38:
172:
362:
The first steps for recruiting HUMINT sources is spotting and assessing a target. Surveillance of targets (e.g., military or other establishments, open source or compromised reference documents) sometimes reveals people with potential access to information, but no clear means of approaching them.
230:
defines HUMINT as "a category of intelligence derived from information collected and provided by human sources." A typical HUMINT activity consists of interrogations and conversations with persons having access to information.
385:
who served as a source to the United
Kingdom and the United States by informing them of the precise knowledge necessary to address rapidly developing military tensions with the Soviet Union.
363:
With this group, a secondary survey is in order. Headquarters may be able to suggest an approach, perhaps through a third party or through resources not known to the field station.
1233:
241:
The manner in which HUMINT operations are conducted is dictated by both official protocol and the nature of the source of the information. Within the context of the
1446:
997:
508:
1243:
1472:
498:
DeVine, Michael E. (June 14, 2019). "Covert Action and
Clandestine Activities of the Intelligence Community: Selected Definitions in Brief".
1376:
1040:
1467:
990:
107:
1439:
1080:
262:
234:
As the name suggests, human intelligence is mostly collected by people and is commonly provided via espionage or some other form of
192:
1268:
1238:
983:
878:
834:
123:
1421:
553:
532:
1070:
829:
238:. However, there are also overt methods of collection, such as via interrogation of subjects or simply through interviews.
584:
1014:
417:
730:
214:
98:
1371:
1363:
765:
690:
1381:
181:
249:, HUMINT activity may involve clandestine activities, however these operations are more closely associated with
1312:
1137:
1052:
632:
258:
1006:
318:
1429:
111:
487:
242:
42:
1344:
1075:
327:
281:
1396:
1386:
1334:
1065:
715:
685:
577:
1411:
1349:
1329:
1278:
1035:
510:
Government 139 (Class Notes) Syllabus
Section 1 — Human Intelligence: From Sleepers to Walk-ins
351:
185:
17:
1298:
964:
412:
246:
151:
37:
1401:
1339:
1225:
1181:
1166:
1115:
1060:
890:
873:
846:
609:
300:
119:
115:
196:
8:
1434:
1308:
1125:
1098:
952:
856:
604:
254:
235:
313:
1406:
1391:
1283:
1258:
1196:
1147:
1132:
841:
808:
782:
760:
755:
725:
710:
570:
379:
308:
31:
1248:
957:
626:
549:
528:
1303:
1253:
922:
654:
323:
277:
66:
1191:
1120:
942:
917:
851:
813:
750:
543:
522:
341:
155:
114:. It is distinct from more technical intelligence-gathering disciplines, such as
1288:
1108:
620:
372:
131:
1461:
1206:
1186:
1171:
900:
868:
770:
745:
664:
135:
1293:
1211:
1201:
1142:
947:
735:
720:
659:
644:
637:
376:
975:
1103:
937:
803:
649:
1176:
932:
912:
905:
885:
792:
356:
337:
126:(MASINT). HUMINT can be conducted in a variety of ways, including via
1157:
1152:
1090:
927:
740:
669:
593:
296:
287:
127:
1161:
775:
291:
147:
50:
46:
861:
382:
332:
304:
143:
139:
345:
488:"NATO glossary of terms and definitions (English and French)"
78:
562:
154:, HUMINT can also apply in various civilian sectors such as
400:
227:
250:
84:
75:
284:
personnel working with host nation forces or populations
1447:
Counterintelligence and counter-terrorism organizations
524:
527:. Strategic Studies Institute, U.S. Army War College.
99:
87:
90:
27:
Intelligence gathered by means interpersonal contact
81:
72:
69:
506:
1459:
273:Typically, sources of HUMINT generally include:
30:For the intellectual capability of humans, see
991:
578:
1005:
468:
1473:Human intelligence (information gathering)
998:
984:
585:
571:
434:
432:
366:
195:. Please do not remove this message until
215:Learn how and when to remove this message
516:, California State University Sacramento
459:
191:Relevant discussion may be found on the
36:
1412:Scientific & Technical intelligence
441:
429:
14:
1460:
835:Chinese espionage in the United States
520:
497:
124:measurement and signature intelligence
45:asking a local woman about weapons in
979:
566:
541:
450:
263:its associated operational techniques
1234:By alliances, nations and industries
830:Chinese intelligence activity abroad
389:
268:
165:
896:Interpersonal (HUMINT) intelligence
24:
1468:Intelligence gathering disciplines
418:Intelligence collection management
25:
1484:
731:Computer and network surveillance
766:Short-range agent communications
403:uses mainly human intelligence.
170:
65:
1382:Words of estimative probability
1244:Operational platforms by nation
542:Clark, Robert M. (2013-09-13).
480:
500:Congressional Research Service
319:Non-governmental organizations
259:clandestine human intelligence
110:by means of human sources and
13:
1:
592:
521:Steele, Robert David (2010).
423:
7:
1430:Intelligence cycle security
406:
197:conditions to do so are met
161:
146:. Although associated with
112:interpersonal communication
10:
1489:
243:United States Armed Forces
29:
1420:
1362:
1322:
1267:
1224:
1089:
1051:
1031:
1022:
1013:
822:
791:
701:
678:
600:
507:Thomas Patrick Carroll,
394:
282:foreign internal defense
1397:Intelligence assessment
1387:All-source intelligence
1007:Intelligence management
716:Covert listening device
686:Intelligence assessment
545:Intelligence Collection
367:Notable HUMINT examples
299:clandestine reporting,
1081:Operational techniques
1036:Special reconnaissance
352:Special reconnaissance
108:intelligence-gathering
53:
965:Targeted surveillance
413:Document Exploitation
247:military intelligence
152:intelligence agencies
40:
1402:Medical intelligence
1372:Competing hypotheses
1182:Industrial espionage
1167:Denial and deception
891:Industrial espionage
691:competing hypotheses
465:Steele (2010) pg. 95
438:AAP-6 (2013) pg. 109
288:Diplomatic reporting
120:imagery intelligence
116:signals intelligence
1435:Counterintelligence
1350:Technical (TECHINT)
1345:Open-source (OSINT)
1335:Geospatial (GEOINT)
1309:Casualty estimation
447:Clark (2013) pg. 76
357:Traveler debriefing
257:and HUMINT include
255:counterintelligence
236:covert surveillance
184:of this section is
1407:Military geography
1392:Basic intelligence
1330:Financial (FININT)
1271:signature (MASINT)
1197:One-way voice link
1133:Concealment device
842:Cold War espionage
809:Front organization
783:Surveillance tools
761:Phone surveillance
756:One-way voice link
711:Concealment device
338:Routine patrolling
57:Human intelligence
54:
32:Human intelligence
1455:
1454:
1358:
1357:
1249:Direction finding
1239:In modern history
1220:
1219:
973:
972:
627:Agent provocateur
555:978-1-4833-2437-1
534:978-1-58487-439-3
390:HUMINT by country
314:Military attachés
269:Sources of HUMINT
225:
224:
217:
16:(Redirected from
1480:
1254:Traffic analysis
1226:Signals (SIGINT)
1061:Asset recruiting
1029:
1028:
1020:
1019:
1000:
993:
986:
977:
976:
587:
580:
573:
564:
563:
559:
538:
517:
515:
503:
494:
492:
475:
472:
466:
463:
457:
454:
448:
445:
439:
436:
324:Prisoners of war
220:
213:
209:
206:
200:
174:
173:
166:
102:
97:
96:
93:
92:
89:
86:
83:
80:
77:
74:
71:
21:
1488:
1487:
1483:
1482:
1481:
1479:
1478:
1477:
1458:
1457:
1456:
1451:
1416:
1354:
1340:Imagery (IMINT)
1318:
1279:Electro-optical
1270:
1269:Measurement and
1263:
1216:
1192:Numbers station
1121:Black operation
1085:
1047:
1009:
1004:
974:
969:
943:Sting operation
852:Black operation
818:
814:Limited hangout
796:
787:
751:Numbers station
703:
697:
674:
614:
596:
591:
556:
535:
513:
490:
486:
483:
478:
473:
469:
464:
460:
455:
451:
446:
442:
437:
430:
426:
409:
397:
392:
369:
342:military police
271:
253:projects. Both
221:
210:
204:
201:
190:
175:
171:
164:
156:law enforcement
142:interviews, or
100:
68:
64:
35:
28:
23:
22:
15:
12:
11:
5:
1486:
1476:
1475:
1470:
1453:
1452:
1450:
1449:
1444:
1443:
1442:
1432:
1426:
1424:
1418:
1417:
1415:
1414:
1409:
1404:
1399:
1394:
1389:
1384:
1379:
1377:Target-centric
1374:
1368:
1366:
1360:
1359:
1356:
1355:
1353:
1352:
1347:
1342:
1337:
1332:
1326:
1324:
1320:
1319:
1317:
1316:
1306:
1301:
1299:Radiofrequency
1296:
1291:
1286:
1281:
1275:
1273:
1265:
1264:
1262:
1261:
1256:
1251:
1246:
1241:
1236:
1230:
1228:
1222:
1221:
1218:
1217:
1215:
1214:
1209:
1204:
1199:
1194:
1189:
1184:
1179:
1174:
1169:
1164:
1155:
1150:
1145:
1140:
1135:
1130:
1129:
1128:
1118:
1113:
1112:
1111:
1106:
1095:
1093:
1087:
1086:
1084:
1083:
1078:
1073:
1068:
1063:
1057:
1055:
1049:
1048:
1046:
1045:
1044:
1043:
1032:
1026:
1024:Human (HUMINT)
1017:
1011:
1010:
1003:
1002:
995:
988:
980:
971:
970:
968:
967:
962:
961:
960:
955:
945:
940:
935:
930:
925:
920:
915:
910:
909:
908:
903:
893:
888:
883:
882:
881:
876:
866:
865:
864:
859:
849:
844:
839:
838:
837:
826:
824:
820:
819:
817:
816:
811:
806:
800:
798:
789:
788:
786:
785:
780:
779:
778:
768:
763:
758:
753:
748:
743:
738:
733:
728:
723:
718:
713:
707:
705:
704:communications
699:
698:
696:
695:
694:
693:
682:
680:
676:
675:
673:
672:
667:
662:
657:
652:
647:
642:
641:
640:
630:
623:
621:Agent handling
617:
615:
613:
612:
607:
601:
598:
597:
590:
589:
582:
575:
567:
561:
560:
554:
539:
533:
518:
504:
495:
493:. 2013. AAP-6.
482:
479:
477:
476:
474:Carroll (2006)
467:
458:
449:
440:
427:
425:
422:
421:
420:
415:
408:
405:
396:
393:
391:
388:
387:
386:
373:Oleg Penkovsky
368:
365:
360:
359:
354:
349:
335:
330:
321:
316:
311:
294:
290:by accredited
285:
270:
267:
223:
222:
178:
176:
169:
163:
160:
132:reconnaissance
26:
9:
6:
4:
3:
2:
1485:
1474:
1471:
1469:
1466:
1465:
1463:
1448:
1445:
1441:
1440:organizations
1438:
1437:
1436:
1433:
1431:
1428:
1427:
1425:
1423:
1422:Dissemination
1419:
1413:
1410:
1408:
1405:
1403:
1400:
1398:
1395:
1393:
1390:
1388:
1385:
1383:
1380:
1378:
1375:
1373:
1370:
1369:
1367:
1365:
1361:
1351:
1348:
1346:
1343:
1341:
1338:
1336:
1333:
1331:
1328:
1327:
1325:
1321:
1314:
1310:
1307:
1305:
1302:
1300:
1297:
1295:
1292:
1290:
1287:
1285:
1282:
1280:
1277:
1276:
1274:
1272:
1266:
1260:
1257:
1255:
1252:
1250:
1247:
1245:
1242:
1240:
1237:
1235:
1232:
1231:
1229:
1227:
1223:
1213:
1210:
1208:
1207:Steganography
1205:
1203:
1200:
1198:
1195:
1193:
1190:
1188:
1187:Interrogation
1185:
1183:
1180:
1178:
1175:
1173:
1172:Eavesdropping
1170:
1168:
1165:
1163:
1159:
1156:
1154:
1151:
1149:
1146:
1144:
1141:
1139:
1136:
1134:
1131:
1127:
1124:
1123:
1122:
1119:
1117:
1114:
1110:
1107:
1105:
1102:
1101:
1100:
1097:
1096:
1094:
1092:
1088:
1082:
1079:
1077:
1076:Direct action
1074:
1072:
1071:Covert action
1069:
1067:
1064:
1062:
1059:
1058:
1056:
1054:
1050:
1042:
1041:organizations
1039:
1038:
1037:
1034:
1033:
1030:
1027:
1025:
1021:
1018:
1016:
1012:
1008:
1001:
996:
994:
989:
987:
982:
981:
978:
966:
963:
959:
956:
954:
951:
950:
949:
946:
944:
941:
939:
936:
934:
931:
929:
926:
924:
921:
919:
916:
914:
911:
907:
904:
902:
901:interrogation
899:
898:
897:
894:
892:
889:
887:
884:
880:
877:
875:
872:
871:
870:
869:Eavesdropping
867:
863:
860:
858:
855:
854:
853:
850:
848:
845:
843:
840:
836:
833:
832:
831:
828:
827:
825:
821:
815:
812:
810:
807:
805:
802:
801:
799:
794:
790:
784:
781:
777:
774:
773:
772:
771:Steganography
769:
767:
764:
762:
759:
757:
754:
752:
749:
747:
746:Invisible ink
744:
742:
739:
737:
734:
732:
729:
727:
724:
722:
719:
717:
714:
712:
709:
708:
706:
700:
692:
689:
688:
687:
684:
683:
681:
677:
671:
668:
666:
665:Sleeper agent
663:
661:
658:
656:
653:
651:
648:
646:
643:
639:
636:
635:
634:
631:
629:
628:
624:
622:
619:
618:
616:
611:
608:
606:
603:
602:
599:
595:
588:
583:
581:
576:
574:
569:
568:
565:
557:
551:
547:
546:
540:
536:
530:
526:
525:
519:
512:
511:
505:
501:
496:
489:
485:
484:
471:
462:
456:DeVine (2019)
453:
444:
435:
433:
428:
419:
416:
414:
411:
410:
404:
402:
384:
381:
378:
374:
371:
370:
364:
358:
355:
353:
350:
347:
343:
339:
336:
334:
331:
329:
325:
322:
320:
317:
315:
312:
310:
306:
302:
301:access agents
298:
295:
293:
289:
286:
283:
279:
276:
275:
274:
266:
264:
260:
256:
252:
248:
244:
239:
237:
232:
229:
219:
216:
208:
198:
194:
188:
187:
183:
177:
168:
167:
159:
157:
153:
149:
145:
141:
137:
136:interrogation
133:
129:
125:
122:(IMINT), and
121:
117:
113:
109:
105:
104:
95:
63:, pronounced
62:
58:
52:
48:
44:
39:
33:
19:
1212:Surveillance
1202:Resident spy
1143:Cryptography
1023:
948:Surveillance
895:
736:Cyber spying
721:Cryptography
660:Resident spy
645:Double agent
625:
548:. CQ Press.
544:
523:
509:
499:
481:Bibliography
470:
461:
452:
443:
398:
361:
272:
240:
233:
226:
211:
202:
180:
60:
56:
55:
1284:Geophysical
1066:Cell system
1053:Clandestine
938:Stay-behind
847:Recruitment
804:Canary trap
702:Devices and
650:Field agent
49:during the
43:U.S. Marine
1462:Categories
1313:earthquake
1177:False flag
1015:Collection
933:Sexpionage
913:COINTELPRO
906:safe house
886:False flag
823:Operations
797:techniques
793:Tradecraft
424:References
205:March 2024
182:neutrality
118:(SIGINT),
1304:Materials
1158:Defection
1153:Dead drop
1126:black bag
1091:Espionage
857:black bag
741:Dead drop
670:Spymaster
594:Espionage
328:detainees
297:Espionage
292:diplomats
193:talk page
128:espionage
1364:Analysis
1162:Turncoat
1109:handling
923:SHAMROCK
776:microdot
679:Analysis
407:See also
399:Italy's
333:Refugees
305:couriers
278:Advisors
186:disputed
162:Overview
148:military
51:Iraq War
47:Fallujah
1311: (
1289:Nuclear
1259:TEMPEST
918:MINARET
862:wetwork
383:colonel
348:, etc.)
346:patrols
309:cutouts
144:torture
140:witness
1148:Cutout
1099:Agents
953:Global
879:MASINT
874:SIGINT
726:Cutout
610:Assets
605:Agents
552:
531:
377:Soviet
375:was a
61:HUMINT
18:HUMINT
1323:Other
1294:Radar
1138:Cover
1116:Asset
1104:field
638:Agent
633:Cover
514:(PDF)
491:(PDF)
395:Italy
106:) is
103:-mint
958:Mass
928:FVEY
655:Mole
550:ISBN
529:ISBN
401:AISE
261:and
228:NATO
179:The
150:and
795:and
380:GRU
326:or
280:or
251:CIA
101:HEW
1464::
1160:/
431:^
344:,
307:,
303:,
265:.
245:'
158:.
138:,
134:,
130:,
79:uː
41:A
1315:)
999:e
992:t
985:v
586:e
579:t
572:v
558:.
537:.
502:.
340:(
218:)
212:(
207:)
203:(
199:.
189:.
94:/
91:t
88:n
85:ɪ
82:m
76:j
73:h
70:ˈ
67:/
59:(
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.