Academia.eduAcademia.edu

Eliciting information from small cells of sources

In past research, the Scharff technique has consistently outperformed different comparison techniques with respect to the elicitation of human intelligence. This study extends previous work by examining the efficacy of the Scharff technique applied to small cells of sources. The sources worked in triads (N = 180), and were given information about a planned terrorist attack. They were then interviewed individually with either the Scharff technique (conceptualised as five tactics) or the Direct Approach (open and direct questions). The two techniques resulted in an equal amount of new information. As predicted, the sources in the Scharff condition underestimated, whereas the sources in the Direct Approach condition overestimated, their own contribution of new information. Furthermore, the Scharff tactics resulted in the sources overestimating the amount of information revealed by their fellow group members, whereas this was not the case in the Direct Approach. The paper advances the knowledge on elicitation techniques on several accounts: with respect to the context (focusing on small cells of sources), measures of efficacy (introducing a new dependent measure) and tactics (introducing novel context-dependent tactics). The outcome of the study marks the Scharff technique as a promising technique for eliciting information in intelligence settings.

Journal of Policing, Intelligence and Counter Terrorism ISSN: 1833-5330 (Print) 2159-5364 (Online) Journal homepage: http://www.tandfonline.com/loi/rpic20 Eliciting information from small cells of sources Pär Anders Granhag, Simon Oleszkiewicz & Steven Kleinman To cite this article: Pär Anders Granhag, Simon Oleszkiewicz & Steven Kleinman (2016) Eliciting information from small cells of sources, Journal of Policing, Intelligence and Counter Terrorism, 11:2, 143-162, DOI: 10.1080/18335330.2016.1215507 To link to this article: http://dx.doi.org/10.1080/18335330.2016.1215507 Published online: 16 Oct 2016. Submit your article to this journal Article views: 26 View related articles View Crossmark data Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=rpic20 Download by: [T&F Internal Users], [Arlene Krimmel] Date: 25 October 2016, At: 12:27 JOURNAL OF POLICING, INTELLIGENCE AND COUNTER TERRORISM, 2016 VOL. 11, NO. 2, 143–162 http://dx.doi.org/10.1080/18335330.2016.1215507 Eliciting information from small cells of sources Pär Anders Granhaga,b,c, Simon Oleszkiewicza and Steven Kleinmand a Department of Psychology, University of Gothenburg, Gothenburg, Sweden; bNorwegian Police University College, Oslo, Norway; cDepartment of Psychology, University of Oslo, Oslo, Norway; dOperational Sciences International, Monterey, CA, USA ABSTRACT ARTICLE HISTORY In past research, the Scharff technique has consistently outperformed different comparison techniques with respect to the elicitation of human intelligence. This study extends previous work by examining the efficacy of the Scharff technique applied to small cells of sources. The sources worked in triads (N = 180), and were given information about a planned terrorist attack. They were then interviewed individually with either the Scharff technique (conceptualised as five tactics) or the Direct Approach (open and direct questions). The two techniques resulted in an equal amount of new information. As predicted, the sources in the Scharff condition underestimated, whereas the sources in the Direct Approach condition overestimated, their own contribution of new information. Furthermore, the Scharff tactics resulted in the sources overestimating the amount of information revealed by their fellow group members, whereas this was not the case in the Direct Approach. The paper advances the knowledge on elicitation techniques on several accounts: with respect to the context (focusing on small cells of sources), measures of efficacy (introducing a new dependent measure) and tactics (introducing novel context-dependent tactics). The outcome of the study marks the Scharff technique as a promising technique for eliciting information in intelligence settings. Received 14 October 2015 Accepted 9 March 2016 KEYWORDS The Scharff technique; Cells of sources; information elicitation; Human intelligence gathering Researchers have only recently started to map the efficacy of interview techniques aimed for collecting human intelligence (HUMINT) (e.g. Evans et al., 2013; Granhag, Cancino Montecinos, & Oleszkiewicz, 2015). This new line has thus far focused exclusively on how to interview individual sources. However, many criminal activities (including terrorist attacks) are often planned and executed by groups (Carrington, 2002; Gill, Jeongyoon, Rethemeyer, Horgan, & Asal, 2014). Hence, the aim of the current study was to examine the comparative effectiveness of intelligence gathering techniques applied to small groups of sources. HUMINT gathering is about the collection of information through the interaction between two or more individuals (Justice, Bhatt, Brandon, & Kleinman, 2010). One specific form of information gathering is information elicitation, where the goal is to collect information in such a manner that the source (a) underestimates his or her own contribution of CONTACT Simon Oleszkiewicz [email protected] burg, P.O. Box 500, Gothenburg 405 30, Sweden © 2016 Department of Security Studies and Criminology Department of Psychology, University of Gothen- 144 P. A. GRANHAG ET AL. new information and (b) remains unaware of the interviewer’s information objectives (Oleszkiewicz, Granhag, & Kleinman, 2014). The Scharff technique Hanns Joachim Scharff (1907–1992) was a very successful interrogator working for the German Luftwaffe during the Second World War (Toliver, 1997). By observing the interrogations conducted at the Luftwaffe’s Intelligence and Evaluation Centre, Auswertestelle West, he discovered that the prisoners (American and British fighter pilots) adopted various strategies to resist the conventional interrogation techniques (Scharff, 1950; Toliver, 1997). Scharff identified three specific counter-interrogation strategies frequently employed by the prisoners; (i) ‘I will not say very much’; (ii) ‘I will try to figure out what they are after, and not provide this information’ and (iii) ‘I will only provide already known information’ (for recent empirical support of the frequent use of these counter-interrogation strategies in modern times, see Alison et al., 2014). In response, Scharff carefully tailored his own elicitation tactics to circumvent these counter-interrogations strategies. The Scharff technique is strongly tied to the psychological concept perspective taking, defined as the cognitive capacity to consider the world from another’s viewpoint, this facilitates the anticipation of other people’s behaviour and reactions (e.g. Galinsky, Maddux, Gilin, & White, 2008). The importance of perspective taking can be understood by introducing a set of interrelated principles: (a) a source typically forms a hypothesis on what and how much information the interviewer already holds, (b) the source’s perception (of the information already held by the interviewer) will affect his or her counterinterrogation strategies and (c) the counter-interrogation strategies employed will affect what and how much information the source will reveal (for empirical support of this model, see Granhag & Hartwig, 2015; Tekin et al., 2015). We argue that this causal model is at the very core of the Scharff technique. The first conceptualisation of the Scharff technique was presented by Granhag (2010), who identified five different tactics: (1) A friendly approach, creating an atmosphere in which the source feels relaxed and comfortable. In essence, the Scharff technique promotes egalitarian conversations in contrast to emphasising authority over the source. (2) Not to press for information, instead of being asked explicit questions, the source is offered opportunities to add information and to respond to claims. (3) The illusion of knowing-it-all, the interaction is opened by the interviewer presenting the already known information to the source. (4) Confirmations/disconfirmations, the interviewer presents claims that s/he wants to have confirmed or disconfirmed. For example, if there exists information pointing in two different directions (e.g. an attack will happen either in Sydney or in Melbourne) the interviewer can present one alternative as a claim for the source to confirm/disconfirm. (5) Ignore new information, when provided with previously unknown information, the interviewer downplays it as unimportant or already known, hiding the fact that the information is of interest. The direct approach In an effort to try to end the use of so-called enhanced interrogations techniques in the US military and intelligence community, the US Army Field Manual (FM 2–22.3, 2006) was JOURNAL OF POLICING, INTELLIGENCE AND COUNTER TERRORISM 145 formally established as the standard for conducting intelligence interviews (Executive Order 13491, January 2009). This manual prescribes that the source should be approached with open-ended and explicit questions posed in a business-like manner (‘Direct Approach’). Only if the source refuses to answer, or if the answers are perceived as untruthful, the interviewer is advised to adopt an alternative approach. The Direct Approach is one of the most commonly used techniques by interrogators in the U.S.A (Redlich, Kelly, & Miller, 2011). Furthermore, without providing any empirical support, the US Army Field Manual (2006) states that 90% or more of the sources cooperate in response to the Direct Approach. For the current study, the Direct Approach is compared against the Scharff technique. Previous studies on the efficacy of HUMINT gathering techniques Until very recently, legal-psychology research was silent with respect to interview techniques for gathering HUMINT (Evans et al., 2014; Justice et al., 2010). However, the development during the last few years has been positive, and the number of studies within this new strand of research is now approaching a critical mass (e.g. Granhag, Vrij, & Meissner, 2014). To examine the comparative effectiveness of information elicitation techniques, Granhag, Cancino Montecinos, et al. (2015) introduced an experimental scenario mirroring some key aspects of HUMINT interactions. The scenario focused on semi-cooperative sources possessing incomplete information about an impending terrorist attack. The sources were motivated to share some portions of the information held, but not willing to reveal it in full. Furthermore, mapping the efficacy of elicitation techniques required the development of a set of novel measures. These new measures captured both the objective outcomes of the actual interview, as well as the sources’ subjective perceptions of the interaction (see Oleszkiewicz, Granhag, & Cancino Montecinos, 2014). There is now a series of empirical studies for which the Scharff technique has been compared against the Direct Approach, and four consistent findings can be identified. First, the Scharff technique elicits more new information compared to the Direct Approach (e.g. Oleszkiewicz, Granhag, & Cancino Montecinos, 2014; Oleszkiewicz, Granhag, & Kleinman, 2014). Second, the Scharff technique is better at masking the interviewer’s information objectives (e.g. Granhag, Oleszkiewicz, Strömwall, & Kleinman, 2015; May, Granhag, & Oleszkiewicz, 2014; Oleszkiewicz et al., 2014). Third, sources who have faced the Scharff technique consistently underestimate how much new information they have revealed, whereas sources who have faced the Direct Approach overestimate how much new information they have revealed (e.g. May et al., 2014; Oleszkiewicz et al., 2014). Fourth, the sources faced with the Scharff technique (vs. the Direct Approach) believe the interviewer to have held more information prior to the interview (e.g. Oleszkiewicz, Granhag, & Cancino Montecinos, 2014; Oleszkiewicz, Granhag, & Kleinman, 2014). Importantly, these findings also hold for sources with different levels of cooperation and different levels of capability to provide information (Granhag, Oleszkiewicz, et al. 2015). The present study The present study advances previous work on the Scharff technique on several accounts. First, it examines the efficacy of the technique in a new context: when applied to small cells 146 P. A. GRANHAG ET AL. of sources. Second, to examine elicitation techniques for small groups, a new dependent measure of efficacy is introduced: the extent to which the individual source over/underestimates the amount of information revealed by the other members in the group. Third, interviewing individual sources who are all members of the same group leaves room for a novel tactic: to use the information elicited from an already interviewed source when interviewing the source next in line. Hence, the current study advances research on elicitation techniques in terms of (a) the context, (b) measures of efficacy and (c) the tactics. The efficacy of the Scharff technique draws on a source’s competing goals to be perceived as willing to cooperate, while simultaneously trying to minimise his or her contribution. If the interviewer presents already known information at the outset of the interview (i.e. with the aim of establishing the illusion of ‘knowing-it-all’), the source cannot simply repeat the information told by the interviewer. In order to be perceived as minimally cooperative, the source must go beyond the interviewer’s story. Hence, the source will provide information that is new to the interviewer. Research has shown that for modern insider spies, the incentive to talk is commonly tied to divided loyalties and less often to financial incentives (Herbig, 2008). Furthermore, it has been argued that by influencing sources to challenge their own beliefs, the interviewer can add to a source’s already existing internal conflict in (Alison, Giles, & McGuire, 2015). In line with this research, a further aim for the current study was to make all sources believe that their fellow cell members had already revealed information. A source who is convinced that his or her group members have revealed information might go in different directions. One direction is relaxing his or her counterinterrogation strategies, shifting from primarily withholding information to being more forthcoming (‘If they talk, I might as well’). Another direction is to stay even closer to an already adopted counter-interrogation strategy (e.g. ‘I will only tell already known information’). A third possibility is that the source is minimally (or not at all) affected by his or her belief about the others’ behaviour (‘They may talk, but I will not’). In brief, both the first and the second direction might aid the interviewer (i.e. resulting in the collection of new information). To inflate the individual source’s estimate of how much information the other group members had revealed, three tactics were used: (1) convincing the source that s/he was the last in line to be interviewed, (2) offering ‘proof’ that the others had indeed talked (by telling a detailed story in order to establish the illusion of ‘knowing it all’) and (3) continuously update the story used for painting the illusion of ‘knowing it all’. That is, the story presented to the source interviewed second in line consisted of (a) the information that the interviewer held from before, plus (b) the new information gathered from the source interviewed first in line. Consequently, the story presented to the source interviewed last in line consisted of (a) the information that the interviewer held from before, plus (b) the new information gathered from the two sources already interviewed. This continuous update was intended to reflect parts of the interplay that takes place between an interviewer and an analyst. We had five hypotheses: Hypothesis 1: The Scharff protocol was expected to result in more new information than the Direct Approach protocol. JOURNAL OF POLICING, INTELLIGENCE AND COUNTER TERRORISM 147 Hypothesis 2: The sources faced with the Scharff protocol were expected to perceive the interviewer as having relatively more information prior to the interview. Hypothesis 3: The sources interviewed with the Scharff protocol were expected to have a relatively less clear understanding of what information the interviewer was after. Hypothesis 4: An interaction effect was predicted between the interview protocols and the objective and subjective amount of new information revealed. Specifically, we predicted the sources interviewed with the Scharff protocol would perceive they had revealed less new information than they objectively revealed, whereas the sources interviewed with the Direct Approach would perceive they had revealed more new information than they objectively revealed. Hypothesis 5: We predicted the sources in the Scharff condition would estimate their fellow cell members to have revealed more information compared to the estimates given by the sources in the Direct Approach condition (5a). Furthermore, we predicted that the sources interviewed with the Scharff protocol would perceive their fellow cell members to have revealed more information than they objectively revealed, whereas the sources interviewed with the Direct Approach would perceive their fellow cell members to have revealed less information than they objectively revealed (5b). The rationale behind this prediction was that, although the interviewer in both interview conditions aimed to convince each source that s/he was the last in the group to be interviewed, it was only for the Scharff condition that the sources received ‘proof’ that their fellow group members had revealed information (i.e. the interviewer presented a story attempting to paint the illusion of ‘knowing it all’). Method Participants One hundred and eighty adults (77 men and 103 women) between 18 and 70 years of age (M = 27.3, SD = 9.2) were randomly allocated to groups of three for the two interview conditions: 30 cells in the Scharff condition and 30 cells in the Direct Approach. The participants were recruited by posters placed at the University’s libraries and departments. The posters described the study as research on ‘interviewing methods’. Each participant was paid an amount equivalent to €16 (approx. $21). The experiment was granted approval by both the Ethical Review Board of the University of Gothenburg (Sweden) and the FBI Institutional Review Board (Washington DC). After the experiment, all participants were fully debriefed. Five participants misunderstood the instructions. They were excluded, along with their cell members, resulting in the exclusion of 15 participants in total (five cells). These 15 participants were not included in the total sample of N = 180. Procedure Part 1: background and planning All sources received identical instructions explaining that they had to take on the role as a source possessing incomplete information about an upcoming terrorist attack. They were presented with a sheet of paper containing both general and specific information about an extremist group that was planning a bombing at a shopping mall. The information was given in the form of a coherent story that was built up by a total of 39 separate pieces of information. Of those 39 pieces, 14 pieces were already known to the interviewer 148 P. A. GRANHAG ET AL. and the remaining 25 pieces were unknown to the interviewer. The sources received no information on how many or which pieces of information the interviewer already held. The sources were told that the study would take between one and two hours. Planning in groups: Each cell of sources was taken to a room and asked to sit down at a table facing each other. The sources received a randomly distributed name tag (John/ Johanna; Kris/Kristine; Fredrik/Frida). They were told that this would be their names throughout the experiment in order to assure their anonymity (the names were also used as codes for the interview order: J = first, K = second, F = third). In front of each source was a paper with identical instructions. The sources were instructed to individually read the paper carefully and to follow the instructions. The instructions told that each source strived to become a full member of a left-wing terrorist group. To achieve this goal, the sources were instructed to help each other memorise the information about the group’s upcoming attack. They were also told that they were (i) not allowed to discuss their own specific instructions with the other group members and (ii) not allowed to share any personal information during the study. Importantly, although all sources received identical instructions, they did not know the exact instructions given to the other group members. To aid in memorising the information a ‘questions box’ was placed in the room. This box held 15 questions about the upcoming attack written on single note cards (e.g. ‘At what exact time will the bomb be placed in the shopping mall?’). The sources were instructed to share the notes evenly amongst each other and repeatedly question one another on these notes until all members knew all answers. The group was instructed that all group members had to fluently know all 15 answers before they were allowed to enter the next phase of the study. The sources were given 20 minutes to read the instructions and memorise the material. Separation of the sources: After memorising the material, the sources were separated and placed alone in a small room with only a piece of paper and a lap-top in front of them. This paper asked the sources to imagine they were being held in custody and suspected of being involved in planning a terrorist activity. They were further informed that the interviewer would call them (via Skype) and question them on the planned terrorist act. We used phone interviews so that the interviewer could read the interview protocols word by word (more information on this in ‘the analysts’ paragraph below). Importantly, phone conversations and face-to-face interviews have not proven to produce different outcomes (Oleszkiewicz, 2016). All sources approved being audio recorded. They were asked to wait patiently since it could take a while before the interviewer would call them (no time frame was provided). In addition, each source was informed that s/he needed to consider a dilemma (successfully used in previous studies, e.g. Oleszkiewicz et al., 2014) which involved striking a balance between (a) not providing too little information in the upcoming interview (in order to be released from custody without being prosecuted) and (b) not providing too much information (as the source had a negative attitude towards the police in general and sympathised with the terrorist group). The sources were told that their compensation could end up somewhere between $17 and $34 depending on their success in striking this balance (all sources received $21). Furthermore, the sources were given the opportunity to lie during the interview. They were informed that a successful lie would contribute positively to their being perceived as willing sources. However, they were also warned that if they were caught lying, they would put JOURNAL OF POLICING, INTELLIGENCE AND COUNTER TERRORISM 149 their compensation at risk. The sources had all background information present during the interview. Part 2: the interview All interviews (for both conditions) started with the interviewer greeting the source in a business-like manner and explaining that s/he was taping the conversation. The interviews lasted on average 6.25 minutes (SD = 2.36; range: 2.27–14.31 minutes). The Direct Approach interviews (M = 4.52, SD = 1.46) were significantly shorter than the Scharff interviews (M = 8.34, SD = 2.17), t(178) = −14.07, p < .001, d = −2.10, 95% CI [−2.46, −1.73]. The difference in length was mainly due to the time needed to build the illusion of knowing-itall. Interview conditions: After the short formal greeting phase, the interviewer addressed the source by his or her temporary name and expressed understanding for the source’s situation: First I would like to point out that I understand that you are in a difficult situation. At the same time, you probably understand that we cannot allow this attack to be carried out. I would also like to make it clear that I have already talked to ‘source A’ and ‘source B’, who I know that you have met. From there on, the two interview conditions differed. For the Scharff protocol, the interviewer explained that s/he would share the information held with the source by saying: ‘so, in order to make this conversation more efficient I will start by telling you some of the information we already have’. For the Direct Approach protocol, the interviewer explained that s/he could not share the information held with the sources by saying: ‘However, as you surely understand, I am not allowed to share the information that we already hold, but I have a few questions I would like you to answer’. The Scharff interview: The Scharff protocol went on with the interviewer trying to create the illusion of knowing-it-all while maintaining a friendly approach. The interviewer told a story containing all the information that s/he already knew about the extremist group and the upcoming attack. Next, the interviewer said, ‘Now, I am sure you understand that we already hold all information that is of direct value, but you are of course welcome to share what you know’. After the source had finished talking, the interviewer implemented the confirmation/disconfirmation tactic by stating two claims that contained correct information. Each claim was followed by a three-second window, leaving room for the participant to comment. Independent of the source’s reaction to a claim (or lack thereof), the interviewer immediately went on presenting the next claim (more on the confirmation/ disconfirmation tactic below). Finally, after the second claim had been presented, the interviewer said ‘Well, there are some scary things going on here, but as you understand we have a pretty good picture of the situation. Would you like to add something before we end this?’ After awaiting the source’s answer, the interview was closed. Importantly, besides using a friendly approach and the illusion of knowing-it-all tactic, the interviewer did not at any time press for information and did not display unfamiliarity with or surprise at any information collected. The story for painting the illusion of knowing-it-all: For the Scharff condition, the sources interviewed first in the cell were faced with a story that contained all information that was known to the interviewer prior to interviewing the first source in the cell (this information 150 P. A. GRANHAG ET AL. concerned mostly details about the terrorist group and their previous activities, see Oleszkiewicz et al., 2014). The second and third sources in the cell were faced with an ‘updated story’. Specifically, the first source was faced with a story consisting of the 14 pieces of already known information. The second source was faced with a story consisting of the 14 pieces of already known information plus the new information provided by the first source. The third source was faced with a story consisting of the 14 pieces of already known information plus the new information provided by the source interviewed first and the source interviewed second. The Direct Approach interview: After the initial introductory phase, the Direct Approach protocol continued with a general invitation, ‘Okay, so you can start by telling me what you know about the situation!’ For this protocol, the interviewer did to not reveal what information was held on the terrorist attack and maintained an atmosphere similar to that of a business meeting. Next, the interviewer asked two direct questions. If the source did not answer a direct question, or did not provide the full answer, the question was repeated once. Hence, a source could be faced with as many as four direct questions (each of the two questions asked two times). The interviewers were trained to ask the two direct questions in a business-like manner and, if the complete answer was not provided, repeat the question with a firmer tone of voice (more on this below). When the direct questions had been posed, the interviewer said, ‘Well, there are some scary things going on here, but we are trying to get a better picture of the situation. Would you like to add something before we end this?’ Finally, the interview was closed. The very same Direct Approach protocol was used for all sources within each cell. Confirmations and direct questions: The information that the interviewer aimed to collect by presenting claims (Scharff technique) or asking direct questions (Direct Approach) concerned eight different information themes: (1) the location of the attack; (2) the date of the attack; (3) what time the bomb would be triggered; (4) how the bomb would be delivered; (5) when the bomb would be delivered; (6) how the bomb would be triggered; (7) where the bomb would be planted and (8) the expertise in the group. The order of the claims/direct questions was the following: The first theme [the location] and second theme [the date] were always used for the source interviewed first in the cell. For the sources that were interviewed second and third, the information themes asked for were dependent on the information that had been provided in the prior interview(s). If the answer to a theme (e.g. the date of the attack) was not provided by the previously interviewed source, then that claim/direct question was also posed to the next source. Importantly, all sources were only presented with two claims/direct questions. Thus, if a claim/direct question was not answered by a previous source that claim/direct question would be one of the two questions presented to the source in the cell interviewed next. Furthermore, if the information on an additional theme was provided by the source (e.g. the source revealed how the bomb would be delivered [theme 4] during an open-ended question), then that theme was considered to be answered and would not be asked for in the next interview. The interviewers: Two men and four women were recruited and trained as interviewers. The major aim of the training was to ensure that (i) the protocols were read fluently and (ii) the sources would be given enough room to answer. A further goal was to make sure that the interviewers agreed not to improvise during the interviews. The interviewers were examined through repeated pre-study rehearsals to make sure that they were consistent in their intonations when reading the scripts. In sum, the interviewers were instructed to JOURNAL OF POLICING, INTELLIGENCE AND COUNTER TERRORISM 151 strictly follow the interview protocols and were not allowed to go beyond what was stated in the protocols. An analysis of the interview transcripts showed that none did. The interviewers each conducted as many Scharff interviews as Direct Approach interviews. The analysts: In order to make proper use of the information provided within each cell, the interviewers worked together with an analyst (the interviewers were also trained as analysts). The analyst’s job was to listen to the live interviews and to use a checklist to tick off the information revealed by the source. That checklist was then coded in Qualtrics (Qualtrics software, Version 2013, http://www.qualtrics.com) which provided the analyst with an output. For the next interview, the analyst provided the interviewer with the two claims/direct questions to be posed for that specific interview. For the Scharff condition, the interviewer also received an updated story to paint the illusion of knowingit-all. This protocol consisted of the information the interviewer had access to prior to interviewing the first source plus the information revealed by the source(s) interviewed in the cell. Furthermore, this updated story also included fabricated information, if such information was provided by the source. Importantly, all interview protocols were standardised (e.g. if the first source revealed information unit A, then this piece of information was added to the interview protocol used for the second source). The analysts’ training constituted of supervised examinations by listening and coding interviews from prior studies examining the Scharff technique. Part 3: post-interview questionnaire After the interviews, the sources filled out four questionnaires on a computer (Qualtrics software, Version 2013). Before filling them out, it was made clear that the role-taking part of the study was over and that the questionnaires should be answered truthfully. The first questionnaire concerned the perceptions of the interview: rated on a 7-point rating scale. The first crucial question related to the perception of the interviewer’s information objectives (How easy/difficult was it for you to understand what information the interviewer was seeking to obtain?) used a scale that ranged from 1 (Very difficult to understand) to 7 (Very easy to understand). In addition, the sources were asked to rate how motivated they were during the interview (1 = not at all motivated, 7 = very motivated). The second questionnaire consisted of a checklist with all information that was available to the source (39 units). The sources were instructed to mark the specific pieces of information they believed they had revealed during the interview. The third questionnaire contained the same checklist (39 units), but now the sources were asked to mark the specific pieces of information that they believed was known to the interviewer prior to the interview. The final questionnaire contained the same checklist (39 units), but focused on the pieces of information the sources believed the other members of the same cell had revealed. Coding of the interviews Each interview was transcribed verbatim and each transcript was then coded in terms of how much information the source revealed (range: 0–39 units). Importantly, each distinct piece of ‘new’ information revealed by the source was identified. The relevance of the pieces of information (in terms of being ‘new’ or ‘old’) was determined by the interviewer’s knowledge. That is, a piece of information was scored as ‘new’ if it was not known to the interviewer prior to the interview. Thus, for the source interviewed first in the cell, the 152 P. A. GRANHAG ET AL. number of new pieces possible to reveal ranged from 0 to 25. The new information revealed by a source was then added to the knowledge of the interviewer. Thus, for the sources interviewed in second and third orders, the number of new pieces of information that was possible to reveal depended on how much new information the previously interviewed sources had revealed. Moreover, to arrive at a proper score with respect to how much new information each individual source believed to have revealed during the interview (i.e. information not previously known by the interviewer), we used as starting point all the information that the source told that s/he revealed during the interview (as marked in the post-interview questionnaire), and then subtracted (a) the information the source believed the interviewer to already have held and (b) the information that the source believed the other sources to have revealed. The information revealed as a result of presenting claims was scored and counted only if the participant clearly affirmed a confirmation (e.g. ‘yes’, ‘true’). Ambiguous responses were not scored (e.g. ‘hmm’). If the source – after listening to a claim – reacted with silence, this was not scored. In addition, we scored the number of lies (explicit fabrications) and ‘incorrect units’ told by the source. Inter-rater reliability One assistant coded all the transcribed interviews, while another assistant coded 30% of the transcripts (selected from the two interview conditions). Based on these, 30% interrater reliability was calculated for the total amount of information revealed (Cohen’s κ = 0.86). The disagreements were settled in a discussion between the coders after that kappa had been calculated. For the remaining 70% of the material, the primary coder’s scores were used (this procedure was repeated for discriminating explicit fabrications from memory errors, Cohen’s κ = .99). Results All dependent variables were initially analysed by the use of Hierarchical Analysis of Variance. As no group effects were detected, we decided to report individual-based inferential output. With respect to the sources’ motivation we obtained a mean score well above the midpoint of the scale (M = 5.97, SD = 1.24), and the sources found the instructions easy to understand (M = 6.04, SD = 1.23). We found no differences between the interview conditions with respect to the sources’ motivation (p = .281), or with respect to understanding of the instructions (p = .628). The lies uttered were too few to conduct any meaningful inferential tests, and the deceptive pieces of information were evenly distributed over the two interview conditions: Of all new information reported in the Direct Approach, only 5% was deceptive; the corresponding number for the Scharff condition was 4%. Manipulation checks For the Scharff condition, 91% of the sources believed that they were the last in the group to be interviewed, and the corresponding number for the Direct Approach was 90%. Notably, no source believed that s/he was interviewed first in the group. Perceived amount of information held by the interviewer as a function of interview order: The sources’ perception of the interviewer’s knowledge in the Scharff condition varied as a JOURNAL OF POLICING, INTELLIGENCE AND COUNTER TERRORISM 153 function of when in line (first, second or third) the source was interviewed, F(1, 87) = 13.35, p < .001, η2 = 0.24. Pairwise Bonferroni tests showed that the sources interviewed second (p = .003) and third (p < .001) in line perceived the interviewer to have been more knowledgeable compared to the sources interviewed first in line. No difference was found between being interviewed second and third in line (p = .277). For the Direct Approach, no difference was found in terms of the perception of the interviewer’s knowledge as a function of when in line the source was interviewed (p = .108). Perceived amount of information revealed by the other cell members as a function of interview order: For the Scharff condition, the perceived amount of information revealed by the other sources varied as a function of when in line (first, second or third) the source was interviewed, F(1, 87) = 5.82, p = .004, η2 = 0.12. Pairwise Bonferroni tests showed that the sources interviewed second (p = .051) and third (p = .004) in line perceived the others to have revealed more information compared to the sources interviewed first. No difference was found between being interviewed second and third in line (p = 1.00). For the Direct Approach, no difference was found with respect to the perceived amount of information revealed by the fellow group members as a function of when in line the source was interviewed, F(1, 87) = 0.80, p = .453, η2 = 0.18. New information revealed Hypothesis 1 stated that the Scharff protocol would result in relatively more new information. An independent-sample t-test showed that the sources in the Scharff condition (M = 3.22, SD = 2.57) revealed more new information than the sources in the Direct Approach (M = 2.74, SD = 2.51), but not significantly so t(178) = 1.26, p = .209, d = 0.19, 95% CI [−0.10, 0.48]. Hence, Hypothesis 1 was not supported. For the Scharff technique, each cell revealed on average 9.67 (SD = 3.55) pieces of new information; the corresponding number for the Direct Approach was 8.20 (SD = 3.68). The sources’ perceptions Interviewer’s prior knowledge: For Hypothesis 2, we predicted that sources interviewed with the Scharff protocol would perceive the interviewer to have been relatively more knowledgeable prior to the interview. An independent t-test confirmed this hypothesis: The sources in the Scharff condition (M = 13.10, SD = 4.71) perceived the interviewer to have held significantly more information prior to the interview than the sources in the Direct Approach (M = 3.06, SD = 4.30), t(178) = 14.93, p < .001, d = 2.23, 95% CI [1.85, 2.60]. The interviewer’s information objectives: Hypothesis 3 stated that the sources interviewed with the Scharff protocol would have a relatively less clear understanding of the interviewer’s information objectives. An independent t-test showed that the sources in the Direct Approach (M = 4.28, SD = 2.09) found it easier to understand what information the interviewer was seeking to obtain than the sources in the Scharff condition (M = 3.70, SD = 1.91). This difference bordered on significance, t(178) = 1.94, p = .054, d = 0.29, 95% CI [−0.00, 0.58]. New information revealed: We predicted an interaction effect between the interview protocols tested and the objective and subjective amount of new information revealed. A mixed ANOVA with the two interview conditions as the between-subjects factor and 154 P. A. GRANHAG ET AL. the amount of new information revealed (Objective, Subjective) as the within-subjects factor was conducted. The Interview × Revealed information interaction was significant, F(1, 178) = 11.86, p = .001, h2p = 0.06. This interaction was analysed further by the use of simple effects tests for each interview condition. The sources in the Scharff condition perceived that they had revealed less new information (M = 2.78, SD = 2.33) than they, in fact, objectively had revealed (M = 3.22, SD = 2.57), F(1, 88) = 2.92, p = .089, η2 = 0.02. This tendency was in the predicted direction, but did not reach significance. In contrast, the sources in the Direct Approach condition perceived that they had revealed significantly more new information (M = 3.57, SD = 3.16) than they objectively had revealed (M = 2.74, SD = 2.51), F(1, 88) = 10.00, p = .002, η2 = 0.05 (see Figure 1). For the Scharff condition, the majority of the sources (54%) underestimated how much new information they had revealed during the interaction, whereas for the sources in the Direct Approach condition, the same held true for only about one-fourth (27%). Hence, we found partial support for Hypothesis 4. Knowledge revealed by the other cell members: We predicted that the sources in the Scharff condition would estimate their fellow cell members to have revealed more information compared to the estimates given by the sources in the Direct Approach condition. An independent t-test confirmed hypothesis 5a, t(178) = 5.09, p < .001, d = 0.76, 95% CI [0.46, 1.06]. Furthermore, we predicted an interaction effect between the interview protocols relating (a) the sources’ perception of the amount of information revealed by the other two members of the group and (b) the objective amount of information revealed by the two members. A mixed ANOVA with the two interview conditions as the between-subjects factor and the other cell members revealed information scores (Objective, Subjective) as the within-subjects factor was conducted. The Interview × Revealed information interaction was significant, F(1, 178) = 13.84, p = .001, h2p = 0.07. The interaction was analysed further by simple effects tests for each interview condition. The sources in the Scharff condition perceived the other two cell members to have revealed significantly more information (M = 9.38, SD = 6.65) than they objectively had revealed (M = 6.44, SD = 3.27), F(1, 88) = 14.80, Figure 1. Illustrating the interaction effect for the subjective and objective scores of information revealed for the sources in the cells within and between the two interview conditions. JOURNAL OF POLICING, INTELLIGENCE AND COUNTER TERRORISM 155 Figure 2. Illustrating the interaction effect for the subjective and objective scores of information revealed by the other two sources in the cell, within and between the two interview conditions. p < .001, η2 = 0.08. In contrast, the sources in the Direct Approach perceived the other two cell members to have revealed less information (M = 4.38, SD = 6.53) than they objectively had revealed (M = 5.46, SD = 3.29) but not significantly so, F(1, 88) = 2.00, p = .159, η2 = 0.01 (See Figure 2). Hence, we found partial support for Hypothesis 5b. A correlational analysis showed a low correspondence between (a) how much information the individual source believed the other two group members to have revealed and (b) the amount of new information revealed by that individual source (Scharff: r(89) = −.06, p = .59, Direct Approach: r(89) = .12, p = .25). A similarly low correspondence was found between (a) how much information the individual source believed the other two group members to have revealed and (b) the degree to which that individual source over/underestimated his or her own contribution of new knowledge (Scharff: r(89) = −.06, p = .57, Direct Approach: r(89) = −.16, p = .14). Discussion Past work on intelligence-gathering techniques has focused solely on eliciting information from single sources. This is a serious limitation considering the abundance of criminal activities planned and executed by groups (e.g. Carrington, 2002) and a critical shortfall, given the increasingly complex operational methods employed by terrorist groups (with attacks primarily carried out by cells rather than individuals). The current study remedies this gap and advances the knowledge on elicitation techniques on several accounts by (a) studying small cells of sources, (b) introducing new measures of efficacy and (c) introducing novel context-specific tactics. New information revealed The Scharff technique did not result in more new information than the Direct Approach, although the difference was in the predicted direction. We believe that this can be 156 P. A. GRANHAG ET AL. explained by considering the information management dilemma the groups, and ultimately each individual source, had to navigate. In previous research, the individual sources’ willingness (motivation) to reveal information has stemmed from their need to receive assistance from the police (e.g. Granhag, Cancino Montecinos, et al., 2015). In contrast, each group in the current study had to carefully strike a balance between (a) providing enough information to avoid prosecution for having engaged in the planning of a terrorist attack and (b) maintaining their commitment (loyalty) to the organisation behind the attack. First, this dilemma was recognised at the group level, which might have resulted in the perception that it could be balanced by a joint effort (in contrast to each source working for individually exclusive causes). Second, almost all sources believed that they were last in line to be interviewed. Contrary to our a priori speculations, this might have resulted in a lowered motivation to reveal new information (‘My fellow group members have already told the interviewer what can and should be told’). Furthermore, this lowered motivation might have been particularly pronounced in the Scharff condition for which the sources received ‘proof’ that their fellow group members had talked. These two factors pull in the same direction and might explain why the sources were relatively restrictive in terms of providing new information. In brief, the sources’ decision to be restrictive in terms of revealing new information left very little room for detecting differences in terms of new information elicited. The sources’ perceptions of the interview Perception of the interviewer’s prior knowledge: In line with our prediction, the sources in the Scharff condition perceived the interviewer to have held significantly more information prior to the interview compared to the sources in the Direct Approach. This finding is not very surprising; reasonably, it is a direct effect of the tactics used in the Scharff condition (first and foremost presenting a story in order to build the illusion of ‘knowing it all’). Perception of the interviewers’ information objectives: In line with our prediction and previous work (for a summary, see Granhag, Kleinman, & Oleszkiewicz, 2016), the sources interviewed with the Scharff technique found it relatively more difficult to understand what information the interviewer sought to collect (this result bordered on significance). We attribute this to the interaction of the Scharff tactics where (i) no explicit questions were asked and (ii) no feedback was provided when new information was revealed. It is likely that these two interview tactics work in tandem to mask the interviewer’s information objectives. In contrast, an interviewer asking explicit questions, which is the case for the Direct Approach, sends clear signals with respect to his or her information objectives. Perception of own knowledge revealed: An effective information elicitation technique should leave the source with the impression that s/he revealed less new information than was the case. For the present study, and in line with the outcome of prior research (e.g. Oleszkiewicz et al., 2014), the pattern for the Scharff technique differed from the pattern for the Direct Approach. That is, the sources in the Scharff condition underestimated their own contribution of new information (although not significantly so), whereas the sources in the Direct Approach condition significantly overestimated their own contribution. Differently put, more than 50% of the sources who had faced the Scharff technique underestimated the contribution of new information, whereas the JOURNAL OF POLICING, INTELLIGENCE AND COUNTER TERRORISM 157 corresponding number for the Direct Approach was 27%. This finding highlights a vitally important contribution of the Scharff technique to the practice of eliciting information from relatively uncooperative sources, especially those who recognise that providing some information to an interviewer is in their interests yet also wish to carefully minimise the value of that information. The Scharff tactics once again demonstrated their value in fostering a perception whereby the sources believe that they had been sufficiently cooperative to advance their interests while, at the same time, leaving most of them with the impression that they had shared less information than they actually had. We attribute this to the Scharff tactics, and in particular to the ‘confirmation’ tactic (i.e. a source who is ‘only confirming a claim’ might not realise that he or she is, in fact, revealing new information). The finding that the sources faced with the Direct Approach significantly overestimated the amount of new information revealed was expected. In short, answering direct questions can easily, and often accurately, be construed by the source that almost all information revealed is new to the interviewer. Perception of information revealed by the other group members: For the Scharff condition, we successfully inflated the sources’ perception of how much information the other cell members had revealed. In fact, the sources in the Scharff condition estimated that their fellow group members had revealed (a) 45% more information than they actually had revealed and (b) two times as much information as compared to the corresponding estimate made by the sources in the Direct Approach condition. We argue that this outcome was caused by three tactical initiatives, all pulling in the same direction. First, as many as 90% of the sources believed that they were last in line to be interviewed. Second, the interviewer opened the interaction by presenting a story which offered ‘proof’ that the others had indeed talked. Our analysis showed that this proof, whether real or misperceived, had a strong impact on the sources’ perception. In brief, only telling a source that his or her fellow members have already been interviewed may change little (if anything); what matters instead is ‘proof’ that their fellow group members have started to talk. Third, the story used to paint the illusion of ‘knowing it all’ was continuously updated, and we did this by using the new information collected from the first source for interviewing the second and, in turn, the third source. Our analysis showed that this ‘update’ contributed to the sources’ inflated perception. A source who (correctly or incorrectly) believes that his or her fellow group members have started to reveal information, and who decides to act on this belief, could either decide to open up (‘If the others have talked, I will as well’), or to close up (‘The others have told what can be told’). It is a challenge for the interviewer to implement ethically sound tactics to ensure that the source acts on his or her belief in ways which promote, and not hinder, information elicitation. We showed that it is possible to inflate a source’s perception of the other group members’ contribution, but failed to send a more precise message with respect to the implications of this finding. For example, the degree to which the sources’ overestimated the others’ contribution did not correlate with the sources’ own contribution of new information. It is for future research to test specific interview tactics which may realise the positive effects that such inflated perception might carry. Relatedly, the potentially positive effects might be difficult to find if limiting the analysis to the interview where the inflated perception was induced. It might be that the effects will show only after the source has had time to reflect on the initial interaction (a reflection which might result in a shift of 158 P. A. GRANHAG ET AL. counter-interrogation strategy). Differently put, to properly map the effects of the sources’ inflated perception of their fellow group members’ contribution, a repeated interview schedule may be necessary. The potential impact of inflating an individual’s perception of the level of cooperation – and the amount of information – offered by fellow cell members must not be overlooked. An interview of a source in a criminal investigative or intelligence setting is, to be sure, a risk management proposition for both the interviewer and the source. As noted previously, there are conflicting objectives at play. The interviewer seeks to gain the maximum amount of truthful information pertaining to very specific interests while, at the same time, masking his/her information objectives. Similarly, the source may seek to provide the minimal amount of information required to present the image that he or she is being cooperative, but not enough (or not sufficiently precise) to enable the interviewer to make a case for the source’s guilt or complicity. As demonstrated in previous studies (see Granhag et al., 2016), the interviewer’s employment of the Scharff tactics both furthers his/her agenda (i.e. maximising information gain while masking objectives) and counters that of the source (i.e. maximising appearance of cooperation while minimising the revelation of new information). However, the employment of the Scharff tactics when interviewing members of a cell offers additional value. While interviewing a single source presents complexities and opportunities, interviewing members of a cell – comprising individuals with shared experiences, objectives, and information – presents both greater complexities and greater opportunities (Granhag, Strömwall, & Jonsson, 2003; Mac Giolla & Granhag, 2014; Vrij et al., 2012). While further research is required to better understand how the bonds among cell members might make the interviewer’s task more difficult, several decades of social psychological research into tactics of influence offer two compelling explanations for the effectiveness of the Scharff tactics in such a setting. First, social proof suggests that individuals facing novel circumstances (such as a source’s experience of being interviewed by authorities) will look for a reference group for cues as to how to act and react (Cialdini, 2001). The literature also adds that when looking for such a reference group, individuals are most influenced by people like themselves (e.g. nationality, ethnicity and organisation affiliation). In the scenario explored within the current study, other members of the cell would thus serve as the most influential reference group. Employing the Scharff tactics, the interviewer can create the circumstances whereby the source believes that (a) he or she is not the first member of the cell to be interviewed and (b) information presented by the interviewer is the product of previous questioning of other cell members. Together, this tactic would effectively leverage the principle of social proof by offering evidence that the other members of the cell are cooperating with authorities and thereby establishing a norm for behaviour – cooperation – where one did not previously exist. Another principle of social influence that might explain the effectiveness of the Scharff tactics in general, and when interviewing cell members in specific, is that of authority. This principle suggests that a person viewed as possessing relevant expertise and/or status can materially influence an individual’s choices. The interviewer employing the Scharff tactics are likely to be viewed by the source as possessing expertise by virtue of the illusion of knowing-it-all. Moreover, the interviewer’s status is concurrently enhanced by the fact that the source believes he/she has already successfully questioned other members of the cell. While principles of social influence have been well established when introduced JOURNAL OF POLICING, INTELLIGENCE AND COUNTER TERRORISM 159 in isolation, they can generate even greater leverage when introduced in combination (Cialdini, 2001). Limitations and future research Both the current study and the Scharff technique as such come with a number of limitations. A first limitation is that the present study is based on a student sample, a sample very different from a typical criminal or terrorist source. We, however, believe that it is reasonable to argue that the Scharff technique might be equally effective in real-life settings. Our argument is based on the assumption that many real-life sources will be more motivated than students to evoke counter-interrogation strategies. As the Scharff technique is tailored to circumvent these counter-interrogation strategies, the technique might be equally effective in real-life settings. In other words, just as the risks of inadvertent disclosure of information faced by a source in a real-world setting would be substantially greater than that experienced by a subject in this study, the influences introduced by the Scharff tactics (e.g. how the illusion of ‘knowing-it-all’ decreases a source’s interest in protecting information that appears to be already known to the interviewer) are also proportionately enhanced. It should, however, be noted that for some situations, it would be a tactical mistake for the interviewer to reveal how much and what intelligence that is held on a certain topic. For example, if the source is not in custody, s/he may inform the cells of individuals to which the intelligence pertains, and/or networks planning future illegal actions could deploy false sources in order to tap how much intelligence is held on them. Second, although the Scharff technique outperformed the Direct Approach on a number of critical measures, our findings also show that there is room for further improvements. As already mentioned, the two techniques examined elicited only a relatively small portion of all new information that was possible to obtain, and a stimulating challenge for future research is how to find ways to increase the collection of new information, without making it obvious to the source that s/he is, in fact, revealing new information. The present paper is the first to address how to most effectively elicit information from small groups of sources. We believe that our paper points to a potentially fruitful strand of research, raising a number of urgent research questions. For example, for the present study, all members of the group shared the same knowledge. Even though it is an easy task to find real-life situations where this is indeed the case, there is an array of situations where the information distribution within the group is uneven (e.g. sources within the same cell may hold different amount of information on different topics). In addition, and as touched upon above, future research might profit from conducting repeated interviews with each member of the cell in order to better map the effects that follow from sources overestimating the amount of information revealed by their fellow group members. Implications and conclusions In the light of the terrorist attacks such as those that unfolded in New York, Madrid, London, Boston and Paris, and the overall increase in the threat of terror worldwide, the need for effective HUMINT techniques is more critical than ever (Brandon, 2011; Loftus, 160 P. A. GRANHAG ET AL. 2011). Moreover, media reports and public statements from a host of governments make it clear that the vast majority of interrogations of high-value detainees involve individuals who had operated within the cellular structure of major terrorist organisations. While the so-called ‘lone wolf’ terrorist – an individual operating independent of a group – has garnered considerable publicity in the last several years, this form of terrorism remains the exception. Despite this operational reality, the preponderance of research has curiously focused exclusively on the interaction between the interviewer and the source as an individual without consideration of the potential mitigating and aggravating effects of the group interaction or identity. We argue that the outcome of the current study is of practical relevance as it can directly inform the strategies and methods employed when interviewing small cells of sources and introduces and examines tactics specifically tailored for these situations. In conclusion, the Scharff technique and the Direct Approach elicited an equal amount of new information. However, by using the Scharff technique, we were able to (a) deflate the sources’ estimate of how much new information they believed to have revealed and (b) inflate the sources’ estimate of how much information they believed their fellow group members to have revealed. The combined evidence speaks to the advantage of the Scharff technique. Disclosure statement No potential conflict of interest was reported by the authors. Funding This work was funded by High-Value Detainee Interrogation Group contract [J-FBI-12–187] awarded to subcontract Pär Anders Granhag, University of Gothenburg, Department of Psychology. Statements of fact, opinion and analysis in the paper are those of the authors and do not reflect the official policy or position of the FBI or the US government. References Alison, L., Alison, E., Noone, G., Elntib, S., Waring, S., & Christiansen, P. (2014). Whatever you say, say nothing: Individual differences in counter interrogation tactics amongst a field sample of right wing, AQ inspired and paramilitary terrorists. Personality and Individual Differences, 68, 170–175. doi:10.1016/j.paid.2014.04.031 Alison, L., Giles, S., & McGuire, G. (2015). Blood from a stone: Why rapport works and torture doesn’t in ‘enhanced’ interrogations. Investigative Interviewing: Research and practice, Special Issue, 7, 5–23. Brandon, S. E. (2011). Impacts of psychological science on national security agencies post-9/11. American Psychologist, 66, 495–506. doi:10.1037/a0024818 Carrington, P. J. (2002). Group crime in Canada. Canadian Journal of Criminology, 44, 277–315. Cialdini, R. B. (2001). Influence: Science and practice. Needham Heights, MA: Pearson. Evans, J. R., Houston, K. A., Meissner, C. A., Ross, A. B., LaBianca, J. R., Woestehoff, S. A., … Kleinman, S. M. (2014). An empirical evaluation of intelligence-gathering interrogation techniques from the United States army field manual. Applied Cognitive Psychology, 28, 867–875. doi:10.1002/acp.3065 Evans, J. R., Meissner, C. A., Ross, A. B., Houston, K. A., Russano, M. B., & Horgan, A. J. (2013). Obtaining guilty knowledge in human intelligence interrogations: Comparing accusatorial and informationgathering approaches with a novel experimental paradigm. Journal of Applied Research in Memory and Cognition, 2, 83–88. doi:10.1016/j.jarmac.2013.03.2002 JOURNAL OF POLICING, INTELLIGENCE AND COUNTER TERRORISM 161 Executive Order No. 13491, Ensuring lawful interrogations, 3 C.F.R. page 4894 (2009). https://www. whitehouse.gov/the-press-office/ensuring-lawful-interrogations FM 2–22.3 (FM 34–52). (2006, September 6). Field manual. Headquarters. No. 2-22.3. Department of the Army. Washington, DC. Galinsky, A. D., Maddux, W. W., Gilin, D., & White, J. B. (2008). Why it pays to get inside the head of your opponent: The differential effects of perspective taking and empathy in negotiations. Psychological Science, 19, 378–384. doi:10.1111/j.1467-9280.2008.02096.x Gill, P., Jeongyoon, L., Rethemeyer, K. R., Horgan, J., & Asal, V. (2014). Lethal connections: The determinants of network connections in the provisional Irish republican army. International Interactions, 40, 52–78. doi:10.1080/03050629.2013.863190 Granhag, P. A. (2010). The Scharff-technique: Background and first scientific testing. Washington, DC: Professional Development Seminar, High-value Detainee Interrogation Group (HIG, FBI). Granhag, P. A., Cancino Montecinos, S., & Oleszkiewicz, S. (2015). Eliciting intelligence from sources: The first scientific test of the Scharff technique. Legal and Criminological Psychology, 20, 96–113. doi:10.1111/lcrp. Granhag, P. A., & Hartwig, M. (2015). The strategic use of evidence (SUE) technique: A conceptual overview. In P. A. Granhag, A. Vrij, & B. Verschuere (Eds.), Deception detection: Current challenges and cognitive approaches (pp. 231–251). Chichester: Wiley-Blackwell. Granhag, P. A., Kleinman, S. M., & Oleszkiewicz, S. (2016). The Scharff technique: On how to effectively elicit intelligence from human sources. International Journal of Intelligence and Counterintelligence, 29, 132–150. doi:10.1080/08850607.2015.1083341 Granhag, P. A., Oleszkiewicz, S., Strömwall, L. A., & Kleinman, S. M. (2015). Eliciting intelligence with the Scharff technique: Interviewing more and less cooperative and capable sources. Psychology, Public Policy, and Law, 21, 100–110. doi:10.1037/law0000030 Granhag, P. A., Strömwall, L. A., & Jonsson, A. C. (2003). Partners in crime: How liars in collusion betray themselves. Journal of Applied Social Psychology, 33, 848–868. doi:10.1111/j.1559-1816.2003. tb01928.x Granhag, P. A., Vrij, A., & Meissner, C. A. (2014). Information gathering in law enforcement and intelligence settings: Advancing theory and practice. Applied Cognitive Psychology, 28, 815–816. doi:10. 1002/acp.3093 Herbig, K. L. (2008). Changes in espionage by Americans: 1947–2007. Monterey, CA: Defence Personnel Security Research Center. Justice, B. P., Bhatt, S., Brandon, S. E., & Kleinman, S. M. (2010). Army field manual 2-22.3 interrogation methods: A science-based review. Unpublished manuscript. Loftus, E. F. (2011). Intelligence gathering post-9/11. American Psychologist, 66, 532–541. doi:10.1037/ a0024614 Mac Giolla, E., & Granhag, P. A. (2014). Detecting false intent amongst small cells of suspects: Single versus repeated interviews. Journal of Investigative Psychology and Offender Profiling. doi:10.1002/ jip.1419 May, L., Granhag, P. A., & Oleszkiewicz, S. (2014). Eliciting intelligence using the Scharff-technique: Closing in on the confirmation/disconfirmation-tactic. Journal of Investigative Psychology and Offender Profiling, 11, 136–150. doi:10.1002/ji.1412 Oleszkiewicz, S. (2016). Eliciting human intelligence: A conceptualization and empirical testing of the Scharff technique. Doctoral dissertation, Department of Psychology, Gothenburg, Sweden. Oleszkiewicz, S., Granhag, P. A., & Cancino Montecinos, S. (2014). The Scharff-technique: Eliciting intelligence from human sources. Law and Human Behavior, 38, 478–489. doi:10.1037/lhb0000085 Oleszkiewicz, S., Granhag, P. A., & Kleinman, S. M. (2014). On eliciting intelligence from human sources: Contextualizing the Scharff-technique. Applied Cognitive Psychology. doi:10.1002/acp. 3073 Redlich, A. D., Kelly, C., & Miller, J. (2011). Systematic survey of the interview and intelligence community. Washington, DC: Final report submitted to the Federal Bureau of Investigation/High-Value Detainee Interrogation Group. Scharff, H. J. (1950). Without torture. Argosy, 39, 87–91. 162 P. A. GRANHAG ET AL. Tekin, S., Granhag, P. A., Strömwall, L. A., Mac Giolla, E., Vrij, A., & Hartwig, M. (2015). Interviewing strategically to elicit admissions from guilty suspects. Law and Human Behavior. doi:10.1037/lhb0000131 Toliver, R. F. (1997). The interrogator; the story of Hanns Joachim Scharff master interrogator of the Luftwaffe. Atglen: Schiffer Publishing. Vrij, A., Jundi, S., Hope, L., Hillman, J., Gahr, E., Leal, S., … Granhag, P. A. (2012). Collective interviewing of suspects. Journal of Applied Research in Memory and Cognition, 1, 41–44. doi:10.1016/j.jarmac. 2011.12.002