Interrogation: a Review of the Science

Total Page:16

File Type:pdf, Size:1020Kb

Interrogation: a Review of the Science INTERROGATION: A REVIEW OF THE SCIENCE HIGH-VALUE DETAINEE INTERROGATION GROUP SEPTEMBER 2016 2016 FOREWORD THE HIGH-VALUE DETAINEE INTERROGATION GROUP The High-Value Detainee Interrogation Group (HIG) is a specialized interagency interrogation capability that brings together intelligence professionals, subject matter experts, and an international and multi-disciplinary team of researchers. Since its creation in January 2010, the HIG has served as the locus for advancing the science and practice of interrogation within the United States government. To date, the HIG has commissioned a body of scientific research on interrogation that has resulted in more than 100 publications in peer-reviewed scientific journals. Equally important, this research has been incorporated into HIG best practices via a continuous cycle of research advising training, training informing operations, and operational experience identifying research gaps and updating training models. SCOPE OF THE REPORT The objective of this report is to provide a systematic review and evidence synthesis of the science related to interrogation. It is not intended as a manual or practitioners’ guide. The emerging science of interrogation relies on a variety of relevant disciplines and fields of study for its theoretical and scientific foundations, many of which have provided decades of data. For instance, research on interrogations in the criminal justice system has been steadily accumulating for decades, providing data on topics such as effective and ineffective interrogation and interview methods, the conditions under which victim, witness, and suspect memories are most vulnerable, valid cues to deception, and the conditions under which individuals confess to crimes they did not commit. During the same period, there has been an emergence and growth of science on negotiation and social influence, persuasion, resistance, priming and embodied cognition, and cognitive-based cues to deception. To the extent that this research is relevant to an interrogation, it is included in this report. This report provides a comprehensive review of HIG-funded research and other science relevant to interrogations: assessing cooperation and countering resistance (Chapter 1), influencing tactics (Chapter 2), interview methods (Chapter 3), and detecting truth and deception (Chapter 4). Based on the comprehensive research and field validation studies detailed in this report, it is concluded that the most effective practices for eliciting accurate information and actionable intelligence are non-coercive, rapport- based, information-gathering interviewing and interrogation methods. METHODOLOGY The HIG supports research and development of an effective, science-based model of interrogation. To this end, the HIG Research Program commissions basic and applied science and field validation studies to rigorously examine current and new approaches to interrogation. Interdisciplinary and cross-domain in scope, researchers have devised novel experimental paradigms (e.g., mock terrorism scenarios, induced cheating paradigms and multiparty negotiations) to systematically evaluate existing and proposed interrogation techniques in real and/or simulated interrogation contexts. A majority of the findings discussed in this report arose from laboratory settings with a diverse population and methodology (e.g., surveys, in-depth interviews, and experimental manipulations), which allow for identification of cause and effect relationships. In contrast, field validation studies (e.g., analyses of actual interviews and interrogations recordings) allow assessment of the impact of the science-based methods in real-world settings. To the extent that field validation studies are available, they are included in this report. Together, the laboratory and field data provide complementary insights and best practices to be translated into training and operational environments. Notably, some readers may observe that a majority of the field research cited has been conducted within law enforcement settings (e.g., field validation study of interrogations with the Federal Law Enforcement Training Center [FLETC]) and assume, therefore, that the data and findings are not relevant to military/intelligence interrogations. However, the goal of collecting information is often true in criminal interrogations as well. The underlying processes of communication, decision-making, memory, cognition, and social dynamics are fundamentally the same in the law enforcement and intelligence gathering settings. There are fewer field data from intelligence contexts because there have been fewer opportunities to study interrogations in military/intelligence settings, especially since the implementation of DoD Instruction 3216.02, Protection of Human Subjects and Adherence to Ethical Standards, which prohibits any human subjects research involving detainees, including observational studies. TERMINOLOGY This report uses the terms “interrogation” and “interview” interchangeably and generally follows the Department of Defense definition of an interrogation to mean, “the systematic process of using approved interrogation approaches to question a captured or detained person to obtain reliable information to satisfy intelligence requirements, consistent with applicable law and policy” (AFM, 2006, 1-20). The subject of an interrogation is referred to as the “subject.” PROTECTIONS OF HUMAN SUBJECTS OF RESEARCH The HIG conducts its mission consistent with domestic law and United States’ obligations under international law, and the research program adheres to applicable U.S. government guidelines for scientific experimentation and the protection of human subjects in scientific research. The Federal Policy for the Protection of Human Subjects or "Common Rule" mandates that researchers abide by the principles of respect for persons, beneficence, and justice; these regulations have been adopted by federal agencies that conduct, support, or otherwise regulate human subject research. PEER REVIEW PER OMB GUIDANCE M-05-03 An earlier draft of this report was peer-reviewed in a manner consistent with the requirements of the Office of Management and Budget’s “Final Information Quality Bulletin for Peer Review” (M-05-03) issued December 16, 2004. These reviews are summarized in Appendix A. AGENCY REVIEW This report was reviewed by FBI, CIA, USD(I), DIA, USMC, and Army G2X. 2 TABLE OF CONTENTS FOREWORD ................................................................................................................ 1 LIST OF FIGURES AND TABLES ................................................................................... 4 SUMMARY ................................................................................................................. 5 CHAPTER 1: ASSESSING COOPERATION AND COUNTERING RESISTANCE ...................... 9 CHAPTER 2: INFLUENCING STRATEGIES ................................................................... 14 CHAPTER 3: INTERVIEWING METHODS ..................................................................... 24 CHAPTER 4: DETECTING TRUTH AND DECEPTION .................................................... 33 NOTES ..................................................................................................................... 46 REFERENCES ............................................................................................................ 55 APPENDIX A: SUMMARY OF PEER REVIEW PER OMB M-05-03 .............................. 90 3 LIST OF FIGURES AND TABLES FIGURE 1: THE CYLINDRICAL MODEL ........................................................................ 9 FIGURE 2: ADAPTIVE AND MALADAPTIVE INTERPERSONAL BEHAVIOR CIRCLES ..... 26 FIGURE 3: THE EVIDENCE FRAMING MATRIX .......................................................... 50 4 SUMMARY The following is a list of current interrogation practices that are supported by the science described in this report. This list is not meant to be exhaustive or static, because effective practices will change as more research is available and as the transition from research to practice is evaluated, via field validation exercises of real-world interrogations. (Note 1) It should be noted that an interrogation is a dynamic event, and expert interrogators adapt to the situation while still pursuing their goals. Prepare, plan, and support an interrogation as a multidisciplinary team. All members of the team – which may include an analyst, an interpreter, a subject matter expert, as well as one or two interrogators – receive the same training on interrogation best practices. The team members who are not directly interacting with the subject observe the interrogation and provide feedback to the interrogator, especially about interpersonal dynamics between the subject and the interrogator. Prepare for an interrogation in a manner that distinguishes hard facts from inferences. Hard facts and inferences, together with intelligence requirements, are used to set long-term and short- term objectives, infer the subject’s motivations, and predict likely responses to interrogation strategies. Create a context conducive to a productive interaction. The physical context of the room, what the interrogator wears, and the language he uses is strategically tailored so as to influence the subject to disclose information. Manage first impressions. The team hypothesizes what type of person the subject is most likely to respond to and develops a corresponding, but genuine, brand for the interrogator. The interrogator works
Recommended publications
  • SARS-Cov-2 Vaccine Breakthrough Surveillance and Case Information Resource Washington State Department of Health September 22, 2021
    SARS-CoV-2 Vaccine Breakthrough Surveillance and Case Information Resource Washington State Department of Health September 22, 2021 1 Page Break To request this document in another format, call 1-800-525-0127. Deaf or hard of hearing customers, please call 711 (Washington Relay) or email [email protected]. Publication Number 420-339 For more information or additional copies of this report: Disease Control and Health Statistics Public Health Outbreak Coordination, Information, and Surveillance 1610 NE 150th Street, MS: K17-9 Shoreline, WA 98155 Phone: 206-418-5700 (24-hour contact for local health jurisdictions only) Email: [email protected] 2 Page break SARS-CoV-2 Vaccine Breakthrough Surveillance and Case Information Resource Washington State Department of Health September 22, 2021 COVID-19 vaccines are effective and critical tools to aid in the control of this pandemic. Large- scale clinical studies found that COVID-19 vaccines prevented most people from getting COVID- 19 illness, but like most other vaccines, they are not 100 percent effective. This means some fully vaccinated people will still get infected with SARS-CoV-2. These individuals may or may not develop COVID-19 symptoms. Vaccine breakthrough occurs when someone gets infected with an organism they are fully vaccinated against. For the COVID-19 vaccine, this means someone tests positive for SARS-CoV- 2 two weeks or more after receiving the full series of an authorized COVID-19 vaccine. Since millions of people in the United States are getting vaccinated, we expect to see some breakthrough disease. Fortunately, there is evidence from research studies that the COVID-19 vaccine reduces the risk of people getting really sick and needing to go to the hospital or dying from COVID-19.
    [Show full text]
  • 80 Years of Print December 2012 Volume 81 Number 12
    December 2012 %#-7)9;4-5;6.<:;1+-+- 767D3>GD73GA8 @H7EF;93F;A@93F;A@ December 2011 Employee Wellness May 2011 September 2001 Addressing School Violence 80 Years of Print December 2012 Volume 81 Number 12 United States Department of Justice Federal Bureau of Investigation Washington, DC 20535-0001 Robert S. Mueller III Director Contributors’ opinions and statements Features should not be considered an endorsement by the FBI for any policy, program, or service. The attorney general has determined Vigilance Fatigue in Policing Personnel tasked with processing large that the publication of this periodical By Meredith Krause amounts of data, identifying risks, and is necessary in the transaction of the 3 responding to perceived threats can lose public business required by law. Use of funds for printing this periodical has focus as a result of information overload been approved by the director of the and performance-related pressure. Office of Management and Budget. The FBI Law Enforcement Bulletin Armored Car Industry Agencies have an important role in (ISSN-0014-5688) is published monthly by the Federal Bureau of Reciprocity Act and Local ensuring that armored car crew members Investigation, 935 Pennsylvania 19 carry weapons legally and as needed. Avenue, N.W., Washington, D.C. Law Enforcement 20535-0001. Periodicals postage paid By Jeffrey T. Wennar at Washington, D.C., and additional mailing offices. Postmaster: Send address changes to Editor, FBI Law Enforcement Bulletin, FBI Academy, Quantico, VA 22135. Departments Editor John E. Ott Associate Editors 1 Bulletin History 18 Leadership Spotlight Eric A. D’Orazio Linda L. Fresh Doing the “Right Thing” David W.
    [Show full text]
  • The Spies That Founded America: How the War for Independence Revolutionized American Espionage
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2020 Apr 27th, 9:00 AM - 10:00 AM The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Clackamas High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the History Commons, Political Science Commons, and the Sociology Commons Let us know how access to this document benefits ou.y Lew, Masaki, "The Spies that Founded America: How the War for Independence Revolutionized American Espionage" (2020). Young Historians Conference. 19. https://pdxscholar.library.pdx.edu/younghistorians/2020/papers/19 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Humanities Western Civilization 102 March 16, 2020 1 Continental Spy Nathan Hale, standing below the gallows, spoke to his British captors with nothing less than unequivocal patriotism: “I only regret that I have but one life to lose for my country.”1 American History idolizes Hale as a hero. His bravery as the first pioneer of American espionage willing to sacrifice his life for the growing colonial sentiment against a daunting global empire vindicates this. Yet, behind Hale’s success as an operative on
    [Show full text]
  • TCAS II) by Personnel Involved in the Implementation and Operation of TCAS II
    Preface This booklet provides the background for a better understanding of the Traffic Alert and Collision Avoidance System (TCAS II) by personnel involved in the implementation and operation of TCAS II. This booklet is an update of the TCAS II Version 7.0 manual published in 2000 by the Federal Aviation Administration (FAA). It describes changes to the CAS logic introduced by Version 7.1 and updates the information on requirements for use of TCAS II and operational experience. Version 7.1 logic changes will improve TCAS Resolution Advisory (RA) sense reversal logic in vertical chase situations. In addition all “Adjust Vertical Speed, Adjust” RAs are converted to “Level-Off, Level-Off” RAs to make it more clear that a reduction in vertical rate is required. The Minimum Operational Performance Standards (MOPS) for TCAS II Version 7.1 were approved in June 2008 and Version 7.1 units are expected to be operating by 2010-2011. Version 6.04a and 7.0 units are also expected to continue operating for the foreseeable future where authorized. 2 Preface................................................................................................................................. 2 The TCAS Solution............................................................................................................. 5 Early Collision Avoidance Systems................................................................................ 5 TCAS II Development .................................................................................................... 6 Initial
    [Show full text]
  • Steganography- a Data Hiding Technique
    International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Km. Pooja Assistant Professor Vankateshwara institute of computer Vidya College of engineering, Meerut, India Science and technology, Meerut, India ABSTRACT In steganography, the possible cover carriers are innocent looking Steganography is the art of hiding information and an effort to carriers (images, audio, video, text, or some other digitally conceal the existence of the embedded information. It serves as a representative code) which will hold the hidden information. A better way of securing message than cryptography which only message is the information hidden and may be plaintext, cipher text, conceals the content of the message not the existence of the message. images, or anything that can be embedded into a bit stream. Together Original message is being hidden within a carrier such that the the cover carrier and the embedded message create a stego-carrier. changes so occurred in the carrier are not observable. In this paper we Hiding information may require a stego key which is additional secret will discuss how digital images can be used as a carrier to hide information, such as a password, required for embedding the messages. This paper also analyses the performance of some of the information. For example, when a secret message is hidden within a steganography tools. Steganography is a useful tool that allows covert cover image, the resulting product is a stego-image. transmission of information over an over the communications A possible formula of the process may be represented as: cover channel.
    [Show full text]
  • The Pragmatics of Powerlessness in Police Interrogation
    Seattle University School of Law Digital Commons Faculty Scholarship 1-1-1993 In a Different Register: The Pragmatics of Powerlessness in Police Interrogation Janet Ainsworth Follow this and additional works at: https://digitalcommons.law.seattleu.edu/faculty Part of the Constitutional Law Commons Recommended Citation Janet Ainsworth, In a Different Register: The Pragmatics of Powerlessness in Police Interrogation, 103 YALE L.J. 259 (1993). https://digitalcommons.law.seattleu.edu/faculty/287 This Article is brought to you for free and open access by Seattle University School of Law Digital Commons. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Seattle University School of Law Digital Commons. For more information, please contact [email protected]. Articles In a Different Register: The Pragmatics of Powerlessness in Police Interrogation Janet E. Ainswortht CONTENTS I. INTRODUCTION ............................................ 260 II. How WE Do THINGS WITH WORDS .............................. 264 A. Performative Speech Acts ................................. 264 B. Indirect Speech Acts as Performatives ......................... 267 C. ConversationalImplicature Modifying Literal Meaning ............. 268 H. GENDER AND LANGUAGE USAGE: A DIFFERENT REGISTER .............. 271 A. Characteristicsof the Female Register ........................ 275 1. Hedges ........................................... 276 2. Tag Questions ...................................... 277 t Associate Professor of Law, University of Puget Sound School of Law. B.A. Brandeis University, M.A. Yale University, J.D. Harvard Law School. My appreciative thanks go to Harriet Capron and Blain Johnson for their able research assistance. I am also indebted to Melinda Branscomb, Jacqueline Charlesworth, Annette Clark, Sid DeLong, Carol Eastman, Joel Handler, Robin Lakoff, Debbie Maranville, Chris Rideout, Kellye Testy, Austin Sarat, and David Skover for their helpful comments and suggestions.
    [Show full text]
  • Interrogation Nation: Refugees and Spies in Cold War Germany Douglas Selvage / Office of the Federal Commissioner for the Stasi Records
    Interrogation Nation: Refugees and Spies in Cold War Germany Douglas Selvage / Office of the Federal Commissioner for the Stasi Records In Interrogation Nation: Refugees and Spies in Cold War Germany, historian Keith R. Allen analyzes the “overlooked story of refugee screening in West Germany” (p. xv). Building upon his previous German-language study focused on such screening at the Marienfelde Refugee Center in West Berlin (Befragung - Überprüfung - Kontrolle: die Aufnahme von DDR- Flüchtlingen in West-Berlin bis 1961, Berlin: Ch. Links, 2013), Allen examines the places, personalities, and practices of refugee screening by the three Western Powers, as well as the German federal government, in West Berlin and throughout West Germany. The topic is particularly timely since, as Allen notes, many of “the screening programs established during the darkest days of the Cold War” (p. xv) continue today, although their targets have shifted. The current political debates about foreign and domestic intelligence activities in Germany, including the issue of refugee screening, echo earlier disputes from the years of the Bonn Republic. The central questions remain: To what extent have citizenship rights and the Federal Republic’s sovereignty been compromised by foreign and domestic intelligence agencies – largely with the consent of the German government – in the name of security? BERLINER KOLLEG KALTER KRIEG | BERLIN CENTER FOR COLD WAR STUDIES 2017 Douglas Selvage Interrogation Nation Allen divides his study into three parts. In Part I, he focuses on “places” – the various sites in occupied West Berlin and western Germany where refugees were interrogated. He sifts through the alphabet soup of acronyms of US, British, French, and eventually West German civilian and military intelligence services and deciphers the cover names of the institutions and locations at which they engaged in screening activities during the Cold War and beyond.
    [Show full text]
  • Biographyelizabethbentley.Pdf
    Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 1 of 284 QUEEN RED SPY Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 2 of 284 3 of 284 6655 Olmsted / RED SPY QUEEN / sheet RED SPY QUEEN A Biography of ELIZABETH BENTLEY Kathryn S.Olmsted The University of North Carolina Press Chapel Hill and London Tseng 2003.10.24 14:06 4 of 284 © 2002 6655 Olmsted / RED SPY QUEEN / sheet The University of North Carolina Press All rights reserved Set in Charter, Champion, and Justlefthand types by Tseng Information Systems, Inc. Manufactured in the United States of America The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. Library of Congress Cataloging-in-Publication Data Olmsted, Kathryn S. Red spy queen : a biography of Elizabeth Bentley / by Kathryn S. Olmsted. p. cm. Includes bibliographical references and index. isbn 0-8078-2739-8 (cloth : alk. paper) 1. Bentley, Elizabeth. 2. Women communists—United States—Biography. 3. Communism—United States— 1917– 4. Intelligence service—Soviet Union. 5. Espionage—Soviet Union. 6. Informers—United States—Biography. I. Title. hx84.b384 o45 2002 327.1247073'092—dc21 2002002824 0605040302 54321 Tseng 2003.10.24 14:06 5 of 284 To 6655 Olmsted / RED SPY QUEEN / sheet my mother, Joane, and the memory of my father, Alvin Olmsted Tseng 2003.10.24 14:06 Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 6 of 284 7 of 284 Contents Preface ix 6655 Olmsted / RED SPY QUEEN / sheet Acknowledgments xiii Chapter 1.
    [Show full text]
  • Intel Management Model for Europe
    INTELLIGENCE MANAGEMENT MODEL FOR EUROPE PHASE ONE Guidelines for standards and best practice within the analysis function Contents Foreword 5 Acknowledgements 6 1. Executive Summary 7 Recruitment 8 Trainee Analyst - The Benefits 9 Training Programme for Police Analysts 10 Intelligence Training for Law Enforcement Personnel 10 Career Structure for Analyst Personnel 11 2. Recruitment 12 Person Specification 12 Pre-Selection 15 The Interview 15 3. Trainee Analyst - The Benefits 17 The Police Service of Northern Ireland 17 Belgian Federal Police 19 4. Training Programme for Police Analysts 20 Approach 1: The Police Service of Northern Ireland 20 Approach 2: The Belgian Federal Police 21 Approach 3: National Criminal Intelligence Service (NCIS) UK 22 5. Intelligence Training for Law Enforcement Personnel 23 Probationary Officers 23 Intelligence Officers 24 Analyst Managers 26 6. Career Structure for Analyst Personnel 28 7. Recommended References 30 3 List of Figures Figure 1: The Intelligence Cycle 7 Figure 2: Person Specification for Intelligence Analyst 14 Figure 3: PSNI Analyst Development Programme 18 Figure 4: Organisational Structure for Analysts - Strathclyde Police 28 Figure 5: Organisational Structure for Analysts - PSNI 29 4 Foreword The first tentative steps towards the development of an Intelligence Management Model for Europe were taken during early 2001. It was then that consideration was given to a proposed agenda for the forthcoming European Heads of Training Conference to be held in Scotland in June that same year. Many such conferences, in all disciplines, provide useful guidance and information to those in attendance. Often however there is little or no resultant legacy in terms of actual and tangible continuous development.
    [Show full text]
  • Behavioral Science Unit
    Behavioral Science Unit Behavioral Science Unit (BSU) was one of the original instructional components of the FBI's Training Division at Quantico, Virginia. Its mission was to develop and provide programs of training, research, and consultation in the behavioral andsocial sciences for the Federal Bureau of Investigation and law enforcement community that would improve or enhance their administration, operational effectiveness, and understanding of violent crime. The BSU was established in 1972 at the FBI Academy, and was disbanded in 2014. Through its legacy of training, research, and consultation activities, the BSU developed techniques, tactics, and procedures that have become a staple of behavioral-based programs that support the law enforcement, intelligence, and military communities. It is here where the term "serial killer" was coined and where criminal investigative analysis and "profiling" were developed. Many of these programs eventually developed into stand-alone programs, units, and centers such as the National Center for the Analysis of Violent Crime (NCAVC), Behavioral Analysis Unit (BAU), Undercover Safeguard Unit, Crisis Negotiation Unit, Hostage Rescue Team, and Employee Assistance Unit. The mission of the BSU was to be the premier unit for developing and facilitating relevant programs of training, research, and consultation in the behavioral sciences for the FBI workforce, including the law enforcement, intelligence, and military communities that will improve their effectiveness in furtherance of the strategic priorities of the FBI. This is accomplished through the creation of innovative bodies of knowledge in specialty areas and applied research on significant behavioral science issues for use in training and consultation in support of academic, program, and operational matters.
    [Show full text]
  • Open Source Intelligence (OSINT)
    ATP 2-22.9 Open-Source Intelligence July 2012 DISTRIBUTION RESTRICTION: Unlimited Distribution Headquarters, Department of the Army *ATP 2-22.9 Army Techniques Publication Headquarters No. 2-22.9 (FMI 2-22.9) Department of the Army Washington, DC, 10 July 2012 Open-Source Intelligence Contents Page PREFACE.............................................................................................................. iv INTRODUCTION .................................................................................................... v Chapter 1 OPEN-SOURCE INTELLIGENCE (OSINT) FUNDAMENTALS ........................ 1-1 Definition and Terms .......................................................................................... 1-1 Characteristics .................................................................................................... 1-1 The Intelligence Warfighting Function ................................................................ 1-2 The Intelligence Process .................................................................................... 1-3 The Planning Requirements and Assessing Collection Process ........................ 1-4 The Military Decisionmaking Process ................................................................ 1-4 Intelligence Preparation of the Battlefield ........................................................... 1-5 Chapter 2 PLANNING AND PREPARATION OF THE OSINT MISSION ............................. 2-1 Section I – Planning OSINT Activities ...........................................................
    [Show full text]
  • Understanding and Overcoming the Entrapment Defense in Undercover Operations
    1 Understanding and Overcoming the Entrapment Defense in Undercover Operations Understanding and Overcoming the Entrapment Defense in Undercover Operations Sgt. Danny Baker Fort Smith Police Department Street Crimes Unit 2 Understanding and Overcoming the Entrapment Defense in Undercover Operations Introduction: Perhaps one of the most effective, yet often misunderstood investigatory tools available to law enforcement agencies around the world is that of the undercover agent. In all other aspects of modern policing, from traffic enforcement to homicide investigation, policing technique relies heavily upon the recognition and identification of an agent as an officer of the law. Though coming under question in recent years, it has long been professed that highly visible police have a deterrent effect on crime simply by their presence. Simply stated, the belief is that a criminal intent on breaking the law will likely refrain from doing so should he or she encounter, or have a high likelihood of encountering, a uniformed police officer just moments prior to the intended crime. Such presence certainly has its benefits in a civilized society. If to no other end, the calming and peace of mind that highly visible and accessible officers provide the citizenry is invaluable. The real dilemma arises when attempting to justify and fund this police presence that crime ridden neighborhoods and communities continually demand. Particularly when the crime suppression benefits of such tactics are questionable and impossible to measure. After all, how do you quantify the number of crimes that were never committed and, if you could, how do you correlate that to simple police presence? In polar opposition to the highly visible, readily accessible, uniformed officer, we find the undercover officer.
    [Show full text]