AFIO Weekly Intelligence Notes #35-07 dated 10 September 2007

Click here to view disclaimers, removal, methods of use of the links in this document.

The WIN in its entirety appears below; however, the document may also be viewed online by current members with usernames and passwords at:  Usernames and Passwords appear on AFIO Membership Cards. They work only if the membership is current.


28 September 2007 - AFIO National Fall Luncheon - Holiday Inn, Tysons Corner
10:30 a.m. to 2 p.m.

Joel F. Brenner, head of the Office of the National Counterintelligence Executive (ONCIX)
on "Challenges of Globalization for National Security Interests"
John F. Sullivan,
former CIA Polygraph Division, author of GATEKEEPER: Memoirs of a CIA Polygrapher on
What you need to know about taking the pre-employment, security, lifestyle, and reinvestigation poly -
What polygraphers see, how they interpret it, and why you might have trouble with the polygraph if you do not have these insights.

Space limited. Registration here

*** 25-27 October 2007 - McLean, VA - AFIO National Intelligence Symposium  ***
at the Sheraton-Premiere Hotel, Tysons Corner, VA

The Resurgence of the Worldwide Islamic Jihad
Against the West
Understanding and Needed Response
A special multi-media tour de force - films and documentaries, experts, officials & authors, panels
What the U.S. needs to do once we are beyond all the Political Correctness

AGENDA:  View complete online Agenda here.

REGISTRATION: To sign up for the event, complete or print this online form.

HOUSING:  Special AFIO Symposium Room rate of $119 per night available for LIMITED TIME [to October 5th] at the Sheraton-Premiere Hotel. To make your room reservations quickly online at this special convention rate, use this link. To make reservations by phone, call this toll free number: 1-888-625-5144. The Sheraton Premiere is located at 8661 Leesburg Pike  Vienna, VA 22182    Phone (703) 448-1234.

WIN CREDITS FOR THIS ISSUE:  The WIN editors thank the following contributors to this issue: pjk, ls, and dh.  

All have contributed one or more stories used in this issue.  






Book Review


Coming Events

Current Calendar Next Two Months ONLY:

  For Additional Events two+ months or more....view our online Calendar of Events  


Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates. The FBI has quietly built a sophisticated, point-and-click surveillance system that performs instant wiretaps on almost any communications device, according to nearly a thousand pages of restricted documents newly released under the Freedom of Information Act. The surveillance system, called DCSNet, for Digital Collection System Network, connects FBI wiretapping rooms to switches controlled by traditional land-line operators, internet-telephony providers and cellular companies. It is far more intricately woven into the nation's telecom infrastructure than observers suspected. It's a "comprehensive wiretap system that intercepts wire-line phones, cellular phones, SMS and push-to-talk systems," says Steven Bellovin, a Columbia University computer science professor and longtime surveillance expert.

DCSNet is a suite of software that collects, sifts and stores phone numbers, phone calls and text messages. The system directly connects FBI wiretapping outposts around the country to a far-reaching private communications network. Many of the details of the system and its full capabilities were redacted from the documents acquired by the Electronic Frontier Foundation, but they show that DCSNet includes at least three collection components, each running on Windows-based computers.

The $10 million DCS-3000 client, also known as Red Hook, handles pen-registers and trap-and-traces, a type of surveillance that collects signaling information - primarily the numbers dialed from a telephone - but no communications content. (Pen registers record outgoing calls; trap-and-traces record incoming calls.) DCS-6000, known as Digital Storm, captures and collects the content of phone calls and text messages for full wiretap orders. A third, classified system, called DCS-5000, is used for wiretaps targeting spies or terrorists.

To security experts, the biggest concern over DCSNet is the possibility that push-button wiretapping opens new security holes in the telecommunications network. More than 100 government officials in Greece learned in 2005 that their cell phones had been bugged, after an unknown hacker exploited CALEA-like functionality in wireless-carrier Vodafone's network. The infiltrator used the switches' wiretap-management software to send copies of officials' phone calls and text messages to other phones, while simultaneously hiding the taps from auditing software. The FBI's DiClemente says DCSNet has never suffered a similar breach, so far as he knows. [Singel/Wired/29August2007]

Lithuania Decides to Publish KGB Documents on the Internet. The Lithuanian Genocide and Resistance Centre will publish documents on the activity of the Soviet KGB on the Internet. "The main goal of the project is to provide access to directives of various KGB directorates in the Baltic States during the period of occupation," a spokesman for the Lithuanian Genocide and Resistance Centre told Interfax on Monday. 

The main reason behind the creation of the web site was the fact that "Baltic historians are always irritated and angry over Russia's propaganda alleging that the Baltic States have never been occupied," Ricardas Cekutis said. The Lithuanian Seimas amended the law on archives and opened archives of the former Lithuanian department of the Soviet KGB and the Lithuanian Communist Party about six months ago. [Interfax/3September2007]

Lock of Che Guevara's Hair to Be Sold. A former CIA operative and Cuban exile plans to auction what he says is a lock of Che Guevara's hair, snipped before the Argentinean revolutionary and friend of Fidel Castro was buried in 1967. Gustavo Villoldo, 71, was involved in Guevara's capture in the jungles of Bolivia, according to unclassified U.S. records and other documents. He plans to auction the hair and other items kept in a scrapbook since the joint CIA-Bolivian army mission 40 years ago. The scrapbook also holds a map used to track down Guevara in Bolivia, photos of Guevara's body, intercepted messages between Guevara and his rebels and a set of Guevara's fingerprints taken before his burial. 

It's hard to predict how much the collection will net at auction because there is nothing comparable on the market, said Tom Slater, director of the Americana department at Heritage Auctions of Dallas, which will put the collection on the block Oct. 25-26.

"We cannot recall ever having seen artifacts relating to Che's dramatic career and death appearing on the auction market, and we expect this offering to excite broad bidder interest," Slater said.

The Cuban government announced in 1995 that its anthropologists had uncovered Guevara's remains from Bolivia, and re-interred them in Cuba without doing DNA testing. Villoldo and other exiles and experts say the body is still in Bolivia. [AP/2September2007]

Several Arrested in Denmark Over Bomb Plot. Denmark's Security Intelligence Service (PET) said it arrested several people in Copenhagen early on 4 September who were suspected of planning a bomb attack. The arrests were the latest in a series of cases Danish law enforcement agencies have pursued under anti-terrorism legislation passed after the September 11, 2001 attacks in the United States. In February, a Copenhagen court sentenced a Danish Muslim youth to seven years in prison for planning an attack in Europe, while clearing three others of similar charges. Prosecutors are seeking a retrial in one of the three acquittals. In April, a Moroccan-born Dane was sentenced to 3-1/2 years in prison on charges of inciting Muslims to holy war. Four Muslim men in Denmark's third-largest city, Odense, are awaiting trial on charges of plotting a bomb attack in Denmark.  [Reuters/4September2007] 

Chinese Hack Into Pentagon Computer Network. The Financial Times reported that China's military reportedly successfully hacked into the Pentagon's computer network last June, although the Chinese government dismissed the accusation as groundless. The Chinese military's cyber-attack took months of efforts, the London-based Financial Times said, citing unnamed current and former US officials. While the Pentagon declined to say who was behind the hacking, which led to the shutdown of a computer system serving the office of Defense Secretary Robert Gates, officials told the paper it was China's People's Liberation Army. One senior US official reportedly said the Pentagon had pinpointed the exact origin of the attack.

The paper quoted another person familiar with the event as saying there was a "very high level of confidence... trending towards total certainty" that the PLA was responsible.

While denying the accusations, Chinese foreign ministry spokeswoman Jiang Yu countered that there were some in the United States who were seeking to damage improving Sino-US military relations.

Reports of China hacking into German government systems were also raised last week between Chinese Premier Wen Jiabao and visiting German Chancellor Angela Merkel.

German weekly Der Spiegel reported that espionage programmes traced to the PLA had been detected in computer systems at Merkel's office, the foreign ministry and other government agencies in Berlin. [AFP/3September2007]

DNI Appoints New Vice Chairman and ADDNI for National Intelligence Council. Director of National Intelligence Mike McConnell appointed Dr. Stephen S. Kaplan as Vice Chairman and Assistant Deputy DNI for the National Intelligence Council, effective Aug. 20. For the past two years, Kaplan served in the Office of the Director of National Intelligence as the ADDNI for the President's Daily Briefing - overseeing strategic plans for its content and production, among other duties. Before joining ODNI, he worked for the Central Intelligence Agency as Director of the Office of Policy Support in the Directorate of Intelligence, and as Executive Assistant to the Director of Central Intelligence. A CIA officer for 27 years, Kaplan also ran the former Soviet Domestic and Foreign Affairs Group, the East European Division, and the agency's Tradecraft 2000 Program. He later worked as a PDB Briefer, first in the White House and then in the U.S. Department of State.

The NIC produces forward-looking assessments of national security issues for senior U.S. policymakers. It also leads the Intelligence Community's efforts to generate NIC products such as National Intelligence Estimates, the community's most authoritative statements on issues of critical concern. [PRNewswire/4September2007] 

Court Rules Vietnam War-Era CIA Records Can Remain Confidential. Judges at a federal appeals court say the CIA can keep confidential two briefing reports it gave to President Lyndon Johnson during the Vietnam War. A political scientist at UC Davis had sued the agency after it turned down his Freedom of Information Act request for the documents. The papers, known as the President's Daily Briefs, are still issued to the president and his senior staff. The 9th U.S. Circuit Court of Appeals said the CIA can keep the forty-year-old reports under wraps to protect sources and intelligence gathering methods. [MercuryNews/5September2007] 

DPRK Security Service Arrests Several Foreign Spies. The national security service of the Democratic People's Republic of Korea (DPRK) said Wednesday it had arrested several foreign spies and native citizens working for a foreign intelligence service. A spokesman for the national security service told reporters in Pyongyang that the spies used digital cameras and video cameras to collect information on the DPRK's vital military installations. The spokesman did not elaborate on the specific number or the nationality of those arrested. [XinhuaNet/5September2007] 

CIA Listened to Kremlin Sessions, KGB Head Reveals. The last head of spies in Russia, Vladimir Kruchkov, revealed in a recent interview that the US managed to plant an interception device worth 220 million dollars in the secret communications tunnel in Southern Moscow, near the Kremlin. According to Komsomolskaia Pravda, the box, using technology "Russia only dreamed of", was discovered before functioning "at full capacity".

Vladimir Kruchkov became head of KGB in 1988. In 1991, he was one of the eight opponents of Gorbachev. [Hotnews/6September2007] 

Germany Sounds Out US Over Arrest Warrants for Suspected CIA Agents. Germany's Justice Ministry is sounding out U.S. authorities over whether they would be willing to cooperate with legal proceedings against suspected CIA agents sought in the alleged kidnapping of a German citizen. The ministry sent a formal legal request over the warrants issued by German prosecutors earlier this year, a ministry spokeswoman said on customary condition of anonymity. Such requests are a common first step in dealing with international arrest warrants, she said.

Munich prosecutors issued warrants for the arrest of 13 suspected CIA agents at the end of January, accusing the unidentified suspects of wrongfully imprisoning Khaled al-Masri and causing him serious bodily harm. The Justice Ministry received the warrants in March and sent its initial request to Washington about two weeks ago, the spokeswoman said.

Al-Masri, a German citizen of Lebanese descent, maintains that he was abducted in December 2003 at the Serbian-Macedonian border and flown by the CIA to a detention center in Kabul, Afghanistan, where he was abused. He says he was released in Albania in May 2004, and that his captors told him he was seized in a case of mistaken identity.

Human rights campaigners have focused on al-Masri's story in pressing the United States to stop flying terrorism suspects to countries other than the U.S. where they could face abuse - a practice known as "extraordinary rendition." In a separate case, Italy also has issued arrest warrants for alleged CIA agents. [AP/6September2007]

Intelligence Chiefs Discuss Terror, Piracy in Inaugural Meeting. Top military intelligence chiefs from 19 nations gathered here Wednesday for the first time to discuss terrorism, maritime security and disaster relief. The first Asia Pacific Intelligence Chiefs Conference - conceived and organized by Malaysia and the United States - is chaired by Lieutenant General Michael Maples, director of the US Defense Intelligence Agency.

The chief of Malaysia's armed forces, General Abdul Aziz Zainal, said in opening remarks that threats from "alienated individuals and militant organizations" were "the new challenges confronting the 21st century."

Attending the three-day talks are representatives from Australia, Bangladesh, Britain, Brunei, Cambodia, France, India, Indonesia, Japan, Malaysia, New Zealand, Pakistan, the Philippines, Singapore, South Korea, Sri Lanka, Thailand, the United States and Vietnam. Organizers said China was invited but opted out at the last minute without giving any reason. [AFP/5September2007]


WWII British Spies Frustrated by FBI.  [Editor's note: The following article gives a decidedly British slant to relations between the FBI and the MI5 during World War II. While it is certainly biased - and even somewhat insulting - in parts, we included it in this issue because we thought readers would find it interesting, both in content and in tone. We in no way suggest the slant is accurate, but it does provide some insight into the views of at least some British concerning relations between the two agencies during World War II.] 

British spies during World War II were frustrated by the lack of information-sharing with the FBI and feared Nazi agents could infiltrate Britain through the United States, newly declassified documents reveal. Files released by the National Archives chart the rocky early years of the relationship between the U.S. and British domestic intelligence agencies and show how cooperation improved over the course of the war. 

The files on trans-Atlantic relations are part of a package of documents from the domestic spy agency MI5 - also known as the Security Service - released by the National Archives. The documents show that in 1941, before the United States had entered the war, MI5 officers were arguing for closer intelligence cooperation with the U.S. agency. They feared German agents could hide themselves among the thousands of American diplomats, military personnel, journalists and businesspeople entering the country in the wake of the Lend-Lease agreement under which the U.S. agreed to supply material support to the Allies. "The 30,000 Americans who are arriving over here and the many hundreds here already, who at the moment are subject to little control, represent a grave danger to security, and it is advocated that the FBI should send their own representative to cooperate with the British Security Authorities," wrote one official, P.E. Ramsbotham. Elsewhere, the same officer notes that "Americans are notoriously indiscreet and often find difficulty in resisting the blandishments of journalists in search for copy."

Mistrust existed on both sides. During a 1942 visit to the United States, senior MI5 officer Guy Liddell was told by a Canadian official that the FBI "think you are cagey and that you do not trust them. You ask them to make enquiries, but you do not give them the full facts of the case." The British, in turn, felt there was an "inadequate supply of information about Axis espionage cases in the United States." Steps were taken to improve relations, and by mid-1942 the two agencies had agreed to share intelligence "subject to the condition of no action without prior consultation." That December, the FBI sent Arthur M. Thurston to London as liaison officer with the British service. "Unless we are now going to show Thurston the door, with the inevitable result that cooperation between ourselves and the FBI will cease, we have got to supply him with all the information he requires," an MI5 note in the file grudgingly concedes.

Hiccups remained in the trans-Atlantic relationship. A report on relations with the FBI from May 1943 notes problems resulting from "unfortunate personalities" and "temperamental idiosyncrasies within the FBI and other U.S. intelligence departments." And communication did not always run smoothly. The newly declassified file includes a 1943 letter from FBI director J. Edgar Hoover to Sir David Petrie, the head of MI5. With scant regard for British secrecy, it was addressed to Petrie at "British Security Service, London England." British officials did not acknowledge until the 1980s that a body called the Security Service even existed. The letter eventually reached Petrie with a note attached explaining that "owing to the curious way in which this letter to you from FBI has been addressed," it had been sent to a variety of London addresses before "someone's intuition began working" and it was forwarded to MI5. 

Christopher Andrew, MI5's official historian, said the relationship between the agency and the FBI was important, and under-appreciated. "Even though J. Edgar Hoover was a difficult person to deal with, he was much happier to cooperate with MI5 than he was with the CIA," Andrew said. "I think you can call that a special relationship."  [Lawless/AP/3September2007] 

Speaking From Experience: A Former CIA Official on the Sunni Alliance. The newspapers are full of stories about the successful alliance struck between the American military and Sunni tribes in Iraq, and how said alliance augurs well for the future. "In the villages around the Abu Ghraib district on the western outskirts of Baghdad, American commanders have achieved their goal of enlisting more than 1,000 of these local Sunni recruits into the Iraqi security forces," the Washington Post reported today. "For the past few months, the recruits have operated checkpoints, pointed out Al Qaeda in Iraq fighters and located caches of weapons." Exhibit A was Naiem al-Qaisi, who had once been imprisoned and tortured by the Iraqi government. "Now," the Post reported, Qaisi "wants to be a policeman" and help America fight Al Qaeda. 

There's certainly been some benefit from such deals. However - and you wouldn't know this from reading most accounts - the long-term prospects of the American-Sunni alliance are dicey. Here's how Milt Bearden, a former senior CIA officer with broad experience in the Middle East and who served as station chief in Pakistan from 1986 until the Soviet withdrawal from Afghanistan in 1989, assessed the situation in a conversation we had this morning: 

The administration is employing a very prudent tactic by having American commanders in the field striking these alliances, which eases our immediate torment. But the administration is spinning this as some sort of strategic victory for its vision of the Middle East. It's not. The good news is that the sheiks are accepting our guns and money. The bad news is that the sheiks are accepting our guns and money. Yes, okay, go ahead and make these alliances - but understand how it's going to play out. Don't boogey in the end zone and pretend these Sunni fighters are a bunch of Presbyterians. 

When I was in Pakistan I asked an Army commander if we could get the Afghan tribes to do something and he said, "We can usually get the Afghans to do something that they want to do." In Afghanistan, the Soviets made thousands of deals with the tribes, but you don't buy them - you rent them. These guys change sides all the time. It's the same thing here. Their needs and goals are completely unrelated to our vision of the world. The sheiks figure that their turf is threatened by Al Qaeda in Iraq and they're happy to help go after them, especially when the U.S. is doing the heavy lifting. But there will be a piper that needs to be paid. You don't have to go much beyond T.E. Lawrence to see how this is likely to play out. [Silverstein/Harpers/4September2007] 

Cyberwarfare: The Mouse That Roared. A decade or so ago, thinkers and pundits were fond of discussing the emerging threat of cyber attacks as a matter of international affairs. The growing reliance of advanced economies on the internet, and the increasing use of the internet by governments and armies, seemed to offer vulnerability along with riches and convenience. The scare of the "Y2K bug" seemed to highlight the danger, at least until it became obvious that the bug was of no threat to anyone.

Now, despite preoccupation with more old-fashioned sorts of terrorism and war, is there, again, reason to fret about the cyber sort? Revelations this year that hackers successfully broke into Pentagon computers, followed by off-the-record confirmation by officials speaking to the Financial Times this week that the assailants were connected to China's army, have brought the issue back to the fore. Reports suggest that the online intruders were probably engaged in espionage, downloading information. The ability to spy is threatening enough. But hackers may also discern vulnerabilities in computer systems and inflict damage. One fear is that hackers who peeked into the American government's networks could possibly, one day, work out how to shut them down, at least for a time.

The Pentagon is presumably better able to protect itself against cyber attacks than most. Other targets have been shown to be more vulnerable. The potential impact of cyber-vandalism became obvious this year when Russian hackers unleashed the biggest-ever international cyber-assault on tiny Estonia, after the Baltic country caused offence by re-burying a Russian soldier from the second world war. "Denial of service" attacks, when huge numbers of visitors overwhelm public websites, crippled Estonian government computers. Some breathlessly called it the first direct Russian attack on a NATO member.

The Russian government claimed in that incident that the hackers were incensed ordinary Russians. But some experts said they saw Kremlin footprints. In the current Chinese case, the script has been repeated; some at the Pentagon say they can pin the attacks on the People's Liberation Army. Germany's government has protested to China's rulers, saying it too was once hacked by the PLA. Other governments, such as the British one, say that cyber-attacks are increasingly common problems. China, too, says it has been a victim of cyber-assault, and that it takes the issue seriously. In all likelihood - as with the more traditional spying of the cold war days - many countries are attempting some sort of cyber-attacks, while condemning others who do it.

Some of the more effective cyber snoops and vandals may not be government employees. Rather, as pirates would once loot on behalf of particular governments, a few of today's more effective hackers may be freelancers acting perhaps with tacit official approval. But governments are also developing capability themselves. A Pentagon report this year on China's military forces said baldly that the country was developing tactics to achieve "electromagnetic dominance" early in a conflict. It added that, while China had not developed a formal doctrine of electronic warfare, it had begun to consider offensive cyber-attacks within its operational exercises.

Cyber-attacks present an attractive option to America's foes, as a form of guerrilla or asymmetrical warfare. In 2002 the Pentagon ran a war-game with the evocative title "Digital Pearl Harbour". In it, simulated attacks showed only temporary and limited effect (for example shutting down some electricity supplies). But this week's revelation may show that America has underestimated its Chinese rival. 

The legal world has always been slow to keep up with technology, and the international law of cybercrime is no exception. The first international legal instrument on the subject was the Council of Europe's Convention on Cybercrime. It requires members to pass appropriate laws against cybercrime - including unauthorized access and network disruption, as well as computer-aided traditional crimes like money-laundering and child pornography. It also mandates a certain level of law-enforcement to prevent laxer jurisdictions from becoming cybercrime havens. But its reach is limited. It came into force in 2004 among just six Council of Europe members; others have since joined, including America at the start of this year. No other non-member of the Council of Europe has joined. This means that the Chinese shenanigans, whatever they were, continue to exist in a legal netherworld. [Economist/5September2007]

Section III - Terrorism

In Remembrance of September 11th.  The WIN Editors would like to take a moment to remember the events of 9/11. The tragedy touched and changed all our lives forever. The aftermath of the attacks also had a huge impact on the intelligence community and the way we gather, analyze, disseminate, and share intelligence. In future WINs, we will include articles on the changes and whether they are positive or negative. 

In this time of intelligence bashing and finger pointing relating to 9/11, we would like to express our gratitude to the intelligence professionals who work tirelessly and quietly to keep us safe from similar attacks.  While there will always be high profile "intelligence failures," we know there are countless undisclosed intelligence successes. We salute all the members of the intelligence community who continue to work against this difficult target. 


Book Review

World War IV: The Long Struggle Against Islamofascism, by Norman Podhoretz. For almost half a century - as a magazine editor and as the author of numerous bestselling books and hundreds of articles - Norman Podhoretz has helped drive the central political and intellectual debates in this country. Now, in this beautifully written and powerfully argued book, he takes on the most controversial issue of our time - the war against the global network of terrorists that attacked us on 9/11.

In World War IV, Podhoretz makes the first serious effort to set 9/11 itself, the battles that have followed it in Afghanistan and Iraq, and the war of ideas that it has provoked at home into a broad historical context. Through a brilliant telling of this epic story, Podhoretz shows that the global war against Islamofascism is as vital and necessary as the two world wars and the cold war ("World War III") by which it was preceded. He also lays out a compelling case in defense of the Bush Doctrine, contending that its new military strategy of preemption and its new political strategy of democratization represent the only viable way to fight and win the special kind of war into which we were suddenly plunged.

Different in certain respects though the Islamofascists are from their totalitarian predecessors, this new enemy is equally dedicated to the destruction of the freedoms for which America stands and by which it lives. But it took the blatant aggression of 9/11 to make most Americans realize that war had long since been declared on us and that the time had come to fight back. Past administrations, both Republican and Democratic, had failed to respond with appropriate force to attacks by Muslim terrorists on American citizens in various countries, and even the bombing of the World Trade Center in 1993 was treated as a criminal act rather than an act of war. All this changed after 9/11, when the whole country rallied around President Bush's decision to bring the war to the enemy's home ground in the Middle East.

The successes and the setbacks that have followed are vividly portrayed by Podhoretz, who goes on to argue that, just as in the two great struggles against totalitarianism in the twentieth century, the key to victory in World War IV will be a willingness to endure occasional reverses without losing sight of what we are fighting against, what we are fighting for, and why we have to win.  [Doubleday/September2007]


Longtime NSA Official Arthur J. Levenson. Arthur J. Levenson, 93, a former official with the National Security Agency who assisted in the British-led effort to break German codes during World War II, died Aug. 12 of lung cancer at his home in Washington.

Mr. Levenson, a mathematician by training, was born in Brooklyn, N.Y., and graduated from the Brooklyn campus of the City College of New York. After graduate work at Columbia University, he was working as a mathematician at the old National Bureau of Standards when World War II broke out.

During World War II, Arthur Levenson worked on efforts that ultimately led to the solving of the code of Germany's Enigma machine. As a member of the Army Signal Corps in 1943, he was assigned as a cryptanalyst to the British code-breaking team at Bletchley Park outside London. He worked on efforts that ultimately led to the solving of the mathematical code of Germany's Enigma machine, which created secret messages for Nazi military leaders. In a 1999 PBS documentary about the decoding project, Mr. Levenson said the team at Bletchley sometimes deciphered the German messages before German forces in the field could read them. In one case, Mr. Levenson said, the team decoded a message from German military leader Erwin Rommel and determined that German tanks were converging at a spot in Normandy where U.S. paratroopers were planning to jump. At the last moment, plans were changed, and the paratroopers averted disaster.

After the war, Mr. Levenson was part of a British and American unit sent to Germany to interrogate German cryptanalysts and to examine equipment used in developing codes.

Beginning in 1946, he worked for an Army intelligence agency that later evolved into the National Security Agency, which was created in 1952. Mr. Levenson initiated a program that recruited promising mathematics graduates to work for the NSA. He was the first chief of the NSA's Office of Advanced Analysis and later headed the A Group, devoted to analyzing communications from the Soviet bloc. Before retiring in 1973, Mr. Levenson was chief of the Machine Processing Organization, responsible for maintaining a large NSA facility containing highly specialized computer equipment. After his retirement, he helped develop data encryption techniques for the National Institute of Standards and Technology and was a consultant to IBM.

Mr. Levenson attended the National War College and received the NSA Exceptional Civilian Award in 1969. He was a member of the Cosmos Club and the New York Academy of Sciences. He had a wide-ranging intellect and was considered something of a polymath by friends. He attended lectures on mathematics, physics and string theory, and his other interests included philosophy, religion and literature, in particular the works of James Joyce. He enjoyed the music of Billie Holiday and Johann Sebastian Bach and was an early supporter of the Washington Bach Consort. He also had an encyclopedic knowledge of baseball statistics. In his 70s, Mr. Levenson set records for his age group in master's distance-running races. He ran competitively into his 80s.

Survivors include his wife of 62 years, Marjorie West Levenson of Washington; three children, David West Levenson of Warren, N.J., Sarah Stromeyer of Austin and Rebecca Levenson Smith of Silver Spring; and two grandchildren. [Schudel/WashingtonPost/5September2007] 

Coming Events

9-14 September 2007 - Oxford, United Kingdom - Christ Church Conflict Conference 2007 "The Nature of War"  The object of the 2007 Conflict conference is to study War in its various manifestations, its apparent ‘permanence as a feature of the human condition’ (Clausewitz), and the successes and failures of attempts to control it. The program looks first of the basic steps on the road to war, not least an examination of alternatives to armed conflict. Next, the different types of war: civil wars that engulfed the English-speaking world in the 17th and 19th centuries, or Bosnia in 1990; conventional warfare between nation states: the 20th century and its two world wars, guerilla wars and the conflicts of decolonization - and the uniqueness of the Falklands War of 1982. All these will come under scrutiny. The pervading granular warfare that engages us all today with the threat of terrorism, focused closely on the present Iraqi conflict. Finally there will be an examination of the outcomes of war and the inevitable social change that comes in its wake. Christ Church welcomes speakers of the highest distinction and scholarship. Speakers at the Nature of War conference are drawn from amongst political and military experts as well as the media. Amongst those participating are Professor Kenneth Hagan of the US Naval War College; Larry Hollingworth, with personal experience of the Iraqi conflict and a veteran of Afghanistan, Chechnya and East Timor; and Major-General Julian Thompson, military commander in the Falklands War. The program will be administered by Alex Webb, and her Christ Church conference team. Further information will be shortly published on the Christ Church website and an illustrated prospectus will be available. Contact Nature of War, The Steward's Office, Christ Church, Oxford, OX1 1DP, U.K. or email, telephone +44 (0) 1865 286848.

15 September 2007 - Kennebunk ME - the AFIO Maine Chapter hosts former CIA officer Tyler Drumheller. The meeting, which is open to the public, will be held at the Kennebunk Free Library, 112 Main Street, Kennebunk, at 2:00 p.m.  Further information at 207-985-2392.

19 September 2007 - Scottsdale, AZ -The Arizona Chapter of AFIO meeting features Richard W. Bloom, College Dean/Director of Terrorism, Intelligence, and Security Studies at Embry-Riddle. The chapter will hold it's meeting at 11:30 AM at Buster's Restaurant in Scottsdale. The speaker will be Dr. Richard W. Bloom, Dean of the College of Arts and Science, Professor of Political and Clinical Psychology and Director of Terrorism, Intelligence, and Security Studies at Embry-Riddle Aeronautical University in Prescott, Arizona. Dr. Bloom has worked for the United States government as an intelligence operations manager, intelligence analyst, special operations planner, politico-military planner and military clinical psychologist. He is President of the Military Psychology Division of the American Psychological Association, diplomat of the American Board of Professional Psychology (Clinical Psychology). He carries out policy analyses and reviews applied research in Aviation Intelligence, profiling of aviation security threat and assessment, terrorism, and counter terrorism, psychological warfare, propaganda and disinformation. For information and reservations contact Bill Williams at (602) 944-2451 or FIREBALLCI@HOTMAIL.COM

19 September 2007, 11:30 a.m. - Arlington, VA - Defense Intelligence Forum features Dr. Jan Goldman
speaking on Strategic Warning: Changing The Way We Look At Threats
. Dr. Goldman, an AFIO member, is the author or editor of numerous articles and books to include Ethics of Spying: A Reader for the Intelligence Professional; Words of Intelligence: A Dictionary; and the recently declassified Anticipating Surprise: Analysis for Strategic Warning. In 2006, he organized the first international conference on ethics and intelligence. He is a founding board member of the International Intelligence Ethics Association. He teaches at the National Defense Intelligence College and Georgetown University. He holds a doctorate from George Washington University, and graduate degrees from Virginia Tech and Georgetown University. RSVP by 12 September by reply email or telephone DIAA at 571-426-0098, provide your Name and the names of your guests, Your association, telephone number, email address, and menu selections (chicken, veal, or salmon). Pay at the door with a check for $25 payable to DIAA, Inc. Location: Alpine Restaurant, 4770 Lee Highway at Glebe Rd, Arlington, VA 22207. Social hour starts at 1130, lunch at 1215, program at 1300 E:

20 September 2007 - Colorado Springs, CO - AFIO Rocky Mountain Chapter features speaker Craig B. Chellis on "Adapting the Intelligence Process to Monitoring Natural Disasters". Craig is a former staffer of both NRO and CIA.. The lunch meeting is at the Falcon Room of the Officers Club, Air Force Academy. The cost is $10.00 and the lunch starts at 11:30 am. Contact Richard (Dick) Durham at 719-488-2884 or by e-mail Reservations must be made to Durham not later than September 17, 2007

Thursday, 20 September 2007; 12 noon – 1 pm - Washington, DC - iSpy: Surveillance and Power in the Interactive Era, free booksigning at the International Spy Museum Your groceries, the songs you buy for your iPod, the programs you TiVo, all these choices are added to a global data mine. Unbeknownst to the casual user of these services, this mother lode of information is already being put to use in various economic, political, and social contexts. In his new book iSpy: Surveillance and Power in the Interactive Era, Mark Andrejevic reveals how untempered public enthusiasm for new technologies offers unfettered new modes of surveillance and control. Join Andrejevic for a chilling look at the vortex in which collaborative participation becomes centralized control. Free! No registration required! Join the author for an informal chat and book signing.

20-22 September 2007 - Rochester, NY - Fourth Conference on Mathematical Methods in Counterterrorism. The event will gather together a diverse group of mathematicians and scientists from universities, national labs, the private sector, and defense agencies. They plan to include informative talks to provide background for the various subjects, papers indicating the current state of research, and
discussions that will explore future research topics. Visit for further information and registration. Publicity for previous conferences and for further information visit

20 September 2007, 6 pm - 10 pm - Tysons Corner, VA - The OSS Society hosts the William J. Donovan Award Dinner  The dinner will honor MG John K. Singlaub USA(Ret), the current Chairman of The Society, who will be the Award's 2007 recipient. The event will include The Society's own celebration of the 60th anniversary of the founding of CIA, formed after the OSS disbanded. Secretary of Defense Robert Gates has been invited to present a keynote address, and other military leaders are invited. Further details can be found by writing them at

Tuesday, 25 September 2007; 6:30 pm - Washington, DC - The Agency at 60: Former DCI & CIA Director R. James Woolsey Reflects - A Special Evening at the International Spy Museum “We have slain a large dragon, but we now live in a jungle filled with a bewildering variety of poisonous snakes. And in many ways, the dragon was easier to keep track of.”— R. James Woolsey, 1991 Former U.S. Director of Central Intelligence (DCI) R. James Woolsey headed the CIA at a time of great change and challenge. The Cold War was ending and the Agency was suffering from the recent revelation that intelligence officer Aldrich Ames was a Soviet mole. Serving as both the DCI and the CIA director, Woolsey was appointed by President Clinton to help restructure the intelligence service. During this candid conversation, the former DCI will share what it was like to head the CIA during that tumultuous time. He will draw on his tenure at the CIA and his distinguished government career to comment on the Agency as it turns 60. Woolsey will also share some of his thoughts about the future of the CIA during this intimate event. Tickets: $20 REGISTER:

26 - 27 September 2007 - The Hague, Netherlands - Netherlands Intelligence Studies Association (NISA) CONFERENCE 2008  The Netherlands Defence College (IDL), The Hague, Netherlands is the location for 'Intelligence Failures and Cultural Misperceptions: Asia, 1945 till the present' The NISA would like to invite both academic and (former) practitioners of intelligence to submit proposals for papers that entail a theoretical approach to the intelligence failures and cultural misperceptions against the backdrop of the situation in Asia since 1945. The intention of the conference organizers is to develop a more analytical perspective on the above mentioned events, rather than adding to existing descriptive narratives. Submitters are requested to send in proposals of approximately 400 words pertaining to the following subjects : The Cold War in Asia Economic espionage in and from Asia Intelligence cultures UKUSA cooperation in Asia The 'war on terror' Proposals should be submitted no later than 1 May, 2007 and can be sent to: or write to

26-27 September 2007 - Washington, DC - National Defense Intelligence College& Office of the Director of National Intelligence Conference. The theme is Intelligence Strategy: New Challenges and Opportunities. Morning Keynote:  J. Michael McConnell, Director of National Intelligence. Panel 1: What Has Intelligence Reform Accomplished? Luncheon Speaker:  Honorable James R. Clapper, Jr., Under Secretary of Defense for Intelligence. Panel 2: What Has Changed in the World? Panel 3: Performing the Mission in a Collaborative Environment. Panel 4: Removing the Barriers to Transformation. For more information visit

Thursday, 27 September 2007 - 6:00 PM - 8:00 PM - Arlington, VA - Greater DC Chapter Meeting of Society of Competitive Intelligence Professionals [SCIP]. Topic: Mapping Intelligence in a Web 2.0 World. Web 2.0 has changed some of the basic precepts on where market and competitive intelligence comes from. Traditionally the authoritative source of information came from the established media and publishing houses. Web 2.0 has introduced the concept of collective intelligence and the efficient gathering of information from the edges. This has been most prominently seen with the advent of blogging and the emergence of fringe amateur experts as respected voices on a variety of subjects. While blogging has been the most prominent shift the concept of collective intelligence is changing several industries and source of information. This talk will discuss how mapping and geographic data collection is being changed by Web 2.0 and what the repercussions will be for fields like competitive intelligence. SPEAKER is Sean Gorman, founder of FortiusOne in 2005 to bring advanced geospatial technologies to market. Dr. Gorman is a recognized expert in geospatial analysis and visualization.
LOCATION: Tivoli Restaurant1700 N Moore St, Arlington, VA
FEE: Early Bird Registration Fees (Ends September 7th) SCIP Member $30.00, Non-Member $40.00 Student $20.00 (Please contact Dionedra Dorsey for registration details) Registration Fees (After September 7th) SCIP Member $35.00; Non-Member $40.00; Student $20.00 On Site Registration Fees SCIP Member $40.00;Non Member $50.00; Student $25.00 (Please contact Dionedra Dorsey for registration details) To register now:
Registration, Networking, Food & Beverage 6:00 PM; Presentation 6:30 PM; Q & A / Networking 7:30 PM
QUESTIONS? Contact August Jackson, Greater Washington Chapter Chair, email:
Dionedra Dorsey, SCIP Chapter Relations Coordinator, email:, 703.739.0696 ext. 111

28 September 2007 - Tysons Corner, VA - AFIO National Fall Luncheon

10:30 a.m. to 2 p.m.

Joel F. Brenner, head of the Office of the National Counterintelligence Executive (ONCIX)
on "Challenges of Globalization for National Security Interests"
John F. Sullivan, former CIA Polygraph Division, author of GATEKEEPER: Memoirs of a CIA Polygrapher on
Taking the pre-employment, security, lifestyle, and reinvestigation poly -
What the polygraphers see, What it means, What you need to know.

Space limited. Registration here

and for your October planning.....  

Wednesday, 3 October 2007; 6:30 pm - Washington, DC - The Truth is Out There: Conspiracy Theories and Their Use by Intelligence Agencies at the International Spy Museum “Once contracted, conspiracy theory is an incurable condition.”—Christopher Andrew in Eternal Vigilance Do you believe the U.S. Army manufactured AIDS as a biological weapon? That Washington has been covering up UFO sightings for decades? Or that the CIA was involved in Kennedy’s assassination? If so, you are not alone. Americans are obsessed with conspiracy theories to a point that many have come to believe our democracy is really controlled by invisible forces operating behind the scenes. What makes conspiracy theories so appealing and why have they become so prevalent in this day and age? Do some of them contain a grain of truth? And who stands to gain from spreading these ideas? Join Robert Alan Goldberg, author of Enemies Within, as he unravels the mysteries of many popular conspiracy theories and International Spy Museum historian, Thomas Boghardt, who will reveal how intelligence agencies across the world have used these ingenious inventions as political weapons. Tickets: $15 REGISTER:

4 October 2007, 11:30 a.m. - San Francisco, CA - AFIO Jim Quesada Chapter hosts Lynnette Terrett, CEO Rapid Map on "The Future of Geointelligence Applications for Military, Security and Law Enforcement"
Lynette Terrett is a recognized authority in the field of GPS systems integration, geo-spatial engineering and geo-mobile computing solutions. Lynnette is Co-Founder and CEO of Rapid Map, based in Melbourne Australia. The company develops and deploys geo-spatial intelligence systems to military, federal and state law enforcement, fire, emergency response and environmental infrastructure markets worldwide. In 2004, Rapid Map entered into a joint venture with National Geographic where Lynnette has been integral in the development of products providing spatial data, environmental, health, emergency and asset management solutions for all tiers of Government in the US. Lynnette has been working with Falchion Enterprises to design implementation for advanced geo-spatial intelligence solutions for Military, DHS, Law Enforcement and Private Security organizations and to support covert operations for intelligence agencies. Lynnette’s presentation will cover technology trends as they relate to applications for geo- intelligence collections and communications, addressing the emerging requirements for military, security and law enforcement.
Cost: $25 per person, Member Rate with advance reservations or $35 per person, Non-Member Rate or at door without reservation Time: 11:30 AM No Host Cocktails; 12:00 Noon Luncheon. Place: United Irish Cultural Center (UICC) - St. Patrick’s Room (2nd Floor) 2700 – 45th Avenue, San Francisco, CA.
Please respond no later than 5 PM, 9/21/07. Reservations not cancelled by the end of the day 9/25/07 must be honored. Please send your reservation, including check made out to AFIO and your menu choice to: Mariko Kawaguchi, PO Box 117578, Burlingame, CA 94011-7578, or email her at or call (650) 622-9840 X608.

Thursday, 4 October 2007; 12 noon – 1 pm - Washington, DC - Corporate Spy: Industrial Espionage and Counterintelligence in the Multinational Enterprise at the International Spy Museum In May of 2006, PepsiCo alerted the Coca Cola Company that someone was trying to sell Coke’s secrets. An FBI sting implicated a secretary who has since been sentenced to eight years in federal prison for conspiring to steal trade secrets from the famous beverage maker. How unusual was this case? How frequently are businesses under attack? How can they protect themselves? Join Steeple Aston, PhD, author of Corporate Spy, as he uncovers the world of the corporate spies: who they are and how they operate. You’ll learn the warning signs and hear about some of the most dramatic cases of industrial espionage in recent years. Free! No registration required! Join the author for an informal chat and book signing.

 5 October 2007, 5:30 pm - New York, NY - The AFIO New York Metropolitan Chapter hosts an evening meeting to hear Haviland Smith. Smith is a retired CIA station chief having served in East and West Europe and was chief of CIA's Counterterrorism Staff. He served in Tehran, Beirut, Prague, Berlin and Washington. A classic spymaster's tour of duty. Undergraduate of Dartmouth, a Master's from University of London, both in Russian Studies. Mentioned several times (positively - uh oh) in Tim Weiner's intellectually dishonest fictive book, "Legacy of Ashes" [a skewed and laughably cherry-picked pseudo-history mistakenly taken by its own press to title itself "The History of CIA"]. In more accurate (and honest) journalist hands...those of Benjamin Weiser [same paper, but different ethical standards]...Weiser's book "A Secret Life" notes that Haviland Smith made significant contributions to the fascinating field of intelligence operations tradecraft. Haviland Smith is well-known for being a dynamic, mesmerizing speaker! Join us this evening and find out. NEW LOCATION: CLUB QUARTERS (Was the Chemist's Club), 40 West 45th St, (between 5th and 6th Aves) TIME: Doors Open 5:30 PM; Speaker 6:00 PM; Open Bar 7:00 PM to 8:00 PM; COST: $35 pp. Checks in Advance or Pay at Door. Checks: Payable to Jerry Goodwin, 530 Park Ave 15B, New York, NY 10021. RESERVATIONS: Not Required Questions? Call 212-308-1450

6 October 2007 - Seattle, WA - AFIO Pacific Northwest Chapter Meeting looks at the Air Defense Sector. The meeting features Capt Cannady, LTC Woodard, and Maj. Krueger. An outstanding program is planned with speakers from McChord AFB and the Washington National Guard. Captain Matthew Cannady is the Intelligence Officer assigned to the Western Air Defense Sector (WADS) at McChord. He will provide an in-depth briefing on the workings of the Air Defense system on the West Coast. Lt. Colonel Timothy Woodard the J2 of the Washington National Guard and Major Bill Krueger will provide a detailed briefing on the recently created 194th Intelligence Squadron. The cost of the meeting will be $25 which includes a breakfast buffet. Time: 09:30am - 1:30pm. Where: South View Lounge at the Museum of Flight. The meeting is open to anyone interested in national intelligence whether they are a member or not. The chapter welcomes family, friends and associates to attend. Please mail your checks, payable to AFIO PNW Chapter, to: AFIO PNW Chapter, 4616 25th Ave NE Suite 495, Seattle, WA 98105. Please RSVP Fran Dyer at:

Tuesday, 16 October 2007; 7 pm - Washington, DC - Syriana. Movie and post-film talk with former CIA Officer, Robert Baer. “Intelligence work isn't training seminars and gold stars for attendance…” —Bob Barnes in Syriana Corruption and power drive the plot of Syriana, a multi-layered thriller that weaves together emirs, analysts, intelligence officers, and immigrant workers. In the thought-provoking film, one commodity connects everything—oil. This shocking depiction of ruthless deals and raw emotion is inspired by the experiences of former CIA case officer Robert Baer—the screenplay is drawn from Baer’s books See No Evil and Sleeping with the Devil. Baer’s twenty-year career in the Directorate of Operations took him to assignments in Northern Iraq, Lebanon, and Tajikstan. His understanding of the Middle East shaped the film and brings a grim realism to this exploration of a double-crossing and morally skewed world. Join Baer for a special screening and discussion of the award-winning film. Program to be held at the National Portrait Gallery, Eighth and G Streets, NW Tickets: $15 REGISTER:

17-18 October 2007 - Chantilly, VA - AFCEA International Classified Fall Symposium - Top Secret SI/TK As part of an ongoing series for business executives with active intelligence community clearances, the AFCEA will be exploring Intelligence Community and National Security issues as they relate to the topic of information sharing and collaboration. The event will be held at the National Reconnaissance Office in Chantilly. Four focused sessions will address what has worked, what has not worked, and what still needs to be done. This is a critical topic requiring changes not only within the government and Intelligence Community, but also for marketing ideas for the private sector. For further details see:

18-19 October 2007 - Laurel, MD - The Symposium on Cryptologic History sponsored by the Center for Cryptologic History, to be held at Johns Hopkins Applied Physics Laboratory, Laurel, MD. WEDNESDAY, 17 October 2007 - National Cryptologic Museum Foundation General Membership Meeting
Guest Speakers: Congressman Dutch Ruppersberger and Michael McConnell, Director of National Intelligence.
THURSDAY, 18 October 2007 - 2007 Symposium on Cryptologic History theme is CRYPTOLOGY AND COMMUNITY by The Center for Cryptologic History. Topics: World War I: European Cryptology, COMINT and the World War I Blockade, COMINT at Caporetto, World War I: American Cryptology, First Time Out: SIGINT and the Punitive Expedition, Early ‘National-Departmental’ Evolution and Intelligence
Technology in the World War I Era, World War I, an Intelligence Revolution?, Cryptologic Leadership, The Four-Rotor Bombe, Personal Memories of Joe Desch, Telephone Secrecy in World War II, Computers and Cryptology, Early Technological Development in Cryptology: A First-Hand Account, Cryptography and the Birth of the U.S. Computer Industry: Some Management Observations, The Laboratory for Physical Sciences at a Half-Century.
FRIDAY, 19 October 2007 topics will be: History and Intelligence: The View from France and Germany, U.S. Army Tactical SIGINT Units in the European Theater of Operations, The Office of Censorship During the Second World War, The Leslie Howard Story: a Wartime Mystery, ALES is Still Hiss: the Wilder Foote Candidacy and What’s Wrong With It, Intelligence Assessment & Collection: Case Studies Regarding Korea during 1968-1969, History and the Technologist, The Law, the Media, and Intelligence, The Development of Case Law on Cryptology, The Media and Secrecy in American Intelligence, History and Intelligence Literature, Current Literature on Counterintelligence, NSA History Publications: Past, Present, and Future.
Speakers: Dr. William J. Williams, Chief, Center for Cryptologic History; John C. Inglis, Deputy Director, NSA; Dr. John Ferris, University of Calgary; Dr. John Schindler, Naval War College; Dr. David Hatch, Center for Cryptologic History; Mark Stout, Institute for Defense Analyses; Dr. Michael Warner, Office of Director of National Intelligence; Jennifer Wilcox, National Cryptologic Museum; Deborah Anderson; Mel Klein, NSA(Ret); James Pendergrass, NSA(Ret); James Boone, NSA(Ret); Dr. Kent Sieg, Center for Cryptologic History; Dr. David Hatch, NSA Historian, Center for Cryptologic History
Dr. David Kahn, Author of The Codebreakers; Michael Bigelow, U.S. Army Intelligence and Security Command; Dr. Larry Valero, Air Command and Staff College; Dr. Douglas Wheeler, University of New Hampshire; Dr. John Haynes, Library of Congress; Dr. Harvey Klehr, Emory University; Richard A. Mobley, Independent Scholar; Brian Snow, NSA(Ret); Kevin Powers, NSA(Ret); Dr. William Nolte, University of Maryland; Robert L. Benson, NSA(Ret); and Barry Carleen, Center for Cryptologic History.
FURTHER INFORMATION: National Security Agency Center for Cryptologic History; 301-688-2336 or at or visit
LOCATION: Johns Hopkins Applied Physics Laboratory Kossiakoff Center, Laurel, MD

19-20 October 2007 - Hampton Beach, NH - The Fall 2007 meeting of the AFIO New England Chapter will be held at the Ashworth-by-the-Sea in Hampton Beach. A full description of services as well as directions to the hotel are available at Their main speaker will be Andy Bacevisch. They will also hear from their own Gene Wojciechowski. Andrew Bacevisch was born in Normal, IL in 1947 and is a 1969 graduate of West Point. He served in Vietnam commanding an armored cavalry platoon, and later earned an MA and PhD in history at Princeton while teaching at West Point. After his army service, he taught at the Johns Hopkins University's School of Advanced International Studies before coming to Boston University, where he headed the Center for International Relations for several years. He is the author of a number of books on the US military and his op-ed pieces appear regularly in the national press. The program will begin with a Friday evening complimentary wine and cheese social at the Ashworth-by-the-Sea starting at 6:00 PM. This get-together is a wonderful opportunity to renew friendships, as well as make new ones in a relaxed informal setting. We anticipate that our speakers will join us at the social. This may be followed by a no-host dinner at local area restaurants. Our Saturday schedule is as follows 9:00 - 10:45 a.m. Meeting Registration, 11:00 - 11:20 a.m. First Speaker, 12:00 - 1:15 p.m. Luncheon,1:15 - 2:15 p.m. Keynote Speaker, 2:30 p.m. Adjournment. For additional information contact

20 October 07 - Kennebunk, ME. The Maine Chapter of AFIO will host John Robb, author of "Brave New War." Robb, a graduate of the Air Force Academy and Yale University,  has worked as a special operations counterterrorism officer and is a successful software CEO pioneering in weblogs and RSS.  He has worked, lived ,and traveled extensively throughout the world.  Over the past few years he has been analyzing guerrilla insurgencies on his blog Global Guerrillas.  Robb offers a unique insight into terrorism, global security, and U.S. vulnerabilities to this type of warfare.  The meeting, which is open to the public, will be held at the Kennebunk Free Library, 112 Main Street, Kennebunk, at 2:00 p.m.  Further information at 207-985-2392

22-26 October 2007 - The Midwest Chapter of AFIO is planning a trip to Washington, DC  The trip will run from Monday, October 22, 2007 through Friday, October 26, 2007. Plans are being made to visit the White House, the Pentagon, and the Capitol, with the possibility of laying a wreath at the Tomb of the Unknown Soldier. All other tours will be worked around the laying of the wreath and scheduled tours provided by the government. Contact Angelo DiLiberti at 847-931-4181 for more details and a registration reply form. Spaces are limited and reply forms must be submitted early for tour background checks.

23-24 October 2007 - NMIA Symposium for 2007 visits the National Reconnaissance Office - SECRET/NOFORN. Attendees must hold SECRET/NOFORN clearance. Fee: $475 pp.  Includes presentation by LTG David Deptula, A-2, HQ USAF Transformation followed by speakers on AF Cyber Command, Airborne ISR and ISR Personnel Development. Day two features Under SecDef James Clapper on “Revitalization of DOD Counterintelligence” followed by speakers from the Office of the SECDEF discussing the future of CI at military commands and the merger of CI and HUMINT. To signup visit

25-27 October 2007 - McLean, VA - AFIO National Intelligence Symposium. The AFIO National Intelligence Symposium runs Thursday, October 25 through Saturday, October 27, at the Sheraton Premiere Hotel in Tysons Corner, VA. Details to be sent directly to all members.

The Resurgence of the Worldwide Islamic Jihad
Against the West
Understanding and Needed Response
A special multi-media tour de force - films and documentaries, experts, officials & authors, panels
What the U.S. needs to do once we are beyond all the Political Correctness

AGENDA:  View complete online Agenda here.

REGISTRATION: To sign up for the event, complete or print this online form.

HOUSING:  Special AFIO Symposium Room rate of $119 per night available for LIMITED TIME [to October 5th] at the Sheraton-Premiere Hotel. To make your room reservations quickly online at this special convention rate, use this link. To make reservations by phone, call this toll free number: 1-888-625-5144. The Sheraton Premiere is located at 8661 Leesburg Pike  Vienna, VA 22182    Phone (703) 448-1234.

For Additional Events two+ months or greater....view our online Calendar of Events


Disclaimers and Removal Instructions

Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers. 

REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs: 

a)  IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list.  If this link doesn't open a blank email, create one on your own and send to with the words:  REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.

 b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.

CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link:


WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor(s) or author(s) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!

(c) 2007, AFIO, 6723 Whittier Ave, Suite 303A, McLean, VA 22101. Voice: (703) 790-0320; Fax: (703) 991-1278; Email:

Click here to return to top.