Saturday, April 30, 2016

Food Preparation & Preservation

It doesn't matter how well stocked your food stores are if you can't cook it. Cooking and preserving food is an important part of surviving. Cavemen learned, that hanging meat high up in their smokey cave to keep it away from the critters, preserved it even better than cooking.

Short term, the best solution is a nice propane BBQ Grill, with a backup bottle of propane.  Good ones are available from $150 - $200. Most grills can be used with wood once the propane is exhausted, but until then, the propane will cook food if you have no firewood.  If you do, the propane is a great way to get the wood fire started.  The ability to close the grill and moderate the air supply with a vent will allow the fire to smolder which will conserve fuel and be easily restarted later.  A Smoker (see pic) that uses wood is great long-term.  At the very least, you can get an inexpensive grill for under $50 and some wood or charcoal for another $20.

For nomadic cooking, there are a number of good camp stoves, but the ones that are capable of using several different types of liquid fuel (gas, diesel, kerosene, etc.), like the MSR DragonFly are best. These can be used at home, while camping or on the road to cook and stay warm. 

An indoor fireplace is a good alternative as many homes have them.  Investing in a little firewood, just in case is a good idea, especially if you live in places with cold winters. Use your fireplace each year to insure it is working.  As you use it, determine how long your wood lasts so you can plan to have enough to last you at least two weeks (or more).

Another solution is to dig a fire pit or use some of your other resources.  Things like a metal can, terracotta pot, or old refrigerator/freezer will work.  If necessary, borrow a household oven grill to cook on, or even an AC intake filter cover.  It is also critical to have a hand operated can opener (or two).

If firewood is unavailable, find sticks, tree limbs, old wooden furniture, boards from a deck or privacy fence (probably a few that need replacing anyway).  There may be a wooded area or park near your house with firewood available, especially if you have an axe, machete or saw to cut it. Be careful about cooking with treated wood as some may give off hazardous fumes.  At the very least, give this some thought and look around your house to see what is available, then form a few ideas about what you could do.


For more information, see:
Blog Table of Contents

Wednesday, April 20, 2016

Best Prepper Movies

What are the best Prepper movies or shows? Here is a list but I would love to get your vote and suggestions as a comment to this post on which is the best to show us what we might face and/or how we can be better prepared.
Most of these are rated 4 stars or better.

  1. History Channel: After Armageddon
  2. History Channel: Day after Disaster
  3. Contagion- Good time line to show how fast things can melt down.
  4. The Walking Dead - The number one TV Drama Series ever.
  5. The Book of Eli - Good example of life 30 years after a nuclear war.
  6. Revolution (TV Series)
  7. Falling Skies
  8. Red Dawn
  9. I am Legend
  10. Dooms Day Preppers (series)
  11. Independence Day
  12. The Terminator
  13. The Day After Tomorrow
  14. Outbreak
  15. History Channel: Electronic Armageddon 
For more information, see:
Blog Table of Contents;

Thursday, April 7, 2016

Communications

What you don't know, CAN hurt you, especially when disaster is looming. During an emergency, communications and Actionable Intelligence can be critical to survival, so start developing your communication preparations now. In the Prepper Handbook, we talk about communication codes, but we will focus instead on the more basic topic of what you need in the way of equipment. As a side note, this equipment should be stored in a metal lined trunk or ammo can to protect against an EMP. There are several communications options that include:

           SERVICE / CHANNELS - RANGE
  1. Citizen Band (CB) /40 - 10 miles +
  2. Marine VHF /50 - 20 miles +
  3. Family Radio Service (FRS) /22 - 1 mile
  4. GMRS Radio UHF /8 - 2 miles+
  5. Multi-Use Radio Service (MURS-VHF) /5 -  2 miles+
  6. Ham Radio /Lots - 50 miles +
The first level of communication is SHORT RANGE that is limited to low power like the FRS/GMRS and MURS (2 way radio) bands, although some of the GMRS bands require a license that costs about $85 for 5 years and covers the immediate family. GMRS uses UHF frequencies which has a shorter wavelength. This allows better penetration into large buildings while the MURS (below) uses VHF which is a longer wavelength. Tends to work better outdoors and over hilly terrain

Here is what I would consider for this category for Rural and City locations: Midland GXT1000VP4 36-Mile 50-Channel FRS/GMRS Two-Way Radio (Pair) (Black/Silver). These have low and high powered options for short AND medium range making them great for where you don't want others who are far away hearing what you are saying. Security patrols around your retreat or neighborhood should be using this type of radio, which is a GOOD FIRST CHOICE for a Prepper.

For this you only need a GRMS license (no test required) for channels 15-22, and for channels 1-7 IF you use more than .5W (low power). No license is required to use channels 8-14 which operate at one half watt. These radios will transmit at "high power" (50 watts) on channels 1-7 and 15-22 which does require a license, although it is unlikely anyone would know the difference. Testing the low power channels through the woods, it works at about 1.5 miles. 

This kit comes with two radios, both car and home chargers, rechargeable batteries and ear pieces and a mode for more silent communications. An extra battery pack or two is recommended (or 8 AA rechargeable batteries) and can be easily changed out in the field/woods or have a solar charger like this $5 Solar Charger or this more complete Solar System. The 36 miles is a stretch except under perfect conditions, (line of sight), but it will reach over a mile I know. Cheaper ones are available, but this is the lowest price I would consider.

For country or outdoor locations with hilly terrain, the MURS radio is a good choice. Some very experienced Ham Radio operations prefer this over GRMS especially with an external antenna.

This BaoFeng BF-888S Two Way Radio is the LOWEST COST OPTION, for two radios at $23 including 2 chargers and an ear piece. No license is required, but it has a limited number of channels (15) that could become congested if too many people were using them.  It is limited to 2 watts and I have verified that it works fine at over 1 mile outdoors through wooded areas.  Indoors at that distance has heavy static and hard to understand at times. This was with the upgraded antenna which costs an additional $16 but even with the standard antenna, it works at over a half a mile which easily covers 5 or 6 city blocks.  Both work just fine for a neighborhood security watch.  At this price, you can't afford to not have any communications stored in a top quality Military Steel M2A1 Ammo Can.
In fact, no matter which of these radios you have, they should be stored and protected in this manner when not being used to protect them from an EMP (electromagnetic pulse) or CME (coronal mass ejection) which is capable of destroying all electronic devices including your car and home appliances.



Potentially the best for medium range and most popular radio that does not require a license is the CB or Citizen Band which will communicate up to 10 miles. The best hand held CB radio is the Midland 75-822 40 Channel CB-Way Radio . Every Prepper should have one (or two) of these for regional communications beyond your retreat or local neighborhood.


For a base station CB radio, the best choice is Cobra 29 LX 40-Channel CB Radio or on a tight budget, the Midland 1001Z 40-Channel CB Radio. Base Stations also need a good antenna like the Cobra CBRHGA1500 36-Inch Base-Load Medium Magnet Mount 300W CB Antenna or the Midland 18-2442 Mobile CB Antenna. These have about 3.5 to 5 watts of power.



Your next level is a higher (8 to 16X FRS/GMRS) powered Ham type radio, which can be purchased for about the same cost, but does require a license but provides the longest range. Here is a good book to help get your license: The ARRL Ham Radio License Manual. and here is the American Radio Relay League or ARRL.org website where you can get it. At the high power setting, a licensed Ham operator can communicate around the world using relay stations.


A low cost (< $30) entry system of this type is: BaoFeng UV-5R Dual Band Two Way Radio which has a low (1 watt) and high power setting (4 watt). This does not come with as many accessories but has a number of options available. Doubling the power output will give you approximately 1.6X the range if its line of sight communications. For medium to long range, an inexpensive radio like this is the best option. More expensive radios wont get you a lot further without having proper antennas and placement. So a base station antenna on the roof of the house (or car) might be a good addition.



A more powerful version with a few more accessories is BaoFeng UV-82HP (CAMO) High Power Dual Band Radio which offers up to 7 watts. I like the camo version and the longer Nagoya NA-771 15.6-Inch Whip VHF/UHF antenna. There is also a programming cable and CD (software) that is recommended on both of the BaoFeng radios for about $6.

Having a Solar Power System to charge your batteries is also a good idea.

For more information see our Blog Table of Contents


Technical Details:
 
DISCLAIMER: This document is for general informational purposes only; NOT intended as legal advice and should not be construed as such. Legal matters should be referred to a qualified attourney or lawyer. All information is considered current as of the date this post was submitted. Since regulations and practises may change over time, it is advisable to consult an official source such as the FCC for the most up-to-date information.

REDISTRIBUTE FREELY!

CONTENTS

1. FREQUENCIES
2. MAXIMUM TRANSMITTER POWER LIMITS
3. BANDWIDTH/DEVIATION
4. LICENCING
5A. TYPE ACCEPTANCE
5B. FINDING TYPE-ACCEPTED TRANSCEIVERS FOR PART-95 USE
6. REPEATERS
7. OTHER FACTS
8. THE FUTURE OF FRS AND GMRS
9. SEE ALSO

FREQUENCIES ================================

Note: Channel numbers are given in this list according to the widely-followed Motorola numbering convention. GMRS channels are also sometimes referred to according to their dial position in kilohertz (e.g. "550" for channel 15) but this is uncommon.

FRS/GMRS
01 462.5625
02 462.5875
03 462.6125
04 462.6375
05 462.6625
06 462.6875
07 462.7125

FRS ONLY
08 467.5625
09 467.5875
10 467.6125
11 467.6375
12 467.6625
13 467.6875
14 467.7125

GMRS ONLY
15 462.550
16 462.575
17 462.600
18 462.625
19 462.650
20 462.675
21 462.700
22 462.725

*Note: for repeater use on 15-22, assume a +5 MHz shift (Tx: 467.xxx/Rx: 462.xxx). Simplex operation is not allowed on 467 MHz GMRS frequencies and are used for repeater input only.

MURS
01 151.820
02 151.880
03 151.940
04 154.570 ("Blue dot")
05 154.600 ("Green dot")


MAXIMUM TRANSMITTER POWER LIMITS ================================

FRS 1-7:
FRS: 0.5 watt
GMRS: 5 watt

FRS 8-14:
FRS: 0.5 watt
GMRS: prohibited

GMRS 15-22 (a.k.a. 550-725)
FRS: not applicable
GMRS: 5 watt (base); 50 watt (mobile/handheld)

MURS
All channels: 2 watt


BANDWIDTH/DEVIATION ================================

FRS/GMRS - All channels
Bandwidth: 11 kHz
Deviation: 2.5 kHz

GMRS ONLY - 15-22*
Bandwidth: 20 kHz
Deviation: 5 kHz

*Note: GMRS may also be worked with 11 kHz bandwidth/2.5 kHz deviation, though most mainstream equipment (e.g. department-store HTs) is fixed for 20/5 operation.

MURS*
Bandwidth
1-3: 11 kHz
4-5: 20 kHz

Deviation
1-3: 2.5 kHz
4-5: 5 kHz

* Note: narrowband (11/2.5) transmissions are also allowed on MURS 4-5.

LICENCING ================================

FRS
No licence required when operating on any channel (1-14) at up to 0.5 watt ERP

GMRS
Licence always required on 15-22 and when operating at power levels greater than 0.5 watt ERP on FRS 1-7
No licence required when operating a combination F/GMRS transceiver on FRS 8-14, or if said device does not exceed 0.5 watt ERP on FRS 1-7.

MURS
No licence required for personal use on any channel

- - - - - - - - - - - -

At the time of this writing, GMRS licencing is handled by the F¢¢. Fee is $85 and the ticket is good for five years. A GMRS ticket is valid for the holder and the immediate members of his family. GMRS licence holder must be aged 18 and up, but the service may be used by his family members of any age. No examination or test/quiz is conducted for GMRS licencing. A part 90/business or HAM radio licence does NOT legally grant any privileges to operate GMRS and vice versa. See also "THE FUTURE OF FRS AND GMRS" below.

People sometimes use handles (nicknames) on all three services. HAM call letters are considered a handle in part-95, as they have no official meaning in these services. If using any handle on GMRS (subject to personal preference), it should be given in conjunction with one's official legal GMRS call, never in place of it. GMRS call letters are not required to be announced on MURS, FRS 1-7 when operating at <=0.5 watt ERP or FRS 8-14.
TYPE ACCEPTANCE ================================

FRS
Equipment must be self-contained; if built to use detachable components (e.g. microphones/headseats) they must be designed specifically for use with their respective transceivers, batteries excepted
Antennae must not be detachable or easily removable
Mobile use permitted, but mobile FRS transceivers are difficult to find

GMRS
Equipment may be self-contained (as in combination FRS/GMRS HTs which are currently very popular in the US) or have detachable components
Transceivers excluding FRS coverage may use detachable aerials, but placement restrictions exist--specifically, antenna cannot exceed 20 feet elevation above ground level. HTs can not have detachable aerials if they include FRS coverage
Mobile use permitted

MURS
Transceivers may use detachable aerials. Antenna height limited to 20 feet above structure (e.g. the peak of a house's roof) or 60 feet above ground, whichever is greater.

- - - - - - - - - - - -

All transceiver equipment used on F/GM/MURS must be part-95 type accepted and meet certain criteria as stated in their respective FCC rules. In general, FRS transceivers cannot have removable aerials; GMRS and MURS radios can have removable aerials (particularly in the case of base or mobile units.) but GMRS transceivers with removable aerials can not be used to transmit on FRS. Tone/code squelch is permitted on all services, although this functionality is sometimes omitted, especially in very low-cost transceivers or children's "toy" HTs where carrier squelch may be used instead. Modifying an F/GM/MURS transciver in ways not intended by the manufacturer or F¢¢ generally voids its part-95 certification and may render it illegal to operate. Equipment can neiter be tunable outside its prescribed frequency bands, nor manually or computer programmable as such. External amplifiers can not be used with any transceiver on F/GM/MURS. These restrictions do not apply to equipment designed specifically for receiving (e.g. a police scanner.)

Many newer imported freeband transceivers marketed for HAM use (Baofeng, TYT, Wouxun, etc.) and modified purpose-built HAM equipment are capable of emulating an F/GM/MURS transceiver. Although sometimes used, such equipment is illegal to operate in these services as they are not type-accepted for part-95 operation, despite extremely lax enforcement by the F¢¢.

FINDING TYPE-ACCEPTED TRANSCEIVERS FOR PART-95 USE =================

The FCC maintain a searchable database of all transceivers certified for part-95 use on
https://apps.fcc.gov/oetcf/eas/repor...ericSearch.cfm

1. Under "Application Information: Application Status:", select Grant Issued.
2. Under "Equipment Information: Rule Parts (up to three):", select "95A" for GMRS, "95B" for FRS or "95J" for MURS and tick "exact match" (selected by default). It's probably best to search each one individually, as this narrows your search and reduces confusion.
3. Under "Formatting Options: Show results in", select "HTML" (default).
4. Specify number of search results to display (default: 10).
5. Select "Start serach". It may take several minutes to display if a large number of results is given in step 4.

NOSCRIPT USERS: Temporarily allow "apps.fcc.gov" to use the search page.

REPEATERS ================================

Repeaters on GMRS are usually considered to be specifically for the private use of those who operate them, however many individuals and radio clubs operate "open" repeaters intended for public use. Some of these repeaters may require permission from the operators to work them, but not always (although it is considered polite to ask regardless.) A good resource for GMRS repeater information, including non-exhaustive lists of repeaters around the United States is http://mygmrs.com/. At the time of this writing, the ratio of open versus private ("permission required") systems listed in mygmrs seems to be fairly equal (271:308), indicating a slight bias toward private systems.

All repeater and telephone patch operations are forbidden on FRS and MURS. Telephone patches may not be used on GMRS. As far as I know, there is no restriction on an F/GM/MURS operator relaying communications by voice between their respective band and other radio services like CB or HAM, or other media such as Internet chat servers or telephone calls.

OTHER FACTS ================================

FCC RULES
FRS: 47 CFR 95B
GMRS: 47 CFR 95A
MURS: 47 CFR 95J

- - - - - - - - - - - -

FRS and GMRS always use FM (see "BANDWIDTH/DEVIATION" above.) MURS may use other modulation formats, but FM is arguably the most commonly used.

GMRS channels 19 and 21 (650 and 700) are not allowed to be used near the Canadian border.

FRS transceivers are allowed to be used in Mexico on channels 1-14, however care must be exercised to avoid transmitting on GMRS 15-22 if a combination transceiver is used there.

FRS 1 and GMRS 20 are commonly used and advocated as "de facto" calling and emergency channels, especially when traveling. Usually used with CTCSS 141.3 Hz (Motorola QC #22).

It is legal for FRS and GMRS users to communicate with each other. The low maximum power level of FRS devices may cause problems when communicating to a GMRS station over any significant distance.

CTCSS and digital squelch is allowed on all services, and may be required to access repeaters on GMRS. Usage of a CTCSS tone/DCS code is completely optional on any FRS/GMRS/MURS channel, but one is likely to attract more attention using it.

FRS, GMRS and MURS were originally intended to be used for personal communications within one's group, however there is almost nothing prohibiting deviation from this (see next paragraph). There is no "content police" on F/GM/MURS and in some areas, portions of GMRS and MURS are used as an "alternative" HAM service; the subject matter discussed in them might be similar to what one would find scanning the several HAM bands.

Transmission of music is never allowed on any part-95 band including CB. (That includes YOU, "Fisherman" and "Robocop".) Morse code is allowed but rarely used for anything other than distress signals or automatic GMRS repeater self-identification. Data transmissions are allowed on MURS but may be restricted on the other services.

Business use of GMRS is generally prohibited, principally due to (expensive) licencing restrictions and its reclassification as a personal-use radio service in the 1980s. Exceptions exist for businesses licenced for GMRS before revision of the service's rule in the 1980s and are operating under the "grandfather" regulation. Many businesses are now using FRS for this purpose as it is free of such restrictions.

THE FUTURE OF FRS AND GMRS ================================

It is speculated that licencing requirements on GMRS may be either greatly relaxed or completely eliminated in the coming years, and a slightly revised bandplan implemented. One oft-stated example has GMRS being restricted to 2 watts maximum ERP, simplex communications being allowed on the 467 MHz repeater input channels and repeater usage discontinued. The resulting service would be an "extended" 30-channel implementation of FRS and be regulated as such.

SEE ALSO ================================

http://wiki.radioreference.com/index.php/FRS - FRS description on the Radioreference wiki
http://wireless.fcc.gov/services/personal/family/ - FRS information from the FCC
http://popularwireless.com/gmrsfaqa.html - FRS/GMRS frequently asked questions

http://wiki.radioreference.com/index.php/GMRS - GMRS description on the Radioreference wiki
http://wireless.fcc.gov/services/per...generalmobile/ - GMRS information from the FCC
http://mygmrs.com/ - GMRS repeater information and directory
http://home.provide.net/~prsg/part95ae.htm - A very in-depth page about GMRS regulations that includes the FCC's rule

http://wiki.radioreference.com/index.php/MURS - MURS description on the Radioreference wiki
http://fcc.gov/encyclopedia/multi-us...service-murs-0 - MURS information from the FCC

http://www.ecfr.gov/cgi-bin/text-idx...e=47:5.0.1.1.5 - Electronic Code of Federal Regulations title 47 part 95; the official document describing all this stuff (almost reads like an FAQ) (thanks, nd5y)

END


For more information see our Blog Table of Contents

 

Monday, April 4, 2016

Actionable Intelligence


What you don't know, CAN hurt you, especially when disaster is looming.  Ignorance is not bliss, but rather deadly in a SHTF scenario.

Actionable Intelligence is a term used by the intelligence profession which is defined as information that can be acted upon to either change the course of events or allow you time to prepare


The Great Galveston Hurricane of 1900 resulted in about 8,000 fatalities which is the deadliest natural disaster to ever hit the United States. All because no one knew it was coming, until it was too late. There was no National Weather Service. Today they give us an early warning which is "Time Sensitive Information" meaning it is only actionable IF we know and act soon enough.  

Information gathering is essential in a SHTF situation and must be done carefully and objectively.  Do not jump to rash conclusions nor wait too long before taking action.  Realize that most likely, others are gathering information on you as well (like the NSA does on average 25 times daily per American); take steps to avoid disclosing too much, or better yet, provide misinformation. Change your procedures randomly;  The Prepper Handbook on Amazon has a lot of details on security. Seek to verify your information; send scout teams out if necessary to get confirming sources.  Be careful about trusting social media; it may be fast to respond but is often inaccurate.

We gather intelligence by interacting with other people.  As a Prepper group leader, you should train your team to interact and casually question others as they encounter them.  This is often referred to as Human Intelligence or HUMINT by the military. The CIA even has some information to offer on it: https://www.cia.gov/news-information/featured-story-archive/2010-featured-story-archive/intelligence-human-intelligence.html


Police Scanners might be a good intelligence source. Scanning common communication frequencies might disclose intelligence about civilians.  MURS, Citizens Band (CB) Radios and more importantly, Ham radios can be monitored.  All information is potentially important until determined otherwise.

Gathered information may (or may not) be compartmentalized so that no one person knows too much if captured or a spy.  Either way, it must be reviewed, filtered and assembled much like we see in the movies with the mock battlefield or cork board with all the notes pinned in specific areas. Then develop a plan and a back up plan to act upon the information.

Wikipedia has some good information that we will list at the bottom for your convenience.

For more information see:

Wikipedia:

Human intelligence (frequently abbreviated HUMINT) is intelligence gathered by means of interpersonal contact, as opposed to the more technical intelligence gathering disciplines such as signals intelligence (SIGINT), imagery intelligence (IMINT) and measurement and signature intelligence (MASINT).
NATO defines HUMINT as "a category of intelligence derived from information collected and provided by human sources."[1] Typical HUMINT activities consist of interrogations and conversations with persons having access to information.
The manner in which HUMINT operations are conducted is dictated by both official protocol and the nature of the source of the information. Within the context of the U.S. military, most HUMINT activity does not involve clandestine activities. Both counter intelligence and HUMINT do include clandestine HUMINT and clandestine HUMINT operational techniques.
HUMINT can provide several kinds of information. It can provide observations during travel or other events from travelers, refugees, escaped friendly POWs, etc. It can provide data on things about which the subject has specific knowledge, which can be another human subject, or, in the case of defectors and spies, sensitive information to which they had access. Finally, it can provide information on interpersonal relationships and networks of interest.
HUMINT is both a source of positive intelligence, but also of information of strong counterintelligence value. Interviews should balance any known information requirements of both intelligence collection guidance and of counterintelligence requirements.

Sources

Sources may be neutral, friendly, or hostile, and may or may not be witting of their involvement in the collection of information. "Witting" is a term of intelligence art that indicates that one is not only aware of a fact or piece of information, but also aware of its connection to intelligence activities. Examples of HUMINT sources include, but are not limited to, the following:

Basic HUMINT operations

Human source screening is the logical start of collection of HUMINT. This involves selecting people who may be sources of meaningful HUMINT, possibly positively identifying them, and conducting interviews of various types. Properly recording and cross-indexing the results of interviews is essential. No intelligence collection discipline is more likely to find meaning in apparently small bits of information than is HUMINT. Especially when there is reason to have additional interviews with the same individual, the subsequent interviews need careful planning, especially when the interrogator does not speak the language of the person being interviewed.

Intelligence preparation for working in cultures

As with other intelligence collection disciplines, intelligence analysis can play many supporting roles. An obvious one is biographical intelligence, to help identify known hostile undercover personnel, or individuals who will impartially mislead an assortment of national intelligence services for profit.
Equally important is the broader area of cultural intelligence, which draws heavily on the social sciences. In a book review in the CIA professional journal, Lloyd F. Jordan recognizes two forms of study of culture, both of which are relevant to HUMINT.[2] In the review, Jordan describes Patai's book[3] as an excellent example of a second type of cultural analysis. He reviews the first group of scientific analyses of culture and character as beginning with "cultural anthropology as early as the 1920s. During World War II, those methods employed earlier in the academic community in this field of research were brought to bear upon a variety of problems connected with the war effort.
"It was precisely the inaccessibility of the target country and the availability of only fragmentary information about it that made national character research relevant to intelligence analysis during the war. The cultural anthropologists had long been developing models of former and disappearing cultures from fragmentary materials. The anthropologists, joined by the psychiatrists, combined the use of psychoanalytic theory, interaction theory, child development theory, and learning theory with standard anthropological research methods to construct models of the contemporary cultures of wartime enemy countries, Japan and Germany." The classic work of this type is Ruth Benedict's study of Japan, The Chrysanthemum and the Sword.[4]
Mike observes that Benedict's approach was the only one in use until the late 1950s. "National character studies" focused on the statistically most significant personality characteristics of the group (i.e., the modal personality), rather than the most common manifestation of the traits. "...modal personality construct[s] tended to be related to the total culture, or at least, its salient features."
The second class of studies, of which Patai's is an exemplar for Arab culture, had a more narrow focus. "...they concentrated on the relationship of personality traits to subsets of a given society or a given category of roles of that society, rather than on the identification of relationships between personality and the social structure as a whole." A third category, the comparative study, included Francis L. K. Hsu's Americans and Chinese.[5] Indeed, some recent and controversial works, such as Huntington's The Clash of Civilizations and the Remaking of World Order can be regarded as an extension of comparative study into the idea of conflicts among the groups compared.[6]

Basic differentiation by subject type

Different types of human subjects will share information voluntarily or involuntarily. The interrogator builds a relationship with the subject, a relationship that can be based on trust, fear, friendship, or any of a range of human emotions. Prisoners have an understandable fear of what may happen, and, contrary to "tough guy" images, it can be important to relax them and, as much as possible, put them at ease.[7] Some organizations teach their members that the other side tortures everyone, and, if that is known, that fear must be addressed; Japanese prisoners in WWII often attempted suicide for that reason[8] but were sometimes dissuaded, as by Guy Gabaldon.
"The question of torture should be disposed of at once. Quite apart from moral and legal considerations, physical torture or extreme mental torture is not an expedient device. Maltreating the subject is from a strictly practical point of view as short-sighted as whipping a horse to his knees before a thirty-mile ride. It is true that almost anyone will eventually talk when subjected to enough physical pressures, but the information obtained in this way is likely to be of little intelligence value and the subject himself rendered unfit for further exploitation. Physical pressure will often yield a confession, true or false, but what an intelligence interrogation seeks is a continuing flow of information."[7]
Especially when the subject is a prisoner, the screener, who need not be the main interrogator, should examine the Enemy Prisoner of War (EPW) captive tag or other basic information giving the circumstances of capture: when, where, how, by whom, and so forth.[9] If the subject is not under any restraint, it is still quite useful for a screener to prepare contact information comparable to the information on the EPW tag.
When the subject is a POW, screeners should pay particular attention to rank insignia, condition of uniforms and equipment, and behavior demonstrated by the source. Screeners should look for things like attempts to talk to the guards, intentionally joining placement in the wrong segregation group, or any signs of nervousness, anxiety, or fear. Any source whose appearance or behavior indicates that he is willing to talk should be noted by the screeners.[9]
Assuming the subject has been under guard, the screener often can get valuable information about the subject's behavior from the guards. They can tell the screener how the source has responded to orders, what requests have been made by the source, what behavior has been demonstrated by the source, and so forth.[9] Along with the basic contact information, such observations can be extremely helpful to the interrogator, who can study the information before the interview. Having background on the subject helps the interrogator retain the initiative in an interview.
Again for prisoners, screeners should examine the documents captured with the source and any documents pertaining to the source.[9] If the subject is voluntary and providing documents, they may even be more valuable. Screeners may need to get help from linguists or document specialists in understanding the material. If the documents have insignia or other graphics, these should be compared with an existing graphics register, and added to it if they are new.
Documents captured with the source (identification card, letters, map sections, and so forth) can provide information that identifies the source, his organization, his mission, and other personal background (family, knowledge, experience, and so forth). This information can be used to verify information from documents captured with the source and further assess his willingness to cooperate. When examining documents, screeners should look for items that will indicate whether the source is cooperative or willing to cooperate based on any specific personal interest.
If the source has information pertaining to new foreign material, contact appropriate TECHINT specialists, and if the source has information of target exploitation interest, contact the appropriate staff members who deal with targeting. These specialists are not necessarily qualified interrogators and may need to meet jointly with the subject and interrogator, or pass questions to the interrogator.

Selecting potential sources

It involves evaluating an individual, or group of individuals, "to determine their potential to answer [intelligence] collection requirements or to identify individuals who match a predetermined source profile. The goal of the process is to identify individuals who may have information of interest, and are willing or can be persuaded to cooperate. Willing individuals will undergo debriefing, and, subject to the relevant laws, regulations and policies of the HUMINT organization, unwilling people may be interrogated.
Screening techniques also can select individuals who may be prospects to collect intelligence or work, in other ways, with the HUMINT organization or its sponsor. Individuals may also be identified who are of interest to counterintelligence or to technical intelligence specialists.[10]
System for Prioritizing Interview Subjects
Cooperation levelCooperation codeKnowledgeability levelKnowledgeability code
Responds to direct questions1Very likely to have pertinent informationA
Responds hesitantly2May have pertinent informationB
Does not respond3Unlikely to have pertinent informationC

Priorities of subjects for interrogation
It may be necessary to screen individuals in a local area, as residents or possibly workers, to determine if they may be security risks.

Identification

Since the identity of individuals is very relevant to HUMINT, it makes extensive use of biometric data (e.g., fingerprints, iris scans, voice prints, facial/physical features) collected on persons of interest.[11]

Types of interviews

Subject interview has many of the same dynamics as a psychotherapeutic relationship. In an extended interrogation, if there is dialogue between interrogator and subject, there will be dynamics closely related to the psychotherapeutic concept of transference and countertransference. In the former, the subject projects emotional experiences of his own onto the interrogator, and in the latter, the interrogator will start thinking of the subject in terms of his own life experiences.
There are other ways to use social science to understand interviews, in the broad sense of cooperative debriefing and hostile interrogation. Speaking of interrogation in the law enforcement context, "There is a vast literature on interrogation ... but hardly anything on it at all in the field of argumentation theory.... Argumentation theorists have taken as their point of interest rational argumentation in which two parties reason together to try to get at the truth of a matter following collaborative rules of procedure. And the interrogation is scarcely a model of how to conduct balanced rational argumentation. Far from that, it seems to represent a coercive kind of dialogue exchange that is associated with intimidation..."[12] but a debriefing is not necessarily coercive
In some cases, an interrogation becomes less coercive, if the subject begins to identify with the conceptual framework of the interrogator. The latter can be a false Stockholm syndrome context, or it can be a case where the subject actually sees that his belief system has fallacies, and he may start to share aspects of the interrogator's mindset.
With WWII Japanese prisoners who believed that the shame of capture permanently separated them from that culture,[13] and who were unable to commit suicide,[8] appeared to see themselves as now part of the interrogator's culture, and became quite cooperative. "...there was one infallible method of convincing a reluctant Japanese prisoner to tell all he knows: to tell him, via interpreters, that they will send his name and picture back to Japan. ... We might note that few Japanese ever attempt to hold anything back. Being taken prisoner is not in their handbooks. No Japanese is ever taken alive. Thus, they are not drilled in the "Name- Rank- Serial No- nothing more" routine. They usually reveal everything easily without any persuasion and seem unhappy when their lack of information does not permit them to answer a specific question. [a captured officer]...doesn't expect to return to Japan ever, has completely excluded his family and his wife from his thinking, and appears pleasantly resigned to going to the States and working there even as a prisoner for the rest of his life."[13] In argumentative theory, interrogation is a form of information-seeking dialogue, but also can include other kinds of dialogue, such as negotiation. In both police and intelligence interviews, there may be bargaining, where the interrogator offers incentives for the subject to reveal information. The revealed information, especially in a HUMINT context, is not necessarily about the interrogation and also may involve persuasion of the subject to speak.[12]
Before going on to study the relationship of the interrogation to information seeking dialogue, some account must be given of other types of dialogue related to interrogation as well. For the interrogation has a way of shifting from pure information-seeking to other types of dialogue. As an example, argumentative theory recognizes 'persuasion', in the sense meant in the persuasion dialogue,[12] with certain strategic interrogations, the interrogator might objectively question some of the practices of the subject's side. This is not done for direct elicitation of information, but to set a new context for further interrogation in which the subject might question some of his own loyalties and assumptions. In the case of the Japanese prisoners of the US, they began to operate in that new context.[13]

Debriefing

Debriefing involves getting cooperating human sources to satisfy intelligence requirements, consistent with the rules, laws, and policies of the HUMINT organization. People being debriefed are usually willing to cooperate, although it is possible to obtain information through casual conversation. Debriefing may be conducted at all echelons and in all operational environments.
Types of people being interviewed include both "tasked" and "non-tasked" individuals. Tasked individuals are, in some way, part of the interviewer's organization.

Categories of interviewees for voluntary debriefing
TaskedNot tasked
Military police and infantry patrols in nominally controlled areasResidents of nominally controlled areas
Special reconnaissance teams (see special reconnaissance)Nongovernmental organization workers in the area of operations
Diplomats of one's own countryFriendly or neutral foreign diplomats
National or higher command level subject matter experts (e.g., intelligence personnel)Persons outside the area but knowledgeable about it (e.g., émigrés)

Tasked personnel giving brief reports of the enemy use the SALUTE technique. More formal or extensive debriefing methods are used for obtaining specialized or complex information.
Other than talking to tasked personnel, there is a tendency for some HUMINT collectors to regard debriefing as a waste of time. The approach to a voluntary source needs to be quite different from that to a cooperative prisoner, especially if the interrogator has reason to believe the source is knowledgeable. While a subject may be a volunteer, a refugee or displaced person is likely to have some of the fears and uncertainty undergone by POWs. Active listening and sympathy can pay great benefits, especially in the areas of love of family, and anger at those who made them homeless.
The HUMINT collector should allow specialized or senior sources more latitude to interpose their opinions and evaluations. Prior to the meeting, collectors need to examine all available information, to have an idea of the subject's personality and motivations when beginning to talk to them. It also may require unobtrusive observation of the subject to establish such things as patterns of activity and likes and dislikes. The closer the interview environment can be to the customary surroundings of the subject, the more comfortable and cooperative the source may be.
One example of source that should have latitude are trained foreign internal defense (FID) or unconventional warfare (UW) personnel that work with local residents, or military forces, on a routine basis. Such people may very well themselves have HUMINT and/or CI training; US Special Forces groups have two-man HUMINT/CI teams that can augment operational detachments.
Historically, after the WWII experience of resistance leaders such as the Jedburgh teams, occurred to various commanders that soldiers trained to operate as guerillas would have a strong sense of how to fight guerillas. Even before specialist FID/UW units were constituted, organizations such as Military Assistance Advisory Groups, as in Greece just after WWII, also had extensive local knowledge. Before the partition of French Indochina in 1954, French Groupement de Commandos Mixtes Aéroportés (GCMA) took on this role, drawing on French experience with the Jedburgh teams.[14] GCMA, operating in Tonkin and Laos under French intelligence, was complemented by Commandos Nord Viêt-Nam in the North. In these missions, the SOF teams lived and fought with the locals.
United States Army Special Forces, U.S. Marine Corps Combined Action Program (CAP) program personnel (originally in Vietnam,[15] but now in Iraq[16]) and various training detachments are apt to have valuable and structured information.
In all cases, the more knowledgeable the interrogator is to the volunteer, the better the result is likely to be. A collector does not need to keep the same level as control as in a hostile interrogation. Sometimes, admitting ignorance of a custom, and respectfully asking for explanation, will trigger a flow of information.
While it takes sophistication, the best general approach to willing subjects is a planned elicitation of information, always with a specific goal in mind. The key to elicitation is the establishment of a rapport between the elicitor and the source, normally based on shared interests. In the initial stages of an elicitation, the collector confines his conversations to innocuous subjects such as sports and social commentary. Dependent on the value of the source, the collection environment, and the security consciousness of the subject, the HUMINT specialist will then shift to a more focused topic.
Once in that mode, elicit the information by continuing to ask for clarification, with questions of the form "I agree, however, what did you mean by....?") or expressing a hypothetical situation. The focused discussion can involve mild flattery and interest in the conversation, or, in a much more delicate approach, selectively challenging statements or introducing new information to show knowledge and stimulate more responses.[10]

Interrogation

As opposed to debriefing, the subject of interrogation is not necessarily cooperating with the obtaining of information by the organization. The subject is normally in custody, although the legal circumstances may be such that an uncooperative subject may be able to leave.
Examples of subjects being interrogated include POWs, individuals detained by patrol as not being from the area, and a thief arrested by the civilian police.
Interrogation is a skilled technique, which often involves building rapport with the subject. In an intelligence context, interrogators should be trained specialists, although they may work with linguists and subject matter experts.[17]
Regardless of whether the interview is voluntary or involuntary, the interrogator needs to keep the initiative. To keep the initiative, the interrogator may not need to be harsh. Indeed, the many successful interrogators are formally polite within the subject's cultural traditions.[9] If, in societies with a strong host-guest tradition, the interrogator takes the role of host, that can allow polite domination of the conversation.
The interrogation process itself is a HUMINT collection, not analysis, technique. It may well be that the interrogator, after the interview, does analysis, cross-checking statements made against name indices and "wiring diagrams" of social networks.[18] The interrogator checks his notes against the finished report to ensure that the report contains and identifies the information as heard, seen, or assumed by the source[9]

Planning the initial interview

While the actual interview technique will vary with the attitude of the subject and the needs of the interviewer's service, the interrogator should develop a basic plan for the first interview. This might be put into a paper folder along with documents (or copies) associated with the subject, or, if available, it can go into a HUMINT database so other interrogators, analysts, cultural and language specialists, can review it. Reviews can help plan the current interview, or give ideas to other interrogators for other interviews.
The basic elements to collect are:
  • Any urgent HUMINT collection requirements
  • Serial number of EPW/detainee to be questioned.
  • Location and time for the questioning.
  • Primary and alternate approaches.
  • Questioning plan including topics to be covered and the planned sequence of these topics.
  • Prepared questions for unfamiliar or highly technical topics.
  • Method of recording and reporting information obtained
  • Linguist support, if needed
  • Additional general or technical interrogators needed
"The preliminary interview is not intended to obtain intelligence, but only to enable the interrogators to make a firm assessment of the character and type of subject with whom they will have to deal."[7]
How much psychological pressure to use, how many symbols of dominance are appropriate to use, require great judgment. Some classic interviewing techniques, without threatening the subject, make him uncomfortable, as, for example, having "interrogators – preferably two of them – seated behind a table at the far end of a long room, so that the subject after entering will have some distance to walk before taking his chair in front of them. This device will enable them to observe his poise and manner, and may often quite unsettle the subject. In this pressure-oriented technique, the interrogators should sit with their backs to the main source of light in order to obscure their faces, veil their expressions, and place a strain on the prisoner. The subject can be placed under further strain by providing him an uncomfortable chair, say one with a polished seat and shortened front legs so that he tends to slide off it, or one with wobbly legs.[7]
"On the other hand, an opposite technique has sometimes been successful: the prisoner is made so comfortable, after a hearty lunch with beer, that he drops his guard in drowsiness.[7] When conducting military source operations, the location of the questioning will have psychological effects on the source. The questioning location should be chosen and set up to correspond to the effect that the HUMINT collector wants to project and his planned approach techniques. For example, meeting in a social type situation such as a restaurant may place the source at ease. Meeting in an apartment projects informality while meeting in an office projects more formality. Meeting at the source's home normally places him at a psychological advantage, while meeting in the HUMINT collector's work area gives the collector a psychological edge. The HUMINT collector should consider the status and level of the source, security, the workspace available, furnishings, the amount of lighting provided, and the ability to heat or cool the room as needed.[10]

Characteristics of the interrogator(s)

Interrogation is an interaction, and, even before considering the different attitudes the subject may have, the interrogator needs to know his own style, strengths and weaknesses. He needs to judge if he needs cultural advice, how to handle language issues, and if he needs specialist help.
The HUMINT collector must also consider the physical conditions of the source and himself. After extended operations, there may be a limit on how long either the HUMINT collector or source can concentrate on a given subject.

Support needs

If the interrogator thinks that offering incentives will help, he must decide what they are and how they are obtained. If incentives were promised in earlier interviews, the collector must know if they were delivered. If they were not, the interrogator needs to plan how the failure to deliver may interfere with any trust built, and how to correct the problem.
The HUMINT collector must decide if he will need additional support including analytical, technical, or interpreter support. On rare occasions, it may be desirable for the HUMINT collector to seek polygraph support or support from a Behavioral Science Consultant (BSC). BSCs are authorized to make psychological assessments of the character, personality, social interactions, and other behavioral characteristics of interrogation subjects and advise HUMINT collectors of their assessments, as needed.

Attitudes of the subject

The basic attitude of the subject will help define the approach to the interview. There are four primary factors that must be considered when selecting tentative approaches:
  • The source's mental and physical state. Is the source injured, angry, crying, arrogant, cocky, or frightened?
  • The source's background. What is the source's age and level of military or civilian experience? Consider cultural, ethnic, and religious factors.
  • The objective of the HUMINT collection. How valuable is the source's potential information? Is it beneficial to spend more effort convincing this source to talk?
  • The HUMINT collector himself. What abilities does he have that can be brought into play? What weaknesses does he have that may interfere with the HUMINT collection? Are there social or ethnic barriers to communication? Can his personality adapt to the personality of the source?
Cooperative and friendly
A cooperative and friendly source offers little resistance to the interrogation and normally speaks freely on almost any topic introduced, other than that which will tend to incriminate or degrade him personally.
To obtain the maximum amount of information from cooperative and friendly sources, the interrogator takes care to establish and to preserve a friendly and cooperative atmosphere by not inquiring into those private affairs which are beyond the scope of the interrogation. At the same time, he must avoid becoming overly friendly and losing control of the interrogation.[9] The interrogator, however, may need to get expert advice on the customs of the subject's culture. While Americans might not spend time inquiring about the journey to the place of the interrogation, the health of one another's family, etc., not to do so is extremely impolite in some cultures. Not following cultural norms may transform a cooperative subject into a silent one.
For example, Arab cultural norms, reasonable to follow in a friendly conversation with a subject of that culture, do, often in ceremonial terms, speak of family. Handshakes are traditional at the start and end of the meeting.[19]
Neutral and nonpartisan
A neutral and nonpartisan source is cooperative to a limited degree. He normally takes the position of answering questions asked directly, but seldom volunteers information. In some cases, he may be afraid to answer for fear of reprisals by the enemy. This often is the case in low-intensity conflict (LIC) where the people may be fearful of insurgent reprisals. With the neutral and nonpartisan source, the interrogator may have to ask many specific questions to obtain the information required.
Hostile and antagonistic
A hostile and antagonistic source is most difficult to interrogate. In many cases, he refuses to talk at all and offers a real challenge to the interrogator. An interrogator must have self-control, patience, and tact when dealing with him.
Inexperienced interrogators may do well to limit their interview, and pass the subject to a more senior interrogator. When handing off the subject, the next interrogator will find it very useful to have any clues why the subject is being hostile.
"The recalcitrant subject of an intelligence interrogation must be "broken" but broken for use like a riding horse, not smashed in the search for a single golden egg."
No two interrogations are the same. Each interrogation is thus carefully tailored to the measure of the individual subject. The standard lines of procedure, however, may be divided into four parts:
  1. arrest and detention
  2. preliminary interview and questioning
  3. intensive examination
  4. exploitation.
The first three steps, which emphatically do not involve torture, can be combined and called the "softening-up" process. If the subject is using a cover story, it may be broken by softening-up.
"Showing some subjects up as liars is the very worst thing to do, because their determination not to lose face will only make them stick harder to the lie. For these it is necessary to provide loopholes by asking questions which let them correct their stories without any direct admission to lying".[7]
The questioning itself can be carried out in a friendly, persuasive manner, from a hard, merciless and threatening posture, or with an impersonal and neutral approach. In order to achieve the disconcerting effect of alternation among these attitudes it may be necessary to use as many as four different interrogators playing the following roles, although one interrogator may sometimes double in two of them:
  1. the cold, unfeeling individual whose questions are shot out as from a machine-gun, whose voice is hard and monotonous, who neither threatens nor shows compassion.
  2. the bullying interrogator who uses threats, insults and sarcasm to break through the subject's guard by making him lose his temper or by exhausting him.
  3. the ostensibly naive and credulous questioner, who seems to be taken in by the prisoner's story, makes him feel smarter than the interrogator, gives him his rope and builds up false confidence which may betray him.
  4. the kind and friendly man, understanding and persuasive, whose sympathetic approach is of decisive importance at the climactic phase of the interrogation. He is most effectively used after a siege with the first and second types, or after a troubled sleep following such a siege.

Planning additional interviews

The main factor for human intelligence is getam. This can be part of softening-up, or part of the exploitation phase. "When the cover story and the will to resist have been broken, when the subject is ready to answer a series of carefully prepared questions aimed at an intelligence target, the exploitation can begin, often in a veiled spirit of cooperation and mutual assistance. At this stage the interrogation may for example be moved to an office assigned the subject, where he might even be left alone for a few minutes to show that he is being trusted and that there is something constructive for him to do. This feeling of trust and responsibility can be very important to a broken subject, because he may now have suicidal inclinations; he must be given something to occupy his mind and keep him from too much introspection.
Which course is better will depend on the subject's character, the way he was broken, and his present attitude toward those who have been handling him. Sometimes only a fresh interrogator can get real cooperation from him. Sometimes, on the other hand, he is so ashamed of having broken that he is unwilling to expose himself further and wants to talk only to his original questioner. And sometimes he has built up a trustful and confiding relationship with his interrogator which should not be destroyed by the introduction of another personality.

Principles of questioning

The HUMINT collector adopts an appropriate persona based on his appraisal of the source but remains alert for verbal and non-verbal clues that indicate the need for a change in the approach techniques. The amount of time spent on this phase will depend mostly on the probable quantity and value of information the source possesses, the availability of other sources with knowledge on the same topics, and available time. At the initial contact, a businesslike relationship should be maintained. As the source assumes a cooperative attitude, a more relaxed atmosphere may be advantageous. The HUMINT collector must carefully determine which of the various approach techniques to employ.
If a source cooperates, his or her motivations vary. They can range from altruism to personal gain; they may be based on logic or emotion. From a psychological standpoint, the HUMINT collector must be cognizant of the following behaviors.[10] People tend to—
  • Want to talk when they are under stress and respond to kindness and understanding during trying circumstances. For example, enemy soldiers who have just been captured have experienced a significant stress-producing episode. The natural inclination is for people to want to talk about this sort of experience. If the EPW has been properly segregated and silenced, the HUMINT collector will be the first person the EPW has a chance to talk to. This is a powerful tool for the collector to use to get the subject talking. The desire to talk may also be manifested in refugees, DPs, and even local civilians when confronted by an unsettled situation.
  • Show deference when confronted by superior authority. This is culturally dependent but in most areas of the world people are used to responding to questions from a variety of government and quasi-government officials.
  • Operate within a framework of personal and culturally derived values. People tend to respond positively to individuals who display the same value system and negatively when their core values are challenged.
  • Respond to physical and, more importantly, emotional self-interest. This may be as simple as responding to material rewards such as extresponding to support in rationalizing guilt.
  • Fail to apply or remember lessons they may have been taught regarding security if confronted with a disorganized or strange situation.
  • Be more willing to discuss a topic about which the HUMINT collector demonstrates identical or related experience or knowledge.
  • Appreciate flattery and exoneration from guilt.
  • Attach less importance to a topic if it is treated routinely by the HUMINT collector.
  • Resent having someone or something they respect belittled, especially by someone they dislike.

Building rapport

"Establish and maintain a rapport between the HUMINT collector and the source. Rapport is a condition established by the HUMINT collector that is characterized by source confidence in the HUMINT collector and a willingness to cooperate with him. This does not necessarily equate to a friendly atmosphere. It means that a relationship is established and maintained that facilitates the collection of information by the HUMINT collector. The HUMINT collector may establish a relationship as superior, equal, or even inferior to the source. The relationship may be based on friendship, mutual gain, or even fear.
If he does introduce himself, normally he will adopt a duty position and rank supportive of the approach strategy selected during the planning and preparation phase. The HUMINT collector must select a rank and duty position that is believable based on the HUMINT collector's age, appearance, and experience. A HUMINT collector may, according to international law, use ruses of war to build rapport with interrogation sources, and this may include posing or "passing himself off" as someone other than a military interrogator. However, the collector must not pose as—
  • A doctor, medic, or any other type of medical personnel.
  • Any member of the International Committee of the Red Cross (ICRC) or its affiliates. Such a ruse is a violation of treaty obligations.
  • A chaplain or clergyman.
  • A journalist.
  • A member of the civilian government, such as a Member of Parliament.[10]
"The attitude of the interrogators at the preliminary interview should usually be correct, studiously polite, and in some cases even sympathetic. It is imperative that they keep their tempers both now and throughout the interrogation. The prisoner may be given the true reason for his arrest or a false one, or he may be left in doubt, according to the circumstances of the case. The interrogators must try to determine whether his usually vigorous protestations of innocence are genuine or an act, but they should not at this stage give any indication of whether they believe or disbelieve him. A clever prisoner will try to find out how much the interrogators know; they should at all costs remain poker-faced and non-committal.[7]
"At this interview the interrogators should do as little as possible of the talking, however many questions they are anxious to have answered. The prisoner should be asked to tell his story in his own words, describe the circumstances of his arrest, give the history of some period of his life, or explain the details of his occupation. The object is to get him to talk without prompting in as much continuous narrative as possible; the more he talks the better the interrogators can assess his personality.

Use of recorders

"The interview must of course be recorded, either [as audio] or in stenographic notes." An audio recording is particularly useful if the interview requires an interpreter. If the interpreter is not a regular member of the interrogator's forces, a recording, which can be reviewed by a staff linguist, can be an important part of quality control.
"The interrogators must on no account try to do this job themselves; it would distract them from the critical task of framing questions and steering the course of interrogation according to the implications of the subject's replies. Whether the stenographer or recorder should be concealed or visible depends on the subject's sophistication and the state of his alert. If the recording process is not evident some subjects may become careless of what they say when they see that the interrogators are not taking notes, whereas a visible recording would alert them to be more cautious. For others, consciousness of a recording going on in full view may be unnerving, and they may betray the weak links in their stories by showing signs of distress at these points.
"At a later stage of the interrogation it may be of value to play back to the subject some part of this recording. The sound of his own voice repeating his earlier statements, particularly any with intonations of anger or distress, may make a psychological breach in his defenses."

Working with interpreters

"Without doubt an interrogator using the subject's language is in a much better position than one who has to work through an interpreter. But the interrogation skill is infinitely more important than the language skill, and a good linguist should not be substituted for a good interrogator. In the absence of an interrogator who speaks the language, an interpreter should be used, preferably one with some training in interrogation techniques. It is very important that the interpreter not only report accurately what both parties say but also reflect as faithfully as he can their inflection, tone, manner, and emphasis. He should try to become part of the furniture in the room rather than a third personality, and the interrogator should act as though he were not there."[7]
Interpreters are frequently a necessary aid to HUMINT collection. There are certain advantages to using an interpreter. The most obvious is that without an interpreter, a HUMINT collector without the proper language or necessary proficiency in that language is severely limited. Furthermore, if properly trained, briefed, and assessed, the interpreter can be a valuable assistant to the HUMINT collector.
Interpreters may have more knowledge of the local culture as well as the language, but the HUMINT manager must be cautious that the interpreter is not, for example, a member of a subculture, religion, etc., of the area, that would be offensive to the subject.
Going through an interpreter will slow the process, and also increase the chance of miscommunication. HUMINT collectors also need to be sure that local or third-country nationals are aware of security, and indeed will be loyal to the interpreter's side.
The collector should be aware of potential problems in interpretation. Some warning signs include:
  • Long-to-short. If the interpreter delivers a long statement of yours as a short statement in the subject language, there are several possibilities. The interpreter may be trying to speed the interview, and the collector has to insist on accurate translation. The question may relate to a sensitive subject, perhaps even inducing fear in the interpreter.
  • Short-to-long. If a brief question of the collector turns into a lengthy statement, it must be resolved that the interpreter does not have his own agenda. It is possible that the interpreter is using honorifics, indirect approach, or other culturally appropriate phrasing. There are times, however, when a translation, to control the relationship, needs to be translated exactly and without indirect language.
  • Body-language shift. If the interpreter seems to change his body language or tone, the collector needs to learn the reason. This may be a justification to suspend the questioning until the interrogator can speak privately with the interpreter and find out if there is a problem. Sometimes, the change may be due to nothing more than fatigue or physical discomfort, but the interrogator must be sure that the native-language conversation has not gotten into dislike, threats, or personal connection that would bias the translation.

Recruited/trusted sources

Special Reconnaissance Patrolling

Special reconnaissance is done by soldiers, normally uniformed, who observe enemy activity deep beyond the front line of one's own side. See special reconnaissance for details. Since these are highly trained specialists, they will usually have been communicating clandestinely to the HUMINT organization, and will be systematically prepared for debriefing. The debriefing may be done by HUMINT officers of their own organization, who are most familiar with their information-gathering techniques. Some of those techniques may be extremely sensitive and held on a need-to-know basis within the special reconnaissance organization. They operate significantly farther than the furthest forward friendly scouting and surveillance units; they may be tens to hundreds of kilometers deeper. They may enter the area of operations in many ways.
Their mission is not to engage in direct combat. It may be to observe and report, or it may include directing air or artillery attacks on enemy positions. If the latter is the case, the patrol still tries to stay covert; the idea is that the enemy obviously knows they are being attacked, but not who is directing fire.

Espionage

Espionage is the collection of information by people either in a position of trust for the enemy, or with access to people with such access. The process of recruiting such individuals and supporting their operations is the HUMINT discipline of agent handling.
It may be possible for an agent handler to meet directly with the agent and debrief him. More commonly, agents send messages to the organization for which they work, by radio, Internet, or by leaving the messages in a hard-to-find place. The latter technique, called a dead drop, will have either a courier or the agent handler retrieve them in a clandestine manner. These are examples of espionage tradecraft.

Analyzing relationships among HUMINT subjects

After interviews, be they debriefings or interrogations, there is likely to be data about other people with whom the subject has had contact or knows about. These data are focused on human relationship networks, not, for example, on military information that the subject knows.
Once information is obtained, it is put into an organized form. Very frequently, information obtained at one interview may help structure the next interview with the same person, or with another subject.

Identifying other people of interest

During interviews, a subject is apt to mention things about other people, or be prompted in a seemingly conversational way.

Operational network "wiring diagram"

Much modern interest in tracking networks of people are relevant to guerilla operations and terrorist networks, two loose categories that do not completely overlap. When examining the overall structure of terrorist groups, there are two general categories of organization: networked and hierarchical. A terrorist group may employ either type or a combination of the two models. Newer groups tend towards organizing or adapting to the possibilities inherent in the network model. Ideology can have an effect on internal organization, with strict Leninist or Maoist groups tending towards centralized control and hierarchical structure.[20] Whether the organizational model is hierarchical or not, the operational personnel almost invariably use the cell system for security.
One relevant study looks at modeling terrorist networks in a manner similar to other systems that "exhibit regularity but not periodicity (i.e., locally random, but globally defined).[21]
Their model focuses at the "mid-range", "not at the level of state leadership, and not at the level of mapping and predicting the behavior of each individual terrorist, but rather at an intermediate or organizational level"... Much as vulnerability analysis of connectionless packet networks such as the Internet[22] concentrates on the nodes whose loss would most interfere with connectivity, the study here looks for the "pattern of connections surrounding a node that allows for wide network reach with minimal direct ties. "Structural holes" at the intersection of flows across knowledge communities position unique and superior nodes. It is the individuals spanning these "internal holes of opportunity" that impact the network's functioning and performance. The implicit corollary of this is that if a small number of these critical nodes can be identified and "clipped" from the network, then command signals will not be able to propagate through the system."
In the 9/11 case, the pilots were such key nodes, once the US operational groups were in-country and operating.[23] Taking the observation of centrality a step farther, COMINT can complement HUMINT in finding the nodes of a geographically dispersed human network.

Obstacles to development of HUMINT capabilities

The following observations are drawn from the article by Lawrence Wright who interviews Director of National Intelligence John Michael McConnell.

Inability to recruit people who are different due to a misperception of security risk factors

To develop HUMINT agents it is necessary to recruit HUMINT controlling officers with native foreign-language skills. However, the U.S. Security clearance process has several problems:
  • It is biased against first-generation immigrants with active relationships to their former country.
  • It is biased against non-heterosexuals. (For overview see Wikipedia article Sexual orientation and military service.) The U.S. Army, for example, has dismissed hundreds of gays with important language skills, during a time of critical national need for Arabic linguists.[25] This while, according to Wright's article, the FBI has gone from 8 Arabic-speaking agents to 9 in the seven years since the 9/11 attacks.
  • It takes up to two years to complete, longer than many immigrants are willing to put their careers on hold while waiting for a clearance.
McConnell's solution to this is to
  • Shorten the clearance process to a month or less.
  • Subject officers to "'life-cycle monitoring' – that is, constant surveillance".
There have been other cases in the past where it has been necessary to balance security clearance policy against national needs, for example:
DNI McConnell notes also in Wright's article that the predominant risk factor which turns officers into traitors is not ethnicity, sexuality or politics, it is money:
"'Look back at all the spies we've had in our history', he said. 'About a hundred and thirty. How many did it for money? A hundred and twenty-eight.'"
For example,
  • Philip Agee received $1 million from Cuban intelligence service to publicize the names of CIA agents as part of an active measures campaign by the KGB.
  • Israel Defense Forces psychiatrist David Shamir "attempted to make contact with the Iranian Foreign Ministry, Hamas officials, and the Russian intelligence service, the FSB, with the intention of selling them classified information which he came upon during his military service". While his claimed motivation was political, the bottom line was still money (emphasis added in quote):
"Shamir said his prime motivation for his actions was what he viewed as the continued breakdown of the state's social fabric. 'The idea was to save my life and that of my son and the last years of my parents' lives, and to have things happen so that we can really be saved,' he said. 'The thinking was that I would receive money which I would use to attain asylum for me, my son, and my family, and to enable them to live as reasonably as possible, not in Iran, not in Lebanon, but rather in a European country.' "

Inability to trust people who are different due to failure to innovate in technical OPSEC

Wright claims that "Much of the intelligence community is technophobic and is also hamstrung by security concerns. Only recently have BlackBerrys made their way into some agencies, and many offices don't even have Internet connections." Hence it is difficult to institute technical controls that would allow the organization to effectively compartimentalize the knowledge of officers in the organization so that even moderately untrusted people could serve. I.e., in many cases of "moles" or internal spies, low-level spies have had access to huge volumes of secret data. This would not be possible if adequate technical measures were instituted to effectively compartmentalize information access on a more finely categorized and motivated need-to-know basis. In other words, there is a so far lost opportunity to use technical measures to improve operational security while at the same time allowing a broader range of people to serve. Another aspect of this would be to automatically filter information "down to" and tailored to a specific subject-matter need-to-know characterization of the requesting individual.

Inability to share information across the community due to operational technophobia

A third obstacle to HUMINT and intelligence analysis in general is effective information sharing across the intelligence community. Wright's article notes that "the community still relies on more than thirty online networks and eighty databases, most of which are largely inaccessible to one another". Lack of information sharing has been partly addressed technically by adding new information-sharing tools
  • Intellipedia, using MediaWiki software with additional security features.
  • A-Space, "based on sites such as MySpace and Facebook – in which analysts post their current projects as a way of creating social networks."
  • The Library of National Intelligence, which "is an online digest of official reports that will soon provide analysts who use it with tips, much the way Amazon and iTunes offer recommendations to their customers."
However, Wright notes that "These innovations have not yet made their way to the analysts and agents in the field", and "the intelligence community has only warily appropriated models whose usefulness is blindingly obvious".