Human intelligence (intelligence gathering): Difference between revisions
imported>Guylaen sidebar |
imported>Maxeto0910 redundant |
||
| Line 1: | Line 1: | ||
{{short description|Intelligence gathered by means interpersonal contact}} | {{short description|Intelligence gathered by means interpersonal contact}} | ||
{{for|the intellectual capability of humans|Human intelligence}}{{Intelligence}}[[File:Defense.gov News Photo 060303-M-0374B-005.jpg|thumb|A [[ | {{for|the intellectual capability of humans|Human intelligence}}{{Intelligence}}[[File:Defense.gov News Photo 060303-M-0374B-005.jpg|thumb|A [[U.S. Marine]] asking a local woman about weapons in [[Fallujah]] during the [[Iraq War]]]] | ||
'''Human intelligence''' ('''HUMINT''', pronounced {{IPAc-en|'|h|j|u:|m|ɪ|n|t}} {{respell|HEW|mint}}) is [[List of intelligence gathering disciplines|intelligence-gathering]] by means of human sources and [[interpersonal communication]]. It is distinct from more technical intelligence-gathering disciplines, such as [[signals intelligence]] (SIGINT), [[imagery intelligence]] (IMINT) | '''Human intelligence''' ('''HUMINT''', pronounced {{IPAc-en|'|h|j|u:|m|ɪ|n|t}} {{respell|HEW|mint}}) is [[List of intelligence gathering disciplines|intelligence-gathering]] by means of human sources and [[interpersonal communication]]. It is distinct from more technical intelligence-gathering disciplines, such as [[signals intelligence]] (SIGINT), [[imagery intelligence]] (IMINT) and [[measurement and signature intelligence]] (MASINT).<ref name="AAP6-109"/> HUMINT can be conducted in a variety of ways, including via [[espionage]], [[reconnaissance]], [[interrogation]], [[witness]] interviews, or [[torture]]. Although associated with [[military]] and [[intelligence agencies]], HUMINT can also apply in various civilian sectors such as [[law enforcement]].<ref name="Clark-76"/> | ||
==Overview== | ==Overview== | ||
{{POV section|date=March 2024}} | {{POV section|date=March 2024}} | ||
[[NATO]] defines HUMINT as "a category of intelligence derived from information collected and provided by human sources."<ref name="AAP6-109" /> A typical HUMINT activity consists of interrogations and conversations with persons having access to information. | [[NATO]] defines HUMINT as "a category of intelligence derived from information collected and provided by human sources."<ref name="AAP6-109"/> A typical HUMINT activity consists of interrogations and conversations with persons having access to information. | ||
As the name suggests, human intelligence is mostly collected by people and is commonly provided via espionage or some other form of [[covert surveillance]]. However, there are also overt methods of collection, such as via interrogation of subjects or simply through interviews. | As the name suggests, human intelligence is mostly collected by people and is commonly provided via espionage or some other form of [[covert surveillance]]. However, there are also overt methods of collection, such as via interrogation of subjects or simply through interviews. | ||
The manner in which HUMINT operations are conducted is dictated by both official protocol and the nature of the source of the information. Within the context of the [[United States Armed Forces]]' [[military intelligence]], HUMINT activity may involve clandestine activities, | The manner in which HUMINT operations are conducted is dictated by both official protocol and the nature of the source of the information. Within the context of the [[United States Armed Forces]]' [[military intelligence]], HUMINT activity may involve clandestine activities; however, these operations are more closely associated with [[CIA]] projects.<ref name="DeVine"/> Both [[counterintelligence]] and HUMINT include [[clandestine human intelligence]] and [[clandestine HUMINT operational techniques|its associated operational techniques]]. | ||
== Sources | == Sources == | ||
Typically, sources of HUMINT generally include: | Typically, sources of HUMINT generally include: | ||
| Line 25: | Line 25: | ||
* [[Special reconnaissance]] | * [[Special reconnaissance]] | ||
* [[Debriefing|Traveler debriefing]] | * [[Debriefing|Traveler debriefing]] | ||
The first steps for recruiting HUMINT sources is spotting and assessing a target.<ref name=Steele-95/> Surveillance of targets (e.g., military or other establishments, open source or compromised reference documents) sometimes reveals people with potential access to information, but no clear means of approaching them. With this group, a secondary survey is in order. Headquarters may be able to suggest an approach, perhaps through a third party or through resources not known to the field station.<ref name="Carroll-2006" /> | The first steps for recruiting HUMINT sources is spotting and assessing a target.<ref name=Steele-95/> Surveillance of targets (e.g., military or other establishments, open source or compromised reference documents) sometimes reveals people with potential access to information, but no clear means of approaching them. With this group, a secondary survey is in order. Headquarters may be able to suggest an approach, perhaps through a third party or through resources not known to the field station.<ref name="Carroll-2006"/> | ||
==Notable | ==Notable examples== | ||
* [[Oleg Penkovsky]] was a [[ | * [[Oleg Penkovsky]] was a [[Soviet]] [[GRU (Soviet Union)|GRU]] [[colonel]] who served as a source to the United Kingdom and the United States by informing them of the precise knowledge necessary to address rapidly developing military tensions with the Soviet Union. | ||
==See also== | ==See also== | ||
| Line 53: | Line 53: | ||
* {{Cite web |date=2013 |id=AAP-6 |title=NATO glossary of terms and definitions (English and French)|url=https://www.jcs.mil/Portals/36/Documents/Doctrine/Other_Pubs/aap6.pdf }} | * {{Cite web |date=2013 |id=AAP-6 |title=NATO glossary of terms and definitions (English and French)|url=https://www.jcs.mil/Portals/36/Documents/Doctrine/Other_Pubs/aap6.pdf }} | ||
* {{Cite journal|last=DeVine|first=Michael E.|date=June 14, 2019|title=Covert Action and Clandestine Activities of the Intelligence Community: Selected Definitions in Brief|journal=Congressional Research Service}} | * {{Cite journal|last=DeVine|first=Michael E.|date=June 14, 2019|title=Covert Action and Clandestine Activities of the Intelligence Community: Selected Definitions in Brief|journal=Congressional Research Service}} | ||
* {{citation| | * {{citation |last=Carroll |url=https://www.csus.edu/indiv/c/carrollt/Site/Welcome_files/Gov't%20139G%20class%20notes%20Fall%202006%20-%2024%20Oct.pdf |access-date=2025-07-21 |publisher=California State University Sacramento |first=Thomas Patrick |title=Government 139 (Class Notes) Syllabus Section 1 — Human Intelligence: From Sleepers to Walk-ins}} | ||
* {{Cite book |last=Steele |first=Robert David |url=https://books.google.com/books?id=FnI_Qk3h9goC |title=Human Intelligence: All Humans, All Minds, All the Time |date=2010 |publisher=Strategic Studies Institute, U.S. Army War College |isbn=978-1-58487-439-3 |language=en}} | * {{Cite book |last=Steele |first=Robert David |url=https://books.google.com/books?id=FnI_Qk3h9goC |title=Human Intelligence: All Humans, All Minds, All the Time |date=2010 |publisher=Strategic Studies Institute, U.S. Army War College |isbn=978-1-58487-439-3 |language=en}} | ||
* {{Cite book |last=Clark |first=Robert M. |url=https://books.google.com/books?id=xWIXBAAAQBAJ |title=Intelligence Collection |date=2013-09-13 |publisher=CQ Press |isbn=978-1-4833-2437-1 |language=en}} | * {{Cite book |last=Clark |first=Robert M. |url=https://books.google.com/books?id=xWIXBAAAQBAJ |title=Intelligence Collection |date=2013-09-13 |publisher=CQ Press |isbn=978-1-4833-2437-1 |language=en}} | ||
Latest revision as of 17:35, 31 July 2025
Script error: No such module "For".Template:Intelligence
Human intelligence (HUMINT, pronounced Template:IPAc-en Template:Respell) is intelligence-gathering by means of human sources and interpersonal communication. It is distinct from more technical intelligence-gathering disciplines, such as signals intelligence (SIGINT), imagery intelligence (IMINT) and measurement and signature intelligence (MASINT).[1] HUMINT can be conducted in a variety of ways, including via espionage, reconnaissance, interrogation, witness interviews, or torture. Although associated with military and intelligence agencies, HUMINT can also apply in various civilian sectors such as law enforcement.[2]
Overview
Script error: No such module "Unsubst". NATO defines HUMINT as "a category of intelligence derived from information collected and provided by human sources."[1] A typical HUMINT activity consists of interrogations and conversations with persons having access to information.
As the name suggests, human intelligence is mostly collected by people and is commonly provided via espionage or some other form of covert surveillance. However, there are also overt methods of collection, such as via interrogation of subjects or simply through interviews.
The manner in which HUMINT operations are conducted is dictated by both official protocol and the nature of the source of the information. Within the context of the United States Armed Forces' military intelligence, HUMINT activity may involve clandestine activities; however, these operations are more closely associated with CIA projects.[3] Both counterintelligence and HUMINT include clandestine human intelligence and its associated operational techniques.
Sources
Typically, sources of HUMINT generally include:
- Advisors or foreign internal defense personnel working with host nation forces or populations
- Diplomatic reporting by accredited diplomats
- Espionage clandestine reporting, access agents, couriers, cutouts
- Military attachés
- Non-governmental organizations
- Prisoners of war or detainees
- Refugees
- Routine patrolling (military police, patrols, etc.)
- Special reconnaissance
- Traveler debriefing
The first steps for recruiting HUMINT sources is spotting and assessing a target.[4] Surveillance of targets (e.g., military or other establishments, open source or compromised reference documents) sometimes reveals people with potential access to information, but no clear means of approaching them. With this group, a secondary survey is in order. Headquarters may be able to suggest an approach, perhaps through a third party or through resources not known to the field station.[5]
Notable examples
- Oleg Penkovsky was a Soviet GRU colonel who served as a source to the United Kingdom and the United States by informing them of the precise knowledge necessary to address rapidly developing military tensions with the Soviet Union.
See also
References
Bibliography
- Script error: No such module "citation/CS1".
- Script error: No such module "Citation/CS1".
- Script error: No such module "citation/CS1".
- Script error: No such module "citation/CS1".
- Script error: No such module "citation/CS1".
Template:Espionage Template:Intelligence cycle management
- ↑ a b Cite error: Invalid
<ref>tag; no text was provided for refs namedAAP6-109 - ↑ Cite error: Invalid
<ref>tag; no text was provided for refs namedClark-76 - ↑ Cite error: Invalid
<ref>tag; no text was provided for refs namedDeVine - ↑ Cite error: Invalid
<ref>tag; no text was provided for refs namedSteele-95 - ↑ Cite error: Invalid
<ref>tag; no text was provided for refs namedCarroll-2006