Covert interrogation can refer to several interrogation techniques.[1] An example is the covert questioning of a subject in a neutral public place where people innocuously gather, with the intention of the unsuspecting subject not comprehending that the interrogation is occurring. The covert interrogator may present themselves toward an interrogation subject in a friendly manner, while concealing the ulterior motive of subtly questioning them. In this manner, law enforcement and military agencies can collect intelligence about various suspects, such as criminals and terrorists. Many additional types and techniques of covert interrogation and surveillance exist, and covert interrogation can occur for other various reasons, and by other types of actors.
The term covert interrogation also refers to interrogation techniques that may be overt in manner, but are hidden[2] from public, media, governmental, and other types of third-party oversight, for various reasons.
Devices
editWhen the subject is unaware of it, the forensic examination of a subject's mobile phone and records is a type of covert interrogation.[3] This pertains to other devices, such as computers, and modes of communication, such as telephone records.
By country
editUnited States
editThe United States government has engaged in the covert interrogation, surveillance and deportation of terrorism suspects.[4]
Black site covert interrogation facilities created and maintained by the CIA have existed.[5]
See also
edit- Agent provocateur – Person who incites others to commit incriminating acts
- Baiting
- Black project – Highly classified military project
- Black site – Clandestine detention center
- Enhanced interrogation techniques – Euphemism for program of systematic torture by U.S. government
- Entrapment – Legal doctrine
- Frameup – Falsely prove someone guilty of a crime
- Informant – Person who provides information
- Intelligence assessment – Evaluation of sensitive state, military, commercial, or scientific information
- Labor spy
- Lidar (laser radar) – offers potential for covert surveillance[6]
References
edit- ^ "Congressional Record: Proceedings and Debates of the ... Congress". Volume 114, Part 10. U.S. Government Printing Office. 1968. p. 12986. Retrieved 26 March 2015.
- ^ McCoy, A.W. (2012). Torture and Impunity: The U.S. Doctrine of Coercive Interrogation. Critical Human Rights. University of Wisconsin Press. p. 86. ISBN 978-0-299-28853-2.
- ^ Buckley, J. (2013). Managing Intelligence: A Guide for Law Enforcement Professionals. Taylor & Francis. p. 374. ISBN 978-1-4665-8642-0.
- ^ Purse, L. (2011). Contemporary Action Cinema. Edinburgh University Press. ISBN 978-0-7486-8840-1.
- ^ Trenear-Harvey, G.S. (2014). Historical Dictionary of Intelligence Failures. Historical Dictionaries of Intelligence and CounterIntelligence. Rowman & Littlefield Publishers. p. xxii. ISBN 978-1-4422-3274-7.
- ^ Javidi, B. (2001). Smart Imaging Systems. Press Monographs. SPIE Press. p. 70. ISBN 978-0-8194-3735-8.
Further reading
edit- Newburn, T.; Williamson, T.; Wright, A. (2012). Handbook of Criminal Investigation. Taylor & Francis. p. 127. ISBN 978-1-136-30823-9.
- Cools, M.; Easton, M.; Pauwels, L. (2010). EU and International Crime Control: Topical Issues. GofS research paper series. Maklu. p. 189. ISBN 978-90-466-0328-4.
- Bakir, V. (2010). Sousveillance, Media and Strategic Political Communication: Iraq, USA, UK. Bloomsbury. p. 83. ISBN 978-0-8264-3009-0.
- Pieslak, J.R. (2009). Sound Targets: American Soldiers and Music in the Iraq War. Indiana University Press. p. 202. ISBN 978-0-253-35323-8.