70 likes | 88 Views
This presentation outlines the recruitment and assessment process of covert human intelligence sources, covering identification, research, character assessment, and documentation. It also includes details on meeting procedures, authorities needed, dissemination of intelligence, and participation guidelines.
E N D
Presentation in respect of Covert Human Intelligence Sources.
Recruitment and assessment. • Identification • Research • Assessment of information / Character of individual • Assessment of character and review of such
Documentation in respect of a source. • Detailing the recruitment process used • Terms and conditions given to the source prior to deployment. • Reviews • Authorisations of meetings with the source • Record of the contents of the meeting with the source.
Conducting meetings and tradecraft. Conducting Meetings Tradecraft.
Authorities and level of authority required. • Meeting authority controller • Authority to use the source • Registrar.
Dissemination of the intelligence. • Process of dissemination • Protection of the source.
Participation. • What is it • Authority required • How far can a source be used?