Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Human Intelligence: All Humans, All Minds, All the Time

Human Intelligence: All Humans, All Minds, All the Time

Ratings: (0)|Views: 27|Likes:
The author explores the centrality of Human Intelligence in meeting the needs of the U.S. Army, the Department of Defense, and the whole of government. Such intelligence is essential to create a national security strategy, to define whole of government policies, to acquire the right capabilities at the right price in time to be useful, and to conduct local and global operations. He outlines 15 distinct types of HUMINT, four of which are classified (defensive and offensive counterintelligence, clandestine operations, and covert action), with the other 11 being predominantly unclassified. The author offers the U.S. Army an orientation to a world in which thinkers displace shooters as the center of gravity for planning, programming, and budgeting, as well as the proper structuring of mission mandates, force structures, and tactics and techniques to be used in any given mission area.
The author explores the centrality of Human Intelligence in meeting the needs of the U.S. Army, the Department of Defense, and the whole of government. Such intelligence is essential to create a national security strategy, to define whole of government policies, to acquire the right capabilities at the right price in time to be useful, and to conduct local and global operations. He outlines 15 distinct types of HUMINT, four of which are classified (defensive and offensive counterintelligence, clandestine operations, and covert action), with the other 11 being predominantly unclassified. The author offers the U.S. Army an orientation to a world in which thinkers displace shooters as the center of gravity for planning, programming, and budgeting, as well as the proper structuring of mission mandates, force structures, and tactics and techniques to be used in any given mission area.

More info:

Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/16/2014

pdf

text

original

 
Advancing Strategic Thought SeriesHUMAN INTELLIGENCE:ALL HUMANS, ALL MINDS, ALL THE TIMERobert D. SteeleMay 2010
The views expressed in this report are those of the au-thor and do not necessarily reect the ofcial policy orposition of the Department of the Army, the Depart-ment of Defense, or the U.S. Government. Authorsof Strategic Studies Institute (SSI) publications enjoyfull academic freedom, provided they do not discloseclassied information, jeopardize operations security,or misrepresent ofcial U.S. policy. Such academicfreedom empowers them to offer new and sometimescontroversial perspectives in the interest of furtheringdebate on key issues. This report is cleared for publicrelease; distribution is unlimited.
*****
This publication is subject to Title 17, United StatesCode, Sections 101 and 105. It is in the public domainand may not be copyrighted.
Visit our website for other free publicationdownloadshttp://www.StrategicStudiesInstitute.army.mil/
 
ii*****Comments pertaining to this report are invited and shouldbe forwarded to: Director, Strategic Studies Institute, U.S. ArmyWar College, 122 Forbes Ave, Carlisle, PA 17013-5244.*****All Strategic Studies Institute (SSI) publications may bedownloaded free of charge from the SSI website. Hard copiesof this report may also be obtained free of charge by placingan order on the SSI website. The SSI website address is:
www.StrategicStudiesInstitute.army.mil
.*****The Strategic Studies Institute publishes a monthly e-mailnewsletter to update the national security community on the re-search of our analysts, recent and forthcoming publications, andupcoming conferences sponsored by the Institute. Each newslet-ter also provides a strategic commentary by one of our researchanalysts. If you are interested in receiving this newsletter, pleasesubscribe on the SSI website at
www.StrategicStudiesInstitute.army.mil
/
newsletter/.
*****Previous works by Mr. Steele include:1.
Information Operations: Putting the “I” Back Into DIME
, February2006, available from
www.strategicstudiesinstitute.army.mil/pubs/ display.cfm?pubID=642
. In the Age of Information, the primarysource of national power is information that has been convertedinto actionable intelligence or usable knowledge. Informationoperations is the critical ingredient in early warning, peacekeep-ing, stabilization and reconstruction, and homeland defense.
 
iii2.
The New Craft of Intelligence: Achieving Asymmetric Advantagein the Face of Nontraditional Threats
, February 2002, availablefrom
www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=217 
. This monograph is the third in the Strategic Studies Insti-tute’s “Studies in Asymmetry” Series. In it, the author examinestwo paradigm shifts—one in relation to the threat and a second inrelation to intelligence methods—while offering new models forthreat analysis and intelligence operations in support of policy,acquisition, and commands engaged in nontraditional asymmet-ric confrontation.3.
Chapter 9, “Threats, Strategy and Force Structure: An AlternativeParadigm for National Security in the 21st Century,” in Steven Metz,ed.,
Revising the Two MTW Force-Shaping Paradigm
, Carlisle, PA:Strategic Studies Institute, U.S. Army War College, April 2001, pp.139-163, available from
www.strategicstudiesinstitute.army.mil/pdfles/ PUB297.pdf 
.
4. Chapter 12, “Presidential Leadership and National SecurityPolicymaking,” in Douglas T. Stuart, ed.,
Organizing for NationalSecurity
, Carlisle, PA: Strategic Studies Institute, U.S. ArmyWar College, November 2000, pp. 245-282, available from
www.strategicstudiesinstitute.army.mil/pdfles/PUB299.pdf 
.
ISBN 1-58487-439-2

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->