Among the most crucial roles of the United States military in the global War on Terror is the collection of human intelligence from prisoners of war, unlawful combatants, and others. On the heels of controversy over some of the techniques used to extract information—such as waterboarding—the Department of the Army completely revised its interrogation guidelines. The result is this book, the United States Army’s human intelligence collection playbook, which gives instructions on the structure, planning and management of human intelligence operations, the debriefing of soldiers, and the analysis of known relationships and map data. The largest and most newsworthy section of the book details procedures for screening and interrogation, which permits a specific number of interrogation techniques, described in Chapter 8 as “approach techniques.” These techniques, described in great detail, carry such names as Emotional Love, Mutt and Jeff, False Flag, and even Separation. A must-read for today’s military buffs, U.S. Army Human Intelligence Collector Field Manual is also a valuable resource for anyone seeking strategies to employ in the gathering of information.
This manual provides doctrinal guidance, techniques, and procedures governing the employment of human intelligence (HUMINT) collection and analytical assets in support of the commander's intelligence needs. It outlines⎯- HUMINT operations.- The HUMINT collector's role within the intelligence operating system.- The roles and responsibilities of the HUMINT collectors and the roles of those providing the command, control, and technical support of HUMINT collection operations.
Intelligence Gathering: Front Line HUMINT Considerations I think since human beings first learned how to talk, they have been spying and telling tails on each other. The only thing that has changed with intelligence gathering from the time Sun Tzu wrote his classic book "The Art of War" in the 5th Century BC and today is the technological advancements that only really started to develop in the 20th century. The basics of HUMINT tradecraft, personal security, and recruiting informants, etc. are still very similar if not the same as in the times of Sun Tzu and earlier. The information and HUMINT techniques I talk about in this book are simple, most are just common sense, but they will give you and insight into the skills and mindset required for HUMINT and counterintelligence operations. Most of the things I talk about in this book are double-sided; you can use the techniques to target others, but they can also be used to target you. If you're involved in serious investigative or intelligence work, you must always be on the watch out for others targeting you in one way or the other. These days those involved in the commercial HUMINT, private investigation or investigative journalism would must not only be aware of their personal security but also being arrested, sued and set up by those they are investigating. The risk of losing your job, business, home, money and ending up in jail in many cases are far higher that the risk of physical assault, these are all things those in the investigations business need to take into consideration on a case by case and daily basis. This book is a valuable reference book for those involved in private investigations, investigative journalism, corporate intelligence, HUMINT and counterintelligence operations as it details the raw facts of HUMINT and intelligence gathering. The Author "Orlando Wilson" has over 29 years' experience within the international security and investigations industry and regular organized projects in some very challenging locations. He is accustomed to dealing with five star ventures and third world issues, quite often in the same day! Working with Risks Incorporated he provides a full range of security, investigation, close protection and hostile environment training and services. He has an international network of operational professionals in Europe, Caribbean, Latin America, Middle East and Africa. Also have training locations in the US... He is also a published author and has been interviewed and written articles for numerous media outlets ranging from the New York Times to Soldier of Fortune Magazine on topics ranging from kidnapping, organized crime, surveillance to maritime piracy.
This manual provides doctrinal guidance, techniques, and procedures governing the employment of human intelligence (HUMINT) collection and analytical assets in support of the commander's intelligence needs. It outlines- HUMINT operations. The HUMINT collector's role within the intelligence operating system. The roles and responsibilities of the HUMINT collectors and the roles of those providing the command, control, and technical support of HUMINT collection operations. This manual provides the doctrinal guidance for HUMINT collectors and commanders and staffs of the MI organizations responsible for planning and executing HUMINT operations. This manual also serves as a reference for personnel developing doctrine, tactics, techniques, and procedures (TTP); materiel and force structure; institutional and unit training; and standing operating procedures (SOPs), for HUMINT operations at all army echelons. In accordance with TRADOC Regulation 25-36, the doctrine in this field manual is not policy (in and of itself), but is..".a body of thought on how Army forces operate... It provides an authoritative guide for leaders and soldiers, while allowing freedom to adapt to circumstances."
This manual provides doctrinal guidance, techniques, and procedures governing the employment of human intelligence (HUMINT) collection and analytical assets in support of the commander's intelligence needs. It outlines- * HUMINT operations. * The HUMINT collector's role within the intelligence operating system. The roles and responsibilities of the HUMINT collectors and the roles of those providing the command, control, and technical support of HUMINT collection operations. This manual expands upon the information contained in FM 2-0. It supersedes FM 34-52 and rescinds ST 2-22.7. It is consistent with doctrine in FM 3-0, FM 5-0, FM 6-0, and JP 2-0. In accordance with the Detainee Treatment Act of 2005, the only interrogation approaches and techniques that are authorized for use against any detainee, regardless of status or characterization, are those authorized and listed in this Field Manual. Some of the approaches and techniques authorized and listed in this Field Manual also require additional specified approval before implementation. This manual will be reviewed annually and may be amended or updated from time to time to account for changes in doctrine, policy, or law, and to address lessons learned. This manual provides the doctrinal guidance for HUMINT collectors and commanders and staffs of the MI organizations responsible for planning and executing HUMINT operations. This manual also serves as a reference for personnel developing doctrine, tactics, techniques, and procedures (TTP); materiel and force structure; institutional and unit training; and standing operating procedures (SOPs),for HUMINT operations at all army echelons. In accordance with TRADOC Regulation 25-36, the doctrine in this field manual is not policy (in and of itself), but is "...a body of thought on how Army forces operate....[It] provides an authoritative guide for leaders and soldiers, while allowing freedom to adapt to circumstances." This manual applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the United States Army Reserve unless otherwise stated. This manual also applies to DOD civilian employees and contractors with responsibility to engage in HUMINT collection activities. It is also intended for commanders and staffs of joint and combined commands, and Service Component Commands (SCC). Although this is Army doctrine, adaptations will have to be made by other Military Departments, based on each of their organizations and specific doctrine. Material in this manual applies to the full range of military operations. Principles outlined also are valid under conditions involving use of electronic warfare (EW) or nuclear, biological, or chemical (NBC) weapons. This manual is intended for use by military, civilian, and civilian contractor HUMINT collectors, as well as commanders, staff officers, and military intelligence(MI) personnel charged with the responsibility of the HUMINT collection effort.
Provides an unclassified reference handbook which explains the categories of intelligence threat, provides an overview of worldwide threats in each category, and identifies available resources for obtaining threat information. Contents: intelligence collection activities and disciplines (computer intrusion, etc.); adversary foreign intelligence operations (Russian, Chinese, Cuban, North Korean and Romanian); terrorist intelligence operations; economic collections directed against the U.S. (industrial espionage); open source collection; the changing threat and OPSEC programs.
This manual provides doctrinal guidance, techniques, and procedures governing the employment of human intelligence (HUMINT) collection and analytical assets in support of the commander's intelligence needs. It outlines: - HUMINT operations. - The HUMINT collector's role within the intelligence operating system. - The roles and responsibilities of the HUMINT collectors and the roles of those providing the command, control, and technical support of HUMINT collection operations. This manual expands upon the information contained in FM 2-0. It supersedes FM 34-52 and rescinds ST 2-22.7. It is consistent with doctrine in FM 3-0, FM 5-0, FM 6-0, and JP 2-0. In accordance with the Detainee Treatment Act of 2005, the only interrogation approaches and techniques that are authorized for use against any detainee, regardless of status or characterization, are those authorized and listed in this Field Manual. Some of the approaches and techniques authorized and listed in this Field Manual also require additional specified approval before implementation.
This is an official work by the US Department of the Army Headquarters. It gives information on what Human Intelligence is and what role the department has in the US army. A reader learns the structure of Human Intelligence and gets an insight into their operations. Mainly, the book presents information about the planning and management of operations, their collection process, analytics, and tools.
“The new American way of war is here, but the debate about it has only just begun. In The Way of the Knife, Mr Mazzetti has made a valuable contribution to it.” —The Economist A Pulitzer Prize–winning reporter’s riveting account of the transformation of the CIA and America’s special operations forces into man-hunting and killing machines in the world’s dark spaces: the new American way of war The most momentous change in American warfare over the past decade has taken place away from the battlefields of Afghanistan and Iraq, in the corners of the world where large armies can’t go. The Way of the Knife is the untold story of that shadow war: a campaign that has blurred the lines between soldiers and spies and lowered the bar for waging war across the globe. America has pursued its enemies with killer drones and special operations troops; trained privateers for assassination missions and used them to set up clandestine spying networks; and relied on mercurial dictators, untrustworthy foreign intelligence services, and proxy armies. This new approach to war has been embraced by Washington as a lower risk, lower cost alternative to the messy wars of occupation and has been championed as a clean and surgical way of conflict. But the knife has created enemies just as it has killed them. It has fomented resentments among allies, fueled instability, and created new weapons unbound by the normal rules of accountability during wartime. Mark Mazzetti tracks an astonishing cast of characters on the ground in the shadow war, from a CIA officer dropped into the tribal areas to learn the hard way how the spy games in Pakistan are played to the chain-smoking Pentagon official running an off-the-books spy operation, from a Virginia socialite whom the Pentagon hired to gather intelligence about militants in Somalia to a CIA contractor imprisoned in Lahore after going off the leash. At the heart of the book is the story of two proud and rival entities, the CIA and the American military, elbowing each other for supremacy. Sometimes, as with the raid that killed Osama bin Laden, their efforts have been perfectly coordinated. Other times, including the failed operations disclosed here for the first time, they have not. For better or worse, their struggles will define American national security in the years to come.