investigation. Taylor & Francis. p. 127. ISBN 978-1-136-30823-9.
- Cools, M.; Easton, M.; Pauwels, L. (2010). EU and International Crime Control: Topical Issues. GofS research paper series. Maklu. p. 189. ISBN 978-90-466-0328-4.
- Bakir, V. (2010). Sousveillance, Media and Strategic Political Communication: Iraq, USA, UK. Bloomsbury. p. 83. ISBN 978-0-8264-3009-0.
- Pieslak, J.R. (2009). Sound Targets: American Soldiers and Music in the Iraq War. Indiana University Press. p. 202. ISBN 978-0-253-35323-8.