Why the Intelligence Community Ineffectively Uses HUMINT
“To address the challenges facing the U.S. intelligence community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis.”—Richard A. Best, Intelligence Issues for Congress, 2011, p. 2
Introduction
Since 9/11, the intelligence community has been at the heart of numerous policy decisions—from the invasion of Iraq to U.S. foreign relations with China and Russia. While the objective of the intelligence community is to provide legitimate intelligence to policy makers, numerous researchers have pointed out that in the post-9/11, policy has often shaped intelligence rather than the other way around, as it is intended to be.[footnoteRef:2] As Best notes, “intelligence from human contacts—humint—is the oldest intelligence discipline and the one that is most often written about in the media.”[footnoteRef:3] As the CIA is the primary collector of human intelligence along with the Department of Defense (DOD), it plays a leading role in the use of HUMINT in the intelligence community. With the wars in the Middle East now dragging on for nearly 2 decades, many are wondering why, with so many HUMINT sources, these wars have proven so difficult and disastrous on many levels, and why faulty intelligence was used in the build-up to the Iraq invasion. This paper asks specifically: Why is the intelligence community so ineffectively using HUMINT? What is going on behind the scenes? This issue remains a puzzle because the reputation of the intelligence communities is that there is virtually very little that is kept from them in this day and age: there are few secrets—and fewer surprises. So for the intelligence community to get something so spectacularly wrong (as Hussein having mobile weapons labs and WMDs) is to give one considerable pause: how could such gross miscalculations of judgment occur? It is hypothesized that in the post-9/11 world, the intelligence community has allowed itself to be guided by policymakers instead of the intelligence community being the guide for policy. This study will conduct a case study analysis to determine if such an inversion has indeed taken place. [2: J. Pfiffner and M. Phythian, Intelligence and National Security Policymaking on Iraq: British and American Perspectives. TX: Texas A&M University Press, 2008), 178.] [3: Richard Best, Intelligence Issues for Congress. Congressional Research Service: CRS Report for Congress, 2011, 3.]
By using the qualitative approach and the case study research design, the study will answer those questions so as to better understand why HUMINT is not being effectively used by the intelligence community in the post-9/11 era. The specific case this study will examine is the way in which HUMINT was misused in the build-up to the Iraq War post-9/11, particularly with respect to the source CURVEBALL, whose information was problematically used to justify a full-scale invasion. This study will provide a review of relevant literature, with a focus on current knowledge gaps and explain how the study will address those gaps. It will also provide a discussion of the methodology used for collecting data and how data was analyzed. Finally it will present the analysis and findings with a section for discussing the findings in detail and explaining what it means in terms of the research question and hypothesis.
Review of the Literature
“Counterterrorism is highly dependent upon human intelligence (humint), the use of agents to acquire information (and, in certain circumstances, to carry out covert actions). Humint is one of the least expensive intelligence disciplines, but it can be the most difficult and is undoubtedly the most dangerous for practitioners. Mistakes can be fatal, embarrass the whole country, and undermine important policy goals.”—Richard A. Best, Intelligence to Counter Terrorism: Issues for Congress, 2002, p. 2.
While Colin Powell was testifying before the UN about Iraq’s yellow cake uranium deals with Niger (which former ambassador Joe Wilson vehemently denied ever took place)[footnoteRef:4], Richard Perle, who chaired the Pentagon’s Defense Policy Board Advisory Committee, had been collaborating with Bill Kristol of The Weekly Standard and Robert Kagan (both of who also headed the Project for the New American Century (PNAC)—a quasi dual-American-Israeli think tank) to put forward the story that Saddam Hussein was a legitimate threat to the U.S. particularly for its terrorist connections. Perle, Kristol and Kagan were advisors to policymakers: their role was to put forward ideas about how foreign policy should be conducted. They were not intelligence...
Bibliography
An Overview of the United States Intelligence Community for the 111th Congress, 2009. https://fas.org/irp/eprint/overview.pdf
Best, Richard A. Intelligence Issues for Congress. Congressional Research Service: CRS Report for Congress, 2011.
Best, Richard A. Intelligence to Counter Terrorism: Issues for Congress. Congressional Research Service: CRS Report for Congress, 2002.
Cirincione, J., Mathews, J., Perkovich, G., Orton, A. WMD in Iraq: Evidence and implications. DC: Carnegie Endowment for International Peace, 2004.
“Declaration of George Tenet,” Aftergood v. CIA, U.S. District Court for the District of Columbia, Civ. No. 98- 2107, April, 1999, at http://fas.org/sgp/foia/tenet499.html.
DeVine, Michael E. Intelligence Community Spending: Trends and Issues: CRS Report for Congress, 2018.
Fischer, C.T. Bracketing in qualitative research: Conceptual and practical matters. Psychotherapy Research Methods, 19(4-5) (2009), 583-590.
Hersh, Seymour. Selective Intelligence. The New Yorker, 2003. http://www.newyorker.com/magazine/2003/05/12/selective-intelligence
Rose, David. “Neo Culpa,” Vanity Fair, 2006. https://www.vanityfair.com/news/2006/12/neocons200612
Wilson, Joe. “What I Didn’t Find in Africa.” New York Times, 2003. https://www.nytimes.com/2003/07/06/opinion/what-i-didn-t-find-in-africa.html
Gender Integration in CI/HUMINT and the War against Terrorism Gender Integration in CI/HUMINT on the War against Terrorism in the Middle East and Strategies for Effective Implementation Shea Larson Harry Nimon, Committee Chair Dr. Troy Mitchell, Subject Matter Expert Dr. Amanda Bowers, Committee Member The success of counterinsurgency operations depends on the effectiveness and appropriateness of intelligence gathered. Human subjects are a crucial source of intelligence for counterinsurgency operations. Previously, the U.S. Armed Forces created opportunities
Women in Combat: The Effect of Integration on CI/HUMINT Collection The Effect of Integration on CI/HUMINT Collection: Women in Combat Key Words: #Combat # Integration # CI/HUMINT The success of any counterinsurgency operation depends largely on the effectiveness and appropriateness of intelligence gathered. Human subjects are a crucial source of intelligence for counterinsurgency operations. Recently, the Pentagon announced its plan to open up all ground combat roles that had previously been closed to
Women in Combat: The Effect of Integration on CI/HUMINT Collection The Effect of Integration on CI/HUMINT Collection: Women in Combat Key Words: #Combat # Integration # CI/HUMINT The success of any counterinsurgency operation depends largely on the effectiveness and appropriateness of intelligence gathered. Human subjects are a crucial source of intelligence for counterinsurgency operations. Recently, the Pentagon announced its plan to open up all ground combat roles that had previously been closed to
(MACV Dir 381-41) This document is one of the first confidential memorandums associated with the Phoenix Program, which details in 1967 the mostly U.S. involvement in counterinsurgency intelligence and activities and discusses the future training and development of South Vietnam forces to serve the same function, that had been supported by the U.S. In civilian (mostly CIA) and military roles. The document stresses that the U.S. role is to
Integration in the CI/HUMINT Community An Analysis of the Benefits of Integration in the CI/HUMINT Community and Strategies for Effective Implementation Shea Larson The success of any counterinsurgency operation depends largely on the effectiveness and appropriateness of intelligence gathered. Human subjects are a crucial source of intelligence for counterinsurgency operations. Several years back, the U.S. Armed Forces opened up opportunities for women to occupy specific positions in counterintelligence/human intelligence (CI/HUMINT) discipline. However,
Intelligence and National Security1OSINT stands for Open Source Intelligence. It refers to the practice of gathering, analyzing, and disseminating information that is available in the public domain. This can include information from the internet, social media, newspapers, radio, television, press releases, and other publicly available sources. OSINT differs from other intelligence disciplines, such as HUMINT (human intelligence) and SIGINT (signals intelligence), in that it focuses solely on publicly available information.OSINT
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now