You are on page 1of 14

Psychology, Public Policy, and Law © 2013 American Psychological Association

2013, Vol. 19, No. 2, 165–178 1076-8971/13/$12.00 DOI: 10.1037/a0030310

A Taxonomy of Interrogation Methods

Christopher E. Kelly, Jeaneé C. Miller, Steven M. Kleinman


and Allison D. Redlich The Soufan Group, New York, New York
University at Albany, State University of New York

With a few notable exceptions, the research on interrogation, suspect interviewing, and intelligence
collection has been predominantly focused on either broad categories of their methods (e.g., information
gathering vs. accusatorial models) or very specific techniques (e.g., using open-ended questions,
appealing to the source’s conscience). The broad categories, however, are not meaningful enough to fully
describe the dynamic between interrogator and subject, whereas the specific techniques may be too
detailed to understand and research the process of interrogation. To remedy this and advance the
academic and operational fields, we identified 71 unique techniques and sorted them into six domains:
Rapport and Relationship Building, Context Manipulation, Emotion Provocation, Collaboration, Con-
frontation/Competition, and Presentation of Evidence. The resulting three-level structure consisting of
broad categories, the six domains, and specific techniques form a taxonomy of interrogation methods. In
addition, we propose a testable model of how the domains may interact in the process of interrogation.
The taxonomy and theoretical model offer heuristic devices for both researchers and practitioners
searching for a parsimonious and more meaningful way to describe, research, and understand the
interviewing and interrogation of those accused of wrong-doing or possessing guilty knowledge.

Keywords: interrogation, interviewing, intelligence collection, suspects

Interrogation methods, whether employed in a law-enforcement, is not to answer the central question about effectiveness posed
counterterrorism or military context, have garnered a great deal of above, but rather, to attempt to impose order on the vastness of
attention in the past decade from policymakers, practitioners, knowledge that has come before it and to reframe the issues such
scholars, and the general public. The relative prevalence of false that researchers and practitioners can make sensible use of this
confessions and the controversial use of coercive practices have crucial knowledge.
highlighted attention on a single, overarching question: What When describing interrogation and criminal interviewing meth-
strategies and techniques are (and are not) objectively effective in ods, the techniques examined in the research to date typically fall
eliciting reliable information from suspected offenders, detainees, at a broad or at a specific level. On the one hand, the broad
or sources? In part, because of the attention and controversy, the categories often fall into generic either– or dichotomies: minimi-
amount of academic scholarship on interviewing and interrogation zation versus maximization; accusatorial versus information gath-
has increased exponentially in the past 25 years, creating a vast, if ering; friendly versus harsh; rapport- versus control-based (e.g.,
disparate, literature on effective techniques. Horgan, Russano, Meissner, & Evans, 2012; Inbau, Reid, Buckley,
Psychologists and other scholars interested in interrogation have & Jayne, 2013; Meissner, Redlich, Brandon, & Bhatt, 2012). On
focused on answering the question above, and to a great degree the other hand, specific techniques, such as touching the suspect in
they have been successful at discovering effective—and ineffec- a friendly manner, appealing to religion, yelling, or using open-
tive—methods of interrogation. Their successes, however, have ended questions, can be (and often are) sorted into one of the
led to an embarrassment of riches of sorts. Because of the enor-
either– or dichotomies, depending on the aim of the technique
mous amount of empirical evidence that has been generated in the
(e.g., Kassin & McNall, 1991; Russano, Meissner, Narchet, &
past several decades, the field has become inundated with confus-
Kassin, 2005). Whereas the research on specific techniques has
ing terminology and the process of interrogation has been ne-
been instrumental in helping to identify precise tactics that are
glected in favor of discrete actions on the part of operators in the
better able to produce accurate and reliable confessions or generate
interrogation room. The purpose of the present undertaking, then,
human intelligence, the broader categories have been useful to-
ward advancing our understanding of interrogation and interview-
ing in the most generic of terms.
What is lacking in the interrogation and interviewing literature,
This article was published Online First February 4, 2013. however, is a fundamental taxonomic structure. Going from the
Christopher E. Kelly, Jeaneé C. Miller, and Allison D. Redlich, School
macrolevel of very broad categories to the microlevel of very
of Criminal Justice, University at Albany, State University of New York;
Steven M. Kleinman, The Soufan Group, New York, New York. specific techniques potentially overlooks a level of organization
Correspondence concerning this article should be addressed to Christo- that could be useful to researchers studying interrogation and
pher E. Kelly, 135 Western Avenue, Draper Hall 241-C, Albany, NY operators applying methods in the field. Taxonomy, which is the
12222. E-mail: ckelly@albany.edu science of classification, organizes what is known about a phe-

165
166 KELLY, MILLER, REDLICH, AND KLEINMAN

nomenon in such a fashion that is accessible and sensible to McNall (1991). Minimization and maximization are most often
consumers of the information. It systematizes established obser- described as packages of techniques (Horgan et al., 2012; Russano
vations that are heuristic in nature for the researcher and can assist et al., 2005) under which specific tactics may be categorized.
in the decision-making processes for the operator. In this paper, Minimization is based on principles of friendliness and attempts to
our primary goal is to contribute to the science of interrogation by gain a subject’s cooperation by minimizing the seriousness of the
establishing a mesolevel of interrogation, consisting of domains offense. It includes techniques like expressing sympathy and pro-
between the broad dualistic categories and the numerous specific viding excuses that lessen the subject’s culpability. In contrast,
interrogation techniques. The resulting three-level structure forms maximization seeks to emphasize the seriousness of the offense
a taxonomy of interrogation methods. and intimidate the subject. Maximization includes techniques like
Because a mesolevel has the potential to offer a better way to directly accusing the subject, disallowing denials, and bluffing or
study and describe the methods of interrogation, a secondary aim lying about evidence.
here is to propose a process model of interrogation. Whereas two A second dichotomy into which interrogation tactics are divided
competing paradigms of interrogation (e.g., accusatorial vs. infor- within the literature is humane versus dominant techniques. Ac-
mation gathering) contribute very little toward a meaningful de- cording to Häkkänen, Ask, Kebbell, Alison, and Granhag (2009),
scription of the dynamic between the interrogator and the source, dominant techniques are based on principles of hostility, aggres-
scores of individual techniques can be too detailed for one to siveness, and condemnation. On the other hand, humane tech-
accurately understand or capture the process that occurs during an niques are more strongly related to principles of sensitivity and
interrogation. In contrast, the mesolevel interrogation domains empathy (see also Holmberg & Christianson, 2002). Techniques
may provide a useful, parsimonious structure with which scholars classified into the dominant category include striving for confron-
and operators can study, analyze, and influence interrogations. As tation, exhibiting a hostile attitude, and being silent after the source
such, after the mesolevel domains have been introduced and de- has answered a question. Techniques classified into the humane
fined, we propose a testable theoretical model of how the interro- category include exhibiting a friendly attitude, striving for coop-
gation domains may interact with and follow one another. The eration, and displaying calm behavior. These two categories are
result of this paper, we hope, is to influence both the current considered discrete and often in opposition to one another.
practice of interrogation and the scientific study of it. A third dichotomy is the information-gathering model versus the
Prior to reviewing existing research on interrogation methods, a accusatorial model (see Meissner et al., 2012). The information-
note on terminology is warranted. A generic terminology is most gathering method uses techniques that seek to extract accurate
appropriate, as the taxonomy and process model are intended to intelligence from subjects. As demonstrated in Britain’s PEACE
apply across criminal, counterterrorism, military, and human in- model (Planning & Preparation, Engage & Explain, Account,
telligence (HUMINT) contexts. In this paper, “techniques” is used Closure, Evaluation), this method is based upon rapport, respect,
as a catch-all term that refers to individual methods of information and prohibits the use of deception and psychological manipulation
gathering that have elsewhere been described as approaches, tac- on the part of the operator (Schollum, 2005). It is often referred to
tics, or procedures of interrogation. Likewise, “interrogation” is as a “fact-finding” mission that does not presume guilt, but instead
the generic term used for all manners of directed information uses open-ended questions to discern the truth. It is associated with
gathering, including interviewing, investigation, or HUMINT col- the operator actively listening to the subject and developing rap-
lection. The individual conducting the interrogation is referred to port. In contrast, the accusatorial method of interrogation presumes
here as the “operator,” a label that may be applied to the interro- guilt, seeks to establish control, and uses psychologically manip-
gator, detective, intelligence officer, and so forth. Finally, the term ulative techniques to confront the source. The main goal of this
“source” is employed to identify the subject of the interrogation— approach is to elicit a confession. The United States-based “Reid
the individual to whom techniques are applied—referred to in technique” is often cited to exemplify the accusatorial approach
various spheres as the suspect, detainee, or defendant. Although (Inbau et al., 2013; www.reid.com). Some techniques associated
the proposed mesolevel domains and process model may be ap- with the accusatorial method are isolation, intimidation, disallow-
plicable to witnesses and victims based on the research specific to ing denials, and repetitive questioning. Another difference be-
these actors, we are only concerned with the interrogation of tween this method and the information-gathering approach is that
individuals accused of some wrongdoing, including those possible the accusatorial method permits the use of deception and lying
conspirators in possession of information about wrongdoing. (Meissner et al., 2012).
Moreover, the concepts introduced here are intended to be relevant Related to the previous classification is the broad dichotomy of
to both cooperative and uncooperative sources, though in future rapport- versus control-based techniques. Rapport-based tech-
empirical evaluations of the process model of interrogation, dis- niques are most closely associated with the information-gathering
tinctive pathways may be uncovered for cooperative and uncoop- model of interrogation, while its antithesis is most related to the
erative individuals. accusatorial method. Rapport-based techniques seek to establish a
working relationship between the operator and the source. In
contrast, control-based techniques are those that emphasize the
Broad Interrogation Categories
operator’s authority over the source (see Army Field Manual,
Some of the most widely cited literature on interrogation orga- 2006; Evans, Meissner, Brandon, Russano, & Kleinman, 2010).
nizes techniques into general categories based on the intended As laid out above, no matter the label researchers have put onto
outcome or the underlying purpose. For example, one of the most these categories, there appear to be essentially only two. It would
prominent broad classifications of interrogation techniques is min- not be unreasonable to collapse the minimization, information-
imization and maximization, first introduced by Kassin and gathering, humane, and rapport-based categories under one um-
INTERROGATION TAXONOMY 167

brella, and maximization, accusatorial, dominant, and control- niques into the six categories: (a) Accusation/Reaccusation (i.e.,
based categories in the other.1 Although no one (to our knowledge) repeated accusations and prompts to take lie detector test), (b)
has suggested that operators in practice only use one category of Challenging Denials (i.e., repeated claims to suspect that alibi is
techniques to the exclusion of the other, the science examining false and disallowing denials), (c) Confronting with True Evidence
these classifications has tended to do just that. More specifically, of Guilt (i.e., truthful claims of failed or inconclusive polygraph),
most laboratory studies have, for instance, pitted maximization (d) Confronting with False Evidence of Guilt (i.e., false claims of
techniques against minimization ones (e.g., Kassin & McNall, failed polygraph, video, DNA, and fingerprint evidence), (e)
1991; Klaver, Lee, & Rose, 2008; Narchet, Meissner, & Russano, Promises of Leniency (i.e., implicit and explicit suggestions of
2011). Our intent is not to criticize these seminal pieces of re- more lenient charges and sentences), and (f) Threats/Use of Phys-
search, as we fully recognize that laboratory studies offer the ical Harm (i.e., implicit and explicit threats of harm, and assault).
advantage of experimental control and the disadvantage of not These resulting categories, although certainly conceptually fitting
allowing the testing of too many factors simultaneously. Rather, of the 18 techniques, appear to be far too narrow to accommodate
our intent is to highlight the fact that actual operators use multiple other, unidentified interrogation techniques. For instance, no
techniques (e.g., Leo, 1996; Soukara, Bull, Vrij, Turner, & Cher- rapport-based techniques or isolation/contextual techniques were
ryman, 2009) representing multiple categories. included, and do not naturally fit into one of the developed
categories.
In summary, with few exceptions, the extant classification and
Specific Interrogation Techniques
description of interrogation techniques is simultaneously overly
In contrast to broad interrogation categories, at the other end of broad and overly narrow. Though there have been attempts at
the spectrum are individual, specific interrogation techniques. For intermediary classifications, they are few and far between, and
example, Leo (1996) observed police interrogations in California, tend to lack conceptual suitability and extensive applicability. In
identifying 25 interrogation techniques. Similarly, Soukara et al. what follows, we describe our procedures and outcomes of creat-
(2009), in reviewing audio recordings of British interrogations, ing a mesolevel of interrogation methods. We aimed to create
found 17 distinct interrogation techniques. Though there is some interrogation domains that were conceptually distinct, but have the
overlap between these combined 42 techniques, some of the most ability to accommodate techniques not yet developed or specifi-
commonly used techniques in one are not included in the other. For cally named.
example, in Leo’s study, appealing to the subject’s conscience and
undermining the suspect’s confidence in his or her denial of guilt Identifying and Classifying Interrogation Techniques
emerged as frequent tactics, neither of which was observed in the
Soukara et al. analysis, perhaps because of the different broad Like much scientific advancement, the development of a taxon-
interrogation models used by the operators (i.e., Reid-based vs. omy of interrogation methods has been incremental; that is, new
information-gathering). Other researchers (e.g., Gudjonsson & research is largely anchored to, and builds upon, that which pre-
Sigurdsson, 1999), having used a variety of methods, have iden- ceded it. We followed a multistep process to create conceptually
tified additional specific techniques, including isolating the suspect based and adaptive interrogation domains (categories). In this
and identifying contradictions in the suspect’s story. section, we describe our method of forming the mesolevel of
To be sure, previous researchers have sorted interrogation tech- interrogation techniques that fit in between the broad dichotomies
niques into a smaller but meaningful number of categories. For and the specific individual techniques. Before doing so, we make
example, in surveying North American police investigators about two points clear.
their interrogation practices, Kassin et al. (2007) asked about 16 First, the constellation of techniques employed to detect decep-
interrogation techniques and then conducted a factor analysis, tion are not discussed here. Deception detection is a category of
based on the reported frequency of use. Four factors resulted, techniques independent of the present discussion. It is undoubtedly
labeled Isolation, Rapport, and Minimization (e.g., appeal to the related to interviewing and interrogation, though detecting decep-
source’s self-interest, establish rapport, isolate the source), Con- tion does not directly speak to eliciting information. Instead, these
frontation (e.g., identify contradictions in the source’s story, inter- techniques generally have to do with assessing the credibility of
rupt denials), Threatening (e.g., threaten the source, demonstrate the information that is being offered by a source (Vrij, 2008).
impatience), and Presentation of Evidence (e.g., communicate to Second, we adopted fairly expansive inclusion criteria, regard-
sources that they failed polygraph exams, show sources photo- less of the techniques’ perceived or actual effectiveness or legal
graphs related to the incident). Though fairly parsimonious, the status specific to any one country. Although the taxonomy includes
practical usefulness of these groupings is uncertain. This is be- techniques that some deem to be psychologically coercive (and
cause techniques that are not necessarily conceptually related are indeed outlawed in certain countries, such as the use of trickery
grouped together—like establishing rapport and isolating the and deception), torture and other forms of physically abusive
source. Though useful for the purposes of determining which techniques have been purposefully omitted from the taxonomy.
techniques may be used with similar frequency, these four factors Like all the techniques we examined, torture is real and has been
may be less useful for identifying conceptual clusters of interro- used against sources, but we have chosen to not engage with these
gation tactics. techniques because torture is a category unto itself and arguably
In another attempt at classification, one which was based on
conceptual similarities, Leo and Liu (2009) created six categories, 1
Another similar dichotomy is the fostering and forcing paradigms
derived from Ofshe and Leo’s (1997) process model of interroga- found in the negotiation literature (Cutcher-Gershenfeld, McKersie, &
tion influence. They then sorted 18 identified interrogation tech- Walton, 1995).
168 KELLY, MILLER, REDLICH, AND KLEINMAN

“different” (for a detailed discussion, see Colb, 2009). Although the source, operators could use the technique of “appealing to the
acts of cruelty by state actors in the pursuit of information remain suspect’s conscience,” which can be found in the literature (Kassin
a common scourge in certain parts of the world, we have chosen to et al., 2007; Leo, 1996).
remain in line with the Geneva Convention’s idea of preserving The second step in developing the mesolevel was to reduce the
and promoting the humane treatment and interrogation of pris- number of techniques identified to allow for closer examination
oners. and eventual sorting. The paring process was accomplished in
In addition, we have chosen to construct the taxonomy and three ways. First, some of the more than 800 techniques were not
process model in the most generalized and comprehensive manner what we would consider to be interrogation techniques, but rather
by including all techniques (sans torture) regardless of perceived operator characteristics or related topics. For example, “caution
effectiveness. For one, agreement does not always exist on what given” and “explains right to legal advice” (Walsh & Milne, 2008)
are and are not perceived to be effective techniques, particularly if are not considered interrogation techniques for our purposes. As
the views of both scientists and practitioners are included, and the essence of Miranda warnings and those warnings required by
depending on how effectiveness is defined. Furthermore, because the PEACE model, these actions are undoubtedly critical to un-
our purpose here is to introduce to the academic and operational
derstanding the context of interrogation and the overall effective-
communities a new way of thinking about interrogation in terms of
ness of other techniques. Similar to the techniques of deception
the mesolevel domains, we intend for the taxonomy to be dis-
detection, however, these were excluded from consideration be-
cussed, debated, researched, and refined according to best prac-
cause they do not relate directly to eliciting information from
tices and customs of those utilizing it. As such, at this point in
sources. We readily concede that there is more to interrogation
time, consideration of the actual and perceived effectiveness of any
than the techniques addressed here, but for the purposes of the
one specific technique or collection of techniques in the taxonomy
is not warranted. present discussion, we confine ourselves to only those tech-
The initial step, therefore, in creating the taxonomy’s mesolevel niques directly related to eliciting information or producing a
was to conduct a comprehensive review of the extant literature in true confession.
an attempt to identify all previously recognized interrogation tech- Next, many techniques were listed in two or more sources. It
niques. One of the authors of the current paper had recently was quite common to find individual techniques appearing in more
participated in a meta-analytic review (Meissner et al., 2012) of the than one reference, as many of the references built on earlier
interview and interrogation literature, in which published, unpub- published ones and/or were written by the same author(s). For
lished, and multinational government documents were sought. We example, Culhane et al. (2008), Feld (2006), Kassin et al. (2007),
thus feel confident that we reviewed most, if not all, possible King and Snook (2010), and Leo & Liu (2009) asked about or
sources of interrogation techniques. This first step resulted in 47 coded for techniques that were based in part on the work of Leo
sources, in which 824 techniques were listed. These sources in- (1996). Additionally, about 36% of the publications listed in the
cluded criminal investigation and interviewing, HUMINT collec- Appendix were coauthored by individuals who appeared on two or
tion, and the interrogation of cooperative and uncooperative more publications. Third, we considered specific variations of a
sources. With two exceptions—the Inbau et al., (2013) manual and technique as one technique. For instance, we were interested in
the Army Field Manual (2006)2—the publications were empirical “presenting false evidence” rather than “presenting false DNA
examinations of the reported use and/or effectiveness of the tech- results,” “presenting false fingerprints,” and “presenting false
niques under review. In addition, most studies were observational, polygraph results” (Leo & Liu, 2009). For our purposes, these
experimental, or self-report surveys; three United States Office of three are functionally the same and fall under the technique “con-
the Director of National Intelligence (ODNI) reports consisted of fronting the source with false evidence of guilt or complicity”.
semistructured interviews with interrogators and intelligence op- These three steps reduced the list of techniques from 824 to 209.
erators (see the Appendix for a complete list of the 47 sources, We then entered a total of 209 techniques into a spreadsheet,
including the primary methodologies and country where the stud- which the first three authors used to independently examine them.
ies were conducted). Finally, of these publications that studied A color-coding system was used to identify duplicates and others
actual interrogations and interactions between operators and that were very similar, or those that were not true techniques that
sources—as opposed to those that surveyed or interviewed op- may have been missed the first time (e.g., offer moral rationaliza-
erators (e.g., Kassin et al., 2007)—all but a few did not specify the tions and offer moral justifications). Of these 209, 53% were
characteristics of the sources.3 As such, the domains and process
determined to be duplicates and 13% were not considered to be
model can be applied to the spectrum of possible subgroups within
sources, though it is important to empirically test this assertion in
2
the future. Interrogations conducted by members of the United States Armed
To ensure comprehensiveness, we also considered related pub- Forces are governed by the United States Army Field Manual (FM) 2-22.3,
lications, such as the Gudjonnson Confession Questionnaire Human Intelligence Collector Operations, September 6, 2006. This docu-
ment supersedes the long-standing reference, FM 34-52, Intelligence In-
(GCQ-R; Gudjonsson & Sigurdsson, 1999), which does not pertain terrogation.
to interrogation techniques per se, but it does identify reasons for 3
Faller, Birdsall, Henry, Vandervort, and Silverschanz (2001) focused
confession that are translatable into interrogation techniques. For on sex offenders; Feld (2006); Kostelnik and Reppucci (2009); Meyer and
instance, several related reasons for confessing found in the Reppucci (2007), and Reppucci, Meyer, and Kostelnik (2010) focused on
juveniles; Holmberg and Christianson (2002) researched murderers and sex
GCQ-R are that the suspect felt guilty, wanted a sense of relief, offenders; Lippert, Cross, Jones, and Walsh (2010) examined those sus-
was concerned about how others viewed him/her, and was pected of child sexual abuse; and Pearse, Gudjonsson, Clare, and Rutter
ashamed of committing the crime. To elicit these feelings within (1998) assessed psychological vulnerability among suspects.
INTERROGATION TAXONOMY 169

specific techniques for our purposes. This step resulted in a total of Like other scientific classifications, the taxonomy of interrogation
71 unique techniques identified. methods, based on the best information available at the time of its
Our third step was to find or develop a suitable classification development, is intended to incorporate additional techniques as
scheme to categorize the 71 identified techniques. In 2010, one of they are discovered and put into use in the field.
the authors of the present paper devised a system to categorize the Arguably, some of the techniques in Table 1 can be plausibly
19 Army Field Manual approaches. The objective of this catego- sorted into more than one category, thereby negating the entire
rization was to collect better data “by setting aside the Field conceptualization of the taxonomy, the domains, and the process
Manual labels (which may be subject to individual variation in model. This would be an act of neglecting the forest for the trees.
definition) in favor of a set of generic, yet more descriptive Although the assembling, reducing, and sorting of the individual
categories of interrogation strategies” (p. 1). Kleinman (2010) techniques into the domains was carefully considered, we do not
sorted the approaches into six categories, based on the approaches’ make the assertion that the domains are defined by the sum of their
underlying conceptual goals: (a) Focus on information and facts; constituent techniques. Instead, this process was methodically per-
(b) focus on relationship/rapport; (c) appeal to/elicit emotion; (d) formed and detailed above to demonstrate that the scores of known
emphasize threats and competition; (e) emphasize rewards and individual interrogation techniques could be meaningfully grouped
collaboration; and (f) leverage context. together in a way that has not been previously considered. It is the
Using Kleinman’s (2010) six categories to sort the individual introduction of the mesolevel domains within a taxonomic struc-
techniques into meaningful groups, and a similar process of color- ture, however, that is the main contribution to the literature. Future
coding within a spreadsheet, we grouped the techniques according research can and should use as indicators of the domains the
to their underlying principle or aim. Some were easier and more techniques (either separately or clustered temporally within an
straightforward than others, such as those techniques that spoke to interrogation) as they have been identified and sorted here.
the physical setting in which an interrogation took place (e.g.,
leverage context), or that evidence or established fact that would
Rapport and Relationship Building
be used as leverage to compel the source to divulge additional
information. Similarly, the techniques that could be considered As shown in Table 1, we identified 14 individual interroga-
harsh or fear based were fairly simple to group together. Two tion techniques under the heading of Rapport and Relationship
coders independently sorted the techniques into the six categories, Building. Although the importance of rapport between operator
and the interrater agreement was 84%, with a free-marginal kappa and source is noted in nearly all studies of interrogation (see
of .71. Discrepancies were then discussed and consensus obtained. Borum, 2006; Hays, 2008; Kleinman, 2006; St-Yves, 2006), no
Once all the techniques were reliably sorted, we refined the six previous work has attempted to operationalize rapport by the
category labels and definitions. techniques that can be or are used to build it. Examples of
The final step was an attempt to assess face validity. Experts, rapport-based techniques include finding common ground with
who included three senior interviewing and interrogation research- the source, demonstrating kindness and respect, and meeting the
ers and one military intelligence operator, reviewed our process, basic needs (e.g., food, water) of the source. In the Reid model,
coding scheme, and placement of identified techniques within the rapport-building is most likely to begin during the distinct
six domains. Whereas the researchers had no suggestions on im- interview phase, but certainly (especially as we define it here)
proving the classification system, the operator suggested additional continue on into the interrogation.
techniques. These techniques, however, could either have been Rapport can be considered the cornerstone of any attempt to
considered duplicates of several of the 71 techniques already successfully elicit information from a uncooperative source. Al-
identified or could not be sourced to a written document. In though it has been argued that the term “operational accord” is
keeping with our inclusion/exclusion criteria, the decision was more appropriate than rapport in describing the phenomenon of
made to only include techniques that could be sourced, and were building a relationship between operator and source (Borum,
thus not idiosyncratic to any one individual with interrogation Gelles, & Kleinman, 2009), for purposes of this paper, we will use
experience. the more common term “rapport. ” We define rapport as a working
relationship between operator and source based on a mutually
shared understanding of each other’s goals and needs, which can
Mesolevel: Interrogation Domains
lead to useful, actionable intelligence or information. It is the
The resultant six interrogation domains are: (a) Rapport and give-and-take, interactional nature of rapport, based on a respectful
Relationship Building; (b) Context Manipulation; (c) Emotion relationship between two humans that sets rapport apart from the
Provocation; (d) Confrontation and Competition; (e) Collabora- other domains. It is “the invisible wave along which information
tion; and (f) Presentation of Evidence (see Table 1). We note here can flow from the one to the other” (St-Yves, 2006, p. 88).
that, whereas existing techniques may have been inadvertently Rapport does not necessarily imply that the two parties must
overlooked during the taxonomy’s development, or the more likely have affection for one another (Kleinman, 2006). Instead, rapport
scenario that new tactics will be developed and researched in the is based on respect (Hays, 2008), mutual trust (Bucheimer &
future, we believe it unlikely that neglected or newly recognized Balogh, 1961), empathy (Schafer & Navarro, 2004), and reciproc-
techniques will fall outside of these six domains. In other words, ity (Archer, 1979). Further, St-Yves (2006) details five basic rules
the six domains within the interrogation taxonomy presented here of rapport: (a) keeping an open mind and remaining objective; (b)
represent the universe of conceptually meaningful yet parsimoni- building up rapport; (c) paying attention; (d) keeping a profes-
ous groupings of what operators do to elicit information and sional attitude; and (e) knowing how to conclude. Indeed, nowhere
confessions, even if the techniques within them are not exhaustive. in the five basic rules of rapport is the requirement that operator
170
Table 1
Interrogation Domains and Constituent Techniques

Rapport and relationship Confrontation and


building Context manipulation Emotion provocation competition Collaboration Presentation of evidence

1. Find common ground 1. Conduct the 1. Appeal to self-interest 1. Emphasize your 1. Offer rewards or 1. Confront source with
or shared experiences interrogation in a small authority and expertise reinforcement for actual evidence of
room over source desired information involvement
2. Show kindness and 2. Move the interrogation 2. Appeal to conscience 2. Challenge the values 2. Make bargains with 2. Confront source with
respect from a formal room to a held by source source fabricated or knowingly
more neutral setting unsubstantiated evidence
of involvement
3. Identify and meet basic 3. Move the interrogation 3. Appeal to religion 3. Threaten source with 3. Appeal to sense of 3. Bluff or bait source about
needs from a neutral setting to consequences for non- cooperation supposed evidence you
a more formal room cooperation have of involvement
4. Be patient 4. Isolate source before 4. Interrogate source while 4. Express impatience, 4. Present scenario so 4. Identify contradictions
interrogation very stressed. frustration or anger source may regain or with source’s story
assert control
5. Allow source to play 5. Disorganize source by 5. Offer moral rationalizations 5. Use deception 5. Offer special rewards 5. Reveal evidence to
role of teacher manipulating the (e.g., cigarettes, candy) source, demonstrating that
physical space for cooperation s/he can offer no more
useful information until
s/he eventually does
6. Build a bond 6. Consider the time of 6. Capitalize on capture shock 6. Obscure source’s fate 6. Offer intangible rewards 6. Use polygraphs or other
day (e.g., encouragement, physiological measures
respect)
7. Present self as in a 7. Consider your physical 7. Appeal to negative feelings 7. Ask the same question 7. Present a scenario where 7. Show source photos or
role/persona other than appearance (clothing) for individuals or over and over interrogator’s “job” is to statements from witnesses
being an interrogator organizations accurately represent or others
source as innocent or
helpful to higher
authorities
8. Touch source in a 8. Prisoner’s Dilemma 8. Identify and exaggerate 8. Ask a series of questions 8. Use visual aids
KELLY, MILLER, REDLICH, AND KLEINMAN

friendly manner fears quickly and without


allowing source to
answer
9. Find identities in 9. Consider where operator 9. Reduce fears 9. Do not allow denials
common and detainees’ chairs are from source
in relation to one
another
10. Attempt to become 10. Create setting that is 10. Flatter source 10. Do not speak to source,
source’s lifeline culturally attractive. only stare at source
11. You make yourself 11. Consider the effect of 11. Instill hopelessness in 11. Confront source
appear to be similar to certain colors or source without insulting
the source sounds
12. Show concern for 12. Encourage source to take 12. Adopt a non-friendly
source and his/her responsibility for the stance
situation outcome
13. Use similar language as 13. Insult source
the source (e.g. slang)
INTERROGATION TAXONOMY 171

and source become friends, though it has been suggested that

Presentation of evidence
feigning friendship can assist in establishing rapport (Gelles,
McFadden, Borum, & Vossekuil, 2006), or that a genuine friend-
ship of sorts could evolve over time (Kleinman, 2006). Some
scenarios, however, do not permit operators as much time as others
to build rapport with the subject, such as those with tactical and/or
time-sensitive aims; nonetheless, there is general consensus in the
literature that, at some level, a working relationship must be
established between operator and source in order to produce useful
information or intelligence.

Context Manipulation
Collaboration

The next domain, Context Manipulation, includes 11 interroga-


tion techniques. Context manipulation speaks specifically to alter-
ing the physical and temporal space where the interrogation occurs
to maximize the probability of a successful outcome. More gen-
erally, Context manipulation can refer to any technique that does
not possess an interactional quality or interpersonal dynamic that
occurs between the operator and the source. They are, neverthe-
14. Get another interrogator

less, critical aspects to which the operator must attend prior to, and
16. Accuse source of being
15. Directly accuse source
and employ good cop/

17. Disparage or dismiss

during, the interrogation session. Examples of this include the


alternative questions
with being involved

source’s own words


someone s/he is not
Confrontation and

information source

Army Field Manual approaches of separation, which under differ-


19. Ask unexpected/
competition

18. Misconstrue the

ent circumstances could be referred to as isolation or solitary


confinement, or “change of scenery” where the source is moved
provides
bad cop

from a formal interrogation room to a more neutral location in an


effort to reduce the stress of the source.4 Other techniques in this
domain include considering the time of day when the interrogation
takes place, creating an atmosphere where the source feels com-
fortable and less likely to view the interaction as adversarial,
making the room uncomfortably hot or cold, arranging the furni-
ture or other fixtures in the interrogation room in a fashion that
Emotion provocation

sends a specific message to the source (e.g., removing the desk that
might be between the operator and source to create a more inter-
active exchange), or conducting the interview in a small, window-
less, room.

Emotion Provocation
The relationship or rapport that is established between operator
and source at the outset of the interrogation and considering the
context of the interrogation serve as necessary but not sufficient
Context manipulation

elements to the success of the interrogation or interview. Once


rapport has been established, the operator will invariably need to
employ additional techniques to increase cooperation or reduce
resistance. We have identified approximately 40 techniques be-
yond the ones relating specifically to rapport and context described

4
The term “separation” as set forth in the Army Field Manual—and in
general discussion about the technique—may arguably refer to “isolation,”
14. Employ active listening
skills (e.g., eye contact,

a very different process with a decidedly different objective. Separation, as


Rapport and relationship

nodding, summarize
source’s statements)

traditionally used in both law enforcement and intelligence domains, refers


Table 1 (continued)

to the strategy of disallowing two or more sources to interact prior to


questioning to prevent collaboration on a false story or protect a source
building

from being pressured by another to resist. In contrast, isolation refers to


holding a source for an extended period of time under circumstances where
social interaction and/or sensory input is purposely limited in an effort to
deplete their cognitive, affective, or physical ability to resist interrogation.
This is a restricted technique in the Army Field Manual, requiring autho-
rization for its use.
172 KELLY, MILLER, REDLICH, AND KLEINMAN

above and sorted them into the four remaining domains. The first ing the values of the source, all conjure images of an interrogator-
such domain (and its various techniques to be described here) is versus-source scenario.
Emotion Provocation, along with the 12 techniques from which the An additional Field Manual approach, labeled “silence” (but
operator can choose to employ to prompt information from a found elsewhere as well, e.g., Häkkänen et al., 2009; Inbau et
source. al., 2013), involves a scenario in which the operator simply
It can be argued that many techniques of interrogation fall into stares at or maintains eye contact with the source, without
the realm of provoking emotions, as modern interrogation far more speaking, until the source breaks eye contact or the silence, at
often relies on psychological, as opposed to physical, tactics to which time the interrogation can proceed. This is not the overtly
gain compliance (Kassin et al., 2010; Leo, 2008). The difference confrontational style of the other techniques within the domain,
between this domain and the others, however, is that these tech- but it is included here because it was originally intended to
niques are specifically designed to target the source’s raw emo- induce cooperation by expressly ratcheting up the source’s
tions or any real or perceived evidence against the source. Anger, anxiety. As pointed out elsewhere (Brandon, Bhatt, Justice, &
anxiety, fear, guilt, hope, love, pride, and sadness are some of the Kleinman, 2010), however, there are perhaps elements of build-
emotions that operators can tap into as a means of gaining coop- ing rapport through the use of silence, especially with sources
eration and, in turn, meaningful information from a source. The from Arab cultures. Although this may be supported, silence is
techniques in the Emotion Provocation domain include appealing an example of a technique for which an argument can be made
to the source’s self-interest, conscience, or religion, capitalizing on for the cross-classification of techniques.
the stress of being captured or at other periods of heightened stress, Lastly, the Army Field Manual approach known as Mutt and
and exaggerating or alleviating the source’s fear. Jeff, also widely known as good cop/bad cop, is another example
For instance, in orchestrating the Army Field Manual ap- of a technique that could plausibly be sorted into more than one
proaches of “fear up” and “fear down,” the operator seeks to be domain. It is included in the Confrontation/Competition domain,
either intensely provocative in the hopes of eliciting an emotional because of the aggressiveness of the bad cop, which is intended to
outburst by the source, or conversely, softly compassionate to be threatening to the source, is then followed up with the gentler
encourage the source to inadvertently reveal useful information demeanor of the good cop. This dynamic is designed to leverage
while in a relaxed and unthreatened state of mind. A somewhat the contrast between the unattractive and attractive personas of the
similar dynamic occurs in the course of employing the techniques two operators, respectively, and, thereby create a collaborative
of flattering or insulting the source, also known as “ego up” and relationship with the latter.
“ego down” in the Army Field Manual. Through sustained and
gushing flattery, the ego-up approach supposedly benefits from the
Collaboration
source’s ego-driven desire to “show off” his superior knowledge to
his questioner. In contrast, by relating to the source in a conde- The techniques in the Collaboration domain are the opposite of
scending manner, one that involves allegations of incompetence those in the Confrontation/Competition domain, in that the author-
and ignorance, the operator hopes to arouse the source’s desire to ity and control exercised in the previous domain are minimized or
defend his self-esteem by describing in detail his “true” talents and eliminated altogether. Whereas employing techniques that ulti-
knowledge. mately lead to a zero-sum game in the Confrontation/Competition
domain, the operator and source are more equal partners in a
working relationship in which each person has something to offer
Confrontation/Competition
the other, when the seven techniques in the Collaboration domain
Our next two categories of interrogation techniques, Confron- are used,. One approach to collaboration is the offering of rewards
tation/Competition and Collaboration, are, in essence, opposite in exchange for information.
sides of the same behavioral coin. The former relies on threats or Rewards can come in one of two forms: tangible and intangible
perceived punishment and the latter upon a reward system, both of (Kleinman, 2010). Examples of tangible rewards through interro-
which are utilized to gain compliance with the source. In the gation techniques can be necessities, such as food, or water, or
Confrontation/Competition domain, which includes 19 specific amenities such as a pillow, extra blanket, candy, or cigarettes.
interrogation techniques, the operator asserts authority and control Intangible rewards, on the other hand, are promises of better
over the subject to gain compliance, and the relationship becomes treatment while detained or a reduced punishment for cooperation.
a zero-sum game where the operator wins and the subject loses No less tangible, though not quite a reward per se, is appealing to
(Kleinman, 2010). The techniques in this domain build off those in the source’s sense of cooperation and demonstrating genuine con-
the Emotion Provocation domain that increase the source’s stress cern for him/her. These are basic human instincts to which all but
and may include the operator challenging the values of the source, the most hardened sources are susceptible, and operators can
expressing impatience, frustration or anger, obscuring the fate of capitalize on these instincts in exchange for information from the
the source, and employing deception in order to induce coop- source.
eration.
Many of the techniques in the Confrontation/Competition do-
Presentation of Evidence
main are the approaches found in the Army Field Manual, 2–22.3.
One might expect this, as these techniques come from the rulebook The final domain, Presentation of Evidence, focuses on demon-
of a military institution where command and control are of primary strating to the source in various ways what the authorities already
importance. These techniques, such as repeated and rapid-fire know or claim to know in an attempt to glean more information.
questions, the expression of authority and expertise, and challeng- There are eight techniques included in this domain. As Kleinman
INTERROGATION TAXONOMY 173

(2010) states, the Presentation of Evidence domain can be used The resemblance of the model to a wheel with a hub-and-spoke
“for gaining cooperation or compliance; for testing veracity or design is purposive. All components of the model must function
detecting deception; and/or exploring the source’s level of knowl- together in order to work properly, but it does not necessarily
edgeability” (p. 1).5 Nearly all reports and studies reviewed in- imply that all components are of equal import. To extend the
cluded the straightforward technique of presenting the source with metaphor, the entire functioning of a wheel would be impossible if
actual evidence of the source’s guilt, or possession of information not for the presence of an effective hub at the center. Likewise, the
that would be of use to the operator. On the other hand, Leo (1996) tire surrounding the structure, facilitating the operation of the
presented data that false evidence is used in the interrogation room wheel’s design, is also a critical element. The spokes, on the other
and Kassin et al. (2007) reported that a subset of their sample hand, are necessary, but at times can represent extraneous elements
would have the source take a polygraph and tell him he failed it. of the design. There may be an optimal number of spokes in a
Lastly, a commonly used technique in this domain is identifying wheel, though when one or more are missing— or if more func-
contradictions in the source’s accounting of events (Kassin et al., tionally unnecessary spokes are added—the wheel can still suc-
2007; Soukara et al., 2009). This is included in the Presentation of cessfully operate.
Evidence domain because such contradictions become evidence in Due to the overwhelming support in the studies and reports on
and of themselves, and leverage for purposes of gaining coopera- interrogation and interviewing for rapport-based approaches as
tion, information, intelligence, or an admission of guilt or involve- critical to any successful interrogation, the Rapport and Relation-
ment in illegal or suspicious activities. ship Building domain is therefore the hub of the model. St-Yves
To this point in the scientific inquiry into interrogation, what (2006) stated, “Whereas other techniques can be helpful, rapport
was used or found to be effective in interrogation was described can do without these techniques, and techniques without rapport
and researched in very specific terms of the technique, or in broad are unlikely to be effective” (p. 92). Likewise, the Army Field
dichotomies into which the techniques could be sorted. Post hoc Manual 2–22.3 acknowledges the importance of building relation-
empirical investigations (Kassin et al., 2007; Leo & Liu, 2009) into ships with sources, as establishing and maintaining rapport is a
the existence of more detailed categories of interrogation tech- common thread through all interrogations, regardless of other
niques have not been sufficient for our purposes here. The six
approaches and techniques employed (pp. 8 –3). Finally, according
domains in the current work, which include the full spectrum of
to Borum (2006), rapport serves two functions: it gets the source
interrogation techniques, represent a parsimonious rendering of
talking, and “allows the [operator] to identify and assess potential
what operators do to elicit information from uncooperative
motivations, interests, and vulnerabilities” (p. 22).
sources. The mesolevel domains presented above, when viewed in
We contend that it is from rapport-based techniques that all
conjunction with the specific techniques and the broad categories,
others flow, for without a minimum level of rapport between the
produce a viable taxonomy of interrogation techniques. It thus
operator and source, the interrogation is unlikely to succeed. In
gives researchers and operators alike the ability to examine inter-
other words, no other domains are possible without first establish-
rogation in a more meaningful way, as well as representing an
ing rapport, leading to the centrality of the domain in the model.
advance in how we think about, discuss, research, and conduct
interrogations. The arrows are double-headed because of the assumption that
operators can and do return to the basic rapport-building tech-
niques if the other domains fail to produce the intended outcome of
A Theoretical Interactive Process Model of the interrogation. In addition, the arrows go both ways because
Interrogation success in one of the other domains can produce a recursive
The foregoing description of the six domains in our taxonomy relationship, whereby rapport and relationships are further
sets the stage for the second aim of this paper: a theoretical strengthened.
exploration of how the domains relate to one another in an inter- The Context Manipulation domain envelops the model because
rogation session, or in the ongoing relationship between operator the physical setting and other noninterpersonal techniques (e.g.,
and source. Because the macrolevel categories cannot describe the considering the time of day) ought to be considered in all interro-
process of interrogation and the microlevel techniques are too gation sessions. These factors can contribute to the success or
numerous to succinctly explain it, the exposition and addition of failure of the interrogation, and we argue that the context can affect
the six meaningful mesolevel domains to the literature is a neces- any of the other domains, starting with Rapport and Relationship
sary step forward in our understanding of the science of interro- Building.
gation and interviewing. Furthermore, it would be of great utility Once rapport has been successfully established, and depending
to both researchers and operators in the field to have a theoretical on the contextual factors in the interrogation room, the process
framework of how the domains could plausibly interact. As we then moves to one of the four other interpersonal domains within
present no data to support this model, it is not our intention to state the model. The Emotion Provocation and Presentation of Evidence
with any empirical certainty that the model follows the actions of domains are theorized to act as mediators, or intermediate do-
operators in the field. Instead, the purpose of the model is to create mains, to both the Confrontation/Competition and Collaboration
a heuristic device that can be subsequently exposed to the rigors of domains, as within the former domains are techniques that can
scientific investigation, validation, remediation, and debate. It is
through such a process that our understanding of interrogation and 5
In the vernacular of intelligence, the term “knowledgeability” refers to
its practice can improve. The theoretical interactive process model the depth and breadth of information a source possesses through direct
of interrogation using the derived domains is the second step access (i.e., through direct experience as opposed to hearsay or specula-
toward this goal, and is presented in Figure 1. tion).
174 KELLY, MILLER, REDLICH, AND KLEINMAN

Figure 1. Theoretical interactive process model of interrogation.

reasonably lead to the zero-sum relationship of confrontation or the domains and techniques are much more fluid in actual
the partnership that is created when operator and source collabo- practice. Flexibility within the domains allows operators to
rate. To illustrate the mediator effect of these two domains, take an adapt to conditions in the interrogation room, and the blending
example technique from the Presentation of Evidence domain. As of techniques where necessary.
noted above, presenting fabricated evidence of the source’s in- The development of the interrogation domains has allowed
volvement in an act or possession of knowledge, although an for a theoretical process model to be introduced, as existing
interrogation technique in its own right, can be considered coercive interrogation research that focuses on broadly defined catego-
in nature (Leo, 1996). The coerciveness of the technique is more ries or highly specific techniques does not lend itself to mean-
likely to lead to employing the techniques within the Confronta- ingful declarations on how interrogation “works.” We put forth
tion/Competition domain, should the interrogation process go for- this model not as the definitive statement on how interrogation
ward. On the other hand, successfully using flattery or praise, a works or on what is effective; instead, the ideas presented here
technique within the Emotion Provocation domain would more are intended to inspire research and practice in the short term,
likely lead to adopting more collaborative techniques than con- such that they may be tested empirically and refined accord-
frontational ones. ingly. In the long run, however, the present examination may be
The Confrontation/Competition and Collaboration domains, the antecedent of a more rational and effective interrogation
then, represent “dead-ends” in the model, in that they are not policy, based on scientific evidence that will meet the day’s
linked to one another, nor do they directly lead to others. We legal and ethical standards for the questioning of sources,
theorize that once operators move to employing the Confron- suspects, and detainees.
tation/Competition or Collaboration domains, either directly
from Rapport and Relationship Building or through the medi-
Conclusion
ating domains of Emotion Provocation or Presentation of Evi-
dence, there can be no application of the other domains without The preceding taxonomy of interrogation methods, including
returning to the central domain. Of the six domains in the the development of the six domains and the theoretical process
model, these represent the two most diametrically opposed model, is decidedly not a polemic against the current state of
approaches, and the techniques within them are not likely to be interrogation research. On the contrary, we see the taxonomy
located in another domain. and its domains as an organic outgrowth of what has come
The model’s double-headed arrows between Rapport and before it, a natural progression from existing knowledge to the
Relationship Building and the other domains and the single- next stage of how we understand the very important topic of
headed ones emanating from Emotion Provocation and Presen- interrogation. As new techniques are discovered and old ones
tation of Evidence are indicative not just of the process of are better understood, an interrogation framework can be of
interrogation but also of the interdependent nature of the do- great value to the academic and operational communities.
mains. Although we have attempted to impose scientific order Training manuals and research on interrogation and inter-
on the practice of interrogation through a taxonomic structure, viewing are replete with various techniques, tactics, and pro-
INTERROGATION TAXONOMY 175

cedures for obtaining confessions, generating human intelli- Bucheimer, A., & Balogh, S. C. (1961). The counseling relationship: A
gence, or any number of other goals of an interaction between case-book. Chicago, IL: Science Research Associates.
operator and source, subject, or suspect. At one end of the Bull, R., & Soukara, S. (2010). Four studies of what really happens in
spectrum, there are highly specific techniques, such as appeal- police interviews. In G. D. Lassiter & C. A. Meissner (Eds.), Police
ing to the suspect’s self-interest (Leo, 1996) and disclosure of interrogations and false confessions: Current research, practice, and
policy recommendations (pp. 81–95). Washington, DC: American Psy-
evidence (Soukara et al., 2009), which have been found to be
chological Association. doi:10.1037/12085-005
frequently used by authorities and related to outcomes. At the
Cassell, P. G. (1996). Miranda’s social costs: An empirical reassessment.
other end of the spectrum are techniques on the overall process of
Northwestern University Law Review, 90, 387–399.
interrogation (Gudjonsson, 2003; Inbau et al., 2013), representing Cassell, P. G., & Hayman, B. S. (1996). Police interrogation in the 1990s:
a bird’s eye view of nationalistic interrogation approaches, like An empirical study of the effects of Miranda UCLA Law Review, 43, 839.
accusatory versus information gathering (Meissner et al., 2012). Cialdini, R. B. (2001). The science of persuasion. Scientific American, 284,
Related to this are broader methods of persuasion that have been 76 – 81. doi:10.1038/scientificamerican0201-76
cited by interviewing and interrogation scholars on the process of Colb, S. F. (2009). Why is torture “different” and how “different” is it?
gaining cooperation (e.g., Cialdini, 2001). Cardozo Law Review, 30, 1411–1473.
Using a wide range of methodologies, including laboratory Culhane, S. E., Hosch, H. M., & Heck, C. (2008). Interrogation technique
experiments, observational field studies, in-depth interviewing, endorsement by current law enforcement, future law enforcement, and
and survey research, scholars will rightly continue researching laypersons. Police Quarterly, 11, 366 –386. doi:10.1177/
these broad and specific tactics in search of the most diagnostic 1098611107309116
techniques. Nevertheless, actual interrogations do not consist of Cutcher-Gershenfeld, J. E., Mckersie, R. B., & Walton, R. E. (1995). Why
merely one technique (either narrowly or broadly construed) change? Pathways to change: Case studies of strategic negotiations.
(pp. 1–14). Kalamazoo, MI: W. E. Upjohn Institute for Employment
practiced in a vacuum. Rather, operators use a constellation of
Research.
techniques; conceivably each technique within this constella-
Deslauriers-Varin, N., Lussier, P., & St-Yves, M. (2011). Confessing their
tion impacts the effectiveness of the next one employed. There-
crime: Factors influencing the offender’s decision to confess to
fore, any one interrogation technique’s diagnosticity when used the police. Justice Quarterly, 28, 113–145. doi:10.1080/
alone may not be the same when used in conjunction with other 07418820903218966
techniques. For scholars to better understand the production of Dixon, D. (2007). Interrogating images: Audio-visually recorded police
true versus false confessions, or complete versus incomplete questioning of suspects. Sydney, Australia: The Sydney Institute of
intelligence, a move toward studying the gestalt of interroga- Criminology.
tions is required. The domains described as part of the larger Evans, J. R., Meissner, C. A., Brandon, S. E., Russano, M. B., & Kleinman,
taxonomy of interrogation techniques, and the theoretical pro- S. M. (2010). Criminal versus HUMINT interrogations: The importance
cess model described above, get us—scholars and operators of psychological science to improving interrogative practice. Journal of
alike— closer to this ideal. Psychiatry & Law, 38, 215–249.
Faller, K. C., Birdsall, W. C., Henry, J., Vandervort, F., & Silverschanz, P.
(2002). What makes sex offenders confess? An exploratory study. Jour-
References nal of Child Sexual Abuse, 10, 31– 49. doi:10.1300/J070v10n04_03
Feld, B. C. (2006). Police interrogation of juveniles: An empirical study of
Alison, L., Kebbell, M., & Leung, J. (2008). A facet analysis of police policy and practice. The Journal of Criminal Law and Criminology, 97,
officers’ self-reported use of suspect-interviewing strategies and their 219 –316.
discomfort with ambiguity. Applied Cognitive Psychology, 22, 1072– Frantzen, D. (2010). Interrogation strategies, evidence, and the need for
1087. doi:10.1002/acp.1408 Miranda: A study of police ideologies. Police Practice & Research, 11,
Archer, R. L. (1979). Anatomical and psychological sex differences. In
227–239. doi:10.1080/15614260902830005
G. J. Chelune & Associates (Eds.), Self disclosure: Origins, pattern, and
Gelles, M. G., McFadden, R., Borum, R., & Vossekuil, B. (2006). Interview-
implications of openness in interpersonal relationships (pp. 80 –109).
ing Al-Qaeda-related subjects: A law enforcement perspective. In Tom
San Francisco, CA: Jossey-Bass.
Williamson (Ed.), Investigative interviewing: Developments in research,
Baldwin, J. (1992). Videotaping police interviews with suspects—an eval-
rights and regulation (pp. 23– 41). Devon, UK: Willan Publishing.
uation. Police Research Series: Paper No. 1. London, UK: United
Greene, C. H., Greene, M. E., & Holt, J. S. (2010). Intelligence interview-
Kingdom, Home Office Police Department.
ing: Final report with methodology analysis and coding. Washington,
Baldwin, J. (1993). Police interview techniques: Establishing truth or
proof? British Journal of Criminology, 33, 325–352. DC: Office of the Director of National Intelligence.
Borum, R. (2006). Approaching truth: Behavioral science lessons on educ- Griffiths, A. (2008). An examination into the efficacy of police advanced
ing information from human sources. In Intelligence Science Board investigative interview training. Unpublished doctoral thesis. University
(Ed.), Educing information: Interrogation. Science and art: Foundations of Portsmouth, Portsmouth, UK.
for the future. Phase 1 report (pp. 17– 43).Washington, DC: National Grimes, J. T., Holt, J. S., & Tanios, M. P. (2010a). Intelligence interview-
Defense Intelligence College Press. ing. Washington, DC: Office of the Director of National Intelligence.
Borum, R., Gelles, M. G., & Kleinman, S. M. (2009). Interview and Grimes, J. T., Holt, J. S., & Tanios, M. P. (2010b). Intelligence interview-
interrogation: A perspective and update from the USA. In R. Milne, S. ing (paper #2). Washington, DC: Office of the Director of National
Savage, & T. Williamson (Eds.), International developments in investi- Intelligence.
gative interviewing (pp. 111–128). Cullomtpon, Devon, UK: Willan Gudjonsson, G. H. (2003). Interrogation tactics & techniques. The psy-
Publishing. chology of interrogations and confessions: A handbook (1st ed., pp.
Brandon, S. E., Bhatt, S., Justice, B. P., & Kleinman, S. M. (2010). Army 7–37). John Wiley & Sons.
field manual 2-22.3: Interrogation methods. A science-based review. Gudjonsson, G. H., & Sigurdsson, J. F. (1999). The Gudjonsson confession
Washington, DC: National Defense Intelligence College Press. questionnaire-revised (GCQ-R): Factor structure and its relationship
176 KELLY, MILLER, REDLICH, AND KLEINMAN

with personality. Personality and Individual Differences, 27, 953–968. Lippert, T., Cross, T. P., Jones, L., & Walsh, W. (2010). Suspect confes-
doi:10.1016/S0191-8869(98)00278-5 sion of child sexual abuse to investigators. Child Maltreatment, 15,
Häkkänen, H., Ask, K., Kebbell, M., Alison, L., & Granhag, P. A. (2009). 161–70. doi:10.1177/1077559509360251
Police officers’ views of effective interview tactics with suspects: The McConville, M., & Baldwin, J. (1982). The role of interrogation in crime
effects of weight of case evidence and discomfort with ambiguity. discovery and conviction. British Journal of Criminology, 22, 165–175.
Applied Cognitive Psychology, 23, 468 – 481. doi:10.1002/acp.1491 Mcgurk, B. J., Carr, M. J., & Mcgurk, D. (1993). Investigative interviewing
Hays, P. A. (2008). Making meaningful connections: Establishing respect courses for police officers: An evaluation. Police Research Series:
and rapport. In P. A. Hays (Ed.), Addressing cultural complexities in Paper No. 4. London, UK: United Kingdom Home Office Police De-
practice: Assessment, diagnosis, and therapy (2nd ed., pp. 85–101). partment.
Washington, DC: American Psychological Association. doi:10.1037/ Medford, S., Gudjonsson, G. H., & Pearse, J. (2003). The efficacy of the
11650-005 appropriate adult safeguard during police interviewing. Legal and Crim-
Hirst, J. (1993). Royal Commission research papers: A policing perspec- inological Psychology, 8, 253–266. doi:10.1348/135532503322363022
tive. Police Research Series: Paper No. 6. London, UK: United King-
Meissner, C. A., Redlich, A. D., Brandon, S. E., & Bhatt, S. (2012). Interview
dom Home Office Police Department.
and interrogation methods and their effects on true and false confessions.
Holmberg, U., & Christianson, S.-A. (2002). Murderers’ and sexual offenders’
Campbell Systematic Reviews, 13. Retrieved from http://www
experiences of police interviews and their inclination to admit or deny
.campbellcollaboration.org/lib/download/2249. doi:10.4073/csr.2012.13
crimes. Behavioral Sciences & the Law, 20, 31– 45. doi:10.1002/bsl.470
Meyer, J. R., & Reppucci, N. D. (2007). Police practices and perceptions
Horgan, A. J., Russano, M. B., Meissner, C. A., & Evans, J. R. (2012).
regarding juvenile interrogation and interrogative suggestibility. Behav-
Minimization and maximization techniques: Assessing the perceived
ioral Sciences & the Law, 25, 757–780. doi:10.1002/bsl.774
consequences of confessing and confession diagnosticity. Psychology,
Crime & Law, 18, 65–78. doi:10.1080/1068316X.2011.561801 Moston, S., Stephenson, G. M., & Williamson, T. M. (1992). The effects
Inbau, F. E., Reid, J. E., Buckley, J. P., & Jayne, B. C. (2013). Criminal of case characteristics on suspect behavior during police questioning.
interrogation and confessions (5th ed.), Burlington, MA: Jones & Bar- British Journal of Criminology, 32, 23– 40.
tlett Learning. Narchet, F. M., Meissner, C. A., & Russano, M. B. (2011). Modeling the
Irving, B. (1980). Police interrogation: A case study of current practice influence of investigator bias on the elicitation of true and false confes-
(Royal Commission on Criminal Procedure Research Study No. 2). sions. Law and Human Behavior, 35, 452– 65. doi:10.1007/s10979-010-
London, UK: United Kingdom, Her Majesty’s Stationery Office. 9257-x
Kassin, S. M., Drizin, S. A., Grisso, T., Gudjonsson, G. H., Leo, R. A., & Neubauer, D. W. (1974). Confessions in Prairie City: Some causes and
Redlich, A. D. (2010). Police-induced confessions: Risk factors and effects. The Journal of Criminal Law and Criminology, 65, 103–112.
recommendations. Law and Human Behavior, 34, 3–38. doi:10.1007/ doi:10.2307/1142356
s10979-009-9188-6 Ofshe, R. J., & Leo, R. A. (1997). The decision to confess falsely: Rational
Kassin, S. M., Leo, R. A., Meissner, C. A., Richman, K. D., Colwell, L. H., choice and irrational action. Denver University Law Review, 74, 1–130.
Leach, A.-M., & Fon, D. L. (2007). Police interviewing and interroga- Pearse, J., & Gudjonsson, G. H. (1997a). Police interviewing and legal
tion: A self-report survey of police practices and beliefs. Law and representation: A field study. Journal of Forensic Psychiatry and Psy-
Human Behavior, 31, 381– 400. doi:10.1007/s10979-006-9073-5 chology, 8, 200 –208.
Kassin, S. M., & McNall, K. (1991). Police interrogations and confessions: Pearse, J., & Gudjonsson, G. H. (1997b). Police interviewing techniques at
Communicating promises and threats by pragmatic implication. Law and two south London police stations. Psychology, Crime & Law, 3, 63–74.
Human Behavior, 15, 233–251. doi:10.1007/BF01061711 doi:10.1080/10683169608409795
King, L., & Snook, B. (2009). Peering inside a Canadian interrogation Pearse, J., & Gudjonsson, G. H. (1999). Measuring influential police
room: An examination of the Reid Model of interrogation, influence interviewing tactics: A factor analytic approach. Legal and Criminolog-
tactics, and coercive strategies. Criminal Justice and Behavior, 36, ical Psychology, 4, 221–238. doi:10.1348/135532599167860
674 – 694. doi:10.1177/0093854809335142 Pearse, J., Gudjonsson, G. H., Clare, I. C. H., & Rutter, S. (1998). Police
Klaver, J. R., Lee, Z., & Rose, V. G. (2008). Effects of personality, interviewing and psychological vulnerabilities: Predicting the likelihood
interrogation techniques and plausibility in an experimental false con- of a confession. Journal of Community & Applied Social Psychology, 8,
fession paradigm. Legal and Criminological Psychology, 13, 71– 88.
1–21. doi:10.1002/(SICI)1099-1298(199801/02)8:1⬍1::AID-
doi:10.1348/135532507X193051
CASP435⬎3.0.CO;2-D
Kleinman, S. M. (2006). KUBARK counterintelligence interrogation re-
Reiss, A. J., & Black, D. J. (1967). Interrogation and the criminal process.
view: Observations of an interrogator. In Intelligence Science Board
The ANNALS of the American Academy of Political and Social Science,
(Ed.), Educing information: Interrogation. Science and art: Foundations
374, 47–57. doi:10.1177/000271626737400105
for the future. Phase 1 report (pp. 95–140). Washington, DC: National
Reppucci, N. D., Meyer, J. R., & Kostelnik, J. O. (2010). Police interro-
Defense Intelligence College Press.
gation of juveniles: Results from a national study of police. In K. D.
Kleinman, S. M. (2010). Generic interrogation approaches/themes. Un-
published document. Lassiter, & C. Meissner (Eds.), Interrogations and confessions: Current
Kostelnik, J. O., & Reppucci, N. D. (2009). Reid training and sensitivity to research, practice and policy (pp. 67– 80). Washington, DC: American
developmental maturity in interrogation: Results from a national survey Psychological Association. doi:10.1037/12085-004
of police. Behavioral Sciences & the Law, 27, 361–379. doi:10.1002/ Russano, M. B., Meissner, C. A., Narchet, F. M., & Kassin, S. M. (2005).
bsl.871 Investigating true and false confessions within a novel experimental
Leo, R. A. (1996). Inside the interrogation room. Journal of Criminal Law paradigm. Psychological Science, 16, 481– 486. Retrieved from http://
and Criminology, 86, 266 –303. doi:10.2307/1144028 www.jstor.org/stable/40064252
Leo, R. A. (2008). Police interrogation and American justice. Cambridge, Schafer, J. R., & Navarro, J. (2004). Advanced interviewing techniques:
MA: Harvard University Press. Proven strategies for law enforcement, military, and security personnel.
Leo, R. A., & Liu, B. (2009). What do potential jurors know about police Springfield, IL: Charles C. Thomas.
interrogation techniques and false confessions? Behavioral Sciences & Schollum, M. (2005). Investigative interviewing: The literature. Welling-
the Law, 27, 381–399. doi:10.1002/bsl.872 ton, NZ: Office of the Commissioner of Police. Retrieved from http://
INTERROGATION TAXONOMY 177

www.police.govt.nz/resources/2005/investigative-interviewing. doi: Vrij, A. (2008). Detecting lies and deceit: Pitfalls and opportunities (2nd
10.1002/jip.48 ed.). Chichester, UK: John Wiley & Sons.
Softley, P. (1980). Police interrogation: An observational study in four Walsh, D., & Bull, R. (2010). What really is effective in interviews with
police stations (Research Study No. 61). London, UK: United Kingdom suspects? A study comparing interviewing skills against interviewing
Home Office. outcomes. Legal and Criminological Psychology, 15, 305–321. doi:
Soukara, S., Bull, R., Vrij, A., Turner, M., & Cherryman, J. (2009). What 10.1348/135532509X463356
really happens in police interviews of suspects? Tactics and confessions. Walsh, D. W., & Milne, R. (2008). Keeping the PEACE? A study of
Psychology, Crime & Law, 15, 493–506. doi:10.1080/ investigative interviewing practices in the public sector. Legal and
10683160802201827 Criminological Psychology, 13, 39 –57. doi:10.1348/
Stephenson, G. M., & Moston, S. J. (1994). Police interrogation. Psychol- 135532506X157179
ogy, Crime & Law, 1, 151–157. doi:10.1080/10683169408411948 Willis, C. F., Macleod, J., & Naish, P. (1988). The tape-recording of police
St-Yves, M. (2006). The psychology of rapport: Five basic rules. In Tom interviews with suspects: A second interim report (Research Study No.
Williamson (Ed.), Investigative Interviewing: Rights, research, regula- 97). London, UK: United Kingdom Home Office.
tion (pp. 87–106). Cullompton, Devon, UK: Willan Publishing. Witt, J. W. (1973). Non-coercive interrogation and the administration of
United States Department of the Army. (2006, September). Human intel- criminal justice: The impact of Miranda on police effectuality. The
ligence collector operations. (Field Manual 2-22.3; FM 34 –52.) Wash- Journal of Criminal Law and Criminology, 64, 320 –333. doi:10.2307/
ington, DC: Author. 1142375

(Appendix follows)
178 KELLY, MILLER, REDLICH, AND KLEINMAN

Appendix
Primary Sources for Interrogation Techniques

Source Method Study site

Alison, Kebbell, & Leung (2008) Survey China (Hong Kong)


Baldwin (1992) Video and audio recording analysis United Kingdom
Baldwin (1993) Video and audio recording analysis United Kingdom
Bull & Soukara (2010) Survey and audio recording United Kingdom
analysis
Cassell & Hayman (1996) Survey United States
Cassell (1996) Literature review United States
Culhane, Hosch, & Heck (2008) Survey United States
Department of the Army (2006) N/A United States
Deslauriers-Varin, Lussier, & St-Yves (2011) Survey Canada
Dixon, (2007) Video and audio recording analysis Australia
Faller, Birdsall, Henry, Vandervort, & Silverschanz (2001) Case file analysis United States
Feld (2006) Case file analysis United States
Frantzen (2010) Survey & interviews United States
Greene, Greene, & Holt (2010) Interviews United States
Griffiths (2008) Direct observation, audio recording United Kingdom
analysis, and interviews
Grimes, Holt, & Tanios (2010a) Interviews United States
Grimes, Holt, & Tanios (2010b) Interviews United States
Hakkanen, Ask, Kebbell, Alison, & Granhag (2009) Survey Finland
Hirst (1993) Literature review United Kingdom
Holmberg & Christianson (2002) Survey Sweden
Inbau, Reid, Buckley, & Jayne (2013) N/A United States
Irving (1980) Direct observation United Kingdom
Kassin et al. (2007) Survey United States
King & Snook (2009) Video recording analysis Canada
Kostelnik & Reppucci (2009) Survey United States
Leo (1996) Direct observation and video United States
recording analysis
Leo & Liu (2009) Survey United States
Lippert, Cross, Jones, & Walsh (2010) Case file analysis United States
McConville & Baldwin (1982) Case file analysis United Kingdom
Mcgurk, Carr, & Mcgurk (1993) Video and audio recording analysis United Kingdom
Medford, Gudjonsson, & Pearse (2003) Case file analysis United Kingdom
Meyer & Reppucci (2007) Survey United States
Moston, Stephenson, & Williamson (1992) Survey & audio recording analysis United Kingdom
Neubauer (1974) Case file analysis United States
Pearse & Gudjonsson (1997a) Audio recording analysis United Kingdom
Pearse & Gudjonsson (1997b) Audio recording analysis United Kingdom
Pearse & Gudjonsson (1999) Audio recording analysis United Kingdom
Pearse, Gudjonsson, Clare, & Rutter (1998) Interviews United Kingdom
Reiss & Black (1967) Direct observation United States
Reppucci, Meyer, & Kostelnik (2010) Survey United States
Softley (1980) Direct observation United Kingdom
Soukara, Bull, Vrij, Turner, & Cherryman (2009) Audio recording analysis United Kingdom
Stephenson & Moston (1994) Survey and audio recording United Kingdom
analysis
Walsh & Milne (2008) Audio recording analysis United Kingdom
Walsh & Bull (2010) Survey United Kingdom
Willis, Macleod, & Naish (1988) Audio recording analysis United Kingdom
Witt (1973) Survey United States

Received March 28, 2012


Revision received August 13, 2012
Accepted August 16, 2012 䡲

You might also like