AFIO Weekly Intelligence Notes #11-07 dated 19 March 2007

Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers. WINs are edited by Ernest Hampson, Ph.D., with input from AFIO members and staff.
The WINs is sent to all AFIO members on an Opt-In basis. IF YOU DO NOT WISH TO RECEIVE THESE NOTICES....SEE THE EASY ONE-CLICK REMOVAL INSTRUCTIONS AT Bottom
CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at afio@afio.com. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm


EDITOR'S NOTES: Questions or suggested items can be directed to WINsEditor@afio.com - Ernie Hampson


SECTION I - CURRENT INTELLIGENCE
KHALID SHEIK MOHAMMED CONFESSES BEFORE TRIBUNAL TO 9/11 ATTACKS AND OTHER TERRORIST ACTS
DIRNSA ISSUES 'CALL TO ACTION' TO TRANSFORM NSA AND RECOGNIZE U.S. IS A 'NATION AT WAR'
SOURCES SAY CIA TO BUILD LARGEST EAST AFRICAN OPS CENTER IN SUDAN
FORMER MI-6 OFFICER TOMLINSON WILL NOT BE PROSECUTED FOR NEW LEAKS
ANOTHER SUSPICIOUS DEATH OF A REPORTER CRITICAL OF RUSSIAN PRESIDENT PUTIN
SECTION II - CONTEXT AND PRECEDENCE
A NEW TERROR GROUP GROWING IN LEBANON THREATENS THE U.S.
SECTION III - CYBER INTELLIGENCE
CENTCOM J-2 TELLS 60 MINUTES THAT TERRORISTS ARE RECRUITING ONLINE
CHINESE INFORMATION WARFARE TARGETS U.S. DEFENSE COMPUTER SYSTEMS
NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY RELEASES 2007 STATEMENT OF STRATEGIC INTENT
SECTION IV - BOOKS, SOURCES AND ISSUES
Books
At the Center of the Storm by George Tenet, Harper Collins, ISBN: 0061147788, $27.95
American Spy: My Secret History in the CIA, Watergate and Beyond by E. Howard Hunt with Greg Aunapu, Wiley, ISBN 0471789828, $25.95
SECTION V - CAREERS, NOTES, LETTERS, QUERIES AND AUTHORS SEEKING ASSISTANCE, CORRECTIONS, OBITUARIES, COMING EVENTS

Careers
Career Openings at the Department of Homeland Security
Translators Sought: Computing & Security Associates LLC is seeking native (preferred) or fluent translators and/or linguists
Counterintelligence Field Analysts Sought For Iraqi Operations
Coming Events
 
Current Calendar Next Two Months ONLY:
27 March 2007 - Scottsdale, AZ - The Arizona AFIO Chapter holds luncheon meeting featuring FBI Counterintelligence Agent.
27-28 March 2007 - Fair Lakes, VA- National Military Intelligence Association Seminar on Information Operations
27-29 March 2007 - Provo, Utah - Brigham Young University hosts Spying in Film and Fiction Conference
28-29 March 2007 - Washington, DC - DEFENSE TRANSFORMATION AND NETWORK-CENTRIC OPERATIONS Conference at NDU
30 March 2007 - Alexandria, VA - The Centre for Counterintelligence and Security Studies (CI Centre)™ -"The Origins of FBI Counterintelligence" By retired FBI Supervisory Special Agent Raymond J. Batvinis
Thursday, 29 March 2007 - AFIO Jim Quesada Chapter, San Francisco Bay Area Luncheon features D.C. Nath,
5 April 2007 - Alexandria, VA - The CiCentre hosts Ray Semko's "D*I*C*E 2007: Unleashed"
6 April 2007 - Houston, TX - AFIO Houston Chapter event speaker confirmed
10 April 2007 - Tampa, FL- AFIO Sun Coast Chapter Luncheon- Speaker is Porter Goss, former Director of the CIA
Wednesday, 11 April 2007 - Las Vegas, NV - "The Islamic Terrorist Mindset - Why They Hate Us" will be the topic of the AFIO Las Vegas Chapter
20 - 21 April 2007 - New London, CT - AFIO New England Chapter hosts luncheon featuring Dr. Michael Hiam
20-22 April 2007 -Weimar, Germany- 13th Annual Meeting of the International Intelligence History Association
23-27 April 2007 - Vancouver, British Columbia - International Association of Law Enforcement Intelligence Analysts (IALEIA)/Law Enforcement Intelligence Unit (LEIU) 2007 Annual Conference
24-26 April 2007 - Arlington, VA -Terrorism Intelligence Collection and Countermeasure Seminar/Workshop
 
For Additional Events two+ months or more....view our online Calendar of Events

SECTION I - CURRENT INTELLIGENCE

KHALID SHEIK MOHAMMED CONFESSES BEFORE TRIBUNAL TO 9/11 ATTACKS AND OTHER TERRORIST ACTS Khalid Sheik Mohammed (KSM) confessed before a military tribunal at the U.S. detention facility at Guantanamo Bay, Cuba to masterminding the 9/11 attacks, beheading journalist Daniel Pearl, and the planning or enacting of 29 other terrorist plots. The tribunal was convened to determine if KSM met the criteria for classification as an "enemy combatant." If so classified, KSM would be subject to prosecution under the tribunal. KSM made the government's case easy, claiming that he was responsible for the 9/11 attacks, "...from A to Z," and in regards to the Pearl murder, the transcript of the tribunal proceedings reveals that KSM said he "...decapitated with my blessed right hand the head of the American Jew, Daniel Pearl, in Karachi." KSM claimed Pearl was an agent of the Mossad, that his killing was not an al Qaeda operation, but done with a separate group of Pakistani mujahideen, and that Pearl was in Pakistan to track the movements of Richard Reed, the infamous "shoe bomber.".
    In all, KSM said he planned, financed or trained the perpetrators for 31 terrorist plots over a period of 10 years including Richard Reed's attempt to down an American plane with explosives planted in his shoe. He also claimed responsibility for the first attack on the World Trade Center in 1993, the Bali night club bombing in 2002, and an attempted assassination of President Clinton in the Philippines in 1994 or 1995 [Editor: Clinton visited Indonesia and the Philippines 7-18 Nov 1994 for an APEC meeting, FindArticles]. At one point, KSM's court-appointed "personal representative" (PR), who was reading KSM's statement, said that KSM was "responsible for the assassination attempt against Pope John Paul II during his visit to the Philippines." KSM quickly corrected the PR to say he "shared responsibility" for the attempt on the pope's life. The majority of what KSM took credit for, however, was the planning of attacks, most of which apparently never came to fruition.
    In addition to KSM's claims, a list of evidence that alleged him to be "leader of al Qaida's military committee" was presented and included a computer that was seized during KSM's capture. The computer contained information about the four planes hijacked on 9/11, including codenames, flight numbers, pilot information, and targets; photos of the 19 9/11 hijackers; a document listing the pilot training fees for Mohammed Atta and biographical information on the 9/11 hijackers; a transcript of chat sessions with some of the hijackers; three letters from Osama bin Laden; and a spreadsheet detailing financing of al Qaeda operations. KSM disputed the identification of him as the leader of al Qaida's military committee, which he says an al Jazeera reporter made up, and also denied that he owned the computer containing the 9/11 information. KSM requested two witnesses, Ramzi bin al Shib and Mustafa Hawsawi. The President of the tribunal denied both witnesses. Ramzi bin al Shib was to testify that he was present during the al Jazeera interview with KSM, and that KSM did not claim to be the leader of al Qaeda's military committee as was reported. Hawsawi would testify that the computer that was seized belonged to him and not KSM. The tribunal president determined that given the magnitude of the evidence against KSM, both of these refutations were irrelevant to determining if KSM could be classified as an enemy combatant.
    Critics of the military tribunals have said KSM is self-aggrandizing and probably was not responsible for the all the acts for which he claimed credit. KSM himself said, "What I wrote here, is not I'm making myself a hero [sic], when I said I was responsible for this or that."  Mark Denbeaux, a Seton Hall University law professor who represents two Tunisians held at Guantanamo, and who has been a critic of the tribunals, appears to disagree with critics that downplay KSM's significance. Denbeaux said, "''The government has finally brought someone into Gitmo who apparently admits to being someone who could be called an enemy combatant. None of the others rise to this level. The government has now got one.'' The tribunal has not issued a ruling on KSM's status yet. [CL/NYT 14Mar07/AP]

DIRNSA ISSUES 'CALL TO ACTION' TO TRANSFORM NSA AND RECOGNIZE U.S. IS A 'NATION AT WAR' In an internal memo to employee's of the country's largest intelligence agency, Lieutenant General Keith Alexander, Director of the National Security Agency (NSA), called for action to transform the way NSA carries out its mission and to expedite the development of new spying technology. Alexander, said, "We need to do more faster: we are still A NATION AT WAR," in the 21 February memo. Only unclassified portions of the document entitled, "My Appeal to You: A Call to Action" were reported by the Sun, after confirming their authenticity with sources inside the agency. Some of the problems Alexander wants fixed include "obtaining enough electric power to run the high-tech networks at its Fort Meade headquarters, fixing an ailing computer infrastructure, and overcoming difficulties in building a system to uncover threat information in the vast volume of data that the NSA captures every day." These issues and others will come under review this month when Congress is set to review NSA's budget. Rep. C.A. Dutch Ruppersberger (D-MD) who chairs a subcommittee that oversees the NSA said the agency "will have to justify the money," due to failures in the past, such as a failed multi-billion dollar plan called "Trailblazer" that was to upgrade the agency's computer technology. House Intelligence Committee Chairman Silvestre Reyes (D-TX) said that too many of NSA's plans are ill-defined, especially when it comes to exploiting intelligence from the Internet. Alexander is expected ask for an additional $1 billion over its estimated budget of $8 billion. Rep. Peter Hoekstra (R-MI), who led the Intelligence Committee prior to the last elections, said that Congress must ensure that NSA stays at the leading edge of technology. In his memo, Alexander recognized that NSA must fix its problems in order to justify its budget, and has ordered a 45-day review of modernization, management and how it will deliver its results. A former NSA employee said the study sounds a lot like what General Michael Hayden did when he took over NSA in 1999. The former employee said, "Studying it again, I'm just not sure what it gives you," noting that most of the recommendations from the 1999 study were never followed. Included in the review may be an initiative started by Alexander a year and a half ago called 'Turbulence,' which was supposed to quickly analyze digital information from cyberspace. Progress on Turbulence has been slow. One insider said Alexander needs to make a decision on continuing Turbulence as it has reached a "make or break point" and has little to show for the investment. In his memo, DIRNSA set out four objectives for the NSA: resolving systemic problems, speaking with one voice "especially to Congress," fully agreeing on a "road map" for the agency, and demonstrating clearly "that we are maximizing the return on investment expected of us."  [Harvey/BaltSun 10Mar07/Gorman]

SOURCES SAY CIA TO BUILD LARGEST EAST AFRICAN OPS CENTER IN SUDAN Reportedly, the CIA has received the green light from the Sudanese government to build its largest intelligence complex for East Africa in Sudan. According to al-Hayat, a London-based pan-Arab newspaper, the Sudanese government has cleared 400 containers belonging to the U.S. Embassy in Khartoum to enter the country. The containers had been held up by objections from the Sudanese treasury which now has apparently given its consent. The containers reportedly are filled with building materials for the new U.S. embassy complex in Khartoum, and special equipment that will be used to outfit a CIA intelligence operations center inside the embassy compound. The intelligence center is to be part of an increased level of cooperation between U.S. and Sudanese intelligence services. Last year the L.A. Times reported that Salah Gosh, head of Sudanese intelligence, flew to Los Angeles in April 2005 and met with U.S. intelligence officials aboard a private plane to discuss the two countries' partnership in the War on Terror. [PJK/SudanTribune 13Mar07]

FORMER MI-6 OFFICER TOMLINSON WILL NOT BE PROSECUTED FOR NEW LEAKS Richard Tomlinson served as an officer with the Secret Intelligence Service (SIS), also known as MI-6, for four years, from 1991 to 1995. He has already served a one-year prison sentence under the Official Secrets Act for disclosures of classified information in a book synopsis. He now stood accused of blackmail and making further disclosures in newspapers, books and on the Internet during the periods 1998-2002 and 2005-2007. His alleged disclosures included the publication of a list of SIS members' names. The Crown Prosecution Service (CPS) announced last week that it would not prosecute Tomlinson for these additional crimes, however, as a criminal trial of these matters could harm national security. Tomlinson was happy with the announcement, but still angry that a computer which the authorities confiscated from his home last June had not been returned. Allegedly, after the police searched Tomlinson's home last year, he threatened to disclose more classified information if his computer was not returned to him, which led to the blackmail charge. Tomlinson claimed the police knew that he was not responsible for the published list of names. He said that the list contained the names of British ambassadors and SIS officers were never appointed as the heads of diplomatic missions. Further, Tomlinson said the list contained names of SIS members that were too young for him to have known during his service. The CPS stated that Lord Goldsmith, the Attorney General, had consulted with the SIS about pursuing a prosecution of Tomlinson, but decided that "any prosecution has the potential for disclosure during the trial process of sensitive matters" which had national security implications. [CL/Telegraph 14Mar07/Rozenberg]

ANOTHER SUSPICIOUS DEATH OF A REPORTER CRITICAL OF RUSSIAN PRESIDENT PUTIN Ivan Safronov was found dead on the ground below a fifth story window of a stairwell at his Moscow apartment building in early March. To all outward appearances it was a suicide, and normally would not have made the international news. However, Ivan Safronov was the military correspondent for Russia's leading business newspaper, Kommersant. Safronov was also a vocal critic of Russian President Vladimir Putin, and Putin's critics have started turning up dead or injured around the globe. Last October, Anna Politkovskaya, who reported critically of Russian human rights abuses in Chechnya, was shot dead. In November, former KGB officer and Putin critic Alexander Litvinenko was poisoned in London; a death in which the Kremlin was suspected. And recently, Paul Joyal, the publisher of a Russian intelligence newsletter who implicated the Russian government in Litvinenko's murder on U.S. national television, was shot outside his home (authorities have no evidence that this shooting was linked to Joyal's comments against the Kremlin). In a Kommersant article following Safronov's death, the newspaper noted, "The suicide theory has become dominant in the investigation, but all those who knew Ivan Safronov categorically reject it." His friends and colleagues described him as a "strong, cheerful" fellow who would be unlikely to take his own life. In a recent ITAR-TASS article, an unidentified police spokesman, perhaps in an effort to quell suspicion, reported strongly that the authorities have "not even any minimal information" that Safronov was murdered. Safronov was known to anger Kremlin officials with his public criticism, such as a report last December that highlighted the third failure to launch the new Bulava intercontinental ballistic missile, which Putin had hailed as the basis for Russia's new nuclear strength. [PJK/NYPost 6Mar07/AP]


SECTION II - CONTEXT AND PRECEDENCE

A NEW TERROR GROUP GROWING IN LEBANON THREATENS THE U.S. Shakir al-Abssi is the leader of a new terrorist organization called Fatah al Islam that has vowed to attack U.S. interests. Recently, the New York Times interviewed al-Abssi in his training camp about twelve miles north of the costal city of Tripoli in Lebanon. Abssi is a Palestinian radical who has setup operations in a refugee camp, recruiting mostly other disaffected Palestinians. He was a close associate of former Al Qaeda in Mesopotamia (Iraq) leader Abu Musab al-Zarqawi, and was sentenced to death in absentia in Jordan for the 2002 murder of American diplomat Laurence Foley. Intelligence officials estimate Fatah al Islam's size at about 150 militants, with an arsenal of explosives, rockets and an antiaircraft gun. Abssi built the group in just four months after his arrival from Syria. He blames America and American presence in the Middle East for many of the woes faced by Arabs, saying, “The only way to achieve our rights is by force. This is the way America deals with us. So when the Americans feel that their lives and their economy are threatened, they will know that they should leave.” 
    Fatah al Islam is the face of the new Al Qaeda; a small splinter group that acts independently and maintains its own terror capabilities, but shares Osama bin Laden's view of the West. The U.S. campaign on terrorism in the wake of the 9/11 attacks focused on Al Qaeda, and smashed that organization's central command hierarchy and largely limited bin Laden's ability to direct worldwide terror operations. Abssi has tapped into the militant vision of the Palestinian refugees and cultured their hatred of Israel into a wider, global militant Islamic view. Abssi has also begun to add Saudis and other Arab fighters who are returning from the battlefields of Iraq. This contingent of experienced foreign fighters are estimated to comprise about a third of Abssi's group. To reach out to more recruits, Abssi has added a media campaign, using Abu al-Hassan, 24, a journalism student who dropped out of college to join Fatah al Islam, to develop a newsmagazine.
    Abssi, 51, was born in Palestine and was at one time a medical student. He dropped out of medical school to pilot planes for Yasser Arafat. Later he began staging attacks on Israel from his own base in Syria. However, the Syrians eventually jailed him for three years for terrorism. After his stint in jail he decided to start targeting Americans in Jordan.
    The New York Times was able to arrange an interview with Abssi at the Nahr al Bared refugee camp, which serves as his headquarters. The Times reporter said there were about 80 men working or training at the camp at the time of the interview. This was Abssi's first interview with Western media, in which he said he shared Al Qaeda's vision of a fundamentalist Islamic world nation. He believes that it is no longer enough just to kill American soldiers in Iraq to get the attention of the American public and force the American government to stop what he views as a war on Muslims.
    Lebanon arrested four members of Fatah al Islam last week for the bombing of a bus carrying Lebanese Christians. Abssi denies that his group was involved in the bombing, stating that he has no intention of attacking inside Lebanon. Although within reach of the Lebanese authorities, Major General Achraf Rifi, general director of Lebanon’s Internal Security Forces, says he has no authority within the Palestinian refugee camps, despite warrants for Abssi on terrorism charges in Lebanon, Jordan and Syria. Rifi said that he would need the agreement from other Arab nations to enter the camp, and has instead tightened a cordon around the camp to restrict Abssi's movements and ability to carry out operations.
    Fatah al Islam is not the only group using the Palestinian camps as a haven and resource for wider Islamic jihad. At the Ain el Hilwe camp, an hour south of Beirut, another radical Sunni group, Asbat al Ansar, has been sending fighters to Iraq since the beginning of that conflict. The group's deputy commander said that they are fighting American oppression. Jamal Hatad, a leader in the camp, runs a 12-hour per day television station that airs programming with call-in talk shows, videos and statements from bin Laden, and interviews with the families of martyrs.
    Lebanon is more frequently becoming the source of terrorist suspects. One of the 9/11 hijackers was from Lebanon. Last summer, six Lebanese were arrested for trying to plant bombs on German trains. Last spring, two Lebanese and one Palestinian were arrested in the U.S. for planning to blow up the PATH train tunnels beneath the Hudson River in New York. [CL/NYT 16Mar07/Mekhenet and Moss]


SECTION III - CYBER INTELLIGENCE

CENTCOM J-2 TELLS 60 MINUTES THAT TERRORIST ARE RECRUITING ONLINE In late February the Vice President visited a base in Afghanistan. News of the visit spread on "jihadi" websites quickly. Within hours the base was attacked by a suicide bomber. Intelligence officials have not concluded that the bombing was in reaction to the Vice President's visit or targeted against the Vice President, but they did note the coincidence. The Internet has allowed Al Qaeda to pick up the pieces after its central command was devastated by U.S. attacks in the wake of 9/11. "Without a doubt, the Internet is the single most important venue for the radicalization of Islamic youth," says Army Brigadier General John Custer, who is the is head of intelligence at Central Command, responsible for Iraq and Afghanistan. Custer says that the U.S. encounters 16- and 17-year-old combatants in Iraq everyday that were recruited over the Internet. In a recent interview with 60 Minutes, Custer described the terrorist presence on the Internet, "You start off with a site that looks like current news in Iraq. With a single click, you're at an active jihad attack site. The real meat of the jihad Web site, Jihad Internet. Beheadings, bombings, and blood. You can see humvees blown up. You can see American bodies drug through the street. You can see small arms attacks. Anything you might want in an attack video. Next link will take you to a motivational site, where mortar operatives, suicide bombers, are pictured in heaven. You can you see their farewell speeches. Another click and you're at a site where you can download scripted talking points that validate you have religious justification for mass murder." It is believed there are as many as 5,000 jihadi sites on the Internet today. It is easy for regular readers of the sites to believe the U.S. is on the run. "It's a war of perceptions. They understand the power of the Internet. They don't have to win in the tactical battlefield. They never will. No platoon has ever been defeated in Afghanistan or Iraq. But, it doesn't matter. It's irrelevant," Custer says. [LawrenceS/CBS 4Mar07/Pelley]

CHINESE INFORMATION WARFARE TARGETS U.S. DEFENSE COMPUTER SYSTEMS Last November, a cyber attack on computer networks at the U.S. Navy War College that forced the network to disconnect from the Internet for several weeks was traced back to hackers in China. Forensic evidence indicates the hackers were attempting to steal information about war games under development at the college. Lt. Cmdr. Doug Gabos, a spokesman for the Navy Cyber Defense Operations Command in Norfolk, Va said the college's network was vulnerable because it did not have the latest security updates installed. The Chinese attacks were part of an on-going effort by Chinese hackers to gain access to sensitive U.S. networks. The attacks often come in the form of "spear phishing" attacks in which emails from seemingly inside the U.S. organization attempt to elicit information that would give attacker's access to confidential data. The Chinese also use more conventional techniques such as viruses and worms. [Harvey/USAToday 12Mar07/Swartz]

NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY RELEASES 2007 STATEMENT OF STRATEGIC INTENT The National Geospatial-Intelligence Agency (NGA) listed its strategic priorities for 2007 as: unifying NGA and the National System for Geospatial Intelligence and strengthening its partnerships across the intelligence community, advancing the geospatial intelligence mission, “help win the fight,” and attracting, challenging and retaining the highest-quality workforce in first-class working environments. NGA is also planning to develop a knowledge management system that will act as a central repository of geospatial intelligence data. Further, NGA will develop a research and development roadmap within the Office of Science and Technology, Office of the Director of National Intelligence to address the enduring problem of securing intelligence. The strategic intent stresses the agency's continued use of all sources of geospatial information, including commercial, foreign and national satellite collection, and to speed up establishing standards for sensor data, metadata, compression formats and file identifiers, to facilitate information sharing. [FCW 16Mar07/Wait]


SECTION IV - BOOKS, SOURCES AND ISSUES

Books

AT THE CENTER OF THE STORM by George Tenet, Harper Collins, ISBN: 0061147788, $27.95 After some starts and stops, the former Director of the CIA will get the chance to air his laundry on April 30th. The book, which was penned by former Tenet spokesman Bill Harlow, is a memoir of the former top man at the CIA that was originally bought up by Crown publishing for an estimated $4-$5 million. However, Crown dropped the project when Tenet refused to commit to a publication date. Harper Collins picked it up in 2005. Little advance on this book, but Tenet may have a few hatchets to bury, so its publication date could be another bad day for the Bush administration. [PJK/PopSurfing 14Mar07/Amazon/MiliwaukeeJournalSentinel 16Mar07, Sharma-Jensen]

AMERICAN SPY: My Secret History in the CIA, Watergate and Beyond by E. Howard Hunt with Greg Aunapu, Wiley, ISBN 0471789828, $25.95 The author, whose passing was marked in the WINs in January [WINS #04-07] led a storied career, beginning in the OSS after World War II, and achieved infamy for his role in the Watergate scandal. Hunt authored 70 novels under an assumed name and now tells his own story. Highlights from Hunt's life include participation in the Bay of Pigs operation, masterminding the break-in of a psychiatrist's office who was caring for Pentagon Papers source Daniel Ellsberg, and organizing with G. Gordon Liddy the break-in at the Democratic National Committee's Watergate headquarters. [PJK/DesertNews, Lythgoe/Amazon]


SECTION V - CAREERS, NOTES, LETTERS, QUERIES AND AUTHORS SEEKING ASSISTANCE, CORRECTIONS, OBITUARIES, COMING EVENTS
[IMPORTANT: AFIO does not "vet" nor endorse career offers, research inquiries or announcements. Reasonable-sounding inquiries are published as a service to members. Exercise your usual caution and good judgment when responding or supplying any information or making referrals to colleagues. Members should obtain prior approval from their agencies before answering questions that would impact ongoing military or intelligence operations - even if unclassified. Never assume public inquiries about classified projects means they've been declassified. Be attuned to false-flagging.

Careers

Career Openings at the Department of Homeland Security. Below are 5 search links to vacancy announcements for positions at DHS Headquarters, Office of Inspector General, the Preparedness Directorate, the Science and Technology Directorate, and the Domestic Nuclear Detection Office. These positions are posted on www.usajobs.opm.gov. For vacancies with DHS components including FEMA, Coast Guard, etc., please check their postings on www.usajobs.opm.gov.
Links
Positions located at DHS Headquarters
Positions located at the Office of Inspector General
Positions located at the Preparedness Directorate
Positions located at the Science and Technology Directorate
Positions located at the Domestic Nuclear Detection Office

 Translators Sought: Computing & Security Associates LLC is seeking native (preferred) or fluent translators and/or linguists in the following languages;
    - Arabic
    - Kurdish
    - Urdu
    - Pashtu
    - Somali
    - Swahili
Language teaching/instruction experience is a big plus. Must have some degree of experience in translating your native tongue to English. Four-year college degrees are preferred, but experience can be substituted. Do not have to have a clearance, but must be able to obtain one at a later time. Please send your CV/Resume or questions/comments to Carl.Stahlman@compsecllc.com or call 202.460.3183  [NortonNet]

 Counterintelligence Field Analysts Sought - (CIFA) - Strategic Counterintelligence Directorate (SCID) Support Services. Analyst Support Services. • Senior-level analyst support services. Analyst should have a minimum of 11years of related CI/Intelligence experience, with a preference for Cl, CE investigations and/or CT experience with an analysis emphasis. The candidate must possess a minimum of a Bachelors degree and preferably an advanced degree, and completed Cl analytic or other related analytic training. Candidates may be considered to satisfy this requirement through extensive experience and training.
Expectations. A Senior-level analyst is expected to have a solid core base of experience and depth of skills, which would allow them to work independently or lead a CI analytic project and represent the subject matter in DoD and outside working groups/meetings. Senior level analysts are expected to create comprehensive project plans, and to produce, edit, provide quality assurance, and brief their project/team's Cl analytic products, including presentation to high-level officials.

To provide counterintelligence (CI) analytical support in order to develop and orchestrate strategic Department of Defense (DoD) Cl efforts to systematically identify and degrade foreign intelligence and terrorist threats through the focused activities of the Military Service Cl organizations, working in collaboration with intelligence and law enforcement communities. The CIFA will provide analytical support to the Strategic Counterintelligence Directorate (SCID) in support of specific “Theater of Operations” mission requirements. The initial operational objective of the SCID is to support Foreign Internal Defense (FID) objectives by countering threats against the Coalition and military operations in Iraq.
Place. Sensitive overseas locations, in the theater of operations designated by the government; for this effort, Iraq is currently identified. Must be ready to deploy within 30 days of notification. Requirements include passports and appropriate visas. It is anticipated that the selected individuals will be ready both physically, emotionally, and all personal affairs are expected to be in order. The government will provide theater appropriate indoctrination and training. Minimum deployment time is.30 days from date of contract award thru the end of the period of performance
Shall perform intelligence, analytical and targeting support to the SCID. This includes analytical support to enable the government to conduct CI investigations and operations to identify and neutralize or influence the activities of Foreign Intelligence and Security Service (FISS), terrorist, insurgent, and other entities adversely affecting the mission. Analytical support services will also be required to conduct research and analysis and generate products that respond to individual or group taskings. The contractor shall conduct extensive research on classified and unclassified systems in order to acquire all relevant and available data, create comprehensive and actionable intelligence products, and write analytical assessments related to improving DoD understanding of terrorist activities, motivations and organizational associations. Some of the tools that will be used include traditional search tools/techniques currently in use by the intelligence community, as well as those developed for use by the CIFA. All products will be provided to the SCID Director.
Data Collection and Analysis Support Services. The contractor will be required to collect data, research and analyze the resulting raw data through the use of a variety of counterintelligence analytical tools. Data collection efforts are driven by external time-sensitive government requirements and may vary in quantity, frequency, urgency, and quality of data. CIFA anticipates the need to process approximately 200 source data collection/ analysis/ researches per week. The contractor must prepare an Assessment Report in (MS Word) for each name processed. Due to the sensitive nature of this effort, the contractor shall be provided a report format that identifies specific areas of interest to address upon contract award. Other government procedures such as email reports, web databases, and other data formats may also be specified. The contractor shall also collect, research, verify and analyze data using a variety of search tools.
• Analysis: All-source research and analysis in Counterintelligence (CI), Counterespionage(CE), Counterterrorism (CT), and Anti-terrorism/Force Protection (AT/FP); trend and link analysis; preparation of written assessments (i.e. threat or vulnerability assessments) and various memos; presentation of link charts and briefings and other finished products
• Operations: DoD-related operations support
• Investigations: DoD-related investigations support
• Collections: Requirements and Collection Management
• Analytical Tools: Search tools, link tools, peer-to-peer tools
• Liaison: Coordination with Military Services, National Intelligence agencies, Federal, State and Local law enforcement
• Special Areas: research and technology protection, critical infrastructure protection, targeting and operational planning, foreign area experts, Special Access Program (SAP)
• Familiarity and previous use of analytical tools and intelligence systems, which may include, but not
limited to, WebSafe, M-3, Anchory, LexisNexis, Cornerstone, ChoicePoint, Intelink, JRIES, Analyst
Notebook and exposure to new analytic methodologies
• Analytical training and experience to include, but not limited to, tactical, FISS, counterterrorism and experience related to the country or AOR involved
• Must be knowledgeable of and able to apply all intelligence oversight restrictions regarding US persons IAW EO 12333 and DOD 5240.1 –R.
• Must be knowledgeable of National Disclosure policies and classified information security policies and procedures
Experience. General intelligence analysis experience may be acceptable; however, CI analyst experience is preferred. All analysts assigned to this task will be required to learn and successfully utilize sophisticated information technologies and systems specifically designed for use by CIFA analysts as identified in para 6.2.
REPLIES TO: adermott@smcteam.com  703.319.9030 x 174 202.595.4218

Coming Events

27 March 2007 - Scottsdale, AZ - The Arizona AFIO Chapter holds luncheon meeting featuring FBI Counterintelligence Agent. The luncheon meeting at Buster's Restaurant at 11:30 AM will feature FBI Special Agent Lyn Anastasio speaking on the importance of counterintelligence in the US. Businesses and Universities need to be aware of foreign entities attacking US economic and national security. Special Agent Anastasio has been an agent for 10 years, working violent crime for two years and counterintelligence for eight years. Her current position is the Domain Coordinator for the FBI Phoenix Division. Please call Bill Williams (602) 944-2451 to make reservations or for additional information.

27-28 March 2007 - Fair Lakes, VA- National Military Intelligence Association Seminar on Information Operations This two-day seminar will be at the Northrop Grumman Conference Center in Fair Lakes, VA and will examine information operations and the specific types of intelligence support needed for success. The Conference will be conducted at the SECRET/NOFORN level. Presenters will include the Department of State, the Office of the Secretary of Defense, the combatant commands, the Services, and the intelligence community. Key topics include the nature and practice of strategic communications, the mission and daily operations of the Joint Information Operations Warfare Command. Confirmed speakers are Adm William O. Studeman, USN Ret.; Eliot O. Jardines, Asst DDNI for Open Source Intelligence; MG Barbara Fast, Commander, U.S. Army Intelligence Center, Ft. Huachuca, AZ; Col. George J. Franz, Commander, 704thMI Brigade, Ft. Meade, MD; Robert Giesler, Office of the Deputy Undersecretary of Defense (IWS); and Col. John Davis, USA, Commander, 1st Information Operations Command and Ambassador Brian Carlson, Office of the Under Secretary of State for Public Diplomacy and Public Affairs The Registration Fee starts at $475 for general admission. Seminar information and registration specifics can be found at https://www.123signup.com/event?id=qhdhh.

27-29 March 2007 - Provo, Utah - Brigham Young University hosts Spying in Film and Fiction Conference The David M. Kennedy Center for International Studies at Brigham Young University in Provo, Utah is sponsoring a three day conference on Spying in Film and Fiction on March 27, 28, and 29, 2007. Confirmed presenters are Christopher Andrew, well known Cambridge University historian, author, and official historian of MI5; Loch K. Johnson, widely published intelligence scholar from the University of Georgia; Wesley Wark, University of Toronto historian and frequent commentator on spy films and fiction; Frederick Hitz, former Inspector General of the CIA, lecturer at Princeton and at the University of Virginia, and author of the 2004 book, The Great Game: The Myth and Reality of Espionage; Nicholas Dujmovic, CIA historian; and Stan Taylor, organizer of the conference. The conference is free to the public although letting us know you are planning to attend would be appreciated. Inquiries about local lodging and about the conference schedule may be directed to Cory Leonard, Associate Director of the David M. Kennedy Center, at cory_leonard@byu.edu or 801-422-2980. Any AFIO member who attends will automatically be placed on a post-presentation discussion panel. If you come early or stay late, you can enjoy some excellent early Spring skiing at some of the finest ski resorts in the nation less than an hour from the Brigham Young University campus.

28-29 March 2007 - Washington, DC - DEFENSE TRANSFORMATION AND NETWORK-CENTRIC OPERATIONS Conference at NDU A National Defense University and Forces Transformation and Resources Short Course at Marshall Hall, Room 155, Fort Lesley J. McNair, Washington, DC 20319. FREE to participants. http://www.ndu.edu/info/WhatsNew/whatsnew.cfm  Program: Defense Transformation and Network-Centric Operations: A Strategic Perspective: Progression in Force Transformation, Dr. Hans Binnendijk, Director, CTNSP/NDU; Department of Defense Strategic Directions for Transformation, Mr. Terry J. Pudas, DASecDef, Forces Transformation and Resources (OUSD-P); The Theory and Practice of Network-Centric Operations for Major Warfighting by Mr. John Garstka, Assistant Director of Operations and Concepts, Forces Transformation and Resources (OUSD-P); DoD Plans and Programs for Information Networks by Dr. Stuart Starr, Sr Research Fellow, CTNSP/NDU; Resources for Force Transformation by Dr. Gordon Adams, Fellow, Wilson Center; Transforming the National Security Community by Mr. Spike Bowman, Sr Fellow, CTNSP/NDU; Applications of Network Centric Operations -- Transformation Case Study: The Stryker Brigade by Colonel Robert Ballew, USA, Transformation Strategist, Forces Transformation and Resources (OUSD-P); 1000 Transformation Case Study: The Stiletto Program by Capt Gary Edwards, USN, Transformation Strategist, Forces Transformation and Resources (OUSD-P); Transformation Case: Littoral Combat Ship by Dr. Stuart Johnson, Senior Research Analyst, RAND Corporation; Transforming the Structure of the Military: Combat Decisions – Rank, Responsibility, or Frontline Positions? by Mr. Bing West, Founder and CEO, GAMMA Corporation; Transformation for Disaster Relief: Response to Hurricane Katrina by LTC John M. Epperly, Virginia National Guard, CDR 3-116 Infantry, 1st Brigade Combat Team, 29th Infantry Division (Light); Transforming the Interagency for Complex Operations by Mr. Bernie Carreau, Senior Research Fellow, CTNSP/NDU; Wrap up and Evaluations. More information/Registration at http://www.ndu.edu/info/WhatsNew/whatsnew.cfm

Thursday, 29 March 2007 - AFIO Jim Quesada Chapter, San Francisco Bay Area Luncheon features D.C. Nath, Exec President & CEO of International Institute of Security and Safety Management on "The War on Terrorism As Seen From India." Event starts at 11:30 AM with cocktails, luncheon at noon, at United Irish Cultural Center (UICC) - St. Patrick’s Room (2nd Floor), 2700 – 45th Avenue, San Francisco, CA 94116 (45th between Sloat and Wawona). Within the broad framework of its multiparty, liberal democratic polity, comprising different ethnic group and diverse religious faiths, India has been for the last sixty years fighting the menace of terrorism of different hues – from subnational insurgency to ideologically-motivated movement to religiously-inspired jehadi terrorism of varying intensity, mostly with extra-territorial linkages and patronage. Basically, it has been an intelligence-oriented approach, followed up with dialogue and negotiation, socio-economic incentives but occasionally backed by armed action and resort to legal methods like banning illegal activities. What lessons does this approach carry for the strife-torn nations in the world? RESERVATIONS: to Mary Lou Anderson no later than 5 PM 3/23/07. Reach her at 46 Anchorage Rd, Sausalito, CA 94965, Telephone 415-332-6440 or email: mlanderson945@comcast.net

30 March 2007 - Alexandria, VA - The Centre for Counterintelligence and Security Studies (CI Centre)™ -"The Origins of FBI Counterintelligence" By retired FBI Supervisory Special Agent Raymond J. Batvinis As the world prepared for war in the 1930s, the United States discovered that it faced the real threat of foreign spies stealing military and industrial secrets—and that it had no established means to combat them. Into that breach stepped J. Edgar Hoover and the FBI. Author Ray Batvinis gives a talk about his new book, "The Origins of FBI Counterintelligence," Friday, 30 March 2007, 6:00 pm, CI Centre in Alexandria, VA. Light refreshments will be served. His book will be available for purchase at the event so you can have it signed by Ray Batvinis. The event is free. Please RSVP as space is limited. Call the CI Centre at 703-642-7450 or 1-800-779-4007 or RSVP online at http://cicentre.com/BK/fbi_batvinis_book_event.html.

Thursday, 5 April 2007 - Alexandria, VA - the CiCentre hosts Ray Semko's "D*I*C*E 2007: Unleashed" an Annual Security Awareness/Refresher Briefing - from 9:30am - Noon. Almost all organizations, whether government or private sector, have a requirement to provide a security refresher briefing every year to their personnel. For those who hold security clearances, this is mandated by the National Industrial Security Program Operating Manual (NISPOM 3-107), and records of completion have to be kept for security inspections of your facility. These briefings need to cover topics such as threat awareness, defensive security, employee reporting obligations and requirements and security procedures. Would you like to experience a D*I*C*E briefing yourself? Or are you part of a small organization who can't fill a D*I*C*E briefing? Ray Semko will premiere his D*I*C*E 2007: UNLEASHED! briefing. This is his first new briefing since he retired from the government and now that he's "unleashed," you can find out what he has to say. All attendees will receive a special certificate signed by Ray stating they've completed their annual security briefing for the year. For more information and to register to attend, go to: http://cicentre.com/dice/2007_premiere.html or call them at 1-800-779-4007 or 703-642-7450. Seating is limited.

6 April 2007 - Houston, TX - AFIO Houston Chapter event speaker confirmed Speaker to be announced later for security reasons. Registration and further details at http://afiohouston.com/contacts.html 1800h 6pm Cocktails. No tickets at the door.

10 April 2007 - Tampa, FL- AFIO Suncoast Chapter meets at 11:30 a.m. at the MacDill Surf's Edge Club/Enlisted Club (note change in location), at MacDill Air Force Base. The luncheon speaker is Porter Goss, former Director of the CIA. After graduating from Yale, Porter joined the CIA and worked as a Case Officer in the Directorate of Operations for nine years. He began his political career in local government in 1974 and went on to be elected to Congress in 1988, where he served for 16 years. Among other leadership positions he held, Porter served as Chairman of the House Intelligence Committee for 8 years. He left Congress when he was appointed DCI by President George W. Bush. He served as DCI and then Director of the CIA from September 2004 until May 2006. We are honored to have such a dedicated public servant who has been willing to answer the call to serve wherever his country needed him. Due to base security, reservations for this meeting should be received by April 1, 2007. For more information contact Don White, DonWhite@tampabay.rr.com.

Wednesday, 11 April 2007 - Las Vegas, NV - "The Islamic Terrorist Mindset - Why They Hate Us" will be the topic of the AFIO Las Vegas Chapter meeting at 6 p.m. at Nellis Air Force Base Officers' Club. PATRICK BOYLAN, a fellow AFIO member and former speaker to the Chapter, talks about the Koran, describing in its own words the deep hatred Muslims harbor for all non-Muslims from America to Indonesia, Israel to Kashmir, and Chechnya to Thailand. Boylan is known for his thought provoking presentations and articles on Islam and Terrorism and has first hand knowledge of, and experience with, the true causes of Islamic terrorism. He understands well the question that plagues so many in the Western world, "Why do they hate us?" The briefing will include a discussion on: "Shedding light on geopolitical issues that pose a threat not only to our Homeland Security but that of the entire free world." Having worked as a Geologist, and journalist Patrick is deeply familiar with the mountainous no-man's territory of western Pakistan where Osama bi Laden and his terrorists are suspected of being given safe haven. He has met and talked to a number of Mujahadeen, some of whom went on to become Taliban. He personally knew Mir Amal Kansi's brother and had lengthy conversations with him. Mr. Boylan received his Masters in Crisis and Emergency Management from the Institute for Security Studies (UNLV) and a Masters in Educational Leadership, also from UNLV, where he intends to continue and finish his Ph.D. Currently, Patrick is the founder of the Center for Strategic Analysis, a non-profit organization with an educational endeavor to make the public and government aware of the true causes of terrorism, and to be a source of insight and truth in keeping our nation safe. Register for this event no later than Friday, March 30th at Christine J. Eppley EPPLEY@nv.doe.gov or call her at 702-295-0073 if you have any questions. Place: The Officers' Club at Nellis Air Force Base. All guests must use the MAIN GATE located at the intersection on Craig and Las Vegas Blvd. Address: 5871 Fitzgerald Blvd., Nellis AFB, NV

 20 - 21 April 2007 - New London, CT - AFIO New England Chapter hosts luncheon featuring Dr. Michael Hiam, author of Who the Hell Are We Fighting? The Story of Sam Adams & the Vietnam Intelligence Wars. The Spring meeting of the David Atlee Phillips New England Chapter will gather 20 - 21 April 2007 at the Lighthouse Inn, 6 Guthrie Place, New London, CT 06320-4206, Telephone 860-443-8411, Reservations 888-443-8411, www.lighthouseinn-ct.com  Lodging is available to AFIO members at the rate of $155 plus taxes per night in the Mansion; deadline is 21 March.
As is our custom, Friday evening AFIO/NE will host a wine & cheese social 6:00 - 8:00 PM 20 April 2007 followed by a no-host dinner with our speakers at the Lighthouse Inn. The luncheon the next day is $25 per person when paid by check by April 9th or $30 at the door on a first-come-first-serve basis, as seats are available.
Our morning speakers will be the two students who won the 2006 AFIO/NE “Best Paper” competition. First will be Matthew Allatin. Recipient of the graduate student award, he recently completed his MS degree in National Security from the University of New Haven. Matthew will discuss “The al Qaeda Terrorist Organization: A Redefining Look.” This presentation will endeavor to provide an description of al Qaeda, their driving factors & a general understanding of how this terrorist group functions.
Our second morning speaker will be David Lim, recipient of the undergraduate award. He recently graduated with a BA degree in International Relations from Boston University. Next year he will enter Law School. David will discuss his paper on “Organized Crime & Terrorism.” Our Keynote Speaker Saturday afternoon will be Dr. Michael Hiam who took four years from his practice as a clinical psychologist to research & write Who the Hell Are We Fighting? The Story of Sam Adams & the Vietnam Intelligence Wars (Steerforth, 2006). The book is about CIA Analyst Samuel A. Adams. It reviews his life, career, & obsession to uncover the truth concerning the “numbers controversy” about the strength of the Viet Cong. Adams is a distant relative of the Presidents Adams. Dr. Hiam suggests there are parallels between Intelligence failures in Viet Nam then and now in Iraq He holds degrees in English & History as well as a Ph. D. in Psychology. He is a resident of Newton, MA. For further information contact Arthur Hulnick 617-353-8978.

20-22 April 07 -Weimar, Germany- 13th Annual Meeting of the International Intelligence History Association Organizers: Professor Wolfgang Krieger (Universit�t Marburg / Germany) and Professor Heiner Timmermann (Akademie Rosenhof / Weimar). It has often been said that intelligence services helped keep the peace during the cold war. But there can be no doubt that in many instances intelligence activities led to or intensified international conflict. At least two large-scale wars, in Vietnam and in Afghanistan, resulted directly from massive intelligence failures (and eventually led to further such failures). Throughout the cold war intelligence clashes produced diplomatic or political incidents, such as expelling embassy staff or formal protests against abductions or telephone wiretappings. Intelligence clashes worsened relations , at least temporarily, within each bloc, between the two blocs and with countries outside the blocs. While a fair number of such clashes have already been studied, including naval incidents and incidents relating to espionage overflights, much research is still required before we understand more thoroughly their significance in cold war history. Proposals are to be sent (by February 15th) to -- kriegerw@staff.uni-marburg.de --. Conference presentations will be limited to 25-30 minutes. While the conference organizers will attempt to provide financial assistance to the conference presenters for travel and accommodation expenses no commitment can be made in advance. For further information please consult our website at -- www.intelligence-history.org -- where administrative details will be posted shortly for all who wish to participate in this conference. (This message is also available online at www.intelligence-history.org)

23-27 April 2007 - Vancouver, British Columbia - International Association of Law Enforcement Intelligence Analysts (IALEIA)/Law Enforcement Intelligence Unit (LEIU) 2007 Annual Conference at the Hyatt Regency Hotel. These two organizations represent the largest associations representing both intelligence analysts and intelligence officers in the world; if you go to one training conference in 2007, this should be the one! This is the second joint conference involving IALEIA and LEIU; we worked together on our Annual Conference in Alexandria, VA in 2005, which was a huge success and attracted over 700 attendees. Keynote by Dr Mark Lowenthal, former CIA Assistant Director for Analysis & Production, and discussions on Future Challenges for the Intelligence Community by Dr Thomas Fingar (DNI), Director of National Intelligence Analysis/Chairman National Intelligence Council. Please visit the website for more details http://leiu-homepage.org/events/index.php David Jimenez-Director of Training, Education, and Career Development, swnmia@juno.com or jimenez@ialeia.org.

24-26 April 2007 - Arlington, VA -Terrorism Intelligence Collection and Countermeasure Seminar/Workshop Primary Speakers: Col. Valentin Aksilenko (KGB, Ret), John C. "Jack" Platt and Dr. Karl Seger. This program focuses on methods used by terrorists to collect intelligence and plan operations. Both domestic and international extremist collection methods are discussed and several case studies are presented. The workshop includes two practical exercises: a field surveillance detection exercise and a classroom exercise on Internet intelligence collection. Methods to detect and counter terrorist intelligence collection are also presented. Sponsored by Seger Consulting Group, Inc.  Tuition $1,295.00  Tuition is $995.00 if three or more people from the same organization register. Contact Karl Seger at 1-888-277-9703 or email karlseger@segercg.com, Seger Consulting Group, Inc. 1.888.277.9703

For Additional Events two+ months or greater....view our online Calendar of Events

 -----------------------------------------------------------------------

REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs: 

a)  IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list.  If this link doesn't open a blank email, create one on your own and send to afio@afio.com with the words:  REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.

 b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to afio@afio.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.

-----------------------------------------------------------------------

WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor(s) or author(s) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!

(c) 2007, AFIO, 6723 Whittier Ave, Suite 303A, McLean, VA 22101. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: afio@afio.com