Jump to ContentJump to Main Navigation
Interrogation, intelligence and securityControversial British Techniques$
Users without a subscription are not able to see the full content.

Samantha Newbery

Print publication date: 2015

Print ISBN-13: 9780719091483

Published to Manchester Scholarship Online: January 2016

DOI: 10.7228/manchester/9780719091483.001.0001

Show Summary Details
Page of

PRINTED FROM MANCHESTER SCHOLARSHIP ONLINE (www.manchester.universitypressscholarship.com). (c) Copyright Manchester University Press, 2019. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in MSO for personal use.date: 14 October 2019

The ‘five techniques’ of interrogation and the Aden Emergency, 1963–67

The ‘five techniques’ of interrogation and the Aden Emergency, 1963–67

Chapter:
(p.11) 1 The ‘five techniques’ of interrogation and the Aden Emergency, 1963–67
Source:
Interrogation, intelligence and security
Author(s):

Samantha Newbery

Publisher:
Manchester University Press
DOI:10.7228/manchester/9780719091483.003.0002

This chapter identifies the nature of the ‘five techniques’ of interrogation used during the State of Emergency in Aden. The threat from nationalist insurgents led not only to the declaration of a State of Emergency, but to the use of the ‘five techniques’ as well. In order to explain how such controversial techniques came to be used in this case the history and development of the techniques is addressed, as is the process of decision-making that led to their use. The reasons why the military brought these techniques to Aden will be made clear. It will be shown that the purpose behind the use of the ‘five techniques’ in Aden was to improve the intelligence available to the security forces.

Keywords:   Aden, Decision-making, Military, State of Emergency, Insurgency

Manchester Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.