Taguba Report Annex 94: DOD Memo re: CJTF-7 Interrogation and Counter-Resistance Policy

Error message

  • Deprecated function: Return type of DBObject::current() should either be compatible with Iterator::current(): mixed, or the #[\ReturnTypeWillChange] attribute should be used to temporarily suppress the notice in require_once() (line 7 of /usr/home/documentafterliv/public_html/sites/all/modules/contrib/eck/eck.classes.inc).
  • Deprecated function: Return type of DBObject::next() should either be compatible with Iterator::next(): void, or the #[\ReturnTypeWillChange] attribute should be used to temporarily suppress the notice in require_once() (line 7 of /usr/home/documentafterliv/public_html/sites/all/modules/contrib/eck/eck.classes.inc).
  • Deprecated function: Return type of DBObject::key() should either be compatible with Iterator::key(): mixed, or the #[\ReturnTypeWillChange] attribute should be used to temporarily suppress the notice in require_once() (line 7 of /usr/home/documentafterliv/public_html/sites/all/modules/contrib/eck/eck.classes.inc).
  • Deprecated function: Return type of DBObject::valid() should either be compatible with Iterator::valid(): bool, or the #[\ReturnTypeWillChange] attribute should be used to temporarily suppress the notice in require_once() (line 7 of /usr/home/documentafterliv/public_html/sites/all/modules/contrib/eck/eck.classes.inc).
  • Deprecated function: Return type of DBObject::rewind() should either be compatible with Iterator::rewind(): void, or the #[\ReturnTypeWillChange] attribute should be used to temporarily suppress the notice in require_once() (line 7 of /usr/home/documentafterliv/public_html/sites/all/modules/contrib/eck/eck.classes.inc).

This memorandum establishes the interrogation and counter-resistance policy for security internees under the control of CJTF-7. It recognizes that security internees who are civilians and who are detained pursuant to Articles 5 and 78 of the Geneva Convention of August 12, 1949 have certain rights and protections. It approve the use of specified interrogation and counter-resistance approaches, and provides for the segregation of security internees, which may be required in many instances to ensure the success of interrogations and to prevent the sharing of interrogation methods among internees.

Doc_type: 
Non-legal Memo
Doc_date: 
Sunday, October 12, 2003
Doc_rel_date: 
Monday, October 18, 2004
Doc_text: 

HEADQUARTERS
COMBINED JOINT TASK FORCE SEVEN
BAGHDAD IRAQ
APO AE 09335 REP1.1 1( )

ITENTIO\ 12 OCT 2003
-
MEMORANDUM FOR
C2. Combined Joint Task Force Seven, Baghdad. Iraq 09335 C3. Comhrned Joint Task Force Seven. Baghdad. Iraq 09335 Commander. 205th Military Intelligence Brigade. Baghdad. Iraq 09335
SUBJECT: CJTF-7 Interrogation and Counter-Resistance Policy
1 i...S.I.:41Z,4-1;his memorandum establishes the interrogation and counter-resistance policy for security internees under the control of CJTF-7. Security internees are civilians who are detained pursuant to Articles 5 and 78 of the Geneva Convention Relative to the Protection of Civilian Persons in 'lime of War of August 12. 1949 (hereinafter. Geneva Convention).
I approve the use of specified interrogation and counter-resistance approaches A as described in Enclosure I. relating to security internees. subject to the following:
1.,se of these approaches is limited to interrogations of security internees under the control of CJTI -7.
h.1•Sii‘hif-rThese approaches must be used in combination with the safeguards described in Enclosure 2.
crt4;4444E4 Segregation of security internees will be required in many instances to ensure the success of interrogations and to prevent the sharing of interrogation methods among internees. Segregation may also be necessary to protect sources from other detainees or otherwise provide for their security. Additionally, the Geneva Convention provides that security internees under definite suspicion of hostile to the security of Coalition forces shall, where absolute military necessity requires, he regarded as having forfeited rights of communication. Accordingly. these security internees may he segregated. I must approve segregation in all cases where such segregation will exceed 30 days in duration, whether consecutive nonconsecuitive. Submit written requests with supporting rationale tome through the CJTF-7 C2. A legal review from the CITF-7 SJA must accompany each request
d.-(4.:11.F.4 la employing each of the authorized approaches. the interrogator must maintain control of the interrogation: The interrogator should appear to be the one who controls all aspect's of the interrogation. to include the lighting, heating and configuration of the interrogation room, as well as the food. clothing and shelter given to the security internee.
--0€4444;1:1141Eakt...N:1.1-
CITF7-Cti
SUBJECT: CJTF-7 Interrogation and Counter-Resistance Policy
fc3~-"I'rRequests ibr use of approaches not listed in Enclosure I will be submitted to me through CJTF-7 ('2. and will include a description of the proposed approach and recommended safeguards. A legal review from the CJTF-7 SJ A will accompany each request
4.-1-1;±"N+-sNothing in this policy limits existing authority for maintenance of good order and discipline among persons under Coalition control.
5 1-S,‘,41+-1 This policy supersedes the CJTF-7 Interrogation and Counter-Resistance Policy signed on 14 September 2003.
PO(' cs MAJ UN‘iT1111111111111111, DSMENIMIIIMIO
2 Ends. RICARIDO S. SANCHEZ
I. Interrogation Approaches (SI) Lieutenant General, USA
2. General Sate ,, uarcls Commanding
CF: Commander. US Central Command
INTERROGATION APPROACHES (Security Internees)
1-S444-F-4-1,4se of the following approaches is subject to the application of the general safeguards provided in enclosure (2). Specific implementation guidance with respect to approaches A-c) is provided in U.S. Army Field Manual 34-52. Brigade Commanders may provide additional implementation guidance.
A-f-STDireci • Asking straightforward questions. The most effective of all approaches. it is the most simple and efficient approach to utilize.
B.-4,44N-FrIncentiveRemoval of Incentive: Providing a reward or removing a privilege. above and beyond those required by the Geneva Convention. Possible incentives may include favorite food items. changes in environmental quality. or other traditional or regional comforts not required by the Geneva Convention.
c. (s"xr . Emotional Love: flaying on the love a security internee has for an individual o group. May involve an incentive, such as allowing communication with the individual or group.
D i-S74111T'Eniotional Hate: Playing on the genuine hatred or desire for revenge a security internee has for an individual or group.

E.. tS-¦‘-'14f..4- Fear Lip Harsh: Significantly increasing the fear level in a security internee.
F. (S,`,'NF) !fear Up Mild: Moderately increasing the fear level in a security internee.
0.-e±ttit'rrReduced Fear: Reducing the fear level in a security internee or calming him by
convincing him that he will be properly and humanely treated.
H.-(-6+,,=?%P-rPnde and Ego Up: Flattering or boosting the ego of a security internee.

ride and Ego Down: Attacking or insulting the pride or ego of a security internee.
J.-$41444 Futility: Invoking the feeling in a security internee that it is useless to resist by playing on the doubts that already exist In his mind. K.4-S411,*-i-NAle know All: Convincing the security internee that the interrogator already knows the
answers to questions being asked.
L. f.54441.4.,,Estahlish Your Identity: Convincing the security internee that the interrogator has
mistaken the security internee for someone else. The security internee is encouraged to "clear his name. -
M.,-*/4+÷f--ftepetition: Continuously repeating the same question to the security internee during an interrogation to encourage full and candid answers to questions.
N. (S/il¦IFle and Dossier: Convincing security internee that the interrogator has a voluminous, damning and inaccurate file. which must be corrected by the security internee.
Enclosure 1
SEC RFTINOFORN,','XI
U. +.*S-h4+F—i-Ailuti and Jeff: An interrogation team consistine of a friendly and a harsh interrogator. This approach is designed to cause the security internee to have a feeling of hostility toward one interrogatoi and a feeling of gratitude toward the other.
P f- 71 Rapid Fire: Questioning in rapid succession without allowing security internee to answer questions fully.
, J1- ,',11encel Stating at the security internee to encourage discomfort.
Enclosure ]

GENERAL SAFEGUARDS
Appl 'cation of these interrogation approaches is subject to the following general
satetruards

(i ) limited to use by trained inten -ogation personnel: (ii) there is a reasonable basis to believe that the security internee possesses information of intelligence value: (nil the security internee is medically evaluated as a suitable candidate for interrogation (considering all approaches to he used in combination): (iv) interrogators are specifically trained for the approaches: (v) a specific interrogation plan. including reasonable safeguards, limits on duration. intervals between applications. termination criteria and the presence or availability of qualified medical personnel has • been developed: and (vi) there is appropriate supervision.
(1J The purpose of all interviews and interrogations is to get the most information from a securit ¦ internee with the least intrusive method, applied in a humane and lawful manner with sufficient oversight by trained investigators or interrogators. Interrogators and supervisory personnel will ensure uniform, careful, and safe conduct of interrogations.
-t-S7-6frririten-ogations must always be planned, deliberate actions that take into account factors such as a security internee's current and past performance in both detention and interrogation: a security internee's emotional and physical strengths and weaknesses; assessment of approaches and individual techniques that may be effective. strengths and weaknesses of interrogators: and factors which may necessitate the augmentation of personnel.
(S."NP) Ifiterrogation approaches are designed to manipulate the security internee's emotions and weaknesses to gain his willing cooperation. Interrogation operations are never conducted in a vacuum: they are conducted in close cooperation with the detaining units. Detention regulations and policies established by detaining units should be harmonized to ensure consistency with the interrogation policies of the intelligence collection unit. Such consistency will help to maximize the credibility of the interrogation team and the effectiveness of the interrogation. Strict adherence to such regulations, policies and standard operating procedures is essential.
4-S44F+Interrogators must appear to completely control the interrogation environment. It is important that interrogators be provided reasonable latitude to vary approaches depending on the security internee's cultural background. strengths, weaknesses, environment, extent of resistance training, as well as the urgency with which information believed in the possession of the secunty internee must he obtained.
-1-S744A-interrogators must ensure. the safety of security internees, and approaches must in no way endanger them. Interrogators will ensure that security internees are allowed adequate sleep; and that diets provide adequate food and water and cause no adverse medical or cultural effects. Where segregation is necessary, security internees must be monitored for adverse medical or psychological reactions. Should military working dogs be present during interrogations, they will be muzzled and under control 01 a handler at all times to ensure safety.
444LNEIiile approaches are considered individually within this analysis, it must be understood that in practice, approaches are usually used in combination. The title of a particular approach is not always fully descriptive of a particular approach. The cumulative effect of all approaches to be employed must he considered before any decision is made regarding approval of a particular interrogation plan.

Doc_nid: 
2588
Doc_type_num: 
63