Document 12947206

advertisement
 Effective Interviewing Techniques for Police and Prosecutors in Terrorism Investigations By: Florence Akurut, Victoria DeSimone & Bernie Siler SCHOOL OF INTERNATIONAL SERVICE -­‐ AMERICAN UNIVERSITY i Table of Contents
Executive Summary Statement of the Problem The Evolution of Interrogations Introduction of Torture Why Torture? Is the torture of a terrorist ever legitimate? Exercise #1* What is the ticking time bomb scenario? Legal Aspects Does Torture work? Country Profiles Albania Bosnia and Herzegovina Kosovo Macedonia Serbia International Norms and Domestic Law Governing Interrogations International Law Peacetime International Law and Domestic Law Consequences of Misconduct Criminal Procedure in the Balkans Introduction to Interviews Features of Interviews Characteristics of Effective Interviewers Exercise #2* Police Interviews Questioning Types of Questions that Should Be Avoided Exercises #3-­‐6* Consequences of Unethical Interviews False Confessions Case Study: Consequences of False Confessions* Comparative Analysis of Interviews and Interrogations Military and Law Enforcement Interviews and Interrogations Types of Interview Styles 1
1 1 2 5 19 22 22 26 ii PEACE Model Cognitive Interviewing Technique Conversation Management Interviewing Technique Mutt and Jeff Interviewing Technique Statement Analysis Exercise #7* Polygraph Rationalizing, Projecting, Minimizing Reid Interviewing Technique Kinesic Interviewing Technique Importance of Preparation in Interviews Importance of Rapport Building Benefits of Recording Interviews Using an Interpreter in Interviews Introduction of Interrogations Third Degree Interrogation Techniques Exercise #8* Are EITs Effective? Counter-­‐Interrogation Techniques Exercises #9-­‐11* Role Play* Recommendations Conclusion Bibliography 39 40 41 42 42 46 50 51 52 53 *Identifies exercises and scenarios that were created to facilitate teaching. iii Executive Summary
The United States has a national security interest in the Balkans, which recently
experienced an increase in terrorist related activities. It is essential that the Balkan region
effectively manage these types of threats. The intelligence gained from suspected terrorists is
central to counterterrorism objectives. Interviews of suspected terrorists is crucial for successful
investigations. As such, the individuals that conduct said interviews must be held to the highest
standards. It is crucial that law enforcement officials, along with prosecutors, adapt and manage
an effective interview process, in order to neutralize terrorist threats in an efficient manner.
The International Criminal Investigative Training Assistance Program (ICITAP)
recognizes the United States national security interests in the Balkan region, specifically Albania,
Bosnia and Herzegovina, Kosovo, Macedonia, and Serbia. With the recent legislation in the
Balkan region against foreign fighters, and the surge in Syrian refugees, ICITAP seeks to
develop a course tailored to each of the identified countries. It will help train law enforcement
officials and prosecutors in effective interview styles. Additionally, this project aims to inform
ICITAP officials on various aspects interrogation methods. The project will provide background
information on the identified countries, and the legal norms they follow. It will also lay the
foundation for a course that ICITAP will create that will potentially have lasting impacts on the
countries and the Balkan region at large.
Statement of the Problem
Terrorist operations continue to threaten the national security of the United States and its
allies throughout the world. This necessitates well-trained law enforcement officers and
prosecutors who are able to conduct professional and ethical interviews without violating the rule
of law and human rights.
The Evolution of Interrogations
Gaining information has been a human quest for millennia. The need for such has been
related to military campaigns, crime fighting and national security. As such, various means have
been used to exact information and confessions. There has been progress from grossly inhumane
practices to a professed prohibition of inhumane methods and torture. But this problem still
exists in some countries throughout the world, including the west.
During ancient and medieval times, infernal devices and methods like bamboo shoots
under the fingernails, knee splitters and placement on the rack, a device that essentially pulled an
individual's body apart, were used to exact information and/or punish wrongdoers.1 In ancient
America, the Incas would dangle adulterers over the edge of cliffs by their hair until the roots
gave way.2 By the late eighteenth century the modern world experienced the Age of
Enlightenment, themes included equality and the rights of the governed rather than of the
government. The extreme inhumane methods that marked medieval times gave way to
theoretical principles that would contraindicate employment of those methods. The constitutions
of identified countries also reflect these principles.3
1
Gifford, Clive. Killer History. New York: Buster Books, 2012. 2
Jones, David. Everyday Life of the Ancient Incas. London: Annes Publishing Ltd., 2010. 109-111. 3
Constitution of Bosnia and Herzegovina, PREAMBLE, PARAGRAPH II, SECTION A, ARTICLE 2,
JANUARY 1994.
1 Though society’s norms regarding torture had progressed from earlier times, remnants of
the old methods of obtaining information persisted. For example, in the case of the conspirators
charged in the assassination of President Lincoln several interrogation sessions were had with
them. Updated methods such as observing involuntary body movements and the use of nonaggressive and innocuous questions began to be employed. However, evidence that the use of
torturous methods had not totally gone by the wayside was the fact that cotton hoods were placed
over the heads of the conspirators with openings only at the mouth.4 This tactic was used during
a hot humid Washington spring and summer. Interrogators noticed the body language in the case
of Dr. Samuel Mudd, who would turn pale and blue about the lips whenever questions got closer
to the truth.5
In the 1940s Russia tortured suspected foreign spies and disloyal soldiers. During that
same era a new trend seemed to emerge from World War II. Two of the most successful
interrogators in history used methods of subtle inquiry instead of torture. Hanns Scharff, a
German soldier, would question captured Allied aviators where he made them feel at ease and
refrained from torture. His success resulted from creating the illusion that his government
already knew certain facts which removed the prisoners’ incentive to withhold information. He
was also adept at concealing whether information that he received from "small talk" with the
prisoner was of any value.6
An American interrogator named William Moran worked in the Pacific Theatre and
interrogated Japanese prisoners. His techniques were similar to Scharff's with the added tactic of
using his familiarity with Japanese culture. He used this advantage by pointing out that failure of
a prisoner to cooperate with a person who had been treating him as gentlemen is contrary to the
spirit of their society.7
The common thread between those two interrogators was the ability to humanize
prisoners and get them to let their guards down. The result was to give the prisoner the
impression that little or no valuable information had been given when in fact it had been.8
In the 1950s and 1960s, United States spies were given poison pills to commit suicide
rather than face torture. The international community has been fairly consistent in proscribing
torture as reflected in treaties and other international agreements.9 Accordingly, the international
community still condemns these methods. Cases in point are the peace accords which ended the
fighting in the newly created Balkan states in the 1990s, and their newly created constitutions.10
Introduction of Torture
According to the UN Convention Against Torture (CAT) torture is defined as “any act by
which severe pain or suffering, whether physical or mental, is intentionally inflicted on a person
4
Swanson, James. Manhunt. New York: Harper Collins Publishers, 2006. 235.
Swanson, James. 238.
6
Kristoffersen, LTC Ronnie. "Learning From History: What is Successful Interrogation?" CTX Journal
Vol. 2 No. 2, May 2012.
7
Ibid.
8
Ibid.
9
Geneva Convention Relative to the Protection of Civilian Persons, 12 August 1949. United States
Department of the Army Field Manual 27-10.
10
Constitution of Bosnia and Herzegovina, PARAGRAPH II, SECTION A, ARTICLE 2, JANUARY 1994.
5
2 for such purposes as obtaining from him or a third person information or a confession… with the
consent or acquiescence of a public official or other person acting in an official capacity.”11
The definition encompasses things like discrimination, coercion, and punishment. This umbrella
definition is used as a “catch all” to violations in human rights with regards to torture.
Several of the countries who ratified this treaty have been accused of using torture in
interrogations. States have also been accused of sending terrorism suspects overseas to countries
who have not signed the treaty. This also violates the UN Convention because the ratified
agreement prohibits a signatory country from sending prisoners to other countries where torture
is more likely to occur.12
Why Torture?
The purpose of torture is to extract information and gain social control. Often times there
are three actors that play vital roles. The state (democratic or authoritarian), the torturer
(professional, zealot), and the victim.13 The state needs information and believes that the victim
has it. The torturer choses the amount of force used in torturing the victim. The victim has no
choice but to give up information. Below is a list of the three primary arguments that many use
to rationalize the use of torture.14
• Interrogational Argument: Law enforcement assumes that the suspect knows the
information and the only way they can obtain it is by using torture. This also
carries low financial cost to interrogator. Torture is also argued to yield results
faster
• Routine Activities/ Obedience Argument: The Routine Activities Theory states
that a motivated offender, suitable target, and lack of oversight will make torture
more likely to occur. Other arguments that fall in this category is the principalagent issue. This means that the agent breaks the law but the principal fails to
make them take responsibility. Usually they deny knowledge of the action. There
is also the obedience argument. This argument states that if an order is explicitly
given, law enforcement will be likely to obey the order.
• Punitive Argument: When an individual commits a crime they need to be
punished. Therefore, torture is an avenue to punish, dehumanize, and humiliate
an individual who broke the law.
Is the torture of a terrorist ever legitimate?
After a terrorist attack, many feel the need to do “whatever they can” to prevent another
attack from happening. How far are these people willing to go to prevent another attack? Some
argue that policymakers and normal citizens alike will have moral lapses. This means in stressful
situations, average people are likely to agree to torture if it would safeguard them from another
attack.15
11
United Nations. Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or
Punishment. (2000). http://www.state.gov/documents/organization/100296.pdf.
12
Levinson, Sandord. “The Debate on Torture: War Against Virtual States.” University of Pennsylvania
Press (2003).
13
Wantchekon, Leonard & Andrew Healy. “The ‘Game’ of Torture.” Journal of Conflict Resolution (1999).
14
Ibid.
15
Levinson, Standord. 3 Exercise: France used torture during the Algerian struggle from 1954 to 1962 to obtain
information from prisoners. They said the use of torture was effective because they were able to
gain information about future terrorist attacks and other crucial information in dismantling the
network as a whole. What do you think? Is torture acceptable to use in these types of situations?
If not, what is your argument?
Hypothetical:
On 18 March 2015 Karim Ahmed, a Syrian-born French engineer, was changing planes
in London as he was returning from a trip in Tunisia. He was detained once he landed because
he had been photographed with a suspected terrorist at a family member's home. He was held
for 20 days without being charged. Karim denied having any connection with terrorism or
knowing the individual on a personal level. He also had no past criminal record and no history
of being a jihadist. The individual he was photographed with was detained soon after when he
attempted to blow up an embassy in Belgium. Is the use of torture acceptable for Karim because
of his perceived association with the individual suspected of terrorism?
What is the ticking time bomb scenario?
Slavoj Zizek stated, “imagine that in a specific situation, confronted with the proverbial
prisoner who knows’ and whose words can save thousands”. This type of situation arises when
an attack has been planned and the interrogator believes that the suspect knows information that
would prevent the attack from happening. Because of this the interrogator uses harsher
interrogation techniques hoping to obtain the information about the attack earlier so they can
prevent it from happening.16
Legal Aspects
The use of torture is forbidden in most human rights conventions, including the
Convention Against Torture (CAT) and in Article 37 of the Convention of the Rights of the
Child. Its use is usually considered to be a “crime against humanity.” It is clear that torture is
understood as an illegal act. The legal question is not whether the use of torture is illegal but
rather if psychological and non-life threatening techniques should be considered acts of
persecution. These types of methods include sleep deprivation, stress positions, continuous
monotonous noise, etc.17 Some individuals categorize these methods as ill-treatment instead of
torture because they cause no physical pain. In the CAT, psychological torture is prohibited as
well. These types of methods constitute “cruel and degrading treatment” which is still believed to
be wrong by many in the international community. Alex Bellay says “torture thrives when it is
placed beyond the law: when basic rights such as habeas corpus are suspended; where judicial
16
Bellamy, Alex. “No Pain, no gain? Torture and Ethics in the War on Terror.” International Affairs 82.1
(2006).
17
Ibid. 4 authorities and defense lawyers are unable to oversee imprisonment and interrogation; where the
hierarchy of judiciary, executive and military/ police authority becomes blurred. ”18
Does Torture Work?
There are mixed results in the claim that torture is effective in obtaining reliable, lifesaving information from suspects. A former FBI interrogator stated that a “naked Muslim
fundamentalist [is] difficult because he’s going to be ashamed, and humiliated, and cold. He’ll
tell you anything you want to hear to get his clothes back. There’s no value in it.”19 There are
also large amounts of cases that pertain to terrorism suspects giving false confessions under
torturous interrogations. Overall, it is not considered to be an effective practice by most scholars
and even law enforcement personnel.20
The use of torture can have detrimental consequences on governments, and the
individuals conducting it. This includes human rights abuse charges, depression in interrogators,
an increase in refugee status, corruption, social isolation, impunity among law enforcement
personnel, and mistrust and suspicion in government systems.21 Individuals in all parts of society
are impacted by these factors. Additionally, there have been numerous reports that terrorist
organizations have used accounts of torture as propaganda for vulnerable populations.22
Country Profiles
Albania
Statement of the Problem
There are many issues in Albania that pertain to law enforcement and the judiciary. This
includes a lack of accountability among law enforcement officers. Officers are unable to enforce
the law equally because of political and criminal connections. Corruption continues to negatively
impact the ability for law enforcement officers to conduct civilian policing. The low salaries that
officers receive also has an impact on professional behavior which contributes to corrupt
practices.
Country Summary
The Republic of Albania is located in Southeastern Europe, bordered by Montenegro to
the northwest, Kosovo to the northeast, the Republic of Macedonia to the East, and Greece to the
south and southeast. It has a coast on the Adriatic Sea to the west and on the Ionian Sea to the
southwest.
The languages spoken include, Albanian (Tosk and Gheg dialects), Greek, English, Italian and
German. The religions present include Muslim, Greek Orthodox and Roman Catholic.23
Albania gained its independence from the Ottoman Empire in 1912. It was then occupied
by Italy from 1939 to 1943, and by Germany from 1943 to 1944 during World War II. After the
18
Ibid.
Bellamy, Alex.
20
Ibid.
21
Crelinsten, Ronald. D. “The World of Torture: A constructed reality.” Theoretical Criminology (2003).
22
Human Rights First. “Guantanamo Bay: A Terrorists’ Propaganda Tool.”
http://www.humanrightsfirst.org/guantanamo-bay-terrorists-propaganda-tool.
23
CIA: The World Factbook. “Albania.” https://www.cia.gov/library/publications/the-worldfactbook/geos/al.html. 19
5 war, it was under communist rule. The United States established diplomatic relationship with
Albania in 1922, which ended in 1939 after the occupation of Italy. In 1991, the U.S reinstated
diplomatic relations with Albania.24
Albania is a strong U.S partner in the fight against terrorism. In 2014, it joined the Global
Coalition to Counter the Islamic State in Iraq and the Levant. Albanian laws criminalize the acts
and financing of terrorism.25 Also in 2014, the Albanian parliament added three new statutes to
the Criminal Code directed at strengthening the government’s capability to address the problem
of Albanian nationals traveling to fight Syria. Albania is one of the major sources of foreign
terrorist fighters going to Syria and Iraq.26
According to the U.S State Department, the government of Albania does not have the
capability to collect biometric information to monitor terrorist suspects at the border. The
Department of Justice’s International Criminal Investigative Training Assistance Program
(ICITAP) has provided a new information technology component to Albania that will provide it
with the capability to integrate online fingerprint identification functions. Additionally, ICITAP
is in the process of providing fingerprint equipment to all the twenty-six border posts. The border
control module will allow Albanians to collect information of international travelers at border
crossings.27
Since 2012, Albania has cooperated with the Financial Action Task Force on Money
Laundering (FATF) and the Evaluation of Anti-Money Laundering Measures and the Financing
of Terrorism (MONEYVAL) to resolve challenges identified in Anti-Money Laundering/
Combating the Financing of Terrorism. In 2013, Albania adopted a new law against financing
terrorism to comply with the FATF and MONEYVAL recommendations. The law was
implemented in 2014, and has resulted into the seizure of approximately 10 million euros
(approximately US $11,189,000), a large increase from the 213,000 euros (approximately US
$241,712) confiscated in 2013.28
The Albanian constitution and rule of law prohibits torture, cruel, inhumane, or degrading
treatment or punishment of persons. The law created the Ombudsman office and mandated that it
prevent torture, monitor and report on prisons and detention centers. Albania has instruments
that investigate and punish abuse and corruption. The Internal Control Service conducted audits,
responded to complaints, and conducted investigations with increased emphasis on human rights,
prison conditions, and compliance to standard operating procedures. In 2014, the Ombudsman
office processed complaints against police officers, mainly with problems associated with arrests
and detention.29
The constitution requires that police inform suspects of their charges and rights. The law
requires the police to inform the prosecutor immediately of any arrest. The prosecutor may
release the suspect or petition the court within 48 hours to hold the individual further. A court
must decide within 48 hours whether to place a suspect in detention, require bail, prohibit travel,
or require the defendant to report regularly to the police. Law enforcement authorities do not
respect this requirement.30
24
United States Department of State. Country Reports on Human Rights Practices form 2015: Albania.
(2015). http://www.state.gov/documents/organization/253027.pdf.
25
Ibid.
26
Ibid.
27
Ibid.
28
Ibid.
29
Ibid.
30
Ibid. 6 Police impunity remains a serious problem. The Albanian police do not enforce the law
equally due to low salaries, poor motivation and leadership, personal associations, political or
criminal connections, poor infrastructure, and lack of equipment. On the other side, inadequate
supervision has negatively influenced the enforcement of laws and a lack of diversity in the
workforce. It has contributed to continued corruption and unprofessional behavior.31
The police have been accused of mistreating and torturing suspects during detention and
interrogation to obtain confessions. They prolong detention without charges and the prison
conditions are substandard. The Albanian Helsinki Committee (AHC) reported that police use
excessive force, harsh and poor conditions which constitutes inhumane treatment. The majority
of complaints accused the police of stopping persons without justification, detaining persons past
legal deadlines and delaying their transfer to detention facilities. The complaints also included
failure of the police to make suspects aware of their rights and denying them access to a lawyer.
There were also complaints of overcrowding in prisons. The AHC stated that police often
reported that detainees who claimed abuse arrived in police custody with pre-existing injuries.
Authorities did not keep proper medical records which made it difficult for detainees to prove
that their injuries occurred during detention.
The former general police director, Hysni Burgaj, and former deputy, Agron Kulicaj,
were charged with abuse of office after police refused to execute arrest orders for Republican
Guard officers. They were wanted in connection with the killing of protesters in 2011. There are
also ongoing investigations that Albanian officials were involved in organ trafficking after the
conflict with Kosovo in early 2000. Additionally, there were reports of societal killings that
included both “blood feud” and revenge killings.32
The local police are responsible for internal security, and work under the directive of the
Ministry of Interior. Although improvements have been made on how the local police performed
its duties, the Ombudsman office reported that there are still issues surrounding equal police
enforcement. The reports indicated that police and prosecutors continued to be influenced by
political or criminal connections.33
Bosnia
Statement of the Problem
The need to study law enforcement techniques and rule of law for Bosnia and
Herzegovina is centered around two primary problems. They are the presence of members of
terrorist organizations and a system of criminal procedure that is mired in deficiencies and
irregularities.
Country Summary
The Republic of Bosnia and Herzegovina (BiH) is in South-Central Europe, east of the
Adriatic Sea. It is also east and south of Croatia which borders the Adriatic but has access to the
sea in the far southwestern tip. BiH is bordered on the east by Serbia and on the southeast by
Montenegro.
31
Ibid.
Ibid.
33
Ibid.
32
7 At the Constitutional Assembly session held on June 24, 1994, The Federation of Bosnia
and Herzegovina ratified its constitution. Its preamble portended substantive portions of the
document that mirrored many of the democratic and human rights values found in the
constitutions of many of the well-established western democracies. The preamble specifically
cites the United Nations Charter and the Peace Accord that ended the Balkan Wars as a
framework for a government that would be run by democratic institutions that would respect
human rights and freedoms.
Since the Balkan wars, a jihadist attachment of the Army of the Republic of Bosnia and
Herzegovina has been in operation. Operating under the Saudi High Commission (SHC), they
carried out a car bombing attack in Mostar in 1997. It turned out that the SHC was a Saudi
government sponsored organization that financed terrorist activities under the guise of being a
charitable organization. The National Security Agency (NSA) discovered through wiretapping
that similar "charitable" organizations operating in Saudi Arabia, Pakistan and Kuwait helped
support terrorist operations in Bosnia and Herzegovina. Under the pretense of giving
humanitarian aid, these groups were actively developing islamisation of Bosnian youth.34
The current situation on the ground in BiH is that radical Islamic groups are fairly small
and not unified insofar as Bosnian citizens are concerned. Incidents of violence have been
largely perpetrated by foreigners or persons with criminal records.35 An example of the violence
that has taken place is the December 2012 shooting into the United States Embassy in
Sarajevo. Earlier that same year a naturalized American citizen who was from Bosnia was
sentenced to life in prison for plotting terrorist attacks in New York in 2009. It does appear,
however, that members of the domestic Islamic community have not been the primary source of
the threat of terrorist acts. In fact many Islamic religious leaders have joined with clergy of the
other religions represented in the region to educate and promote tolerance in an effort prevent
radicalism.36 However, the presence of these extremist organizations, though disjointed, still
creates a situation that bears watching.
The police in Bosnia are a fragmented agency with respect to function as well as
jurisdiction. Local departments have jurisdiction in their particular canton while the Federation
police are national. Also having national jurisdiction and serving also as an investigative agency
is the State Investigative and Protective Agency.37
The substantive part of the rule of law is found in Paragraph II, Section A, Article 2 of
the Constitution. The rights to life, equal protection under the laws without regard to race, color,
religion, political opinion or national origin are guaranteed. Also, deprivation of liberty is
authorized only by fair judicial proceedings.38 A striking component of Article 2 is the clause
stating that "All persons within the territory of the federation shall enjoy these rights." A
reasonable interpretation of that language is that persons who are within the boundaries of the
country are afforded these protections. By extension this would include foreign born persons
who are in the country and who are suspected of criminal activity including terrorism. The other
democratic ideals that are specifically laid out in the constitution are free speech, assembly,
association and movement.39 The most pertinent language in Article 2 with respect to the subject
34
"Bosnia's Dangerous Tango." Crisis Group, February, 2013.
Ibid.
36
Ibid.
37
Ibid.
38
Constitution of Bosnia and Herzegovina, PARAGRAPH II, SECTION A, ARTICLE 2, JANUARY 1994. 39
Ibid. 35
8 of this study is the general prohibition against "torture and cruel or inhuman treatment or
punishment."40
In order to help enforce the rule of law, Section B of Paragraph II authorizes three
Ombudsmen to protect the guarantees outlined in the Constitution. Their authority includes
examination of activities of government or individuals that appear to deprive persons in the
country of their constitutional rights.41
Although the above-mentioned values have been set forth in the Constitution of Bosnia
and Herzegovina, the theory and the practice do not always coincide. In some cases, the practice
of the government appears to be in direct defiance of the rule of law. In February 2014
protesters against the political and economic state of the country were met with police brutality
while exercising their rights as propounded by the Constitution. The protesters' primary
dissatisfaction was the government's failure to adequately facilitate the election of members of
diverse ethnic groups and women to political office.42
A study of Bosnia reveals that citizens are still concerned about corruption. Studies
indicate that the actual incidence of corrupt acts involving government may differ from the
perception of citizens. The significance of this dichotomy is that the perception of corruption is
the bigger problem. Currently, the perception starts a vicious cycle that perpetuates the actual
problem. As long as it is widely believed that nothing will get done without corruption, offers
and demands for favors involving public officials will continue. In BiH for example, citizens see
corruption as the fourth major problem behind unemployment, poverty and lack of government
services. Citizens of other Balkan states rate corruption anywhere between second and fourth
among the issues mentioned.43 Studies also show the level of corruption that specific areas of
government are involved. Local government, political parties, public hospitals, law courts and
police round out the top five. Public prosecutors are ranked tenth and public utilities, NGOs and
military at number 17 round out the bottom of the list. 44
Within the study there is a breakdown of the types of corruption that take place. For
example, the citizens believe that among public officials, the first two areas of concern are the
facilitating of friends and relatives being placed in positions and the granting of contracts to
companies that the officials may be affiliated with. These concerns are followed by the
presentation of gifts to officials in exchange for public services and bribery and kickbacks.45
Kosovo
Statement of the problem
The major issues in Kosovo include corruption and poor functioning of the judicial
systems which continues to hinder law enforcement and their ability to fight terrorism. There is a
continuous flow of foreign terrorist fighters from Kosovo joining ISIL in Syria and Iraq. Also in
Kosovo, there is an increase in lone offender attacks and their targeting of civilians, religious
pilgrims and other communities. Inadequate and poor investigative techniques have led to a loss
40
Ibid. Constitution of Bosnia and Herzegovina, PARAGRAPH II, SECTION A, ARTICLE 2, JANUARY 1994.
42
"World Report 2015: Bosnia and Herzegovina." Human Rights Watch, 2015.
43
"Business, Corruption and Crime in the Western Balkans." United Nations Office on Drugs and Crime,
2013.
44
Ibid. 45
Ibid. 41
9 of court cases regarding terrorism and other major crimes as a whole.46 Another issue in Kosovo
is the inconsistency of language translation of official documents, including the constitution
which contributes to confusion among civilians and law enforcement officials.
Country Summary
The Republic of Kosovo is located in Southeastern Europe, bordered by Macedonia,
Serbia, Montenegro and Albania. It obtained its independence from Serbia on February 17, 2008.
The major languages spoken are Albanian and Serbian which have equal standing under the law.
The religions are comprised of Islam and Orthodox Christianity.
Kosovo continues to experience a growing threat of violent Islamist extremism. This rise
is associated with the increased funding from foreign organizations that preach extremist
ideologies. The country is not a member of the UN and not an official party to the UNSC
Resolutions 2170 and 2178, however, they have pledged to implement these resolutions
unilaterally.47
The government of Serbia and Bosnia and Herzegovina do not recognize the
independence of Kosovo. This lack of recognition has hindered their cooperation on many issues
in Kosovo, including counterterrorism. In return the government of Kosovo is facing challenges
in participating in regional counterterrorism initiatives. 48
According to the U.S. State Department, 150 to 200 foreign terrorist fighters from
Kosovo have traveled to Syria and Iraq to fight for the Islamic State in Iraq and the Levant (ISIL)
or al-Nusrah Front. Although no terrorist incidents have taken place inside Kosovo, these violent
extremist groups aggressively use social media to spread propaganda and recruit followers.
Kosovo is a member of the Global Coalition to Counter ISIL and has taken steps to
support various activities within its capabilities. It has focused on reducing the flow of foreign
terrorist fighters, tracking and restricting the financing for terrorist groups and has provided
humanitarian assistance to refugees from Syria.49
In 2014, the government authorities arrested approximately seventy individuals suspected
of terrorism, forty of whom were suspected to have been returning foreign terrorist fighters. The
Financial Intelligence Unit (FIU) continues to track the finances of individuals and NGOs
suspected of connections to terrorism. The Government of Kosovo is beginning to discuss ways
to counter ISIL-related propaganda, but has taken no concrete steps.50
According to the US State Department, the government of Kosovo conducted one of its
largest counterterrorism operations in in the summer of 2014. It arrested fifty-nine terrorist
suspects. The authorities continued to conduct investigations, without filing any indictments.
However, most of the suspects remained under house arrest at the end of 2014. The prosecution
and the police worked together to collect evidence to charge the terrorist suspects. The
authorities worked closely with European Union Rule of Law Mission in Kosovo (EULEX) to
prosecute the six suspects arrested in June in connection with a separate case. At the end of the
46
United States Department of State. Country Reports on Human Rights Practices form 2015: Kosovo.
http://www.state.gov/documents/organization/253075.pdf
47
Security Council Adopts Resolution 2170. Condemning Gross, Widespread Abuse of Human Rights by
Extremist Groups in Iraq, Syria, (2014) http://www.un.org/press/en/2014/sc11520.doc.htm
48
Ibid.
49
Ibid.
50
Ibid.
10 year, all six suspects remained in police custody. Six terrorism suspects arrested in a November
sting operation also remained in custody while authorities investigated their case.51
Kosovo Serbs complained that, translation into Serbian laws, official documents and
government websites were inadequate. The commissioner received a wide range of complaints,
including that pharmaceutical packaging was not available in Albanian and tax forms were not
available in Serbian. Most government institutions, including ministries, failed to provide equal
amounts of information online in languages other than Albanian. The Kosovo law provides fines
for not respecting the language requirements. However, there were no reports of fines. The
commissioner recommended some institutions to respect all languages, but these institutions
often failed to address the issue. The commissioner lack direct enforcement powers.52
The constitution of the Republic of Kosovo does not use jury trials and all trials are
public. The law entitles defendants to the presumption of innocence, and the right to be informed
promptly of charges against them. They also have the right to be present at their trials, to remain
silent and not to be compelled to testify or confess guilt. The constitution also grants the ability
to confront an adverse witness, to see evidence and to have legal representation. Defendants have
the right to appeal and the law stipulates for a fair and impartial trial and for the judiciary to
uphold the law.53
The laws require the police to arrest any suspect with a warrant based on the evidence
issued by a prosecutor or judge. The prosecutor must charge the suspect within six hours using
the language they understand. The suspect is brought before a judge within 48-hours otherwise
he or she must be release. The law does not allow the police to hold suspects without allowing
outside communication. The suspect must have access to a lawyer of his or her own choice or the
state has to provide one. Suspects have the right to remain silent except answer questions
regarding his or her identity. The law provides suspects to obtain free assistance of an interpreter
and to receive medical and psychiatric treatment.
The police have carried out most arrests using warrants, and there are no confirmed
reports of police abusing the 48-hour rule. The prosecutor provided suspects with documents
explaining reasons for their detention or released them. Law enforcement officials respected the
requirement for timely disposition of cases. However, the Kosovo Rehabilitation Center for
Torture Victims (KRCT) reported delays in processing detainees when prosecutors were
unavailable until the morning after detention.54
The courts rarely issue bail and the law requires the court to detain an individual in
pretrial detention for 30 days from the date of their arrest. The court can extend detention for up
to one year with no indictment. Before the conclusion of the trial proceedings, the judge and trial
panel can order or terminate detention. The Kosovo law allows a judge to issue house arrest,
confiscate travel documents, and extend bail as an alternative to pretrial detention. Suspects can
file a petition against their detention and challenging the legality or conditions of their detention.
Unlawfully detained defendants may also file claims for compensation.
Although Kosovo provides a disciplinary system to discipline judges and prosecutors,
reports of corruption and inefficiency in the judiciary persists. According to the Kosovo Judicial
Council, more than 100,000 civil and criminal cases were pending trial, more than 100,000
51
U.S Dept. of State: Country Report: Kosovo.
Ibid.
53
Ibid.
54
Ibid.
52
11 actions required by judicial decisions were awaiting execution, and 200,000 charges of minor
offenses were pending adjudication.55
On November 6, 2014 a mixed panel of EULEX and local judges at the Pristina District
Court acquitted three Kosovo Serbs who were retried for war crimes against two Kosovo
Albanians in 1999. Media cited EULEX Judge Vladimir Mikula as stating that the acquittal
resulted from a failure to investigate the offenses properly. Victims’ representatives announced
their intent to file an appeal with the basic court.56
Macedonia
Statement of the Problem
As with many countries in the Balkans, there are significant levels of corruption in
Macedonia. A major issue in the country is the lack of separation between the judiciary and the
government. There is a very specific culture that impacts the efficiency of the government. That
culture is how those in law enforcement feel about their role towards the government. In
Macedonia, law enforcement officials and those in the judicial branch believe that their purpose
is to serve the needs of the government, not the people. This has an obvious impact on the
amount of corruption in the country. There is also a huge gap between police and prosecutors
which impacts their ability to work together.
Another problem that plagues Macedonia, is the prevalence of foreign terrorist fighters.
In order to counter this issue, law enforcement needs to have a better understanding of the
psychological profile for foreign terrorist fighters. They should also have a clear understanding
of their characteristics and motivations. Knowing that information will help law enforcement
officials tremendously in their investigations and interrogations.
Country Summary
In 1991, Macedonia peacefully seceded from the former Yugoslavia. Macedonia can be
found in southeastern Europe, to the north of Greece. The government operates under the civil
law system. After they declared independence there were many issues from Greece about the
country’s name. Eventually there were admitted to the UN in 1993 as The Former Yugoslav
Republic of Macedonia. As of 2004, over 130 nations recognize Macedonia by its constitutional
name. The name dispute between Macedonia and Greece continues to be a problem even today.
Additionally, there is hostility between Macedonians and ethnic Albanians. These grievances
came to a boiling point in 2001 with an insurgency movement. The insurgency movement was
brought on by ethnic tensions between the two groups and inequalities to minority groups.
Relations between the two groups still remain fragile.57
Macedonia is an ethnically diverse country with 25.1% of its population identifying as
Albanian. 66.5% of the population identifying as Macedonian. Both Macedonian and Albanian
are official languages in the country. There is also a significant population of Muslims in
Macedonia. They make up 33.3% of the population.58
Foreign terrorist fighters continue to be a major focus of Macedonian policy. In recent
years, there has been a large number of Macedonian citizens going abroad to fight in foreign
55
Ibid.
Ibid.
57
CIA: The World Factbook. “Macedonia.” https://www.cia.gov/library/publications/the-worldfactbook/geos/mk.html.
58
Ibid. 56
12 conflicts. Syria and Iraq have received a large number of foreign terrorist fighters from
Macedonia. The legislation passed in September 2014 has had a huge impact in deterring
Macedonians from becoming foreign terrorist fighters. The law criminalized fighting, aiding, or
abetting foreign terrorist groups. The Ministry of Foreign Affairs is committed to furthering the
objectives of the UN Security Council Resolution 2178. This includes the development of a
counter terrorism action plan, the creation of a foreign terrorist fighters focused agency and a
conference discussing the foreign terrorist fighter threat to intelligence and law enforcement
personnel.59
Macedonia has laws in place to thwart the finance of terrorist groups. According to State
Department, their criminal code and criminal procedure code both contain counterterrorism
provisions. This has made it easier for intelligence and law enforcement officials to act
efficiently when dealing with the threat. The report by the State Department also claimed that the
Macedonian security sector has become more equipped to deal with terrorism in the country.60
There are numerous reports that state that the number of foreign terrorist fighters from
Macedonia is about 100- 150 individuals. These include Albanians who claim residency in
Macedonia.61Many of the statistics regarding foreign terrorist fighters are up for debate because
many who became foreign terrorist fighters before the September 2014 legislation were not
included in recent counts.62 In August 2015, police raided two Mosques in Skopje, which is also
reported to be a “hive for recruitment of Macedonian citizens” who become foreign terrorist
fighters.63
There are also concerns about the Syrian refugee crisis. Ten to fifteen thousand refugees
continue to pass through Macedonia to get to Austria and Germany. Many officials are
concerned that ISIL fighters are pretending to be refugees in order to gain entry into the west.64
The issue has become so prevalent that the Macedonian/ Greece border has shut down and there
have been numerous reports of Macedonian police throwing tear gas and stun grenades at
refugees.65 There has also been reports of police verbally and physically abusing migrants. The
issue continues to grow as more refugees wait at the border for their passage through
Macedonia.66
Macedonia defines terrorism by acts of violence in the country. They are usually committed by
organized crime groups or politically motivated groups from other Balkan countries.67 For
example, in May 2015 there was a shootout between Macedonian police and ethnic Albanian
“terrorist” in the border town of Kumanovo. The shootout resulted in the death of 8 police
59
United States Department of State. Country Reports on Terrorism 2014. (June 2015):125-127.
http://www.state.gov/documents/organization/239631.pdf.
60
Ibid.
61
Shtuni, Adrian. “Ethnic Albanian Foreign Fighters in Iraq and Syria.” Combating Terrorism Center
(2015). https://www.ctc.usma.edu/posts/ethnic-albanian-foreign-fighters-in-iraq-and-syria.
62
Hatler, Rick. ICITAP Macedonian Country Manager. Interview date: March 2, 2016.
63
Independent. “Operation Cell: Skopje Main Center for Foreign Fighter Recruitment.” (2015).
http://www.independent.mk/articles/20667/Operation+Cell+Skopje+Main+Center+for+Foreign+Fighter+R
ecruitment.
64
Hatler, Rick.
65
Al Jazeera. Macedonia hits Refugees with tear gas, stun grenades.” (2016).
http://www.aljazeera.com/news/2016/02/macedonian-police-fire-tear-gas-refugees160229143534348.html.
66
Human Rights Watch. “Macedonia: unchecked police abuse of migrants.” (2015).
https://www.hrw.org/news/2015/09/21/macedonia-unchecked-police-abuse-migrants.
67
Hatler, Rick. 13 officers.68 It was revealed that the group was planning to attack police stations and other civilian
locations later in the week.69
There are significant levels of corruption in the country and issues with the government
failing to respect rule of law. There were reports of interference in the judiciary by government
officials, selective prosecution, prolonged processes, corruption in the judiciary, and violations in
the right to a public trial. There continues to be issues related to the treatment of detainees by
police and other security forces. Macedonian law prohibits the abuse of prisoners, however, there
have continued to be reports of abuse and excessive force from police. In 2013 there were 177
complaints against police officers who used excessive force. There has yet to be a ruling from
the courts for officers charged with cases of this nature. Macedonian law also prohibits arbitrary
arrest and detention. This continues to be a problem in the country. In only 5% of all cases did
prosecutors’ request detention orders. Oftentimes, a detention order was granted by the courts
even though they failed to meet adequate justification standards.70 Although the government has
the resources to investigate and punish corruption in the country, there continues to be issues
regarding the implementation of these methods successfully. This situation has impacted the
government's ability to fight crime.71
The government has a tendency to create new oversight agencies to help in the fight
against corruption. However, these agencies continue to be ineffective. As one source stated,
“they are trying to put different layers in place to thwart corruption but never fixes the layers
themselves.”72 Several years ago, Macedonian police watched as CIA officials tortured a German
citizen suspected of terrorist activities. Khaled el-Masri was seized in Macedonia is September
2003 and given to the CIA where he was transferred to Afghanistan. The European Court of
Human Rights found Macedonia guilty for their involvement in the matter with the CIA in
2012.73 Macedonia was viewed as liable for the incommunicado detention, enforced
disappearance, torture and other human rights violations committed by CIA officials.74
Law enforcement in Macedonia has a very “communist” way of looking at the world.
Meaning that the purpose of the police is to serve the government, not to serve the people.
Decisions are made in a top-down fashion, resulting in very little decision making by the police.
Oftentimes, police act in a certain way to gain favor of the government. This results in a lot of
corruption with the police force and country as a whole.75
Security and military forces operate under the Ministry of Defense. National police
operate under the Ministry of Interior. Within the Ministry of Interior, there is a Professional
Standards Unit (PSU) that conducts internal investigations for police misconduct. PSU has very
limited abilities in this process. They include the ability to impose suspensions from work but
they are unable to take disciplinary measures or more serious sanctions. These actions are
68
MacCormac, Sean. “Shootout in Macedonia: Albanian Militant Cell Shut Down.” Center for Security
Policy (2015). http://www.centerforsecuritypolicy.org/2015/05/12/shootout-in-macedonia-albanian-militantcell-shut-down/.
69
Hatler, Rick.
70
United States Department of State. Country Reports on Human Rights Practices form 2014:
Macedonia. (2014). http://www.state.gov/documents/organization/236762.pdf,
71
Ibid.
72
Hatler, Rick.
73
Taylor, Richard. “CIA Tortured and Sodomized’ Terror Suspect, Human Rights Court Rules.” The
Guadrian (2012). http://www.theguardian.com/law/2012/dec/13/cia-tortured-sodomised-terror-suspect.
74
Amnesty International. “Annual Report: Macedonia 2015/2016 (2016).
https://www.amnesty.org/en/countries/europe-and-central-asia/macedonia/report-macedonia/. 75
Hatler Rick.
14 required from the courts and disciplinary commissions. There has been improvement within PSU
but there are still numerous issues in conducting and carrying forth internal investigations.76
Also within the the Ministry of Interior is the Public Safety Bureau and other support
sectors used in the transition to the recently implemented Criminal Procedure Code.77 ICITAP
has assisted the Public Safety Bureau by employing their intelligence led policing in a more
effective way.78 The Administration for Security and Counterintelligence is the department that
works primarily with terrorism cases. They also fall within the Ministry of Interior. Macedonia
also has Rapid Response Units and Special Task Units. Each unit responds to either specific
regions of the country or to different crimes. These agencies receive a lot of guidance and
support from State Department funded programs.79
Under the old Penal Code, police conducted interviews and investigations; now that the
prosecutors handle it, it has resulted in many issues between police and prosecutors. Under the
new Criminal Procedure Code, police will only do what prosecutors tell them specifically to do.
Most officers want to avoid accountability since they are no longer in charge of investigations.
Because of this change, there is a huge gap between police and prosecutors which makes it
difficult for them to help each other.80
Since 2001, ICITAP has supported police reform in Macedonia. These reforms have been
identified through the Ohrid Framework agreement established in 2001 that seeks to promote
peaceful development of Macedonian civil society and constructing a better relationship with the
European community.81 One of ICITAP’s main goals is decentralizing police forces in the
country which will help with autonomy. They also have assisted in developing the PSU which
will help to decrease corruption and human rights violations.82
The Criminal Procedure Code that was implemented in 2013 has made significant
changes to the country and how it operates.83 Under the old Penal Code police had the primary
lead in investigations. Now prosecutors take the lead in all investigations including interviews. It
was believed that if they made the prosecutor the lead in investigations there would be a decrease
in corruption. This change did not change the amount of corruption, but did have other
unintended consequences.84
There is a huge disparity between the amount of police and the amount of prosecutors in
the country. This results in prosecutors being under resourced and understaffed to handle the
amount of cases they receive. From the crime scene on, prosecutors are in charge of the case.
Since the new code was implemented in 2013, many prosecutors have still not received proper
training in conducting interviews. It is believed that prosecutors aren’t preparing enough for
interviews and not digging deep enough to understand the criminal mentality, especially the
76
U.S State Dept. Human Rights Practices.
U.S State Dept. Country Reports on Terrorism.
78
United States Department of Justice. ICITAP: Macedonia Law Enforcement Development Program
(2015).
79
U.S State Dept. Country Reports on Terrorism.
80
Hatler, Rick.
81
Ohrid Framework Agreement 13.08.2001.
http://www.ucd.ie/ibis/filestore/Ohrid%20Framework%20Agreement.pdf.
82
U.S Dept. of Justice. ICITAP: Macedonia.
83
U.S Dept. of State. Human Rights Practices.
84
Hatler, Rick. 77
15 terrorist mentality. Also the information obtained through interrogations is used for prosecution,
not intelligence.85
Serbia
Statement of the Problem
Serbia has a poor record of respecting human rights issues from past decades that the
government fails to address. This results in numerous rule of law issues on both the judicial and
law enforcement sides of the government. The recent changes in the Criminal Procedure Code,
have caused confusion amongst law enforcement personnel and contributed to corruption.
Prosecutors have not received training to effectively conduct interviews which could potentially
cause human rights violations. It is also crucial that the country try to engage police officers and
prosecutors to collaborate with each other. This collaboration will ensure effective
communications and partnerships between the two groups which allows a smoother investigative
process. The inefficiency and amount of exploitation in the judiciary also has a substantial
impact on the country’s ability to handle domestic threats as well as international ones.
Country Summary
Serbia was originally a part of the former Yugoslavia. When the country was divided,
Serbia and Montenegro declared itself a new Federal Republic of Yugoslavia (FRY). In 2003,
FRY renamed itself the State Union of Serbia and Montenegro. Serbia gained its independence
in 2006 after Montenegro seceded from the state. The country has a long history of ethnic
tensions and in 2008 Kosovo declared itself independent from Serbia. Since 2014, they have
been in negotiations with the European Union about their accession to the union.86
The country is located in the southeastern part of Europe, specifically between
Macedonia and Hungary. 83.3% of the population is made up of Serbs, followed by 3.5%
identifying as Hungarian. The official language is Serbian which is spoken by 88.1% of the
population.87 Serbia is working bilaterally with the United States to fight terrorism in the region. The
US specifically works with two police organizations the Special Anti-Terrorist Unit and the
Counter-Terrorist Unit. The development of their own counterterrorism center has continued to
make progress in the country. The center will focus on creating coordination amongst the
different agencies in Serbia. The government recently sent a delegation to the US to work with
numerous government agencies to better Serbia’s practice of analysis and implementing methods
to counter prospective terrorist plots and suspects.88 Suspects of terrorism are treated as criminals
and given the same rights as criminal suspects. They are not referred to as enemy combatants,
which is a theme in US laws and policy. There is differentiation between extremism and
terrorism in the country. They define extremists as a member of ISIL or its associated groups and
a terrorist as a homegrown radical. For example, someone who has gone to Crimea to fight under
Russian leadership.89
85
Hatler, Rick.
CIA: The World Factbook. “Serbia.” (2015). https://www.cia.gov/library/publications/the-worldfactbook/geos/ri.html.
87
Ibid.
88
United States Department of State. Country Reports on Terrorism 2014. (June 2015):140-142.
http://www.state.gov/documents/organization/239631.pdf. 89
Madden, Doug. ICITAP Serbia Country Manager. Interview date: March 1,2016.
86
16 The Syrian refugee crisis continues to be of concern for Serbia. They have already
experienced two attacks from ISIL fighters posing as Syrian refugees. Serbia is still unable to
screen people as they come into the country. They also have strict data collection laws which
makes it very difficult to detect potential threats through the use of databases.90 Overall, they have continued to improve their legislative capabilities to fight terrorism,
especially their response to foreign terrorist fighters. But they are still unequipped to handle
matters related to terrorism.91 The new legislation for foreign terrorist fighters was ratified in
October of 2015 and was added as an amendment to the criminal code. The law prohibits Serbian
citizens from participating in foreign conflicts.92 There are large numbers of foreign terrorist
fighters coming out of the Sandzak and Presevo regions in Serbia. The Western Baltic states
have long been a transit route between the Middle East and Western Europe.93 There have been
five indictments under the new foreign terrorist fighter legislation but there has not been any
convictions thus far.94 Because of this, authorities need to establish more efficient and sensitive
ways in determining foreign terrorist fighter threats. Serbia has also improved its capacity to
share information with its bordering countries to help in the fight against these types of threats.
Border control continues to be an area that needs improvement to help thwart the passage of
foreign terrorist fighters. Serbian authorities have continued to work with the US’s Export
Control and Related Border Security program for guidance in these issues.95 Serbia has approximately 43,000 police officers that are under the authority of the
Ministry of the Interior. Police corruption and impunity have continued to be problematic. There
have also been reports of police mistreatment of detainees. Serbia has improved their ability to
prosecute individuals in authority. However, it is still believed that most of these cases have
continued to go unreported.96According to the State Department's Human Rights Report, they
have reason to believe that the use of torture has been tolerated by authorities in obtaining
information from suspects. The deputy ombudsman identified numerous cases of abuse that were
not properly handled by the responsible authorities.97 Under the new Serbian Criminal Procedure Code, there have been improvements in the
quality of police investigations, specifically inter-agency investigations. The Ministry of the
Interior also established a hotline that citizens could use to report law enforcement corruption.
They also sponsored training events dealing with anticorruption in law enforcement. Prosecutors
were included in these.98 The Serbian constitution requires that law enforcement officers gain approval from either
a preliminary proceeding judge or by an investigative judge, prior to to the detention of persons
lasting longer than 48 hours. Usually this time is used to question suspects. The law also states
that law enforcement must notify arrested persons of their rights. It is unlawful for law
enforcement officers to questions suspects without informing them of their rights. This includes
90
Madden, Doug.
U.S Dept. of State. Country Reports on Terrorism.
92
The UN Refugee Agency. “Country Reports on Terrorism 2014- Serbia.” (2015)
http://www.refworld.org/docid/5587c74028.html.
93
U.S Dept. of State. Country Reports on Terrorism.
94
Madden, Doug.
95
U.S Dept. of State. Country Reports on Terrorism.
96
United States Department of State. Country Reports on Human Rights Practices for 2015: Serbia
(2015). http://www.state.gov/documents/organization/253109.pdf.
97
Ibid.
98
Ibid. 91
17 the right to have counsel. If they cannot afford an attorney, they will be given one at the
government's expense. Excessive delays by authorities to file formal charges against suspects in
investigations are prohibited by the constitution. For cases pertaining to terrorism, the law states
that investigations should be concluded twelve months after the crime.99
According to the constitution, Serbia has an independent judiciary but has remained
susceptible to political influence and corruption.100 An EU commission commended Serbia’s
commitment in fighting corruption in the country. The commission did state that Serbia needed
to enhance their legal framework to guarantee an independent judiciary. They also must focus on
the country’s human rights obligations.101 Serbia’s main police force is the Serbian National Police (SNP). When carrying out
intelligence led investigations, they rely on the Operational Analysis Network for funding and
other forms of support. Within the SNP is a division focused on anti-corruption development.
The unit is called the Anti-corruption and Internal Control Unit. This unit works closely with
ICITAP and the Overseas Prosecutorial Development Assistance and Training (OPDAT)
department to ensure improvement in anti-corruption developments. The Internal Control Unit
also investigates corruption, misconduct, and other illegal acts within the Ministry of the Interior.
There are two units within the SNP that handle terrorism cases specifically. They are the AntiTerrorism Investigations Unit and the Special Anti-Terrorism Response Police. These units have
received training from ICITAP to handle terrorism cases more efficiently.102 Terrorism police
units can be trained by US agencies but patrolmen in certain areas are not eligible because of
past human rights violations. There are 27 police districts and 11 of them cannot receive
assistance.103 Serbia also has an Anti-corruption Agency (ACA) which is supposed to be an
independent body accountable to parliament. The main goal of this agency is to combat
corruption. They oversee the implementation of Serbia’s strategy against corruption in all its
forms. In 2014, they failed to perform all of its duties because of loopholes in the legislature. The
agency continues to face a number of challenges including being under-resourced and
understaffed.104 Law enforcement officers are responsible for informing suspects of their rights. However,
they are not responsible for conducting investigations or interrogations. If the prosecutor orders
the police to conduct a pre-investigation they are allowed to participate in the investigative
process to some extent. When the investigation becomes official, it changes hands to the
prosecutor.105 From previous forms of government, there is a mindset in the country that unless
an act is specifically authorized by statue, it is considered to be illegal. This contributes to
inconsistencies in law enforcement.106 The Republic Public Prosecutor's Office is the agency that prosecutors are housed
107
under. Prosecutors have a more hands on way in the investigative process in Serbia. Under the
99
Ibid.
Ibid.
101
Human Rights Watch. World Report 2015: Serbia (2015). https://www.hrw.org/worldreport/2015/country-chapters/serbia/kosovo.
102
United States Department of Justice. ICITAP: Serbia Law Enforcement Development Program (2015).
103
Ibid.
104
U.S Dept. of State. Human Rights Practices.
105
Madden, Doug.
106
Ibid. 107
U.S Dept. of Justice. ICITAP: Serbia.
100
18 Serbian Criminal Procedure Code (CPC), prosecutors handle suspect interrogations. All
information the suspect declares to the police officer is not permissible in court. Many of the
prosecutors have not yet received training in interrogation methods. Prior to 2013, investigative
judges were charged with interrogating suspects and handling investigations. Prosecutors now
lead all criminal investigations.108
Large amounts of corruption and inefficiency in the judiciary cause significant case
backlogs. The result of this backlog is that many cases get dismissed. Unlike the US system, a
suspect cannot be charged multiple times in a single case. If they are not convicted for one crime,
the entire case is overturned. Prosecutors are also unable to make agreements with suspects. For
example, they are not allowed to negotiate a deal in which the suspect would avoid jail if he acts
as an informant to the prosecutor. Prosecutors also have limited use of the plea bargain. This is a
fairly new practice in Serbia and there are no criteria or rules that apply to its use. This results in
a lack of leverage between prosecutors and suspects. Additionally, there is no best practice in
using case law in the country for criminal cases.109
The recent changes in the Criminal Procedure Code has resulted in additional tensions
between the law enforcement community and prosecutors. These tensions have resulted in a lack
of cooperation between the two groups. Often times, prosecutors believe that they cannot learn
from police officers and vice versa.110 ICITAP and OPDAT are working collaboratively to bring
prosecutors and police together to improve the efficiency of the government.111
International Norms and Domestic Laws Governing Interrogations
When addressing the question of how to obtain information from suspected terrorists we
start with the premise that whatever methods used are calculated to curb future violence and
thereby save lives. The threshold question then becomes whether the suspects are to be treated
as enemy combatants or merely perpetrators of organized crime. The international norms and
customs and the domestic law of various countries that dictate acceptable methods in this process
vary depending on the classification the suspects are placed in. Accordingly, the following
discussion covers both situations.
International Law
If captured terrorist suspects are treated as combatants, then international customary and
treaty law would apply. The various conventions signed at Geneva in 1949 regarding the
treatment of prisoners of war and captured civilians would control. Under that guideline, persons
falling into the hands of an opposing government are to be protected from "murder, torture,
corporal punishment" or any form of brutality.112 In accordance with the 1949 convention and
the Convention Against Torture there is no circumstance under which an exception is authorized,
even in the face of potential mass deaths. As further evidence that no exception for exigent
circumstances was contemplated by the international conventions, it should be pointed out that
this very issue was debated during the negotiation of the treaty. However, all signatories still
108
Madden, Doug.
Ibid.
110
Ibid.
111
U.S Dept. of Justice. ICITAP: Serbia.
112
Geneva Convention Relative to the Protection of Civilian Persons, 12 August 1949, United States
Department of the Army Field Manual 27-10.
109
19 affirmed it without making any exception for any extenuating circumstances.113There is sound
rationale for this interpretation of the law as evidenced by the philosophical objectives of the
international law of war. It has been clearly posited in the various controlling documents that
govern the conduct of nations and individuals during time of war that the objective of these
regulations is the expeditious restoration of peace. The capturing of prisoners contributes to that
objective by weakening the opponent possibly to the point where they no longer have the ability
to fight and the war ends. However, if prisoners or civilians in occupied territory are mistreated,
which include subjection to torture, hostilities may continue. At that point the continued fighting
may be based largely on personal animosity and desire for revenge.
Therefore, assuming captured terrorists are deemed combatants under the international
law of war, the proper treatment would be to hold them for the purpose of taking them out of
combat and thereby weakening the opponent's military strength. It would not be beneficial to
engage in torture, whatever the purpose.
Peacetime International Law and Domestic Law
The other scenario involves the declaration that the suspected terrorists are not part of a
state sponsored military operation but are no more than organized criminals. In this
circumstance, international law is even more settled with respect to not only torture but any
inhumane treatment that may not amount to torture. To properly dissect this issue a fundamental
understanding of the source of authority of international law is required. The sources of this area
of law are customary international law and treaty law. Customary law supersedes treaty law and
is derived from long standing customs and practices by nations and may or may not also be
codified by way of statute or treaty. As evidence of the superior status of customary
international law it should be noted that its enforcement has universal jurisdiction. It can
therefore be enforced by any country irrespective of where the offense took place or the
nationality of the parties.114 Treaty law, on the other hand, is derived from written agreements
between nations and/or domestic statutes that reflect international agreements. After ratification
of a treaty, it is then up to the signatory states to write it into law by whatever procedure the
legislature uses to create law. Once done, the criminal procedure for signatories comes into play.
It is fair to say that perhaps the most unequivocal area of all of the mandates found in
international or domestic law is the prohibition against torture and other forms of inhumane
treatment. In international treaty law we may start with the 1948 United Nations General
Assembly's Universal Declaration of Human Rights at Article 5 which states that, "No one shall
be subjected to torture or to cruel, inhuman or degrading treatment or punishment." This
mandate has been later incorporated into the 1992 International Covenant on Civil and Political
Rights (ICCPR) and the 1994 Convention Against Torture (CAT).115
As noted above in the analysis of the law of war, conspicuously absent from any of cases
based on customary law or any conventions or treaties, is any exception for exigent
circumstances. The circumstances that would form the basis of any argument for an exception to
the rule would be where imminent danger exists and the potential harm to many people
outweighs the rights of a single terrorists. Though this has been debated and argued for by
nations that have been hard hit by terrorist activities, there is no authority to be found that would
make an exception to the prohibition against torture. The most compelling argument against
113
"The Legal Prohibition Against Torture." Human Rights Watch, March, 2003. 114
115
Ibid.
Ibid.
20 making an exception for torture would be the question of where to draw the line. There would be
no clarity as to how much torture is to be applied if this exception were implemented.
Additionally, countries could subjectively determine which situations are exigent and therefore
use torture arbitrarily.116
Consequences of Misconduct
When the law against torture is violated there are several scenarios that result in
outcomes that would illustrate the drawbacks of such tactics. One negative result is common to
both wartime/international situations and domestic criminal law, when suspected terrorists are
prosecuted locally. That negative outcome is that information obtained under physical or mental
duress is likely very unreliable. This concept can be simplified by saying a suspect would say
anything in order to stop the pain. Joan of Arc is said to have stated, "If you hurt me I'll say
anything you want to hear. But when you stop, I'll take it all back."117 Another consideration is
that humans have varying degrees of pain tolerance and what they consider pain.
Aside from the immorality and ineffectiveness in using torture there are legal and
procedural consequences to its use. From the standpoint of international law, the conventions
penalize perpetrators by excluding any evidence or confessions in court proceedings, elicited
from a person who experienced torture.118 Akin to this consequence in international law is the
protection against self-incrimination.119 While the ICCPR does not specifically say, "do not
torture," that prohibition is inferred as part of an argument that one's right against selfincrimination was violated and that torture was used to elicit the self-incriminating evidence.
That evidence is then excluded from the record.
From the standpoint of domestic law, the United States prohibits forced confessions in its
constitution. The United States Constitution implicitly prohibits torture through it's Fourth, Fifth
and Eighth Amendments.
The Fourth amendment’s prohibition of unreasonable search and seizure, the Fifth amendment’s
right against self-incrimination and the Eighth amendment’s prohibition against cruel and
unusual punishment implicitly outlaw torture. These same principles are found in constitutions
of many democratic states.120
There are other consequences in violating the laws that prohibit torture that are more ideological
in nature. The United States and many other countries, have taken a strong stand against torture
both by way of official policy statements and that they are signatories to several treaties that
prohibit torture.121
Accordingly, a significant consequence in violating those stated principles is a loss of credibility
in the international community. A more concrete consequence of this failure is the subjection of
that country's citizens to similar treatment by another country that declares that exigent
circumstances exist.
The United States passed legislation in compliance with the United Nations Convention
Against Torture. In 1996 it passed the War Crimes Act which made it a felony for United States
116
Ibid.
Ibid.
118
"Initial Report of the United States of America to the United Nations Committee Against Torture,
October 1999.
119
United States War Crimes, 18 U.S.C. SECTION 2441(D)(1)(A)(B)
120
Constitution of Bosnia and Herzegovina, PARAGRAPH II, SECTION A, ARTICLE 2, JANUARY 1994
121
American Bar Association. "Comparative Analysis of Criminal Defense Advocacy in Bosnia and
Herzegovina, Kosovo and Albania." American Bar Association Rule of Law Initiative, February 2014.
117
21 citizens to engage in torture or inhuman treatment.122 Similarly, in 2009, the United States
Congress passed an anti-torture statute which allows for criminal prosecution with penalties of
up to twenty years in prison or execution if a victim of torture dies or suffers serious bodily
injury. This statute also provides for a civil remedy by victims for damages resulting from mental
suffering.123
All of the information previously cited leads to a reasonable conclusion that any
perceived benefit from torture is far outweighed by its drawbacks. This is especially made clear
in consideration of various interview and interrogation techniques that are effective but that do
not violate international or domestic law. These methods will be more fully discussed
subsequently.
Criminal Procedure in the Balkans
Traditionally, all of the states in the Balkan region shared similar legal
backgrounds. They operated under the Civil Law system as does much of the European Union.
The Civil system's primary feature is that it is inquisitorial in nature whereby the Judges/Courts
are primarily responsible for gathering evidence. This is done by way of conducting an initial
investigation and then ruling on the case based on the evidence that it has gathered.124 A
prominent feature of this system is the limited input the parties, i.e. prosecutor and defense
lawyer, have. They are allowed to propose evidence to be considered as opposed to having
regulatory authority to do so. While the proponents of the Civil Law system may argue that it is a
fair system it is also fair to say that it was calculated more to curb crime than anything else.
The other legal system is the Common Law system. It is of widespread use in those
countries whose law derives from England and its former colonies. The Common Law's primary
feature is that it is an adversarial system rather than an inquisitorial one. The parties are in
opposition to each other and strive to place evidence before a neutral judge with the objective of
receiving a favorable decision. The parties, who in the case of criminal matters are prosecutors
and defense attorneys, have an absolute right, indeed a duty, to present evidence based on
authority granted by the rules of evidence of the particular court or court system that the case is
in. The prosecutor represents the government and the defense attorney represents the accused and
are required to do so zealously.
Introduction to Interviews
Features of Interviews
Interview strategies can be classified differently based on province, country or region. This can
cause confusion amongst practitioners in learning and organizing different interview styles.
According to one source, strategies for interviewing can be broken up into four broad types.
Within these four broad categories there are two subcategories that divide practices by coercive
and non-coercive means.125
1) Legalistic
122
Ibid.
Ibid.
124
American Bar Association. "Comparative Analysis of Criminal Defense Advocacy in Bosnia and
Herzegovina, Kosovo and Albania." American Bar Association Rule of Law Initiative, February 2014.
125
Delahunty, Jane., Martschuk, Natalie., Dhami, Mandeep. “Interviewing High Value Detainees:
Securing Cooperation and Disclosures. “Applied Cognitive Psychology 28(2014).
123
22 a) Uses methods of power and law to influence a detainee. Oftentimes the interviewer will
mention legal incentives like punitive leniency if the suspect gives the interviewer
information.
i) Coercive practice
(1) Accusatorial and guild presumption
ii) Non-coercive practice
(1) Avoid prejudgment and use of open ended questions
2) Physical
a) This category includes when the interview takes place, how long the interview may last,
and the amount of physical comfort or discomfort the suspect feels.
i) Coercive practices
(1) The use of physical restraints, physical threats, and torture
ii) Non-coercive practices
(1) The use of breaks and providing food/ beverages during the interview
3) Cognitive
a) This strategy seeks to influence cognitive capabilities of the suspect including memory.
i) Coercive practices
(1) Deception about evidence against them and secrecy
ii) Non-Coercive practices
(1) Transparency in the interview process and sharing information/ evidence
4) Social
a) This includes how many people are present during the interview and the use of relational
interviewing strategies like rapport building and the use of social persuasion methods.
i) Coercive practices
(1) Intimidation and threats
ii) Non-Coercive practices
(1) Rapport, considerations, and respect
In this study, they found that social strategies in interviews have a positive effect on the amount
of information received, its validity, and the time it took to be provided to them. Coercive
techniques that were used were actually counterproductive to the interview process. With
coercive means they found that the interviewer received less reliable information and fewer
disclosures.126
Another study, conducted by Christopher Kelly, Jeanee Miller and Alison Redlick,
identified over seventy-one interview and interrogation techniques from which they then broke
up into six smaller categories. These categories are rapport and relationship building, context
manipulation, emotion provocation, collaboration, confrontation, and presentation of evidence.127
Kelly, Miller, and Redlick say that one of the broadest categories of interview techniques is the
minimization and maximization dichotomy. Minimization refers to expressing sympathy and
maximization refers to directly accusing the subject. The second major category identified by
these researchers is humane versus dominate techniques. The final category is the informationgathering model versus the accusatorial model.128
126
Ibid.
Kelly, Chritopher., Miller, Jeanee., Redlich, Allison., Kleinman, Steven. “A Taxonomy of Interrogation
Methods.” Psychology, Public Policy, and Law 19.2 (2013). 128
Ibid.
127
23 Under this framework, the researchers continue to break up the six subcategories.
Rapport and relationship building was broken up into fourteen smaller categories that include
active listening, patience, active listening, and other techniques notorious to rapport building.
Context manipulation was broken down to eleven techniques. This included techniques, like
changing the scenery of the interview, and altering the time of the day that the interview is done.
Forty techniques were identified for emotion provocation. These techniques were classified
separate from rapport building and included appealing to the suspect’s self-interest or religion.
This is also known as “fear up” “fear down” or “ego up” “ego down”.129 Here the interviewer
wants an emotional outburst from the suspect so they play on the suspect's personality and
beliefs. The category, confrontation has nineteen techniques under this framework. All of which
seek to establish authority over the suspect. Collaboration is essentially the opposite of the
confrontation strategy. Here the suspect and interviewer are on level playing fields. Usually
rewards are used in exchange for information. Lastly, the presentation of evidence focusing on
showing the source that the officials already know everything they want to know. eight
techniques were identified under this category.130
There is a stark difference between the two examples of classification models of
interview and interrogation techniques. Yet there is much overlap between the different models.
It is important to note that the many of the techniques mentioned above can also be named
differently and have various frameworks. This have a major impact of interview training and the
inconsistency among methods being used. This was included to display that we are aware of the
diversity and amount of techniques that are being used, however, for the sake of this project, this
project will focus on prominent and internationally accepted methods that will be defined and
explained in detail.131
Characteristics of Effective Interviewers
There are three traits that are considered to be the most important characteristics for
interviewers. They are empathy, communication and professionalism. An empathetic person has
the ability to participate and understand another person’s feelings. This allows the interviewer to
help identify with the interviewee. When this is displayed to the suspect, it gives them a sense
that the two individuals are on equal footing. Interviewers should be sincere in their comments
toward the suspect. When the interviewer is insincere it could become more difficult to obtain a
confession or any information at all.132
An interview is a conversation between two people, which requires an interviewer who is
an effective communicator. Para-communication involves inflection in someone's voice, tone,
and volume. These are also important aspects to be aware of. Communication isn’t just about
what is being said. Nonverbal communication plays a key role. Everything from gestures, eye
contact, hand movement, and posture play a role in effective communication. Interviewers
should be aware of these physiological responses in suspects. But they should also be aware of
129
Ibid.
Ibid.
131
Ibid.
132
Hoffman, Christopher. “Investigative Interviewing: Strategies and Techniques.” International
Foundation for Protection Officers (2005). http://www.ifpo.org/wpcontent/uploads/2013/08/interviewing.pdf. 130
24 what their verbal and nonverbal cues are that they are sending to the suspect because they may
be having an impact on how the interview is going.133
The last trait for an interviewer to possess is professionalism. This deals primarily with
how the interviewer carries himself and treats the suspect. People are more likely to divulge
sensitive information if they feel like the individual is trustworthy. Professionalism will also help
the interviewer organize the case file. Attention to detail during the interview will play a
substantial role when the interview is complete. Documenting the interview will be beneficial for
many reasons especially for future reference.134
Exercise:
1. Christopher is a police officer interviewing a murder suspect. As he asks questions,
he continuously raises his voice to an almost yelling state. His tone is harsh and
aggressive to the suspect. Christopher also has his hands in fists. How is Christopher
being perceived by the interviewee? Would you say he is communicating effectively?
Why or why not.
2. Marie is a prosecutor interviewing a suspected terrorist. During the interview she
makes eye contact with the suspect and has her hands placed in a neutral position on
the table. Marie continues to make demeaning comments about the suspect and his
religion. She also sounds annoyed during the interview. How is Marie being perceived
by the interviewee? Would you say she is communicating effectively and acting
professionally? Why or why not.
3. Michael is a prosecutor interviewing a suspect found at the border. Throughout the
interview, Michael is calm and mindful of his tone and his inflection. He seems
relaxed at the table, carrying out the interview like a normal conversation. How is
Michael being perceived by the interviewee? Would you say he is communicating
effectively and acting professional? Why or why not.
Police Interviews
Suspect interviews are the most fundamental stage in case processing and disposition in
criminal proceedings.135 Suspect and witness interviews account for the largest number of police
investigations roles.136 Although the word “interrogation” is commonly used in reference to
questioning of suspects, in this project the word “interview” will be used to mean the process of
questioning suspects without coercion. It is also important to note that police interviews are
usually done with the intention of obtaining a confession. In cases with suspected terrorists,
interviews are conducted for a confession but also to gain intelligence.
133
Ibid.
Ibid.
135
Baldwin, J. “Video Taping Police Interviews with Suspects: An Evaluation.” Great Britain Home Office
(1992).
136
McGork, Barry., Carr, Michael., McGork, Debra. Investigative Interviewing Courses For Police Officers:
An Evaluation. Police Research Group (1993).
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.603.4361&rep=rep1&type=pdf. 134
25 Questioning
Interviewers must have a good understanding of the basic rules of questioning, the types of
questions that are useful in the interview and when to use them.137
Types of Questions:
1) Open Ended Questions138
a) According to Milne, 2004, open ended questions are encouraged because they give
suspects longer time to answer questions. It also engages the intellectual ability, actively
on how the interview should progress.
Probing Questions: The use of the five W’s and and one H (5WH).139
a) Who
b) Where
c) When
d) Were
e) Why
f) What
g) How
The Types of Questions that should be Avoided
Leading Questions: Questions like these are directed in such a way that suggests a desired
answer. Most times these questions can be answered with a “yes” or “no” response.140 Negatively Phrased Questions: Questions like these suggest that the response should be “no” and
Exercise:
Question for the student: Star the leading questions.
Answers have a * next to them.
“Did you see a blue car?”*
“Was the victim a woman?”*
“What happened at the embassy?”
“What color was the car?”
“Did that comment make you angry?”*
“You said you saw him on Monday, or was it Tuesday?*
137
FIFRA Interviewing Techniques. Appendix B: FIFRA Inspection Manual (2002).
Ibid.
139
Ibid. 140
FIFRA Interviewing Techniques. Appendix B: FIFRA Inspection Manual (2002).
138
26 “no” is also the correct answer to the question.141
Exercise:
Question for the student: Star the negatively phrased questions.
Answers have a * next to them.
“You didn’t see him, did you?”*
“Did you see him?”
“You don’t remember what he looked like, do you?”*
“Did she leave?”
“You didn’t see her leave, did you?*
Compound Questions: These question have two or more questions in the same sequence. This
also includes rephrasing a question before the suspect answers the original question.142 Exercise:
Question for the student: Star the compound questions.
Answers have a * next to them.
“Did you go alone and what time did you leave?”*
“There were hundreds of people in the plaza, weren't there?”
“Did this happen yesterday and was it in the morning?”*
“Can you describe the man you saw and did he look Muslim?”*
“You didn’t want to go, did you?”
141
142
Ibid.
Ibid. 27 Complex Questions: These types of questions are complicated. Questions like these are often
confuse the suspect or lead to false answers.143
Exercise:
Question for the student: Star the leading questions.
Answers have a * next to them.
“Based on what we already know of the circumstances leading up to the incident and the
reactions of others indicated by their testimony, what would have been the suspect's
actions throughout this period?”*
“When you mentioned the victim's appearance, it was obvious to see that you had an
initial bias towards them, would you agree?”*
“Was he Muslim and did he speak Arabic?”
“Did you see the woman go inside the building?
Consequences of Unethical Investigative Interviews
1. The guilty are released and the innocent are convicted
2. Affects the way society perceives the criminal justice system
3. It wastes resources such as time and money
4. Leads to civil suits and loss of police credibility due to civil suits
5. It erodes relations between the community and the police
False Confessions
According to Gisli Gudjonsson, false confessions have led to the conviction of many
innocent persons. Oftentimes false confessions can be obtained through the use of duress or
coercive interview methods. Recent advances in DNA testing has helped to expose false
confessions.144
Case Study: Consequences of False Confessions
False confessions led to exoneration of five men in New York City. These men were
wrongfully convicted of a brutal attack in Central Park. DNA testing corroborated the confession
of Matias Reyes. Reyes stated that he acted alone and that he did not know the five men that
were convicted in the Central Park Jogger Case. The five men were picked up by police
following a chaotic night in Central Park, marked by violence and what was termed “wilding”.
Their statements to authorities were quite damning. Each gave a detailed videotaped statement
after twenty-four hours of being interrogated, minimizing his own involvement in the crime but
implicating the rest. However, the jury was not aware that the confessions were obtained after
143
Ibid.
Gudjonsson, Gisli. & Sigurdsson, Jon. “False confessions: The relative importance of psychological,
criminological and substance abuse variables.” Psychology, Crime & Law 7.1 (2001). 144
28 extensive interrogations. Despite other factors, the confessions were used to convict all five men
who all served out their sentences (Innocence Project, 2001). After several years of
imprisonment, a federal judge approved a $41 million civil rights settlement to the men
wrongfully convicted in the beating and rape of a female jogger in New York's Central Park in
1989.145
Comparative analysis of interview and interrogation
Interview
•
•
•
•
•
•
•
•
•
Non-accusatory
The goal is to obtain the truth
Non-coercive methods are used
Obtain behavioral information
Obtain a confession or gain
intelligence
Dialogue: questioning and answer
format
There is note taking
Conversation with a purpose
Interviewee does all the talking
Interrogation
•
•
•
•
•
•
•
Accusatory
The goal is to obtain the truth
Associated with using coercion
Obtain a confession or gain intelligence
There is no note taking until the suspect is ready to
confess or provide intelligence
Questioning in order to obtain incriminating
information
The interrogator is in control of the dialogue
confess
Military and Law Enforcement Interviews/ Interrogations
With the mounting threat of terrorism, there has been a growing overlap in what types of
interrogations law enforcement officials do and what types of interrogations military officials do.
Usually, military officials want to gather information about upcoming events. Military officials
are looking for intelligence rather than obtaining a confession. Law enforcement officials on the
other hand usually want information that will elicit a confession from the suspect. This once
distinctive difference is no longer the case. Law enforcement officers who interrogate suspected
terrorists now also seek to obtain intelligence from the suspect.146 Units who have not
traditionally sought out intelligence will now need to become more acquainted with obtaining
this type of information.
Literature has also found that law enforcement officers who have conducted
interrogations, have a tendency to be overly confident in their ability to detect deception. The
training most law enforcement officers attend have appeared to have very little effect on
deception detection but the training the officers receive does have an impact on their confidence
in detecting lies.147 It was found in a study that surveyed 132 U.S military interrogators that the
145
Ibid.
Semel, Matthew. “Military Interrogation: Best Practices and Beliefs.” Perspectives on Terrorism 7.2
(2013).
147
Ibid. 146
29 same applies to them. The study found that the most frequent answer was in the participant’s
ability to detect deception was an 80% confidence rate. Out of the seventy-two participants who
answered this question fifty-five said they rated their ability to detect deception at a confidence
level over 50%.148
So what exactly does that mean? It essentially means that an interrogators confidence level in
detecting deception is not correlated to the whether they can actually detect deception in
suspects. Interrogators need to be extremely careful and aware of this fallacy. Detecting a
suspect's lie is only a small part in interrogations.149
The same study found that rapport building was believed to be the best way to obtain both
intelligence and confessions from suspects. Participants said that “basic rapport building is most
effective. This is in part because many of the ‘hardened terrorists’ we capture expect physical
and verbal abuse. When we offer a cup of tea instead it takes them out of their comfort zone.”150
Participants believed that this technique was the best way to get detainees to cooperate and give
accurate information.151 This is important to both military and law enforcement interrogators.
Types of Interviewing Styles152
1. PEACE Model (UK, England, Wales, New Zealand)*
2. Cognitive Interviewing Techniques*
3. Conversation Management Interviewing technique (CMIT)*
4. Mutt and Jeff Techniques
5. Statement Analysis
6. Polygraph
7. Rationalizing, Projecting and Minimizing (RPMS)
8. Reid Interviewing Techniques
9. Kinesic Interviewing
Styles internationally recognized have an asterisk next to it (*)
1. PEACE Model
The word PEACE stands for Planning, Engaging, Account, Closure and Evaluation. It is
widely used by most European police department to conduct interviews for suspects and
witnesses. It has gained more approval and attention as the best interviewing technique so far.
The goals of the PEACE Model include increasing applicability, comprehensiveness and
consistency of information obtained in interviews. It also seeks to obtain accurate and reliable
information from the suspect and increase the opportunities for the presentation of the best
evidence.153
148
Semel, Matthew.
Ibid.
150
Ibid.
151
Ibid.
152
For this section we use the word interrogation instead of interview because the source specifically
uses the word interrogation.
153
Clarke, Colin. National Evaluation of the of the PEACE Investigative Interviewing Course. Police
Research Award Scheme, Report No: PRAS/149.
149
30 P = Planning:154
•
•
•
•
•
•
•
•
Understand the purpose of the interview
Obtain as much background information as possible on the incident under investigation,
including (for suspects) information on the person to be interviewed
Define the aims and objectives of the interview
Understand and recognize the points to prove
Assess what evidence is available and from where it was obtained
Assess what evidence is needed and how it can be obtained
Understand the legislation, associated guidelines and considerations
Prepare the mechanics of the interview (attending to exhibits, logistics, venue, equipment
functioning, seating, and so on).
E = Engage and Explain:155
•
•
•
•
•
•
It is also known as establishing rapport
o Most influential factor in ensuring the success of an interview
Establish ground rules
o Reassure the suspect that what they have to say is important so they need to report
everything they can and try their hardest not to leave anything out
Investigator should not edit as they go even if they believe some information has no
relevance to the matter being investigated
Reassure the suspect that they will be working hard, because they are the ones with the
information
Reassure the suspect that once they have given their account the officer may ask
questions to clarify some things
Reassure the suspect that they should feel free to ask the officer for clarification
throughout the interview
A = Account:156
https://www.researchgate.net/profile/Colin_Clarke3/publication/263127370_National_Evaluation_of_the_
PEACE_Investigative_Interviewing_Course/links/53da3b620cf2e38c63366507.pdf.
154
Short, J.C. “Interviewing Using The PEACE Method. Investigative Articles. (2012)
http://www.jcshort.com/Articles/PEACE-Method.htm.
155
Ibid. 31 •
•
•
•
•
•
•
•
This is where the investigator obtains the suspects full account of events.
Obtain the suspect's own account without interruption
Expand and clarify the information given in the account
Challenge the suspect's account if necessary
Being concerned for the suspects’ welfare for instance, (do you need any water, food
or use the bathroom
Asking how they want to be addressed either by first name, or by title and surname
Check how much time they have got, and if they have to be somewhere by a certain time,
or check with their parking meter
Give reassurance if the person seems nervous of the process.
C = Closure:157
•
•
•
Make sure that there is mutual understanding about what has taken place by reviewing
and summarizing the account
Confirm that all aspects have been sufficiently covered by checking that interviewees
have given all the information they are able and willing to provide
Clarify what will happen in the future by giving the interviewee appropriate information
on the next stages of the process such as telling witnesses whether or not they will have
to attend court
E = Evaluation:158
•
•
•
During this stage, the interviewer examines whether the purpose and objective for the
interview has been achieved
The investigator reviews the investigation in comparison to information obtained during
the interview
The investigator reflects upon how well he or she conducted the interview and considers
what improvements can be made in the future
2. Cognitive Interviewing Techniques
This method of information gathering departs from the traditional way that interviews
and/or interrogations are conducted. The first factor that sets it apart from the others is the fact
that it is most effective in interviewing cooperative witnesses. However, as further discussion of
this method will bear out it can also be effective with non-cooperative witnesses. The second
factor that distinguishes this method from others is that it employs the use of open-ended
questions as opposed to narrowly focused questions calling for strictly responsive answers. The
theory behind the use of open ended questions is that it allows the interviewee to recall events as
they come to mind while the original question is still pending. A key action on the part of the
interviewer is to refrain from interrupting as well as from going on to the next question just
because the suspect has stopped talking temporarily. In other words, a little silence before the
next question is posed facilitates the ability of the suspect to recall facts that he or she may be
156
Ibid.
Ibid.
158
Ibid. 157
32 distracted from. This distraction can result from the interviewer asking a new question as soon as
the suspect pauses.159
The reason that cooperative witnesses may be the better subject for this method of
interviewing is that the method focuses on the ability to help a person who is trying to be helpful
to remember facts that they would like to recall. This is in contrast to the witness or suspect
whose objective is to conceal or misrepresent certain facts. However, this method is not
completely ineffective with the uncooperative suspect because one of the other keys to the
success of this method is the ability to create a comfortable, non-threatening environment for the
interview to take place in. Accordingly, when that environment is created and the open-ended
questions are posed, even a hostile interviewee is likely to reveal more information than would
otherwise be the case.160
A factor specific to this course is the fact that the students that will participate are from
the Balkan countries. As indicated previously in this project, those countries had traditionally
operated under the Civil Law system. One of the key features of that system is that police,
prosecutors and lawyers were not the primary evidence gatherers in court cases. Because of that
they are not likely to have been indoctrinated to the adversarial method of questioning. Like the
Common Law system, the traditional interviewing method that the cognitive method departs
from is calculated to extract information and is, accordingly, adversarial in nature. This method
may be easier for students to adapt than law enforcement officers and prosecutors who are
indoctrinated in the Common Law system.161
Finally, somewhere between 75 and 100 studies have been done in the United States and
western European countries. The results are that 35 to 60 percent more information is gained by
using the cognitive method as opposed to other adversarial tactics methods.162
3. Conversation Management Interviewing Technique
This method is a sub-method of the PEACE model. In the account gathering phase of
that model, conversation management is used to get at the facts by a fairly direct
approach. Because this method is best employed with uncooperative or elusive suspects this
method can be described as adversarial. The interviewer's approach is very similar to the
approach to cross-examination of a witness in court by the opposing attorney. As in crossexamination, the goal is to control the witness by minimizing the narrative responses by the
suspect. The suspect is "reeled back in" from taking focus away from the main issue by way of
unresponsive answers. Once the interviewer has determined that additional questions are not
helpful, he or she summarizes the suspect's statements. At this point, inconsistencies are pointed
out as they would be to an opposing witness in court. However, though this is an adversarial
process, the difference between it and more confrontational methods is the maintenance of a
courteous and respectful demeanor as opposed to a hostile one.163
159
"The Cognitive Interview," The National Safety Board Academy. November 2005.
Ibid.
161
Ibid.
162
Ibid. 163
Vancouver Police Department. "Summary of November 2010 PEACE Mode Interview Training Memo,
160
33 5. Mutt and Jeff Techniques
This technique is an act between two interviewers. Wherein the interviewers create a
dynamic that pushes the suspect to create a relationship with one of the interviewers over the
other. One of the interviewers will play the stricter role, the “bad cop”. In doing this they will
display an unsympathetic attitude.164 This role can also be called “Mutt”, the relentless
interviewer who believes the suspect is guilty.165 The performance starts with this role ranting
and cutting the suspect off as they speak. They also sometimes accuse the suspect of crimes they
didn’t commit.166 Throughout the interview this interviewer is careful not to threaten or coerce
the suspect.167
The other interviewer plays a more sympathetic role causing the suspect to naturally be
more inclined to open up to him/her.168 During the start of the performance, the interviewer who
plays this role tries to calm “Mutt” down and apologizes for their behavior. Because of this
dynamic, the suspect develops a feeling of gratitude toward the “good cop”.169 This role also can
be known as “Jeff”, who is supposed to act the opposite of the “Mutt” role.170 Sometimes this
technique can be done with just one interviewer. He/she will switch between the strict role and
the sympathetic one throughout the session.171
6. Statement Analysis
This technique is used in the collection of both recorded and oral statements. Statement
analysis is using language as a tool to figure out deception. During this technique, the
interviewer should look at the language being used. The interviewer should also be aware of
unique words and phrases used by the suspect and their use of pronouns.172 The following
paragraph refers to the recorded method of statement analysis.
In order to obtain successful results in the recorded style, a statement has to be written in
the actual words of the suspect and not a written interpretation. This method is taught in many
police academies and widely used by various police jurisdictions. According to Schollum,
statement analysis is widely used in the UK and broken down into five psychological cues. SE3R
January, 2011.
164
New Republic Staff. “Mutt and Jeff.” New Republic (2009). https://newrepublic.com/article/47247/muttand-jeff.
165
Levine, Robert. The Power of Persuasion.” Wiley (2013).
https://books.google.com/books?id=Rgt0yAFUvCcC&dq=mutt+and+jeff+technique+of+interrogation.
166
New Republic Staff.
167
Army Field Manuel. Chapter 8: Approach Techniques and Termination Strategies.
https://rdl.train.army.mil/catalog-ws/view/100.ATSC/10492372-71C5-4DA5-8E6E-649C85E1A2801300688170771/2-22.3/chap8.htm.
168
New Republic Staff.
169
Levine, Robert.
170
Ibid.
171
Army Field Manuel.
172
Levesque, Roger. “The Psychology and Law of Criminal Justice Processes.” Nova Publishers (2006).
https://books.google.com/books?id=f7T7td6wfIC&dq=mutt+and+jeff+technique+of+interrogation&source=gbs_navlinks_s.
34 is the acronym used to guide an investigator during the interview. SE3R stands for Survey,
Extract, Systematically, Read, Review and Recall.173
There are two major theories in the verbal style of statement analysis. They are Scientific
Content Analysis (SCAN) and Criterion Based Statement Analysis (CBSA). Both were
developed from psychological methods. The creators believed that fabricated statements required
a larger cognitive effort to maintain. During the interview, the interviewer should consider what
is called the “zero hypothesis”. The “zero hypothesis” is based on the belief that every statement
is untrue until there are enough indicators to prove otherwise.174
When this method is used, it is recommended that the statements being analyzed are
made of long sequences that have not been interrupted by questions. This provides more reliable
information than short statements. The criteria for the evaluation of statements is listed here.
1. General characteristics
a. Structure is logical
b. Unstructured production
c. Quality of details
2. Specific contents
a. Contextual embedding
b. Descriptions of interactions
c. Reproduction of conversation
d. Unexpected complications during the incident
3. Peculiarities of content
a. Unusual details
b. Admitting lack of memory
c. Raising doubts about their own testimony
d. Self-deprecation
e. Pardoning of perpetrator
4. Offense specific elements
a. Details are characteristic of the offense
The nineteen criteria listed above do not need to be present in every statement. However,
the more criteria that the statements meet provides more support to the validity of the statement.
In this method, there is no scoring or other cut-offs. The purpose of this method is not to
determine if something happened or not and it doesn’t determine whether or not the suspect is
honest. The purpose is to evaluate the statement itself.175
Oftentimes, the SCAN method will identify when a suspect is being deceptive. Such
deception is revealed when the suspect tries to minimize the facts of the case or ignore them in
general. The suspect will try to tell the interviewer what he thinks is important for them to know.
Honesty is associated with the use of first person statements and a direct connect between the
173
Schollum, Mary. “Investigative Interviewing: The Literature.” Wellington: Police National Headquarters
(2005).
174
Levesque, Roger.
175
Ibid.
35 person and the statement by using the word “I”.176 Pronouns are useful in indicating who else
was involved. Words like “we” “us” and “they” display that other people were present or
involved.177
The flow of the story is also an important indicator of deceptiveness. A logical and
sequential flow in the storyline will indicate truthfulness. A story that is difficult to follow and
has an incorrect flow will likely be untruthful.178 There are also certain phrases that indicate
untruthfulness. In order to get the interviewer to believe the suspects answer, sometimes they
will use phrases to emphasize the truthfulness of their statement. Examples include, “to be
honest,” “believe me” and “I swear to God.”179 Another indicator is the suspect answering the
interviewer's questions with a question. This strategy gives the suspect time to think of an answer
to the original question. For instance, the interviewer asks, “Did you take the money?” and the
suspect responds, “Did I take the money? No.”180
Exercise:
Question for the student: Which of the following characteristics are truthful and
which are deceptive? Star the ones that are associated with honesty.
Answers have an asterisk (*) next to them.
•
•
•
•
•
The statement is rich in details*
Deviates from use of the first person
Introduction of victim that is specific and possessive*
Missing gaps in time
Incorrect flow of the story
Exercise:
Question for the student: Which of the following statements has incorrect flow?
Answer have an asterisk (*) next to them.
a. I woke up at 8:00 a.m. I went to the bathroom and brushed my teeth. I then got
dressed and went downstairs. My wife had already made breakfast for me. When I
finished, I got into my car and drove to work. I was stuck in traffic for 30 minutes. I
arrived at work at 10:15 a.m. I worked until 12:00 p.m when I went to lunch with a
colleague. After lunch, I worked until 5:30 p.m. and went directly home.
b. I woke up at 8:00 a.m. and got ready in about 30 minutes. I left for work and had
breakfast before I left. During the day I worked until about 1:30. I don’t remember
what time I got back from lunch. I left work at around 5:00 or 5:30 p.m.*
176
McClish, Mark. “Statement Analysis: Techniques for Detecting Truth and Deception.” Advanced
Interviewing Concepts (2008).
http://www.ncids.org/Defender%20Training/2008%20Spring%20Conference/McClish%20handout.pdf.
177
Ibid.
178
Adams, Susan. “Statement Analysis: What do Suspects Words Really Reveal?” Federal Bureau of
Investigation (1996). https://www2.fbi.gov/publications/leb/1996/oct964.txt. 179
McCLish, Mark.
180
Ibid. 36 7. Polygraph
The purpose of the polygraph style of interview is to make the suspect believe that the polygraph
machine will detect his or her lie. Therefore, the suspect decides to speak the truth instead of
being deceptive. However, polygraphs are not admissible in most courts. The use of this
technique could possibly lead to confession of a crime. According to McCarthy, the most recent
case where polygraphs were used to convict a suspect was in 1995. This occurred in South
Carolina where the police had no evidence in connection to a female suspect, Susan Smith, in the
death of her two sons. Three polygraph tests were conducted which consistently showed signs of
deception. The police kept focus on her and she later admitted having let her car roll into a lake,
drowning her two sons. Although McCarthy describes polygraphs as “junk science”, it is still
used by many police jurisdictions in the United States and the FBI.181
8.Rationalizing, Projecting and Minimizing (RPM)
This method of interviewing focuses on "saving face." In this regard it is similar to
conflict resolution methods used in international crises. The principal theme here is based on the
fact that human nature is such that people seek to minimize their wrongdoing. Along with that
comes placing the blame on others as well as minimizing the gravity of any wrong that they have
done. This method of interviewing starts by exploring which of those tendencies are most
prevalent in the suspect being questioned by use of innocuous, non-threatening questions. Once
this is determined, the three components of this method of questioning are employed.
First comes rationalizing, where the interviewer empathizes with the suspects plight by
indicating that what the suspect did under those circumstances is understandable. Second, the
interviewer focuses on how the victim contributed to the problem thereby projecting the blame
on something other than the suspect. Third, is the minimizing of the impact of the alleged
crime. It is important to note here that this is not done by suggesting that it is not a crime.
Instead the interviewer adeptly stays away from the legal consequences and focuses on the
morality and associated feelings of guilt on the part of the suspect.
The final phase of this method is not part of the abbreviation, RPM. It is the process of
providing the suspect an incentive to confess. After the previously mentioned methods have
helped remove vehement denials by the suspects, some motivation to provide full disclosure as
to what happened is required. Examples of such motivations would be a chance to receive
needed treatment for serial criminals, the chance for the suspect to tell his or her side of the story
before the media runs with a less favorable version and relieving the conscience of a guilt-ridden
suspect. If this process is followed it is likely that a confession will be forthcoming.182
9. Reid Interviewing Techniques
181
The National Academic Press. “Lie Detection and Polygraph.” (2003)
http://www.nap.edu/read/10420/chapter/2.
182
Napier and Adams. "Magic Words to Obtain Confessions." FBI Law Enforcement Bulletin, October,
1998.
37 The Reid Interview Technique, based on intimidation and coercion, consists of two main phases,
the behavioral analysis interview (BAI) and the nine step interrogation process which include:
Step One: The Positive Confrontation
The investigator stands directly in front of the suspect in a confident manner and confronts the
suspect with a statement of guilt. The confrontation statement is brief, exact and clear. For
instance, “I have in this file the results of our investigation which include evidence of your
funding into terrorist training in Kosovo. The results of our investigation clearly indicate that you
are the person responsible for providing money for this training.” This type of accusation is made
only in cases where the suspect seems guilty. 183
Step Two: Theme Development
The investigator presents some type of moral justification for the actions of the suspect by
placing the moral blame on other circumstances. For instance, the reason why he sent the money
to train the terrorists in Kosovo was because the government was corrupt and violating human
rights.184
Step Three: Handling Denials
Almost all suspects, innocent or guilty, will attempt to deny their involvement in the act under
investigation. When the suspect denies involvement in an act, the more difficult it becomes for
him to eventually tell the truth. During this step, the investigator closely observes the suspect to
predict when the suspect is about to deny the accusation.185
Step Four: Overcoming Objections
In this step, when the suspect realizes their attempts to deny involvement are unsuccessful, the
suspect assumes some control over the interrogation. The suspect makes objections that they
believe will support the claim of innocence. For instance, “I would never do anything like that”
or “I love my people and country.”186
Step Five: Procurement and Retention of Suspect's Attention
The suspect will insist that irrespective of what the investigator has to say, he or she did not
commit the act in question. In order to gain suspect’s attention, they try to close the physical
distance between them and the suspect.187
Step Six: Handling the Suspect's Passive Mood
After the investigator gains the attention of the suspect, she or he continues to emphasis on the
essential theme elements. At this point, the interviewer faces the suspect who will be listening to
what is being said, and feels a sense of defeat. The suspect recognizes his or her previous
ineffective effort to deny the offense. At this point the suspect starts telling the truth.188
183
John E. Reid & Associates. “The Reid Technique”
http://www.reid.com/educational_info/critictechnique.html
184
Ibid. 185
Ibid.
186
Ibid.
187
Ibid.
188
Ibid.
38 Step Seven: Presenting an Alternative Question
In this step of the interview, the investigator presents to the suspect two incriminatory
suggestions to the crime. For instance, “did you plan this thing out or did it just happen at that
particular moment?” In this type of question, either choice is an admission of guilt. The
components of the alternative question contrast a desirable action with an inexcusable,
undesirable action. Once the suspect chooses between the two options then the interviewer
immediately responds with a statement of reinforcement.189
Step Eight: Having the Suspect Orally Relate Various Details of the Offense
After the suspect chooses a statement (step seven), the interviewer immediately answers with a
statement of reinforcement. This statement acknowledges the admission of guilt.190
Step Nine: Converting an Oral Confession to a Written Confession
As soon as the investigator is satisfied, she or he obtains an accurate verbal account of the crime
with sufficient supporting details. At this point, the oral confession is diverted into a written
document. Another person is called to witness the oral confession before a written statement is
obtained. The investigator advises the suspect that they are stepping out of the room for a few
minutes. They then locate a second person to serve as a witness. When the investigator and
witness return to the room where the suspect is, the witness introduces him or herself as someone
who has been involved in the investigation. Then the investigator repeats the details of the
confession to the witness, and the witness asks the suspect a few confirming questions. If there are any changes, the suspect must initial each part.191
10. Kinesic Interviewing
This interview method involves analyzing an individual’s behavior and body movements
to access deception. Kinesics is defined as the study of non-verbal communication.192 Body
movement is used congruently when we speak. Human beings send signals to one another
unintentionally.193 There are two steps to this technique. The first step is called the “practical
kinesic analysis phase.” This is characterized by observance and analysis of a suspect’s behavior
to gain an understanding of their deceptive and truthful behaviors. It is also the chance for
interviewers to see what the suspect is sensitive to. The information gained during this phase will
help the interviewer construct how the interview will go. The second step in this technique is the
“practical kinesic interview phase”. This step is how the interrogation is generally carried out.
The fundamental stages in this phase of the interrogation include orientation, narration, cross
examination, and resolution. The interrogator also confronts the suspects negative response
states.194 With this method, there are several similarities to the Reid method.
189
Ibid.
Ibid. 191
Ibid.
192
FIFRA Interviewing Techniques.
193
Ibid.
194
Orlando, James. “Interrogation Techniques.” ORL Research Report.
https://www.cga.ct.gov/2014/rpt/2014-R-0071.htm.
190
39 Categories of nonverbal behavior are different throughout cultures and in different people.
Ekman classifies non-verbal communication into 5 categories195
•
•
•
•
•
Emblems- Gestures that replace verbal communication
Illustrations- The kinds of gestures that help verbal communication
Regulators- Movements that are used to show a change in subject matter. For example,
agreeing with someone might result in another person nodding their head.
Affect- Behavior that shows emotion. Posture tells a lot about an individual’s emotions
Adaptors- Usually unconscious behaviors that people do when they are stressed. Like
when someone taps their leg when they are nervous.
The Importance of Preparation for Interviews
A key stage in conducting successful interviews is the preparation process. When in this stage,
the following questions should be asked:196
• Where and when will the interview be conducted?
• What is the objective of the interview?
• Who is participating in the interview?
• What are your main questions for the interviewee?
Reviewing the case file is also a crucial component in this stage. The interviewer should be
familiar with victim and witness statements, officer reports, source information, evidence,
agency information (criminal history, intelligence reports, licensing, identification, other case
files), and photos (crime scene/ surveillance). They should also have a clear understanding of
what the suspect is being charged with or why they are being questioned in the first place.197
The questions that the interviewer plans to ask should be direct in eliciting incriminating
statements or intelligence. Questions should be designed to:198
•
•
•
•
•
Determine the facts of the case
Break the suspect's alibi
Fill in missing information
Identify other conspirators
Uncover information that establishes guilty knowledge or covers elements of the offense
The Importance of Rapport Building
Rapport building for this course will be defined as a positive interpersonal interaction,
that increases trust, produces cooperation, and improves the amount of information obtained
from conversation between a suspect and an interviewer.199 Research has shown that rapport
building during interviews yields more positive results than alternative methods. An issue with
FIFRA Interviewing Techniques. Balen, Mark & Patrick White. “Preparation for Interviews.” United States Department of Justice (2015).
197
Ibid.
198
Ibid.
199
Abbe, Allison & Susan Brandon. “Building and maintaining rapport in Investigative interviews.” Police
Practice and Research 15.3 (2014).
195
196
40 rapport building is that there is not a consensus among practitioners. In one research study,
Allison Abbe and Susan Brandon identify seven methods of building rapport with suspects.200
•
•
•
•
•
•
•
Immediacy behavior
o Behaviors that include leaning forward, reducing physical distance between the
suspect and the source, making eye contact, and facing the suspect.
§ Cultural norms should be considered
Active listening
o This includes backchannel responding like affirmative responses ( “ok”, “uhhuh”, etc.)
o This can also include paraphrasing back to the suspect
Mimicry
o This is key to rapport building. These types of behaviors include mirroring
nonverbal behavior, and speech rate. Mimicry is found to improve trust between
the suspect and interviewer.
o Cultural norms should be considered
Contrast
o This is the opposite of mimicry. Contrast and Mimicry can be used at different
points of the interview to achieve different goals. The interviewer can also use
emotional contract. For example, an interviewer who displays a transition from
anger to happiness.
Self-disclosure
o It has been found that sharing personal information can increase positivity during
the interview. The personalization of the interaction can also enhance trust
between the suspect and the interviewer.
Common Ground
o This characteristic includes overlapping interest and identities between the
suspect and the interviewer. Depending on the amount of information on the
suspect this may be harder to do in some situations.
Contact and persistence
o Research shows that consistent exposure among individuals increases their
likelihood of building a relationship. However, just because an individual has
more exposure to another individual does not mean that they will like each other
any more or less.
There are several challenges to building rapport with a suspect.201
•
•
Interviewer personality
o Some people have an easier time establishing rapport than others. Empathetic
interviewers have been found to be more successful in building rapport than nonempathetic interviewers.
Risks associated with mutuality
200
Ibid. 201
Ibid.
41 •
•
o When the interviewer is more likely to be influenced by the source than vice
versa.
Over-Rapport
o The interviewer over identifies with the suspect.
Source Resistance
o Resistance can arise sporadically from the suspect during an interview. This is
regardless of what the relationship is between the interviewer and the suspect.
Benefits of recording interviews
According to Zulawki and Wicklander, the use technology allows officers or other
individuals to consult previous interviews for clarification of information and to view the
behavior of the interviewers. Furthermore, U.S police jurisdictions have used electronic
recording for the past two decades. The U.S. courts have accepted electronic recording as an
accurate means of documenting police interviews with suspects. However, most US agencies
permit the recording decision to the discretion of the officer in charge. The introduction of
videotaping has helped open police interview rooms to public scrutiny.202
The U.S public has gotten used to being recorded in both public and private buildings
including government offices, courts, police stations, prison and airports. Also recordings of cell
phone conversations and traffic stops are common place as well. The public and the police rely
on these cameras to resolve disputes, identify the suspects and memorialize important occasions.
This is done because the recordings enable people to replay past events.203
Most agencies use video while others use audio recordings. However, videos are
preferred to audio. Some jurisdictions use multiple cameras from different angles while others
use one camera for the whole room. Others position the camera behind the investigator and focus
directly on the suspect. The electronic recording of suspect interviews is an efficient and
powerful tool for law enforcement. Many police jurisdictions are moving to digital technology to
improve the picture quality resolution and lessen storage challenges.204
Benefits of recording interviews include being a resource for training and self-evaluation of
police officers as well as monitoring activity in court, police custody and prisons. Appellate and
trial judges have criticized police agencies that demonstrate low interest in recording suspects’
interviews and yet they have suitable equipment to do so. Some police jurisdictions allow
recording of suspects interviews without informing them, while others obtain consent first. Some
police jurisdictions have no written rules and regulations to govern how, who and when the
recordings are conducted. This is left to the discretion of the officers. Most police jurisdictions
record only interviews for suspects of major and serious felony cases.205
Using an Interpreter in Interviews
A major component of successful interviews with interpreters is the language ability of
the interpreter. The interpreter must be fluent in the exact dialect that the suspect speaks. They
should also be proficient in the official language of the home country to ensure that the
202
Schollum, Mary.
Ibid.
204
Ibid.
205
Ibid.
203
42 translation is accurate. They should also be able to convey the manner in which the information
is presented. Since the interpreter oftentimes plays a key but subordinate role in the interview, it
is crucial that they do not expound on any questions or answers. The translation should be as
close to the original statement as possible.206
Before entering the interview, the interpreter should be briefed and advised of the
questions and overall plan for the interview. There must not be any additional conversation
between the suspect and the interpreter to avoid confusion and other intelligence issues. It is also
recommended that the interpreter sit either next to the interviewer or between the suspect and the
interviewer. This will ensure no additional distractions to the interview. The interviewer should
address the suspect directly throughout the remainder of the interview.207
Introduction to Interrogations
Third Degree Interrogation Techniques
This method is defined as “the employment of methods which inflict suffering, physical
or mental, upon a person in order to obtain information about a crime.” This method gained its
popularity in the 1920’s but overtime would become less popular and most would condemn it.208
Typical features of this method include the use of physical force and psychological duress.209
There are three subcategories of this method and they are blatant physical abuse, deniable
physical abuse, and orchestrated physical abuse. Blatant physical force included suspects being
whipped, beaten, and being hit with pistol butts and baseball bats. Sometimes these methods
resulted in suspects needing medical aid immediately. Deniable physical abuse left very little
evidence behind. Interrogators often hit suspects with rubber hoses because they do not typically
break the skin. The last subcategory is orchestrated physical abuse which resembles “downright
torture.”210
Interrogators using this technique also used various psychological tactics like prolonged
questioning under extreme conditions. They also would deprive suspects of food, sleep and other
necessities until they made a confession. Interrogators also threatened the suspect or his or her
family.211 Solitary confinement was another method often employed by interrogators.212
The Third Degree is ineffective because it doesn’t produce the truth. If a man or woman
is under a significant amount of torture he will likely make a false confession in order to make
the torture stop. The evidence obtained through these means are usually not admissible in court.
The use of these means have long ranging consequences. These types of methods usually result
in mistrust of the police by members of society. Oftentimes the publicity that accompanies these
types of crimes is more damaging to the police department than anything else.213
206
FIFRA Interviewing Techniques.
Ibid.
208
Leo, Richard. Police Interrogation and American Justice. Harvard University Press (2008).
http://www.jstor.org/stable/j.ctt13x0ht7?_=1459029451434.
209
Ibid.
210
Ibid.
211
Ibid.
212
Harvard Law Review. The Third Degree. The Harvard Law Review Association 43.4 (1930).
http://www.jstor.org/stable/pdf/1330289.pdf?seq=1#page_scan_tab_contents.
213
Ibid. 207
43 Exercise:
Question for students: Use the next 3 minutes to work in your small groups to
come up with a list of as many coercive interrogation techniques as you can.
Possible answers are italicized.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Sexual humiliation
Sleep deprivation
Mock executions
Threatening family members and friends
Physical beatings
Waterboarding
Abdominal slap
Stress positions
Confinement
Dietary manipulation
Forced nudity
Water dousing
Rectal feeding
Prolonged standing
Chaining
Solitary confinement
Sensory deprivation
Wall standing
Music torture
Constant light at all hours of the day
Are EITs Effective?
There are numerous perspectives on whether or not enhanced interrogation techniques
(EIT) are effective in obtaining valuable and accurate information from suspected terrorists. The
perspectives of military officials and academics seem to be mixed. According to SSCI Study
findings, EITs are not effective in gaining accurate information or obtaining a detainee’s
cooperation. American Senator, John McCain stated from his experience as a prisoner of war that
“abuse of prisoners will produce more bad than good intelligence. I know victims of torture will
offer intentionally misleading information if they think their captors will believe it. I know they
will say whatever they think their torturers want them to say if they believe it will stop their
suffering”.214 Shane O’Mara a neuroscientist, has done extensive research on the effects of
torture on the brain. He says that these enhanced techniques are often counterproductive to the
goals of interrogations. The use of EITs causes impairment in the brain which result in inaccurate
214
Congressional Research Service. “Perspectives on EITs and Effectiveness.” Perspectives on
Enhanced Interrogation Techniques.
44 information. The manipulation of sleep, food, temperature and sound also have serious impacts
on memory which again impact the quality of intelligence.215
The perspectives of others in support of EITs are that intelligence and information
obtained enabled the identification of other terrorists and notified officers of upcoming terrorist
plots. EITs also confirmed information found through other detainee interrogations and provided
information about the terrorist organization as a whole. However, these individuals found that
EITs did not reveal any information about imminent threats and were still unsure if the criteria
met was sufficient enough to use EITs.216
Counter-interrogation Techniques (CITs)
Just as interrogators employ various methods to interrogate a suspect, suspects also
employ methods to resist cooperation with the interrogator. CITs are the strategies used by
suspected terrorists to contest cooperation in providing information to the interrogator. These
characteristics can be classified into 5 categories.
Passive
o Refusing to look at interviewers
o Silence
• Passive verbal
o Monosyllabic response
o Claiming lack of memory
• Verbal
o Providing known information
o Scripted responses
o Talking about unrelated topics
• Retraction of previous statements
• No comment
Interrogators should be aware of these strategies so they can prepare for them. These are
likely to be many of the counter-interrogation strategies they will experience when interviewing
terrorist suspects.217
Research has proven that the rapport building interview method is the most effective in
responding to CITs. There are two dimensions in rapport based skills that directly impacts CITs.
They are motivational interviewing skills (MI) and interpersonal competence. MI is derived from
the therapeutic community of psychology. This method is direct, client centered and used to
elicit behavior change. The UK has made a shift to these types of interviewing styles. A major
component of MI is understanding that the suspect has control over the extent to which they
participate in the interrogation. Successful interrogators should be empathetic, possess positive
communication skills, be flexible and open minded and professional.218
•
215
O’Mara, Shane. “Why Torture Doesn’t Work: The Neuroscience of Interrogation” Harvard University
Press (2015).
216
Congressional Research Service.
217
Alison, Laurence., Alison, Emily., Noone, Geraldine., Stamatis, Elntib., Waring, Sara., & Christiansen,
Paul. “The Efficacy of Rapport Based Techniques for Minimizing Counter-Interrogation Tactics amongst a
Field Sample of Terrorists.” American Psychological Association (2014). 218
Ibid.
45 Interpersonal competence is the second dimension of rapport based skills that impact
CITs. With this skill, the interrogator should be versatile and have the ability to adapt to a range
of personalities. Interrogators should engage in adaptive and flexible behaviors rather than
maladaptive behaviors like coercion. Maladaptive behaviors often make the interrogation worse
and less likely to obtain accurate information.219
In a study that measured these two skill sets in response to CITs, the researcher used 181
video and audio recordings of interrogations with 49 terrorists. They found that MI skills had a
significant impact on reducing the amount of CITs in interrogations. It specifically decreased
passive, verbal, and no comment responding. Interpersonal competence had little influence on
verbal, retraction, or non-comment strategies. The study found that MI skills promoted an open
environment in which the suspect was able to speak. However, the use of MI skills also increased
the probability of retractions during interrogations. The use of these skills helps to increase
adaptive behavior of the suspect and decrease maladaptive behavior. Interpersonal competence
did, however, have effects on suspects during interrogations. These skills helped in moving the
suspect from an unwillingness to speak to some sort of response. These two skills need to be
used together in order to yield the most positive results.220
Exercise:
Question for students: What should the interrogator do if the suspect is being sarcastic,
punitive, attacking and unfriendly (maladaptive confrontation)?
The interrogator should be frank, forthright, and critical (adaptive confrontation)
219
220
Ibid.
Ibid. 46 Exercise:
Question for students: MI skills generally promote an open environment for the suspect to
speak in. Which of the following questions is more likely to invite an explanation? Why?
Answer is in italics.
a. “I have a forensic report here from Dr. Phillips, a forensic scientist. I’m going to take a
moment to read a segment from that statement. In it he says, “The swabs taken from Jamal
Al-Jabarti’s hands tested positive for antimony and barium residue consistent with having
handled and fired live weapons. Antimony is a common ingredient in gunpowder and
barium is present in the primer used for the firearm.” Jamal, can you think of any reason
why your hands might have antimony present?”
b. “Dr. Phillips’ report indicates that you have fired a live weapon. That’s what really
happened isn’t it Jamal— you have used a firearm haven’t you?”
-A. The question is an open ended and non-accusatory. B is accusatory and the challenge
could be off target, incorrect, or misinterpreted.
47 Exercise:
Question for students: Based on the scenarios below, which CITs are the suspects using in each
example.
Answers are in italics.
1. Suspect A refuses to look at the interrogator and has not answered any of his questions.
-Passive
2. Suspect B responds to each of the interrogators questions with a yes or no response.
-Passive verbal
3. Suspect C tells his interrogator that he must have hit his head and doesn’t remember what
happened.
-Passive verbal
4. Suspect D stares at the table while he is being interrogated and continues to say no-comment
to every question.
-Passive and no-comment
5. Suspect E has this exchange with his interrogator:
Interrogator: For the purposes of the tape can you please tell me your name?
Suspect E: I have been waiting in that cell for over an hour without access to my mobile. I need
to phone my girlfriend.
Interrogator: That is no problem. I can definitely enable access to a phone to enable you to ring
your girlfriend but I’m afraid I’m unable to give you your actual phone as it is currently being
examined for evidential purposes. Would you like to phone your girlfriend now? I’m happy to
stop the interview and enable that.
Suspect E: No, I just want to phone her on that phone. Anyway, the point is, why is my name
relevant? You know my name. Why do I need to tell you it?
-Verbal (unrelated topic)
6. Suspect F is asked a question about an attempted terrorist plot on a local city. He responds
with a scripted response about how his Jihadist group plans to attack the west and will not stop
until they are destroyed.
-Verbal (scripted response)
48 Role Playing Exercise:
From what you have learned thus far, please read each scenario carefully. The background
information’s purpose is only to provide context for both scenarios. Answer the questions at the
end of each scenario. Select which scenario will yield more successful results in the end and
why.
Background information:
In the past year a terrorist organization by the name of Radical Islamic Front (RIF) has
started to grow in popularity in Country Y and Z. The group wants to create a caliphate in the
region and enact sharia law. As the group has grown in popularity, Christians and Muslims alike
have sought asylum in neighboring countries. Both the countries are unequipped to deal with the
growing threat and have seen an influx in foreigners wanting to fight for the RIF cause.
RIF has declared war against the west and has already attacked major cities around the
world. They have proved to be brutal in their methods. The group has a vast reach on social
media and through this has been able to recruit foreign terrorist fighters from all over the world.
After an attack in the capital of Country X the government has decided to take a stronger
approach to the group. They have established an elaborate system that will allow them to better
monitor citizens who might be interested in joining or are already involved with the RIF
movement. Any individual who meets the criteria, previously established by the government,
will be detained and questioned by the appropriate law enforcement agencies. Currently, Country
X has already detained over 250 individuals. Country X just received intelligence that another
attack could be planned in the country. They are hoping they will gain useful intelligence from
detainees to prevent another attack. Country X has a non-disclosed holding facility outside of the
country. With the influx in detainees the holding facility is short staffed and under resourced.
Prosecutors are in charge of all interrogations taking place in the holding facility.
Scenario 1:
The individuals in charge of the camp have set up an interrogation schedule. Each
detainee will be interrogated twice a day. Interrogations can last up to 12 hours in extreme cases.
Detainees are not allowed to eat in that time. The interrogation methods used include but are not
limited to: sensory deprivation, forced nudity, threatening family members of the detainees,
stress positions, wall standing, sleep deprivation, cramped confinement and other psychological
techniques.
Detainees have responded differently to the varying degree of techniques used. Some
detainees continue to not talk to interrogators, others have provided false information about the
coming attack and their interest in RIF in general. They have also received credible information
that is useful in other investigations.
Questions for students
1) What is the problem in the scenario, if any?
2) Were coercive interrogation techniques used?
a) If there were, what were they?
b) Why do you consider them coercive?
3) What can be done differently?
4) What can be done to counter the CITs being used by the suspects?
49 Scenario 2:
Upon arriving at the facility, each detainee is interviewed and based on their responses
given a classification that gauges their “threat level.” Based on the classification they are
segregated into communities with other detainees of the same classification. Low risk detainees
are given more freedom than high risk detainees. Low to medium risk detainees are allowed to
eat, pray and spend recreational time with each other. High risk detainees are allowed
community access based on case by case evaluations.
Detainees who were screened and believed to be uninvolved or uninterested in RIF were
sent to another facility. This reduced the number of detainees to 213. The remaining detainees
were not formally interviewed until they were held for one week. During this time, interviewers
were assigned detainees and were charged with finding out as much information about them as
possible in preparing for their interview. This preparation time allowed the interviewer to review
evidence, background information, witness statements and other agency information.
Once interviewers began, they tried to build rapport with each detainee. They created a
non-threatening common ground, identified common background information or interests, placed
the detainee at ease and familiarized them with interview process.
The results thus far have been inconclusive. The interviewers have received some
valuable information and as of now, the information has been reliable. There have been a large
number of detainees who have continued to provide false information or not respond at all to the
interrogator.
Questions for students
1) What is the problem in the scenario, if any?
2) Were coercive interrogation techniques used?
a) If any, what were they?
b) Why do you consider them coercive?
3) What can be done differently?
4) What can be done to counter the CITs being used by the suspects
Recommendations
Through the research we have conducted this semester, we feel that the use of the
PEACE Model and Rapport Building approach are the most efficient and reliable techniques
when interviewing suspected terrorists. The use of these techniques will lower the amount of
false confessions and we will believe, will yield more reliable information than other methods.
The training course should also focus on the importance of the preparation stage of the interview.
Research has shown that this stage tremendously impacts the success of an interview. It will also
give the interviewer time to understand what motivates the suspect. The understanding of this
motivation is incredibly important for interviewing suspected terrorists specifically.
Additionally, the training should emphasis the major provisions in the Convention Against
Torture, of which each county has ratified. Prosecutors and law enforcement officer should be
aware of the consequences that face them if they choose to violate the CAT. In order to facilitate
50 efficient investigations, it is also crucial that the training focus on the collaboration of police and
prosecutors in preparing for the interview and conducting the interview.
Conclusion
In conclusion, we find that corruption, lack of police and prosecutorial training, and
inconsistencies in the investigative process plague each of the identified countries. The growing
threat of terrorism in the region continues to undermine the national security interests of the U.S.
It is therefore essential that law enforcement officers and prosecutors are able to conduct
professional and ethical interviews to obtain intelligence that can counter these growing threats.
The training that these individuals receive should be consistent throughout the identified
countries and focus on non-coercive interview methods. The training should also describe what
torture is and how to avoid it by establishing clear definitions to avoid its use. Overall, we
believe that this training will have a positive impact on the investigative process in the Balkan
region and will help thwart future human rights abuses.
51 Bibliography
"Business, Corruption and Crime in the Western Balkans." United Nations Office on Drugs and
Crime, 2013.
"Initial Report of the United States of America to the United Nations Committee Against
Torture, October 1999.
"The Cognitive Interview," The National Safety Board Academy. November 2005.
"The Legal Prohibition Against Torture." Human Rights Watch, March, 2003.
"World Report 2015: Bosnia and Herzegovina." Human Rights Watch, 2015.
Abbe, Allison & Susan Brandon. “Building and maintaining rapport in Investigative interviews.”
Police Practice and Research 15.3 (2014).
Adams, Susan. “Statement Analysis: What do Suspects Words Really Reveal?” Federal Bureau
of Investigation (1996). https://www2.fbi.gov/publications/leb/1996/oct964.txt.
Al Jazeera. Macedonia hits Refugees with tear gas, stun grenades.” (2016).
http://www.aljazeera.com/news/2016/02/macedonian-police-fire-tear-gas-refugees160229143534348.html.
Alison, Laurence., Alison, Emily., Noone, Geraldine., Stamatis, Elntib., Waring, Sara., &
Christiansen, Paul. “The Efficacy of Rapport Based Techniques for Minimizing CounterInterrogation Tactics amongst a Field Sample of Terrorists.” American Psychological
Association (2014).
American Bar Association. "Comparative Analysis of Criminal Defense Advocacy in Bosnia and
Herzegovina, Kosovo and Albania." American Bar Association Rule of Law Initiative,
February 2014.
Amnesty International. “Annual Report: Macedonia 2015/2016 (2016).
https://www.amnesty.org/en/countries/europe-and-central-asia/macedonia/reportmacedonia/.
52 Army Field Manuel. Chapter 8: Approach Techniques and Termination Strategies.
https://rdl.train.army.mil/catalog-ws/view/100.ATSC/10492372-71C5-4DA5-8E6E649C85E1A280-1300688170771/2-22.3/chap8.htm.
Baldwin, J. “Video Taping Police Interviews with Suspects: An Evaluation.” Great Britain Home
Office (1992).
Balen, Mark & Patrick White. “Preparation for Interviews.” United States Department of Justice
(2015).
Bellamy, Alex. “No Pain, no gain? Torture and Ethics in the War on Terror.” International
Affairs 82.1 (2006).
CIA: The World Factbook. “Albania.” https://www.cia.gov/library/publications/the-worldfactbook/geos/al.html.
CIA: The World Factbook. “Macedonia.” https://www.cia.gov/library/publications/the-worldfactbook/geos/mk.html.
CIA: The World Factbook. “Serbia.” (2015). https://www.cia.gov/library/publications/the-worldfactbook/geos/ri.html.
Clarke, Colin. National Evaluation of the of the PEACE Investigative Interviewing Course.
Police Research Award Scheme, Report No: PRAS/149.
https://www.researchgate.net/profile/Colin_Clarke3/publication/263127370_National_Ev
aluation_of_the_PEACE_Investigative_Interviewing_Course/links/53da3b620cf2e38c63
366507.pdf.
Congressional Research Service. “Perspectives on EITs and Effectiveness.” Perspectives on
Enhanced Interrogation Techniques.
Constitution of Bosnia and Herzegovina, PREAMBLE, PARAGRAPH II, SECTION A,
ARTICLE 2, JANUARY 1994.
Crelinsten, Ronald. D. “The World of Torture: A constructed reality.” Theoretical Criminology
(2003).
Delahunty, Jane., Martschuk, Natalie., Dhami, Mandeep. “Interviewing High Value Detainees:
Securing Cooperation and Disclosures. “Applied Cognitive Psychology 28(2014).
FIFRA Interviewing Techniques. Appendix B: FIFRA Inspection Manual (2002).
Geneva Convention Relative to the Protection of Civilian Persons, 12 August 1949. United
States Department of the Army Field Manual 27-10.
53 Geneva Convention Relative to the Protection of Civilian Persons, 12 August 1949, United
States Department of the Army Field Manual 27-10.
Gifford, Clive. Killer History. New York: Buster Books, 2012.
Gudjonsson, Gisli. & Sigurdsson, Jon. “False confessions: The relative importance of
psychological, criminological and substance abuse variables.” Psychology, Crime & Law
7.1 (2001).
Harvard Law Review. The Third Degree. The Harvard Law Review Association 43.4 (1930).
http://www.jstor.org/stable/pdf/1330289.pdf?seq=1#page_scan_tab_contents.
Hatler, Rick. ICITAP Macedonian Country Manager. Interview date: March 2, 2016.
Hoffman, Christopher. “Investigative Interviewing: Strategies and Techniques.” International
Foundation for Protection Officers (2005). http://www.ifpo.org/wpcontent/uploads/2013/08/interviewing.pdf.
Human Rights First. “Guantanamo Bay: A Terrorists’ Propaganda Tool.”
http://www.humanrightsfirst.org/guantanamo-bay-terrorists-propaganda-tool.
Human Rights Watch. “Macedonia: unchecked police abuse of migrants.” (2015).
https://www.hrw.org/news/2015/09/21/macedonia-unchecked-police-abuse-migrants.
Human Rights Watch. World Report 2015: Serbia (2015). https://www.hrw.org/worldreport/2015/country-chapters/serbia/kosovo.
Independent. “Operation Cell: Skopje Main Center for Foreign Fighter Recruitment.” (2015).
http://www.independent.mk/articles/20667/Operation+Cell+Skopje+Main+Center+for+F
oreign+Fighter+Recruitment.
John E. Reid & Associates. “The Reid Technique”
http://www.reid.com/educational_info/critictechnique.html
Jones, David. Everyday Life of the Ancient Incas. London: Annes Publishing Ltd., 2010. 109111.
Kelly, Chritopher., Miller, Jeanee., Redlich, Allison., Kleinman, Steven. “A Taxonomy of
Interrogation Methods.” Psychology, Public Policy, and Law 19.2 (2013).
Kristoffersen, LTC Ronnie. "Learning From History: What is Successful Interrogation?" CTX
Journal Vol. 2 No. 2, May 2012.
Leo, Richard. Police Interrogation and American Justice. Harvard University Press (2008).
http://www.jstor.org/stable/j.ctt13x0ht7?_=1459029451434.
54 Levesque, Roger. “The Psychology and Law of Criminal Justice Processes.” Nova Publishers
(2006). https://books.google.com/books?id=f7T7td6wfIC&dq=mutt+and+jeff+technique+of+interrogation&source=gbs_navlinks_s.
Levine, Robert. The Power of Persuasion.” Wiley (2013).
https://books.google.com/books?id=Rgt0yAFUvCcC&dq=mutt+and+jeff+technique+of+
interrogation.
Levinson, Sandord. “The Debate on Torture: War Against Virtual States.” University of
Pennsylvania Press (2003).
MacCormac, Sean. “Shootout in Macedonia: Albanian Militant Cell Shut Down.” Center for
Security Policy (2015). http://www.centerforsecuritypolicy.org/2015/05/12/shootout-inmacedonia-albanian-militant-cell-shut-down/.
Madden, Doug. ICITAP Serbia Country Manager. Interview date: March 1,2016.
McClish, Mark. “Statement Analysis: Techniques for Detecting Truth and Deception.”
Advanced Interviewing Concepts (2008).
http://www.ncids.org/Defender%20Training/2008%20Spring%20Conference/McClish%
20handout.pdf.
McGork, Barry., Carr, Michael., McGork, Debra. Investigative Interviewing Courses For Police
Officers: An Evaluation. Police Research Group (1993).
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.603.4361&rep=rep1&type=pdf
.
Napier and Adams. "Magic Words to Obtain Confessions." FBI Law Enforcement Bulletin,
October, 1998.
New Republic Staff. “Mutt and Jeff.” New Republic (2009).
https://newrepublic.com/article/47247/mutt-and-jeff.
O’Mara, Shane. “Why Torture Doesn’t Work: The Neuroscience of Interrogation” Harvard
University Press (2015).
Ohrid Framework Agreement 13.08.2001.
http://www.ucd.ie/ibis/filestore/Ohrid%20Framework%20Agreement.pdf.
Orlando, James. “Interrogation Techniques.” ORL Research Report.
https://www.cga.ct.gov/2014/rpt/2014-R-0071.htm.
Schollum, Mary. “Investigative Interviewing: The Literature.” Wellington: Police National
Headquarters (2005).
55 Security Council Adopts Resolution 2170. Condemning Gross, Widespread Abuse of Human
Rights by Extremist Groups in Iraq, Syria, (2014)
http://www.un.org/press/en/2014/sc11520.doc.htm
Semel, Matthew. “Military Interrogation: Best Practices and Beliefs.” Perspectives on Terrorism
7.2 (2013).
Short, J.C. “Interviewing Using The PEACE Method. Investigative Articles. (2012)
http://www.jcshort.com/Articles/PEACE-Method.htm.
Shtuni, Adrian. “Ethnic Albanian Foreign Fighters in Iraq and Syria.” Combating Terrorism
Center (2015). https://www.ctc.usma.edu/posts/ethnic-albanian-foreign-fighters-in-iraqand-syria.
Swanson, James. Manhunt. New York: Harper Collins Publishers, 2006. 235.
Taylor, Richard. “CIA Tortured and Sodomized’ Terror Suspect, Human Rights Court Rules.”
The Guadrian (2012). http://www.theguardian.com/law/2012/dec/13/cia-torturedsodomised-terror-suspect.
The National Academic Press. “Lie Detection and Polygraph.” (2003)
http://www.nap.edu/read/10420/chapter/2.
The UN Refugee Agency. “Country Reports on Terrorism 2014- Serbia.” (2015)
http://www.refworld.org/docid/5587c74028.html.
United Nations. Convention against Torture and Other Cruel, Inhuman or Degrading Treatment
or Punishment. (2000). http://www.state.gov/documents/organization/100296.pdf.
United States Department of Justice. ICITAP: Macedonia Law Enforcement Development
Program (2015).
United States Department of Justice. ICITAP: Serbia Law Enforcement Development Program
(2015).
United States Department of State. Country Reports on Human Rights Practices form 2015:
Albania. (2015). http://www.state.gov/documents/organization/253027.pdf.
United States Department of State. Country Reports on Human Rights Practices form 2015:
Kosovo. http://www.state.gov/documents/organization/253075.pdf
United States Department of State. Country Reports on Human Rights Practices form 2014:
Macedonia. (2014). http://www.state.gov/documents/organization/236762.pdf,
United States Department of State. Country Reports on Human Rights Practices for 2015: Serbia
(2015). http://www.state.gov/documents/organization/253109.pdf.
56 United States Department of State. Country Reports on Terrorism 2014. (June 2015):125-127.
http://www.state.gov/documents/organization/239631.pdf.
United States Department of State. Country Reports on Terrorism 2014. (June 2015):140-142.
http://www.state.gov/documents/organization/239631.pdf.
United States War Crimes, 18 U.S.C. SECTION 2441(D)(1)(A)(B)
Vancouver Police Department. "Summary of November 2010 PEACE Mode Interview Training
Memo, January, 2011.
Wantchekon, Leonard & Andrew Healy. “The ‘Game’ of Torture.” Journal of Conflict
Resolution (1999).
57 
Download