Back to Search Start Over

Source Handler telephone interactions with covert human intelligence sources: An exploration of question types and intelligence yield

Authors :
Rebecca Milne
Jordan Nunan
Dave Walsh
Ian Stanier
Andrea Shawyer
Source :
Nunan, J H, Stanier, I, Milne, B, Shawyer, A & Walsh, D 2020, ' Source handler telephone interactions with covert human intelligence sources: an exploration of question types and intelligence yield ', Applied Cognitive Psychology, vol. 34, no. 6, 0, pp. 1473-1484 . https://doi.org/10.1002/acp.3726
Publisher :
Wiley

Abstract

Law Enforcement Agencies gather intelligence in order to prevent criminal activity and pursue criminals. In the context of human intelligence collection, intelligence elicitation relies heavily upon the deployment of appropriate evidence-based interviewing techniques (a topic rarely covered in the extant research literature). The present research gained unprecedented access to audio recorded telephone interactions (N = 105) between Source Handlers and Covert Human Intelligence Sources (CHIS) from England and Wales. The research explored the mean use of various question types per interaction and across all questions asked in the sample, as well as comparing the intelligence yield for appropriate and inappropriate questions. Source Handlers were found to utilise vastly more appropriate questions than inappropriate questions, though they rarely used open-ended questions. Across the total interactions, appropriate questions (by far) were associated with the gathering of much of the total intelligence yield. Implications for practice are discussed.

Details

Language :
English
ISSN :
10990720
Database :
OpenAIRE
Journal :
Nunan, J H, Stanier, I, Milne, B, Shawyer, A & Walsh, D 2020, ' Source handler telephone interactions with covert human intelligence sources: an exploration of question types and intelligence yield ', Applied Cognitive Psychology, vol. 34, no. 6, 0, pp. 1473-1484 . https://doi.org/10.1002/acp.3726
Accession number :
edsair.doi.dedup.....bb2f28669e7d64a05f28e504719caa1c
Full Text :
https://doi.org/10.1002/acp.3726