Abstract
From targeting to recruitment, clandestine handling to intelligence collection and processing, no aspect of Human Intelligence (HUMINT) operations remains unaffected by the profound impact of technological development, particularly in cyberspace. Rapid innovation in this domain has both enabled and encumbered the gathering of intelligence via human sources, and in some respects even altered the established human agent acquisition cycle itself. Although perhaps some aspects of twenty-first century HUMINT techniques would be unfamiliar to John Le Carre’s Cold Warrior, George Smiley, he would surely maintain that personal interaction remains the heart of HUMINT, and no amount of cyber-interaction can replace the close bond between an intelligence officer and his or her agent. In the cyber era, HUMINT will become even more complex, and case officers, their managers, and their political masters will need to understand the significant role of technology in their operations, the creative and persistent counterintelligence threats, and how intelligence collection is evolving faster than ever before.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
‘Gray literature’ is information, usually printed, that is not secret or otherwise classified but may be restricted by the author or recipient in some way. Conference proceedings and scientific papers are examples of this.
- 2.
This is not a break with previous counterintelligence practice in such situations, but the real-time ease of checking the story as relayed gives the advantage to the counterintelligence service.
- 3.
There are nearly unique exceptions to this rule, such as the handling of FBI Agent Robert Hanssen. Hanssen never met his Soviet/Russian handlers in person, but as a professional intelligence officer, he could dictate the terms and his information was beyond reproach.
- 4.
The focus here is the particular added challenge for intelligence officers who deal in the clandestine collection of secrets such as the plans and intentions of adversarial governments.
- 5.
The highest level of classification that Manning revealed was ‘Secret’. CIA operational cables carry additional access code words and handling controls beyond ‘Secret’ that Manning’s disclosures did not include.
- 6.
CIA source identities are sacrosanct and they are exempt from FOIA requests. See http://www.foia.cia.gov/frequently-asked-questions.
Bibliography
Burkett, Randy (2013) ‘An Alternative Framework for Agent Recruitment: From MICE to RASCLS’, Studies in Intelligence, 57(1), pp. 7–17.
Campbell, Stephen H. (2013) ‘Intelligence in the Post-Cold War Period: The Impact of Technology’, The Intelligencer, 20(1), pp. 57–65.
Clark, Colin (2014) ‘Biometrics May Mean the End of a Spy’s Disguise’, Breaking Defense, 20 October. http://breakingdefense.com/2014/10/biometrics-may-mean-end-of-the-spys-disguise/.
Cummings, Charles (2015) ‘What’s the Point of Spies?’ The Telegraph, 16 June. http://www.telegraph.co.uk/culture/books/bookreviews/11648193/Whats-the-point-of-spies.html.
Gannon, John (2001) ‘The Strategic Use of Open-Source Information’, Studies in Intelligence, 45(3), pp. 67–71.
Gewirtz, David (2015) ‘After OPM Breach, Snowden and Manning are Just the Beginning’, ZDNet, 15 June. http://www.zdnet.com/article/after-opm-snowden-and-manning-are-just-the-beginning/.
Gosztola, Kevin (2013) ‘The State Department & the ‘Chilling Effect’ Caused by Bradley Manning’s Release of Diplomatic Cables’, 5 August. http://dissenter.firedoglake.com/2013/08/05/the-state-department-the-chilling-effect-caused-by-bradley-mannings-release-of-diplomatic-cables/(blog).
Hosenball, Mark (2009) ‘To Disclose Or Not To Disclose: A Fight Inside The CIA’, The Daily Beast, May 29. http://www.thedailybeast.com/newsweek/2009/05/29/to-disclose-or-not-to-disclose-a-fight-inside-the-cia.html.
Kimball, Warren F. (2007) ‘Arguing for Accountability: Openness and the CIA’, Studies in Intelligence, 10(1), pp. 63–67.
Kloc, Joe (2014) ‘How Much Did Snowden Take? Not Even the NSA Really Knows’, Newsweek, 9 June. http://www.newsweek.com/how-much-did-snowden-take-not-even-nsa-really-knows-253940.
Lyngaas, Sean (2015) ‘How (And Why) the CIA Plans to Expand Cyber Capabilities’, Federal Computer Week, 24 February. https://fcw.com/articles/2015/02/24/cia-expand-cyber.aspx.
Mercado, Stephen C. (2004) ‘Sailing the Sea of OSINT in the Information Age’, Studies in Intelligence, 48(3), pp. 45–55.
Mick, Jason (2010) ‘Taliban Thankful that Wikileaks Exposed U.S. Allies, Vows to ‘Punish’ Them’, Daily Tech, 30 July. http://www.dailytech.com/Taliban+Thankful+That+Wikileaks+Exposed+US+Allies+Vows+to+Punish+Them/article19221.htm.
Omand, David, Jamie Bartlett and Carl Miller (2012) ‘Introducing Social Media Intelligence (SOCMINT)’, Intelligence and National Security, 27(6), pp. 1–23.
Reuters (2015) ‘Anthem Says at Least 8.8 Million Non-Customers Could Be Victims in Data Hack’, 24 February. http://fortune.com/2015/02/24/anthem-says-at-least-8-8-million-non-customers-could-be-victims-in-data-hack/.
Shane and Andrew E. Lehren (2010) ‘Leaked Cables Offer Raw Look at U.S. Diplomacy’, New York Times, 28 November. http://www.nytimes.com/2010/11/29/world/29cable.
Smith, David (2015) ‘South Africa Scrambles to Deal with Fallout from Leaked Spy Cables’, The Guardian, 24 February. http://www.theguardian.com/world/2015/feb/24/south-africa-scrambles-to-deal-with-fallout-from-leaked-spy-cables.
Takala, Rudy (2015) ‘Cyberexpert Says OPM Hack Affected Hundreds of Millions’, Washington Examiner, 20 August. http://www.washingtonexaminer.com/cyberexpert-says-opm-hack-affected-hundreds-of-millions/article/2570560.
Traynor, Ian (2010) ‘Wikileaks Cables Claim First Scalp as German Minister’s Aide Is Sacked’, The Guardian, 3 December.
UK Ministry of Defense Announcement (2011) ‘MOD Launches Personal Online Security Awareness Campaign’, 1 June. https://www.gov.uk/government/news/mod-launches-personal-online-security-awareness-campaign.
United States Department of Defense (2015) ‘Social Media Education and Training’, http://www.defense.gov/socialmedia/education-and-training.aspx/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Gioe, D.V. (2017). ‘The More Things Change’: HUMINT in the Cyber Age. In: Dover, R., Dylan, H., Goodman, M. (eds) The Palgrave Handbook of Security, Risk and Intelligence. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-53675-4_12
Download citation
DOI: https://doi.org/10.1057/978-1-137-53675-4_12
Published:
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-137-53674-7
Online ISBN: 978-1-137-53675-4
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)