AFIO Weekly Intelligence Notes #47-07 dated 17 December 2007

Click here to view disclaimers, removal, methods of use of the links in this document.

The WIN in its entirety appears below; however, the document may also be viewed online by current members with usernames and passwords at: https://www.afio.com/pages/currentwin.htm 
Usernames and Passwords appear on AFIO Membership Cards.
They work only if the membership is current.


WIN CREDITS FOR THIS ISSUE:  The WIN editors thank the following special contributors to this issue: pjk and dh.  
All have contributed one or more stories used in this issue.  


CONTENTS

Section I - INTELLIGENCE HIGHLIGHTS

Section II - CONTEXT & PRECEDENCE

Section III - TERRORISM

Section IV - BOOKS AND COMING EVENTS

Books 

Coming Events

Current Calendar Next Two Months ONLY:

2007-2008 Events...

  For Additional Events two+ months or more....view our online Calendar of Events  

Section I - INTELLIGENCE HIGHLIGHTS

Intel Oversight Critical, Officials Say. Top U.S. military and intelligence officials met recently in Texas to discuss privacy rights among other topics during an intelligence oversight conference. Intelligence, North American Aerospace Defense Command and U.S. Northern Command officials among others met to discuss Department of Defense agencies that conduct intelligence and how to give proper oversight during an evolving technological environment, U.S. Northern Command reported.

"Intelligence oversight is a keystone of U.S. Northern Command's mission; it is mission critical," NORAD/USNORTHCOM Director of Intelligence Michael Noll said in a statement. "A significant failure of intelligence oversight would be, at a minimum, an intelligence mission failure and possibly a command mission failure. "Our structure for approaching intelligence oversight is fairly straight forward: it is a tripod - the judge advocates help us understand law and policy, the intelligence directorate trains its personnel and executes the program and our inspector general inspects the program."

Officials called safeguarding the privacy rights of U.S. persons critical to the Defense Department and that the intelligence oversight program is an effort to "ensure that all military intelligence, counterintelligence, and intelligence related activities are conducted in accordance with applicable laws, presidential executive orders and Department of Defense directives and regulations," the release said. [UPI/13December2007] 

Korean-American's Spy Conviction Stands. South Korea's Supreme Court upheld a lower court's seven-year sentence against a Korean-American convicted of spying for North Korea. Jang Min-ho, a 45-year-old naturalized Korean-American whose English name is Michael Jang, and four others were convicted earlier this year of running a spy ring since 2002 at the North's behest and passing on secrets to the communist country. The four others received sentences ranging from three to four years.

While there have been recent, dramatic moves toward reconciliation between North and South Korea, the court said in a written ruling that the North "shows no clear signs that it completely abandons its policy of a communist-led unification aimed at toppling our free and democratic regime." [AP/14December2007] 

US Man Sentenced to 18 Months in Saddam Regime Espionage Case. A man convicted of spying for Saddam Hussein's former regime and sharing information with the executed Iraqi dictator's intelligence service was sentenced to 18 months in prison, federal prosecutors said. Ghazi Al-Awadi, 78, a naturalized US citizen born in Iraq, pleaded guilty in July to acting as an agent of the government of Iraq under Saddam's regime. 

The government said that between May and November 2002, the Dearborn, Michigan man obtained information about people and groups opposed to Saddam and then provided that information to the Iraqi Intelligence Service. [Jpost/13December2007] 

Argentina, Venezuela Criticize US Over 'Spy' Arrests. U.S. prosecutors have announced the arrests of four men linked to a scandal involving an alleged campaign payment from Venezuela to Argentina. The governments of the South American nations have denounced the U.S. probe as a political attack by Washington. Federal prosecutors announced the arrests of three Venezuelans and a Uruguayan man accused of acting as undeclared agents of the Caracas government. U.S. authorities say the men came to Miami to pressure another man, Guido Alejandro Antonini Wilson, to conceal the fact that the money for a Venezuelan political campaign donation came from Venezuela's state oil company.

Antonini, who has American and Venezuelan citizenship, has been at the center of the scandal since he was caught in Argentina in August with a briefcase containing $800,000 in cash. He arrived in Miami shortly after the incident, and Argentina has asked for his extradition as part of an investigation into the money.

U.S. prosecutors say conversations between Antonini and some of the four men revealed that the money was intended for the presidential campaign of Cristina Fernandez de Kirchner. Ms. Kirchner took over the presidency earlier this week, succeeding her husband, Nestor Kirchner. In Buenos Aires, she denounced the accusations as an attempt to damage her new presidency. President Kirchner said the attacks against her will fail, and that she may be a woman, but she will not allow others to pressure her. She also vowed to maintain close ties with Venezuela's President Hugo Chavez, a fierce critic of U.S. policy in the region.

In Caracas, Venezuela's foreign minister, Nicolas Maduro, said the U.S. probe is an attempt to damage relations between Venezuela and its Latin American partners.

U.S. State Department spokesman Sean McCormack rejected allegations the operation was anything more than a criminal investigation.

The four men arrested in Miami face a fine and up to 10 years in prison if convicted on charges of acting as undeclared foreign agents. Officials say they are looking for a fifth suspect in the case. U.S. authorities have filed no charges against Antonini, whose attorney says he was unaware of the money in his luggage. [Wagner/VOANews/13December2007] 

Spy Agencies Outdo Air Force In Getting Satellite Funding. U.S. intelligence agencies are quietly spending about $7.5 billion to build a pair of older-technology spy satellites, people familiar with the matter said, at a time when more-technically-advanced military satellite projects are faltering because of budget cuts.

The classified spy project is headed by Lockheed Martin Corp. and isn't detailed in public budget documents. The price is almost double what previous spy-satellite projects are believed to have cost. The Air Force has had difficulty moving advanced projects, and the new spending highlights how control of such projects is moving away from the Air Force and toward intelligence officials.

The project is on a fast track primarily because it is designed to plug potential gaps in space-based surveillance networks, the people familiar with the matter said. The first of two massive satellites, which will replace a failed Boeing Co. project and are based on technology from the 1980s and 1990s, is slated to be put into operation by the National Reconnaissance Office, or NRO, as early as 2010, these people said. The project has been approved by congressional intelligence committees.

A Lockheed spokesman and a spokeswoman for the NRO declined to comment, as did a spokeswoman for the Director of National Intelligence.

After unsuccessful attempts to fashion joint military-intelligence satellite projects, the Air Force appears to be losing clout in creating and deploying advanced spy systems. "The way forward is really being discussed" among the intelligence agencies and "largely outside" of typical Air Force acquisition channels, Gen. Robert Kehler, the new head of Air Force Space Command, said in a recent interview.

The trend gained momentum in 2006, after Pentagon and intelligence officials canceled a big chunk of work on a troubled Boeing spy-satellite contract. The project was as much as $5 billion over budget. [Pasztor/WallStreetJournal/7December2007] 

China Link Suspected In Lab Hacking. A cyber attack reported by one of the federal government's nuclear weapons laboratories may have originated in China, according to a confidential memorandum distributed to public and private security officials by the Department of Homeland Security.

Security researchers said the memorandum included a list of Web and Internet addresses that were linked to locations in China. However, they noted that such links did not prove that the Chinese government or Chinese citizens were involved in the attacks. In the past, intruders have compromised computers in China and then used them to disguise their true location.

Officials at the lab, Oak Ridge National Laboratory in Tennessee, said the attacks did not compromise classified information, though they acknowledged that they were still working to understand the full extent of the intrusion.

The Department of Homeland Security distributed the confidential warning to computer security officials on Wednesday after what it described as a set of "sophisticated attempts" to compromise computers used by the private sector and the government.

Government computer security officials said the warning, which was issued by the United States Computer Emergency Response Team, known as US-CERT, was related to an October attack that was also disclosed last week by officials at the Oak Ridge laboratory. According to a letter to employees written by the laboratory's director, Thom Mason, an unknown group of attackers sent targeted e-mail messages to roughly 1,100 employees as part of the ruse.

In a statement posted on the laboratory's Web site, the agency stated: "The original e-mail and first potential corruption occurred on October 29, 2007. We have reason to believe that data was stolen from a database used for visitors to the Laboratory."

The laboratory said the attackers were able to gain access to a database containing personal information about visitors to the laboratory going back to 1990.

The US-CERT advisory, which was not made public, stated: "The level of sophistication and the scope of these cyber security incidents indicate that they are coordinated and targeted at private sector systems." The US-CERT memo referred to the use of e-mail messages that fool employees into clicking on documents that then permit attackers to plant programs in their computers. These programs are then able to copy and forward specific data - like passwords - to remote locations.

Despite improvements in computer security, phishing attacks are still a big problem. In the case of the Oak Ridge intrusion, the e-mail messages were made to seem authentic. One described a scientific conference and another referred to a Federal Trade Commission complaint.

Computer security researchers cautioned that despite the US-CERT description of the attacks as sophisticated, such threats are frequently undertaken by amateur computer hackers.

Classified federal computer networks are not supposed to be physically connected to the open Internet. Even so, sensitive data like employee e-mail databases can easily be compromised once access is gained to computers inside federal agencies. [Markoff/NewYorkTimes/8December2007] 

Canadian Report Says: Use Spies to Collect Foreign Intelligence or Rely on Unreliable Allies. A new report is urging the Canadian government to start using its own spies to collect foreign intelligence instead of relying on possibly "misleading or biased" information from allies. The report, commissioned by the Canadian Defense and Foreign Affairs Institute, says allied intelligence is "collected by them for their own reasons, not Canada's." The report's author, University of Calgary Prof. Barry Cooper, says that compromises Canadian sovereignty. He says it also helps ensure that Canadian foreign policy remains reactive and renders the country a "soft target" for espionage and terrorist activity. His report calls for the creation of a Canadian foreign intelligence service - separate from CSIS - that uses agents, or spies, to collect secret foreign intelligence. 

Canada is the only G8 nation unable to use agents to gather foreign intelligence.

The Conservatives promised in the 2006 election campaign to create a foreign spy agency but there has been little talk and no apparent movement on the issue since.  [CanadianPress/15December2007] 

Former Boeing Subsidiary Employee Claims Company Flew Secret CIA Torture Missions. A former employee of a Boeing subsidiary accused of helping the CIA secretly fly terrorism suspects to overseas prisons where they were tortured says the company didn't try to hide what it was doing. That revelation comes through court papers filed in an American Civil Liberties Union lawsuit against the company.

The government has asked a federal judge to throw out the suit against Jeppesen Dataplan on grounds that a trial could reveal government secrets. The ACLU counters that the program has already been made public by "documentary evidence and eyewitness testimony." The civil liberties group provides testimony from a former Jeppesen employee who recalls a company official telling workers about the so-called "torture flights." He quotes the official as saying the flights paid well.
[FoxNews/15December2007] 

Iran Protests to Azerbaijan Over Spy Trial. Iran angrily protested to Azerbaijan and summoned its ambassador over "baseless" accusations that Iranian secret services were plotting a coup in the former Soviet republic.

A court in Azerbaijan on December 10 convicted a group of more than a dozen people on charges that they had been cooperating with Iranian special services to mount a coup against the government of President Ilham Aliyev. "It is a baseless allegation leveled at the Islamic Republic of Iran," foreign ministry spokesman Mohammad Ali Hosseini told reporters. "Unfortunately it is supported by wide propaganda." The alleged chief plotter Said Dadashbeyli was sentenced to 14 years in prison while 14 others were handed sentences of between two and 14 years. Members of the group were arrested in January and charged with high treason, plotting a coup, being in possession of illegal weapons and manufacturing false documents. No other details of the alleged plot have emerged. The verdict was announced after a two-month trial held behind closed doors on state security grounds.

The Iranian foreign ministry also summoned the Azeri ambassador to Tehran Abbasali Hassanov, calling for a formal apology from Azeri officials for the statements made against Iran, the official IRNA agency reported.

Hosseini blamed Iran's foreign enemies for plotting to damage the ties between Iran and its fellow Shiite northern neighbor. [AFP/15December2007] 

Germany Says Large Number of Russian Spies in Germany. Every third Russian diplomat who is accredited in Germany is a spy and leading secret service agent, Germany's domestic Verfassungsschutz intelligence agency (BfV) announced on 15 December. Some 120 out of a total of 360 Russian diplomats stationed in Germany are employed by Russia's foreign SWR secret service, the federal FSB counter-intelligence agency and the military GRU secret service.

The top German intelligence official stressed that Russia's secret service apparatus was still placing "highest priority on all facets of political espionage."

According to the BfV official, Russia's political espionage is focusing on German foreign, domestic and economic policies as well as the nation's security and energy, NATO and European policies.

Russian secret service agents are reportedly pinpointing German lawmakers and members of their bureaus as well as political parties and foundations for their spying activities. [IRNA/15December2007] 

Chinese Cyberwarfare. Congress passed legislation this week requiring the Pentagon to report on China's growing computer-warfare capabilities when producing assessments of Chinese military power.

The fiscal 2008 National Defense Authorization Act, passed on 14 December 2007 by the House, contains a provision requiring the annual Military Power of the People's Republic of China report to include a new section on Beijing's "efforts to acquire, develop and deploy cyberwarfare capabilities" in its assessments of China's "asymmetric" warfare capabilities.

The legislation comes as reports of aggressive Chinese military-origin computer hacking were detected in recent months at U.S. defense and military sites in the United States and Europe. The Department of Homeland Security earlier this month sent out a circular that warned about a sophisticated computer attack on Tennessee's Oak Ridge National Laboratory in October that it said likely originated in China.

U.S. intelligence officials said China's military has a large-scale program to attack U.S. computer systems, both military and civilian, as part of efforts to cripple war-fighting capabilities in a conflict. The efforts include the use of viruses, prepositioned electronic network doors and denial-of-service attacks. The Chinese military also conducts intelligence-gathering through computer penetrations.

The cyberwarfare provision is part of the $696 billion bill that is expected to be passed by the Senate and then signed by the president in the next few days. The House-Senate conference report also contains language expressing concerns about the large-scale Chinese military buildup.

China could become a military competitor, and the report noted China's anti-satellite-weapon test in January and the provocative surfacing of a Chinese submarine near the aircraft carrier USS Kitty Hawk in October 2006 "demonstrated such potential."

Congress called on the secretary of defense "to expand efforts to develop an accurate assessment and understanding of China's strategic military modernization and strategic intentions, particularly with regard to its sea- and space-based strategic capabilities," the report said, in what defense officials said is a slap at poor U.S. intelligence assessments of China's military.  [Gertz/WashingtonTimes/15December2007] 

MI6 Asks For Secrecy Order in Murder Trial of Financial Trader. The Secret Intelligence Service, MI6, is behind a virtually unprecedented attempt to hold a British murder trial in secret. The home secretary, Jacqui Smith, has been asked to sign a public interest immunity certificate - a gagging order - at the request of the agency, which is responsible for spying and recruiting agents abroad. It is also involved in money laundering investigations.

Wang Lam, 45, a financial trader from Hampstead, north-west London, who was arrested in Switzerland, is accused of murdering an 86-year-old recluse, Allan Chappelow, who lived in the Hampstead area. The body was discovered after £10,000 reportedly went missing from the victim's bank account.

A secret hearing at the high court last week was adjourned until the new year. The Crown Prosecution Service will then apply for the entire trial, or large parts of it, to be held with press and public excluded. The CPS refused yesterday to confirm the reason for its rare application, and the Home Office refused to comment on reports that the defendant had acted as an informant.

The CPS said the move was "in the interests of justice" and the Home Office said it would not talk about PII certificates. Although MI6 is answerable to the foreign secretary, Smith was asked to sign the PII certificate because the Home Office is responsible for the conduct of criminal trials in the UK. Lam is defended by Kirsty Brimelow and Geoffrey Robertson QC, who came to prominence in the 1992 Matrix Churchill case, in which PII certificates were involved. In that case defendants were cleared of charges of arms dealing with Iraq, after disclosure of their links with British intelligence.

PII certificates are generally used to conceal evidence involving national security, intelligence methods, or undercover informants. It is extremely unusual to attempt to keep secret an entire trial, especially when it is not a spy case.

The trial judge can refuse to accept the reasons for a PII certificate, if the defence asks for the trial to take place in public in the normal way. It is also open to the media to challenge such a secrecy order. [Leigh&Norton-Taylor/TheGuardian/15December2007] 

Engineer Indicted On Spying. A former U.S. defense contractor spent more than two years working with China's military to design and test a radar-evading component for a new Chinese cruise missile as part of an espionage conspiracy, according to a federal indictment.

The indictment of Noshir S. Gowadia, an Indian-born engineer, was submitted to U.S. District Court in Hawaii in October and states he worked closely with a Chinese government agent and missile technicians to illegally supply the stealth-missile technology during six visits to China between 2003 and 2005.

The new indictment added two additional counts to two earlier federal charge sheets in the case and states Mr. Gowadia conspired with Wong Tong-ming, an agent working for Beijing's Foreign Experts Bureau, and others to supply defense technology secrets for cash. The men set up "covert e-mail addresses" that were used to send classified defense data as part of the cruise missile conspiracy, according to the indictment.

Mr. Gowadia worked at Northrop Grumman from 1968 to 1986 and participated in developing the still-secret propulsion system used on the B-2 stealth bomber. He later worked as a defense contractor.

The indictment provides the first details on how Mr. Gowadia purportedly helped build China's new land-attack cruise missile in exchange for $110,000.

China's stealth cruise missile is a new strategic weapon that is a key element of China's major military build-up.

According to the indictment, Mr. Gowadia designed the new missile to be capable of evading U.S. air-to-air missiles. The indictment revealed that Mr. Gowadia's work on the exhaust nozzle between April 2004 and June 2004 used U.S. data to show the exact "lock on range" of the new Chinese missile from a pursuing U.S. air-to-air missile.

The new indictment includes 21 counts of conspiracy to commit espionage, violations of arms export control laws, unlawful retention and transmission of defense information, money laundering and tax evasion.

Mr. Gowadia pleaded not guilty to the charges. His trial is set for Oct. 7. [Gertz/WashingtonTimes/12December2007] 


Section II - CONTEXT & PRECEDENCE

CIA Has Recruited Iranians To Defect. The CIA launched a secret program in 2005 designed to degrade Iran's nuclear weapons program by persuading key officials to defect, an effort that has prompted a "handful" of significant departures, current and former U.S. intelligence officials familiar with the operation say. The previously undisclosed program, which CIA officials dubbed "the Brain Drain," is part of a major intelligence push against Iran ordered by the White House two years ago. 

Intelligence gathered as part of that campaign provided much of the basis for a U.S. report released last week that concluded the Islamic Republic had halted its nuclear weapons work in 2003. Officials declined to say how much of that intelligence could be attributed to the CIA program to recruit defectors. 

Although the CIA effort on defections has been aimed in part at gaining information about Tehran's nuclear capabilities, its goal has been to undermine Iran's emerging capabilities by plucking key scientists, military officers and other personnel from its nuclear roster. Encouraging scientists and military officers to defect has been a hallmark of CIA efforts against an array of targets since the height of the Cold War. But officials said those programs did not generally seek to degrade the target's capabilities, suggesting that U.S. officials believe Iran's nuclear know-how is still thin enough that it can be depleted.

The program has had limited success. Officials said that fewer than six well-placed Iranians have defected, and that none has been in a position to provide comprehensive information on Tehran's nuclear program. 

The CIA effort reflects the urgency with which the U.S. government has sought to slow down Iran's nuclear advances, as well as the importance Washington attaches to finding human sources who can help fill intelligence gaps left by high-tech collection methods such as satellites and electronic eavesdropping equipment. The program was described by officials on condition of anonymity because of the sensitivity of the effort. 

The White House ordered the stepped-up effort in hopes of gathering stronger evidence that Tehran was making progress toward building a nuclear bomb. The Bush administration "wanted better information" on Iran's nuclear programs, said a U.S. official briefed on the expanded collection efforts. "I can't imagine that they would have ever guessed that the information they got would show that the program was shut down," the official said. 

That was the central finding of the comprehensive intelligence report released last week. The National Intelligence Estimate on Iran contradicted previous intelligence assessments and undercut assertions by the Bush administration. The new report, which represents the consensus view of all 16 U.S. intelligence agencies, also concluded that Tehran "at a minimum is keeping open the option to develop nuclear weapons" and continuing to pursue civilian nuclear energy technologies that could help it make a bomb. 

A CIA spokesman declined to comment on the effort to cultivate defectors, saying "the agency does not comment on these kinds of allegations as a matter of course."

White House reversal

The administration's decision to step up intelligence collection on Iran in 2005 was a reversal from a position the White House took after President Bush was first elected. Former CIA officials said that the agency had built up a large Iran Task Force, made up of nearly 100 officers and analysts at headquarters, by the end of the Clinton administration. But that office shrank to fewer than a dozen officers early in the Bush administration, when the White House ordered resources shifted to other targets. 

"When Bush came in, they were totally disinterested in Iran," said a former CIA official who held a senior position at the time. "It went from being a main focus to everything being switched to Iraq." 

Asked about decisions to reduce the size of the Iran Task Force, CIA spokesman Paul Gimigliano said: "Iran has been an issue of priority to the United States for a long time. You shouldn't assume that a single unit of any size reflects the complete level of effort. That would be a mistake." 

Even as the task force shrank, officials said, other CIA units, including its counter-proliferation division, continued to track Iran's procurement networks and other targets.

Some of that reduced task force capacity has been restored, former CIA officials said. Two years ago, the agency created an Iran division within its overseas spying operations, applying to a single country resources and emphasis usually reserved for multinational regions. 

The stepped-up effort went beyond the CIA, and has also involved the National Security Agency, which eavesdrops on other countries' communications, and the National Reconnaissance Office, which operates spy satellites. 

The defector program was put in place under CIA Director Porter J. Goss, who has since left. The agency compiled a list of dozens of people to target as potential defectors based on a single criterion, according to a former official involved in the operation: "Who, if removed from the program, would have the biggest impact on slowing or stopping their progress?" 

The rewards for defectors can be substantial, including relocation to another country and lifetime financial support.

In the two years since it was launched, the program has led to carefully orchestrated extractions of a small group of Iranian officials who operated in the mid- to upper tiers of the Islamic Republic's nuclear programs. 

None of those who defected was considered essential to the nuclear program, nor were they able to provide comprehensive descriptions of Iran's efforts, officials said.

"Did they have replacements for these people? Any country would have," the former official involved in the operation said. "But we did slow the program." 

The identities of the defectors have been carefully protected. However, there was speculation this year of CIA involvement in the apparent defection of a former Iranian deputy defense minister, Ali Reza Asgari, who went missing in February during a visit to Turkey. 

At the time, Iran's top police chief was quoted in the official news agency as saying that Asgari probably had been kidnapped by operatives working for Western intelligence services. Asgari was believed to have extensive knowledge of Iran's conventional weapons program as well as its ties to the militant Shiite Muslim group Hezbollah in Lebanon. 

But Asgari was not thought to be involved in Iran's nuclear program, and the CIA, when pressed by congressional officials about the matter, adamantly denied involvement in the Iranian general's disappearance. 

Officials declined to discuss the whereabouts of the defectors, or details regarding the methods used to approach them. The former senior U.S. intelligence official said that potential defectors had not been approached directly by the CIA, but through other contacts the agency has cultivated inside the country. 

Often, the former official said, there are as many as "three degrees of separation" between agency personnel and those targeted for approach, and that each of those interim contacts had to be thoroughly vetted before a planned approach was approved. Those who have left Iran have been debriefed and relocated either by the CIA or with the help of allied intelligence services, the former official said. 

The CIA program was implemented after significant debate between the White House and the agency over its size and scope, officials said. National Security Council officials urged the CIA to make the program as broad as possible, and to spread word through Iranian networks that the United States was prepared to help officials leave the country and relocate. 

But CIA officials fought to keep the program narrowly targeted to avoid catching the attention of Iran's intelligence service. Even at that, CIA officials assumed that Iran's service was keeping close watch on key officials in the nuclear program, and that potential defectors could be decoys. 

The "Brain Drain" program is among the latest in a long series of efforts to shore up U.S. intelligence on Iran. It was launched at a time when a presidential commission was preparing a scathing report on the inadequacies of U.S. intelligence on Iran and other nations suspected of having nuclear, chemical or biological weapons.

U.S. intelligence officials said the information that surfaced this summer prompting the reevaluation of Tehran's nuclear weapons program centered on intercepts of Iranian government officials' conversations and the seizure of a journal that contained notes documenting the country's decision to shut down its weapons research. 

During a briefing with reporters last week, a senior U.S. intelligence official said that Iran was "the hardest intelligence target there is."

"I mean, by comparison, North Korea is an open and transparent society," the official said. 

History of setbacks

U.S. intelligence on Iran has been beset by setbacks stretching back more than two decades. The CIA has had no permanent presence in the country since the United States broke diplomatic ties with the country - and removed embassy personnel, as well as CIA officials who operated under diplomatic cover - after the 1979 Islamic Revolution. 

Afterward, the agency began recruiting sources in Europe and elsewhere, in cities where there are large populations of Iranian expatriates who travel to and from the country. But the effort has been marked by failures. 

In 1989, Iran's intelligence services broke up a network of agents in the country that was being directed by a CIA station in Germany known as "Tefran," for Tehran-Frankfurt. When that station was shut down, much of the collection work was shifted to Los Angeles, where there is a large population of Iranian immigrants, many of whom visit their home country. [Miller/LATimes/9December2007] 

A FISA Fix. [The following article is by Michael B. Mukasey, the Attorney General of the United States.] One of the most critical matters facing Congress is the need to enact long-term legislation updating our nation's foreign intelligence surveillance laws. Intercepting the communications of terrorists and other intelligence targets has given us crucial insights into the intentions of our adversaries and has helped us to detect and prevent terrorist attacks. 

Until recently, our surveillance efforts were hampered by the unintended consequences of an outdated law, the Foreign Intelligence Surveillance Act, which was enacted in 1978 to establish a system of judicial approval for certain intelligence surveillance activities in the United States. 

The requirement that a judge issue an order before communications can be intercepted serves important purposes when the target of the surveillance is a person in our country, where constitutional privacy interests are most significant. The problem, however, was that FISA increasingly had come to apply to the interception of communications of terrorists and other intelligence targets located overseas. In FISA, Congress had embedded the crucial distinction between whether targets are inside or outside our country, but did so using terms based on the technology as it existed then. However, revolutionary changes in communications technology in the intervening years have resulted in FISA applying more frequently to surveillance directed at targets overseas. The increased volume of applications for judicial orders under FISA impaired our ability to collect critical intelligence, with little if any corresponding benefit to the privacy of people in the U.S.

This summer, Congress responded by passing the Protect America Act. That law, passed with significant bipartisan support, authorized intelligence agencies to conduct surveillance targeting people overseas without court approval, but it retained FISA's requirement that a court order be obtained to conduct electronic surveillance directed at people in the United States. As J. Michael McConnell, the director of national intelligence, stated, the new law closed dangerous gaps that had developed in our intelligence collection. Congress, however, set the act to expire on Feb. 1, 2008. 

It therefore is vital that Congress put surveillance of terrorists and other intelligence targets located overseas on surer institutional footing. The Senate Intelligence Committee has crafted a bill that would largely accomplish that objective. Recognizing the uncommon complexity of this area of the law, the committee held numerous hearings on the need to modernize FISA, received classified briefings on how various options would affect intelligence operations and discussed key provisions with intelligence professionals and with national security lawyers inside and outside government. This thorough process produced a balanced bill approved by an overwhelming, and bipartisan, 13-2 vote. 

The Senate Intelligence Committee's bill is not perfect, and it contains provisions that I hope will be improved. However, it would achieve two important objectives. First, it would keep the intelligence gaps closed by ensuring that individual court orders are not required to direct surveillance at foreign targets overseas. 

Second, it would provide protections from lawsuits for telecommunications companies that have been sued simply because they are believed to have assisted our intelligence agencies after the 9/11 attacks. The bill does not, as some have suggested, provide blanket immunity for those companies. Instead, a lawsuit would be dismissed only in cases in which the attorney general certified to the court either that a company did not provide assistance to the government or that a company had received a written request indicating that the activity was authorized by the president and determined to be lawful. 

It is unfair to force such companies to face the possibility of massive judgments and litigation costs, and allowing these lawsuits to proceed also risks disclosure of our country's intelligence capabilities to our enemies. Moreover, in the future we will need the full-hearted help of private companies in our intelligence activities; we cannot expect such cooperation to be forthcoming if we do not support companies that have helped us in the past. 

The bill that came out of the Senate Intelligence Committee was carefully crafted and is a good starting point for legislation. Unfortunately, there are two other versions of the bill being considered that do not accomplish the two key objectives. The House of Representatives recently passed a version that would significantly weaken the Protect America Act by, among other things, requiring individual court orders to target people overseas in order to acquire certain types of foreign intelligence information. Similarly, the Senate Judiciary Committee made significant amendments to the Senate Intelligence Committee's bill that would have the collective effect of weakening the government's ability to effectively surveil intelligence targets abroad. 

Moreover, neither the House bill nor the Senate Judiciary Committee's version addresses protection for companies that face massive liability. Both the Senate Judiciary Committee amendments and the House bill passed largely on party lines, and the full Senate will be debating this issue shortly. 

Congress must choose how to correct critical shortcomings in our foreign intelligence surveillance laws. It is a time for urgency: The Protect America Act expires in just two months, and we cannot afford to allow dangerous gaps in our intelligence capabilities to reopen. But this is also a time of opportunity, when we can set aside political differences to develop a long-term, bipartisan solution to widely recognized deficiencies in our national security laws. When Congress returns to this challenge, it should continue on the course charted by the Senate Intelligence Committee. [Mukasey/LATimes/12December2007] 


Section III - TERRORISM

Top British Terror Suspect Escapes. The alleged British terrorist mastermind behind a plot to simultaneously blow up at least 10 transatlantic airliners in an atrocity that had the potential to dwarf 11 September escaped from a court in Pakistan. Rashid Rauf slipped his handcuffs and fled after appearing at a court in Islamabad, Pakistan, where his lawyers were protesting against requests for his extradition. 

Rashid Rauf's escape now threatens to spark a major diplomatic row by re-igniting questions about why Pakistan's authorities had not approved his extradition, despite repeated requests from Britain dating back more than a year. Britain has been at pains to claim that Pakistan's President, Pervez Musharraf, is a key ally in targeting Islamist terrorism and someone who has played a vital role in sharing information between the countries' intelligence communities. But the fact Rauf was able to escape so easily will raise questions about the security status given to him by the Pakistani authorities.

It is also likely to inflame relations with the US. Pakistani media claims the CIA was preparing to 'render' Rauf when details of the alleged airliner plot emerged in August 2006. Alarmed at the US's attempts to grab Rauf, Britain's intelligence services, who had been monitoring the plot, swooped, arresting more than 20 suspects in the largest security operation of its kind.

Now the news that Rauf is at large threatens tensions between the UK and US authorities who believed their transatlantic counterparts should have moved to pick up the alleged plot's ringleaders far earlier.

Rauf is alleged to have played a key role in presiding over an audacious plot to detonate explosions on 10, possibly more, transatlantic jumbo jets in August 2006. But though picked up by the Pakistan intelligence service, the ISI, before the plot had been made public, Rauf was not extradited to Britain. 

Rauf, who denies any connection with the terrorist plot, was held in Pakistan on charges of being in possession of false identity papers and bomb-making materials. But he was also wanted in the UK for questioning in connection with the murder of his uncle in Birmingham in 2002. It was on these grounds that his extradition was being sought.

Recently there were suggestions that Rauf was to be traded for two terrorist suspects wanted by the Pakistan authorities. Last week the UK arrested Faiz Baluch, 25, and Hyrbyair Marri, 39. The men are alleged to be terrorists who want separation for Baluchistan, a province of Pakistan. The British government said there was no link between its demands for the extradition of Rauf and the pair's arrest.  [TheObserver/Guardian/15December2007] 


Section IV -  BOOKS AND COMING EVENTS

Books

Book Exposes Coward's Double Life as Secret Agent - The Letters of Noel Coward, by Noel Coward, edited by Barry Day.  [Random House, November 2007, 800 pages.] [Random House, November 2007, 800 pages.]

The late, much-celebrated Noel Coward was a playwright, screenwriter, actor, singer, composer, director, cabaret star, raconteur, world traveler, society darling, social gadabout and a genius to many while a nuisance to others.

But few people knew he spent much of World War II as a spy.  He was doing undercover work before and during World War II for the Brits at the request of Lord "Dickie" Mountbatten, a cousin of England's King George VI, which is but one of the many fascinating things revealed in the constantly intriguing "The Letters of Noel Coward," just published by Knopf, edited and with additional commentary by Coward historian Barry Day.

Not only was Coward a man who wrote works as diverse as "Private Lives," "Cavalcade" (which was turned into an Oscar-winning best picture), "Blithe Spirit," the song "Mad Dogs and Englishmen" and "Brief Encounter" - as well as one of the great, muscular war stories to come out of the war, 1942's "In Which We Serve" - he apparently also was knee deep in political intrigue before and during that war, which required him to keep so mum about it that even his closest family members and friends didn't know.

Furthermore, as correspondence with Mountbatten in the book reveals, Coward was asked to behave in the superficial manner of his public image at all times, in order to keep anyone from suspecting his true motives. That behavior, in turn, led to heavy criticism of Coward for behaving like an uncaring, out-of-touch fop at a time his country was being bombarded and blitzed by the Nazis. 

The book is a gold mine of information, encompassing letters Coward both wrote and received between 1912, when he was 13, and 1973, the year of his death. The addressees are a virtual who's who of world leaders and theatrical icons including Winston Churchill (who was always a bit leery of Coward, which Day suspects was the result of homophobia), Alfred Lunt and Lynn Fontanne (Coward's closest chums, though they did go through periods of chilly silences), Marlene Dietrich (who writes him harrowing letters during a time she was besotted with Yul Brynner), Vivien Leigh and Laurence Olivier, Lauren Bacall, Gertrude Lawrence, John Osborne, Terence Rattigan, Mary Martin and Britain's Queen Mother, just for starters. [Reuters/Osborne/11December2007] 


Coming Events

EVENTS IN COMING TWO MONTHS OF 2007-08....

Friday, 4 January 2008, 5:30 - 9 pm - New York, NY - AFIO NY Metro Chapter hosts Prof. Arthur Hulnick, former CIA, on "Intelligence Reform: Fix, Fizzle or Flop?" Congress passed and the President signed the "Intelligence Reform & Terrorism Prevention Act of 2004" in late 2004 largely as a result of the 9/11 Commission Report, a report that was completed in July 2004. This "Act" was activated in April 2005, creating the Director of National Intelligence and an agency that now has about 1500. employees and is headed currently by John McConnell. Now almost 2 1/2 years later, how effective has this effort been? Professor Hulnick is uniquely qualified to discuss this issue. His talk will be a fascinating insight into whatever progress has been accomplished to date as well as providing suggestions for future actions. Professor Hulnick's published his first book "Fixing the Spy Machine" in 1999. In 2004, he published his second book about the CIA "Keeping US Safe: Secret Intelligence and Homeland Security." This latter book examines what is really necessary to make intelligence and homeland security more efficient and competent, both within the United States and abroad.
Location: University Club 1 West 54th Street New York, NY 10019 (Corner of 54th Street and 5th Avenue). Cost: $40.00 per person. Payable in advance by check to Jerry Goodwin, 530 Park Avenue New York, NY 10021. Cash payment accepted at the door. No credit cards. Reservations Not Required: Refreshments After the Meeting. Jerry Goodwin, President, AFIO - New York Metropolitan Chapter, 212-308-1450 More information available from afiometro@yahoo.com

8 January 2008 - McLean, VA- 10am-4pm- TECHEXPO Top Secret Hiring Event - www.TechExpoUSA.com - Active Security Clearance Required

10 January 2008 – San Francisco – The AFIO Jim Quesada Chapter hosts Col. Vance E. Purvis, Chief, Security and law Enforcement, US Army Corps of Engineers. Col. Purvis will speak on transnational terrorism with emphasis on the Global War on Terrorism (GWOT) campaigns in Afghanistan and Iraq. The meeting will be held at United Irish Cultural Center, 2700 45th Avenue, San Francisco, CA 94116 (between Sloat and Wawona). 11:30 AM no host cocktails; noon - luncheon. $25 member rate with advance reservation; $35 non-member rate or at door. RSVP to Mariko Kawaguchi (please indicate meat or fish) no later than 5PM 12/28/07: mariko@cataphora.com, (650) 622-9840 X608 or send a check to P.O. Box 117578 Burlingame, CA 94011.

10 January 2008 - Linthinicum, MD - 10am-4pm - TECHEXPO Top Secret Hiring Event - www.TechExpoUSA.com - Active Security Clearance Required

Sunday, 13 January 2008 1100 – 1330 - Beachwood, OH - AFIO Northern Ohio Chapter hosts a special cinema brunch to view: “Islam vs. Islamists: Voices From the Muslim Center”
This is a film produced by Frank Gaffney and Martyn Burke in a Corporation for Public Broadcasting competition that CPB/PBS refused to air after the film won a showing. It was shown at the AFIO National Symposium in October, 2007, with commentary by producer Frank Gaffney.
Following the film, there will be a discussion led by Beverly A Goldstein Ph.D.
Frank Gaffney is the Founder and President of the Center for Security Policy in Washington, D.C. The Center is a not-for-profit, non-partisan educational corporation established in 1988. Under Mr. Gaffney's leadership, the Center has been nationally and internationally recognized as a resource for timely, informed and penetrating analyses of foreign and defense policy matters.
Mr. Gaffney is the lead-author of War Footing: Ten Steps America Must Take to Prevail in the War for the Free World (Naval Institute Press, 2005). With a foreword by former CIA Director R. James Woolsey, an introduction by Victor Davis Hanson and contributions from thirty-two other accomplished security policy practitioners, this highly acclaimed volume constitutes an "owners manual" for the new global conflict in which America finds itself engaged - the War for the Free World.
Location: Wellington’s Restaurant, 777 ALPHA DRIVE, HIGHLAND HEIGHTS, OHIO 44143, I -271 AT WILSON MILLS RD., 440.461.9211 or 440.442.0055. DRIVING DIRECTIONS AND MAP AVAILABLE AT http://www.wellingtoncatering.com/location_Map.htm.
Cost: $24 per person RSVP: Veronica Flint, (440) 338-4720 or at vbf@windstream.net

19 January 08 - Kennebunk, ME - The Maine Chapter of AFIO (affectionately referred to as MAFIO) will have Tyler S. Drumheller, 25 year career employee of the Central Intelligence Agency as guest. Drumheller retired from CIA in 2005 and is author of "On the Brink", detailing the beginning of the war in Iraq and his battles with the Bush administration over the validity of intelligence on Iraqi weapons of mass destruction. Having worked at the highest levels of government on foreign policy and security issues, he is currently working on a second book on the U.S. intelligence community in the age of international terrorism. At the time of his retirement ,Drumheller was Chief of the Europe Division of CIA. Among other positions held, he was Chief of CIA's largest field station. During the period 1980-1990 he served in Africa as an operations officer and chief of station. He holds a B.A. from the University of Virginia and has done graduate work in Chinese language at Georgetown University. He speaks five languages in addition to English. He is currently President of Tyler Drumheller LLC. Meeting, which is open to the public, will be held at 2:00 p.m. in the Kennebunk Free Library, 112 Main Street in Kennebunk, Maine. Contact 207-985-2392 for information.

Tuesday, 22 January 2008, 6:30 pm – Washington, DC - LA Times reporter Bob Drogin, and Tyler Drumheller, former chief of CIA covert operations in Europe present Curveball: Inside the WMD Debacle at the Spy Museum. In 1999, a mysterious Iraqi applied for political asylum in Germany. The young engineer offered compelling details about Saddam Hussein’s secret effort to build weapons of mass destruction. The Germans shared this information with U.S. intelligence but denied the Americans access to their informant—who the Americans codenamed “Curveball.” The case lay dormant until after 9/11, when the Bush administration embraced Curveball’s unconfirmed account. Although relied upon by President Bush and Colin Powell, Curveball was a fraud whose intelligence was discredited before the war. Join Los Angeles Times reporter Bob Drogin, author of Curveball: Spies, Lies, and the Con Man Who Caused a War, and Tyler Drumheller, former chief of CIA covert operations in Europe and author of On the Brink: An Insider’s Account of How the White House Compromised American Intelligence, as they reveal the inner workings of this intelligence failure from flawed analysis to political maneuvering. Tickets: $20 per person. Visit www.spymuseum.org

23 January 2008- Phoenix, AZ - The Arizona AFIO Chapter luncheon features Dr. Richard Post, former CIA. The chapter will meet at the Hilton Garden Inn at 11:30 AM. The speaker will be Richard W. Post. PhD. Dr. Post joined the CIA after his graduation from the University of Michigan. After a number of years he returned to the University of Wisconsin where he headed the Criminal Justice Program. He then became Director of Security and Political Risk first at B.F. Goodrich and later at American Can. Rich, then took a consulting position with Kroll Associates in Hong Kong to start up and manage a Joint Venture with Jardine Matheson & Co, to provide security and investigative services in Asia, and later on formed Post and Associates which he then sold to the International Accounting Firm of Ernst and Young. At the time of the sale his firm was called Brand Protection Associates. Although his consulting practice is based in Phoenix he still maintains offices in China. Over the years he has worked on hundreds of sensitive investigations, crisis management situations and trade secrete thefts around the world. Rich and his wife, Penny, who is also his life long business partner have recently authored a book titled, "Global Brand Integrity Management." Rich has a BS, MS, and PhD. He is a Certified Protection Professional CPP. For information and reservations contact Bill Williams at (602) 944-2451 or fireballci@hotmail.com.

Thursday, 24 January 2008, 12 noon – 1 pm – Washington, DC – Free author lunchtime debriefing and book signing – Ronald Kessler – author of The Terrorist Watch: Inside the Desperate Race to Stop the Next Attack at the Spy Museum. Over 5,000 terrorists have been rolled up worldwide since 9/11, yet the race to stop them is more desperate than ever. For The Terrorist Watch, best-selling author Ronald Kessler interviewed FBI and CIA counterterrorism operatives to capture the story of terrorists’ relentless efforts to attack the United States and the efforts being made to stop these plots. Kessler’s interviews with FBI Director Robert Mueller, CIA Director Michael Hayden, White House counterterrorism chief Fran Townsend, and dozens of key intelligence operatives takes readers inside the war rooms of the battle against terrorism. Learn what Kessler discovered about how the U.S. helped thwart the 2006 London terrorist plot, how press leaks have jeopardized our safety, what he has determined that Saddam Hussein admitted in seven months of secret FBI debriefings, and how he thinks the Intelligence Community has changed since 9/11. Free – no registration required.

Friday, 25 January 2008 - McLean, VA - AFIO National Winter Luncheon - Details to follow

30 January 2008 - Colorado Springs, CO - 10am-4pm -TECHEXPO Top Secret Hiring Event - www.TechExpoUSA.com - Active Security Clearance Required.

Wednesday, 30 January 2008, 6:30 pm – Washington, DC – “Spies on Screen” - The Lives of Others – Burton Gerber, retired CIA case officer, at the Spy Museum. Today there are 5,000 surveillance cameras in New York City – 200 in Times Square alone, and the UK has a larger network that successfully helped it round up the terrorists seeking to blow up transit system. So, while It may feel Big Brother is watching, these surveillance efforts are quite different from the tactics used by the German Democratic Republic before the fall of the Berlin Wall. The Oscar-winning film, The Lives of Others, captures the effect that a culture of permanent suspicion and total surveillance had on the average citizen, and it also poses the intriguing question of what happens when a surveillant begins to sympanthize with his target. Based on his own experiences as a CIA station chief in three Communist countries, retired CIA case officer Burton Gerber will place the film in context and discuss its accuracy and the ethical implications of espionage and counter-espionage. Co-sponsored by the Goethe-Institut in Washington, DC. Tickets: $20 per person. Visit http://www.spymuseum.org for tickets.

2 February 2008 - Indian River, FL - Florida Satellite Chapter Luncheon.  The next luncheon for the Florida Satellite Chapter, AFIO will be on 2 February 2008 (Saturday), at the Indian River Country Colony Club (IRCC). There will be a cash bar beginning at 11:30 a.m. and a 12:30 p.m. lunch. The luncheon speaker will be COL Harry Pawlak, USAF Retired. COL Pawlak (a Chapter member) will speak about his involvement in a Recon Mission in Asia. He was forced to land in a hostile area without radio communications and walked almost three weeks before being picked up. The luncheon cost is $17.00. There will be a beef entrée or fish entrée option. Contact George Stephenson (Vice President) at gstephenson@cfl.rr.com for reservation information. Please put AFIO in the subject block to insure the e-mail will be opened. Col Pawlak is currently President of Matrix Management LTD.

5 - 6 February 2008 - San Diego, CA - 9am-4pm - WEST 2008 - www.TechExpoUSA.com

Tuesday, 5 February 2008, 6:30 pm – Washington, DC – “Mata Hari and Houdini: Entertaining Spies”– authors Pat Shipman and William Kalush at the Spy Museum. Were they or weren’t they? Mata Hari’s reputation as a seductive beauty who used her wiles to gather intelligence is well-known. But history reveals a different story. Meanwhile, Harry Houdini, the “World’s Greatest Escape Artist,” is known for his magical feats and his pursuit of fake spiritualists. But was he also a covert operative? In this demystifying evening, Pat Shipman, author of Femme Fatale: Love, Lies and the Unknown Life of Mata Hari, and William Kalush, co-author of Houdini: The Making of America’s First Superhero, lift the veil of time from these two legends. Was the infamous dancer executed for espionage or for shameless behavior? Did Houdini use his theatrical tours as a cover for collecting intelligence for the U.S. or perhaps the British? Tickets: $20. Visit http://www.spymuseum.org for tickets.

Sunday, 10 February 2008 1030 – 1330 - Beachwood, OH - AFIO Northern Ohio Chapter hosts Timothy R. Walton, author, CIA and Navy Veteran on "24 Years with the CIA." Timothy R. Walton has a B.A. in philosophy from the College of William and Mary, and a Ph.D. in history from the University of Virginia. While in graduate school he had a Fulbright scholarship to do research at the French Foreign Ministry in Paris, France.
From 1970 to 1976, he served in the U.S.Navy on ships and bases in the North Atlantic and Mediterranean.
For 24 years, he was an analyst with the Central Intelligence Agency, during which he worked with personnel from law enforcement, the military, and foreign liaison services.
He has had a variety of experience teaching analysis, including:• Classes at the CIA's Sherman Kent School for Intelligence Analysis.• Mercyhurst College's program in the Washington D.C. area.• The Director of National Intelligence's "Analysis 101," which is offered to new analysts in all of the components of the US Intelligence Community.• A graduate-level class in competitive intelligence for the Johns Hopkins University business school.
He is also the author of The Spanish Treasure Fleets, the story of the centuries-long maritime struggle to control the flow of precious metals from Spain's colonies in Latin America.
Location: Hilton Cleveland East /Beachwood (Location not yet confirmed), 3663 Park East Drive, Beachwood, Ohio 44122, Tel: 1-216-464-5950 Fax: 1-216-464-6539
Cost: $24.00 per person
RSVP: Veronica Flint, (440) 338-4720 or at vbf@windstream.net

Thursday, 21 February 2008, 12 noon – 1 pm – Washington, DC – author debriefing and book signing – Pete Earley author of Comrade J, at the Spy Museum. From 1997 to 2000, a man known as Comrade J was working in the U.S. as the highest-ranking operative in the SVR – a successor agency to the KGB. He directed all Russian spy action in New York City, and personally oversaw every covert operation against the U.S. and its allies in the UN. Comrade J recruited spies, planted agents, manipulated intelligence, and influenced American policy – all under the direct leadership of Boris Yeltsin followed by that of Vladimir Putin. He was a legend in the SVR: known as the man who kept the secrets. Then in 2000 he defected and turned the tables on Mother Russia – for two years he had acted as a double agent for the FBI. In Comrade J, Earley gives an account of this extraordinary spy. Free, no registration required.

22-23 February 2008 - Baltimore, MD - 3rd International Conference on "Ethics in the Intelligence Community", Sponsored by: International Intelligence Ethics Association and Johns Hopkins University School of Education, Division of Public Safety Leadership. Intelligence ethics is an emerging field without established principles for resolving the ethical problems confronting the intelligence community. Intelligence work has no theory analogous to "just war" theory in military ethics. Consequently, a focus of this conference is to provide a forum in which the application of ethical theories to intelligence problems can be discussed and a theory of “just intelligence” developed. This conference is co-sponsored by The International Intelligence Ethics Association and Johns Hopkins University, School of Education, Division of Public Leadership.
The conference will be held at The Johns Hopkins University-Mt. Washington Conference Center, in Baltimore, Maryland. The conference is open to all relevant disciplines, including political science, history, law enforcement, philosophy, international relations, theology, and to representatives of all legitimate stake-holders in intelligence ethics, including government, the press, and non-governmental organizations.
The 2-day conference begins on Friday morning, February 22nd and ends on Saturday afternoon, February 23, 2008. Attendees will be provided all meals during this time. The conference will consist of academic papers and panels, in a traditional lecture format with audience discussion. Privacy Policy: All presentations and discussions are on a “not for attribution” basis. No recording devices (cameras, audio recorders, etc.) that can capture images and sound are permitted.
A sample of the topics at the conference include:
• Torture & Ticking Time-Bombs: Empirical Research Regarding Moral Judgments
• Can Just War Theory Contribute to a Normative Framework for Intelligence Ethics? National Security vs. Social Security
• The Utility And Practicality Of A Code Of Ethics Specifically Addressing The Officer-Agent Relationship (i.e., HUMINT) And Could Such A Code Be Meaningful Or Useful In Real Operational Settings?
• A Professional Ethics Review Board for the Intelligence Community: Is it possible?
• Accountability vs. Politicalization: An Ethical Difference - With Case Studies
• Developing a Moral Framework for Making Complex Ethical Judgments For the Intelligence Professional
• Individual Rights vs. Collective Rights: A Moral Dilemma In Intelligence During National Emergency Situations?
Conference Location: Mt. Washington Conference Center, 5801 Smith Avenue, Baltimore, Maryland 21209; Information/Directions: http://www.mtwashconfctr.com/home.html
Registration till December 31, 2007 - Registration fee covers 3 meals on Friday and 2 meals on Saturday
$ 370 Conference Registration. Late Registration after January 1, 2008 Registration fee covers 3 meals on Friday and 2 meals on Saturday $ 395 Conference Registration
A limited number of suites are available at the conference center Suites, $150.00 a day [check in is Thursday, Tax and gratuities included] Mail To : International Intelligence Ethics Association (IIEA), P.O. Box 23053, Washington, D.C. 20026. Further information available from: conference2008@intelligence-ethics.org

Thursday, 20 March 2008, 6:30 pm – Washington, DC -“The Bomber Behind the Veil: Muslim Women and Violent Jihad– Farhana Ali, Rand Corp. policy analyst, at the Spy Museum. Beware the mujahidaat. Farhana Ali, an international policy analyst with the Rand Corporation, is one of the few researchers focused on these Muslin female fighters. She has charted an increase in suicide attacks by Muslim women since at least 2000, in new theaters of operation, including Uzbekistan, Egypt, and Iraq. These attacks are arguably more deadly than those conducted by male jihadists, in part due to the perception that women are unlikely to commit such acts of horror, and when they do, the shock or “CNN factor” of their attacks draws far greater media attention. She discusses their place in Islamic history, their psychological profile, and the likely shelf-life of this disturbing trend. Tickets: $20. Visit http://www.spymuseum.org for tickets.




For Additional Events two+ months or greater....view our online Calendar of Events

-----------------------------------------------------------------------  

Disclaimers and Removal Instructions

Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers. 

REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs: 

a)  IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list.  If this link doesn't open a blank email, create one on your own and send to afio@afio.com with the words:  REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.

 b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to afio@afio.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.

CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at afio@afio.com. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm

-----------------------------------------------------------------------

WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor(s) or author(s) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!

(c) 2007, AFIO, 6723 Whittier Ave, Suite 303A, McLean, VA 22101. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: afio@afio.com

Click here to return to top.