Advanced HUMINT Tradecraft
Human Intelligence refers to gathering information through direct human contacts, the recruiting and handling of people who provide secrets or insights. It is often abbreviated to (HUMINT) Tradecraft encompasses the clandestine techniques and mental strategies used by intelligence officers to recruit sources, elicit information, evade surveillance, and manage agents securely. In this guide we focus on advanced HUMINT and tradecraft thinking with examples from the United Kingdom (MI5 and MI6) and Israel (Mossad and Shin Bet), using only declassified or openly documented material. We will explore core pillars of HUMINT elicitation techniques, recruitment psychology, surveillance detection, and agent handling doctrine.
In British parlance, a “covert human intelligence source” often simply called an agent, is an individual who secretly provides information to an intelligence service. Agents are typically recruited (persuaded or volunteered) informants, not official employees or recruited in the traditional sense. The intelligence professionals who recruit and direct agents are officers or case officers, sometimes termed agent handlers.
A source generally means anyone providing information while an agent implies a long-term, managed source. Other terms include double agent (an agent who secretly works for two sides, often feeding one side false data) and mole (an insider who betrays their organisation to a foreign service). Understanding these distinctions is vital before delving into HUMINT techniques.
Below, we examine each pillar of HUMINT tradecraft in detail, emphasisng openly documented methods and examples relevant to UK.
Elicitation Techniques
Elicitation is the art of subtly extracting information through conversation, without the target realising they are revealing secrets. It is a structured, often friendly form of questioning designed to make sources feel relaxed and talkative. A skilled intelligence officer or agent handler might engage a target in casual chat at a cafe, conference, or online forum and gently steer the dialogue toward sensitive topics, all while the target perceives it as benign social interaction. Pieces of information gathered over many such chats can be aggregated to yield valuable intelligence. That’s the idea anway.
Common Elicitation Tactics
Intelligence personnel as well as law enforcement and social engineers use a variety of conversational tricks that have been openly discussed in security training materials. Some well-known elicitation techniques include:
- Feigning Ignorance or Curiosity – Pretending to know less about a topic than the target, to flatter them into “teaching” you. This exploits the human tendency to show off expertise. Academic settings often see this tactic, as experts love to lecture when someone seems genuinely interested.
- Making False Statements (Provoking Corrections) – Stating an incorrect fact so that the target can’t resist correcting you with the true information.
- Criticism or Complaints – Casually criticising something important to the target, or complaining about one’s own problems, can prompt revealing responses.
- Flattery and Ego-Stroking – Complimenting the target’s knowledge or work to induce prideful boasting. Humans have a tend to have a desire to feel appreciated and contribute to something important, which flattery exploits.
- Quid Pro Quo – Offering a small secret of your own to encourage the target to reciprocate in kind.
- Bracketing – Posing a question in terms of ranges or extremes to get the target to reveal a more precise answer.
- Oblique Reference/Analogies – Discussing a related topic or system to prompt the person to draw comparisons to their own sensitive work.
These techniques, among others, are part of the publicly documented repertoire of elicitation. Crucially, the elicitor must appear non-threatening and genuinely interested or ignorant. The conversation must feel ordinary to the target, inquisitive student etc Patience is key to this being successful, a skilled operative might spread the inquiry over weeks or months, each time gleaning more information.
Of course it would be worth noting that there is also counter-elicitation. Intelligence and security agencies also train personnel in how to deflect elicitation attempts once recognised. Recommended defenses include giving vague or monosyllabic answers, politely changing the topic, answering a question with a question, or referring the person to public sources. If truly suspicious, one might play dumb (“I’m not sure, why do you ask?”) or simply refuse to continue.
2. Recruitment Psychology and Models
Recruiting a person to spy – to actively supply secrets – is a delicate psychological game. It involves identifying a suitable target, winning their trust or exploiting their weaknesses, and convincing them to secretly work for an intelligence service against their original loyalties, or getting a person to do what you want. Western intelligence officers often summarize the motives that drive people to commit espionage with the classic acronym MICE – Money, Ideology, Coercion (or Compromise), and Ego.
The MICE Framework
MICE encapsulates four primary incentives that have historically led individuals to betray secrets.
- Money: Financial gain or material reward. Many spies are lured by payments or the promise of a better lifestyle. Money is straightforward, but a mercenary spy can be unreliable if the payments stop or a richer bidder appears.
- Ideology: Belief in a cause or political conviction. This is often the most respected motive within agencies because such agents are self-driven.
- Coercion/Compromise: Being blackmailed or pressured to spy, often due to personal vulnerabilities (e.g. caught in wrongdoing or threatened with harm). Coercion is more common in law enforcement informants or authoritarian regimes.
- Ego/Excitement: Some people spy for personal gratification, the thrill of secret adventure or the boost to their self-importance. An intelligence operative might stroke a target’s ego, making them feel “special, clever, and important” by contributing to a covert mission. Many spies also seek revenge or validation. For example, an employee who feels underappreciated or wronged in their career might spy out of a desire for retaliation.
Beyond MICE, Building Lasting Commitment (RASCLS)
While MICE explains initial triggers, keeping an agent loyal over time often requires deeper psychological tactics. Moving beyond MICE to RASCLS, an acronym for Robert Cialdini’s six principles of influence: Reciprocation, Authority, Scarcity, Commitment/Consistency, Liking, and Social Proof. These can be understood as persuasion levers that case officers use to strengthen the relationship.
- Reciprocation: People feel obliged to return favors. A handler might do genuine favors for the agent help with a family issue, or give small gifts to build a sense of indebtedness.
- Authority: People tend to obey or trust those in authority. Case officers project confidence and represent their agency as powerful and prestigious which can impress recruits. An authoritative handler who is very knowledgeable and professional can solidify the agent’s respect and compliance.
- Scarcity: Framing the opportunity as rare or time-sensitive. For example, telling a source “You are one of the few people who can do this vital task – and the window to act is closing” makes them feel uniquely chosen and less likely to back out, as they don’t want to lose this special role.
- Commitment/Consistency: Getting the person to make incremental commitments that grow. In practice, handlers start with small asks which the recruit finds easy to agree to, then gradually escalate. Small steps entrap the spy in their own growing commitment.
- Liking: People say yes to those they like whom they find friendly, sympathetic, or similar to themselves. A case officer will often spend considerable effort building rapport, finding common interests, being a good listener, perhaps even socialising with the target. Such personal bonds make the agent loyal not just to an abstract cause, but to their friend and mentor.
- Social Proof: People are influenced when they think others like me are doing it too. While espionage is lonely, handlers can invoke the idea that the recruit is now part of an elite fraternity of brave agent, implying the target is joining a successful existing network rather than acting alone.
Want to know more about HUMINT? In our CTI-CRAFT course we cover in much more detail:
- The Recruitment Process ( Spot, Assess, Develop, Recruit, Handle)
- Surveillance detection methods
- Agent Handling Doctrine
- Safety, Security & Legalities
- Motivating and Managing the Human Element
- Validating Information and Counterintelligence
- The Art of Running Agents