NOTICE: Citizendium is still being set up on its newer server, treat as a beta for now; please see here for more.
Citizendium - a community developing a quality comprehensive compendium of knowledge, online and free. Click here to join and contribute—free
CZ thanks our previous donors. Donate here. Treasurer's Financial Report -- Thanks to our content contributors. --

Search results

Jump to: navigation, search

Page title matches

Page text matches

  • ===Deceptive interrogation=== {{r|We Know All interrogation techniques}}
    1 KB (127 words) - 13:36, 10 July 2009
  • {{r|Befuddled Interrogator interrogation techniques}} {{r|Emotional Hate interrogation techniques}}
    2 KB (196 words) - 20:45, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/We Know All interrogation techniques]]. Needs checking by a human. {{r|Establish Your Identity interrogation techniques}}
    819 B (101 words) - 02:37, 12 January 2010
  • {{r|Intelligence interrogation, Argentina}} {{r|Intelligence interrogation, Burma}}
    3 KB (361 words) - 15:14, 29 September 2009
  • ..., [[Establish Your Identity interrogation techniques]]), or creating false identities for one's own personnel. ...ecords, even for fairly secret opponents, begin the process: the names and identities of major commands are often well known. Against a modern opponent, [[s
    2 KB (233 words) - 21:27, 8 August 2010
  • {{r|Interrogation}} {{r|Establish Your Identity interrogation techniques}}
    381 B (44 words) - 15:42, 12 August 2009
  • {{main|Interrogation}} ...rrogation techniques''' are a subset of the broad [[futility interrogation techniques]], intended to convince a prisoner that resistance is useless, usually be
    4 KB (616 words) - 14:25, 22 April 2009
  • ...specific articles. This Catalog principally stays at the level of "name of technique", as the details may be disturbing to some readers; none of the acts descr This section catalogs the '''[[interrogation]] techniques''' that have been used in the U.S. programs under this Administration. So
    11 KB (1,609 words) - 12:39, 18 October 2013
  • ...ntity of a person, who would be in very serious difficulty if captured, an identity that the prisoner very much does not want to have. | title =Lawfulness of Interrogation Techniques under the Geneva Conventions
    4 KB (656 words) - 06:28, 23 March 2009
  • {{main|Intelligence interrogation, U.S.}} {{seealso|Intelligence interrogation, U.S., review}}
    106 KB (15,708 words) - 03:26, 3 November 2013
  • {{r|Establish Your Identity interrogation techniques}}
    2 KB (235 words) - 02:30, 12 January 2010
  • suffering arising only from, inherent in or incidental to lawful sanctions.<ref name=UNGA>{{citation ...gal process, it would not qualify as torture, but as pain and suffering incidental to a judicial sanction. The concept of "[[cruel and unusual punishment]]"
    56 KB (8,303 words) - 16:05, 4 October 2013
  • ...well before the [[George W. Bush Administration]]. Not only the methods of interrogation, but the broader area of voluntary and involuntary contacts have been ...careful and thoughtful exchange of ideas and attitudes that will help the interrogator find a path to the desired intelligence."<ref name=Nieman>{{citation
    29 KB (4,282 words) - 15:09, 12 February 2011
  • ...sary of terms and definitions </ref> Typical HUMINT activities consist of interrogations and conversations with persons having access to pertinent information ...t falls under [[intelligence collection management]]. The same or similar techniques, however, can be used for [[intelligence cycle security]], in the discipl
    66 KB (10,233 words) - 10:19, 17 October 2013
  • ...owever, could have distinctly different meanings and/or levels. Was an incident directly ordered by him, or merely financed? Was it carried out by "al-Qae ...cooperate on intra-Egyptian matters, but this approach failed with the accidental death of [[Abu Ubaydah]], his military commander who was proposing an Egy
    63 KB (9,802 words) - 12:43, 6 October 2013
  • Offensive techniques in current [[counterintelligence]] doctrine are principally directed agai :#"Counter-intelligence (contre-ingérence) means activities concerned with identifying and counteracting threats to the security of DND employees, CF member
    52 KB (8,131 words) - 06:40, 29 October 2013
  • ...itical interests in Iraq." The Division sought the Committee's advice on a technique, "which while not likely to result in total disablement would be certain t ...nd American-owned [[Iraq Petroleum Company]]'s concessionary holdings, President [[John F. Kennedy]] ordered the CIA to make preparations for a military cou
    43 KB (6,547 words) - 03:35, 3 February 2016
  • ...gence service (FIS), as part of [[human-source intelligence]]. Some of the techniques here, however, are useful in recruiting FIS assets. Its intent is not to .... In US practice, recruiting agents are called [[#access agents and Access Techniques | access agents]].
    54 KB (8,283 words) - 15:31, 12 February 2011
  • '''Clandestine HUMINT operational techniques''', also called "tradecraft", describes the set of principles and skills Many of the techniques here are important in [[counterintelligence]]. Defensive counterintellige
    55 KB (8,423 words) - 11:55, 19 October 2013
  • ...of the most notable works of the [[dictator novel]] genre, ''El Señor Presidente'' developed from an earlier Asturias short story, written to protest socia Although ''El Señor Presidente'' does not explicitly identify its setting as early twentieth-century Guatemala, the novel's title char
    53 KB (8,491 words) - 16:36, 8 June 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)