Human intelligence (HUMINT, pronounced/ˈhjuːmɪnt/HEW-mint) isintelligence-gathering by means of human sources andinterpersonal communication. It is distinct from more technical intelligence-gathering disciplines, such assignals intelligence (SIGINT),imagery intelligence (IMINT), andmeasurement and signature intelligence (MASINT).[1] HUMINT can be conducted in a variety of ways, including viaespionage,reconnaissance,interrogation,witness interviews, ortorture. Although associated withmilitary andintelligence agencies, HUMINT can also apply in various civilian sectors such aslaw enforcement.[2]
![]() | Theneutrality of this section isdisputed. Relevant discussion may be found on thetalk page. Please do not remove this message untilconditions to do so are met.(March 2024) (Learn how and when to remove this message) |
NATO defines HUMINT as "a category of intelligence derived from information collected and provided by human sources."[1] A typical HUMINT activity consists of interrogations and conversations with persons having access to information.
As the name suggests, human intelligence is mostly collected by people and is commonly provided via espionage or some other form ofcovert surveillance. However, there are also overt methods of collection, such as via interrogation of subjects or simply through interviews.
The manner in which HUMINT operations are conducted is dictated by both official protocol and the nature of the source of the information. Within the context of theUnited States Armed Forces'military intelligence, HUMINT activity may involve clandestine activities, however these operations are more closely associated withCIA projects.[3] Bothcounterintelligence and HUMINT includeclandestine human intelligence andits associated operational techniques.
Typically, sources of HUMINT generally include:
The first steps for recruiting HUMINT sources is spotting and assessing a target.[4] Surveillance of targets (e.g., military or other establishments, open source or compromised reference documents) sometimes reveals people with potential access to information, but no clear means of approaching them. With this group, a secondary survey is in order. Headquarters may be able to suggest an approach, perhaps through a third party or through resources not known to the field station.[5]