Knowledge (XXG)

Human intelligence (intelligence gathering)

Source 📝

38: 172: 362:
The first steps for recruiting HUMINT sources is spotting and assessing a target. Surveillance of targets (e.g., military or other establishments, open source or compromised reference documents) sometimes reveals people with potential access to information, but no clear means of approaching them.
230:
defines HUMINT as "a category of intelligence derived from information collected and provided by human sources." A typical HUMINT activity consists of interrogations and conversations with persons having access to information.
385:
who served as a source to the United Kingdom and the United States by informing them of the precise knowledge necessary to address rapidly developing military tensions with the Soviet Union.
1233: 1446: 997: 363:
With this group, a secondary survey is in order. Headquarters may be able to suggest an approach, perhaps through a third party or through resources not known to the field station.
1243: 1472: 241:
The manner in which HUMINT operations are conducted is dictated by both official protocol and the nature of the source of the information. Within the context of the
1376: 1040: 508: 1467: 990: 107: 1439: 1080: 262: 1268: 1238: 983: 878: 834: 123: 1421: 553: 532: 498:
DeVine, Michael E. (June 14, 2019). "Covert Action and Clandestine Activities of the Intelligence Community: Selected Definitions in Brief".
1070: 829: 584: 1014: 417: 181: 730: 234:
As the name suggests, human intelligence is mostly collected by people and is commonly provided via espionage or some other form of
214: 98: 1371: 1363: 765: 690: 192: 1381: 1312: 1137: 1052: 632: 258: 238:. However, there are also overt methods of collection, such as via interrogation of subjects or simply through interviews. 1006: 318: 1429: 111: 242: 42: 249:, HUMINT activity may involve clandestine activities, however these operations are more closely associated with 185: 37: 1344: 1075: 327: 281: 1396: 1386: 1334: 1065: 715: 685: 577: 1411: 1349: 1329: 1278: 1035: 351: 1298: 964: 487: 412: 246: 151: 1401: 1339: 1225: 1181: 1166: 1115: 1060: 890: 873: 846: 609: 300: 119: 115: 1434: 1308: 1125: 952: 856: 313: 254: 235: 1406: 1391: 1283: 1258: 1196: 1147: 1132: 841: 808: 782: 760: 755: 725: 710: 570: 379: 308: 31: 510:
Government 139 (Class Notes) Syllabus Section 1 — Human Intelligence: From Sleepers to Walk-ins
1248: 957: 626: 549: 528: 17: 1303: 1253: 922: 654: 323: 277: 66: 1191: 1120: 942: 917: 851: 813: 750: 341: 155: 1288: 1108: 620: 372: 131: 1461: 1206: 1186: 1171: 900: 868: 770: 745: 664: 135: 1293: 1211: 1201: 1142: 947: 735: 720: 659: 644: 637: 376: 196: 543: 522: 114:. It is distinct from more technical intelligence-gathering disciplines, such as 1103: 937: 803: 649: 1176: 932: 912: 905: 885: 792: 356: 337: 1157: 1152: 1098: 1090: 927: 740: 669: 604: 593: 296: 287: 127: 975: 1161: 775: 291: 147: 50: 46: 861: 382: 332: 304: 143: 139: 126:(MASINT). HUMINT can be conducted in a variety of ways, including via 345: 36: 400: 227: 979: 566: 250: 165: 488:"NATO glossary of terms and definitions (English and French)" 78: 562: 154:, HUMINT can also apply in various civilian sectors such as 84: 75: 284:
personnel working with host nation forces or populations
1447:
Counterintelligence and counter-terrorism organizations
524:
Human Intelligence: All Humans, All Minds, All the Time
527:. Strategic Studies Institute, U.S. Army War College. 99: 87: 90: 27:
Intelligence gathered by means interpersonal contact
1420: 1362: 1322: 1267: 1224: 1089: 1051: 1022: 1013: 822: 791: 701: 678: 600: 81: 72: 69: 273:Typically, sources of HUMINT generally include: 30:For the intellectual capability of humans, see 991: 578: 8: 1473:Human intelligence (information gathering) 1028: 1019: 998: 984: 976: 585: 571: 563: 434: 432: 195:. Please do not remove this message until 215:Learn how and when to remove this message 516:, California State University Sacramento 191:Relevant discussion may be found on the 1412:Scientific & Technical intelligence 428: 835:Chinese espionage in the United States 124:measurement and signature intelligence 45:asking a local woman about weapons in 263:its associated operational techniques 7: 1234:By alliances, nations and industries 830:Chinese intelligence activity abroad 896:Interpersonal (HUMINT) intelligence 1468:Intelligence gathering disciplines 418:Intelligence collection management 25: 731:Computer and network surveillance 766:Short-range agent communications 403:uses mainly human intelligence. 170: 65: 1382:Words of estimative probability 1244:Operational platforms by nation 542:Clark, Robert M. (2013-09-13). 500:Congressional Research Service 319:Non-governmental organizations 259:clandestine human intelligence 110:by means of human sources and 18:Human intelligence (espionage) 1: 521:Steele, Robert David (2010). 1430:Intelligence cycle security 197:conditions to do so are met 146:. Although associated with 112:interpersonal communication 1489: 243:United States Armed Forces 29: 1031: 507:Thomas Patrick Carroll, 282:foreign internal defense 1397:Intelligence assessment 1387:All-source intelligence 1007:Intelligence management 716:Covert listening device 686:Intelligence assessment 545:Intelligence Collection 367:Notable HUMINT examples 299:clandestine reporting, 1081:Operational techniques 1036:Special reconnaissance 352:Special reconnaissance 108:intelligence-gathering 53: 965:Targeted surveillance 413:Document Exploitation 247:military intelligence 152:intelligence agencies 40: 1402:Medical intelligence 1372:Competing hypotheses 1182:Industrial espionage 1167:Denial and deception 891:Industrial espionage 691:competing hypotheses 465:Steele (2010) pg. 95 438:AAP-6 (2013) pg. 109 288:Diplomatic reporting 120:imagery intelligence 116:signals intelligence 1435:Counterintelligence 1350:Technical (TECHINT) 1345:Open-source (OSINT) 1335:Geospatial (GEOINT) 1309:Casualty estimation 447:Clark (2013) pg. 76 357:Traveler debriefing 257:and HUMINT include 255:counterintelligence 236:covert surveillance 184:of this section is 1407:Military geography 1392:Basic intelligence 1330:Financial (FININT) 1271:signature (MASINT) 1197:One-way voice link 1133:Concealment device 842:Cold War espionage 809:Front organization 783:Surveillance tools 761:Phone surveillance 756:One-way voice link 711:Concealment device 338:Routine patrolling 57:Human intelligence 54: 32:Human intelligence 1455: 1454: 1358: 1357: 1249:Direction finding 1239:In modern history 1220: 1219: 973: 972: 627:Agent provocateur 555:978-1-4833-2437-1 534:978-1-58487-439-3 390:HUMINT by country 314:Military attachés 269:Sources of HUMINT 225: 224: 217: 16:(Redirected from 1480: 1254:Traffic analysis 1226:Signals (SIGINT) 1061:Asset recruiting 1029: 1020: 1000: 993: 986: 977: 587: 580: 573: 564: 559: 538: 517: 515: 503: 494: 492: 475: 472: 466: 463: 457: 454: 448: 445: 439: 436: 324:Prisoners of war 220: 213: 209: 206: 200: 174: 173: 166: 102: 97: 96: 93: 92: 89: 86: 83: 80: 77: 74: 71: 21: 1488: 1487: 1483: 1482: 1481: 1479: 1478: 1477: 1458: 1457: 1456: 1451: 1416: 1354: 1340:Imagery (IMINT) 1318: 1279:Electro-optical 1270: 1269:Measurement and 1263: 1216: 1192:Numbers station 1121:Black operation 1085: 1047: 1009: 1004: 974: 969: 943:Sting operation 852:Black operation 818: 814:Limited hangout 796: 787: 751:Numbers station 703: 697: 674: 614: 596: 591: 556: 541: 535: 520: 513: 506: 497: 490: 486: 483: 478: 473: 469: 464: 460: 455: 451: 446: 442: 437: 430: 426: 409: 397: 392: 369: 342:military police 271: 253:projects. Both 221: 210: 204: 201: 190: 175: 171: 164: 156:law enforcement 142:interviews, or 100: 68: 64: 35: 28: 23: 22: 15: 12: 11: 5: 1486: 1484: 1476: 1475: 1470: 1460: 1459: 1453: 1452: 1450: 1449: 1444: 1443: 1442: 1432: 1426: 1424: 1418: 1417: 1415: 1414: 1409: 1404: 1399: 1394: 1389: 1384: 1379: 1377:Target-centric 1374: 1368: 1366: 1360: 1359: 1356: 1355: 1353: 1352: 1347: 1342: 1337: 1332: 1326: 1324: 1320: 1319: 1317: 1316: 1306: 1301: 1299:Radiofrequency 1296: 1291: 1286: 1281: 1275: 1273: 1265: 1264: 1262: 1261: 1256: 1251: 1246: 1241: 1236: 1230: 1228: 1222: 1221: 1218: 1217: 1215: 1214: 1209: 1204: 1199: 1194: 1189: 1184: 1179: 1174: 1169: 1164: 1155: 1150: 1145: 1140: 1135: 1130: 1129: 1128: 1118: 1113: 1112: 1111: 1106: 1095: 1093: 1087: 1086: 1084: 1083: 1078: 1073: 1068: 1063: 1057: 1055: 1049: 1048: 1046: 1045: 1044: 1043: 1032: 1026: 1024:Human (HUMINT) 1017: 1011: 1010: 1005: 1003: 1002: 995: 988: 980: 971: 970: 968: 967: 962: 961: 960: 955: 945: 940: 935: 930: 925: 920: 915: 910: 909: 908: 903: 893: 888: 883: 882: 881: 876: 866: 865: 864: 859: 849: 844: 839: 838: 837: 826: 824: 820: 819: 817: 816: 811: 806: 800: 798: 789: 788: 786: 785: 780: 779: 778: 768: 763: 758: 753: 748: 743: 738: 733: 728: 723: 718: 713: 707: 705: 704:communications 699: 698: 696: 695: 694: 693: 682: 680: 676: 675: 673: 672: 667: 662: 657: 652: 647: 642: 641: 640: 630: 623: 621:Agent handling 617: 615: 613: 612: 607: 601: 598: 597: 592: 590: 589: 582: 575: 567: 561: 560: 554: 539: 533: 518: 504: 495: 493:. 2013. AAP-6. 482: 479: 477: 476: 474:Carroll (2006) 467: 458: 449: 440: 427: 425: 422: 421: 420: 415: 408: 405: 396: 393: 391: 388: 387: 386: 373:Oleg Penkovsky 368: 365: 360: 359: 354: 349: 335: 330: 321: 316: 311: 294: 290:by accredited 285: 270: 267: 223: 222: 178: 176: 169: 163: 160: 132:reconnaissance 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1485: 1474: 1471: 1469: 1466: 1465: 1463: 1448: 1445: 1441: 1440:organizations 1438: 1437: 1436: 1433: 1431: 1428: 1427: 1425: 1423: 1422:Dissemination 1419: 1413: 1410: 1408: 1405: 1403: 1400: 1398: 1395: 1393: 1390: 1388: 1385: 1383: 1380: 1378: 1375: 1373: 1370: 1369: 1367: 1365: 1361: 1351: 1348: 1346: 1343: 1341: 1338: 1336: 1333: 1331: 1328: 1327: 1325: 1321: 1314: 1310: 1307: 1305: 1302: 1300: 1297: 1295: 1292: 1290: 1287: 1285: 1282: 1280: 1277: 1276: 1274: 1272: 1266: 1260: 1257: 1255: 1252: 1250: 1247: 1245: 1242: 1240: 1237: 1235: 1232: 1231: 1229: 1227: 1223: 1213: 1210: 1208: 1207:Steganography 1205: 1203: 1200: 1198: 1195: 1193: 1190: 1188: 1187:Interrogation 1185: 1183: 1180: 1178: 1175: 1173: 1172:Eavesdropping 1170: 1168: 1165: 1163: 1159: 1156: 1154: 1151: 1149: 1146: 1144: 1141: 1139: 1136: 1134: 1131: 1127: 1124: 1123: 1122: 1119: 1117: 1114: 1110: 1107: 1105: 1102: 1101: 1100: 1097: 1096: 1094: 1092: 1088: 1082: 1079: 1077: 1076:Direct action 1074: 1072: 1071:Covert action 1069: 1067: 1064: 1062: 1059: 1058: 1056: 1054: 1050: 1042: 1041:organizations 1039: 1038: 1037: 1034: 1033: 1030: 1027: 1025: 1021: 1018: 1016: 1012: 1008: 1001: 996: 994: 989: 987: 982: 981: 978: 966: 963: 959: 956: 954: 951: 950: 949: 946: 944: 941: 939: 936: 934: 931: 929: 926: 924: 921: 919: 916: 914: 911: 907: 904: 902: 901:interrogation 899: 898: 897: 894: 892: 889: 887: 884: 880: 877: 875: 872: 871: 870: 869:Eavesdropping 867: 863: 860: 858: 855: 854: 853: 850: 848: 845: 843: 840: 836: 833: 832: 831: 828: 827: 825: 821: 815: 812: 810: 807: 805: 802: 801: 799: 794: 790: 784: 781: 777: 774: 773: 772: 771:Steganography 769: 767: 764: 762: 759: 757: 754: 752: 749: 747: 746:Invisible ink 744: 742: 739: 737: 734: 732: 729: 727: 724: 722: 719: 717: 714: 712: 709: 708: 706: 700: 692: 689: 688: 687: 684: 683: 681: 677: 671: 668: 666: 665:Sleeper agent 663: 661: 658: 656: 653: 651: 648: 646: 643: 639: 636: 635: 634: 631: 629: 628: 624: 622: 619: 618: 616: 611: 608: 606: 603: 602: 599: 595: 588: 583: 581: 576: 574: 569: 568: 565: 557: 551: 547: 546: 540: 536: 530: 526: 525: 519: 512: 511: 505: 501: 496: 489: 485: 484: 480: 471: 468: 462: 459: 456:DeVine (2019) 453: 450: 444: 441: 435: 433: 429: 423: 419: 416: 414: 411: 410: 406: 404: 402: 394: 389: 384: 381: 378: 374: 371: 370: 366: 364: 358: 355: 353: 350: 347: 343: 339: 336: 334: 331: 329: 325: 322: 320: 317: 315: 312: 310: 306: 302: 301:access agents 298: 295: 293: 289: 286: 283: 279: 276: 275: 274: 268: 266: 264: 260: 256: 252: 248: 244: 239: 237: 232: 229: 219: 216: 208: 198: 194: 188: 187: 183: 177: 168: 167: 161: 159: 157: 153: 149: 145: 141: 137: 136:interrogation 133: 129: 125: 122:(IMINT), and 121: 117: 113: 109: 105: 104: 95: 63:, pronounced 62: 58: 52: 48: 44: 39: 33: 19: 1212:Surveillance 1202:Resident spy 1143:Cryptography 1023: 948:Surveillance 895: 736:Cyber spying 721:Cryptography 660:Resident spy 645:Double agent 625: 548:. CQ Press. 544: 523: 509: 499: 481:Bibliography 470: 461: 452: 443: 398: 361: 272: 240: 233: 226: 211: 202: 180: 60: 56: 55: 1284:Geophysical 1066:Cell system 1053:Clandestine 938:Stay-behind 847:Recruitment 804:Canary trap 702:Devices and 650:Field agent 49:during the 43:U.S. Marine 1462:Categories 1313:earthquake 1177:False flag 1015:Collection 933:Sexpionage 913:COINTELPRO 906:safe house 886:False flag 823:Operations 797:techniques 793:Tradecraft 424:References 205:March 2024 182:neutrality 118:(SIGINT), 1304:Materials 1158:Defection 1153:Dead drop 1126:black bag 1091:Espionage 857:black bag 741:Dead drop 670:Spymaster 594:Espionage 328:detainees 297:Espionage 292:diplomats 193:talk page 128:espionage 1364:Analysis 1162:Turncoat 1109:handling 923:SHAMROCK 776:microdot 679:Analysis 407:See also 399:Italy's 333:Refugees 305:couriers 278:Advisors 186:disputed 162:Overview 148:military 51:Iraq War 47:Fallujah 1311: ( 1289:Nuclear 1259:TEMPEST 918:MINARET 862:wetwork 383:colonel 348:, etc.) 346:patrols 309:cutouts 144:torture 140:witness 1148:Cutout 1099:Agents 953:Global 879:MASINT 874:SIGINT 726:Cutout 610:Assets 605:Agents 552:  531:  377:Soviet 375:was a 61:HUMINT 1323:Other 1294:Radar 1138:Cover 1116:Asset 1104:field 638:Agent 633:Cover 514:(PDF) 491:(PDF) 395:Italy 106:) is 103:-mint 958:Mass 928:FVEY 655:Mole 550:ISBN 529:ISBN 401:AISE 261:and 228:NATO 179:The 150:and 795:and 380:GRU 326:or 280:or 251:CIA 101:HEW 1464:: 1160:/ 431:^ 344:, 307:, 303:, 265:. 245:' 158:. 138:, 134:, 130:, 79:uː 41:A 1315:) 999:e 992:t 985:v 586:e 579:t 572:v 558:. 537:. 502:. 340:( 218:) 212:( 207:) 203:( 199:. 189:. 94:/ 91:t 88:n 85:ɪ 82:m 76:j 73:h 70:ˈ 67:/ 59:( 34:. 20:)

Index

Human intelligence (espionage)
Human intelligence

U.S. Marine
Fallujah
Iraq War
/ˈhjmɪnt/
HEW-mint
intelligence-gathering
interpersonal communication
signals intelligence
imagery intelligence
measurement and signature intelligence
espionage
reconnaissance
interrogation
witness
torture
military
intelligence agencies
law enforcement
neutrality
disputed
talk page
conditions to do so are met
Learn how and when to remove this message
NATO
covert surveillance
United States Armed Forces
military intelligence

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.