Documents
Confidential Human Source Assessing Aid
Jan. 31, 2017
FBI ANCHORAGE
CH5 PROGRAM
Spot and
filter
Turnover
I
Terminate
Handfe DEVEIOP
Recruit
treat-r7111: Date; 201.1
Last. 11.977.715.101: 01710112121311
.719 15117: 1? 1177.177112w7 10
.3311: 117.771 CH I manna 11.711117
..
..
.
1
-.J
A, a II
7717-? 11.71.17..- -. . 11151.1 .51 1370,1111? . '7 C-?g 112171.217-
3?
1797.51.11.71- 7 1.1.7-117-4 M) 301?11531435114177: :1771'9?79. 1?11 13131-1117711111
P77951111: 2912;411:211 :69. til-:21; {3 912511712 1"
.. 9.2 .?311 7"
.11 .7127:
Program Alds .
Derived From: FBI NSISCG
CH5 Recru?hng Ciassi?cd By: F44M44K65, 131
Series Rovnr?'
FET- 27.1.7
FBI ANCHORAGE
CH5 PROGRAM
Spot and
filter
Turnover
I
Terminate
Handfe DEVEIOP
Recruit
treat-r7111: Date; 201.1
Last. 11.977.715.101: 01710112121311
.719 15117: 1? 1177.177112w7 10
.3311: 117.771 CH I manna 11.711117
..
..
.
1
-.J
A, a II
7717-? 11.71.17..- -. . 11151.1 .51 1370,1111? . '7 C-?g 112171.217-
3?
1797.51.11.71- 7 1.1.7-117-4 M) 301?11531435114177: :1771'9?79. 1?11 13131-1117711111
P77951111: 2912;411:211 :69. til-:21; {3 912511712 1"
.. 9.2 .?311 7"
.11 .7127:
Program Alds .
Derived From: FBI NSISCG
CH5 Recru?hng Ciassi?cd By: F44M44K65, 131
Series Rovnr?'
FET- 27.1.7
semi?{marrow
(Ul Purpose of This Aid
it is a core responsibiizy of each Saetiamgent :0 develop and maintain a HUMIMT 3359
from which to collect vital information on invegiigstive and national inteillge-?ice priorities, inc uci ng
i dertifving, assessing toe suitability of, validating, and onerating Coo?den?el Human Sources Special
Agents of the operate Confidenlial Humar SOL r295 to meet the critical musics of intelligence
collection in order to to investigative program priorities and t3 natio'ial level and
inteiligenre collection reqijrew?ents, Additionally, the intelligence collected from these 0455 seaports
he eifo it; of partner agencies in law enforcement and intel igerce community members in order to
support setur?ft'f and law enlarc?ement cbj?ctiues.
(UHFOUO) In order to meet there goals, proactive measures must be undertaken to identify individuals
witl' the placement and access to the Weme?m reeded to advance FBI investigative and intelligence
efforts Th:s aid is purposed rowan: providng investigative and analytical personnel MW 3 tool to assist
in the of Con?dential Human Sources The aid fozuses primarilyr on the assessirg portion
of the CH5 recruiimam cycle.
(U) The CHS Recruitment Cycle
T19 recruitment process can to tinker: down irto in: events or stages. These comprise what is
Imown as the Rer-ru t'rent Cycle and they track 3 recruitment cpe'aticn from initiation to conclusior.
These events. can be corducied 13v 3 Special Agent. Often. however, recruitment is a "team? operation
wirl' several agents, grain-sis, and o?fioers participating.
*3
i
?0
@t
infillii lhe no Recwirwmtuie
semi?{marrow
(Ul Purpose of This Aid
it is a core responsibiizy of each Saetiamgent :0 develop and maintain a HUMIMT 3359
from which to collect vital information on invegiigstive and national inteillge-?ice priorities, inc uci ng
i dertifving, assessing toe suitability of, validating, and onerating Coo?den?el Human Sources Special
Agents of the operate Confidenlial Humar SOL r295 to meet the critical musics of intelligence
collection in order to to investigative program priorities and t3 natio'ial level and
inteiligenre collection reqijrew?ents, Additionally, the intelligence collected from these 0455 seaports
he eifo it; of partner agencies in law enforcement and intel igerce community members in order to
support setur?ft'f and law enlarc?ement cbj?ctiues.
(UHFOUO) In order to meet there goals, proactive measures must be undertaken to identify individuals
witl' the placement and access to the Weme?m reeded to advance FBI investigative and intelligence
efforts Th:s aid is purposed rowan: providng investigative and analytical personnel MW 3 tool to assist
in the of Con?dential Human Sources The aid fozuses primarilyr on the assessirg portion
of the CH5 recruiimam cycle.
(U) The CHS Recruitment Cycle
T19 recruitment process can to tinker: down irto in: events or stages. These comprise what is
Imown as the Rer-ru t'rent Cycle and they track 3 recruitment cpe'aticn from initiation to conclusior.
These events. can be corducied 13v 3 Special Agent. Often. however, recruitment is a "team? operation
wirl' several agents, grain-sis, and o?fioers participating.
*3
i
?0
@t
infillii lhe no Recwirwmtuie
ORN
(Slim) CH5 Recruitment Cycle - Definitions
Spotting? The pro-active and systematic search for individuals who can collect evidence or have
access to information that can ful?ll a collection requirement.
Filtering The active process of reviewing the access. suitability, susceptibility, accessibility, and
security issues associated with each potential CH 5 so that efforts can be focused on the most
appropriate individual.
Assessing The ongoing process of analyzing both ?spotted" and recruited Cl-lSs. The
is assessed to identify a means to induce him/her into becoming a recruited CH5 mainly
through identifying that person's motivations and vulnerabilities. Assessment continue;
throughout the recruitment cycle. Even after 3 CH5 is recruited, he/she will continue to be
assessed to determine how he/she is best handled and directed.
Developing refers to the process that leads to a recruitment of 3 CH8. To accomplish this, the
SA begins establishing and building a bond between the 5A and the pCl-iS. The SA must make
contact with the and purposefully build rapport. The SA must also take non-alerting,
natural actions to manipulate and in?uence the into a seemingly personal relationship
thereby creating a situation which is conducive to a successful recruitment. Successful CH5
development begins with the first contact (sometimes called ?The Bump").
Recruitment Refers to that point in time at which a target acknowledges to the SA, by word or
deed, that s/he agrees to provide the SA with information or services for which the target could
be criminally. socially or professionally sanctioned. The CH5 has more at stake in the clandestine
nature to his relationship with the SA than does the 5A. Once recruitment takes place, the EA
will transform his relationship with the CH5 from a personal one to a professional one between
the CH5 and the SA.
Pitch is an act whereby an SA focuses on the bene?ts to the for accepting a
clandestine/con?dential relationship, and then articulating those benefits to motivate the
to work for the SA.
Handling ?executing of the tradecraft that allows a SA to collect information or services from 3
CH5 without the knowledge of th employer, family, organization, agency, etc. As part of
source ha ndiing, the SA may train the CH5 in limited tradecraft techniques without revealing to
the CH5 tradecraft terminology.
Terminate Closing 3 CH5 with the intention of not operating that person any ionger.
Turnover Passing the CH5 to another Agent or Agency because hisfher usefulness for your
purposes has run out but the CH5 may help others.
ORN
ORN
(Slim) CH5 Recruitment Cycle - Definitions
Spotting? The pro-active and systematic search for individuals who can collect evidence or have
access to information that can ful?ll a collection requirement.
Filtering The active process of reviewing the access. suitability, susceptibility, accessibility, and
security issues associated with each potential CH 5 so that efforts can be focused on the most
appropriate individual.
Assessing The ongoing process of analyzing both ?spotted" and recruited Cl-lSs. The
is assessed to identify a means to induce him/her into becoming a recruited CH5 mainly
through identifying that person's motivations and vulnerabilities. Assessment continue;
throughout the recruitment cycle. Even after 3 CH5 is recruited, he/she will continue to be
assessed to determine how he/she is best handled and directed.
Developing refers to the process that leads to a recruitment of 3 CH8. To accomplish this, the
SA begins establishing and building a bond between the 5A and the pCl-iS. The SA must make
contact with the and purposefully build rapport. The SA must also take non-alerting,
natural actions to manipulate and in?uence the into a seemingly personal relationship
thereby creating a situation which is conducive to a successful recruitment. Successful CH5
development begins with the first contact (sometimes called ?The Bump").
Recruitment Refers to that point in time at which a target acknowledges to the SA, by word or
deed, that s/he agrees to provide the SA with information or services for which the target could
be criminally. socially or professionally sanctioned. The CH5 has more at stake in the clandestine
nature to his relationship with the SA than does the 5A. Once recruitment takes place, the EA
will transform his relationship with the CH5 from a personal one to a professional one between
the CH5 and the SA.
Pitch is an act whereby an SA focuses on the bene?ts to the for accepting a
clandestine/con?dential relationship, and then articulating those benefits to motivate the
to work for the SA.
Handling ?executing of the tradecraft that allows a SA to collect information or services from 3
CH5 without the knowledge of th employer, family, organization, agency, etc. As part of
source ha ndiing, the SA may train the CH5 in limited tradecraft techniques without revealing to
the CH5 tradecraft terminology.
Terminate Closing 3 CH5 with the intention of not operating that person any ionger.
Turnover Passing the CH5 to another Agent or Agency because hisfher usefulness for your
purposes has run out but the CH5 may help others.
ORN
(U) Assessing
(SUNF) Assessment is the process of analyzirg 3 "spotted' recruiiment?target. The analyzes, or
?assesses". the target to identify a mains to induce him into becoming a recrurteii CH Additionally,
ihe BL reau assesses the target to more fulv determm the iavail of the is rgei?s access to daired
infirm-nation or his ability to perform a desired service. Assessment continues throughout tie
recruitme nt cytle. Even alter target is recruited, the CH5 will writing: to be assessed to determine
how he is him handlod and directed.
(5/;ij During assessment, he agent will colect detailed baciigrounc the target to
insluda the target's family situation, piece of marl: am; position employment and finarv?ai hisiory, and
former resicemes. The Bureau will also attempt to evahiaie the target to determine the
iarget's motivations, mental stability and loyalties and will seek nformation on the target's habits,
hobbies, interests, vices, aspirations, emotional ties, and feelings concerning lies country, his career and
his employer. mportantiy. during assessment, the Bureau collects information not only concerning the
ia?get himsel?, but also the target?s company, employer and family.
cs/i'NF] The Far collects information concerns; a target from two general mtegories of sources The
first, am! most important, ?5 inlorrnation col ?eciec through observation and conversatim directly from
the target mself by me agent An agent assessing a target can so retimes show his two purpose by
appearing to have an inordinate interest in a target?s personal life.
(58m) A second caiegory of inlormation collectec ?interning a target is that information collected
from all warts other than the target. This second category ncludes information collected from otter
incl viduals who are either CHSs themsehia or unmt?lng contacts. Also rink-dad in 1H: category
islnforma?onfrompuhkmmai - .. -
directories. Other invest gatlve :emniques can also prmloe valuable information
(SU NF) When a potential CH8 is identified or approaches any USG of?cial and states higher desire to
help the USGJ efforts to determine h?sl'her hone fldes begin. 're three questions regarding bona fides
that must be addressed are: (1i 5 the CH5 who hefshe (lens to be? Does the CH5 have the excess
hie/she claims? is the SHS free from exte'nal control? initial are sometimes conducted under
severe time constraints. ant: often before the HS has provided any spec fir: information.
Compon is
(SHHF) The assessment DIOCESS is the mechanism by which the Special Agent continually evaluates
several aspects of the CH5. As covered in the Spotting ard Filtering Program Aid (link here), the aspects
of me PCHS or CHS that must he assessed area: access, suitability, sasrepzibllity, accessiblity, and
security. This is also the oroper time to assess the authentic?)! of the
- Whezr a potential CH3 is identified or aoproaclres any use official and states
hisfher desire to help the USE, efforts to determine hisjher bona ?des begin. The three qwsiions
regarding bona ?nds that must be addressed are: is the CH5 who nejsha claims in be? Does
3 EC RETHNOFC Rh.
(U) Assessing
(SUNF) Assessment is the process of analyzirg 3 "spotted' recruiiment?target. The analyzes, or
?assesses". the target to identify a mains to induce him into becoming a recrurteii CH Additionally,
ihe BL reau assesses the target to more fulv determm the iavail of the is rgei?s access to daired
infirm-nation or his ability to perform a desired service. Assessment continues throughout tie
recruitme nt cytle. Even alter target is recruited, the CH5 will writing: to be assessed to determine
how he is him handlod and directed.
(5/;ij During assessment, he agent will colect detailed baciigrounc the target to
insluda the target's family situation, piece of marl: am; position employment and finarv?ai hisiory, and
former resicemes. The Bureau will also attempt to evahiaie the target to determine the
iarget's motivations, mental stability and loyalties and will seek nformation on the target's habits,
hobbies, interests, vices, aspirations, emotional ties, and feelings concerning lies country, his career and
his employer. mportantiy. during assessment, the Bureau collects information not only concerning the
ia?get himsel?, but also the target?s company, employer and family.
cs/i'NF] The Far collects information concerns; a target from two general mtegories of sources The
first, am! most important, ?5 inlorrnation col ?eciec through observation and conversatim directly from
the target mself by me agent An agent assessing a target can so retimes show his two purpose by
appearing to have an inordinate interest in a target?s personal life.
(58m) A second caiegory of inlormation collectec ?interning a target is that information collected
from all warts other than the target. This second category ncludes information collected from otter
incl viduals who are either CHSs themsehia or unmt?lng contacts. Also rink-dad in 1H: category
islnforma?onfrompuhkmmai - .. -
directories. Other invest gatlve :emniques can also prmloe valuable information
(SU NF) When a potential CH8 is identified or approaches any USG of?cial and states higher desire to
help the USGJ efforts to determine h?sl'her hone fldes begin. 're three questions regarding bona fides
that must be addressed are: (1i 5 the CH5 who hefshe (lens to be? Does the CH5 have the excess
hie/she claims? is the SHS free from exte'nal control? initial are sometimes conducted under
severe time constraints. ant: often before the HS has provided any spec fir: information.
Compon is
(SHHF) The assessment DIOCESS is the mechanism by which the Special Agent continually evaluates
several aspects of the CH5. As covered in the Spotting ard Filtering Program Aid (link here), the aspects
of me PCHS or CHS that must he assessed area: access, suitability, sasrepzibllity, accessiblity, and
security. This is also the oroper time to assess the authentic?)! of the
- Whezr a potential CH3 is identified or aoproaclres any use official and states
hisfher desire to help the USE, efforts to determine hisjher bona ?des begin. The three qwsiions
regarding bona ?nds that must be addressed are: is the CH5 who nejsha claims in be? Does
3 EC RETHNOFC Rh.
the CH5 have the access lie/sire claims? is the CH5 free from external control? initial efforts are
metimes conducted under aware time constraints and often before the CH5 has provide: any
specific infarmatia n.
ACCESS - it is of critical import that you verify the access your CHS has to the infarrnation you need.
or the Revs you need access to. This applies equally to and existing Dias. With respect to a
QCHS, your spotting and hits-mg pracess was bases: on nformaticn net obtained from the immune!
under consideration. During that process yoc made a determination that the new under
consideration had access to your mic-matbr?item of need. New is the time to confirm that access
with the PC H5 himlharself.
With respect an existing CH5, you must contznuaily reassess their access. CHS operations history
is rife wt?r exa males of CHSs whose access had waned/or been eliminated yet aon?nLed to be
operated
surmisiuw . Emadly speaking, suitability regards the character, rteiligence, anc competence: of
the pCi-iS; asking ?dues the indivrdual have the attributes to perform as a i: is
irportant to evaluate whether there are vu neratitties present that might create reliability issues
or invite potential hostile exploitatian? Such con?de-sums may bleed fit!) the ?Security criterion,
below.
- The likeli'iood that the ndividuai wil accent recruitment as a against
targeted iriformat on Evaluating requires an analysis of possibie nw?yatims, biases,
ife experlences, and other factors relevant to the of the int! viduai to become 3 CH5.
. Ability of the F8: to gain access to the individual for the purpose of assessment, and
for development to potential recruitment;
SECLIIHY - Assessment of Doerational sewrity and cosmerinteiligence risks. an the event that the
iridivictral rejects contact with F81. or proves not susceptib to restatment. it is impartant to
assess whether the inrfividuais? are to our adversary. What lit-1e individuai becomes aware
of FBI interest and objectives, but the entividual?s loyaities prove to be to our adversary?
Categories of information to assess. as previously mentioned, incl-1dr! Character 8 Personality,
Family, Education, Career, ?tt?udes, Belie?s. and Aspirations. Below are areas farm which to collect
infonTiation remaining to each cf these categories:
Character and Personality:
Hobbies Religion
Mcralsi'vaiues System Vices
hiealth/Emct?ional State Temperament
Risk Tater Reilabilitv
SECRETIMOFOQ h.
the CH5 have the access lie/sire claims? is the CH5 free from external control? initial efforts are
metimes conducted under aware time constraints and often before the CH5 has provide: any
specific infarmatia n.
ACCESS - it is of critical import that you verify the access your CHS has to the infarrnation you need.
or the Revs you need access to. This applies equally to and existing Dias. With respect to a
QCHS, your spotting and hits-mg pracess was bases: on nformaticn net obtained from the immune!
under consideration. During that process yoc made a determination that the new under
consideration had access to your mic-matbr?item of need. New is the time to confirm that access
with the PC H5 himlharself.
With respect an existing CH5, you must contznuaily reassess their access. CHS operations history
is rife wt?r exa males of CHSs whose access had waned/or been eliminated yet aon?nLed to be
operated
surmisiuw . Emadly speaking, suitability regards the character, rteiligence, anc competence: of
the pCi-iS; asking ?dues the indivrdual have the attributes to perform as a i: is
irportant to evaluate whether there are vu neratitties present that might create reliability issues
or invite potential hostile exploitatian? Such con?de-sums may bleed fit!) the ?Security criterion,
below.
- The likeli'iood that the ndividuai wil accent recruitment as a against
targeted iriformat on Evaluating requires an analysis of possibie nw?yatims, biases,
ife experlences, and other factors relevant to the of the int! viduai to become 3 CH5.
. Ability of the F8: to gain access to the individual for the purpose of assessment, and
for development to potential recruitment;
SECLIIHY - Assessment of Doerational sewrity and cosmerinteiligence risks. an the event that the
iridivictral rejects contact with F81. or proves not susceptib to restatment. it is impartant to
assess whether the inrfividuais? are to our adversary. What lit-1e individuai becomes aware
of FBI interest and objectives, but the entividual?s loyaities prove to be to our adversary?
Categories of information to assess. as previously mentioned, incl-1dr! Character 8 Personality,
Family, Education, Career, ?tt?udes, Belie?s. and Aspirations. Below are areas farm which to collect
infonTiation remaining to each cf these categories:
Character and Personality:
Hobbies Religion
Mcralsi'vaiues System Vices
hiealth/Emct?ional State Temperament
Risk Tater Reilabilitv
SECRETIMOFOQ h.
Self Esteem
De meanor
Likeable
Social Pressure
Passive/Aggressive
lifestyle
Cultural Differences
Non-Verbal Communication Cues
Family:
Marital Status
Fidelity
Extended Family
00 mestlc Issues
Family igations:
Education Needs
Education:
Level
Languages
Professional Organizations
Military Service/1' raining
Career:
Position
Career Progression
Job Satisfaction
Mentors is Colleagues
Attitudes, Belieis, and MpifatiOl?iS:
Religious Wews
Financial Goals
Communications Style
Physical Appearance
Sensitivities
Food, Smoke, Drink
Sly/Cunning
Persons Admired
Language
Family in?uence
Family Approval
Relatlves
Children
Elderly Care
Specialized Training
Clubs
Trade Schools
Goals
Travel
Stress
Reputatlon
Dolliiral Views
Bias/Prejudice
Conformity
Understanding the Motivations of your PCHS or CBS is of great import as well. Be it money,
greed, patriotism, your understanding of an individual's motivations will provide you with the words or
Self Esteem
De meanor
Likeable
Social Pressure
Passive/Aggressive
lifestyle
Cultural Differences
Non-Verbal Communication Cues
Family:
Marital Status
Fidelity
Extended Family
00 mestlc Issues
Family igations:
Education Needs
Education:
Level
Languages
Professional Organizations
Military Service/1' raining
Career:
Position
Career Progression
Job Satisfaction
Mentors is Colleagues
Attitudes, Belieis, and MpifatiOl?iS:
Religious Wews
Financial Goals
Communications Style
Physical Appearance
Sensitivities
Food, Smoke, Drink
Sly/Cunning
Persons Admired
Language
Family in?uence
Family Approval
Relatlves
Children
Elderly Care
Specialized Training
Clubs
Trade Schools
Goals
Travel
Stress
Reputatlon
Dolliiral Views
Bias/Prejudice
Conformity
Understanding the Motivations of your PCHS or CBS is of great import as well. Be it money,
greed, patriotism, your understanding of an individual's motivations will provide you with the words or
SECRET fl NOFORN
actions you need to inspire an individual to do something that they may not otherwise do. Motivation is
something that must be addressed Frequently with your CH5. As put by Zlglar, OFTEN BAY
?1 MUIIVATION l" LAST. WELL, NEITHER DOES BATHING - WHY WE RECOMMEND Ii
Below is a list of some common motivations:
patriotism/Ideology vesire in use Heard
Greed/Envy Increase Sacral Status
Adventure/Adrenalin Opportunity
Education Family Well Being
Desire To Contribute Desire For A Change
Something to Prove Recognition
Needs/Wants Money
Revenge
Be cognizant of the fact that not all motivations are necessarily noble or good, and that
there may be strong cultural in?uences involved as well.
Understanding your PCHS or vulnerabilities is aiso of value. Simply put, a vulnerability is a
perceived weakness, which is prone to criticism or attack if exposed. Boiow is a list of common
vulnerabilities:
Money lssuea in?delity
Sub~ Par Abilities/Poor Performer Estrangement
Ostracism Boredom/Lonely
Depression/Panic fear
Social Status/Lack Of Prejudices
Addictions Sociai Deviances
rear Of Discovery {all of above)
While some may state that a vulnerability is something that can be exploited to motivate a CH5
to cooperate, it is generally much more productive to work from a motivations. Exploiting a
vulnerability may be an easy win for the sou rce handler, but as the CH5 is inherently the loser in this
equation, it sets the stage fo future failures. in this type of relationship, there will be a constant battle
for operational control of the CH5. Exploiting a motivation, by contrast, buiids a collaborative
relatinnqhip with your (HS. Operationai control, by extenqinn, is rarely an inane.
Operational Behavioral Assessment of CHSS:
Of the thousands of FBI criminal, counterintelligence and counterterrorlsm CHSs, a large
number are being used in cases of significant nation ai importance which entail substantial personal risk.
To maximize the success of hese CHSs, ensure their safety and minimize the potential for danger or
SECRET fl NOFORN
actions you need to inspire an individual to do something that they may not otherwise do. Motivation is
something that must be addressed Frequently with your CH5. As put by Zlglar, OFTEN BAY
?1 MUIIVATION l" LAST. WELL, NEITHER DOES BATHING - WHY WE RECOMMEND Ii
Below is a list of some common motivations:
patriotism/Ideology vesire in use Heard
Greed/Envy Increase Sacral Status
Adventure/Adrenalin Opportunity
Education Family Well Being
Desire To Contribute Desire For A Change
Something to Prove Recognition
Needs/Wants Money
Revenge
Be cognizant of the fact that not all motivations are necessarily noble or good, and that
there may be strong cultural in?uences involved as well.
Understanding your PCHS or vulnerabilities is aiso of value. Simply put, a vulnerability is a
perceived weakness, which is prone to criticism or attack if exposed. Boiow is a list of common
vulnerabilities:
Money lssuea in?delity
Sub~ Par Abilities/Poor Performer Estrangement
Ostracism Boredom/Lonely
Depression/Panic fear
Social Status/Lack Of Prejudices
Addictions Sociai Deviances
rear Of Discovery {all of above)
While some may state that a vulnerability is something that can be exploited to motivate a CH5
to cooperate, it is generally much more productive to work from a motivations. Exploiting a
vulnerability may be an easy win for the sou rce handler, but as the CH5 is inherently the loser in this
equation, it sets the stage fo future failures. in this type of relationship, there will be a constant battle
for operational control of the CH5. Exploiting a motivation, by contrast, buiids a collaborative
relatinnqhip with your (HS. Operationai control, by extenqinn, is rarely an inane.
Operational Behavioral Assessment of CHSS:
Of the thousands of FBI criminal, counterintelligence and counterterrorlsm CHSs, a large
number are being used in cases of significant nation ai importance which entail substantial personal risk.
To maximize the success of hese CHSs, ensure their safety and minimize the potential for danger or
other complications. it is imperative that we develop a comprehensive understanding of their
backgrounds. capabilities and vulneramities. We must make certair that the Operalions in which trey
are being user: are cowsistent with their abilities, temperament and lifestyle. One ol the Desi ways to
begin to unrlersta nd 3 CH5 is to conduct an operational behavioral assessmenr.
operationai behavioral assessment is a funnel process oesgied to a CH 5'5 core
perso The process involves examining a integrity, belef syste '71. thorax: and decolon-
makmg processes arr:f level of social/emotional mamrity. emphasis is placed on gaigirg
hrs/her am ty to handle stress and adapt to change. Krowledge of these lutores can greatly assist
ha ng ageats in successfully directing and ma wing their 0455.
Context is important. A good operations! belimnloral assessment must take into account the
unique relati :mship between the CHS and the handling agent. Expenerce has shown that this dynamic is
critical to ?ssion success. Often, oommuni-za?or- betweeothe two is slmoly a matter of spending time
together and leamirg to adaot to each other: personality. Howevey t'ouble can arise when there is
ether a clash of personalities or wwen there is poor communication some hstances, a may
exhibit compelling bewavioral problems that require attention and management.
Operational behavioral assessmems may be used either'in lieu of condoning an operatbnal
test or as a means to assist in the deve?opmem of AVE 1 operational testing scenarios.
Prose-min operational bewax'ioral assessments are being concucted by er?perienced
Behavioral and Spes'aiists win have an averqe of 20* years of practical law onlorcementi
inteligence andr?or beravoralfmenlal health exporience.
(Uri/?5) The CHS operational behavioral assessment prooeu is labor-intensive and takes approormately
five days to complete. After :oordinatioo with VOTE. 9 handling agent will submit an EC request to
hisfher Squad Supervisor and program ASA: for approval to initiate the worms. Once approved and
scheduled by VOTU, theCHS Operational Behavioral Assessmert begins with a comprehensive review of
relevant be: kgrou rid mater al the CH5 ?les, and case ?les by
and operational specialist followed by an oil-Site Sit. Substantial time is devoted to debriefing case
agents and Cir-l5 ha'idlers prior to the CH3 interview.
The CH5 interview is usually zonouctec- in a location away from the ?eld office. The requesting
Fielc 0* :2 Is responsible for costs of he CH5 meeting room. The environment and setting for this
interview is critical and should be coordinated with VDTU Operational Behavioral Assessment staff or
PM i there are any questions. Field oFFlces are authorized and encourage: to use CH5 funds for this
expense. Depending on the indlrimal ?lls, a test may be administered. After the interview
is completed and toe behavioral assessment team has had time to compare their obsen?atbns and
impressions, they mil meet with field office personnel and provide a debrie?ng. This will be followed by
a formal; W'lItEl'i report.
5
other complications. it is imperative that we develop a comprehensive understanding of their
backgrounds. capabilities and vulneramities. We must make certair that the Operalions in which trey
are being user: are cowsistent with their abilities, temperament and lifestyle. One ol the Desi ways to
begin to unrlersta nd 3 CH5 is to conduct an operational behavioral assessmenr.
operationai behavioral assessment is a funnel process oesgied to a CH 5'5 core
perso The process involves examining a integrity, belef syste '71. thorax: and decolon-
makmg processes arr:f level of social/emotional mamrity. emphasis is placed on gaigirg
hrs/her am ty to handle stress and adapt to change. Krowledge of these lutores can greatly assist
ha ng ageats in successfully directing and ma wing their 0455.
Context is important. A good operations! belimnloral assessment must take into account the
unique relati :mship between the CHS and the handling agent. Expenerce has shown that this dynamic is
critical to ?ssion success. Often, oommuni-za?or- betweeothe two is slmoly a matter of spending time
together and leamirg to adaot to each other: personality. Howevey t'ouble can arise when there is
ether a clash of personalities or wwen there is poor communication some hstances, a may
exhibit compelling bewavioral problems that require attention and management.
Operational behavioral assessmems may be used either'in lieu of condoning an operatbnal
test or as a means to assist in the deve?opmem of AVE 1 operational testing scenarios.
Prose-min operational bewax'ioral assessments are being concucted by er?perienced
Behavioral and Spes'aiists win have an averqe of 20* years of practical law onlorcementi
inteligence andr?or beravoralfmenlal health exporience.
(Uri/?5) The CHS operational behavioral assessment prooeu is labor-intensive and takes approormately
five days to complete. After :oordinatioo with VOTE. 9 handling agent will submit an EC request to
hisfher Squad Supervisor and program ASA: for approval to initiate the worms. Once approved and
scheduled by VOTU, theCHS Operational Behavioral Assessmert begins with a comprehensive review of
relevant be: kgrou rid mater al the CH5 ?les, and case ?les by
and operational specialist followed by an oil-Site Sit. Substantial time is devoted to debriefing case
agents and Cir-l5 ha'idlers prior to the CH3 interview.
The CH5 interview is usually zonouctec- in a location away from the ?eld office. The requesting
Fielc 0* :2 Is responsible for costs of he CH5 meeting room. The environment and setting for this
interview is critical and should be coordinated with VDTU Operational Behavioral Assessment staff or
PM i there are any questions. Field oFFlces are authorized and encourage: to use CH5 funds for this
expense. Depending on the indlrimal ?lls, a test may be administered. After the interview
is completed and toe behavioral assessment team has had time to compare their obsen?atbns and
impressions, they mil meet with field office personnel and provide a debrie?ng. This will be followed by
a formal; W'lItEl'i report.
5
Elicitation '78:}er it; ucs
NF A5 provided earlier, it is important that this information be collected from the CH5 or PICHS in as
nature! a fashion as possible. An agent assessing a target can sometimes show his true purpose by
appearing to have an inordinate interest in a target?s personal life. Elicitation is the art of using naturally
aggearing conversation to advance rapport and obtain Information that you wish to learn from another.
Elicitation is a focused and planned activity. Similar to many martial arts practices, it is used with
flexibility and real-time assessment. it allows the practitioner to use or not use whatever is presented
by the other indiuidual. It exploits opportunity- At the same time, It is manipulative and proactive. it is
not a separate and isolated skill, but is integral to a process that mixes in the right amount of
pnthuqiaam, empathy, friendlinezs, attention, wrinimnom, and often humor. it adjuqh; for
cultural and individual hiawq and cnnqidpratinnq and include; verbal and nonverbal rommunirai?inn.
Below are caveral elicitation techniques for me in fhl?i prams?:
Give to Get
You provide some information to someone with the hope that this will encourage them to
provide you with similar information about them. For example. you tell someone about
foreign ?iravel that you made with the hope that they will tell you about foreign travel they
made. Or you talk about your service to encourage them to reveal whether or not
they served in the mititary.
Me Some - You Same
When you learn abuul am 'miuwsi (upirriunfsiluuliun. uric.) than! your large! has. you [all
them that you share that interest with them In some canoe where you know little about
the activity or topic. you at least are interested in learning or trying it. Example: didn
realize that you?re a trout ?sherman. Hove [mat ?shing.
Flatt: ryIP raise
You use flattery or praise with the target. A lime praise goes a long way Flailary and
praise usually has the effect of making your interlocuior feel good. it can also have the
effect of encouraging them to tell you more. Take care not to over use this technique
because doing so can make you appear disingenuous and have a negative effect on the
elicitation and developmental process. really enjoyed your presentation and was
impressed by how you took such a complex issue and made it understandable.?:
'You have such a pleasant voice on the telephone.?
Assumption
You make a comment that contains an assumption and which is designed to evoke a
response from the oiher person that would likely con?rm or refute your assumpiion.
?How does your husband feel about all of the traveling that you do?? The
assumption being ii: at the person is married.
Elicitation '78:}er it; ucs
NF A5 provided earlier, it is important that this information be collected from the CH5 or PICHS in as
nature! a fashion as possible. An agent assessing a target can sometimes show his true purpose by
appearing to have an inordinate interest in a target?s personal life. Elicitation is the art of using naturally
aggearing conversation to advance rapport and obtain Information that you wish to learn from another.
Elicitation is a focused and planned activity. Similar to many martial arts practices, it is used with
flexibility and real-time assessment. it allows the practitioner to use or not use whatever is presented
by the other indiuidual. It exploits opportunity- At the same time, It is manipulative and proactive. it is
not a separate and isolated skill, but is integral to a process that mixes in the right amount of
pnthuqiaam, empathy, friendlinezs, attention, wrinimnom, and often humor. it adjuqh; for
cultural and individual hiawq and cnnqidpratinnq and include; verbal and nonverbal rommunirai?inn.
Below are caveral elicitation techniques for me in fhl?i prams?:
Give to Get
You provide some information to someone with the hope that this will encourage them to
provide you with similar information about them. For example. you tell someone about
foreign ?iravel that you made with the hope that they will tell you about foreign travel they
made. Or you talk about your service to encourage them to reveal whether or not
they served in the mititary.
Me Some - You Same
When you learn abuul am 'miuwsi (upirriunfsiluuliun. uric.) than! your large! has. you [all
them that you share that interest with them In some canoe where you know little about
the activity or topic. you at least are interested in learning or trying it. Example: didn
realize that you?re a trout ?sherman. Hove [mat ?shing.
Flatt: ryIP raise
You use flattery or praise with the target. A lime praise goes a long way Flailary and
praise usually has the effect of making your interlocuior feel good. it can also have the
effect of encouraging them to tell you more. Take care not to over use this technique
because doing so can make you appear disingenuous and have a negative effect on the
elicitation and developmental process. really enjoyed your presentation and was
impressed by how you took such a complex issue and made it understandable.?:
'You have such a pleasant voice on the telephone.?
Assumption
You make a comment that contains an assumption and which is designed to evoke a
response from the oiher person that would likely con?rm or refute your assumpiion.
?How does your husband feel about all of the traveling that you do?? The
assumption being ii: at the person is married.
SECREUJNOFOPN
Attribution
Yau make a siaiemenl which you attribute to anomex source. The bene?t is that ii gets a
topic or ihe table and provides you a small degree of separation from the statement
read in the newspaper {?ll in the blank). ?i heard on the radio
Someone from Iran told me 'One of my university mfessors i
heard that the Government of Zimbabwe has become unstable and is on the verge
of coiiapse.
Deception
You deiberale mislead or rrisiniorm the 'ndivicuai in an effort to either advance rappmt
with them, cr obtain iniomatioa lram them. ?i also holidayed in the French Riviera
and would like to go back time soon. '7 met Donald Trump at 3 Chem dinner
aadhe said aroma interesting allemale usage; ?Sorry to disturb you, but
was sitting here awhile ago and be?eva I may have left my sungiassas behind.?
Invocation
Yau make a ent or statement than is designed to provoke a spc-ntaneous response
or rebuttal 1mm yourinl??ocmorwhc can not let you: comment gr: unchallenged. Thus
they will tell ym 'l?ve noticed that mos! people from your country have
difficulty gnawing the nuances ?American culture. 'i think soccer is a great
for people who want 10 phya sport, but don 't have much a?e?cism.?
Disagreemem
DU disagree with yaur intericculcr with the goal of causing dim/her to finite explain
their positian, or to slimulale iurthex diacussion?bmtar. One must be careful. howevet,
not to annoy the ether person. 'You made a good point, bull dontbelieve that the
program will its objectives.?
Incmdulhy
Yau express disbelief with the indvi?ual?s commenls with the goal of emaumwg them
to tell you more to pmve their {mint 'Somelhing doesn't quite addup hem. [?nd it
hard to believe that me outcome was as you said.?
Fragme ntarv
?fan make a fragmentary comm er! or nulli?ed an i?fnrmauon gap with the hope lhal you
:nterloculm will template the thou-gm ?ll in the gap. "Obviously things didn't go
according to plan. And theraasnn for this was
Con?dence
Tel?mg someone something in confidence enccurages them to likewise lake you inta their
:on?dence. There are varying degrees of confidence: Some are appropriate for
someone you 60:11 know well, all-tars ate nail. The}. can be humorous or serious.
SECRET
SECREUJNOFOPN
Attribution
Yau make a siaiemenl which you attribute to anomex source. The bene?t is that ii gets a
topic or ihe table and provides you a small degree of separation from the statement
read in the newspaper {?ll in the blank). ?i heard on the radio
Someone from Iran told me 'One of my university mfessors i
heard that the Government of Zimbabwe has become unstable and is on the verge
of coiiapse.
Deception
You deiberale mislead or rrisiniorm the 'ndivicuai in an effort to either advance rappmt
with them, cr obtain iniomatioa lram them. ?i also holidayed in the French Riviera
and would like to go back time soon. '7 met Donald Trump at 3 Chem dinner
aadhe said aroma interesting allemale usage; ?Sorry to disturb you, but
was sitting here awhile ago and be?eva I may have left my sungiassas behind.?
Invocation
Yau make a ent or statement than is designed to provoke a spc-ntaneous response
or rebuttal 1mm yourinl??ocmorwhc can not let you: comment gr: unchallenged. Thus
they will tell ym 'l?ve noticed that mos! people from your country have
difficulty gnawing the nuances ?American culture. 'i think soccer is a great
for people who want 10 phya sport, but don 't have much a?e?cism.?
Disagreemem
DU disagree with yaur intericculcr with the goal of causing dim/her to finite explain
their positian, or to slimulale iurthex diacussion?bmtar. One must be careful. howevet,
not to annoy the ether person. 'You made a good point, bull dontbelieve that the
program will its objectives.?
Incmdulhy
Yau express disbelief with the indvi?ual?s commenls with the goal of emaumwg them
to tell you more to pmve their {mint 'Somelhing doesn't quite addup hem. [?nd it
hard to believe that me outcome was as you said.?
Fragme ntarv
?fan make a fragmentary comm er! or nulli?ed an i?fnrmauon gap with the hope lhal you
:nterloculm will template the thou-gm ?ll in the gap. "Obviously things didn't go
according to plan. And theraasnn for this was
Con?dence
Tel?mg someone something in confidence enccurages them to likewise lake you inta their
:on?dence. There are varying degrees of confidence: Some are appropriate for
someone you 60:11 know well, all-tars ate nail. The}. can be humorous or serious.
SECRET
(During a break at a training course to another attendee): "The infoma?on is but
I'm not sure we need to be here for three days. (To someone you fusi met at a social
setting): 'Just between us, I'm a lime uncomfortable. This isn't the sort of even! that!
usually go to.?
(U) Authorized Purposes
(U I FOUO) As the Assessment process appiies to both potential and estabiished CHSS, one of two
authorized purposes must exist. With respect to a Type 5 Assessment must be open, for existing
CHSs, the assessment process occurs from within that 0455 file.
(During a break at a training course to another attendee): "The infoma?on is but
I'm not sure we need to be here for three days. (To someone you fusi met at a social
setting): 'Just between us, I'm a lime uncomfortable. This isn't the sort of even! that!
usually go to.?
(U) Authorized Purposes
(U I FOUO) As the Assessment process appiies to both potential and estabiished CHSS, one of two
authorized purposes must exist. With respect to a Type 5 Assessment must be open, for existing
CHSs, the assessment process occurs from within that 0455 file.