Intel interrrogation Sept-1992
INTELLIGENCE
INTERROGATION
HEADQUARTERS, DEPARTMENT OF THE ARMY
magoniioraty (ANR-PL) ARN: Military DocumentsSection Room 1A518, Pentagon Washington, DC 20310-6050
DISTRIBUTION RESTRICTION: Approved for public release; distribution Is unlimited.
*FM34-52
FIELD MANUAL 34-52 Headquarters Department of the Anny Washington. DC. 28 September 1992
INTELLIGENCE INTERROGATION
Table of Contents
Page
PREFACE ........................................................iv
CHAPTER 1 .MILITARY INTELLIGENCE MISSIONS AND ........................1.1
INTELLIGENCE PREPARATION OF THE BATTLEFIELD
Warfighting Doctrine .......................................1.1
The Intelligence Cycle .......................................1.1
Intelligence Disciplines ......................................1.2
Intelligence and Electronic Warfare Operations ........................1-3
Mission. Enemy. Troops. Terrain. and Time Available Factors ...............1-5
Definition of Interrogation ....................................1.6
Definition of Prisoner of War and Enemy Prisoner of War ..................1.9
Pertinent Articles of Geneva Conventions ...........................1.10
Types of Sources ..........................................1.10
Personal Qualities .........................................1.12
Special Areas of Knowledge ...................................1.14
Interrogator Capabilities and Limitations ............................1-15
Conflicts ...............................................1.16
Interrogation Missions ......................................1.17
Drug and Law Enforcement Agency Operations ........................1.17
CHAPTER 2 .COMPOSITION AND STRUCTURE ..............................2.1
Tactical Operations Center ....................................2.1
Interrogation Below Division ...................................2.2
Division Interrogation Assets ...................................2.3
Corps Interrogation Assets and Organization .........................2.6
Echelons Above Corps Interrogation Assets and Organization ...............2.7
Enemy Prisoner of War and Interrogation Facilities .....................2.9
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited .
*This publication supersedes FM 34.52. 8 May 1987.
Page
Corps Facilities ...........................................2.10
Echelons Above Corps Facilities .................................2.12
Medical Company Interrogations ................................2.12
Interrogation at Brigade and Below ...............................2.12
Special Forces ............................................2.14
Amphibious Operations ......................................2.14
Airborne Operations ....................................... 2.15
Interrogator Supported Operations ...............................2.18
Theater Interrogation Facility ..................................2.22
Support Relationships .......................................2.24
CHAPTER 3 .THE INTERROGATION PROCESS ...............................3.1
Collection Priority ......................................... 3.1
Screening ..............................................3.2
Planning and Preparation .....................................3.7
Approach Phase ..........................................3.10
Questioning Phase ......................................... 3.20
Termination Phase .........................................3.26
Reporting Information .................... ;.................3.28
Interrogation with an Interpreter ................................3.29
Strategic Interrogations and Debriefings ............................3.31
CHAPTER 4 .PROCESSING AND EXPLOITING CAPTURED ENEMY ..................4.1
DOCUMENTS
Document Categories ....................................... 4.2
Document Handling ........................................4.4
Document Exploitation ......................................4.7
Translating ............................................. 4.9
Evacuation Procedures ...................................... 4.12
APPENDIX A .UNIFORM CODE OF MILITARY JUSTICE EXTRACT .................A-1
APPENDIX B .QUESTIONING GUIDES ....................................B-1
APPENDIX C .S2 TACTICAL QUESTIONING GUIDE AND BATTLEFIELD EXPLOITATION ..C-1 OF CAPTURED ENEMY DOCUMENTS AND EQUIPMENT APPENDIX D .PROTECTED PERSONS RIGHTS VERSUS SECURITY NEEDS ............D-1 APPENDIX E .REPORTS ..............................................E-1
APPENDIX F.COMMAND LANGUAGE PROGRAM ............................F-1
APPENDIX G .INDIVIDUAL AND COLLECTIVE TRAINING ......................G-1
Page GLOSSARY ................................................... Glossary-1 REFERENCES ............................................... References-1 INDEX ....................................................... Index-1
Preface
Preface - cont.
Chapter 1
Chapter 1 - cont.
Chapter 1 - cont.
Figure 1-2. Intelligence cycle using IPB.
SITUATION DEVELOPMENT
Situation development confirms or denies the enemy COAs predicted in IPB. It confirms predicted centers of gravity and decisive points and identifies enemy strengths and vulnerabilities. This enables the com- mander to make timely decisions and effectively apply his combat power.
TARGET DEVELOPMENT AND TARGET
ACQUISITION
Target development and target acquisition provide targets and targeting data for attacks by fire, maneuver, and electronic means. They identify and locate those targets that will have the greatest impact on the campaign's decisive engagements. These include deep operational reserves, strategic and operational level command, control, and communications (c3) nodes, key lines of communication, and air and naval staging facilities throughout the enemy's depth that contribute to his combat potential.
At the tactical level, they address those HVTs that directly contribute to the application of combat power at decisive points on the battlefield.
BAlTLE DAMAGE ASSESSMENT (BDA)
BDA provides the commander with the effect of friendly operations on the enemy. It focuses on the enemy's remaining military capabilities and potential. At the operational level, it also considers the campaign's effects on the enemy's economy and opera- tional infrastructure as well as his military force struc- ture.
BDA is focused on providing effects of particular strikes and attacks, or a series of them. BDA is per- formed by the same collection assets used to satisfy the commander's intelligence and targeting priorities; therefore, BDA cannot be performed continuously without degradation of other capabilities, such as situa- tion development and targeting. The commander must prioritize the BDA effort, identifying what he must know and when he must know it, just as he does for his PIR and targeting priorities.
FORCE PROTECTION
Force protection identifies friendly vulnerabilities and the enemy's efforts to exploit them. At the opera- tional level, it includes the early identification of sig- nificant improvements in weapon lethality, the introduction of weapons of mass destruction into the conflict, or the commitment of terrorist or other uncon- ventional forces into friendly rear areas.
Force protection goes beyond countering enemy in- telligence and includes the protection of all forces that contribute to our combat power. At the tactical level, it emphasizes measures to counter the enemy's intel-ligence collection capabilities and to protect the force from enemy action.
MISSION, ENEMY, TROOPS, TERRAIN,AND TIME AVAILABLE FACTORS
The MElT-T factors are important to the com-mander when planning interrogation operations. MElT-T determines how the commander will use inter- rogation assets. The effect of ME=-T on interrogation missions is discussed below.
MISSION SUPPORT
The supported force's mission bears directly on how the interrogation element will be employed. In cordon and search operations, commanders may determine in- terrogators are best suited to screen the populace in order to identify insurgents and their supporters. In counter-drug operations, commanders may use inter- rogators to exploit documents and to train US and foreign agents in interrogation techniques. In all con- flicts, the focus will be on EPW interrogation and CED exploitation.
The mission influences interrogation operations in other ways. For example, if the force's mission is offen- sive, interrogation elements must be highly mobile, with secure communications to the supported G2 or S2. They must be constantly prepared to move forward with the element they are supporting. This limits time avail- able for exploitation and dissemination.
On the other hand, if the mission is defensive, inter- rogation elements have more time to exploit individual sources. They may also have more flexibility to exploit EPWs or detainees and CEDs, to fulfill the commander's intent to construct operational graphics.
Collection requirements vary according to echelon. Strategic echelon requirements reflect the wide scope of interest of the theater and national command authority (NCA); whereas, tactical PIR and IR--and resultant SIR--reflect the immediate, more narrowly focused in- telligence interest of the maneuver commander.
ENEMY
The enemy, and our knowledge of the enemy, can in- fluence interrogator assignments and the complexity of the exploitation process. One factor which affects inter- rogation operations is the type of opposing enemy force. The techniques and procedures used to collect from in- surgents in a LIC may differ from those used to collect from regular enemy forces in a MIC to HIC.
For example, an EPW from a regular forces unit may have undergone political indoctrination, but his com- mitment to his unit may not be as strong as that of the insurgent who is passionately committed to an ideal. Thus, interrogators may have more difficulty persuading the insurgent to talk.
Another factor affecting interrogation operations is our current intelligence holdings on the enemy force and the interrogator's understanding of the threat. Our intelligence holdings on the composition of a newly formed insurgent organization usually will not be as complete as holdings on the composition of a regular enemy force. Thus, the focus of interrogation efforts in the early stages of a LIC may be on enemy force com- position; whereas, the focus in a MIC or HIC may be on enemv force missions or intentions.
Cultural aspects also affect interrogation missions. The employment of some basic interrogation techniques will differ based on the ethnic and cultural background of the enemy, and our failure to understand and adapt to this could ham~er the collection effort.
TROOPS
The number, experience level, and language proficiency of interrogators affect the tactical employ- ment of interrogation elements. Due to the limited number of interrogators at any echelon, interrogation element commanders have to pick from available inter- rogators. They must manage personnel to ensure the most experienced are used to the best advantage (for ex- ample, to exploit complex enemy documents) and select EPWs most likely to answer SIR.
Interrogation element commanders often have to contend with a mismatch between language-qualified personnel assigned to the unit and languages needed to perform the mission. They overcome the mismatch by acquiring local national (LN) interpreter support through the Assistant Chief of Staff, G1 (Personnel). They can also augment their interrogators by requesting other available linguists within the supported command to serve as interpreters:
Another troop-related factor which affects interroga- tion operations is the training of all soldiers on EPW handling and evacuation. EPW treatment during the early stages of capture is critical to the success of sub- sequent interrogations. The availability of military police (MP) support at brigade and above can enhance interrogation activities. Interrogation operations are more effective in a controlled environment where EPWs are adequately guarded.
TERRAIN
Terrain and weather are relevant to interrogator operations an& affect site deployments, communica- tions, and mobility. MP must ensure proper shelter and security for the EPW facility if it is collocated or imme- diately adjacent to the EPW collecting point or intern- ment facility.
TIME AVAILABLE
Information collected through interrogation opera- tions is valuable only if it is reported in a timely manner. Exploitation procedures may need to be adjusted to make the most use of time available. At the tactical level, interrogations will be brief, PIR driven, and reported in concise formats such as size, activity, loca- tion, unit, time, equipment (SALUTE).
At the operational and strategic levels, time will generally allow for a more expanded interrogation effort and flexible reporting format, such as the intelligence information report (IIR).
The challenge is for interrogators to be proficient lin- guists and skilled members of a highly organized collec- tion activity. This ensures the acquisition of the maximum amount of pertinent information regardless of time available.
Like other intelligence assets, interrogators must serve the commander. Interrogation operations are of no value unless they contribute to the accomplishment of the supported commander's mission. To understand the interrogator's role in mission accomplishment, one must understand the interrogation process.
DEFINITION OF INTERROGATION
Interrogation is the process of questioning a source to The goal of any interrogation is to obtain reliable infor- obtain the maximum amount of usable information. mation in a lawful manner, in a minimum amount of
Chapter 1 - cont.
Chapter 1 - cont.
Chapter 1 - cont.
Chapter 1 - cont.
Chapter 1 - cont.
Chapter 1 - cont.
Chapter 1 - cont.
Chapter 1 - cont.
Chapter 1 - cont.
Chapter 1 - cont.
Chapter 1 - cont.
Chapter 2
Chapter 2 - cont.
Chapter 2 - cont.
Chapter 2 - cont.
ORGANIZATION (AIRBORNE OR AIR ASSAULT ORGANIZATION (ACR AND SEPARATE BRIGADE)
DIVISION) In an ACR or separate brigade, interrogators are as-
In an airborne Or air assault division, inter-signed to the operations support platoon of the MI rogators are assigned to the I&S Company, MI company. Figure 2-4 shows this organization. Battalion. Figure 2-3shows this structure.
Figure 2-3. I&S Company, MI Battalion, Airborne or Air Assault Division.
Figure 2-4. MI Company Operations Support Platoon for ACR and Separate Brigade.
SPECIAL FORCES GROUP Interrogation teams may be combined with the CI sec- a special Group (Airborne) (SFGA), inter-tion when not conducting interrogation operations.
rogators are assigned to the Military Intelligence Detachment (MID). Figure 2-5 shows this structure.
LEGEND: * ASPS and CMO sections are consolidated on TOE. * * All SlGlNT MOSS are consolidated under the ASPS per the 31 803L000 TOE.
Figure 2-5. Organization, MI Detachment, Support Company, Special Forces Group.
CORPS INTERROGATION ASSETS AND ORGANIZATION
At corps, interrogators are assigned to the MI Bat-of a company headquarters, IPW and CI operation sec- talion (Tactical Exploitation) (TE). Figure 2-6 shows tions, CI and interrogation platoons, and a maintenance this structure. The CI interrogation company consists section.
Figure 2-6. MI Battalion (TE).
The CI platoon has nine teams and the interrogation platoon normally has eight teams. Interrogators can be hlaced in a DS role to divisions to augment division in- terrogation assets.
The corps also has a Reserve Components (RC) MI Battalion (TE), which has a subordinate CI in- terrogation comp a ny . Figure 2-7 shows this s t r u c t u r e.
There are also linguist battalions which augment and support Active Component (AC) units in time of hos- tilities.
Figure 2-7. RC MI Battalion (TE) Corps.
ECHELONS ABOVE CORPS INTERROGATION ASSETS AND ORGANIZATION
The MI Battalion (Collection and Exploitation headquarters company (HHC), MI Company (CI), and [C&E]),as shown at Figure 2-8, has a headquarters and MI Company (Interrogation and Exploitation) [I&E]).
Figure 2-8. MI Battalion (C&E), MI Brigade (EAC).
The MI Battalion (ME), as shown at Figure 2-9, has an HHC and three MI companies (ME), of which one is GS. 7b0 MI companies-(ME) (INTG) operate the theater, joint, or combined interrogation facilities, while the (GS) is for OSto and below (ECB).
The MI Company (Interrogation) of the MI Battalion (C&E) and (I&E), as shown at Figure 2-10, has a com- pany headquarters, operations section, communications section, food service section, and an I&E platoon, con- sisting of two sections.
The MI company (ME) (GS), MI Battalion (ME), has a headquarters section, an operations section, and three interrogation platoons, each with a platoon head- quarters and eight sections. Figure 2-11 shows this structure.
Figure 2-9. MI Battalion (I&E), MI Brigade (EAC).
Figure 2-10. MI Company (INTG),MI Battalion (C&E) and (I&E).
Figure 2-11. MI Company (ME) (GS), MI Battalion (ME).
ENEMY PRISONER OF WAR AND INTERROGATION FACILITIES
There are significant differences in EPW and inter- rogation facilities at each echelon; this is due to the numbers of EPWs, the missions of the various echelons, and the size of the interrogation elements.
EVACUATION AND GUARDING EPW
Initially, the capturing unit is responsible for evacuat- ing and guarding EPWs. In brigade-size operations, battalions evacuate prisoners to brigade collecting points as the situation permits. In most cases, EPWs are evacuated rapidly using backhaul transportation from brigade collecting points to departure areas be- cause they require food and guards, both of which are in short supply at brigade. EPW collecting points should be located close to supply routes to speed evacuation.
BRIGADE AND LOWER ECHELONS
At brigade level, EPWs can be detained in open fields, courtyards, gardens, jungle clearings, or similar sites if they are hidden from enemy observation. If necessary, these areas can be enclosed with barbed wire for more efficient EPW handling. Because EPWs sel- dom remain at a forward collecting point for more than a few hours, EPWs are not usually kept in a building or other shelter.
Interrogation facilities at battalion and brigade are kept to a minimum. Brigade interrogation personnel should be located adjacent to the brigade forward EPW collecting point in the BSA. The collecting point
should be out of sight and sound of other BSA activities. It should be close to normal evacuation routes.
The distance between the collecting point and CP is important. When possible, the collecting point and in- terrogation site should be within walking distance or a few minute's driving distance of the CP.
Interrogators with battalions or brigades should have vehicles equipped with radios for rapid communication with their respective intelligence officers and other in- telligence agencies.
DIVISION FACILITIES
The principal EPW tactical interrogation takes place at division. While the procedure is similar to that used at brigade, the interrogation scope is broader.
Previous interrogation reports received from brigade are reviewed. This information is expanded by further interrogations for tactical information to include all OB elements.
The interrogators at division level will prepare and disseminate summary interrogation reports. As dictated by the tactical situation, the interrogation facility at division may be augmented by corps interrogation per- sonnel-
The division's central EPW collecting point is operated by division Mp under the supervision of the division provost marshal. The interrogation section should be located immediately adjacent to the division's
central EPW collecting point, normally along the main supply route (MSR) within or near the division support command (DISCOM).
The distance between the interrogation facility and G2 section (rear) is not as critical as at brigade level. Personal liaison between the interrogation and intel- ligence sections, although important, may not be re- quired as frequently as at brigade.
At division, the G2 directs interrogation section col- lection efforts in conjunction with the CM&D section and the MI battalion commander, who serves as one of his principal assistants.
Compared to brigade facilities, division interrogation facilities are expanded. This is because the division in- terrogation section handles and interrogates more cap- tured personnel, and interrogations are conducted in greater detail. When practicable, interrogations at division should be conducted in improvised interroga- tion rooms in buildings adjacent to the division collect- ing point. If possible, separate rooms should be available to permit several interrogations at once.
CORPS FACILITIES
The corps EPW holding area is established and operated by MP under the supervision of the corps provost marshal. The Corps Interrogation Facility (CIF) will usually be a more permanent type facility than at echelons below corps. It should consist of operations and interrogation areas with separate, enclosed interrogation booths or rooms. If possible, there should be a separate DOCEX area. Figure 2-12 shows a sample CIF.
Figure 2-12. Sample Corps Interrogation facility (CIF).
2-10
Chapter 2 - cont.
Chapter 2 - cont.
ported battalion S2. This will ensure interrogators are fully oriented to the battalion's collection mission.
In other instances, interrogators may be placed at brigade in an "on-calln status, from which they can proceed to any of the subordinate battalions as cir- cumstances warrant. Upon completion of a low-level, immediate-type interrogation, they can return to brigade and again become available for immediate employment.
Commanders and S2s below brigade level who are un- able to obtain interrogator support from higher echelons should include provisions in unit and staff standing operating procedures (SOPS) for the "tactical questioning" (not interrogation) of EPWs or detainees. They should identify assigned personnel for language capability.
Interrogation personnel should provide training in the area of tactical questioning to designated S2 person- nel. The potential for abuse of the EPW is greatest at the initial capture and tactical questioning phase. With the excitement and stress of the battlefield, it may be- come easy for unskilled personnel to resort to illegal techniques to elicit critical information.
Your instruction must stress the importance of the proper treatment of EPWs. Emphasize that the abuse of an EPW at the initial stage of contact often renders future interrogation futile.
If you are engaged in, or supervising the tactical ques- tioning of EPWs, you are responsible for ensuring that EPWs are treated in accordance with the requirements of international and US law. Any tactical questioning conducted must be in response to the supported commander's PIR. Appendix C discusses S2 tactical questioning.
At this level the brigade S2 must maintain secure communication with interrogation personnel to ensure requirements are answered. Except under extreme weather conditions, and MP availability, it is not neces- sary to keep EPWs within the confines of a building or other shelter at battalion level since they will not remain for more than a few hours before being evacuated.
The capturing unit escorts or transports EPWs or detainees to the nearest collecting point, and turns them over to the MP. Interrogators in DS of the brigade will screen and categorize all EPWs or detainees, question them, and report information obtained in response to brigade PIR, IR, and SIR. They will do this under time constraints, as all EPWs or detainees must be evacuated without delay.
In spite of the temporary nature of the forward EPW collecting point, interrogators should maintain enough space between the collecting point and the interrogation site to ensure the privacy of interrogations. EPWs or detainees should not be able to observe or hear inter- rogations in progress.
INTERROGATIONS IN OTHER OPERATIONS
The functions and basic operational techniques employed by the interrogation element attached to the infantry division apply to interrogation elements sup- porting armored, amphibious, and airborne operations in any terrain or climate.
Differences arise primarily in the planning stages and interrogation objectives. These differences normally result from the inherent characteristics of each type of unit and terrain and climate involved.
For example, the interrogator engaging in airborne and amphibious operations will be dependent upon in- telligence support from higher agencies during the plan- ning stage. This is necessary because the unit does not have actual contact with the enemy until a specific operation begins.
Once H-hour arrives, the interrogator will be faced with a rapidly developing and changing tactical situa- tion. At this time, the degree of success correlates to the preparations made during the planning stage.
Consequently, the interrogator must make a con-certed effort to learn everything possible about the ob- jective area-terrain, enemy, and weather-and relate these factors to the mission of the unit supported. Only by taking these steps will the interrogator be able to en- sure success, and be prepared to begin interrogations as soon as possible after contact with the enemy is estab- lished. Interrogation objectives depend upon the mis- sion assigned and type of unit supported.
Chapter 2 - cont.
Chapter 2 - cont.
one brigade, there must be corps augmentation. FM 71-101describes air assault operations.
Security of aircraft enroute to landing zones (LZs) is a major concern. Friendly aircraft and air defense sup- port must ensure air routes are free of enemy aircraft and air defense systems.
When remotely monitored battlefield sensor systems (REMBASS) are available, friendly ground assets emplace REMBASS along likely enemy ground ap- proach routes in the LZ to detect and report ground movement. Ground surveillance radar (GSR) is employed to warn of enemy movement on friendly flanks.
Air assault operations require extensive HUMINT support in operation planning. CI analysis is critical to ensure OPSEC measures are taken to prevent divulging critical information, such as-
8 Date and time of operation.
8 Size of force to be employed.
8 Air routes to and from planned LZs.
8 Planned LZ locations.
CI must also support staging area actions to prevent espionage, sabotage, and acts of terrorism which could adversely affect the operation.
Interrogation is a primary source of information for air assault operations IPB. Interrogation support of ini- tial stages of the operation may be critical to its success.
The assault force commander needs immediate and current enemy intelligence. Lack of immediate ques- tioning of EPWs captured in securing the LZs or in fol- low-up actions may cause failure of the operation.
Planners must consider the difficulty in getting EPWs back to a support area during the early stages of an air assault operation. Interrogators should support the air assault elements as soon as possible. This may mean an interrogation team is included in the air assault force to operate at a forward EPW collecting point established in the vicinity of the LZ.
Normally, one interrogation team should support each air assault battalion during the assault phase. If the air assault battalion is using more than one LZ, the team may be split to support each LZ.
After assault units have established a ground link-up, some or all of the interrogators may be returned to the echelon of command from which they were detached.
Interrogators supporting the early stages of an air as- sault operation must be provided with the SIR, which are critical to the operation's success. Interrogators must plan ahead on how to question EPWs to satisfy immediate collection requirements.
ARMORED AND MECHANIZED JNFANTRY
OPERATIONS
Armored units normally operate on extensive fronts, with deep zones of action and dispersed formations. Be- cause of the mobility and wide range of action of ar- mored units, interrogation normally is not as detailed as in other divisions. Interrogators must remain mobile, operate with minimum facilities, and be alert for sudden changes in the tactical situation.
Planning and Operation
With a few exceptions, the planning and preparation necessary for interrogators supporting armored units is the same as for those supporting regular infantry units. Since radio is the normal means of communication, all interrogation team members must be familiar with voice radio procedures and know how to operate radio equip- ment common to armored units.
Interrogator Employment
Interrogator personnel who support armored or mechanized units will come under OPCON of the 52, G2, or S2 of the supported unit. Interrogators at all levels of armored or mechanized units must be able to operate during fluid situations, and remain mobile at all times. Because of this mobility, liaison with the 52, G2, or S2 will not be as frequent as in other units.
Interrogators must operate with maximum efficiency on the basis of radio communications, messages, and written reports. As in other type units, interrogation personnel remain OPCON to the G2 until operations begin. At that time, the division MI battalion will at- tach interrogation personnel to subordinate units. After an operation is completed, interrogation person- nel will revert to division control, pending a future mis- sion.
Normally, interrogations within armored units will be limited to interrogating EPWs for location and deploy- ment of antitank weapons and defenses, enemy roadblocks, and presence of enemy armor. In fast
Chapter 2 - cont.
Chapter 2 - cont.
Chapter 2 - cont.
Chapter 2 - cont.
Chapter 2 - cont.
Chapter 2 - cont.
Chapter 2 - cont.
Chapter 2 - cont.
Chapter 2 - cont.
Chapter 2 - cont.
Chapter 3
Chapter 3 - cont.
DETAINEE PERSONNEL RECORD
For us0 of thl8 form. uAR 1808.the proponant agency Is OOZSPER.
PART I-TO BE COMPLETED AT TIME OF MOCESSINC
See Item 28.
26 WON
36. REMARKS None. 37. PUOTO
PHOTO (Front Vkw) PHOTO (Rllhl PmlUr)
38. PREPARED BY Ilndiuldual and unit) SFC D.C. SMITH, 17th MP Co. Lg DATE PREPAAEO 41. PLACE 8 Oct 99 '29thINF DIV REAR INTERNMENT FACILITY 39. SIGNA DA FORM 4237.R. Aug 85 EDITION OF MAV 81 IS OBSOLETE n d A A
Figure 3-1. DA Form 4237-R (Detainee Personnel Record) (front).
FM 34-52
h
A-
PART I1 -TO RE MAINTAINFD BY UNIT HAVINC CUSTnDV
.-
41. LASl NAME D FIRS1 NAMES
CH'OE HNN-SIK
43. INTERNMENT SERIAL NUMBER
US-1501-23176
44. MEDICAL RECORD
r. IMMUNIZATION IVacclnollonr and lnnoculal~on. with D~IPSJ
Smallpox -15 APR 98
b. MAJOR ILLNESSES AN0 PHYSICAL DEFECTS (Wlth IJafrrJ c. BLOOD GFIOUP
NONE. B POS
45. INTERNMENT EMPLOYMENT (IUALIFICATIDNS
FARMER
46. SERIOUS OFFENSES. PUNISHMENTS. AND ESCAPES (Wtth Uafrrl
NONE.
40. FINANCLAL STATUS AT TIME OF "HST INTERNATIONAL TRANSFER I. CERTIFICATE OF CREDIT BALANCE ISSUED TO EPW (Amount in unontr~ b AMT IN IICURES
C. LOCATION d DATC
60. FINANCIAL STATUS AT TIME OF SECOND lNTt RNATIONAL TRANSFER I. CERTIFICATE OF CREDIT BALANCE ISSUE0 TO EPW l~mount ~n ~~.orA,j b AMT IN f IGuRES
C. LOCATION -61. r. REASON REPATRIATION d DATE
b. MODE c. DATE
I?. FINANCIAL STATUS AT TIMC OF REPAiRIATION r. CERTIFICATE OF CREDIT BALANCE ISSUFD TO EPW IAma,unl ~nwords) b. AMT IN FlCURtS
c. LOCATION ' d DATE
RRVFYdC Of' !IA PI)PY .?.?I R, A1.Y: Rq
Figure 3-1. DA Form 4237-R (Detainee Personnel Record) (reverse).
Chapter 3 - cont.
MP NUMBER: EVACUATION DATE:
LNAME (P): /f//dA/~ c DATE: 7h9 99
LNAME (M): A TIME: /4/7
E
FNAME: HAITHAM P PLACE: ZA lJ13956
R
s MNAME: A&%LL)H u CAP UNIT: /6/</3/4AXGT
0 SVC/ID NO: /234srb7 R CIRCUMSTANCE&: AF7&R
DOB: 24 0~7-80 E f/RE F/GH7
A
L IANGUAGES: ARAB~C~ D DOCUMENTS: &dE
MARITAL STATUS: M S W A
&)= Military c = civilian T WPNSIEQUIP: A$-47
***
STATUS: p = Paramilitary ? = Other A
BRANCH: AF @CG MC NV PHYSICAL CONDITION: SEX: @ F RNK WOUNDED: Y @M
1 FULL UNIT DSG: s 2/47 3c0 A REMARKS:
L S
S,
:DUmPSN: BUT]/aAD/sH E
MENTAL CONDITION: A JOB: R~fLGrn~hj EDUCATION= 8 YRS STATION: M INTELLIGENCE: AVG + AVG @Y SKILLS: s~ARP'H~~TER E MENTALSTATE: ~/ERI/OLLS
EXPERIENCE: ~f'f 7 flus-N
. T
SCREENER: Sfc ~~YCE
C JOB: JTUD#f I D DATE: TIME: V ORG: A COOPERATION: @(~i~h) 2 3 (low)I DUTIES: KNOWLEDGE: A (High) @ C (low)
L A
I BGW LIST: Y @ BGW CODE.
A SKILLS: dod&-SOURCE CATEGORY: A I3 @ D
N APPROACH: DI @C.j; Tdc& 7-1d&
SPECIAL HANDLING REQUIREMENT CODES:
P I R 84 I R R E M A R K S - -
Figure 3-2.Screening report format.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
bal and emotional ruses in applying pressure to the EPW's or detainee's dominant emotions.
One major advantage of this technique is it is ver- satile and allows the interrogator to use the same basic situation positively and negatively.
For example, this technique can be used on the EPW who has a great love for his unit and fellow soldiers. The interrogator may take advantage of this by telling the EPW that by providing pertinent information, he may shorten the war or battle in progress and save many of his comrades' lives, but his refusal to talk may cause their deaths. This places the burden on the EPW or detainee and may motivate him to seek relief through cooperation.
Conversely, this technique can also be used on the EPW or detainee who hates his unit because it withdrew and left him to be captured, or who feels he was unfairly treated in his unit. In such cases, the interrogator can point out that if the EPW cooperates and specifies the unit's location, the unit can be destroyed, thus giving the EPW an opportunity for revenge. The interrogator proceeds with this method in a very formal manner.
This approach is likely to be effective with the imma- ture and timid EPW.
Emotional Love Amroach. For the emotional love approach to be successful, the interrogator must focus on the anxiety felt by the source about the circumstan- ces in which he finds himself. The interrogator must direct the love the source feels toward the appropriate object: family, homeland, or comrades. If the inter- rogator can show the source what the source himself can do to alter or improve his situation, the approach has a chance of success.
This approach usually involves some incentive such as communication with the source's family or a quicker end to the war to save his comrades' lives. A good inter- rogator will usually orchestrate some futility with an emotional love approach to hasten the source's reaching the breaking point.
Sincerity and conviction are critical in a successful at- tempt at an emotional love approach as the interrogator must show genuine concern for the source, and for the object at which the interrogator is directing the source's emotion.
If the interrogator ascertains the source has great love for his unit and fellow soldiers, the interrogator can ef- fectively exploit the situation. This places a burden on the source and may motivate him to seek relief through cooperation with the interrogator.
Hate Approach. The emotional hate ap- proach focuses on any genuine hate, or possibly a desire for revenge, the source may feel. The interrogator must ascertain exactly what it is the source may hate so the emotion can be exploited to override the source's ra- tional side. The source may have negative feelings about his country's regime, immediate superiors, of- ficers in general, or fellow soldiers.
This approach is usually most effective on members of racial or religious minorities who have suffered dis- crimination in military and civilian life. If a source feels he has been treated unfairly in his unit, the interrogator can point out that, if the source cooperates and divulges the location of that unit, the unit can be destroyed, thus affording the source revenge.
By using a conspiratorial tone of voice, the inter- rogator can enhance the value of this technique. Phrases, such as "You owe them no loyalty for the way they treated you," when used appropriately, can expedite the success of this technique.
Do not immediately begin to berate a certain facet of the source's background or life until your assessment in- dicates the source feels a negative emotion toward it.
The emotional hate approach can be used more effec- tively by drawing out the source's negative emotions with questions that elicit a thought-provoking response. For example, "Why do you think they allowed you to be captured?" or "Why do you think they left you to die?" Do not berate the source's forces or homeland unless certain negative emotions surface.
Many sources may have great love for their country, but may hate the regime in control. The emotional hate approach is most effective with the immature or timid source who may have no opportunity up to this point for revenge, or never had the courage to voice his feel- ings.
Fear-Up Approach
The fear-up approach is the exploitation of a source's preexisting fear during the period of capture and inter- rogation. The approach works best with young, inex- perienced sources, or sources who exhibit a greater than normal amount of fear or nervousness. A source's fear may be justified or unjustified. For example, a source who has committed a war crime may justifiably fear prosecution and punishment. By contrast, a source who has been indoctrinated by enemy propaganda may un- justifiably fear that he will suffer torture or death in our hands if captured.
This approach has the greatest potential to violate the law of war. Great care must be taken to avoid threatening or coercing a source which is in violation of the GPW, Article 17.
It is critical the interrogator distinguish what the source fears in order to exploit that fear. The way in which the interrogator exploits the source's fear depends on whether the source's fear is justified or un- justified.
Fear-Up (Harsh). In this approach, the interrogator behaves in an overpowering manner with a loud and threatening voice. The interrogator may even feel the need to throw objects across the room to heighten the source's implanted feelings of fear. Great care must be taken when doing this so any actions would not violate the prohibition on coercion and threats contained in the GPW, Article 17.
This technique is to convince the source he does in- deed have something to fear; that he has no option but to cooperate. A good interrogator will implant in the source's mind that the interrogator himself is not the object to be feared, but is a possible way out of the trap.
Use the confirmation of fear only on sources whose fear is justified. During this approach, confirm to the source that he does indeed have a legitimate fear. Then convince the source that you are the source's best or only hope in avoiding or mitigating the object of his fear, such as punishment for his crimes.
You must take great care to avoid promising actions that are not in your power to grant. For example, if the source has committed a war crime, inform the source that the crime has been reported to the appropriate authorities and that action is pending. Next inform the source that, if he cooperates and tells the truth, you will report that he cooperated and told the truth to the ap- propriate authorities. You may add that you will also report his lack of cooperation. You may not promise that the charges against him will be dismissed because you have no authority to dismiss the charges.
Fear-Up (u.
This approach is better suited to the strong, confident type of interrogator; there is generally no need to raise the voice or resort to heavy-handed, table-banging.
For example, capture may be a result of coin-ciden-the soldier was caught on the wrong side of the border before hostilities actually commenced (he was armed, he could be a terrorist)--or as a result of his actions (he surrendered contrary to his military oath and is now a traitor to his country, and his forces will take care of the disciplinary action).
The fear-up (mild) approach must be credible. It usually involves some logical incentive.
In most cases, a loud voice is not necessary. The ac- tual fear is increased by helping the source realize the unpleasant consequences the facts may cause and by presenting an alternative, which, of course, can be brought about by answering some simple questions.
The fear-up (harsh) approach is usually a dead end, and a wise interrogator may want to keep it in reserve as a trump card. After working to increase the source's fear, it would be difficult to convince him everything will be all right if the approach is not successful.
Fear-Down Approach
This technique is nothing more than calming the source and convincing him he will be properly and humanely treated, or telling him the war for him is mer- cifully over and he need not go into combat again. When used with a soothing, calm tone of voice, this often creates rapport and usually nothing else is needed to get the source to cooperate.
While calming the source, it is a good idea to stay ini- tially with nonpertinent conversation and to avoid the subject which has caused the source's fear. This works quickly in developing rapport and communication, as the source will readily respond to kindness.
When using this approach, it is important the inter- rogator relate to the source at his perspective level and not expect the source to come up to the interrogator's level.
If the EPW or detainee is so frightened he has withdrawn into a shell or regressed to a less threatening state of mind, the interrogator must break through to him. The interrogator can do this by putting himself on the same physical level as the source; this may require some physical contact. As the source relaxes and begins to respond to kindness, the interrogator can begin asking pertinent questions.
This approach technique may backfire if allowed to go too far. After convincing the source he has nothing to fear, he may cease to be afraid and may feel secure
to resist the interrogator's pertinent question. If this occurs, reverting to a harsher approach technique usually will bring the desired result quickly.
The fear-down approach works best if the source's fear is unjustified. During this approach, take specific actions to reduce the source's unjustified fear. For ex- ample, if the source believes that he will be abused while in your custody, make extra efforts to ensure that the source is well cared for, fed, and appropriately treated.
Once the source is convinced that he has no legitimate reason to fear you, he will be more inclined to cooperate. The interrogator is under no duty to reduce a source's unjustified fear. The only prohibition is that the interrogator may not say or do anything that directly or indirectly communicates to the source that he will be harmed unless he provides the requested in- formation.
These applications of the fear approach may be com- bined to achieve the desired effect. For example, if a source has justified and unjustified fears, you may ini- tially reduce the source's unfounded fears, then confirm his legitimate fears. Again, the source should be con- vinced the interrogator is his best or only hope in avoid- ing or mitigating the object of his fear.
Pride and Ego Approach
The strategy of this approach is to trick the source into revealing desired information by goading or flatter- ing him. It is effective with sources who have displayed weakness or feelings of inferiority. A real or imaginary deficiency voiced about the source, loyalty to his or- ganization, or any other feature can provide a basis for this technique.
The interrogator accuses the source of weakness or implies he is unable to do a certain thing. This type of source is also prone to excuses and reasons why he did or did not do a certain thing, often shifting the blame to others. An example is opening the interrogation with the question, "Why did you surrender so easily when you could have escaped by crossing the nearby ford in the river?"
The source is likely to provide a basis for further questions or to reveal significant intelligence informa- tion if he attempts to explain his surrender in order to vindicate himself. He may give an answer such as, "No one could cross the ford because it is mined."
This technique can also be employed in another man- ner--by flattering the source into admitting certain in- formation in order to gain credit. For example, while interrogating a suspected saboteur, the interrogator states: "This was a smooth operation. I have seen many previous attempts fail. I bet you planned this. Who else but a clever person like you would have planned it? When did you first decide to do the job?"
This technique is especially effective with the source who has been looked down upon by his superiors. The source has the opportunity to show someone he is intel- ligent.
A problem with the pride and ego approach is it relies on trickery. The source will eventually realize he has been tricked and may refuse to cooperate further. If this occurs, the interrogator can easily move into a fear-up approach and convince the source the questions he has already answered have committed him, and it would be useless to resist further.
The interrogator can mention it will be reported to the source's forces that he has cooperated fully with the enemy, will be considered a traitor, and has much to fear if he is returned to his forces.
This may even offer the interrogator the option to go into a love-of-family approach where the source must protect his family by preventing his forces from learning of his duplicity or collaboration. Telling the source you will not report that he talked or that he was a severe dis- cipline problem is an incentive that may enhance the ef- fectiveness of the approach.
Pride and EEO-UD A roach. This appioach is most effective on sources with little or no intelligence, or on those who have been looked down upon for a long time. It is very effective on low-ranking enlisted personnel and junior grade officers, as it allows the source to final- ly show someone he does indeed have some "brains."
The source is constantly flattered into providing cer- tain information in order to gain credit. The inter- rogator must take care to use a flattering somewhat-in-awe tone of voice, and speak highly of the source throughout this approach. This quickly produces positive feelings on the source's part, as he has probably been looking for this type of recognition all of his life.
The interrogator may blow things out of proportion using items from the source's background and making them seem noteworthy or important. As everyone is eager to hear praise, the source will eventually reveal led to believe all of his forces had run out of food. If the source is hinging on cooperating, it may aid the inter- rogation effort if he is told all the other source's have cooperated.
Chapter 3 - cont.
The futility approach must be orchestrated with other approach techniques (for example, love of comrades). A source who may want to help save his comrades' lives may be convinced the battlefield situation is hopeless and they will die without his assistance.
The futility approach is used to paint a bleak picture for the prisoner, but it is not effective in and of itself in gaining the source's cooperation.
We Know All
This approach may be employed in conjunction with the "file and dossier" technique (discussed below) or by itself. If used alone, the interrogator must first become thoroughly familiar with available data concerning the source. To begin the interrogation, the interrogator asks questions based on this known data. When the source hesitates, refuses to answer, or provides an incor- rect or incomplete reply, the interrogator provides the detailed answer.
When the source begins to give accurate and com- plete information, the interrogator interjects questions designed to gain the needed information. Questions to which answers are already known are also asked to test the source's truthfulness and to maintain the deception that the information is already known. By repeating this procedure, the interrogator convinces the source that resistance is useless as everything is already known.
After gaining the source's cooperation, the inter- rogator still tests the extent of cooperation by peri- odically using questions to which he has the answers; this is very necessary. If the interrogator does not chal- lenge the source when he is lying, the source will know everything is not known, and he has been tricked. He may then provide incorrect answers to the interrogator's questions.
There are some inherent problems with the use of the "we know all" approach. The interrogator is required to prepare everything in detail, which is time consuming. He must commit much of the information to memory, as working from notes may show the limits of the infor- mation actually known.
File and Dossier
The file and dossier approach is used when the inter- rogator prepares a dossier containing all available infor- mation obtained from documents concerning the source or his organization. Careful arrangement of the material within the file may give the illusion it contains more data than actually there. The file may be padded with extra paper, if necessary. Index tabs with titles such as education, employment, criminal record, military ser- vice, and others are particularly effective.
The interrogator confronts the source with the dos- siers at the beginning of the interrogation and explains intelligence has provided a complete record of every sig- nificant happening in the source's life; therefore, it would be useless to resist. The interrogator may read a few selected bits of known data to further impress the source.
If the technique is successful, the source will be in- timidated by the size of the file, conclude everything is known, and resign himself to complete cooperation. The success of this technique is largely dependent on the naivete of the source, volume of data on the subject, and skill of the interrogator in convincing the source.
Establish Your Identity
This approach is especially adaptable to interroga- tion. The interrogator insists the source has been cor- rectly identified as an infamous individual wanted by higher authorities on serious charges, and he is not the person he purports to be. In an effort to clear himself of this allegation, the source makes a genuine and detailed effort to establish or substantiate his true identity. In so doing, he may provide the interrogator with information and leads for further development.
The "establish your identity" approach was effective in Viet Nam with the Viet Cong and in OPERATIONS JUST CAUSE and DESERT STORM.
This approach can be used at tactical echelons. The interrogator must be aware if it is used in conjunction with the file and dossier approach, as it may exceed the tactical interrogator's preparation resources.
The interrogator should initially refuse to believe the source and insist he is the criminal wanted by the am- biguous higher authorities. This will force the source to give even more detailed information about his unit in order to convince the interrogator he is who he says he is. This approach works well when combined with the "futility" or "we know all" approach.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
FM 34-52
....
;iiiiii.;;;!i? n
.....
..... -,65K BROWN
"'
1
I Z HElGnT COLOR OF HAIR N o
1 1.70 m BLACK
x 2 BLOOD TYPE RELIGION
Y,
0 9 B POS NONE
-m
0. n NOTICE
m 0 '
2 9 a
2 CI Thk cud ia Lued toprironcrr or
-n I-(
4 m wu in the cutody of the Unikd
n
> Strtu Army. Tht cud must be i curitd at dl timu by the EPW
0
z x to whom it k kued.
Rm-of DA Form 2662.R. May 82
REVERSE
Figure 3-6. DA Form 2662-R (United States ArmyEPW Identification Card).
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 3 - cont.
Chapter 4
Chapter 4 - cont.
EPWs OR SOURCES
Chapter 4 - cont.
Chapter 4 - cont.
Chapter 4 - cont.
Chapter 4 - cont.
UNIT: /b zfl DII/(4)
FILE RECEIVED DOCUMENT INCOMING TRANS- FORWARDING RECEIVED BY TIME AND PLACE NUMBER DTG SERIAL NUMBER MISSION NUMBER UNIT OF CAPTURE (DTG)
I
ope/ ///9/02MS-AR-/q/0./ NA 4% 80yce i/07tfzdc 123YSg9 0002 1/14/72 ~S-~'KHIAI/~dfi /sz&5&-%~ES ///3/fc%&C 654321
CAPTURING UNIT SCREENING DESCRIPTION OF DOCUMENT OUTGOING REMARKS
CATEGORY TRANSM17TAL
@///2/3 c P~USO~YAL o//.17 A~O~JS
L~T~A
A 0pu'U 0/9../3
Chapter 4 - cont.
Chapter 4 - cont.
(CLASSIFICATION)
TRANSLATION REPORT
TO: G2,23d Inf Div (MECH) DATE: 291 130ZAUG99
FROM:IPW Sec, I&S Co,231st MI Bn REPORT NUMBER: 08-0356
PART I. CONTROL DATA:
1. DOCUMENT NUMBER: US-WAIBVO-03093.
2.
DOCUMENT DESCRIPTION: Personal letter, 1page, handwritten.
3.
DOCUMENT'S ORIGINAL LANGUAGE: Russian.
4.
DATE AND TIME RECEIVED: 290510ZAUG99.
5.
DATE AND TIME OF CAPTURE: 290120ZAUG99.
6.
PLACE OF CAPTURE: vic NB146122.
7.
CAPTURING UNIT: Co.A, 2d Bn, 1st Inf Bde, 23d Inf Div.
8.
CIRCUMSTANCES OF CAPTURE: During ambush.
9.
TRANSLATOR: SGT Royce.
10.
TRANSLATION TYPE: Full.
PART 11. TRANSLATION TEXT:
My dear Serezhen'ka:
It has been a long time since I received a letter from you. How are you and where are you? The last time you wrote that fighting was going on around you all the time, and this worries me a lot. Take care of yourself. There have been many changes at home. Your mother, despite her age, had to go to work in the factory. They make tanks there, but the sign over the entrance says this is a sugar plant. I don't know why they do this. At the school where I work, we were also told to go and work at the same plant. They are going to close the school. Everyone has to go to the front or work in the war industry. I would be more at ease if I knew you are alive and well. Please write as soon as you can.
Your KATHY.
PART 111: REMARKS: None. (CLASSIFICATION)
Figure 4-5. Sample translation report.
Chapter 4 - cont.
Chapter 4 - cont.
will be provided the source. See AR 190-8for proce- dures on handling personal effects.
Returned
Returned CEDs are usually personal in nature, taken only for inspection and information of interest, and im- mediately given back to the source. Personal documents belonging to a source will be returned to the source after examination in accordance with the GPW.Copies of such papers may be made and forwarded if considered appropriate. An identification document must be returned to the source.
RECOGNITION AND EVACUATION OF
DOCUMENTS
In a fast-moving tactical situation, it is possible docu- ments captured with sources will not be handled ex- peditiously. Final disposition of these documents may not be made until the source is evacuated at least as far as the corps holding area.
Some documents captured with a source will aid in the interrogation of the source. Others, particularly Category A, should be copied and evacuated separately.
One copy can remain with the source to aid in the inter- rogation, and the other can be translated and exploited separately.
It is essential that the capturing unit correctly identify the documents captured with the source. This is more easily done when the interrogation element, rather than the MP element, signs for the documents captured with sources.
EVACUATION OF SIGNIFICANT DOCUMENTS
To efficiently exploit CEDs and sources, documents captured with a source are normally evacuated with the source. A document of great significance may be evacuated ahead of the source, but a reproduction should be kept with the source. If reproduction is not possible, note on the captured document tag where the document was sent.
Significant documents such as Categories A and B, TECHDOCs, maps, charts, AIRDOG, and NAVDOCs are evacuated directly.
APPENDIX A
UNIFORM CODE OF MILITARY JUSTICE EXTRACT
Article 78, Accessory after the fact
Text of the offense: Any person subject to this chap- ter who, knowing that an -offense punishable by this chapter has been committed, receives, comforts, or as- sists the offender in order to hinder or prevent his ap- prehension, trial, or punishment shall be punished as a court-martial shall direct.
Article 80. Attempts
Text of the offense:
(a)
An act, done with specific intent to commit an offense under this chapter, amounting to more than mere preparation and tending, even though failing, to effect its commission, is an attempt' to commit that of- fense.
(b)
Any person subject to this chapter who attempts to commit any offense punishable by this chapter shall be punished as a court-martial may direct, unless other- wise specifically prescribed.
(c)
Any person subject to this chapter may be con- victed of an attempt to commit an offense although it appears on the trial that the offense was consummated.
Article 81? Conspiracv
Text of the offense: Any person subject to this chap- ter who conspires with any other person to commit an offense under this chapter shall, if one or more of the conspirators does an act to effect the object of the con- spiracy, be punished as a court- martial may direct.
Article 93: Cruelty and maltreatment
Elements of the offense:
(1) That a certain person was subject to the or- ders of the accused; and
(2) That the accused was cruel toward, or op-
pressed, or maltreated that person. (The cruelty, op- pression, or maltreatment, -although not necessarily physical, must be measured by an objective standard.)
Article 118. Murder
Text of the offense: Any person subject to this chap- ter who, without justification or excuse, unlawfully kills a human being, when he-
(1)
has a premeditated design to kill;
(2)
intends to kill or inflict great bodily harm;
. . -
(3)
is engaged in an act that is inherently dangerous to others and evinces a wanton disregard of human life; or
(4)
is engaged in the perpetration or attempted perpetration of a burglary, sodomy, rape, robbery, or ag- gravated arson;
is guilty of murder, and shall suffer punishment as a court-martial shall direct, except that if found guilty under clause (1) or (4), he shall suffer death or im- prisonment for life as a court-martial may direct.
Article 119. Manslauphter
Text of the offense:
(a)
Any person subject to this chapter who, with an intent to inflict great bodily harm, unlawfully kills a human being in the heat of sudden passion caused by adequate provocation is guilty of voluntary manslaughter and shall be punished as a court-martial may direct.
(b)
Any person subject to this chapter who, without an intent to kill or inflict great bodily harm, unlawfully kills a human being-
(1) by culpable negligence; or
(2)
while perpetrating or attempting to perpetrate an offense, other than those named in clause (4) of Ar-ticle 118, directly affecting the person; is guilty of in- voluntary manslaughter and shall be punished as a court-martial may direct.
Article 124, Maiming
Text of the offense: Any person subject to this chap- ter who, with intent to injure, disfigure, or disable, &-flicts upon the person of another an injury which-
(1)
seriously disfigures his person by any mutila- tion thereof;
(2)
destroys or disables any member or organ of his body; or
(3)
seriously diminishes the physical vigor by the injury of any member or organ;
is guilty of maiming and shall be punished as a court- martial may direct.
Article 127. Extortion
Text of the offense: Any person subject to this chap- ter who communicates threats to another person with the intention thereby to obtain anything of value or any acquittance, or immunity is guilty of extortion and shall be punished as a court-martial may direct.
Article 128,Assatllt
Text of the offense:
(a)
Any perso
Related Topics
- Korean Armistice Agreement
- DA-PAM-27-17 05-1980
- Conduct in combat 1984
- Procedure June-1944
- Law of war documentary supplement 2009
- POW report
- Armistice
- US fighting code 1955
- Procedure Dec-1947
- Military Commissions