KOMBATEL
                  Intel drives Ops  




Where does HUMINT fit in with the 21st century intelligence community? [by Julien Babanoury, CEIS]

The honeypot has been an icon in stories of espionage (fiction and non-fiction) presented to the general public over the past 70 years or so. In the current digital age, the honeypot has become a pixelated, scantily-clad female sent to a target in jpeg format to be opened and inadvertently allow access to his computer or network. Has the advent of the Internet and complex computer systems led us to ignore the human factor of interpersonal communication? More pertinent to espionage, has the rise of signals intelligence (SIGINT) overshadowed human intelligence (HUMINT) to the point where the latter is neglected?       
Human intelligence, or HUMINT, has played a role in our society for centuries, as it is fundamentally information drawn from human sources and interpersonal communication. HUMINT can be collected through clandestine operations (recruiting spies), overt collection abroad, traveller debriefing, POW interrogation, diplomatic missions (military attachés) and counterintelligence among the many means. The complexity of these operations requires a strong degree of preparation for any rendez-vous, interrogation, and extraction of information. Moreover, a major obstacle is the communication aspect of HUMINT, which could be difficult due to a lack of cooperation, language barriers, etc. HUMINT operations in foreign countries can also pose a great risk to the intelligence collectors because of the susceptibility to the local police, military or counterintelligence units. Despite these difficulties and risks, HUMINT can collect raw pieces of intelligence that are often more accurate than the intelligence collected from SIGINT. HUMINT is able to find meaning in the smallest pieces of intelligence, which could have significant consequences in turn.
Signals intelligence, or SIGINT, is the interception of signals or encrypted information. While encryption and decryption quickly followed the development of writing, modern SIGINT originated in the beginning of the 20th century with electronic cables transmitting communications. And today, SIGINT includes communications intelligence (COMINT) and electronic intelligence (ELINT). COMINT is defined as technical and intelligence information that is taken from foreign communications and ELINT is the information gathered from advanced computer systems[1]. SIGINT is able to fishnet a massive amount of information from any part of the world by accessing data from cryptanalysis, traffic analysis, computer exploitation techniques, and cable tapping; meaning less time and resources are spent while protecting the lives of intelligence agents who mostly work from secure bases in their home country or embassies.

Current Status
Today, SIGINT has taken center stage in the intelligence community because the Internet and technical advancements have made its methods rather easy, and the recent disclosures of American whistleblower Edward Snowden have made the NSA’s massive SIGINT program public. The United States has generally tended to favour open source intelligence (OSINT), geospatial intelligence (GEOINT) and SIGINT over HUMINT as a means to understand what its enemies were planning. Former CIA officer and spy for the Soviet Union, Aldrich Ames, bluntly formulated the United States’ attitude towards human intelligence – “The human spy, in terms of the American espionage effort, had never been terribly pertinent”. Even in other countries such as Russia, whose security services have had strong predilections towards HUMINT in the past, are conducting extensive SIGINT operations; a trend based on necessity and availability. Communication cables, servers with troves of data, etc. – all relied upon by our society and all contain information that can be believed to be pertinent to state security and interests.
Meanwhile, both HUMINT and SIGINT practices are being integrated into cyber intelligence, or CYBINT, which encompasses the activities of intelligence collection and the product of intelligence collection. The primary purposes of CYBINT are counter-cyber intelligence, specifically ISR (intelligence, surveillance, and reconnaissance), and computer network exploitation. CYBINT even goes beyond the collection and operational aspects of intelligence by employing an analytical methodology with all of the data and information available to minimize uncertainties for all types of operations. CYBINT is not designated to a specific US agency, although the NSA, US Cyber Command and the Defence Information Systems Agency exercise CYBINT capacities. The former two institutions being under one command particularly attests to CYBINT collection, analysis, and operations.
Of course, neither HUMINT nor SIGINT nor CYBINT can be accurately measured; but their measurability is not what is in question. Just like any other institution, social practice, or anything in the physical world, intelligence gathering has a balance that is determined through causality. An increase and reliance on SIGINT could diminish and neglect the use of HUMINT. With every person and every government using the Internet and telecommunications, SIGINT, without a doubt, plays a major role in intelligence gathering.

Is HUMINT necessary?
It should be noted that when it comes to using different sources of intelligence, countries do not choose one source and discard another. However, they may have preferences or resource limitations, which could lead to a skewed reliance. Nonetheless, HUMINT should not be ignored. Human intelligence can give intelligence agencies ‘gems’; but more importantly, it is the use of all source capacities to their fullest extent that provides the surest intelligence. When HUMINT has been neglected and badly under-resourced, the collection gaps that were created led to operational blunders.
Of the countless examples of HUMINT’s effective contribution to intelligence gathering, the most notable recent example was the hunt for Osama bin Laden, where Pakistani physician was recruited by the CIA to organize a fake vaccination drive. The purpose of the drive was to collect DNA samples from the residents of Abbottabad to confirm bin Laden’s presence in the city. Conversely, an operation that failed due to a lack of human intelligence was the Bay of Pigs Invasion, a US-backed coup to overthrow the communist government in Cuba. The failures attributed to the failed operation were a lack of Cuban sources in Cuba and a lack of counterintelligence information to discover the double-agents who made up much of the Cuban paramilitary group sent by the United States. However, these two examples should not go without saying that HUMINT doesn’t always produce gold. Between 1999 and 2001 Iraqi defector codenamed Curveball alleged that Iraq was manufacturing mobile biological weapon laboratories, an account used to support the US-led invasion of Iraq in 2003. Curveball had been poorly handled by German operatives and the CIA was blamed for not properly investigating the doubts over Curveball and his claims; claims that turned out to be false.

What is the future of HUMINT?
HUMINT is due for revitalization for several reasons. First, The United States’ War on Terror has demonstrated that terrorists and other non-state actors cannot compete against technologically advanced countries in terms of firepower and intelligence gathering. As a result, these actors have reverted to limited or non-technological communication; and thus the communication leaves little reverberations that can be picked up by SIGINT. Considering another major source of intelligence, geospatial intelligence (GEOINT) can only go so far as to tracking enemy movements, especially terrorist, with drones and satellites. Intelligence gathering through spies and local recruits is imperative in locating and possibly destroying terrorist leaders or enclaves.
Second, the degree of causality in the international intelligence community is likely to tip the scale towards a stronger emphasis on HUMINT operations. During the Cold War, the Soviet Union’s human intelligence capabilities were arguably the strongest in the world. Subsequently, to meet the strength of Soviet HUMINT, US counterintelligence capabilities developed into one of the strongest doctrines in the world.
Regarding SIGINT, the United States’ offensive and surveillance capabilities have more than surpassed the capabilities of every other country; but this has created a sense of overconfidence in its technical intelligence gathering abilities and has obscured the way information is analyzed and presented. For example, the NSA attempted to map terrorist networks with data acquired from phone companies and internet service providers. The creation of complex mega-graphs, nicknamed ‘big ass graphs’, were of no use to CIA operatives whose job it was to track down the terrorists[2].
Likewise, in the wake of the revelations of America’s mass surveillance program, countries are now expected to reduce and protect their electrical information and communications. Most top secret information is no longer digitalized and the use of diplomatic couriers has greatly increased, meaning less vital information is able to be picked up by SIGINT. Just recognizing SIGINT overconfidence and signal communications downplay is enough to rebalance the collection and dissemination methods of the intelligence community.

The Interlacement
During peacetime, countries will continue to spy, but mainly for economic intelligence. This means that countries, like the United States, will spy on allies and friendly nations, who overlap as economic competitors and military allies during a crisis[3]. This coincides perfectly with the NSA SIGINT programs in countries like Brazil, France and Germany. Collecting information from a data center in Utah is much less personal than sending operatives to allied countries to gather economic intelligence; and so making it psychologically easier to spy on allies. This level of impersonality SIGINT has over HUMINT is decreasing however, as both are becoming more and more intertwined.
As it was indirectly mentioned above with the ‘big ass graphs’, SIGINT provides intelligence to HUMINT collectors so that the latter are able to pinpoint and complete their objectives. Reciprocally, information that is collected on the ground can be sent to SIGINT offices who can elaborate on that information with whatever is intercepted. The traditional intelligence cycle management is still in place but there is much more dialogue between United States agencies that operate different collection methods. HUMINT can also contribute to SIGINT and CYBINT by accessing the targeted computer systems directly through recruits or unaware victims. The NSA’s tailored access operations, for example, work closely with the CIA to use its local informants to help with the operations requiring physical access to computers that are never connected to a network[4]. Despite its challenges and risks, HUMINT is a viable option for circumventing physical and cyberdefence perimeters of computer networks and can defeat confidentiality, integrity, and availability of secure information by acquiring the necessary privileges[5].
Conclusion
Human intelligence provides only 10 to 20% of the information collected by the US intelligence community[6]. The information collected however is mostly taken from a wide range of experts and insider sources whose roles are overshadowed by the use of technology. The human factor is still a major part of security; especially in cybersecurity where most business and government leaders see human error as a strong contributor to breaches of all sorts – and even the heads of IT security in government agencies can be susceptible to the digital honeypot[7]. Until the dawn of artificial intelligence, spies will have to continue implementing technological advancements in their operations while keeping in mind that not all information is located in a server.
By Julien Babanoury, CEIS

[1] https://www.cia.gov/news-information/featured-story-archive/2010-featured-story-archive/intelligence-signals-intelligence-1.html
[2] http://online.wsj.com/news/articles/SB10001424052748704820904575055481363319518
[3] National Research Council. Cryptography’s Role in Securing the Information Society . Washington, DC: The National Academies Press, 1996.
[4] http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html
[5] Encyclopedia of Quantitative Risk Analysis and Assessment, Volume 1 edited by Edward L. Melnick, Brian S. Everitt
[6] http://globalsecuritystudies.com/Margolis%20Intelligence%20(ag%20edits).pdf
[7] http://nakedsecurity.sophos.com/2013/11/03/fake-femme-fatale-dupes-it-guys-at-us-government-agency/
EN BREF
[21.07.14] [Wired] La loi sur la surveillance électronique votée par le Parlement anglais
[17.07.14] [portugaldigital.com.br] En visite officielle au Brésil, Xi Jinping, président de la Chine, critique la politique d’espionnage et le double standard américain
[17.07.14] [WAM] Le Hub Dubaï Internet City prépare une conférence pour le mois d’août, en partenariat avec le MIT.
[16.07.14] [Wall Street Journal] La nouvelle directrice de la division criminelle du US Justice Department annonce que la lutte contre la cybercriminalité sera sa priorité
[16.07.14] [Google] Google annonce le lancement de « Project Zero » ciblant les vulnérabilités « zero-day »
[15.07.14] [Gigaom] La Commission allemande en charge de l’affaire NSA réutilise des moyens physiques pour éviter les écoutes électroniques.
[11.07.14] [BBC] La politique gouvernementale anglaise de lutte contre la cybercriminalité critiquée
[11.07.14] [Facebook] Une cyberattaque déstabilise la tenue des élections législatives tunissiennes
[10.07.14] [Arab News] Le Ministère de l’Education Saoudien veut enseigner la gestion des réseaux sociaux dans les écoles saoudiennes.



Copyright © 2013 USA TIOCC
Privacy policy