Advanced Criminal Investigations and Intelligence Operations

Home > Nonfiction > Advanced Criminal Investigations and Intelligence Operations > Page 5
Advanced Criminal Investigations and Intelligence Operations Page 5

by Unknown


  assassinations, and propaganda or psychological operations, etc. Unless

  precise objectives are determined, data will be collected unsystemati-

  cally, and decision makers do not receive the intelligence product that they require for decisions.

  Human Intelligence

  19

  Evaluation of intelligence data is critical to determining the reliability of sources and information. A standardized system is used to rate the reliability of sources and the accuracy of the information they provide. Information

  may be relied upon once it is confirmed by other sources. Sources may be

  neutral, friendly, or hostile and may or may not be aware of their contribution to the collection of information.

  Human Sources: Interviewing and Interrogation

  HUMINT operations and activities involve selecting people who may be

  sources of meaningful HUMINT, positively identifying them, and conducting interviews of various types. Properly recording and cross-indexing the results of interviews is essential. Interviews and interrogations with persons having access to information consist of formal, structured conversations with friendly or open sources to elicit information. This includes briefings and debriefings.

  Briefings occur before an operation, giving details of the EEI that are

  critical to accomplishing the mission. Debriefing occurs after the mission and involves getting feedback on intelligence information observed or gathered during the mission that may be exploited afterward. The acronym SALUTE

  is used by combat units to determine part of the information that can be useful. SALUTE stands for

  • S ize: How many men in the unit?

  • A ctivity: What are they doing?

  • L ocation: Map grid coordinates, if available, or the best description available.

  • U nit: Identity, uniforms, descriptions, etc.

  • T ime: When did you see them?

  • E quipment: Weapons, vehicles, communications, anything else

  distinctive?

  Interrogations differ from interviews in that they usually involve subjects who are unwilling to provide information and may even be hostile, such as prisoners. Obtaining information from unwilling and uncooperative subjects may involve a range of tactics and techniques ranging from persua-

  sion (as in criminal investigations) to coercive (as in enemy combatants and espionage agents). Legal considerations may also be involved.

  Interrogation is an interaction, and, even before considering the different attitudes the subject may have, the interrogator needs to know his or her own style, strengths, and weaknesses. The interrogator needs to assess whether he or she needs cultural advice, how to handle language issues, and if he or she needs specialized or technical assistance. (More on this in the section on Linguistic Skil s.)

  20

  Advanced Criminal Investigations and Intelligence Operations

  Security Clearances

  A National Agency Check (NAC) with Local Agency Check and Credit

  Check (NACLC) is a type of background check required in the United

  States for granting of security clearances. STANDARD FORM 86, 86A,

  and 86C are the security questionnaire forms for security clearances.

  (See also Figures 2.1 and 2.2, Standard Form 312 Classified Information

  Nondisclosure Agreement.) There are three basic levels of clearance:

  • Confidential (Level 1)—The screening procedure requires RS checks and screening of foreign employments, immediate relatives, and

  marriages or common-law relationships.

  • This level of clearance authorizes access to designated and classi-

  fied information up to confidential level on a need-to-know basis.

  • Also known as a public trust clearance, this level typically

  requires a few weeks to a few months of investigation.

  • A confidential clearance requires a NACLC investigation, which dates back 7 years on the applicant’s record and must be renewed

  (with another investigation) every 15 years.

  • Applicants are required to complete federal Standard Form 85P.

  • Secret (Level 2)—The screening procedure is the same as for confidential, and this level of clearance authorizes access to designated

  and classified information up to secret level on a need-to-know

  basis.

  • A secret clearance, also known as collateral secret or ordinary secret, requires a few months to a year to fully investigate,

  depending on the individual’s background.

  • A secret clearance requires a NACLC and a credit investigation

  and it must be renewed every 10 years.

  • Top Secret (Level 3)—In addition to the checks at the secret level, foreign travels, assets, and character references must be given.

  • A field check will also be conducted prior to granting the

  clearance.

  • A top secret (TS) clearance is often designated following a sin-

  gle scope background investigation (SSBI) and must be renewed

  every 5 years.

  • This level of clearance authorizes access to all designated and

  classified information on a need-to-know basis.

  Control ed unclassified information is not a clearance, but a level at which information distribution is controlled. It involves information

  that may be illegal to distribute, is available when needed, but should not

  Human Intelligence

  21

  Figure 2.1 Standard Form 312: Classified Information Nondisclosure Agreement.

  be redistributed. An example of this type of information is the operational details of a noncritical system. Similarly, information may be marked

  FOUO or for official use only.

  Sensitive compartmented information (SCI) clearances are assigned

  after a single scope background investigation (SCBI) and a special adjudication process for evaluating the investigation. SCI access is assigned only in compartments, which are separated from each other, so someone with access to one compartment may not have access to another. Each compartment may

  22

  Advanced Criminal Investigations and Intelligence Operations

  Figure 2.2 Standard Form 312 (Back): Classified Information Nondisclosure Agreement.

  include additional special requirements and clearance process. Information that may require compartmented access includes the following:

  • Cryptography ( crypto)

  • Overhead reconnaissance from aircraft, UAVs, or satellite IMINT

  • Communications intelligence from SIGINT

  • Design or stockpile information about nuclear weapons

  • Nuclear targeting

  Human Intelligence

  23

  The Department of Energy (DOE) and the Nuclear Regulatory Commission

  (NRC) have a different designation for security clearances. The need for

  security clearances became an issue at the end of World War II when the

  Manhattan Project was transferred to a new entity, the Atomic Energy

  Commission (AEC). Thousands of civilians were going to be hired, and the

  newly drafted Atomic Energy Act of 1947 required controls over access to

  restricted data and nuclear materials. The U.S. Department of Energy has

  two types of security clearances that it uses:

  • Q clearance is the DOE equivalent to a U.S. Department of Defense (DoD) TS clearance and Critical Nuclear Weapon Design

  Information (CNWDI) designation. DOE clearances are for access

  specifically relating to atomic- or nuclear-related

  materials

  ( Restricted Data under the Atomic Energy Act of 1954) and are

  issued to nonmilitary personnel only.

  • In 1946 U.S. Army CIC Major Bud Uanna, the first Chief of the

  C
entral Personnel Clearance Office at the newly formed AEC,

  named and established the criteria for the Q Clearance.

  • As of 1993, Q clearances required a single-scope background

  investigation covering the previous 10 years of the applicant’s

  life by both the Office of Personnel Management and the Federal

  Bureau of Investigation (which, as of 1998, cost $3225).

  • L clearance is the DOE and NRC equivalent to a U.S. DoD Secret (S) clearance for civilian access relating to nuclear materials and information under the Atomic Energy Act of 1954.

  • The DOE L clearance provides less access than the Q Clearance.

  L-cleared persons are allowed unescorted access to limited and

  protected areas, as well as access to confidential restricted data, confidential and secret formerly restricted data, confidential and

  secret national security information, and Category III special

  nuclear material.

  • As of 1989, the NRC required the Q clearance for employees in

  the most important and sensitive positions, while most employ-

  ees in positions deemed noncritical-sensitive held L clearances.

  U.S. Intelligence Community

  The U.S. Intelligence Community (IC) is a coalition of 17 agencies and organizations within the executive branch that work both independently and

  collaboratively to gather the intelligence necessary to conduct foreign relations and national security activities. Their primary mission is to collect and convey the essential information required by the president and members of

  24

  Advanced Criminal Investigations and Intelligence Operations

  the policymaking, law enforcement, and military communities to execute

  their appointed duties. The 17 member agencies of the U.S. Intelligence

  Community are as follows:

  • Air Force Intelligence—Air Intelligence Agency (AIA)

  • Army Intelligence—Intelligence and Security Command (INSCOM)

  • Central Intelligence Agency (CIA)

  • Coast Guard Intelligence (USCG)

  • Defense Intelligence Agency (DIA)

  • Department of Energy (DOE)

  • Department of Homeland Security (DHS)

  • Department of State (DOS)

  • Department of the Treasury (DOT)

  • Drug Enforcement Administration (DEA)

  • Federal Bureau of Investigation (FBI)

  • Marine Corps Intelligence (USMC)

  • National Geospatial-Intelligence Agency (NGA)

  • National Reconnaissance Office (NRO)

  • National Security Agency (NSA)

  • Navy Intelligence—Office of Naval Intelligence (ONI)

  • Office of the Director of National Intelligence (DNI)

  Members of the U.S. Intelligence Community collect and assess informa-

  tion regarding international terrorist and narcotic activities; other hostile activities by foreign powers, organizations, persons, and their agents; and foreign intelligence activities directed against the United States. As needed, the President may also direct the IC to carry out special activities to protect U.S. security interests against foreign threats.

  British Security Service MI5 and Secret

  Intelligence Service MI6

  The Security Service, commonly known as MI5, was established in 1909 and is the UK’s national security intelligence agency. The Security Service plays a vital but secret role in countering the activities of spies and terrorists. The Secret Intelligence Service (SIS), commonly known as MI6, evolved from the Foreign Section of the Secret Service Bureau, established by the Committee of Imperial Defence in October 1909. The first head of the Foreign Section, Captain Sir Mansfield Cumming (Royal Navy), wrote his signature as MC

  or C in green ink. Thus began the long tradition of the head of the Service adopting the initial C as his symbol.

  Human Intelligence

  25

  The outbreak of World War I in 1914 brought the virtual integration

  of the Foreign Section within the Military Intelligence Directorate of the War Office. After the end of hostilities, Cumming returned the Service to the Foreign Office. By 1920 it was referred to as SIS, a title that was used in the Intelligence Services Act 1994. MI6 has become an almost interchange-able title for SIS, at least outside the Service. The origins of this title are from the 1930s when it was adopted as a convenience. It was used during

  World War II, especially if distinction needed to be made between MI5

  (the Security Service) and MI6 (the Secret Service). Although MI6 fell into official disuse years ago, many writers and journalists continue to use it to describe SIS.

  Linguistic Skills (Languages)

  One of the most valued skills among intelligence officers and investigators is the ability to speak the indigenous language of the area of operations. This is essential to both HUMINT and Electronic Intelligence (ELINT).

  The List of Official Languages of the United Nations (by Institution) (UN/

  ONU), under the Charter, are Chinese, English, French, Russian, Spanish,

  and Arabic (added in 1973).

  Other common, but not as prolific, languages include Ukrainian, Czech-

  Slovene, Serbo-Croatian, Bosnian, Tagali, Chaldean, Yiddish, Zulu, and Swahili.

  In the Middle East, Arabic and Persian ( Farsi) (Afghanistan, Bahrain, Iran, Iraq, Kazakhstan, Tajikistan, Uzbekistan, etc.) are the most widely spoken languages. Arabic and Kurdish (Iraq and Turkey) are the official languages of the Iraqi government. Assyrian (Syriac) (a dialect of Aramaic) and Iraqi Turkmen (a dialect of Turkish) are official in areas where the populations are more representative of the respective language. Other languages spoken in the region include Azeri, Berber languages, Circassian,

  Dimli (Zaza), Gagauz, Gilaki, Greek, Hebrew (in its numerous variations), Kabardian, Luri, Mazandarani languages, Somali, Turkish and other

  Turkish languages, etc.

  Urdu is spoken in many Middle Eastern countries, such as Arab states the United Arab Emirates, Israel, and Qatar, which have large numbers of

  Pakistani immigrants. It is common to be bilingual in Afghanistan, but the most common languages spoken in Afghanistan are Dari ( Eastern Persian) (Afghanistan) (49%–80%) and Pashto (Afghanistan) (35%–50%). Hazaragi, spoken by the Hazara minority, is a distinct dialect of Persian. Other languages spoken include the Turkic languages Uzbek (6%) and Turkmen (3%), as well as 30 minor languages, including Balochi, Nuristani, Pashai, Brahui, Pamiri languages, Hindko, etc.

  26

  Advanced Criminal Investigations and Intelligence Operations

  Number of Countries with the Same Official Language

  This is a ranking of languages by number of sovereign countries in which

  they are official.

  • English: 55 countries: largest—United States, Nigeria, United

  Kingdom, India

  • French: 29 countries: largest—France, Democratic Republic of the

  Congo, Canada

  • Arabic: 24 countries: largest—Egypt, Sudan, Algeria

  • Spanish: 20 countries: largest—Mexico, Spain, Colombia, Argentina

  • Russian: 10 countries: largest—Russia, Kazakhstan, Belarus

  • Portuguese: 10 countries: largest—Brazil, Portugal, Mozambique,

  Angola

  • German: 7 countries: largest—Germany, Austria, Switzerland

  • Dutch: 5 countries: largest—the Netherlands, Belgium, Suriname

  • Albanian, Italian, Serbian: 4 countries

  • Malay, Persian (Farsi), Swahili, Tamil, Urdu, Hungarian, Mandarin

  Chinese: 3 countries

  • Aymara, Bengali, Croatian, Greek, Hindi, Korean, Quechua,

  Romanian, Sotho, Swati, Swedish, Tswana, Turkish: 2 countries

  The thirty most widely spoken languages in the world are listed in Table 2.1, a
long with their families, scripts used, number of speakers, and regions in which they are spoken.

  Learning Languages Fast

  HUMINT operations may require the sudden immersion into an environ-

  ment and culture that is unfamiliar to a mission essential operative. The rapid assimilation of basic language skills may be critical to an operative.

  The Defense Language Institute (DLI) teaches military, intelligence, for-

  eign service, and other government personnel several languages. Some are

  more difficult than others, requiring anywhere from 6 to 18 months of step-by-step learning processes. Books, videos, CDs, computer programs, etc., are all good resources, as are watching TV and listening to the radio in the target language. Immersion into the culture by interacting with native speakers is even better.

  Language is the capacity for acquiring and using complex systems of verbal, written, symbolic, or other forms of communications and a

  language is any specific example of such a system. Linguistics is the scientific study of language. Linguistics can be broadly broken into

  Human Intelligence

  27

  Table 2.1 Thirty Most Spoken Languages in World, by Number of Speakers Speakers

  Where Commonly

  Language

  Family

  Script(s) Used (Millions)

  Spoken

  1 Mandarin

  Sino-Tibetan

  Chinese

  1051

  China, Malaysia, Taiwan

  characters

  2 English

  Indo-European Latin

  510

  United States, United

  Kingdom, Australia,

  Canada, New Zealand

  3 Hindi

  Indo-European Devanagari

  490

  North and Central India

  4 Spanish

  Indo-European Latin

  425

  The Americas, Spain

  5 Arabic

  Afro-Asiatic

  Arabic

  255

  Middle East, Arabia,

  North Africa

  6 Russian

  Indo-European Cyrillic

  254

  Russia, Central Asia

  7 Portuguese

  Indo-European Latin

  218

  Brazil, Portugal,

  Southern Africa

  8 Bengali

  Indo-European Bengali

  215

  Bangladesh, Eastern India

  9 Malay,

 

‹ Prev