SlideShare a Scribd company logo
1 of 2
Download to read offline
Many professionals encourage conversation,
especially discussion of theories, concepts, and
plans. It’s a spy’s dream come true!
                                                             Because elicitation is subtle
So, remember, on your next trip or during any               and difficult to recognize, you
conversation with a foreign colleague: Be aware
of the person with whom you are speaking and                 should report any suspicious
where your conversation may be reported. Don’t             conversations to the DHS Office
be paranoid, just be careful.                              of Security or your local security
                                                                        officer.
What To Do
If you ever feel that you are being drawn into a           To report a suspected elicitation
conversation that makes you uncomfortable, keep              attempt to the DHS Office of
these points in mind:
                                                           Security, please use the contact
●   You are not obliged to tell people any
                                                                  information below.
    information they are not authorized to hear; that
    includes personal information about you or your
    colleagues.
●   You can simply ignore any question you think is
    improper and change the topic.



                                                                                                  Elicitation
●   You can deflect the question with one of your
    own.
●   You can give a nondescript answer.
●   You can simply say that you do not know.
                                                                                                  Would You Recognize It?
●   If all else fails, you can state that you would have
    to clear such discussions with your Security
    Office.

Reporting Contacts
Presidential Decision Directive NSC-12 requires
that government employees report all contacts
with individuals of any nationality, either within
or outside of the scope of the employee’s official
activities, in which:
●   illegal or unauthorized access is sought to                Department of Homeland Security
    classified or otherwise sensitive information.                       Office of Security
                                                                    Phone: (202) 447-5010
●   the employee is concerned that he may be the
                                                                E-mail: OfficeofSecurity@dhs.gov
    target of actual or attempted exploitation by a
    foreign entity.
What is it?                                           Appealing to One’s Ego                                   Volunteering Information
                                                                                                               (in hopes of getting something in return)
In the espionage trade, elicitation is a technique    Intelligence Officer: “You must have an important
frequently used by intelligence officers to subtly     position in your agency. Our host seems to think         Intelligence Officers are always willing to trade
extract information about you, your work, and         very highly of you.”                                     information. Don’t feel obligated to respond in
your colleagues.                                                                                               kind merely because someone tells you something
                                                      You: “Well, how nice of you to say so. As a matter
                                                                                                               interesting.
Said another way, elicitation is the art of           of fact, my job isn’t all that important. What I do
conversation honed by intelligence services to its    is...”                                                   Assumed Knowledge
finest edge.                                           Flattery often coaxes a person into a conversation
                                                                                                               If your companion talks as if he is knowledgeable
                                                      that otherwise would not have taken place.
The Dilemma                                                                                                    about a particular subject (computers, nuclear
                                                      Expression of Mutual Interest                            physics, whatever) or if you have assumed that he
You never know if elicitation is being used
                                                                                                               is “up” on the subject, then what’s the harm in
casually to pass the time or if it is being used to   Intelligence Officer: “Oh, you have a background in       discussing it, right? No, wrong. Assume nothing.
gather intelligence data.                             computers; so do I. Perhaps you’d like to try out        Tell nothing.
                                                      the Sun Workstation I have at home. It’s really
Why Elicitation? What is Its Appeal?
                                                      powerful!”                                               The Threat
    ●   Elicitation is non-threatening. It is hard    You: “Yes, I’d like to do that. That sounds              Today’s world of openness offers almost unlimited
        to recognize as an intelligence technique     interesting. I’ve always wanted to try out a             opportunities to gather information through
        and it is easy to deny any wrongdoing.        powerful workstation like that. I use a CAD/CAM          direct personal contact. Each year, thousands of
    ●   Elicitation is easy to disguise. It’s just    program, but my computer...”                             U.S. Government officials and scientists come into
        conversation among colleagues and             You have just agreed to extend your relationship         contact with foreign colleagues both in the U.S. and
        friends.                                      beyond the immediate social situation. This works        overseas.
    ●   Elicitation is effective.                     to an Intelligence Officer’s advantage. He now has        Intelligence services invest significant resources in
                                                      the opportunity to establish a deeper relationship       identifying individuals who possess the knowledge
Techniques                                            “off-line,” in a venue that he controls.                 they desire. The information may not be classified,
                                                                                                               but it will be useful to their nation’s well being.
There you are, at a social gathering, deep into a     Deliberate False Statements
conversation with someone you don’t know very                                                                  Elicitation requires patience. Pieces of information
well. There are questions back and forth over a       Intelligence Officer: “Everybody knows, of course, that   collected over an extended period of time can
wide range of topics. How do you know when            the Pakistanis have had nuclear technology for only      provide the final piece of the puzzle to a complex
the conversation is merely social and innocent        two years.”                                              problem or save the expenditure of scarce research
and when it is being conducted for other              You: “Actually, that isn’t true. They started in 1978    money.
purposes?                                             with a program to...”
                                                                                                               Potential
You don’t know, really. There are, however, some      Such statements have the curious property of
tried and true techniques of gaining information.     producing denials, along with the real facts, out of     Keep in mind that a key element in any espionage
These techniques are used by ordinary people in       the listener. This is based on the deep-rooted need      operation is to make it as easy as possible for
ordinary conversations, as well as by intelligence    that most people have to correct misstatements, to       the target to share his information. After all, the
officers in some not-so-ordinary conversations.        inform people, and to appear to be “in-the-know.”        elicitation is only conversation among colleagues
                                                                                                               and friends. What is more natural than that? We
Here are some common techniques you may
                                                                                                               do it all the time.
recognize:

More Related Content

Viewers also liked

CBP-Vision-Strategy-2020
CBP-Vision-Strategy-2020CBP-Vision-Strategy-2020
CBP-Vision-Strategy-2020Benjamin Webb
 
The Next Generation of Social Listening Intelligence
The Next Generation of Social Listening IntelligenceThe Next Generation of Social Listening Intelligence
The Next Generation of Social Listening IntelligenceRob Key
 
Security PACS LACS Interoperability Presentation
Security PACS LACS Interoperability PresentationSecurity PACS LACS Interoperability Presentation
Security PACS LACS Interoperability PresentationMichael Queralt
 
Identity and Biometrics in the Big Data & Analytics Context
Identity and Biometrics in the Big Data & Analytics ContextIdentity and Biometrics in the Big Data & Analytics Context
Identity and Biometrics in the Big Data & Analytics ContextCharles Li
 
Overcoming the next generation ied threat
Overcoming the next generation ied threatOvercoming the next generation ied threat
Overcoming the next generation ied threatDale Butler
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Duane Blackburn
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography2510stk
 
Is a mexican drug cartel al-qaeda relationship possible to attack mexican or ...
Is a mexican drug cartel al-qaeda relationship possible to attack mexican or ...Is a mexican drug cartel al-qaeda relationship possible to attack mexican or ...
Is a mexican drug cartel al-qaeda relationship possible to attack mexican or ...FCOWEP
 
Dept of Homeland Security presentation at the Chief Analytics Officer Forum E...
Dept of Homeland Security presentation at the Chief Analytics Officer Forum E...Dept of Homeland Security presentation at the Chief Analytics Officer Forum E...
Dept of Homeland Security presentation at the Chief Analytics Officer Forum E...Chief Analytics Officer Forum
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitationvivacemente
 
Elicitation techniques
Elicitation techniquesElicitation techniques
Elicitation techniquesdaisy92081
 
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...IPPAI
 
Big Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must KnowBig Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must KnowBernard Marr
 

Viewers also liked (20)

CBP-Vision-Strategy-2020
CBP-Vision-Strategy-2020CBP-Vision-Strategy-2020
CBP-Vision-Strategy-2020
 
The Next Generation of Social Listening Intelligence
The Next Generation of Social Listening IntelligenceThe Next Generation of Social Listening Intelligence
The Next Generation of Social Listening Intelligence
 
Security PACS LACS Interoperability Presentation
Security PACS LACS Interoperability PresentationSecurity PACS LACS Interoperability Presentation
Security PACS LACS Interoperability Presentation
 
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHSInsight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
 
The Eagle Went Over The Mountain
The Eagle Went Over The MountainThe Eagle Went Over The Mountain
The Eagle Went Over The Mountain
 
Identity and Biometrics in the Big Data & Analytics Context
Identity and Biometrics in the Big Data & Analytics ContextIdentity and Biometrics in the Big Data & Analytics Context
Identity and Biometrics in the Big Data & Analytics Context
 
Overcoming the next generation ied threat
Overcoming the next generation ied threatOvercoming the next generation ied threat
Overcoming the next generation ied threat
 
Cbp Sem Inception Meeting May 09
Cbp   Sem Inception Meeting May 09Cbp   Sem Inception Meeting May 09
Cbp Sem Inception Meeting May 09
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
 
Is a mexican drug cartel al-qaeda relationship possible to attack mexican or ...
Is a mexican drug cartel al-qaeda relationship possible to attack mexican or ...Is a mexican drug cartel al-qaeda relationship possible to attack mexican or ...
Is a mexican drug cartel al-qaeda relationship possible to attack mexican or ...
 
2016-05-31 CTP Update and Assessment
2016-05-31 CTP Update and Assessment2016-05-31 CTP Update and Assessment
2016-05-31 CTP Update and Assessment
 
Elicitation procedures
Elicitation proceduresElicitation procedures
Elicitation procedures
 
Dept of Homeland Security presentation at the Chief Analytics Officer Forum E...
Dept of Homeland Security presentation at the Chief Analytics Officer Forum E...Dept of Homeland Security presentation at the Chief Analytics Officer Forum E...
Dept of Homeland Security presentation at the Chief Analytics Officer Forum E...
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitation
 
Elicitation techniques
Elicitation techniquesElicitation techniques
Elicitation techniques
 
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...Counter IED Philosophy and Threat Management in the Indian Context Securing A...
Counter IED Philosophy and Threat Management in the Indian Context Securing A...
 
Interviewing & Elicitation Techniques
Interviewing & Elicitation TechniquesInterviewing & Elicitation Techniques
Interviewing & Elicitation Techniques
 
Mumbai attack
Mumbai attackMumbai attack
Mumbai attack
 
Big Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must KnowBig Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must Know
 

Similar to Elicitation Brochure from DHS

Annual security refresher course
Annual security refresher course Annual security refresher course
Annual security refresher course oscedge
 
Annual Security Refresher
Annual Security RefresherAnnual Security Refresher
Annual Security Refresheroscedge
 
RW privacy-technology-outlook
RW privacy-technology-outlookRW privacy-technology-outlook
RW privacy-technology-outlookracingsnake
 
Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outtheODI
 
Connecting the Dots
Connecting the DotsConnecting the Dots
Connecting the DotsInnoTech
 
Business communication
Business communicationBusiness communication
Business communicationNeetikaRao1
 
Expert Systems New
Expert Systems NewExpert Systems New
Expert Systems NewKate Festa
 
How to defeat impostor syndrome: confessions of a developer
How to defeat impostor syndrome: confessions of a developerHow to defeat impostor syndrome: confessions of a developer
How to defeat impostor syndrome: confessions of a developerMatteo Bruno
 
Artificial emotional intelligence - Giles Colborne
Artificial emotional intelligence - Giles ColborneArtificial emotional intelligence - Giles Colborne
Artificial emotional intelligence - Giles Colbornecxpartners
 
5 Networking Mistakes Poeple Make
5 Networking Mistakes Poeple Make5 Networking Mistakes Poeple Make
5 Networking Mistakes Poeple MakeCPA Australia
 
Observations and Fieldnotes: Tips and Tricks
Observations and Fieldnotes: Tips and TricksObservations and Fieldnotes: Tips and Tricks
Observations and Fieldnotes: Tips and TricksNormative
 
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCybera Inc.
 
Empathy in Project Management
Empathy in Project ManagementEmpathy in Project Management
Empathy in Project ManagementJason Morton
 
Network Security - FA22Week 7 Apple Find My Protocol
Network Security - FA22Week 7 Apple Find My Protocol Network Security - FA22Week 7 Apple Find My Protocol
Network Security - FA22Week 7 Apple Find My Protocol simisterchristen
 
Impostor syndrome - Dlaczego na githubie i blogu mam pusto
Impostor syndrome - Dlaczego na githubie i blogu mam pustoImpostor syndrome - Dlaczego na githubie i blogu mam pusto
Impostor syndrome - Dlaczego na githubie i blogu mam pustoMichał Gruca
 
What is Digital Empathy Anyway? Let's Find Out Together!
What is Digital Empathy Anyway? Let's Find Out Together!What is Digital Empathy Anyway? Let's Find Out Together!
What is Digital Empathy Anyway? Let's Find Out Together!Woj Kwasi
 
Expert Systems
Expert SystemsExpert Systems
Expert SystemsKate Festa
 
This Time with Feeling: Bringing the Arts and Humanities to Tech | Jonathan F...
This Time with Feeling: Bringing the Arts and Humanities to Tech | Jonathan F...This Time with Feeling: Bringing the Arts and Humanities to Tech | Jonathan F...
This Time with Feeling: Bringing the Arts and Humanities to Tech | Jonathan F...LavaConConference
 

Similar to Elicitation Brochure from DHS (20)

Annual security refresher course
Annual security refresher course Annual security refresher course
Annual security refresher course
 
Annual Security Refresher
Annual Security RefresherAnnual Security Refresher
Annual Security Refresher
 
RW privacy-technology-outlook
RW privacy-technology-outlookRW privacy-technology-outlook
RW privacy-technology-outlook
 
Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught out
 
Connecting the Dots
Connecting the DotsConnecting the Dots
Connecting the Dots
 
Business communication
Business communicationBusiness communication
Business communication
 
Expert Systems New
Expert Systems NewExpert Systems New
Expert Systems New
 
Unit on intelligence
Unit on intelligenceUnit on intelligence
Unit on intelligence
 
How to defeat impostor syndrome: confessions of a developer
How to defeat impostor syndrome: confessions of a developerHow to defeat impostor syndrome: confessions of a developer
How to defeat impostor syndrome: confessions of a developer
 
Artificial emotional intelligence - Giles Colborne
Artificial emotional intelligence - Giles ColborneArtificial emotional intelligence - Giles Colborne
Artificial emotional intelligence - Giles Colborne
 
5 Networking Mistakes Poeple Make
5 Networking Mistakes Poeple Make5 Networking Mistakes Poeple Make
5 Networking Mistakes Poeple Make
 
Observations and Fieldnotes: Tips and Tricks
Observations and Fieldnotes: Tips and TricksObservations and Fieldnotes: Tips and Tricks
Observations and Fieldnotes: Tips and Tricks
 
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
 
Empathy in Project Management
Empathy in Project ManagementEmpathy in Project Management
Empathy in Project Management
 
Network Security - FA22Week 7 Apple Find My Protocol
Network Security - FA22Week 7 Apple Find My Protocol Network Security - FA22Week 7 Apple Find My Protocol
Network Security - FA22Week 7 Apple Find My Protocol
 
Impostor syndrome - Dlaczego na githubie i blogu mam pusto
Impostor syndrome - Dlaczego na githubie i blogu mam pustoImpostor syndrome - Dlaczego na githubie i blogu mam pusto
Impostor syndrome - Dlaczego na githubie i blogu mam pusto
 
What is Digital Empathy Anyway? Let's Find Out Together!
What is Digital Empathy Anyway? Let's Find Out Together!What is Digital Empathy Anyway? Let's Find Out Together!
What is Digital Empathy Anyway? Let's Find Out Together!
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
This Time with Feeling: Bringing the Arts and Humanities to Tech | Jonathan F...
This Time with Feeling: Bringing the Arts and Humanities to Tech | Jonathan F...This Time with Feeling: Bringing the Arts and Humanities to Tech | Jonathan F...
This Time with Feeling: Bringing the Arts and Humanities to Tech | Jonathan F...
 
Network Or Perish
Network Or PerishNetwork Or Perish
Network Or Perish
 

More from Nerium International (12)

May picnic flyer
May picnic flyerMay picnic flyer
May picnic flyer
 
RR crossing closure 6-10 May
RR crossing closure 6-10 MayRR crossing closure 6-10 May
RR crossing closure 6-10 May
 
Calling All Artists
Calling All ArtistsCalling All Artists
Calling All Artists
 
March 2013 Spouse Newsletter
March 2013 Spouse NewsletterMarch 2013 Spouse Newsletter
March 2013 Spouse Newsletter
 
A&FRC Feb 2013 Calendar
A&FRC Feb 2013 CalendarA&FRC Feb 2013 Calendar
A&FRC Feb 2013 Calendar
 
AF101: Back to Basics Guide for AF Spouses
AF101: Back to Basics Guide for AF SpousesAF101: Back to Basics Guide for AF Spouses
AF101: Back to Basics Guide for AF Spouses
 
Safe Social Networking Handout
Safe Social Networking HandoutSafe Social Networking Handout
Safe Social Networking Handout
 
NCSAM 2012 Privacy
NCSAM 2012 PrivacyNCSAM 2012 Privacy
NCSAM 2012 Privacy
 
Arts & Crafts Center
Arts & Crafts CenterArts & Crafts Center
Arts & Crafts Center
 
A&FRC (Airmen & Family Readiness Ctr)
A&FRC (Airmen & Family Readiness Ctr)A&FRC (Airmen & Family Readiness Ctr)
A&FRC (Airmen & Family Readiness Ctr)
 
375th FSS
375th FSS375th FSS
375th FSS
 
Bowling Stars & Strikes
Bowling Stars & StrikesBowling Stars & Strikes
Bowling Stars & Strikes
 

Elicitation Brochure from DHS

  • 1. Many professionals encourage conversation, especially discussion of theories, concepts, and plans. It’s a spy’s dream come true! Because elicitation is subtle So, remember, on your next trip or during any and difficult to recognize, you conversation with a foreign colleague: Be aware of the person with whom you are speaking and should report any suspicious where your conversation may be reported. Don’t conversations to the DHS Office be paranoid, just be careful. of Security or your local security officer. What To Do If you ever feel that you are being drawn into a To report a suspected elicitation conversation that makes you uncomfortable, keep attempt to the DHS Office of these points in mind: Security, please use the contact ● You are not obliged to tell people any information below. information they are not authorized to hear; that includes personal information about you or your colleagues. ● You can simply ignore any question you think is improper and change the topic. Elicitation ● You can deflect the question with one of your own. ● You can give a nondescript answer. ● You can simply say that you do not know. Would You Recognize It? ● If all else fails, you can state that you would have to clear such discussions with your Security Office. Reporting Contacts Presidential Decision Directive NSC-12 requires that government employees report all contacts with individuals of any nationality, either within or outside of the scope of the employee’s official activities, in which: ● illegal or unauthorized access is sought to Department of Homeland Security classified or otherwise sensitive information. Office of Security Phone: (202) 447-5010 ● the employee is concerned that he may be the E-mail: OfficeofSecurity@dhs.gov target of actual or attempted exploitation by a foreign entity.
  • 2. What is it? Appealing to One’s Ego Volunteering Information (in hopes of getting something in return) In the espionage trade, elicitation is a technique Intelligence Officer: “You must have an important frequently used by intelligence officers to subtly position in your agency. Our host seems to think Intelligence Officers are always willing to trade extract information about you, your work, and very highly of you.” information. Don’t feel obligated to respond in your colleagues. kind merely because someone tells you something You: “Well, how nice of you to say so. As a matter interesting. Said another way, elicitation is the art of of fact, my job isn’t all that important. What I do conversation honed by intelligence services to its is...” Assumed Knowledge finest edge. Flattery often coaxes a person into a conversation If your companion talks as if he is knowledgeable that otherwise would not have taken place. The Dilemma about a particular subject (computers, nuclear Expression of Mutual Interest physics, whatever) or if you have assumed that he You never know if elicitation is being used is “up” on the subject, then what’s the harm in casually to pass the time or if it is being used to Intelligence Officer: “Oh, you have a background in discussing it, right? No, wrong. Assume nothing. gather intelligence data. computers; so do I. Perhaps you’d like to try out Tell nothing. the Sun Workstation I have at home. It’s really Why Elicitation? What is Its Appeal? powerful!” The Threat ● Elicitation is non-threatening. It is hard You: “Yes, I’d like to do that. That sounds Today’s world of openness offers almost unlimited to recognize as an intelligence technique interesting. I’ve always wanted to try out a opportunities to gather information through and it is easy to deny any wrongdoing. powerful workstation like that. I use a CAD/CAM direct personal contact. Each year, thousands of ● Elicitation is easy to disguise. It’s just program, but my computer...” U.S. Government officials and scientists come into conversation among colleagues and You have just agreed to extend your relationship contact with foreign colleagues both in the U.S. and friends. beyond the immediate social situation. This works overseas. ● Elicitation is effective. to an Intelligence Officer’s advantage. He now has Intelligence services invest significant resources in the opportunity to establish a deeper relationship identifying individuals who possess the knowledge Techniques “off-line,” in a venue that he controls. they desire. The information may not be classified, but it will be useful to their nation’s well being. There you are, at a social gathering, deep into a Deliberate False Statements conversation with someone you don’t know very Elicitation requires patience. Pieces of information well. There are questions back and forth over a Intelligence Officer: “Everybody knows, of course, that collected over an extended period of time can wide range of topics. How do you know when the Pakistanis have had nuclear technology for only provide the final piece of the puzzle to a complex the conversation is merely social and innocent two years.” problem or save the expenditure of scarce research and when it is being conducted for other You: “Actually, that isn’t true. They started in 1978 money. purposes? with a program to...” Potential You don’t know, really. There are, however, some Such statements have the curious property of tried and true techniques of gaining information. producing denials, along with the real facts, out of Keep in mind that a key element in any espionage These techniques are used by ordinary people in the listener. This is based on the deep-rooted need operation is to make it as easy as possible for ordinary conversations, as well as by intelligence that most people have to correct misstatements, to the target to share his information. After all, the officers in some not-so-ordinary conversations. inform people, and to appear to be “in-the-know.” elicitation is only conversation among colleagues and friends. What is more natural than that? We Here are some common techniques you may do it all the time. recognize: