At least on one occasion, the request was a result of frustration with the ISA approval and coordination process - that involved several CIA, DoD, and Army officials.These histories provide information on the organizational evolution, exercises, and operations of ISA for 1986 and 1987. The histories also document ISA's intelligence production in support of its operations.This regulation provides an example of, and specifics about, a military command-directed HUMINT program. However, the findings as well as any recommendations have been redacted.This Army regulation covers HUMINT procedures, restrictions, and authorities, Foreign Military Intelligence Collection Activities (Another part of this document excerpt focuses on the intelligence reports produced as a result of Army HUMINT activities. The precise changes are redacted from the version of the memo released.Defense clandestine HUMINT activities require cover and cover support activities and this directive states the policy and delineates the pertinent responsibilities.
Classification Not Available.This intelligence information report, probably based on reporting by the Defense Attache in Beijing, provides information on one of the enterprises of COSTIND - the Commission of Science, Technology, Industry for National Defense, a key PRC government institution that acquires both technology and scientific and technical intelligence.This directive recognizes that human intelligence operations may be conducted in cyberspace as well as through direct contact. It also reveals that attempts to turn a significant portion of the task force's operations over to the CIA failed - ostensibly due to congressionally imposed restrictions, but there was also, according to some CIA officials, agreement in the Directorate of Operations that they should not absorb the task force in any case.This memo indicates the Army’s decision to enhance its human capabilities – which had been substantial prior to the creation of the DHS – although the memo also specifies that the newly established Army Operational Activity (AOA), under the Army Intelligence and Security Command (INSCOM), is to conduct overt HUMINT collection.With the absorption, in 2007, of the Defense HUMINT Service into the CIA-run National Clandestine Service, the DoD no longer had a department-level clandestine collection organization. Dwayne Howard Florenzie, attaches assigned to the U.S. Consulate General’s office Hong Kong. Most importantly, it required the military service organizations to receive and implement HUMINT tasking from DIA without alteration.HUMINT-related activities at the Department of Defense and Defense Intelligence Agency level, subsequent to the disestablishment of the DHS, included continued issuance of DoD directives or instructions governing elements of HUMINT operations – including those concerning human source validation (The title of this article indicates another operation other than war (This 1989 memo terminates the use of the terms ISA and "GRANTOR SHADOW" - the later being the current designation of the special access program that protected information about ISA (previously it was known as ROYAL CAPE). They had entered China on July 23 to consult with officials at the US Embassy in Beijing and the Consulate General in Guangzhou. ISA would conduct both human intelligence operations as well as SIGINT operations, the latter usually from aircraft.These two histories provide some specifics about the intelligence collection activities of Task Force 157.
It named the Director of the Defense Intelligence Agency as DoD HUMINT manager. By the mid-1960s the Navy, however, was largely out of the clandestine HUMINT business. The instruction delineates the responsibilities of assorted officials, from the Under Secretary of Defense for Intelligence to the Secretary of the Army.Source: CIA Freedom of Information Act Release.Source: Air Force Freedom of Information Act Release.This memo and its attachments provide additional details on Detachment 6 – the new Air Force HUMINT organization. It states DoD policy with regard to such operations, identifies responsibilities, specifies procedures, and discusses cyberspace tradecraft (in a fully redacted section).Source: Army Intelligence and Security Command Freedom of Information Act Release.Source: Department of Defense Freedom of Information Release.This heavily-redacted briefing specifies three objectives for Air Force HUMINT “In the ISR Fight.” It asserts there has been great progress in Air Force HUMINT, and states that Air Force HUMINT was intended to be a key component of the service’s intelligence, surveillance, and reconnaissance effort.This extract from the 2012 history for the Air Force Intelligence, Surveillance, and Reconnaissance Agency (now the 25Source: Army Intelligence and Security Command Freedom of Information Act ReleaseThis study examines the history of military HUMINT, the purpose in creating the DHS and, as indicated by the title, the role of the DHS in supporting military commanders and task forces in operations other than war – specifically Haiti, Somalia, and Bosnia.A disestablishment committee distributed task force projects among the CIA, DIA, Army, Air Force, and Task Force 168 - an organization established in 1969 to provide intelligence support to the fleet and conducted overt HUMINT operations.
This article, in the CIA’s in-house journal, examines various aspects, including counterintelligence, of the Army’s HUMINT effort in the Korean War.This “speed letter” to the CIA Deputy Director for Operations discusses the reaction of the House Permanent Select Committee on Intelligence to its discovery of the existence of the Army Intelligence Support Activity (ISA), which had been established as the Field Operations Group in 1980 to gather intelligence to support the April 1980 attempt to rescue U.S. embassy personnel held in Tehran. In 1981, it would be transformed into a permanent organization - the Army Intelligence Support Activity (ISA).