Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Dedication Contents Washington DC, 2000 Introduction Out with the Old and in with the New Getting ‘Em to Talk—Elicitation Part One: The Secret Nature of Secrets What is a Secret? Types of Secrets Self-Focused Secrets Other-Focused Secrets The Function of Hiding Information Childhood Secrets Adolescent Secrets Adult Secrets Family Secrets Secrets in the Workplace The Effect and Influence of Secrets Secret Attractions, Secret Relationships and White Bears Can Unlocking Secrets Result in Health Benefits? Part One Key Points Part Two: Science in the Art of Unlocking Secrets What is Elicitation? Elicitation in Action Direct Elicitation Examples of Direct Elicitation Direct Elicitation Techniques Avoiding Stalemate—Asking Questions with Wriggle Room Dissolve Authoritative Barriers and Demonstrate Emotional Empathy Open-ended Questions Closed versus Open-ended Questions Using Silence Indirect Elicitation Indirect Elicitation Examples Indirect Elicitation Techniques ‘Being That Person’ using Likeability, Emotional Linking and Psychological Mirroring Part Two Key Points Part Three: Getting Engaged—Hook, Line and Syncher The Right Hook for the Right Fish Casting Your Elicitation Line Flattery Sharing a Secret Secret to Uncover a Real Secret Quid Pro Quo—Reciprocity Believe It: Disbelief Works! False Statement I’ll Never See You Again Pick a Common Enemy Exclusively Yours! Gee, You Really are Important; Please Tell Me More! Selecting a Syncher Part Three Key Points Putting It All Together: Unlocking Secrets to Solve a True Crime Excerpt One Excerpt Two Excerpt Three Excerpt Four Excerpt Five Excerpt Six Excerpt Seven Excerpt Eight Excerpt Nine Concluding Excerpt The Result Part Four: The READ Model of Elicitation Practical Keys for Unlocking Secrets How Spies Use READ Spelling Out the READ Steps STEP ONE: Research and assess the secret-keeper STEP TWO: Engage the secret-keeper—hook, line and syncher STEP THREE: Access the hidden information—segue to secrecy STEP FOUR: Divert the conversation Part Four Key Points Go for It! Endnotes Bibliography About the Author
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion