AFIO Weekly Intelligence Notes #10-07 dated 12 March 2007

Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers. WINs are edited by Ernest Hampson, Ph.D., with input from AFIO members and staff.
The WINs is sent to all AFIO members on an Opt-In basis. IF YOU DO NOT WISH TO RECEIVE THESE NOTICES....SEE THE EASY ONE-CLICK REMOVAL INSTRUCTIONS AT Bottom
CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at afio@afio.com. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm


EDITOR'S NOTES: Questions or suggested items can be directed to WINsEditor@afio.com - Ernie Hampson


SECTION I - CURRENT INTELLIGENCE

U.S. SAILOR ARRESTED ON TERRORISM AND ESPIONAGE CHARGES
DEFECTING IRANIAN GENERAL IS COOPERATING WITH WESTERN INTELLIGENCE
JUSTICE DEPARTMENT INSPECTOR GENERAL FINDS FBI ABUSE IN ISSUING NATIONAL SECURITY LETTER SUBPOENAS UNDER PATRIOT ACT
UPDATE ON SHOOTING OF MEMBER PAUL JOYAL
ANONYMOUS SENATOR CONTINUES TO STALL INTELLIGENCE BILL FOR THIRD YEAR
SECTION II - CONTEXT AND PRECEDENCE
CHINA INCREASING DEFENSE SPENDING BY OVER 17 PERCENT IN 2007
SECTION III - CYBER INTELLIGENCE
PENTAGON'S BANNED TOTAL INFORMATION AWARENESS SYSTEM MAY BE REVIVED BY DHS
FORMER DIRECTOR OF NSA DOUBTS EXISTENCE OF PHONE CALL DATABASE
CIA POSTS NOTICE OF WEBSITE PROBLEMS AND FAKE E-MAILS
KGB MAPS OF THE UNITED KINGDOM PUBLICLY AVAILABLE FOR THE FIRST TIME
SECTION IV - BOOKS, SOURCES AND ISSUES
Books
Power, Faith, and Fantasy: America in the Middle East: 1776 to the Present by Michael B. Oren, W.W. Norton
SECTION V - CAREERS, NOTES, LETTERS, QUERIES AND AUTHORS SEEKING ASSISTANCE, CORRECTIONS, OBITUARIES, COMING EVENTS

Careers
Wal-Mart Stores, Inc. is seeking qualified Global Threat Analysts.
Notes
JOHNATHAN EVANS ANNOUNCED TO TAKE LEAD AT MI-5 UPON DAME ELIZA'S RETIREMENT
Assistance Needed
International Spy Museum Seeks Intelligence Officers Involved in Cold War Covert Action in Italy
           OUTSOURCING - BUSINESS AND NATIONAL SECURITY - WHAT HAS BEEN IMPACT?
Coming Events
 
Newly added to calendar:
19 March 2007 - Washington, DC - National Security and Law Society's 3rd Annual Symposium on Emerging Issues in National and International Security (EMININT 2007)
24-26 April 2007 - Arlington, VA -Terrorism Intelligence Collection and Countermeasure Seminar/Workshop 
 
Current Calendar Next Two Months ONLY:
13 March 2007 6:30 pm - Washington, DC - The Secret History of History - Early Espionage: The Great and Ancient Game with Professor Rose Mary Sheldon - at the International Spy Museum
15 March 2007 - Colorado Springs, CO - AFIO Rocky Mountain Chapter holds luncheon meeting at the Falcon Room, Air Force Academy Officers Club
15 March 2007 - the National Cryptologic Museum Foundation conference on "FISA: It's History and the Law."
15 - 16 March 2007 - Washington, DC - L'Enfant Plaza Hotel - Department of Homeland Security’s Science and Technology (S&T) First Annual University Network Summit on Research and Education
17 March 2007 - Orange Park, FL - The March luncheon meeting of the North Florida Chapter, AFIO
17 March 07 - Kennebunk, ME. AFIO Maine Chapter meeting features speaker Dr. Christopher T. Yeaw
19 March 2007 - Washington, DC - National Security and Law Society's 3rd Annual Symposium on Emerging Issues in National and International Security (EMININT 2007)
27 March 2007 - Scottsdale, AZ - The Arizona AFIO Chapter holds luncheon meeting featuring FBI Counterintelligence Agent.
27-28 March 2007 - Fair Lakes, VA- National Military Intelligence Association Seminar on Information Operations
27-29 March 2007 - Provo, Utah - Brigham Young University hosts Spying in Film and Fiction Conference
28-29 March 2007 - Washington, DC - DEFENSE TRANSFORMATION AND NETWORK-CENTRIC OPERATIONS Conference at NDU
30 March 2007 - Alexandria, VA - The Centre for Counterintelligence and Security Studies (CI Centre)™ -"The Origins of FBI Counterintelligence" By retired FBI Supervisory Special Agent Raymond J. Batvinis
Thursday, 5 April 2007 - Alexandria, VA - The CiCentre hosts Ray Semko's "D*I*C*E 2007: Unleashed"
6 April 2007 - Houston, TX - AFIO Houston Chapter event speaker confirmed
10 April 2007 - Tampa, FL- AFIO Suncoast Chapter Luncheon- Speaker is Porter Goss, former Director of the CIA
20 - 21 April 2007 - New London, CT - AFIO New England Chapter hosts luncheon featuring Dr. Michael Hiam
20-22 April 2007 -Weimar, Germany- 13th Annual Meeting of the International Intelligence History Association
23-27 April 2007 - Vancouver, British Columbia - International Association of Law Enforcement Intelligence Analysts (IALEIA)/Law Enforcement Intelligence Unit (LEIU) 2007 Annual Conference
24-26 April 2007 - Arlington, VA -Terrorism Intelligence Collection and Countermeasure Seminar/Workshop
 
For Additional Events two+ months or more....view our online Calendar of Events

SECTION I - CURRENT INTELLIGENCE

U.S. SAILOR ARRESTED ON TERRORISM AND ESPIONAGE CHARGES Former U.S. Navy sailor Paul R. Hall, 31, who changed his name to Hassan Abujihaad after converting to Islam, was arrested last Wednesday in Phoenix on charges of aiding a terrorist organization and supplying the organization with classified information. The federal case says that Abujihaad supplied London-based Azzam Publications, Inc. with classified information about the deployment of a U.S. Navy battle group from California to the Persian Gulf in 2001. Two members of the Azzam group, Babar Ahmad and Syed Talha Ahsan, are wanted in the U.S. on terrorism charges. The group maintained a website that facilitated and encouraged the contribution of funds and material to support terrorist operations. Abujihaad was charged in Connecticut as the Azzam group's websites were hosted on Internet servers in Connecticut at one time. Ahmad and Ahsan are in British custody fighting extradition to the U.S. Abujihaad was linked to the group when British police found a computer disk in Ahmad's residence with a password-protected document that contained classified U.S. Navy information. The document described the deployment plans of the U.S. battle group and indicated vulnerabilities that could be exploited by terrorists. Forensic examination of the document indicated that Ahsan had accessed, modified and saved the document before or while it was in Ahmad's possession. The information in the document was traced back to Abujihaad, who served on the U.S.S. Benfold, a ship in the battle group whose movements were described in the document. A search warrant that allowed investigators to access email accounts from the Azzam websites divulged a record of communications between Abujihaad and members of Azzam Publications in 2000 and 2001. The emails revealed the Abujihaad distained America, praised Osama bin Laden and his attack on the U.S.S. Cole, and showed that Abujihaad had purchased pro-jihad videos and donated money to Azzam. Also in the emails was an exchange in which Azzam wanted to know if it were safe to send materials to Abujihaad while he was aboard the Benfold. Abujihaad was released from the Navy in January 2002, before any of this activity was known to authorities. The government also alleges that after Ahmad's arrest in 2004, Abujihaad destroyed Azzam videos in his possession and deleted computer files. In December 2006, Abujihaad was recorded as he tried to purchase two assault rifles. During the purchase he admitted to destroying the videos and sending the information regarding the U.S.S. Cole. Abujihaad faces up to 25 years in prison. [PJK/CNN 7Mar07]

DEFECTING IRANIAN GENERAL IS COOPERATING WITH WESTERN INTELLIGENCE Amid Iranian accusations that Israel or the U.S. kidnapped Iranian General Ali Rez Asgari, former commander of the elite Revolutionary Guard, the U.S. responded saying that Asgari is willingly cooperating with Western intelligence. Asgari disappeared in Turkey last month and is now thought to be somewhere in Europe. The U.S. official that announced Asgari's cooperation would not say where he was or to whom he was talking, but did emphasize that the U.S. did have complete access to the intelligence Asgari was providing. The Iranian general is believed to have detailed information on the operations of Hezbollah, the Iranian-backed terrorist group that controls much of southern Lebanon, and may be aiding anti-coalition insurgents in Iraq. Asgari served in the Iranian armed forces until 2005, and is believed to have been the founder of Hezbollah in the 1980's. He also should have deep knowledge of Iran's national security infrastructure and defenses, and conventional weapons programs. Iran claims that Asgari has no knowledge of its nuclear programs and the U.S. said that he was not being questioned in regards to the nuclear program. Iran's top police official, Brig. Gen. Esmaeil Ahmadi-Moqaddam, maintained that Asgari was kidnapped during a trip to Turkey by Israeli forces. An Israeli newspaper reported that Asgari was in the U.S., while a U.S. official denied this and said Asgari defected with the help of Israeli agents. Mark Regev, the spokesman for Israel's foreign ministry, denied any Israeli involvement, saying, "To my knowledge, Israel is not involved in any way in this disappearance." However, an Iranian official speaking anonymously said that Asgari was probably offered money by Israel to defect, but also noted that Asgari had been "out of the loop" for four or five years. [CL/WashPost 8Mar07/Linzer]

JUSTICE DEPARTMENT INSPECTOR GENERAL FINDS FBI ABUSE IN ISSUING NATIONAL SECURITY LETTER SUBPOENAS UNDER PATRIOT ACT The Inspector General of the U.S. Justice Department issued a report last week that showed FBI agents had circumvented Justice Department rules in issuing national security letters to obtain information about U.S. citizens in terrorism and espionage cases. The IG, Glenn A. Fine emphasized that there was no evidence of intentional wrongdoing, but painted a picture of mismanagement. He found numerous instances of agents skirting internal guidelines and procedures and a failure of management to develop clear policies. The findings showed that the FBI had such a dismal recordkeeping system that it substantially underreported the number of problems and reported less severe problems than those discovered by the IG investigation. Attorney General Roberto Gonzales clearly showed his disappointment in the Bureau when he told a group of privacy experts, "During the discussion of the reauthorization of the Patriot Act, I believed that the FBI was acting responsibly in using national security letters. Because of the good work of the IG, I've come to learn that I was wrong." FBI Director Robert Mueller accepted responsibility for failing to establish sufficient internal oversight, saying, "How could this happen, who is accountable? And the answer to that is I am to be held accountable." Gonzales said he would decide which corrective measures to enact once the situation was more clearly understood. "Once we get that information, we'll be in a better position to assess what kinds of steps should be taken," Gonzales said. "There is no excuse for the mistakes that have been made, and we are going to make things right as quickly as possible." Between 2003 and 2006, the FBI reported just 26 errors to the White House, some as minor as typographical errors, in national security letters that it issued. However, the IG found hundreds, perhaps thousands of more severe violations that went unreported. Examples of the unreported violations included: a national security letter issued for telephone records 22 days after the period authorized for the investigation had ended; full credit reports obtained in espionage cases although the law only authorizes access to this information in terrorism cases; education records improperly obtained from North Carolina University; and unauthorized information on 10 telephone numbers obtained due to transcription and other errors by telephone companies. The use of national security letters to obtain electronic information about persons suspected of being agents of a foreign power was first authorized by congress in 1986. In 1993, congress expanded the authority to cover persons believed to be communicating with foreign agents for the purposes of terrorism or espionage. The 2001 USA PATRIOT ACT decentralized the issuance of the letters, and removed the requirement for the subject to be under suspicion. Letters can now be issued on anyone thought to be relevant in a terrorism or espionage case. [PJK/LATimes 10Mar07/Schmitt]

UPDATE ON SHOOTING OF MEMBER PAUL JOYAL Paul Joyal was returning from meeting friend and former KGB officer Oleg Kalugin at a bar in the International Spy Museum building on March 1st when he was accosted in the driveway of his Prince George's County home at about 7:35 PM. The assailants, described as two African American men, shot Joyal in the groin and stole his wallet and jewelry. Joyal, who for a time was in critical condition, is recovering from his wound in a local hospital. A source close to the case says doctors are optimistic that Joyal will recover. Normally a crime of this type would be passed off as a typical random act of violence. However, Joyal, a Russian intelligence expert and outspoken critic of Russian President Vladimir Putin, had only days before accused the Russian government of complicity in the murder of former KGB officer Alexander Litvinenko in London. Speaking on the television show Dateline NBC, Joyal said the poisoning of Litvinenko with the rare radioactive isotope polonium-210, ""...has to be a state-run or a state-managed operation." Joyal's wife, a registered nurse who ran to her husband's aid after the assailants fled, called Kalugin within an hour of the shooting. Kalugin said he was shocked, but didn't' know if the shooting was connected to Joyal's comments about Putin. Although he added, "I would not rule out anything, but it's hard to believe that a few days [after the broadcast] that some guys would shoot him." The involvement of Joyal in intelligence matters coupled with his accusations directed against the Russian government has drawn the interest of the FBI, both the Washington and Baltimore field offices of which are assisting local police in the investigation. Joseph Persichini Jr., the FBI's assistant director in charge of the Washington field office said, "We're pursuing this as hard as possible. We're not at all sure of the motive." Joyal is the father of three, coaches youth basketball, and is a member of the Prince George's County Law Enforcement Task Force. [CL/WashPost 4Mar07/Rondeaux and Aratani]

ANONYMOUS SENATOR CONTINUES TO STALL INTELLIGENCE BILL FOR THIRD YEAR For the third year in a row, the Senate may fail to pass the Intelligence Authorization Bill due to the objections of a lone Republican senator. The identity of the Senator has not been released. John D. Rockefeller (D-WV), head of the Intelligence Committee, described the impasse as, "one of the more embarrassing efforts I have been associated with in my 24 years in this body." Sen. Christopher Bond (R-MO), who is the vice chairman, took the floor of the Senate and called on "any person who has a hold on this bill to come forward and find out what is in the bill." Congressional Quarterly said that the likely culprit who put the hold on the bill was Sen. Jim DeMint (R-SC). The senator's office declined to comment saying it does not talk about holds. Other congressional sources confirmed DeMint as the holdout. The sources say that DeMint shares the concerns of the White House over specific pieces of the legislation including the requirement to divulge the national intelligence budget, report on secret CIA prisons, and respond to requests from the Intelligence Committee Chairman and Vice Chairman within 30 days. [CL/WashPost 8Mar07/Pincus]


SECTION II - CONTEXT AND PRECEDENCE

CHINA INCREASING DEFENSE SPENDING BY OVER 17 PERCENT IN 2007 U.S. Deputy Secretary of State and former Director of National Intelligence John Negroponte is seeking to better understand the intentions of China's military buildup. A spokesman for China's National People's Congress said that military spending would increase in 2007 by 17.8% to about 351 billion yuan (about $45.3 billion). Amb. Negroponte said that it was not the increase that concerned the U.S., but a desire for transparency "so that we can have a better grasp of exactly what the Chinese have in mind." This will be the second increase in a row for Chinese military spending. Last year's budget increased by 14.7% to $36.6 billion, although experts believe the actual budget size may be three times the reported amount. Taiwanese officials are obviously concerned by China's increased spending on their military. Correspondents in China are reporting that the People's Republic will modernize its ships, missiles and fighter aircraft. Jiang Enzhu, the National People's Congress spokesman, said the funds will go towards increased salaries for Chinese service members and to upgrade weapons.
    Taiwan, which China considers a breakaway republic but still Chinese territory, believes there are up to 1,000 Chinese missiles pointed at them. Vice President Dick Cheney says that China's military buildup and its test of an anti-satellite missile recently do not coincide with China's stated goal of peaceful development. China called the United States a "nosy neighbor." "What's your response if your neighbor keeps peeking into your house through a crack in the door and yelling 'Open the door, let's see what's inside'?" said Qin Gang, a spokesman for the foreign ministry in Beijing. "Would you call the police?" In an effort to allay fears over China's spending, Qin added, "China adheres to peaceful development and advocates a harmonious society of lasting peace and common prosperity. That's what has allowed China to win trust, co-operation and friends in the world." [PJK/BBC 4Mar07]


SECTION III - CYBER INTELLIGENCE

PENTAGON'S BANNED TOTAL INFORMATION AWARENESS SYSTEM MAY BE REVIVED BY DHS Rep. David R. Obey (D-WI), chairman of the House Appropriations Committee, has called for an investigation into a new Department of Homeland Security (DHS) data mining system called Analysis, Dissemination, Visualization, Insight and Semantic Enhancement (ADVISE). Critics say ADVISE uses the same process developed in the Pentagon's Total Information Awareness (TIA) system that was struck down by Congress in 2003 due to privacy concerns. Both ADVISE and TIA examine data on private citizens to develop patterns that may lead to uncovering terrorism plots or terrorist activity. The data may consist of credit-card purchases, telephone or Internet details, medical records, travel and banking information. WINs reported in January that Congress had passed a bill requiring government agencies to report the use of any data mining technology [WINs #02-07]. In September, Congress inserted language into a DHS spending bill that required the DHS Inspector General to look into the new technology, but allowed $40M to be used towards ADVISE's development. The spending bill stated, "The ADVISE program is designed to extract relationships and correlations from large amounts of data to produce actionable intelligence on terrorists. A prototype is currently available to analysts in Intelligence and Analysis using departmental and other data, including some on U.S. citizens." As a result of Congress's investigation into the TIA program in March 2003, the Congressional Research Service released a report that said, "While the law enforcement and intelligence communities argue that more sophisticated information gathering techniques are essential to combat today's sophisticated terrorists, civil libertarians worry that the government's increased capability to assemble information will result in increased and unchecked government power, and the erosion of individual privacy." ADVISE went into development in 2003, shortly after TIA was scuttled, and shares many of the same goals as the TIA project. [PJK/WashTimes 8Mar07/Hudson]

FORMER DIRECTOR OF NSA DOUBTS EXISTENCE OF PHONE CALL DATABASE Former Director of the National Security Agency (DIRNSA), Admiral (ret). Bobby R. Inman, says USA Today's account of an NSA database holding telephone calls made by U.S. persons will be compared to the search for weapons of mass destruction in Iraq. "I thought about it a lot, and I personally think there is no great NSA [phone-call] database,"  Inman said in Richmond where he was visiting as a member of Massey Energy Co.'s board of directors. Inman served as DIRNSA during the Carter and Reagan administrations from 1974-1982. He also served as head of Naval Intelligence, vice-director of the Defense Intelligence Agency and deputy director of the Central Intelligence Agency. Inman said that NSA is drowning in information and would have no practical use for a large database of U.S. domestic calls. He said that more than likely, NSA would act on evidence that a U.S. phone was used to contact an overseas number suspected of terrorist connections and target those phone calls. Inman helped to set up the Foreign Intelligence Surveillance Act (FISA) courts in 1978, which he says took the authorization for surveillance out of the hands of politicians. However, Inman said the U.S. requires new laws that take into consideration new technology and threats. As examples he cited digital communications channels and non-citizen terrorists roaming inside the U.S.  [Harvey/Richmond-Times Dispatch 8Mar07]

CIA POSTS NOTICE OF WEBSITE PROBLEMS AND FAKE E-MAILS The CIA has placed the following warning on its web page: "If you submitted a comment form or a job application using our comment or resume forms between 7 p.m. EST Wednesday February 28 and 1:30 p.m. EST Thursday March 1, please resubmit. We regret that technical difficulties during that period caused your submission to be lost and apologize for your inconvenience. If you receive unsolicited e-mail appearing to be from the CIA, like the recent e-mail falsely attributed to our public affairs office, the message is fake. The CIA never sends unsolicited e-mail to the public. If you are not expecting an e-mail from us, delete it. Do not open any attachment; it may contain malicious code that could damage your computer or mail itself to people in your e-mail address book." [PJK/CIA]

KGB MAPS OF THE UNITED KINGDOM PUBLICLY AVAILABLE FOR THE FIRST TIME Between 1950 and 1997, the KGB produced maps of the United Kingdom that featured details not on Ordnance Survey maps due to military and political sensitivities. The Soviet, and later Russian, government used satellite imagery, local knowledge and spies on the ground to map 6,178 square miles of the U.K., including 103 major cities and towns. The maps reveal far more detailed information about the purpose and construction of roads and buildings, including anything that could have any military significance. These details include the width of roads, heights of bridges, depths of rivers, and the locations of train and bus stations and prisons. The digital mapping provider Landmark Information Group from East View Cartographics recently bought the maps. John Davies, an expert on Russian maps, said the Soviet/Russian military realized the value of good topographical information and spent 50 years before, during and after the Cold War to map the face of the globe. Davies admits, "Today very little is known about how the organization was structured and how such incredible results were achieved. Certainly the operation was militarily driven, very well controlled, achieving spectacular results. Ultimately futile of course, if the purpose was world domination, but for mapping professionals they provide a fascinating and invaluable insight as to the structure of our towns and use of land during this period."  [CL/Telegraph 2Mar07]


SECTION IV - BOOKS, SOURCES AND ISSUES

Books

Power, Faith, and Fantasy: America in the Middle East: 1776 to the Present by Michael B. Oren, W.W. Norton, ISB: 0393058263, $35.00 The author of Six Days of War presents a history of the United States in the Middle East beginning with America's struggles against the Barbary pirates and continuing through the current conflict in Iraq. The book emphasizes continuity as U.S. policy morphs over the years concentrating for a time on the religious implications of the region and moving to modern motivations. [Amazon]


SECTION V - CAREERS, NOTES, LETTERS, QUERIES AND AUTHORS SEEKING ASSISTANCE, CORRECTIONS, OBITUARIES, COMING EVENTS
[IMPORTANT: AFIO does not "vet" nor endorse career offers, research inquiries or announcements. Reasonable-sounding inquiries are published as a service to members. Exercise your usual caution and good judgment when responding or supplying any information or making referrals to colleagues. Members should obtain prior approval from their agencies before answering questions that would impact ongoing military or intelligence operations - even if unclassified. Never assume public inquiries about classified projects means they've been declassified. Be attuned to false-flagging.

Careers

 Wal-Mart Stores, Inc. is seeking qualified Global Threat Analysts. This position is located in the Analytical Research Center of the Global Security division. Physical location is at the Wal-Mart Stores Home Office campus in Bentonville, Arkansas. (Relocation is available). Duties & Responsibilities - The Global Threat Analyst will anticipate and assess threats that could harm, or make vulnerable, Wal-Mart Stores, Inc., its employees, customers, facilities or operations. The Global Threat Analyst will thoroughly review information from open/public sources, academic, government, and other official sources, and professional contacts, and conduct regular assessments of world events, regional/national security climates, and suspect individuals and groups. The analyst will produce a range of written and verbal analyses for company decision makers and provide tactical intelligence support to security and crisis management operators. Maintains comprehensive files of intelligence on key issues and parts of the world; maintains record of threats received, assessments, and their disposition. The Global Threat Analyst will identify, develop and execute research and analytical techniques regarding unevaluated information of great complexity and corporate sensitivity. The incumbent will establish requirements and methodologies while considering many variables to include corporate, economic, political, military and national ramifications. Challenges encountered in this role present a broad spectrum of overlapping complexities that require simultaneous response to legal, political, international, operational and organizational aspects to resolve interpretations of threats and risks. Identify business risk to global business continuity worldwide. The Global Threat Analyst will develop scenarios, analyze information, and produce written or verbal assessments and warning forecasts for Global Security management and other appropriate corporate customers. Assessments will be assigned or self-initiated. Recommend strategies to mitigate security risks as appropriate or required.
Required Knowledge and Skills:  - Demonstrated ability to read, interpret and analyze voluminous amounts of data in a compressed time-frame.
- Multi-tasking skills, attention to detail and the ability to produce complex products on deadline.
- Ability to communicate effectively (in writing & orally) complex and sensitive situations to various levels of the organization and external environments.
- Capable of effectively exercising good judgment and when working independently on intelligence information projects in a fast moving, high pressure environment with competing priorities; experienced as to when to seek clarification/guidance/approval and communicate as appropriate.
- Ability to assess conflicting facts and estimates derived from multiple sources in comparison with historical information and in the context of internal and external economic, military, political, and technical considerations.
- Knowledge and understanding of analysis on security issues.
- Possess strong research and critical thinking skills in order to efficiently to absorb and synthesize large amounts of information; to identify, collect, and evaluate data; and to draw logical, interpretable, and potentially actionable conclusions.
- Strong professional ethics and the ability to maintain absolute discretion, confidentiality, and trust.
- Ability to interface with and represent Global Security to all levels of management, executives, and external partners.
- Knowledge of inductive and deductive reasoning to conduct archival research and analysis and evaluate the validity of data, analyze information reports and present a coherent Global Security position.
- Ability to produce written reports detailing current situational information in specific locations. Extracting and data basing information extracted from Intelligence Information Reports. Identifying intelligence gaps in coordination with fellow analysts.
- Highly developed Internet research skills and knowledge of Microsoft Office-based applications, such as Word, Excel, PowerPoint, Access. The ability to create and modify documents in Adobe PDF.
Preferred Training/Technical Skills/Knowledge The preferred candidate will possess: - A Bachelors’ degree (disciplines related to Political Science, International Relations, National Security studies, or related fields are preferred), or; - Be a graduate of a formal intelligence training program with a civilian agency, law enforcement, or the military, or;
- Equivalent combination of education and relevant experience in a related field.
- Foreign area knowledge and understanding of contemporary international affairs gained through study, travel, or work abroad.
- Familiarity with a broad spectrum of information resources and data-mining techniques.
- Knowledge of business continuity, emergency management, incident support or corporate security programs.
- Familiarity with security concerns related to the global commercial supply-chain and other inter-related transportation systems
- Ability to work independently, establish targets and set priorities in accordance with the Global Security Strategy.
- Capability to sell the concept of security as an integral element of corporate business that contributes to overall corporate profitability.
- Foreign language skills desired; Chinese and Spanish are highly desired.
- Willingness and ability to train others.
Resume Submittal - Interested candidates should submit their resumes via the position posting on the WAL-Mart website at: https://pcws.wal-mart.com/cws/seeker.html Job Id # 14752.
Employment will depend on successful passage of background, reference, and controlled substance tests. International Candidates Will Be Considered.

Notes

JONATHAN EVANS ANNOUNCED TO TAKE LEAD AT MI-5 UPON DAME ELIZA'S RETIREMENT The second-most senior intelligence official at MI-5, Jonathan Evans, who served as Dame Eliza Manningham-Buller's deputy since 2005, has been appointed to take over for his boss upon her retirement in April. Evans was selected from a short list of three candidates. Dame Eliza announced in Spring 2005 her decision to retire in April 2007, when she will have completed 10 years as Deputy Director-General and Director-General of Britain's internal intelligence agency. Dame Eliza announced her retirement from the top post, to which she was appointed in 2002, two months before the July 7th terrorist bombings of the London underground. Evans, 49,  conducted the first counter-terrorist investigation in Britain to target al-Qaeda. He was assistant director of international counter-terrorism in 2000 when MI5 and West Midlands Police uncovered a plot by a Bangla-deshi-born man, later found to be connected with al-Qaeda, to cause an explosion. Moinul Abedin, from Birmingham, was sentenced in February 2002 to 20 years in prison. [CL/LondonTimes 8Mar07/Evans]

Assistance Needed

International Spy Museum Seeks Intelligence Officers Involved in Cold War Covert Action in Italy In 1947, the United States initiated a covert operation to prevent the Italian Communist Party from winning parliamentary elections and forming an anti-Western government. Carried out by CIA, USIA and other US agencies, this operation included clandestine support for non-communist parties and lasted through 1967. The International Spy Museum is now in the process of creating an exhibition on this US covert action, and we are seeking to interview former intelligence officers and diplomats who were involved therein. We are also looking for relevant artifacts, such as propaganda posters, leaflets, documents, and other objects. If you would like to share your experience with us or have artifacts that pertain to this covert action, please contact Dr. Thomas Boghardt by phone (202.654.2851) or email tboghardt@spymuseum.org. Thank you very much for your assistance.

OUTSOURCING - BUSINESS AND NATIONAL SECURITY - WHAT HAS BEEN IMPACT? I am a graduate student in the Security Studies Program (SSP) at Georgetown University. Currently, I am working on my thesis, researching the effects of outsourcing on the IC, specifically in terms of cost, human capital, and quality. Would AFIO members be willing to share their insight with me? I would be grateful for an interview opportunity, in person or over the phone if necessary. My preliminary project design is available for the review of any members who respond. You can then decide if you wish to interview with me. REPLIES to Kambiz Fattahi at kf77@georgetown.edu

Coming Events

13 March 2007; 6:30 pm - Washington, DC - The Secret History of History - Early Espionage: The Great and Ancient Game - at the International Spy Museum. Espionage is called the second oldest profession. Others say it is difficult to tell the difference between the two. Intrigue, trickery, and guile have always been powerful weapons: Hannibal used disguises, secret hand-shakes, and forgery in his strategy against Rome; Caesar cracked codes; and Persia operated sophisticated spy networks. Spies have shaped the destiny of nations since the beginning of time -- some inspired by patriotism, some driven by fear, others fired by greed or a combination of motives. Col. Rose Mary Sheldon, author of Spies of the Bible, Intelligence Activities in Ancient Rome, and Espionage in the Ancient World will transport you to the earliest days of espionage history. Discover how the first spy masters operated, their tradecraft, and their successes and failures. Tickets: $20 Advance registration required. Registration and further information at www.spymuseum.org

Thursday, 15 March 2007 - the National Cryptologic Museum Foundation is hosting a conference on "FISA: It's History and the Law." The program will be held at the L-3 Communications Maryland Conference Center in the National Business Park at 2720 Technology Dr, Annapolis Junction, MD 20701, from 10:00 a.m. until 12:15 p.m. Lunch will be served following the program. The guest speaker will be Mr. W. K. (Kevin) Powers. Powers is the former NSA Associate General Counsel for Operations and a leading authority on the Foreign Information Surveillance Act (FISA). The presentation will describe the evolution of electronic surveillance law culminating in recent proposals to amend the FISA. It will focus on the privacy protections in the 4th Amendment to the U.S. Constitution and highlight several key Supreme Court cases dealing with that amendment. Respond by 01 March to attend. Send $12.00 to cover luncheon expenses prior to the event. Call 301-688-5436 to pay by credit card or mail a check to NCMF, POB 1682, Ft. Meade, MD 20755.

15 March 2007 - Colorado Springs, CO - AFIO Rocky Mountain Chapter holds luncheon meeting at the Falcon Room, Air Force Academy Officers Club Cost $10.00 for each lunch buffet. Inquiries to Dick Durham. Treasurer of the Chapter at Riverwear53@aol.com.

15 - 16 March 2007 - Washington, DC - L'Enfant Plaza Hotel - Department of Homeland Security’s Science and Technology (S&T) First Annual University Network Summit on Research and Education The Department of Homeland Security’s Science and Technology (S&T) Directorate Office of University Programs is sponsoring its first Annual University Network Summit on Research and Education. The summit will be held March 15-16 at the L’Enfant Plaza Hotel in Washington, D.C. DHS officials will be on hand to discuss research and education needs in the key divisions of the S&T Directorate. Attendees will also have the opportunity to hear first-hand from leaders of the Centers of Excellence and other DHS-sponsored university initiatives on critical research areas for homeland security. The summit will be a major event leading up to the 2007 Homeland Security Science and Technology Stakeholders Conference, set for May 21-24 in Washington, D.C. Additional information about the summit, including a registration page link, is available at: http://www.orau.gov/DHS_RE_Summit07/.

17 March 2007 - Orange Park, FL - The March luncheon meeting of the North Florida Chapter, AFIO, will be at 12:00 noon at the Orange Park Country Club,2525 Country Club Boulevard, Orange Park, FL. The guest speaker will be General/Ambassador Kalman Kocsis, former Ambassador; Chairman of the Expert Commission on Intelligence Reform of Bosnia and Herzegovina , Sarajevo ; and former chief of A Magyar Köztársaság Információs Hivatala, Hungary's foreign intelligence service. Cost of the luncheon is $16 per person, pay at the club. All AFIO members and their guests are cordially invited to attend, please RSVP to Mr. Quiel Begonia at BEGONIA@coj.net as soon as possible.

17 March 2007 - Kennebunk, ME - The.AFIO Maine Chapter hosts Dr. Christopher T. Yeaw speaking on the challenge presented by nuclear proliferation in the world, and on his role in removing the Weapons of Mass Destruction documents from Gadhafi in Libya. Dr. Yeaw is associate professor and senior strategic researcher at the U. S. Naval War College specializing in strategic and nuclear issues. Since beginning his government career with the U. S. Navy, Dr. Yeaw has served as the Defense Intellience Agency's lead technical intelligence officer on China's nuclear weapons program and principal advisor on nuclear and strategic issues to the Assistant Secretary of State for Verification and Compliance. While at the State Department he had the distinction of being the first nuclear diplomat on the ground in Libya, and retrieved the nuclear weapons documents provided to that country by Pakistani, A. Q. Khan. Dr. Yeaw was also chief scientist for the U. S. Department of Energy's Office of Intelligence. The meeting begins at 2:00 p.m. at the Kennebunk Free Library, Main Street, Kennebunk. Call 207-985-2392 for information

19 March 2007 - Washington, DC - National Security and Law Society's 3rd Annual Symposium on Emerging Issues in National and International Security (EMININT 2007) at the American University Washington College of Law, 8:45 AM-5:30 PM. The Symposium will host talks on Domestic Surveillance, Lobbying in the New National Security Era, Comparative Domestic Security Practices, and National Security Trials in the Age of 24-Hour News. There will be a keynote luncheon address by James Olson, Senior Lecturer at the Bush School, Texas A&M University and author of Fair Play: The Moral Dilemmas of Spying. Online registration can be found at http://www.wcl.american.edu/secle/cle_form.cfm. Event is free to all students, regardless of school, but registration still required. For professionals, pre-registration is $50 before March 10 and $75 after that date. 5 CLE credits are available for an additional charge. Out-of-town guests can get a special rate by staying at the Holiday Inn Chevy Chase and asking for the American University rate. This rate is $159 for Saturday night and $179 for Sunday night. They can be contacted at Holiday Inn Washington-Chevy Chase, 5520 Wisconsin Ave, Chevy Chase, MD 20815, http://www.ichotelsgroup.com/h/d/hi/1/en/hotel/wascc/transportation, Hotel Front Desk: 1-301-656-1500. Registration questions should be directed to secle@wcl.american.edu  or 202-274-4075, and any content questions should be directed to nsls@wcl.american.edu or 202-465-0613.

27 March 2007 - Scottsdale, AZ - The Arizona AFIO Chapter holds luncheon meeting featuring FBI Counterintelligence Agent. The luncheon meeting at Buster's Restaurant at 11:30 AM will feature FBI Special Agent Lyn Anastasio speaking on the importance of counterintelligence in the US. Businesses and Universities need to be aware of foreign entities attacking US economic and national security. Special Agent Anastasio has been an agent for 10 years, working violent crime for two years and counterintelligence for eight years. Her current position is the Domain Coordinator for the FBI Phoenix Division. Please call Bill Williams (602) 944-2451 to make reservations or for additional information.

27-28 March 2007 - Fair Lakes, VA- National Military Intelligence Association Seminar on Information Operations This two-day seminar will be at the Northrop Grumman Conference Center in Fair Lakes, VA and will examine information operations and the specific types of intelligence support needed for success. The Conference will be conducted at the SECRET/NOFORN level. Presenters will include the Department of State, the Office of the Secretary of Defense, the combatant commands, the Services, and the intelligence community. Key topics include the nature and practice of strategic communications, the mission and daily operations of the Joint Information Operations Warfare Command. Confirmed speakers are Adm William O. Studeman, USN Ret.; Eliot O. Jardines, Asst DDNI for Open Source Intelligence; MG Barbara Fast, Commander, U.S. Army Intelligence Center, Ft. Huachuca, AZ; Col. George J. Franz, Commander, 704thMI Brigade, Ft. Meade, MD; Robert Giesler, Office of the Deputy Undersecretary of Defense (IWS); and Col. John Davis, USA, Commander, 1st Information Operations Command and Ambassador Brian Carlson, Office of the Under Secretary of State for Public Diplomacy and Public Affairs The Registration Fee starts at $475 for general admission. Seminar information and registration specifics can be found at https://www.123signup.com/event?id=qhdhh.

27-29 March 2007 - Provo, Utah - Brigham Young University hosts Spying in Film and Fiction Conference The David M. Kennedy Center for International Studies at Brigham Young University in Provo, Utah is sponsoring a three day conference on Spying in Film and Fiction on March 27, 28, and 29, 2007. Confirmed presenters are Christopher Andrew, well known Cambridge University historian, author, and official historian of MI5; Loch K. Johnson, widely published intelligence scholar from the University of Georgia; Wesley Wark, University of Toronto historian and frequent commentator on spy films and fiction; Frederick Hitz, former Inspector General of the CIA, lecturer at Princeton and at the University of Virginia, and author of the 2004 book, The Great Game: The Myth and Reality of Espionage; Nicholas Dujmovic, CIA historian; and Stan Taylor, organizer of the conference. The conference is free to the public although letting us know you are planning to attend would be appreciated. Inquiries about local lodging and about the conference schedule may be directed to Cory Leonard, Associate Director of the David M. Kennedy Center, at cory_leonard@byu.edu or 801-422-2980. Any AFIO member who attends will automatically be placed on a post-presentation discussion panel. If you come early or stay late, you can enjoy some excellent early Spring skiing at some of the finest ski resorts in the nation less than an hour from the Brigham Young University campus.

28-29 March 2007 - Washington, DC - DEFENSE TRANSFORMATION AND NETWORK-CENTRIC OPERATIONS Conference at NDU A National Defense University and Forces Transformation and Resources Short Course at Marshall Hall, Room 155, Fort Lesley J. McNair, Washington, DC 20319. FREE to participants. http://www.ndu.edu/info/WhatsNew/whatsnew.cfm  Program: Defense Transformation and Network-Centric Operations: A Strategic Perspective: Progression in Force Transformation, Dr. Hans Binnendijk, Director, CTNSP/NDU; Department of Defense Strategic Directions for Transformation, Mr. Terry J. Pudas, DASecDef, Forces Transformation and Resources (OUSD-P); The Theory and Practice of Network-Centric Operations for Major Warfighting by Mr. John Garstka, Assistant Director of Operations and Concepts, Forces Transformation and Resources (OUSD-P); DoD Plans and Programs for Information Networks by Dr. Stuart Starr, Sr Research Fellow, CTNSP/NDU; Resources for Force Transformation by Dr. Gordon Adams, Fellow, Wilson Center; Transforming the National Security Community by Mr. Spike Bowman, Sr Fellow, CTNSP/NDU; Applications of Network Centric Operations -- Transformation Case Study: The Stryker Brigade by Colonel Robert Ballew, USA, Transformation Strategist, Forces Transformation and Resources (OUSD-P); 1000 Transformation Case Study: The Stiletto Program by Capt Gary Edwards, USN, Transformation Strategist, Forces Transformation and Resources (OUSD-P); Transformation Case: Littoral Combat Ship by Dr. Stuart Johnson, Senior Research Analyst, RAND Corporation; Transforming the Structure of the Military: Combat Decisions – Rank, Responsibility, or Frontline Positions? by Mr. Bing West, Founder and CEO, GAMMA Corporation; Transformation for Disaster Relief: Response to Hurricane Katrina by LTC John M. Epperly, Virginia National Guard, CDR 3-116 Infantry, 1st Brigade Combat Team, 29th Infantry Division (Light); Transforming the Interagency for Complex Operations by Mr. Bernie Carreau, Senior Research Fellow, CTNSP/NDU; Wrap up and Evaluations. More information/Registration at http://www.ndu.edu/info/WhatsNew/whatsnew.cfm

30 March 2007 - Alexandria, VA - The Centre for Counterintelligence and Security Studies (CI Centre)™ -"The Origins of FBI Counterintelligence" By retired FBI Supervisory Special Agent Raymond J. Batvinis As the world prepared for war in the 1930s, the United States discovered that it faced the real threat of foreign spies stealing military and industrial secrets—and that it had no established means to combat them. Into that breach stepped J. Edgar Hoover and the FBI. Author Ray Batvinis gives a talk about his new book, "The Origins of FBI Counterintelligence," Friday, 30 March 2007, 6:00 pm, CI Centre in Alexandria, VA. Light refreshments will be served. His book will be available for purchase at the event so you can have it signed by Ray Batvinis. The event is free. Please RSVP as space is limited. Call the CI Centre at 703-642-7450 or 1-800-779-4007 or RSVP online at http://cicentre.com/BK/fbi_batvinis_book_event.html.

Thursday, 5 April 2007 - Alexandria, VA - the CiCentre hosts Ray Semko's "D*I*C*E 2007: Unleashed" an Annual Security Awareness/Refresher Briefing - from 9:30am - Noon. Almost all organizations, whether government or private sector, have a requirement to provide a security refresher briefing every year to their personnel. For those who hold security clearances, this is mandated by the National Industrial Security Program Operating Manual (NISPOM 3-107), and records of completion have to be kept for security inspections of your facility. These briefings need to cover topics such as threat awareness, defensive security, employee reporting obligations and requirements and security procedures. Would you like to experience a D*I*C*E briefing yourself? Or are you part of a small organization who can't fill a D*I*C*E briefing? Ray Semko will premiere his D*I*C*E 2007: UNLEASHED! briefing. This is his first new briefing since he retired from the government and now that he's "unleashed," you can find out what he has to say. All attendees will receive a special certificate signed by Ray stating they've completed their annual security briefing for the year. For more information and to register to attend, go to: http://cicentre.com/dice/2007_premiere.html or call them at 1-800-779-4007 or 703-642-7450. Seating is limited.

6 April 2007 - Houston, TX - AFIO Houston Chapter event speaker confirmed Speaker to be announced later for security reasons. Registration and further details at http://afiohouston.com/contacts.html 1800h 6pm Cocktails. No tickets at the door.

10 April 2007 - Tampa, FL- AFIO Suncoast Chapter meets at 11:30 a.m. at the Officers' Club, at MacDill Air Force Base. Our luncheon speaker is Porter Goss, former Director of the CIA. After graduating from Yale, Porter joined the CIA and worked as a Case Officer in the Directorate of Operations for nine years. He began his political career in local government in 1974 and went on to be elected to Congress in 1988, where he served for 16 years. Among other leadership positions he held, Porter served as Chairman of the House Intelligence Committee for 8 years. He left Congress when he was appointed DCI by President George W. Bush. He served as DCI and then Director of the CIA from September 2004 until May 2006. We are honored to have such a dedicated public servant who has been willing to answer the call to serve wherever his country needed him. Due to base security, reservations for this meeting should be received by April 1, 2007. For more information contact Don White, DonWhite@tampabay.rr.com.

 20 - 21 April 2007 - New London, CT - AFIO New England Chapter hosts luncheon featuring Dr. Michael Hiam, author of Who the Hell Are We Fighting? The Story of Sam Adams & the Vietnam Intelligence Wars. The Spring meeting of the David Atlee Phillips New England Chapter will gather 20 - 21 April 2007 at the Lighthouse Inn, 6 Guthrie Place, New London, CT 06320-4206, Telephone 860-443-8411, Reservations 888-443-8411, www.lighthouseinn-ct.com  Lodging is available to AFIO members at the rate of $155 plus taxes per night in the Mansion; deadline is 21 March.
As is our custom, Friday evening AFIO/NE will host a wine & cheese social 6:00 - 8:00 PM 20 April 2007 followed by a no-host dinner with our speakers at the Lighthouse Inn. The luncheon the next day is $25 per person when paid by check by April 9th or $30 at the door on a first-come-first-serve basis, as seats are available.
Our morning speakers will be the two students who won the 2006 AFIO/NE “Best Paper” competition. First will be Matthew Allatin. Recipient of the graduate student award, he recently completed his MS degree in National Security from the University of New Haven. Matthew will discuss “The al Qaeda Terrorist Organization: A Redefining Look.” This presentation will endeavor to provide an description of al Qaeda, their driving factors & a general understanding of how this terrorist group functions.
Our second morning speaker will be David Lim, recipient of the undergraduate award. He recently graduated with a BA degree in International Relations from Boston University. Next year he will enter Law School. David will discuss his paper on “Organized Crime & Terrorism.” Our Keynote Speaker Saturday afternoon will be Dr. Michael Hiam who took four years from his practice as a clinical psychologist to research & write Who the Hell Are We Fighting? The Story of Sam Adams & the Vietnam Intelligence Wars (Steerforth, 2006). The book is about CIA Analyst Samuel A. Adams. It reviews his life, career, & obsession to uncover the truth concerning the “numbers controversy” about the strength of the Viet Cong. Adams is a distant relative of the Presidents Adams. Dr. Hiam suggests there are parallels between Intelligence failures in Viet Nam then and now in Iraq He holds degrees in English & History as well as a Ph. D. in Psychology. He is a resident of Newton, MA. For further information contact Arthur Hulnick 617-353-8978.

20-22 April 07 -Weimar, Germany- 13th Annual Meeting of the International Intelligence History Association Organizers: Professor Wolfgang Krieger (Universit�t Marburg / Germany) and Professor Heiner Timmermann (Akademie Rosenhof / Weimar). It has often been said that intelligence services helped keep the peace during the cold war. But there can be no doubt that in many instances intelligence activities led to or intensified international conflict. At least two large-scale wars, in Vietnam and in Afghanistan, resulted directly from massive intelligence failures (and eventually led to further such failures). Throughout the cold war intelligence clashes produced diplomatic or political incidents, such as expelling embassy staff or formal protests against abductions or telephone wiretappings. Intelligence clashes worsened relations , at least temporarily, within each bloc, between the two blocs and with countries outside the blocs. While a fair number of such clashes have already been studied, including naval incidents and incidents relating to espionage overflights, much research is still required before we understand more thoroughly their significance in cold war history. Proposals are to be sent (by February 15th) to -- kriegerw@staff.uni-marburg.de --. Conference presentations will be limited to 25-30 minutes. While the conference organizers will attempt to provide financial assistance to the conference presenters for travel and accommodation expenses no commitment can be made in advance. For further information please consult our website at -- www.intelligence-history.org -- where administrative details will be posted shortly for all who wish to participate in this conference. (This message is also available online at www.intelligence-history.org)

23-27 April 2007 - Vancouver, British Columbia - International Association of Law Enforcement Intelligence Analysts (IALEIA)/Law Enforcement Intelligence Unit (LEIU) 2007 Annual Conference at the Hyatt Regency Hotel. These two organizations represent the largest associations representing both intelligence analysts and intelligence officers in the world; if you go to one training conference in 2007, this should be the one! This is the second joint conference involving IALEIA and LEIU; we worked together on our Annual Conference in Alexandria, VA in 2005, which was a huge success and attracted over 700 attendees. Keynote by Dr Mark Lowenthal, former CIA Assistant Director for Analysis & Production, and discussions on Future Challenges for the Intelligence Community by Dr Thomas Fingar (DNI), Director of National Intelligence Analysis/Chairman National Intelligence Council. Please visit the website for more details http://leiu-homepage.org/events/index.php David Jimenez-Director of Training, Education, and Career Development, swnmia@juno.com or jimenez@ialeia.org.

24-26 April 2007 - Arlington, VA -Terrorism Intelligence Collection and Countermeasure Seminar/Workshop Primary Speakers: Col. Valentin Aksilenko (KGB, Ret), John C. "Jack" Platt and Dr. Karl Seger. This program focuses on methods used by terrorists to collect intelligence and plan operations. Both domestic and international extremist collection methods are discussed and several case studies are presented. The workshop includes two practical exercises: a field surveillance detection exercise and a classroom exercise on Internet intelligence collection. Methods to detect and counter terrorist intelligence collection are also presented. Sponsored by Seger Consulting Group, Inc.  Tuition $1,295.00  Tuition is $995.00 if three or more people from the same organization register. Contact Karl Seger at 1-888-277-9703 or email karlseger@segercg.com, Seger Consulting Group, Inc. 1.888.277.9703

For Additional Events two+ months or greater....view our online Calendar of Events

 -----------------------------------------------------------------------

REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs: 

a)  IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list.  If this link doesn't open a blank email, create one on your own and send to afio@afio.com with the words:  REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.

 b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to afio@afio.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.

-----------------------------------------------------------------------

WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor(s) or author(s) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!

(c) 2007, AFIO, 6723 Whittier Ave, Suite 303A, McLean, VA 22101. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: afio@afio.com