HUMINT/CI Revisited by Keshav Mazumdar ATO CMAS
TACTICAL HUMINT
HUMINT is collected information which we term positive intelligence after processing.HUMINT collectors
access human sources and multimedia to gain information about enemy
intent,composition,disposition,capabilities,table of order and equipment, command control nodes, centers of
gravity,leadership,personnel—this is also called Order of Battle when conducted prior to a combat situation.
The Commander specifies his intelligence requirements explicitly and going by these requirements ,
prioritized , human sources,informants,and other human elements possessing information compatible with
the said requirements are utilized by application of specific techniques like tactical
questioning,debriefing,document exploitation, eliciting and interrogation and reconnaissance and
surveillance. The HUMINT collectors are not intelligence operatives with general intelligence education and
training but specialists.
Counterintelligence is also a collection oriented discipline like HUMINT but not an intelligence discipline in
the strictest sense. It is concerned with enemy intent while HUMINT is concerned with collection part only
so as to satisfy Commanders intelligence requirements in order to answer certain information gaps.CI
attempts to prevent sabotage,assassination,terrorism,subversive and enemy intelligence activities , deny the
enemy access to installations and sensitive information , acts as a protective shield for the Commander by
supporting OPSEC and force protection and acts in an advisory capacity recommending countermeasures to
enemy intelligence activities.CI is a protection component in the Commanders repository of defensive
tactics and techniques and CI also protects the intelligence cycle. Several definitions exclude personnel,
physical, document or communications security programs from CI purview , but on close inspection it will
be seen that CI invariably is resorted to while implementing force protection and denial/deception measures
(information warfare) thus bringing in play the security aspects of personnel , physical,documents.CI
support tio physical security , infrastructure, technology protection, military security,HUMINT –all these
some way or the other involve those elements that are kept out of general definitions.
Definitions can be very confusing, may render doctrine imperfect and lead to redundancy. For example the
Army ten ds to maintain a general perspective on threat—statements like our forces are prepared to deter
/attack/defend against a wide spectrum of threats, ranging from criminal activity in our jurisdiction which
may abet our main enemy, terrorism , subversion to small wars, wars and battles. Now this generalized
concept is fine in that we can have several security programs, each tending to one specific threat type in the
entire spectrum. But the disadvantage in this approach is we cannot focus on the main threat, say terrorism,
and as security concepts like force protection, deception operations, physical security, military security,etc
all have certain elements in common we land up with redundant programs designed to handle these security
concerns. For example antiterrorism and force protection both have in common physical security as a
passive defensive subcomponent where the installation critical points are protected after vulnerability
assessments and red teaming. The same subcomponent is the major component in a physical security
program. Thus there occurs good redundancy if we do not have a focused view of the threat and counter
threat measures become diffused over the broad spectrum.
The same goes with the definition of intelligence and CI. Or rather I should say the general perspectives
held by most Commanders and even intelligence officers.
The main idea is to remove uncertainty and gain a decision advantage. This should be the prime objective of
the Commander.HUMINT and CI are both shaping operations but with a critical difference.HUMINT
shapes the Commanders view of the battle space by providing him accurate intelligence about enemy order
of battle. Plus other information requirements when ops are in progress.CI on the other hand penetrates the
enemy commanders decision cycle and shapes his views ‘’like the way’’ our Commander desires by denying
the enemy commander access to our operations, plans and information systems , and using offensive
methods like penetration , infiltration and also denial/deception operations. Both shaping operations have
one thing in common as goal. To act as force enabler. To heighten the Commanders situational
understanding. In other words to gain that ‘’decisive ‘’ advantage. .To get a ‘’positional’’ advantage.