Eliciting information from small cells of sources

  • Pär Anders Granhag
  • , Simon Oleszkiewicz
  • , Steven Kleinman

Research output: Contribution to journalArticleAcademicpeer-review

13 Citations (Scopus)

Abstract

In past research, the Scharff technique has consistently outperformed different comparison techniques with respect to the elicitation of human intelligence. This study extends previous work by examining the efficacy of the Scharff technique applied to small cells of sources. The sources worked in triads (N = 180), and were given information about a planned terrorist attack. They were then interviewed individually with either the Scharff technique (conceptualised as five tactics) or the Direct Approach (open and direct questions). The two techniques resulted in an equal amount of new information. As predicted, the sources in the Scharff condition underestimated, whereas the sources in the Direct Approach condition overestimated, their own contribution of new information. Furthermore, the Scharff tactics resulted in the sources overestimating the amount of information revealed by their fellow group members, whereas this was not the case in the Direct Approach. The paper advances the knowledge on elicitation techniques on several accounts: with respect to the context (focusing on small cells of sources), measures of efficacy (introducing a new dependent measure) and tactics (introducing novel context-dependent tactics). The outcome of the study marks the Scharff technique as a promising technique for eliciting information in intelligence settings.
Original languageEnglish
Pages (from-to)143-162
JournalJournal of Policing, Intelligence and Counter Terrorism
Volume11
Issue number2
DOIs
Publication statusPublished - 16 Oct 2016
Externally publishedYes

Keywords

  • The Scharff technique
  • Cells of sources
  • Information elicitation
  • Human intelligence gathering
  • n/a OA procedure

Fingerprint

Dive into the research topics of 'Eliciting information from small cells of sources'. Together they form a unique fingerprint.

Cite this