珀金斯行动:卧底互动中使用的战术

Simon Oleszkiewicz, Pär Anders Granhag, Timothy J. Luke
{"title":"珀金斯行动:卧底互动中使用的战术","authors":"Simon Oleszkiewicz, Pär Anders Granhag, Timothy J. Luke","doi":"10.1080/08850607.2023.2257544","DOIUrl":null,"url":null,"abstract":"In the United States, it is permissible to place an undercover police officer in the jail cell with a suspect. This tactical move is rare and launched only for serious crimes, and it takes place before any charges have been filed. This tactic goes under the name of Perkins operations, from the case ruling that if an individual speaks freely to someone whom they believe is a fellow inmate it is allowed to take advantage of their misplaced trust (Illinois v. Perkins, 1990). In this study, we examine 22 Perkins operations, 60 hours of secretly taped interactions in the cells, and we describe and categorize the different approaches and tactics that the undercover officers used. Based on the descriptive analysis, we conceptualize two pathways to information elicitation (direct and relational) and explore the undercover officers’ use of risky interview tactics. The findings suggest that undercover officers use four broader approaches to establish relationships and gather information, and we were able to identify only a few instances of risky tactics in this sample. The relevance of the findings for human intelligence gathering and counterintelligence are discussed.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.4000,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Perkins Operations: Tactics Used in Undercover Interactions\",\"authors\":\"Simon Oleszkiewicz, Pär Anders Granhag, Timothy J. Luke\",\"doi\":\"10.1080/08850607.2023.2257544\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the United States, it is permissible to place an undercover police officer in the jail cell with a suspect. This tactical move is rare and launched only for serious crimes, and it takes place before any charges have been filed. This tactic goes under the name of Perkins operations, from the case ruling that if an individual speaks freely to someone whom they believe is a fellow inmate it is allowed to take advantage of their misplaced trust (Illinois v. Perkins, 1990). In this study, we examine 22 Perkins operations, 60 hours of secretly taped interactions in the cells, and we describe and categorize the different approaches and tactics that the undercover officers used. Based on the descriptive analysis, we conceptualize two pathways to information elicitation (direct and relational) and explore the undercover officers’ use of risky interview tactics. The findings suggest that undercover officers use four broader approaches to establish relationships and gather information, and we were able to identify only a few instances of risky tactics in this sample. The relevance of the findings for human intelligence gathering and counterintelligence are discussed.\",\"PeriodicalId\":45249,\"journal\":{\"name\":\"International Journal of Intelligence and Counterintelligence\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2023-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Intelligence and Counterintelligence\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/08850607.2023.2257544\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"INTERNATIONAL RELATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Intelligence and Counterintelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/08850607.2023.2257544","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 0

摘要

在美国,允许将一名便衣警察与嫌疑人关在牢房里。这种战术行动很少见,只针对严重犯罪才会实施,而且是在任何指控被提起之前。这种策略被称为帕金斯操作,从案件裁决中可以看出,如果一个人自由地与他认为是狱友的人说话,就可以利用他们错误的信任(伊利诺伊州诉帕金斯,1990)。在这项研究中,我们研究了22次珀金斯行动,60小时秘密录制的牢房里的互动,我们描述和分类了卧底警官使用的不同方法和策略。在描述性分析的基础上,我们概念化了两种获取信息的途径(直接和关系),并探讨了卧底人员使用风险访谈策略的情况。调查结果表明,卧底人员使用四种更广泛的方法来建立关系和收集信息,我们只能在这个样本中识别出少数危险策略的例子。讨论了这些发现与人类情报收集和反情报的相关性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Perkins Operations: Tactics Used in Undercover Interactions
In the United States, it is permissible to place an undercover police officer in the jail cell with a suspect. This tactical move is rare and launched only for serious crimes, and it takes place before any charges have been filed. This tactic goes under the name of Perkins operations, from the case ruling that if an individual speaks freely to someone whom they believe is a fellow inmate it is allowed to take advantage of their misplaced trust (Illinois v. Perkins, 1990). In this study, we examine 22 Perkins operations, 60 hours of secretly taped interactions in the cells, and we describe and categorize the different approaches and tactics that the undercover officers used. Based on the descriptive analysis, we conceptualize two pathways to information elicitation (direct and relational) and explore the undercover officers’ use of risky interview tactics. The findings suggest that undercover officers use four broader approaches to establish relationships and gather information, and we were able to identify only a few instances of risky tactics in this sample. The relevance of the findings for human intelligence gathering and counterintelligence are discussed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
1.00
自引率
22.20%
发文量
102
期刊最新文献
Signature Strikes and the Ethics of Targeted Killing National Security Intelligence Activity and the Just Intelligence Theory Offensive Cyberterrorism Ethics of Spying on One’s Friends: Angela Merkel’s Telephone Old Experiences and New Circumstances: Data Collection Methods of the Yugoslav Military Intelligence Service during the Yugoslav–Soviet Conflict (1948–1951)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1