5 October 2018

HUMINT Isn’t Dead, It Just Smells That Way. Time For Us To Learn From the Past

By  CAESAR KALINOWSKI 

In June of 1960, KGB officers shot Pyotr Semyonovich Popov in the back of the head after he was abruptly recalled from East Berlin to Moscow. Formerly a field-grade officer in the Main Intelligence Directorate (GRU) of the Soviet military, Popov was the CIA’s most valuable Human Intelligence (HUMINT) asset during the Cold War, providing hundreds of millions of dollars’ worth of military intelligence and the names of over 600 Soviet agents. Despite his invaluable contribution, however, the CIA missed vital clues left by Popov after his arrest by the KGB in 1959 and subsequent use as a double agent. Why did the CIA fail one of its most important sources? Whether through ignorance or complacency, Popov’s handlers had simply become accustomed to the ease of operating with the same seemingly-secure tradecraft that had served them so well in the past.


Media outlets recently reported that at least 30 of the CIA’s Chinese intelligence assets were executed during a two-year period from 2010 to 2012. Representing a staggering blow to intelligence collection in that country, a CIA special task force determined that the network was brought down by Chinese penetration of an interim encrypted digital program that allowed remote communication between case officer and source over the Internet. So why did the CIA fail its Chinese assets here? The answer is the same as it was in 1960: case officers’ overreliance on seemingly-secure tradecraft that had previously served so well.

As a former HUMINT collector, I am no stranger to the mocking cries of Signals Intelligence (SIGINT) collectors claiming that HUMINT is dead. Given the relative timeliness and ease with which SIGINT can be collected in a technological era, I think many case officers feel the same way. Why risk life, limb, and foreign imprisonment when we can simply listen in on cellphone calls or have critical information sent to us online? But as counterterrorism expert Jeffrey Norwitz points out, “HUMINT [unlike SIGINT] provides an otherwise unattainable window into the personality, emotional makeup, and innermost secrets of those who are being targeted for influence operations.” This intimate view is what separates SIGINT from HUMINT. It is also why, despite technological advances, there will always remain a need for HUMINT operations.

Ideally, the best outcome is a fusion of these two intelligence collection platforms. SIGINT provides additional asset validation, corroboration, and vetting capabilities to HUMINT operations. HUMINT likewise delivers access to critical information sought by SIGINT collectors, be it burner cellphone numbers or onsite confirmation of SIGINT information. But the usefulness of this symbiotic relationship and the expediency of SIGINT should not blind HUMINT collectors

No comments: