Human Intelligence Collection In the Modern Age

AMERICAN MILITARY UNIVERSITY
Charles Town, West Virginia
REDEFINING HUMAN INTELLIGENCE FOR THE MODERN AGE
A study submitted in partial fulfillment of the
Requirements for the degree of
MASTER OF ARTS
in
INTELLIGENCE STUDIES
by
Patrick John Sullivan
Department Approval Date:
April 30, 2012
The author hereby grants the American Public University System the right to display these
contents for educational purposes.
The author assumes total responsibility for meeting the requirements set by United States
Copyright Law for the inclusion of any materials that are not the author’s creation or in the
public domain
i
© Copyright 2012 by Patrick John Sullivan
All Rights Reserved
ii
DEDICATION/ACKNOWLEDGEMENTS:
To my wife, for permitting me to be MIA during this process, my mother for teaching me what I
know about writing, my father for his reassurance and knowledge base, all of my AMU
instructors for the lessons learned in two years of course work, and all the Coast Guard, DoD,
and Law Enforcement professionals who instilled a curiosity for the mystique of the HUMINT
trade and Dr. Hogan for giving me an excuse to study something I love.
iii
TABLE OF CONTENTS
CHAPTER
PAGE
I.
INTRODUCTION
1
II.
LITERATURE REVIEW
What Is HUMINT?
Capabilities
Limitations
Role of HUMINT
6
6
11
16
20
III.
METHODOLOGY
Data Collection Technique
Case Studies
Human Study
Limitations of Study
24
24
25
26
27
IV.
RESULTS
29
V.
DISCUSSION
Research Question
Definitions
Capabilities
Limitations
Future
Summary
32
32
32
33
37
38
39
REFERENCES
41
iv
I: Introduction
From the earliest days of the Republic, the United States has recognized the compelling
need to collect intelligence by clandestine means. For much of our history, this collection
could only be done by human agents. Recent technological developments have, of course,
vastly increased our ability to collect intelligence. The capacity of these technical systems
is awesome and our achievements are astonishing. However, these technical means can
never eliminate the need for human sources of information. Often, the more difficult the
target is, the greater is the need for human agents.
-John Deutch, Statement on the damage caused by Aldrich Ames
On the morning of February 18, 2001, Special Agent Robert Hanssen of the Federal
Bureau of Investigation (FBI) drove slightly less than a mile from his suburban Washington DC
home to Foxstone Park. It was colder than normal for that time of the year, and it was likely that
very few people would be at the park to see, let alone suspect, Hanssen. Having studied Soviet
and Russian tradecraft, Hanssen probably conducted pre-operational surveillance of the
footbridge near Creek Crossing Road to ensure that no curious onlookers were meddling around.
Anxious to offload his bundle of classified information, Hanssen did not notice the teams of FBI
agents who were closely watching his activities. Relieved, Hanssen placed the package under
the bridge, known as dead-drop site “Ellis” to him, and walked away. Little did he know, he was
walking away from an espionage career which lasted over twenty years. Heavily armed FBI
agents knew Hanssen carried a gun in his official duties and relied on the element of surprise to
ensure that Hansen didn’t take his life or the life of an arresting agent. What ensued were weeks
of debriefings by Justice Department officials and members of the US Intelligence Community
(USIC) which, as a cornerstone of a plea deal to avoid a death sentence, resulted in damage
1
assessments that exist at the TOP SECRET/SCI, SECRET, and unclassified levels. 1 The
Hanssen case exploited an organizational naivety to the risk and potential damage of a human
agent-in-place – a vulnerability that Hanssen exploited on behalf of the Komitet
Gosudarstvennoy Bezopasnosti or Committee for State Security (KGB), Glavnoye
Razvedyvatel'noye Upravleniye or Main Intelligence Directorate of the General Staff of the
Armed Forces (GRU) and Sluzhba Vneshney Razvedki or Russian Foreign Intelligence Service
(SVR). By the time he was arrested, Hanssen had compromised dozens of human assets,
including three of which were executed, numerous highly technical, highly classified Signals
Intelligence (SIGINT), Measurement and Signature Intelligence (MASINT), and Imagery
Intelligence (IMINT) programs and platforms, including Operation MONOPOLY, an FBI
project to tunnel under a new Soviet Embassy in Washington DC and obtain SIGINT and
MASINT.23 While the precise extent and nature of the information Hanssen compromised is
classified, the hundreds of millions (possibly billions) of dollars wasted, and years of time,
human resources, and technology cast irrelevant is a testament to the impact of a single wellplaced HUMINT source.
It goes without saying that Hanssen was not an isolated example of the history of
effective HUMINT. In 1753, Major George Washington of the Virginia Militia was dispatched
on behalf of the British Government to make observations on French fortifications, order of
1
U.S. Department of Justice, Office of the Inspector General, A Review of the FBI’s Performance in Deterring,
detecting, and Investigating the Espionage Activities of Robert Philip Hanssen (Washington, DC: Government
Printing Office, 2003).
2
David Wise, Spy: The Inside Story of How the FBI's Robert Hanssen Betrayed America (New York: Random
House, 2002): 98-110.
3
U. S. District Court for the Eastern District of Virginia, United States v. Robert Philip Hanssen, Affidavit in
Support of Criminal Complaint, Arrest Warrant and Search Warrants, Stefan A. Pluta (February 16, 2001).
2
battle, and troop strengths in the Ohio Territory. 4 In his day, though, there was no other choice;
there were no such thing as electronic signals, there were no signatures to measure, no cameras
which were practical for tactical employment, and no computers to hack. One variable that
George Washington accurately summarized remains constant, the need for intelligence and the
difficulty, no matter the means, of obtaining it: “There is nothing more necessary than good
intelligence to frustrate a designing enemy, and nothing requires greater pains to obtain.” 5 The
advent of Morse code and electric telegraphy, wireless telegraphy, the telephone, and the radio
changed the face of nineteenth century intelligence collection as intelligence professionals
changed their tactics and formalized the SIGINT discipline. As the industrial revolution
progressed and the twentieth century ushered in an era of rapid technologic development, other
intelligence disciplines such as MASINT and IMINT became valuable intelligence collection
tools. In World War I, services on both sides of the frontlines were using aerial surveillance
platforms to track troop movements and provide real-time intelligence on order of battle that
human sources couldn’t. Perhaps this was the pivot point that ushered in an apparent reduction
in the reliance on HUMINT sources. Indeed, when evaluating budgets, publicity, and
bureaucratic growth, the relationship between time and HUMINT appears to be an inverse
relationship. As the world entered the twenty-first century, the digitization and reliance on
information networks has apparently further reduced the need for human sources in lieu of cyber
warfare tools. The changes in technology may only be part of the reason why HUMINT has
declined in favor of other techniques amongst major intelligence services; the public perception
of HUMINT has been skewed by decades of secrecy and dramatization.
4
P.K. Rose, The Founding Fathers of American Intelligence (Center for the Study of Intelligence, US Central
Intelligence Agency, 2010), https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/booksand-monographs/the-founding-fathers-of-american-intelligence/art-1.html#rft1 (accessed January 23, 2012).
5
Ibid.
3
In the United States, declassification guidelines on various intelligence topics underscore
the public perception issues surrounding the role of HUMINT. In the US, Title 32 of the
Codified Federal Regulations part 2001 outlines classification guidelines for all manner of
national security information. Non-HUMINT operations considered to pose serious or
exceptionally grave danger to national security are classified between ten and 25 years from the
derivative classification date; whereas, “If an original classification authority is classifying
information that should clearly and demonstrably be expected to reveal the identity of a
confidential human source or a human intelligence source, the duration shall be up to 75 years.” 6
This means that HUMINT operations won’t typically be published until two to three generations
after the fact. It is no wonder that 75 year old news is not reported as part of the flavor-of-theday news cycles. As a result, military leaders, policy makers, and young people considering the
intelligence profession are not regularly sensitized to HUMINT operations. In the absence of
factual accounts of HUMINT operations and impacts, the aforementioned demographics are
relegated to learning about HUMINT from publishers and Hollywood directors: “Real spies may
not capture the public’s attention, but fake ones often do; Americans are watching more spy
movies than ever before. And those portrayals are seeping into how the public views the secret
world of intelligence.” 7 Furthermore, when real HUMINT news stories are reported, they are
perceived with less importance than other news stories. A Pew Research Center analysis of the
news cycle from August 24-30, 2009 supports the notion that legitimate information about the
HUMINT discipline is not well-received by an ill-informed populace – only three percent of
respondents indicated that a just-released CIA report on interrogation methods and suspected
6
President, Proclamation, “Classified National Security Information,” Federal Register 75, no. 123 (June28, 2010):
37256.
7
Amy B. Zegart, “’Spytainment’: The Real Influence of Fake Spies,” International Journal of Intelligence and
CounterIntelligence 23:4 (2010): 601-602.
4
detainee abuse at the Guantanamo Bay detention facility was the most closely followed story of
the week (the death of Senator Kennedy received over five times more attention).8 Because
HUMINT doesn’t get attention when it is reported in the news, the public perception draws
largely from fictional accounts of unrealistic HUMINT operations and operatives, and actual
HUMINT related information is so sensitive that people die before their appetite for non-fiction
tales can be satiated. All of this contributes to the status quo of a total misunderstanding of the
HUMINT discipline.
Those who work with HUMINT regularly can be generally grouped in to two categories:
those who, accepting the limitations of human source operations, understand and appreciate the
contribution of HUMINT to the common intelligence picture and those who see HUMINT as a
subjective and costly form of intelligence collection which diverts attention from other programs
and distracts decision makers with Bond-esque romance. Public misperceptions and opposing
opinions by those in the intelligence community suggest that few outside of the HUMINT
discipline have an understanding of the field and those who do have apparently failed to clearly
establish HUMINT as a cornerstone of the intelligence picture in the modern age. This paper
seeks to define HUMINT, discuss and highlight capabilities and limitations, and analyze its role
in modern intelligence. By objectively evaluating HUMINT as a whole, this paper aims to
enlighten the average citizen and intelligence professional outside of the HUMINT field.
Nothing in this study rises to the classified level, a fact which makes a study on the highly
sensitive nature of HUMINT difficult; luckily, the James Bonds and Jason Bournes of the world
have inspired significant scholarly and professional works used as a basis for an extensive review
of pertinent literature.
8
Pew Research Center, “Public Worried, Informed About H1N1” (September 3, 2009), under “Top News Stories,”
http://pewresearch.org/pubs/1331/public-worry-swine-flu-confidence-in-government (accessed March 17, 2012).
5
II: Literature Review
Works on the subject of HUMINT appear to originate from all manner of authors, from
former HUMINT case officers, to those in academia, and some who present HUMINT in a
manner which furthers some political aim. The most difficult factor in conducting a review of
applicable literature is determining what is, in fact, applicable. As in HUMINT operations, the
establishing of bona fides is a point which, when present in HUMINT works, assists in
establishing credibility. Literature on HUMINT tends to fall in to one of several categories:
General explanations/defining HUMINT, capabilities of HUMINT, limitations of HUMINT, the
role of HUMINT in the intelligence picture, the future of HUMINT and special interest or
politically charged HUMINT related topics such as interrogation tactics or detainee treatment.
Consistent with this study’s aim to provide an accurate understanding of the role of HUMINT in
the modern age, literature will be presented which discusses current works’ takes on the
definition, capabilities, limitations, role, and outlook of HUMINT.
What is HUMINT?
When defining HUMINT through the lens of the USIC, one first must understand the
service and functional components of the USIC responsible for conducting HUMINT operations.
Of the 17 agencies that compose the USIC, ten participate in at least limited HUMINT missions:
CIA, DIA, US Army, Navy, Marine Corps, Air Force, Coast Guard, FBI, and DEA. 9 The
Director of National Intelligence has delegated the regular administration of the HUMINT
9
Joint Chiefs of Staff, Joint Publication 2-0: Joint Intelligence, 2007 (Washington, DC: Government Printing
Office): III-4,5.
6
mission to the Director of CIA; however, the only definition of HUMINT found in official but
unclassified CIA publications is “Vital information from human sources acquired by Core
Collectors of the National Clandestine Service in response to national intelligence
requirements.” 10 That definition is of little applicability to the other nine agencies that practice
HUMINT. A better definition comes from the second most applicable actor in the HUMINT
field: the DoD. Joint Publication (JP) 1-02 defines all military terms and describes HUMINT as
“A category of intelligence derived from information collected and provided by human
sources.” 11 If JP1-02 left the definition as stated above, the ambiguity could be interpreted
differently by every service and could lead to inconsistencies within the USIC. Joint Publication
2-0 further defines HUMINT as being comprised of separate and distinct parts: Interrogation,
source operations, debriefing, and document exploitation. 12 While this breakdown may work for
the military services, agencies working overseas with non-citizens and domestic agencies,
especially police forces, cannot operate with the relative impunity of the military HUMINT
forces. A telling example of the uneasiness with the association of the word HUMINT comes
from the Coast Guard Intelligence Program:
Interagency partners frequently associate the term HUMINT with collecting foreign
intelligence, maintaining confidential sources, possessing specialized foreign intelligence
HUMINT training, employing particular tradecraft, and operating under different
authorities than the Coast Guard. Due to the Coast Guard’s law enforcement and
regulatory authorities, Coast Guard law enforcement intelligence element personnel use
the term LEIC rather than HUMINT when describing their collection activities. 13
The effect of specifying the missions of HUMINT in the definition is to alienate domestic Law
Enforcement and intelligence agencies such as the Coast Guard and contribute to the general
10
National Clandestine Service, “Human Intelligence,” Central Intelligence Agency, https://www.cia.gov/offices-ofcia/clandestine-service/intelligence.html (accessed March 17, 2012).
11
Joint Chiefs of Staff, Joint Publication 1-02: Department of Defense Definition of Military and Associated Terms,
2010 (Washington, DC: Government Printing Office): 156.
12
Joint Chiefs of Staff, Joint Publication 2-0: Joint Intelligence, 2007 (Washington, DC: Government Printing
Office): 2-4.
13
United States Coast Guard, Publication 2: Intelligence, 2010 (Washington, DC: Government Printing Office): 6,7.
7
confusion of the term. Most literature that discusses in part or in whole the definition of
HUMINT makes one of three errors: Defining HUMINT as a factor of examples or capabilities,
over-specification as a cumulative of sub-disciplines, or incorporation of counterintelligence in
the definition.
Scholarly and academic works meant to familiarize unfamiliar individuals with the
sweeping spectrum of USIC functions and capabilities tend to define HUMINT by providing
either broad, unhelpful definitions or examples and capabilities of the discipline. In a required
reading for an introductory course of American Military University’s Intelligence Studies
programs, Jeffrey Richelson defines HUMINT by explaining typical HUMINT collectors, the
objectives of HUMINT collectors, the use of HUMINT in the Global War on Terrorism
(GWOT), and the clandestine and overt components of HUMINT. 14 Explanations such as these
suffice as a primer of HUMINT in the USIC, but do not do the discipline justice because it
doesn’t leave the limits of HUMINT to the imagination of the reader; they provide limits as a
function of the examples used. Using stories of penetrations into hostile organizations or nations
such as the Taliban or the Chinese Government to define HUMINT is similar but slightly
different than the practice by some scholars and many official publications which outline
HUMINT as a sum of its parts.
One of the most highly publicized US HUMINT publications was developed in the
shadow of interrogation and alleged detainee abuse scandals at Abu Gharib and Guantanamo
Bay and its use was directed by President Obama via executive order on his first day in office. 15
Army Field Manual (FM) 2-22.3 replaced FM 34-52 and outlines the upper and lower limits of
14
Jeffrey Richelson, The US Intelligence Community (Boulder: Westview Press, 2008): 291-310.
Adam Lankford, “Assessing the Obama Standard for Interrogations: An
Analysis of Army Field Manual 2-22.3,” Studies in Conflict & Terrorism 33 (2010): 20-35.
15
8
HUMINT operations, the HUMINT process, and explains authorized Techniques, Tactics, and
Procedures (TTP) for HUMINT collectors. The manual defines HUMINT as
“The collection of information by a trained HUMINT collector […] from people and their
associated documents and media sources to identify elements, intentions, composition, strength,
dispositions, tactics, equipment, personnel, and capabilities.” 16 Left alone, this definition stands
as one of the most comprehensive and flexible definitions of HUMINT which could be
interpreted by foreign HUMINT collecting agencies as well as domestic HUMINT or LEIC
collectors. Unfortunately, FM 2-22.3 goes on to break down HUMINT as the umbrella term for
the HUMINT disciplines of Military Source Operations (MSO), allied and host nation liaison,
elicitation from human sources, tactical and strategic debriefing, enemy prisoner of war and
detainee interrogation, and document exploitation (DOCEX). 17 Taking the Army’s definition of
HUMINT in whole is an example of defining a term as a sum of its parts, and, because of its
over-specification, it alienates domestic HUMINT agencies. A definition useful across
jurisdictional and mission lines is found by separating the Army definition and using only the
broad and flexible initial definition. A major strength of the FM2-22.3 is the manner in which
Counterintelligence activities are clearly and appropriately presented as distinct activities from
the broader term of HUMINT – this practice is in sharp contrast to the practice of other
HUMINT agencies and scholars that group the two together. This relationship is best shown in
figure one, HUMINT vs. CI Functions, found in FM2-22.3.
In Virginia Beach, Virginia, on an unassuming street, the US Navy and Marine Corps
teach the Marine Air Ground Task Force (MAGTF) CI/HUMINT course. At this 15 week
course, young sailors and marines are taught how to become CI/HUMINT assets for the
16
Department of the Army, Field Manual 2-22.3: Human Intelligence Collector Operations (Washington, DC:
Government Printing Office, 2006):1-4.
17
Ibid, 1-4,5
9
Department of the Navy. In contrast to the Army’s definition of HUMINT as entirely
independent of CI, Navy and Marine Corps doctrine groups CI and HUMINT collectors and
operations together. 18 By grouping HUMINT and CI together, the Navy and Marine Corps assert
that HUMINT and CI cannot be done independently and one constitutes the other. This is
simply not true. Counterintelligence operations may incorporate other types of intelligence
collection, such as Communications or Signals Intelligence (COMINT or SIGINT) and
conversely, HUMINT will often not pertain to the capabilities, intentions, or activities of a
foreign intelligence service.
18
Department of the Navy, Marine Corps Warfighting Manual 2-1: Intelligence Operations, 2003 (Washington,
DC: Government Printing Office): 3-9.
10
Figure 1: HUMINT vs. CI Functions 19
An analysis of HUMINT definitions concludes that despite some deviations, the least
common denominator is similar to what is described by JP 1-02 – essentially, HUMINT is
simply information, collected against a requirement, that originates from human sources. What
most of these definitions omit is recognition of the training and qualifications necessary to be an
effective and ethical HUMINT collector. After defining HUMINT, an understanding of the
discipline’s capabilities is a critical factor in establishing its place among other assets in the
modern intelligence age.
Capabilities
In order to analyze the definitions of HUMINT, the USIC was filtered in order to reveal
the functional and service members that were subject matter experts; to evaluate the capabilities,
one quickly finds that the ends of the spectrum are often determined by other fields, especially
psychology and politics. This fact is underscored by numerous case studies and literature in
academia and government which tell of HUMINT successes or near-misses and reveal that the
targets and manner of exploitation are only limited by political restrictions, psychological pitfalls
or failures of established TTP. Unfortunately for academia, even cursory research into the
capabilities of HUMINT collection reveals that most agencies maintain HUMINT TTP and
discussions of capabilities at the SECRET level or higher. Despite this limiting factor, three
works provide a comprehensive and unclassified look at the methods used to conduct HUMINT
operations. Of these, Army FM 2-22.3 defines HUMINT, outlines strengths and weaknesses and
19
Department of the Army, Field Manual 2-22.3: Human Intelligence Collector Operations (Washington, DC:
Government Printing Office, 2006): 1-6.
11
spells out HUMINT TTP used by Army personnel, while a work that can shed light on the
psychological component of HUMINT is Cottam, Dietz-Uhler, Mastors, and Preston’s
Introduction to Political Psychology.
Intelligence collection through the use of satellites, airborne, or offshore platforms does
not require the political discretion required of operating human assets in foreign or hostile
territories. Extensive training teaches HUMINT collectors to be capable of managing numerous
human sources while possibly gaining personal access to information, documents, or places
which may satisfy intelligence requirements. In order to target, recruit, and effectively obtain
information from a human source, one requires an understanding of political psychology.
Cottam et al define political psychology as “Explaining what people do, by adapting
psychological concepts, so that they are useful and relevant to politics, then applying them to the
analysis of a political problem or issue” which in turn allows those proficient in the field to
anticipate, understand, and influence political behavior. 20 Throughout the book, Cottam et al
seek to explain why people do what they do. This is an important lesson in HUMINT operations
because it is critical to understand the motivation of the human source that is providing
information. The book explains those motivations through the lens of national and international
leaders explaining how they process the world around them and why decisions are made
consistent with identities and perceptions. Applying those principles to non-leaders can serve to
explain who provides information to HUMINT collectors. For domestic intelligence collection,
human sources would likely demonstrate nationalistic tendencies, and the book dedicates a full
chapter to explaining nationalism and provides HUMINT collectors with a perspective that can
be used to understand these individuals: “First, nationalists tend to be more sensitive than nonnationalists to threats to the nation-state, and the image through which they view the threatener is
20
Martha L. Cottam et al, Introduction to Political Psychology (New York: Psychology Press, 2010): 5-7.
12
extreme.”21 Understanding the cognitive justification of nationalists to report information on
perceived deviants and inferior out-groups is critical for follow-on exploitation of the source and
influences determinations of credibility and reliability. When conducting foreign HUMINT, a
study of conflict and political dissidence is more appropriate, and reporting sources can be
explained by the concept of dissonance, a form of explaining why a person would provide
information contrary to the group: “Dissonance refers to an aversive state that results when our
behavior is inconsistent with our attitudes. Dissonance creates psychological tension, which
people feel motivated to avoid through selective attention to information. Once dissonance is
experienced, people are motivated to relieve it.”22 These psychological explanations are
important to HUMINT collectors as a basis of determining what kind of personality is most
sensitive to manipulation and what TTP should be employed for maximum extraction of
information. The types of TTP used by HUMINT collectors once a source of information has
been identified are best detailed in Army FM 2-22.3.
Partially as a result of the detainee scandals at Abu Gharib and Guantanamo Bay and
partially due to the US Governments transition to a time of transparency in government
operations, the US Army published FM 2-22.3 as an unclassified, publicly available guide to
Army HUMINT operations. The manual explains, in detail, the various allowed TTP to be used
when interacting with foreign non-combatants, enemy prisoners of war (EPW), and enemy
combatants. Because of the Posse Comitatus act, the Army is forbidden from conducting law
enforcement operations within the United States and as such, guidance does not exist in FM 222.3 regarding TTP to be used on American citizens. This shortcoming is overshadowed by the
depth and detail of the information contained in the manual. The Army divides HUMINT
21
22
Martha L. Cottam et al, Introduction to Political Psychology (New York: Psychology Press, 2010): 234.
Ibid, 41.
13
operations in to one of four categories: Human source contact operations, debriefing,
interrogation, or liaison. Human source operations are the types of information most commonly
associated with the term HUMINT and include one-time, continuous, and formal contacts. Of
the three, only formal contacts can be tasked, trained and paid informants to US forces. 23 In
order to obtain information from one-time and continuous contacts HUMINT personnel will
sensitize, but not outright task contacts to answer intelligence requirements and use “systematic
questioning, deception detection techniques, and crosschecking of information” in order to
determine the veracity of the source’s information. 24
Debriefing operations are defined by FM 2-22.3 as “The systematic questioning of
individuals not in the custody of the US, to procure information to answer collection tasks by
direct and indirect questioning techniques. The primary categories of sources for debriefings are
friendly forces and civilians including refugees, DPs, and local inhabitants.” 25 Unlike
interrogation, the exact techniques and protocol used in debriefing is classified at the
SECRET//NOFORN level; however debriefing operations are typically conducted as a result of
or as a component of regular Army operations such as patrols, forced entry operations, or
checkpoints.
The term interrogation stirs strong emotions in the United States and brings to mind
practices such as water-boarding and maltreatment. In reality, interrogation is defined by two
standards; one, for use in military operations and against an EPW or enemy combatant is “The
systematic process of using approved interrogation approaches to question a captured or detained
person to obtain reliable information to satisfy intelligence requirements, consistent with
23
Department of the Army, Field Manual 2-22.3: Human Intelligence Collector Operations (Washington, DC:
Government Printing Office, 2006):5-2 - 5-7.
24
Ibid, 5-3.
25
Ibid, 5-7.
14
applicable law and policy.” 26 When interrogation is used against US persons, or persons
detained by US law enforcement personnel suspected of breaking US law, it is defined as
“questioning initiated by law enforcement officers after a person has been taken into custody or
otherwise deprived of his freedom of action in any significant way.” 27 Aside from the source of
information the primary difference in tactics is the objective – for military interrogations, the
purpose is to fulfill an intelligence requirement, for law enforcement, it is to solve a crime. In
both cases, physical abuse of the subject is strictly prohibited by the Geneva Accords and the US
Constitution. As opposed to physical coercion, interrogators rely on psychological techniques to
answer questions to sensitive requirements. The Army provides 18 approaches, or techniques, to
conduct interrogations and span from less complicated forms such as direct questioning to more
complicated types such as Rapid Fire. 28 One fallacy of the Army manual is the assertion that
these interrogation approaches must be done within the controlled environment of the
interrogator’s choosing. The lack of discussion of conducting such approaches in less or
uncontrolled environments leaves questions for those who look for alternative applications to the
approaches defined in FM 2-22.3. A component of interrogation, debriefing, and contact
operations is the TTP associated with asking questions.
One of the most elusive objectives of a HUMINT collector and one of the strongest
arguments for the HUMINT discipline is the ability to determine what information is credible.
Army FM 2-22.3 addresses the issue of determining credibility and truth by detailing various
questioning techniques used by military and law enforcement agencies and taught by civilian
interrogation and interview courses such as the one run by the Reid Institute. Interviewers and
26
Department of the Army, Field Manual 2-22.3: Human Intelligence Collector Operations (Washington, DC:
Government Printing Office, 2006): 5-13.
27
Miranda v. State of Arizona, 384 U.S. 436 (1966).
28
Department of the Army, Field Manual 2-22.3: Human Intelligence Collector Operations (Washington, DC:
Government Printing Office, 2006):8-1 - 8-16
15
interrogators will use any combination of initial/topical, follow-up, nonpertinent, repeat, control,
or prepared questions in the conduct of a typical questioning session. 29 Using these specific
forms of questions, interviewers can pair verbal responses with non-verbal and para-linguistic
cues to determine the truthfulness of the subject’s answers. These questioning techniques are
extracted from a chapter that goes on to discuss the equally pertinent practices of identifying
deceptive behavior and the practice of elicitation – techniques which are used by military and
law enforcement questioners. In all, FM2-22.3 is one of the most comprehensive and recent
sources of HUMINT TTP and though mission-focused for the Army, could serve as a guide to
other HUMINT collectors for HUMINT collection operations. The extensive capabilities of
exploiting human weaknesses and manipulating situations for a collector’s gain can only be fully
understood when considered against the limitations of the discipline.
Limitations
As the capabilities of human source operations are linked closely to psychological
fundamentals, so too are the limitations. When one human obtains information from another
human, many factors are taken in to account in order to determine the value of the reporting
source. The psychological principle of perception affects the manner in which a human source
understands and processes first hand information, and the reason the source of information is
providing the information can be one of many factors used to determine the reliability and
credibility of the source. Indeed, determining source credibility and reliability is one of the three
most limiting factors of HUMINT operations; the other being obtaining sources with sufficient
29
Department of the Army, Field Manual 2-22.3: Human Intelligence Collector Operations (Washington, DC:
Government Printing Office, 2006): 9-2.
16
placement and access to provide information fulfilling intelligence requirements and the time and
resource requirements needed to target, recruit, and operate human sources.
Nearly all psychology texts include some discussion on the definition, role, and impact of
perception on human cognition. If HUMINT in its most pure form is simply information
obtained from a human source, and human sources are influenced by the perception of the
source’s surroundings, it follows that HUMINT in its most pure form is influenced by the
perception of source’s surroundings. Perception is defined most simply as “The study of how the
mind interprets information provided by the senses.” 30 Whether a HUMINT collector is
obtaining information from another human source or collects it themselves, accurate intelligence
dissemination relies on an ability to accurately perceive one’s surroundings. Four factors
relating to perception can influence a human source’s ability to understand their surroundings:
primacy effect, recency effect, halo effect, and projection bias. Primacy effect is the
scientifically backed concept of first impressions that restricts a person’s ability to look beyond
the first even in a sequence as a basis for their overall interpretation of a situation. Recency
effect is just the opposite, by focusing on the last events in a sequence, the earlier events are
overlooked. The halo effect is “a perceptual error whereby our general impression of a person
[or situation], usually based on one prominent characteristic, colors the perception of other
characteristics.” 31 Finally projection bias, studied extensively by intelligence analysts, is the
concept of applying one’s own norms, beliefs, and behaviors to another. Taking these perceptual
shortcomings in to account, it is easier to understand some HUMINT failures of the past,
including that of the legendary “Curveball,” a source used extensively to prove the existence of
the Iraqi WMD program prior to the US invasion in 2003, where HUMINT collectors failed to
30
31
Ian Stuart-Hamilton, Key Ideas in Psychology (Philadelphia: Jessica Kingsley Publishers, 1999): 175.
Steven McShane and Mary Ann Von Glinow, Organizational Behavior (New York: McGraw-Hill, 2008): 82-83
17
recognize that the source’s information was probably more of a result of the primacy and halo
effects than an accurate depiction of the status quo. 32 The misstep also suggests that US
intelligence personnel mis-judged the credibility of the source leads.
Educing Information is a compilation of articles written on the practice of HUMINT for
the Office of the Director of National Intelligence and focuses on interrogation and the extraction
of information from human sources. In it, experts in the field of intelligence, psychology, and
political science make a case for a change in at least one paradigm of HUMINT collection. One
article in particular underscores the difficulty of determining the veracity of sources: “Methods
of detecting when an individual is attempting to deceive a listener constitute a primary basis for
assessing the potential utility and validity of information obtained from human sources.” 33
Without an accurate assessment of credibility, human source information may be discounted or,
in the case of some sources used by Secretary of State Powell during his speech on Iraqi WMD
before the United Nations, may be overstated or exaggerated. Hazlett agrees with other military
training and interrogation expert’s findings that deception is most likely to manifest itself in the
form of nonverbal cues, verbal cues, and paralinguistics. Hazlett found that “most nonverbal
cues to deception do not appear to be useful,” “results of studies on verbal behavioral cues
appear rather positive,” and “most paralinguistic cues do not appear to be effective.” 34 Hazlett
goes on to explain how his research design struggled to quantify the results of a human study and
determined that further research design was necessary to make a convincing argument for or
against the three factors of identifying deceptive behavior. What is absent from Hazlett’s
research is the concept of baselining. During the course of an interview or interrogation, military
32
Robert Jervis, Why Intelligence Fails (Ithaca: Cornell University Press, 2010): 140.
Gary Hazlett, “Research on Detection of Deception What We Know vs. What We Think We Know,” in Educing
Information, ed. Intelligence Science Board (Washington DC: National Defense Intelligence College Press, 2006):
46.
34
Ibid, 48-49.
33
18
technical manuals and training documents teach that subjects must be determined to have a
baseline of typically truthful behavior. Hazlett does not suggest that interviews or interrogations
in his human study began with the questioner asking questions that the subject had no reason to
lie about and calibrate the subject’s behavior. Establishing a baseline can also be accomplished
by becoming more familiar with continuous or formal contacts; however, screening a pool of
informants for the one with placement, access, and helpful motives is another limitation to
conducting successful HUMINT operations.
Screening techniques and source profiling are important for HUMINT practitioners in
order to focus limited time and resources on the proper source and ensure that the most credible
and pertinent information is being obtained. Determining the credibility of a contact is closely
tied to psychology, and an understanding of why sources report information is as important for
determining the proper interrogation approach as it is a basis for information credibility. An
article written by CWO3 Gregory Garcia explains that source profiling and screening is
important because of the large number of available human sources in a particular area of
operations and the very limited supply of trained and certified HUMINT personnel. Garcia
proposes a five step process: Identify potential sources and develop categories; develop source
indicators for each source group; select primary and alternate approach techniques; develop
approach indicators; and orchestrate approach strategies. 35 The basis of the process which results
in better HUMINT is the identification and analysis of potential sources. Garcia does not delve
into the fine details of how such profiling should be done, other than to reiterate doctrine from
FM2-22.3 that suggests exploiting non-confrontational, non-combative sources as a first option.
Despite the lack of detail, Garcia concludes that Collectors’ abilities to understand the sources,
their behaviors, attitudes, and the environment will determine the effectiveness of their collection
35
Gregory Garcia, “Tactical Source Profiling and Indicator Analysis,” Military Intelligence (March, 2003): 37-41.
19
operations. Source profiling is one method that supports tactical mission planning and the
successful implementation of HUMINT and CI methodologies.” 36 Despite what existing
literature presents as limitations of HUMINT, the discipline remains well-poised to play a critical
role in answering intelligence requirements as a stand-alone operation or in support of other
intelligence collection disciplines.
Role of HUMINT
An exhaustive search of a comprehensive work that analyzed the role of HUMINT and its
interdependency on the other major intelligence collection disciplines did not yield any tangible
results. An alternative found during research was analysis of the other intelligence disciplines
using a comprehensive introductory-style book, and evaluating a possible unstated HUMINT
connection. Jeffrey Richelson’s The US Intelligence Community was assigned reading for
American Military University’s INTL501: Introduction to Intelligence, and provides an ideal
balance between presenting a broad range of topics and offering enough detail and examples in
to each topic to provide background information and an understanding of the roles of the
intelligence disciplines in the broader context of the USIC. This review will specifically focus
on the role of HUMINT as a stand-alone function, and its role in Signals Intelligence (SIGINT),
Imagery Intelligence (IMINT), Measurement and Signature Intelligence (MASINT) and Open
Source Intelligence (OSINT).
Stand-alone HUMINT operations are what most HUMINT articles, case studies, and
technical manuals mean when they talk about HUMINT. On its own, HUMINT can be
invaluable for any intelligence enterprise. As a cornerstone of the oldest intelligence discipline,
36
Gregory Garcia, “Tactical Source Profiling and Indicator Analysis,” Military Intelligence (March, 2003): 41.
20
human agents are invaluable because of their knowledge of a broad range of intelligence
requirements, an ability to interact with others, and a target limit bound only by a collection
manager’s imagination. An extensive HUMINT operation was undertaken to locate and capture
Saddam Hussein in the second Gulf War. Because Saddam relied on a low-technology and tightknit network to keep him hidden, there were few emissions to point to a location, no imagery that
would have found the spider hole he was hiding in, and MASINT or OSINT that had any real
applicability. Integrated teams of Central Intelligence Agency agents and military Special
Forces operatives joined together and conducted numerous interviews and interrogations of
known associates of the fallen-from-glory leader which lead one step closer to the objective. 37
The intelligence that finally led to finding Hussein came from the interrogation of an identified
sympathizer immediately prior to the raid on the Tikrit farmhouse where Hussein was ultimately
found.38 The intelligence operation to find Hussein is a prime example of a HUMINT-centric
operation, but other intelligence operations, such as SIGINT can be impacted by HUMINT.
The intercept and exploitation of electronic signals is the most literal definition of
SIGINT. Richelson describes SIGINT as an accumulation of SIGINT operations throughout
history and brief dialogues on its potential usage. Of particular interest to HUMINT collectors is
the idea that land lines or signals sent over a physical transmission medium can generally only be
intercepted and exploited if a device is placed on or in close proximity to the transmission line. 39
Obtaining the information that a physical line exists, the location of the line, and the types of
information transmitted over the line are all questions HUMINT collectors could answer as a
cornerstone to the SIGINT operation. It is worth noting that HUMINT is also important for
37
Yochi Dreazen et al, “Holed Up: U.S. Troops Capture Saddam Hussein; Dramatic Seizure Changes Reality From
Baghdad To the White House; Intelligence Effort Pays Off,” Wall Street Journal, December 15, 2003.
38
Ibid.
39
Jeffrey Richelson, The US Intelligence Community (Boulder: Westview Press, 2008): 212.
21
counter-SIGINT operations – a vastly expensive lesson learned by the US after FBI Special
Agent Hanssen’s betrayal, whereby “In one case, he compromised an entire technical program of
enormous value, expense and importance to the United States Government. In several other
cases, he compromised the United States Intelligence Community's specific communications
intelligence capabilities.” 40
Like all of the intelligence disciplines, IMINT is self-described as the capturing of
imagery from targets of intelligence value. In the first half of the twentieth century, this was
only possible through the modification or dual-outfitting of military warplanes with photographic
equipment. During the space age and arms race in the second half of the century, IMINT
platforms evolved to a heavy reliance on spacecraft capable of high-resolution close-up images
or broad, coarsely detailed images for targeting. In one example of the use of IMINT, Richelson
describes the detection of a secret Russian facility: “US imagery satellites monitored Russian
construction of a huge underground military complex inside Yamanatau Mountain in the Ural
mountains as well as a second underground facility at the same location.” 41 Once the work was
done however, how would overhead imagery platforms ascertain the contents or function of the
facility? To answer that question, intelligence planners would have to rely on HUMINT. While
an application of HUMINT to IMINT operations is not a stretch of the imagination, MASINT
and OSINT collection reduce the incorporation of HUMINT by their nature.
Measurement and Signature Intelligence is described by Richelson simply as any
“Remote technical collection other than SIGINT and traditional imagery intelligence.” 42 There
is no typical target of MASINT; Richelson lists dozens of potential uses of MASINT ranging
40
U. S. District Court for the Eastern District of Virginia, United States v. Robert Philip Hanssen, Affidavit in
Support of Criminal Complaint, Arrest Warrant and Search Warrants, Stefan A. Pluta (February 16, 2001).
41
Jeffrey Richelson, The US Intelligence Community (Boulder: Westview Press, 2008): 183.
42
Ibid, 245.
22
from detections of nuclear detonation to identifying strategic bombers based on electro-optical
emissions, radar information, and acoustics. 43 Of particular interest is one of Richelson’s
conclusions, that only a small amount of MASINT is useful because of the difficulty of
positively matching the information with an emitter. Though Richelson stops short of suggesting
HUMINT or other inter-disciplinary correlation, if an unknown platform could be positively
identified by a human source (such as an air traffic controller or flight crew), MASINT
signatures could be verified. Finally, OSINT has gained traction as a low-risk, low-cost method
of obtaining economic, military, and political information on an adversary. While most OSINT
is collected from publically available publications and internet sources, Richelson hints at a
HUMINT component: “A significant portion of the intelligence gathered by the CIA and other
intelligence organizations is acquired by means of electronic surveillance and emplaced sensors
[…] and it requires trained personnel to install the surveillance devices.” It is very likely that the
person trained to install such a device is a HUMINT formal source or HUMINT operative.
43
Richelson, The US Intelligence Community (Boulder: Westview Press, 2008): 246.
23
III: Methodology
Data Collection Technique
This research study sought to use a mixed method approach including qualitative analysis
of scholarly or academic works, case studies, government publications, military doctrine, and
non-fiction works and quantitative analysis of the ability to recognize truthful or deceptive
behavior demonstrated by subjects of Coast Guard Law Enforcement Intelligence Collection,
consistent with the author’s professional duties. Creswell’s technique of Sequential Exploratory
Design was used to collect qualitative data from the aforementioned existing works and analysis
was done in order to determine what tools, techniques, and procedures would be most likely to
result in an ability to increase the accuracy of determinations of credibility of human derived
intelligence.44 In total, over 70 articles, books, military manuals, white papers, government
publications and case studies were reviewed. As a result of this qualitative research, works were
determined to address one of the following categories that correspond to the more broad research
question of determining the role of HUMINT in the modern age: Definitions, TTP, capabilities
and/or limitations, legal and cultural hot-button issues, the role of HUMINT related to other
intelligence collection disciplines, and analysis of historical HUMINT operations. Analysis of
works regarding TTP and capabilities was used during quantitative data collection from
American military, cleared defense contractor, and foreign maritime personnel. An initial
sample size of ten human sources was used to determine the feasibility of such a study, resulting
in the subsequent abandoning of the mixed method approach as a result of a lack of control of the
44
John W. Creswell, Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (Los Angeles:
Sage Publications, 2009): 203-209.
24
study environment, study results from existing works, and an inability to correlate assessments of
behavior with the truthfulness of the subject. While the quantitative portion of the study would
have served to support or challenge the qualitative analysis, it was determined that it was not
absolutely necessary in order to answer the research question as the results would only have
addressed the capabilities and limitations factor and observations of human sources.
Observations of interviewees will be presented; however, they will be applied through the lens of
the author’s role as the interviewer, an approach Creswell describes as “Participant as observer
[with the] observation role secondary to the participant role.” 45 A qualitative approach is
appropriate for this type of research study which seeks to understand and analyze the nature of
HUMINT collection practices and policy. The results of this study capitalize on analysis of
existing works in order to explain to the reader the role of HUMINT in the context of the USIC
and offer recommendations as to how HUMINT may be better utilized in the future.
Case Studies
Consistent with Creswell’s guidance on conducting qualitative research, a variety of
methods were evaluated and weighed against the existing pool of research, resulting in the
decision to use the case study approach. The case study technique was determined to be the most
applicable because the objective of defining HUMINT’s role was quickly determined to require
an in depth exploration of “[…] A program, even, activity, process, or one or more
individuals.” 46 Historical case studies on HUMINT failures of the United States such as the
failures resulting in poor intelligence for the Bay of Pigs invasion and pre-war intelligence of
45
John W. Creswell, Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (Los Angeles:
Sage Publications, 2009): 179.
46
Ibid, 13.
25
Iraq’s WMD program were analyzed against HUMINT successes of other nations, such as the
success of the Soviet Union to operate Robert Hanssen over a span of two decades. This study
did not focus on the legal ramifications of conducting HUMINT operations, except for a review
of the Miranda v. State of Arizona case which continues to serve as the primary legal basis for
conducting criminal interrogations and obtaining HUMINT from individuals suspected of a
crime. In lieu of legal cases to study, a more holistic approach was used to study the cases made
by individuals whose contributions to the field of HUMINT constituted the research base for this
study. Historical case studies, while enlightening, focused more on a historical perspective and
the causes and effects of poor intelligence on the situation of interest. Analysis of these specific
cases did not provide any appreciable information not gleaned through research and analysis of
non-specific assessments of HUMINT-related topics.
Human Study
As mentioned earlier, a feasibility study was conducted in order to determine the
potential of conducting a human study to determine the success and failure rates of individual
HUMINT TTP. Two existing works specifically addressed such a study, and both suggested that
a large and diverse sample size with a well-developed research design was unsuccessful in
developing useful information for furthering the qualitatively obtained research. John Reid, a
renowned expert on the conduct of criminal interviews and interrogations points out that when
subjects are instructed to lie on purpose, their behavior is not representative of those who lie
without premeditation. 47 A study by psychologist Gary Hazlett expounds on such a challenge
47
Fred Inbau et al, Essentials Of The Reid Technique: Criminal Interrogation And Confessions (Sudbury, MA:
Jones and Bartlett Publishers, 2005): 78-80.
26
and concludes that no pertinent study of identifying deceptive behavior has done so with the
proper research framework and did not suggest any comprehensive solution for conducting an
unbiased and successful human study. 48 Specifically, Hazlett explained that many studies used
college students as the sole sample group (inadvertently sampling from a pool of the generally
more intelligent) and that sample sizes were too small to verify the effectiveness of more than a
few specific TTP (sample sizes were cited as averaging 40 or less per study). 49 The feasibility
study was completed in the role of “participant as observer” as defined by Creswell and sampled
two trained HUMINT collectors, two non-HUMINT military personnel, two foreign nationals,
two cleared defense contractors, and two civilians. All interviews were done consistent with the
author’s official duties, and no additional level of scrutiny was required in order to obtain
information pertinent to this study.
Limitations to the Study
Nearly immediately it became obvious that considerable amounts of information
regarding HUMINT exists at classified or controlled unclassified levels. Numerous examples of
this limiting factor were found throughout the research process; one of the first of which was an
attempt (and failure) to find details on what the CIA considers to be the role of HUMINT within
the parameters of this study – an especially disappointing failure because the CIA is the primary
USIC agency for conducting HUMINT operations. Professionally obtained training material and
lessons were also off limits for this study because of the Coast Guard’s handling of their
48
Gary Hazlett, “Research on Detection of Deception What We Know vs. What We Think We Know,” in Educing
Information, ed. Intelligence Science Board (Washington DC: National Defense Intelligence College Press, 2006):
49-54.
49
Ibid, 51.
27
Intelligence Program at the UNCLASSIFIED//FOR OFFICIAL USE ONLY (FOUO) level. The
discussion of HUMINT at the purely unclassified level also prevented access to military
HUMINT instructors and officers, who did not feel comfortable filtering their knowledge for an
unclassified forum. Finally, the time frame and proposed scope of the study were limiting
factors which were compromised in order to gather and analyze useful information. Though
over 70 works were analyzed in the course of the study, seemingly hundreds of others were
ignored because of time constraints. In contrast to the time constraints, the proposed scope of
this study was determined to be too focused on TTP, and acknowledging the classified nature of
many TTP documents, was broadened to provide a more holistic understanding of the factors
that shape the use and role of HUMINT in modern intelligence enterprises. Despite the
limitations, this study succeeded in applying a wide variety of source material to a broad research
question, and focused material in on factors determined to be a basis for an understanding of
HUMINT.
28
IV: Results
As mentioned, during the course of this study, over 70 works were reviewed in order to
answer the research question. The case study research method narrowed the broad research
question into the categories of definition, capabilities, limitations, and role of HUMINT. These
categories were subsequently used to guide the review of literature and structure the existing
expertise on the topic of HUMINT in to usable material for this study. A significant amount of
academic works and media reports were found during the course of research that addressed the
legal and moral concerns of certain HUMINT collection techniques – particularly interrogation
or torture techniques. While acknowledging their influence on the political support of HUMINT,
works addressing legal and social concerns were found to be highly time-applicable, that is, hotbutton issues at one time were generally mitigated by modifications in official US Government
policy. What follows are answers to the research questions and perspectives from a wide range
of experts in their fields.
There is no common definition used to define HUMINT. Extensive research of each
USIC agency that conducts HUMINT in one form or another failed to yield one definition;
further, many agencies were not found to have a definition of HUMINT readily apparent. The
greatest difference in definitions appeared to be between agencies that conducted domestic and
foreign intelligence operations. Foreign operating intelligence agencies placed more emphasis
on tightly defining HUMINT as an accumulation of specific TTP and emphasized source
operations. Domestic agencies such as the FBI and Coast Guard tended to shy away from such a
reliance on the use of the term source and generally avoided mentioning clandestine or covert
29
collection means. This difference is thought to be attributed to the legal operating parameters of
domestic Law Enforcement Intelligence Elements.
The capabilities of HUMINT are defined more by an agency’s authority to conduct
operations and established TTP than by any other factor. This finding was supported by the
difference between guidance such as FM2-22.3 and Coast Guard Publication 2. The Army Field
Manual clearly defines the authority to collect HUMINT operations and details of the various
Army HUMINT TTP leave little to the imagination. Assuming that HUMINT officers are trained
properly and are familiar with Army regulations such as FM2-22.3, the Army appears to be very
capable of conducting effective HUMINT operations. In contrast, the Coast Guard unclassified
document mentions HUMINT only in enough detail to assert that Coast Guard Law Enforcement
Intelligence personnel do not conduct source operations and that LEIC activities should not be
considered HUMINT. Even controlled unclassified documentation providing more detailed
guidance on the Coast Guard Intelligence program does not detail TTP like the Army, rendering
agencies hesitant to conduct true HUMINT collection activities like the Coast Guard largely
incapable of successful operations.
Research of specific measures used by professional criminal interrogators and
psychologists was analyzed and applied to determine the feasibility of a human study. The
human study described in the Methodology section earlier encountered problems consistent with
the challenges described by two existing works and resulted in the conclusion that no particular
indicator of deception can be relied upon to determine the credibility of a particular source’s
information. Instead of relying on blanket claims of which verbal, non-verbal, and paralinguistic
cues indicate deception, the baseline technique of determining what behavior was typical of
subject while answering non-pertinent and non-threatening questions was determined to be the
30
most accurate standard of truthfulness. The most significant finding of the feasibility study was
that in the course of any human study of deceptive behavior, a subject must not be instructed to
intentionally lie. In lieu of these instructions, a determination of what is true and what is not is
based entirely on the observations of the interviewer and the subject’s willingness to be honest
about their claims. These conclusions shaped the study’s finding that if deceptive behavior is so
difficult to objectively identify, more reliance must be place on understanding all factors that
shape HUMINT, not just the ability to apply TTP. Beyond discussions of TTP, a vast majority
of authors of HUMINT literature were determined to be supportive of the discipline, and as
expected, suggested that the capabilities of HUMINT are largely tempered only by resource
availability, political support, and the imagination of collection managers.
As evidenced by the review of literature, no substantive literature appeared to focus and
explain the role of HUMINT with respect to other disciplines. Literature linking HUINT to other
intelligence collection operations likely exists at the classified level and may support the notional
concepts of inter-operability discussed in the following sections.
31
V: Discussion
Research Questions
The broad research question for this study asked what the role and outlook of HUMINT
was as part of a modern intelligence enterprise. Extensive research and professional experience
suggests that the answer to the broad question is reflected by determining and addressing factors
that have appeared to limit its usage in the last several decades: agreeing on a definition,
understanding and managing the expectations of capabilities, respecting and accepting
limitations, addressing the legal and moral concerns of the general populace and policymakers,
and appropriating resources and an organization for future HUMINT operations. Understanding
all of these factors provides a truly holistic view of HUMINT and puts its usefulness in
perspective.
Definitions
Research of numerous government publications and military manuals draws attention to
the most fundamental problem of understanding HUMINT – there is no single or agreed-upon
definition of the term. If the general public or policymakers are to understand HUMINT
operations and policy, they must first understand what HUMINT is, and what it is not. Some
consider CI and HUMINT to be inseparable and some services, such as the Marine Corps and
Navy have the two organizationally joined, but the union of the two disciplines, while convenient
for consolidating basic indoctrination to the fundamentals of HUMINT, does an injustice to both.
The Army did justice to their HUMINT program in FM2-22.3 when the clearly delineated the
32
difference between CI and HUMINT. After the field of CI is removed from the equation, a
common definition must be established. A balance needs to be struck between the overly broad
definitions like the one provided by the CIA and very detailed definitions such as the one in
FM2-22.3. A fitting and agreeable definition should be modeled after definitions of other
disciplines; SIGINT is defined by Richelson simply as the collection or interception and
subsequent processing of electronically emitted signals.50 Likewise, HUMINT should be an
agreed-upon term used by all members of the USIC and should be considered to be the
collection, processing, and exploitation of information originating from or collected by human
contact to fulfill an intelligence requirement. Of particular note, this definition does not mention
sources, CI, interrogation, or specific components of HUMINT such as interrogation, debriefing,
elicitation, or liaison. A sufficiently broad definition permits a wide range of use by USIC
components with the flexibility to define TTP as applicable to the agency’s or organization’s
mission and resources.
Capabilities
One of the most fundamental bureaucratic lessons that can be learned is that of properly
managing expectations. If the general public and policymakers expect James Bond or Jason
Bourne to jump out of a spy plane over Beijing, parachute on to the military headquarters
building, and infiltrate it to obtain classified material that magically answers a broad range of
requirements, HUMINT as a program will fail to meet expectations and will suffer.
Understanding the capabilities of HUMINT is a problem that leaders have struggled with for
centuries. The fields of psychology and sociology lend credence to the use of HUMINT to
50
Jeffrey Richelson, The US Intelligence Community (Boulder: Westview Press, 2008): 31.
33
successfully manipulate people in to providing information they may not have without mental
coercion. When seeking to understand the capabilities of a HUMINT officer to extract
information from an individual, it is important to consider whether that person is providing
information voluntarily or involuntarily. Nearly all studies and works pertaining to the TTP of
collecting HUMINT agree that cooperative sources are preferred to uncooperative ones because
of the significant difference in the time and resources needed to obtain useful information.
Obtaining HUMINT from cooperative sources in the counterinsurgency or domestic law
enforcement environment can have the effect of improving the relationship between the
intelligence collecting agency and the populace and may result in useful information. In addition
to cooperative civilians, trained HUMINT collectors can also be used to debrief friendly forces.
Friendly force debriefing can be as effective for FBI agents after a SWAT raid as for soldiers
patrolling the streets of Kabul. In both cases, and all range of possibilities in between, friendly
forces may be unaware of the importance of information they perceived in the course of their
normal duties. By using TTP similar to what the Army considers SECRET//NOFORN,
HUMINT collectors are capable of using special questioning techniques in a non-confrontational
and non-threatening manner to extract important details. Obtaining information from
cooperative civilians or friendly forces comprises one half of the capabilities of HUMINT, with
the other being the use of uncooperative or unwitting neutral contacts to obtain information not
obtainable by other intelligence disciplines.
The capabilities of using cooperative contacts provides a relatively easy and resourceconscious approach to obtaining human derived intelligence; however, it is the sometimes costly
and resource-demanding practice of getting information from uncooperative sources that can
provide ground-breaking or tactically critical intelligence. The most used tool against
34
uncooperative sources is the interrogation. For the purposes of this discussion, the least common
denominator of the US legal and DoD definitions will be used: the use of an interrogation
approach to obtain incriminating information from a person whose freedom has been curtailed.
Domestic and foreign HUMINT agencies alike are capable of using TTP like the Army’s 18
interrogation approaches in order to mentally coerce a subject to provide information they would
not normally. Whether tactical interrogations of recently captured combatants taking advantage
of the shock of capture or long-term strategic interrogations of detainees at facilities such as
Guantanamo Bay, information obtained from interrogations can often be actionable and valuable.
Practically speaking, a timely interrogation of a kidnapper could lead to a discovery of a victim
and a well-done interrogation in Afghanistan could lead to the location and nature of an enemy
IED. The capability of HUMINT collectors to perform interrogations of uncooperative and
unwitting sources contributes to the overall value of HUMINT, but HUMINT does not always
have to be as the foundation of an operation in order to be useful. The third capability of
HUMINT is the inter-operability with other intelligence disciplines to provide a better common
intelligence picture.
In a discussion of IMINT, Richelson unintentionally highlights the third capability of
HUMINT: to collect information not obtainable from other means. Citing over two dozen
examples of IMINT targets over the past two decades, Richelson points out the ability of IMINT
to discover new facilities, detect activity and movement, and an ability to provide limited
Indicator and Warning (I&W) intelligence, but does not discuss a manner in which resulting
follow-on requirements are answered. Once a secret mountain facility is constructed, there is no
IMINT that will determine the nature and impact of the activities taking place inside. If land
lines are used, SIGINT may be equally incapable of providing the answer to the intelligence gap,
35
and because the facility is built in to a mountain, MASINT may not necessarily have any
information to process. Intelligence challenges such as this are sure to increase in the future, as
sophisticated adversaries learn from compromises of the past and take added precautions to
thwart remote intelligence collection platforms of another nation – a notion supported by existing
HUMINT literature. 51 The same challenges exist for the exact opposite type of enemy; the
Global War on Terrorism and Operation Iraqi Freedom underscored the threat of a non-technical
enemy that relies on human networks to build support among the populace and plan and execute
attacks. It is against the unconventional and guerilla type forces confronted in counterinsurgency
operations that HUMINT is particularly effective. Domestically, unsophisticated criminal
enterprises, rooted in family ties, may not be detectable by technological collection platforms
such as UAVs or wiretaps. Criminal operations such as moon shining or meth labs may be
disguised to avoid non-intrusive imagery collection and may not have a need to communicate
their illicit activity via technically interceptable means such as cell phones or radios. Like
collecting information on an insurgency, HUMINT will continue to be unrivaled in its sole
ability to collect information on less-sophisticated but equally harmful illegal criminal
enterprises. The capabilities of HUMINT are bound only by the imagination of the intelligence
collections manager; however, the prospect of high quality and large quantity HUMINT is
tempered by the inherent limitations of working with humans and a lack of political capital.
51
Robert Steele, Human Intelligence: All Humans, All Minds, All the Time (Carlisle, PA: Strategic Studies Institute,
Army War College, 2010), http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?PubID=991 (accessed
March 12, 2012): 42-43.
36
Limitations
Expert analysis in existing literature on HUMINT and psychology underscore the
challenge of obtaining credible information from reliable sources. Psychology texts explain
numerous principles and theories that are central to intelligence collection from another human.
One of the most important psychological concerns for HUMINT collectors and analysts is
understanding the bias of the reporting source. If a HUMINT agent is reporting information they
obtained first hand, they will likely be biased to believe that the information they collected was
more useful and more credible than it may actually be. Understanding the bias of human
contacts is even more important; the ideological basis and personal motivation of a contact can
significantly influence a determination of credibility. The best way to determine credibility and
reliability is to maximize, to the greatest extent possible, the creation and maintenance of
continuous contacts. In absence of continuous contacts, HUMINT collectors expose one of the
greatest limits of the discipline: determining credibility. Inaccurate HUMINT has plagued the
USIC for decades and has contributed to prolific controversy (namely following the Bay of Pigs
and after the invasion of Iraq in 2003) regarding the use of HUMINT as single-source reporting.
Submitting one-time contacts to a polygraph is obviously unrealistic, so in order to improve
assessments of credibility, HUMINT collectors must be trained to understand more than the TTP
taught by technical manuals. Certified HUMINT collectors must be taught psychology and
become sensitive to the impact of perception, bias, and memory on reported information. Two
other limits for HUMINT programs are a lack of resources and political support, and are
inherently linked. After reading accounts of HUMINT collectors in Iraq and Afghanistan, it is
clear that the number of human contacts greatly exceeds the number that is capable of being
37
handled by trained and certified HUMINT collectors. Military services and domestic law
enforcement agencies must provide at least rudimentary training on tactical questioning and
basic fundamentals of deception identification in order to increase the quantity of information
available to intelligence analysts and case agents. Without political support, the money and
resources necessary to provide that training will not exist, so it is equally important for HUMINT
agencies to aggressively educate policymakers and the general public about the realities of
HUMINT operations and ensure that information used by decision-makers is as accurate as
possible.
Future
Unconventional wars in Iraq and Afghanistan and technically savvy adversaries create an
ideal future for the value of HUMINT in stand-alone and support operations. Throughout the
winter and spring of 2012, the United States and key allied nations have taken a hard-line stance
against Iranian development of nuclear weapons. In the past, the stuxnet computer virus was
introduced to a uranium enrichment facility suspected of producing weapons-grade nuclear
material. As Iran continues to isolate and hide its uranium enrichment and research and design
facilities underground, American surveillance capabilities will continue to be reduced. While
MASINT may play a role in detecting the presence of certain materials or weapons, only a
human agent or source will be able to provide information from inside the facility in order for
policymakers to make informed decisions and weigh military against diplomatic options. The
Iranian example illustrates the use of HUMINT as a result of a paranoid and aware adversary;
however, insurgents and terrorist organizations will continue their reliance on human networks to
38
share information and resources necessary to harm friendly forces. In the GWOT and in similar
conflicts in the future, HUMINT will play a critical role in obtaining information from an
unsophisticated enemy. Domestically, law enforcement agencies face more legal and social
challenges when new technologies or tools are used to collect information on the general
populace. Using infrared imaging equipment, UAVs, or sensitive listening equipment to
determine what takes place inside a particular house may be seen by many to be unconstitutional
or unethical, but talking to a neighbor about their perspective would be seen as relatively
acceptable. Human Intelligence collection, regardless of whether described by a definition
similar to the one proposed by this study, will continue to find use in stand-alone domestic and
foreign operations and will enhance and compliment the capabilities of other intelligence
disciplines.
Summary
The case of Robert Hanssen is a perfect example of the potential of HUMINT operations.
Hanssen obtained information on US assets, case files, plans, dossiers, and technical capabilities
that the Soviets may never have known existed. It was through the manipulation of Hanssen
(and the treachery of Hanssen himself) that the Soviets were able to verify the bona fides of
Aldrich Ames, execute at least three penetrations of the Soviet government, and alter military
and intelligence plans to be more immune to American surveillance. No spy satellite, antenna, or
newspaper could have provided the caliber or range of information that Hanssen did. Human
intelligence collection has been taking place for centuries, and has provided decision advantage
to political and military leaders that have shaped history. The practice of obtaining HUMINT is
39
not antiquated, it is not passé, it will never be replaced by technology, and conversation should
continue in social and political circles regarding the use and role of HUMINT to ensure it
continues to meet the changing needs of a modern society.
40
References
Cottam, Martha L., Beth Dietz-Uhler, Elena Mastors, Thomas Preston. Introduction to Political
Psychology. New York: Psychology Press, 2010.
Creswell, John W. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches.
Los Angeles: Sage Publications, 2009.
Department of the Army. Field Manual 2-22.3: Human Intelligence Collector Operations.
Washington, DC: Government Printing Office, 2006.
Department of the Navy. Marine Corps Warfighting Manual 2-1: Intelligence Operations.
Washington, DC: Government Printing Office, 2003.
Garcia, Gregory. “Tactical Source Profiling and Indicator Analysis.” Military Intelligence
(March, 2003): 36-41.
Hazlett, Gary. “Research on Detection of Deception What We Know vs. What We Think We
Know.” In Educing Information, edited by the Intelligence Science Board, 45-54.
Washington DC: National Defense Intelligence College Press, 2006.
Inbau, Fred, et al. Essentials Of The Reid Technique: Criminal Interrogation And Confessions.
Sudbury, MA: Jones and Bartlett Publishers, 2005.
Jervis, Robert. Why Intelligence Fails. Ithaca: Cornell University Press, 2010.
Joint Chiefs of Staff. Joint Publication 1-02: Department of Defense Definition of Military and
Associated Terms. Washington DC: Government Printing Office, 2010.
Joint Chiefs of Staff. Joint Publication 2-0: Joint Intelligence. Washington DC: Government
Printing Office, 2007.
Lankford, Adam. “Assessing the Obama Standard for Interrogations: An Analysis of Army Field
Manual 2-22.3.” Studies in Conflict & Terrorism 33:1 (2009): 20-35.
McShane, Steven, and Mary Ann Von Glinow. Organizational Behavior. New York: McGrawHill, 2008.
National Clandestine Service. “Human Intelligence.” Central Intelligence Agency.
https://www.cia.gov/offices-of-cia/clandestine-service/intelligence.html (accessed March
17, 2012).
Pew Research Center. “Public Worried, Informed About H1N1.” Under “Top News Stories,”
http://pewresearch.org/pubs/1331/public-worry-swine-flu-confidence-in-government
(accessed March 17, 2012).
Richelson, Jeffrey. The US Intelligence Community. Boulder: Westview Press, 2008.
41
Rose, P.K. The Founding Fathers of American Intelligence. Langley, VA: Center for the Study
of Intelligence, US Central Intelligence Agency, 2010).
https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/booksand-monographs/the-founding-fathers-of-american-intelligence/art-1.html#rft1 (accessed
January 23, 2012).
Steele, Robert. Human Intelligence: All Humans, All Minds, All the Time. Carlisle, PA: Strategic
Studies Institute, Army War College, 2010.
http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?PubID=991 (accessed
March 12, 2012).
Stuart-Hamilton, Ian. Key Ideas in Psychology. Philadelphia: Jessica Kingsley Publishers, 1999.
U.S. Department of Justice. Office of the Inspector General. A Review of the FBI’s Performance
in Deterring, detecting, and Investigating the Espionage Activities of Robert Philip
Hanssen. Washington, DC: Government Printing Office, 2003.
U.S. District Court for the Eastern District of Virginia. United States v. Robert Philip Hanssen,
Affidavit in Support of Criminal Complaint, Arrest Warrant and Search Warrant, by
Stefan A. Pluta. February 16, 2001.
U.S. President. Proclamation. “Classified National Security Information.” Federal Register 75,
no. 123 (June28, 2010): 37256.
United States Coast Guard. Publication 2: Intelligence. Washington DC: Government Printing
Office, 2010.
Wise, David. Spy: The Inside Story of How the FBI's Robert Hanssen Betrayed America. New
York: Random House, 2002.
Zegart, Amy B. “’Spytainment’: The Real Influence of Fake Spies.” International Journal of
Intelligence and CounterIntelligence 23:4 (2010): 599-622.
42