30:
questioning of a subject in a neutral public place where people innocuously gather, with the intention of the unsuspecting subject not comprehending that the interrogation is occurring. The covert interrogator may present themselves toward an interrogation subject in a friendly manner, while
74:
of a subject's mobile phone and records is a type of covert interrogation. This pertains to other devices, such as computers, and modes of communication, such as telephone records.
58:
also refers to interrogation techniques that may be overt in manner, but are hidden from public, media, governmental, and other types of third-party
428:
407:
386:
365:
334:
307:
280:
253:
226:
189:
87:
The United States government has engaged in the covert interrogation, surveillance and deportation of terrorism suspects.
302:. Historical Dictionaries of Intelligence and CounterIntelligence. Rowman & Littlefield Publishers. p. xxii.
132:
47:, such as criminals and terrorists. Many additional types and techniques of covert interrogation and
51:
exist, and covert interrogation can occur for other various reasons, and by other types of actors.
447:
156:
297:
418:
376:
355:
243:
397:
324:
270:
216:
113:
40:
71:
8:
159: – Evaluation of sensitive state, military, commercial, or scientific information
424:
403:
382:
361:
330:
303:
276:
249:
222:
107:
32:
441:
118:
23:
48:
31:
concealing the ulterior motive of subtly questioning them. In this manner,
399:
Sousveillance, Media and
Strategic Political Communication: Iraq, USA, UK
138:
124:
90:
59:
135: – Euphemism for program of systematic torture by U.S. government
162:
150:
221:. Critical Human Rights. University of Wisconsin Press. p. 86.
190:"Congressional Record: Proceedings and Debates of the ... Congress"
36:
218:
Torture and
Impunity: The U.S. Doctrine of Coercive Interrogation
144:
44:
245:
Managing
Intelligence: A Guide for Law Enforcement Professionals
27:
110: – Person who incites others to commit incriminating acts
93:
covert interrogation facilities created and maintained by the
167:
420:
Sound
Targets: American Soldiers and Music in the Iraq War
94:
289:
170:(laser radar) – offers potential for covert surveillance
353:
196:. U.S. Government Printing Office. 1968. p. 12986
381:. GofS research paper series. Maklu. p. 189.
378:EU and International Crime Control: Topical Issues
374:
235:
439:
354:Newburn, T.; Williamson, T.; Wright, A. (2012).
316:
262:
147: – Falsely prove someone guilty of a crime
299:Historical Dictionary of Intelligence Failures
295:
329:. Press Monographs. SPIE Press. p. 70.
375:Cools, M.; Easton, M.; Pauwels, L. (2010).
121: – Highly classified military project
423:. Indiana University Press. p. 202.
416:
241:
153: – Person who provides information
70:When the subject is unaware of it, the
440:
322:
395:
360:. Taylor & Francis. p. 127.
268:
248:. Taylor & Francis. p. 374.
214:
208:
127: – Clandestine detention center
13:
357:Handbook of Criminal Investigation
347:
182:
14:
459:
133:Enhanced interrogation techniques
82:
275:. Edinburgh University Press.
26:techniques. An example is the
1:
296:Trenear-Harvey, G.S. (2014).
175:
77:
7:
100:
10:
464:
402:. Bloomsbury. p. 83.
272:Contemporary Action Cinema
65:
16:Interrogation Techniques
157:Intelligence assessment
62:, for various reasons.
417:Pieslak, J.R. (2009).
141: – Legal doctrine
326:Smart Imaging Systems
39:agencies can collect
22:can refer to several
242:Buckley, J. (2013).
215:McCoy, A.W. (2012).
72:forensic examination
56:covert interrogation
20:Covert interrogation
323:Javidi, B. (2001).
194:Volume 114, Part 10
396:Bakir, V. (2010).
269:Purse, L. (2011).
430:978-0-253-35323-8
409:978-0-8264-3009-0
388:978-90-466-0328-4
367:978-1-136-30823-9
336:978-0-8194-3735-8
309:978-1-4422-3274-7
282:978-0-7486-8840-1
255:978-1-4665-8642-0
228:978-0-299-28853-2
108:Agent provocateur
455:
434:
413:
392:
371:
341:
340:
320:
314:
313:
293:
287:
286:
266:
260:
259:
239:
233:
232:
212:
206:
205:
203:
201:
186:
463:
462:
458:
457:
456:
454:
453:
452:
438:
437:
431:
410:
389:
368:
350:
348:Further reading
345:
344:
337:
321:
317:
310:
294:
290:
283:
267:
263:
256:
240:
236:
229:
213:
209:
199:
197:
188:
187:
183:
178:
173:
103:
85:
80:
68:
33:law enforcement
17:
12:
11:
5:
461:
451:
450:
448:Interrogations
436:
435:
429:
414:
408:
393:
387:
372:
366:
349:
346:
343:
342:
335:
315:
308:
288:
281:
261:
254:
234:
227:
207:
180:
179:
177:
174:
172:
171:
165:
160:
154:
148:
142:
136:
130:
129:
128:
116:
111:
104:
102:
99:
97:have existed.
84:
81:
79:
76:
67:
64:
43:about various
15:
9:
6:
4:
3:
2:
460:
449:
446:
445:
443:
432:
426:
422:
421:
415:
411:
405:
401:
400:
394:
390:
384:
380:
379:
373:
369:
363:
359:
358:
352:
351:
338:
332:
328:
327:
319:
311:
305:
301:
300:
292:
284:
278:
274:
273:
265:
257:
251:
247:
246:
238:
230:
224:
220:
219:
211:
195:
191:
185:
181:
169:
166:
164:
161:
158:
155:
152:
149:
146:
143:
140:
137:
134:
131:
126:
123:
122:
120:
119:Black project
117:
115:
112:
109:
106:
105:
98:
96:
92:
88:
83:United States
75:
73:
63:
61:
57:
52:
50:
46:
42:
38:
34:
29:
25:
24:interrogation
21:
419:
398:
377:
356:
325:
318:
298:
291:
271:
264:
244:
237:
217:
210:
198:. Retrieved
193:
184:
89:
86:
69:
55:
53:
49:surveillance
41:intelligence
19:
18:
176:References
139:Entrapment
125:Black site
91:Black site
78:By country
163:Labor spy
151:Informant
60:oversight
54:The term
442:Category
200:26 March
101:See also
45:suspects
37:military
145:Frameup
114:Baiting
66:Devices
427:
406:
385:
364:
333:
306:
279:
252:
225:
28:covert
168:Lidar
425:ISBN
404:ISBN
383:ISBN
362:ISBN
331:ISBN
304:ISBN
277:ISBN
250:ISBN
223:ISBN
202:2015
35:and
95:CIA
444::
192:.
433:.
412:.
391:.
370:.
339:.
312:.
285:.
258:.
231:.
204:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.