AFIO Weekly Intelligence Notes #14-08 dated 7 April 2008

AFIO members are invited to a Special CIA / Georgetown / AFIO Conference
Monday, 28 April 2008 - 1:00 p.m. - 6:30 p.m. at Georgetown University.
[special bus service being provided from VA and MD parking lots].
The Life and Career of Richard Helms - His Life in Intelligence
featuring Dr. Henry A. Kissinger - Former Secretary of State
Gen. Michael V. Hayden, USAF
- Director, CIA
Brent Scowcroft
- Former National Security Advisor
Albert (Bud) Wheelon
- First Deputy Director of Science and Technology, CIA
William Hood
- Career Intelligence Officer, Author
Michael Beschloss
- NBC News Presidential Historian, Author
Jennifer Sims
- Director Intelligence Studies, Georgetown
David Robarge
- Chief Historian of the CIA

No charge to AFIO members [small fee if you will be using MD or VA bus service]
but space extremely limited. Further information here
To immediately reserve your space, click here

Friday, 25 April 2008 - 10:30 am to 2 pm

"Technical Wizardry in the U.S. Intelligence Community"

Speaking at 11 a.m. is Dr. Lisa J. Porter, Director of the Intelligence Advanced Research Projects Activity (IARPA).
Office of the Director of National Intelligence
Dr. Porter [MIT, Stanford] is the first Director of IARPA.
The IARPA sponsors research aimed at game-changing breakthroughs to complement the mission-specific science-and-technology research
being conducted by intelligence agencies.


Speaking at 1 p.m. is Jerrold M. Post, M.D., former CIA Psychiatrist,
The Psychology of Terrorism from the IRA to Al-Qaeda

Space limited. Make reservations at this secure page.

EVENT LOCATION: The Capitol Club at the Sheraton-Premiere Hotel, 8661 Leesburg Pike � Vienna, Virginia 22182.
Driving directions here.


 The Second AFIO Spy Auction is being planned for late Spring and we are now accepting donated items to add to the auction catalog.
Goal: to raise funds to support AFIO programs in the areas of education, career recruitment, scholarships, seminars, publications, and conferences.
Please help by donating items [books, gift items, historic photos, documents] or services [legal, accounting, career advisory, investigatory] that would be of interest to AFIO Members or the public. Donors receive a tax-deduction receipt for the value their donated items received when auctioned. Items that do not sell are noted with a donation receipt for the property, minus a specific valuation.
 Deadline for auction items will be May 15, 2008. Send inquiries to
Mail items to be sold at this auction to AFIO Auction, 6723 Whittier Ave Ste 303A, McLean, VA 22101.

Click here to view disclaimers, removal, methods of use of the links in this document.

The WIN in its entirety appears below; however, the document may also be viewed online by current members with usernames and passwords at: 
Usernames and Passwords appear on AFIO Membership Cards.
They work only if the membership is current.

WIN CREDITS FOR THIS ISSUE:  The WIN editors thank the following special contributors to this issue: pjk and dh.  
All have contributed one or more stories used in this issue. 






Research Requests

Coming Events

Current Calendar Next Two Months ONLY:

  For Additional Events two+ months or more....view our online Calendar of Events  


Interview With CIA Boss. Al Qaeda is training fighters that "look western" and could easily cross U.S. borders without attracting attention, CIA Director Michael Hayden said in an interview on NBC's Meet the Press. According to Mr. Hayden, the militant Islamist group has turned Pakistan's remote tribal areas along the border with Afghanistan into a safe haven, and is using it to plot further attacks against the United States.

In the same interview, when asked directly whether he feared Musharraf might not be around as president for much longer to support the United States, Mr. Hayden said he did not know, but praised what the country had already delivered.

Mr. Hayden also stated his personal believe that Iran is pursuing a nuclear weapons program, but also stood by the agency's assessment that the program was suspended in 2003.  [Bull/Reuters/30March2008] 

Google Has Lots to do With Intelligence. When the nation's intelligence agencies wanted a computer network to better share information about everything from al Qaeda to North Korea, they turned to a big name in the technology industry to supply some of the equipment: Google Inc.

The Mountain View company sold the agencies servers for searching documents, marking a small victory for the company and its little-known effort to do business with the government.

The strategy is part of a broader plan at Google to expand beyond its consumer roots. Federal, state and local agencies, along with corporations and schools, are increasingly seen by the company as lucrative sources of extra revenue.

In addition to the intelligence agencies, Google's government customers include the National Oceanographic and Atmospheric Administration, the U.S. Coast Guard, the National Highway Traffic Safety Administration, the state of Alabama and Washington, D.C.

Many of the contracts are for search appliances - servers for storing and searching internal documents. Agencies can use the devices to create their own mini-Googles on intranets made up entirely of government data.

Additionally, Google has had success licensing a souped-up version of its aerial mapping service, Google Earth. Agencies can use it to plot scientific data and chart the U.S. coastline, for example, giving ships another tool to navigate safely.

Spy agencies are using Google equipment as the backbone of Intellipedia, a network aimed at helping agents share intelligence. Rather than hoarding information, spies and analysts are being encouraged to post what they learn on a secure online forum where colleagues can read it and add comments.

The system is modeled after Wikipedia, the public online, group-edited encyclopedia. However, the cloak-and-dagger version is maintained by the director of national intelligence and is accessible only to the CIA, FBI, National Security Agency and an alphabet soup of other intelligence agencies and offices.

Agents can log in, depending on their clearance, to Intellipedia's three tiers of service: top secret, secret and sensitive but unclassified. So far, 37,000 users have established accounts on the network, which contain 35,000 articles encompassing 200,000 pages, according to Dennehy.

Google supplies the computer servers that support the network, as well as the search software that allows users to sift through messages and data. [Kopytoff/SanFranciscoChronicle/30March2008] 

China Using Denial and Deception. China's military is using "denial" and "deception" to mislead the United States and other governments about its military strategy and buildup, according to Pentagon officials.

The topic is discussed in the latest Pentagon report on China's military power, which defines Chinese disinformation as "[luring] the other side into developing misperceptions. . . and [establishing for oneself] a strategically advantageous position by producing various kinds of false phenomena in an organized and planned manner with the smallest cost in manpower and materials."

A Pentagon official, elaborating on the report, said "denial" by the Chinese is excessive secrecy "surrounding almost every part of the PLA," or People's Liberation Army, as the military is known. Evidence of denial is difficult to pinpoint because, the official said, "we don't know what we don't know."

Deception often is discussed in Chinese military writings, including those based on ancient writings that discuss its use in helping weaker powers defeat stronger ones. The analogy is used by China to discuss how it would defeat the United States in a conflict.

Strategic deception is "producing or portraying something that is false as being true in an effort to confuse the adversary or set the conditions for surprise," the official said.

China's tactical denial and deception include using electronic decoys, infrared decoys, false-target generators and angle reflectors during electronic warfare. They also include the use of traditional concealment, camouflage and deception by military forces.

Some senior U.S. intelligence officials dispute the Pentagon's assertion that China employs strategic and tactical denial and deception, arguing that Chinese communist-style disinformation is no different from what non-communist governments use. [Gertz/WashingtonTimes/28March2008]

North Korea Accuses US, ROK of Aerial Spying. The Democratic People's Republic of Korea (DPRK) on Monday accused the United States and South Korea of committing more than 200 cases of aerial espionage against it in March, the official Korean Central News Agency (KCNA) reported. [xinhua/31March2008] 

Guant�namo Detainee Charged in Embassy Attack. Military prosecutors filed war crimes charges against a Guant�namo detainee who was formerly held in the Central Intelligence Agency's secret prisons and has been indicted previously by federal prosecutors in New York.

The charges seek the death penalty for the role they say the detainee, Ahmed Khalfan Ghailani, played as a coordinator and planner of the 1998 bombing of the Untied States embassy in Tanzania, in which 11 people were killed and scores of others injured. That bombing was also the subject of Mr. Ghailani's indictment in 2001 in New York.

The charges, which would be tried in the war-crimes tribunal at Guant�namo Bay, Cuba, were announced at the Pentagon by a senior official of the Bush administration's military commission system, Brig. Gen. Thomas W. Hartmann, who has been pressing to move the problem-plagued war crimes prosecutions more quickly.

But the charges quickly drew new criticism of the Guant�namo tribunals, which critics say afford fewer protections to detainees than civilian courts do, and which have helped crystallize international criticism of Guant�namo. Administration officials have said since shortly after the terror attacks of 2001 that civilian courts were not able to handle many of the prosecutions in the global war on terror, and have used that analysis to argue for the more truncated procedures of the war-crimes tribunals at Guant�namo.

But some critics said on Monday that the new charges against a terror suspect who had already been charged by civilian prosecutors focused fresh attention on the issue.

Mr. Ghailani, who was born in Tanzania and is believed to be about 34 years old, was once listed by the United States as one of the world's most sought-after terrorists. The new charges say that he gathered explosives and a truck for the for the embassy suicide attack, helped the attackers with logistics and helped scout the embassy building in Dar es Salaam.

The charges also say that he remained an important al Qaeda operative after the bombing, working as a forger and trainer and, for a time, as a bodyguard for Osama bin Laden. Mr. Ghailani was reported captured in Pakistan in July 2004. [Glaberson/NYTimes/31March2008] 

China Says US Espionage Case 'Groundless.' China criticized as "groundless" a Washington statement that a Pentagon official had pleaded guilty to passing US military secrets to an agent working for Beijing.

Gregg William Bergersen, 51, faces up to 10 years in jail after admitting to one count of conspiracy to disclose national defense information to persons not entitled to receive it, the US justice department said in the statement.

According to the US justice department, Bergersen started handing secret information in March 2007 to Tai Shen Kuo, a Taiwan-born US citizen. Bergersen worked as a weapons systems policy analyst at the Defence Security Cooperation Agency, which implements the Pentagon's foreign military sales program. Unbeknown to Bergersen, Kuo was passing the information to an unnamed Chinese government official, the department said.

The department of justice statement said Bergersen knew the documents, many of which were about US weapons sales to Taiwan, were classified and should not be shared with outsiders. [TimesofIndia/1April2008] 

Pentagon May End Controversial Intelligence-Gathering. The Pentagon's top intelligence official has recommended the dismantling of a controversial intelligence program established by former Defense Secretary Donald H. Rumsfeld to gather information on terrorist groups inside the United States.

Pentagon officials said the call to shutter the Counterintelligence Field Activity program, or CIFA, is part of a planned restructuring requested by James R. Clapper, the undersecretary of defense for intelligence. The small agency had drawn widespread criticism from civil liberties groups and some Democratic lawmakers, who contended that it represented an unwarranted expansion of the Pentagon's domestic spying capability.

Much of the controversy stemmed from the disclosure that the agency had collected information on antiwar protesters after the invasion of Iraq in March 2003. Clapper ordered an end to that practice after he was appointed last year.

Defense Secretary Robert M. Gates must still approve Clapper's recommendation to close the agency, first reported last night by the New York Times. Gates, a former CIA director, has quietly ended or scaled back a number of controversial programs and policies put in place by Rumsfeld, whom he succeeded.

CIFA was established in the months after the Sept. 11, 2001, attacks. Pentagon officials then described its aim as countering the activities of foreign terrorists operating in the United States. Initially tasked with coordinating Pentagon security efforts, the agency was eventually given the power to investigate certain crimes within the United States, including treason, foreign or terrorist sabotage and economic espionage. [Warrick/WashingtonPost/2April2008

Ecuadorean Intelligence Chief Removed. Ecuadorian Ground Forces Intelligence Chief, Col. Mario Pazmino, has been removed for concealing information from President Rafael Correa. A Ministry of Defense communiqu� revealed that Pazmino remains in active duty, but without post, as he awaits for the ruling of the ministry.

Col. Pazmino reportedly failed to provide appropriate information to the president about the killing of Franklin Aisalia by Colombian military forces in northern Ecuador on March 1st. [PresnaLatina/3April2008] 

Armenian Oppositionists To Stand Trial For Exposing Ex-KGB Agents. Two opposition supporters will soon face trial for exposing two undercover agents of Armenia's National Security Service (NSS).

The NSS officers were exposed in Yerevan's Liberty Square late on February 27 during the protests staged there by former President Levon Ter-Petrosian. They apparently had recording devices on them. Those were put on display in a nearby caf� where the two young agents were forcibly taken by opposition activists before being handed over to senior police officers.

Ter-Petrosian and his associates claimed that the oppositionists were caught red-handed while urging protesters camped in the square to take violent actions against the government with the aim of substantiating government claims that the opposition is bent on seizing power by force. The NSS denied this, saying that its employees were in fact helping to ensure the security of the protesters. [Stepanian/ArmeniaLiberty/3April2008] 

ODNI Releases Sharing Strategy For Intel Community. The Office of the Director of National Intelligence (ODNI) made public today a new strategy for how federal intelligence agencies should work together. The new plan aims to bolster intelligence sharing through creating a "collaborative information environment" where analysts and collectors will be aware of intelligence data from across the community that can help them, the agency said.

ODNI said if intelligence across the intelligence community is available to analysts, they will be able to better "connect the dots." The strategy also laid out the challenges of changing the culture and processes of the intelligence community to better share information.

The strategy noted that each intelligence agency has its own networks and data repositories that can make it difficult for the intelligence community to piece together information. The strategy laid out four strategic goals for information sharing within the intelligence community meant to spur collaboration through clearer guidance and oversight, data standardization, improving identity management to build trust and changing the culture in the intelligence community.

Those goals are:

- Establishing "uniform information sharing policy and governance" that includes common policies for intelligence classification, clearance processing and standards compliance.

- Advancing "universal information discovery and retrieval" through common metadata standards, security markings and networks.

- Forging a "common trust environment" through identity management, information security standards, information access rules, user authorization, auditing and access control.

- Enhancing collaboration across the intelligence community by rewarding information sharing and helping to establish a "virtual collaboration environment."

Officials say they will release an implementation road map to guide the efforts, which will be continually reassessed every 100 days. No date has been set for the release of the implementation plan.  [Bain/FCW.COM/4April2008] 

Two Jordanian Nationals Linked to Bomb Plot Scheduled for Deportation from Manila. The Philippine Bureau of Immigration is deporting the two Jordanian nationals suspected of plotting to bomb several embassies in the Philippine capital, including the US Embassy in Manila. Immigration Commissioner Marcelino Libanan identified the deported Jordanians as Khalil Kh. Al-Ali and Walid Abu Aisheh. Both were expelled pursuant to a summary deportation order that the BI board of commissioners issued against them last March 13 for violating Philippine immigration laws.

BI records showed that Al-Ali was ordered deported for working in the country without a valid permit while Abu Aisheh was found to be an overstaying and undocumented alien.

They were arrested separately in Manila and Pasay on February 27 by joint operatives of the Immigration, Philippine Army and the Philippine National Police.

Police and Army intelligence sources have alleged that the Jordanian nationals were involved in plots to bomb several embassies in Manila, including the United States, Australia, United Kingdom and Israel. [GMANews/4April2008] 


The Age of the Immigrant Spy. One March 25, Chinese-born engineer Chi Mak was sentenced to over 24 years in prison by a Californian court for plotting to obtain American naval submarine technology and illegally exporting it to China. The case offered a rare peek into the new multipolar world espionage system that is more complex than that of the bipolar Cold War-era.

While spying is reputed to be the world's second-oldest profession, existing from time immemorial, its peculiar shapes and patterns are provided by the changing configurations of global power. Routine intelligence gathering by agents of one state in another state occurs both in wartime and peacetime, but the states that invest the most and reap the maximum from spying have always been great powers.

The ideal spy is one who is a citizen or resident of the target country, has access to its sensitive decision making portals, and/or is part of its government or industrial machinery. By virtue of their deep pockets, great powers tend to scoop up the bulk of such perfect candidates and leave the dregs to the wannabes.

The quality foreign agents' market is thus an "oligopsony" that responds to the choices of a small number of great power buyers. In this imperfectly competitive market where the big buyers set the rules, the techniques, pay scales and risks that define the trade are decided essentially by the preferences and counter-espionage tactics of the great powers.

It is in this context that incidents like the conviction of Chi Mak in California assume significance. China's choice of utilizing persons of Chinese origin residing in the United States, though not unique, is a sustained preference that is changing the rules of the market.

For nearly two decades, Beijing has mobilized the Chinese-American community to penetrate US military corporations that are working on government defense contracts. According to the US Central Intelligence Agency, Beijing recruits these agents by playing the "shared ancestry" card as an accompaniment to the usual monetary remuneration.

US counter-espionage professionals contend that this is a unique style patented by China wherein the agents are relative amateurs such as Chinese students, businesspersons, visiting scientists as well as persons of Chinese heritage living in the US. Each individual may produce only a small iota of data, but a network of such persons could vacuum up an extensive amount of sensitive military and economic information.

Attesting to this strategy, high-profile arrests of Chinese intelligence agents in the US are always characterized as "spy rings" that involved multiple coordinates. Chi Mak was arrested in 2005 along with four other family members who were acting as couriers or accomplices at different points of the information chain that allegedly traced its way from Los Angeles to China's Ministry of State Security and the People's Liberation Army (PLA).

In February, the duo of Tai Shen Kuo and Yu Xin Kang was arrested in New Orleans, Louisiana, for purchasing classified data about US weapons systems being shipped to Taiwan. While Kuo apparently cultivated a relationship with a Pentagon official, Kang acted as a "cut out" or intermediary between Kuo and a Chinese government official.

Unrelated to Kuo and Kang's case is the arrest in February 2008 of Dongfan Chung, an ex-Boeing engineer accused of passing on details of antenna systems for space shuttles to the Chinese government. Chung's indictment claims that he had good relations with Mak's family and had been advised by his Chinese handlers to pass information through Mak in the 1980s. As in the other cases, Chung was gathering low-grade intelligence that was not, in itself, of high value. 

The concentric circle in which a Chinese American like Mak, residing in California, teams up with a fellow Chinese American like Chung, in Florida, and unknown others indicates that espionage has truly entered a multipolar era. Instead of the classical methods used by other great power intelligence services involving tight control over a few, deeply planted and valuable assets, Beijing employs an array of decentralized networks that thrive on the Chinese diaspora.

That this strategy is not limited to spying on the US is revealed by allegations of a former Chinese diplomat, Chen Yonglin, that Beijing had more than a thousand secret agents operating in Australia and Canada. Yonglin emphasized to the Canadian Broadcasting Corporation that the networks "extend to countries with large Chinese immigrant populations".

If China revolutionized the mass production and export of low-value added manufacturing goods, it has also invented a new brand of high-volume low-unit-value intelligence collection that might be copied by other emerging great powers.

In March 2008, Parthasarathy Sudarshan, an Indian-American owner of an electronics firm, was found guilty in a US court of conspiring to illegally export controlled microprocessors and electronic components to government entities in India developing ballistic missiles. Like the Chinese government in cases involving Chinese-American spies, the Indian government has firmly denied being connected with Sudarshan. However, the US Justice Department cited an unnamed Indian Embassy official in Washington DC as "co-conspirator A".

The rise of China and India is indeed eating into the fading unipolar moment of the US. However, its implications for the nature of espionage have not been fully understood. With their soaring profiles and ambitions, it is certain that China and India will invest more resources into foreign intelligence gathering and operations. Unlike the US and Russia, which do not boast of sizeable immigrant populations settled in other parts of the world, China and India have large numbers of skilled non-residents living abroad. The cultural and patriotic ties that bind Chinese and Indian immigrants to their homelands are ripe terrain for recruitment into the world of espionage.

The eventual dropping of spying charges against some Chinese Americans like nuclear scientist Wen Ho Lee has generated cries of racial profiling and harassment of Asians in the US. However, the bevy of new cases since Lee confirms that China is indeed using its immigrants strategically. If India does the same, then the very tactics and strategy of espionage will be altered.

During the Cold War, the "oligopsony" of great powers that defined the parameters and best practices of the spying profession was limited to the US, the USSR and a handful of European countries. Now, with China believed to have grown into an aggressive player in foreign espionage and India possibly catching up, the field is wider and the profession is reflecting the changed multipolar world order. The widening of the scope of intelligence by new power centers in Asia erodes the superiority of Western powers that hitherto enjoyed an advantage in strategic developments due to their comparative edge in "private information".

At the same time, new Asian intelligence methods offer lessons for Western powers which have been criticized since September 11, 2001, for weak "HUMINT" (human intelligence). The razzle-dazzle of spy planes and unmanned aerial drones has proven incapable of ferreting out the Osama bin Ladens of the world.

If technological gadgets were sufficient for succeeding in espionage, the US "war on terror" would not have fared as poorly as at present. The Asian mantra is that spying yields its best fruits when it is an art conducted by thinking humans rather than an assignment left to programmed machines. [Chaulia/AsiaTimes/1April2008] 

Today's Spies Find Secrets in Plain Sight. For 40 years, U.S. presidents have begun each day with a top-secret, personal briefing on security threats and global affairs obtained largely from covert spy missions, clandestine satellite surveillance and other highly classified intelligence sources.

Now, however, the President's Daily Brief and other crucial intelligence reports often rely less on secrets from risky espionage missions than on material that's available to just about anyone.

Intelligence officers have gleaned insights on Iran's nuclear capabilities from photos on the Internet. They've scooped up documents, including a terrorist training manual, at international conferences and public forums. They've found information in foreign university libraries and newscasts.

Such material is known as "open-source intelligence" or, in the acronym-laden parlance of the 16 federal agencies that make up the U.S. intelligence community, OSINT. The explosion of information available via the Internet and other public sources has pushed the collection and analysis of that material to the top of the official priority list in the spy world, intelligence officials say.

The change hasn't been easy in a bureaucracy that often measures success by its ability to steal secrets. Federal commissions repeatedly have criticized the intelligence community for not moving more quickly and aggressively to exploit open-source information.

It's a challenging task, given the mountains of material to sift through. Every potentially useful nugget must be vetted because enemy states and terror groups, such as al-Qaeda, sometimes use the Internet and other open channels to put out misleading information.

Yet officials say agencies are overcoming such obstacles and unearthing increasingly valuable troves of intelligence.

The intelligence community is investing heavily to improve its collection of open-source information.

The CIA has set up an Open Source Center, based in a nondescript office building in suburban Washington, where officers pore over everything from al-Qaeda-backed websites to papers distributed at science and technology symposiums, says Douglas Naquin, the center's director.

Other agencies, such as the FBI and the Defense Intelligence Agency, are training scores of analysts to mine open sources and giving many of them desktop Internet access. 

At the same time, national security officials also are grappling with the flip side of the open-source phenomenon: making sure sensitive information held by the government, businesses and even individuals doesn't slip into the same sort of public outlets that U.S. intelligence agencies are scrutinizing.

Open sources can provide up to 90% of the information needed to meet most U.S. intelligence needs, Deputy Director of National Intelligence Thomas Fingar said in a recent speech. Harnessing that information "is terribly important," he said. "It ought to be a normal part of what we do, not being fixated on secrets dribbling into the computer's in-box."

Perhaps the greatest evidence yet of the intelligence community's new embrace of open-source information emerged in December, when top U.S. officials noted that photos available through public media factored into a new assessment by U.S. intelligence analysts that Iran had suspended efforts to build a nuclear weapon in 2003. The new National Intelligence Estimate on Iran's nuclear program reversed previous analyses, which had said Iran had an ongoing nuclear arms program.

The shift was based partly on public photos from Iran's Natanz nuclear facility, including pictures from a media tour and United Nations inspections, according to the Office of the Director of National Intelligence.

By settling important questions about such matters as the size of certain pipes within the facility, the photos provided important clues to its capabilities. The pictures weren't available when earlier assessments of Iran's nuclear program were developed. And if they had been, the CIA's Open Source Center and other initiatives to cull publicly available information still were in their infancy.

Intelligence agencies have used open source information for decades, but it amounted mostly to monitoring foreign news broadcasts. As the information age dawned, those agencies were slow to seize on all the material that began pouring into the public domain.

As far back as 1996, a congressional commission created to study intelligence issues noted that tremendous amounts of open-source information had become "readily available," but the intelligence community had been "inexplicably slow" in using it.

Nearly a decade later, little had changed, according to another commission assembled by the White House to assess the intelligence community's failed pre-war assessment that Iraq was developing weapons of mass destruction.

Open sources "offer vast intelligence possibilities," said the commission's 2005 report. "Regrettably, all too frequently these 'non-secret' sources are undervalued and underused."

Some intelligence officials still see secret information as more reliable, but increasingly "there's much more cultural acceptance" of open-source material, says Charlie Allen, undersecretary of intelligence at the Department of Homeland Security.

Acknowledgements of open-source coups are rare, because officials don't want to reveal the sort of information they find useful.

Plus, open-source information does not often lead to "eureka" moments in the intelligence world, says Wayne Murphy, assistant director in the FBI's Intelligence Directorate. More often, its main use is to "add perspective and context" to material gathered through classified means. Additionally, he says, such information helps officials better focus classified missions on material that can't be obtained elsewhere. 

Ellen Tudisco, chief of the Defense Intelligence Agency's open-source office, acknowledges that there has been "a sort of legacy attachment to classified sources." However, she says, "we've come to realize that you can know your enemy by looking at what they say, and they say it in open sources."

The DIA's experience reflects both the growing acceptance of open-source information and the hurdles intelligence agencies face in trying to use it. In the 18 months since her office was created, Tudisco's staff has grown from two to 15. She says it will take at least nine more months to reach the goal of giving all DIA analysts ready access to the Internet and teaching them to work securely in the unclassified world.

The FBI faces similar challenges. About 11,000 FBI personnel now have desktop Internet access. Another 19,000 still need it. 

The FBI also is one of several security agencies that are re-evaluating their approach to seeing that sensitive government and private-sector information doesn't leak out through the same sort of open sources that the intelligence community is trying to exploit. That means setting new priorities for protecting data. [Eisler/USAToday/31March2008] 


Celebrated History of the CIA Comes Under Belated Fire, By Jeff Stein. The New York Times' Tim Weiner has had the kind of career that most reporters can only dream of. Winner of the Pulitzer Prize and the National Book Award, Weiner's reporting on national security issues, and particularly the CIA, has earned him the near-unanimous respect of his peers, a loyal following of readers and, of course, clout.

Last summer Weiner's career reached yet another peak when his latest book, "Legacy of Ashes: The History of the CIA," hit the New York Times best-seller list.

The mandarins of Washington's national security writing establishment - winners of Pulitzer Prizes and National Book Awards themselves - lined up to praise the book, a searing indictment of the CIA's performance from the Cold War through the invasion of Iraq.

"Engrossing, comprehensive," Newsweek's assistant managing editor Evan Thomas, whose own books on the CIA and American history have drawn unanimous praise, said in the Times.

In the Wall Street Journal, Edward J. Epstein called it "the best book ever written on a case of espionage."

Yet it is Weiner's handling of documents and sources, not to mention his book's theme that the CIA's record is one of almost abysmal failure, that has come under serious question by a growing cadre of critics.

The grumbling - in specialist journals, on the Web and in a flurry of e-mail among historians and investigative reporters - has gone undetected, or perhaps ignored, by the usually sensitive radar of the East Coast media, even as it now threatens to deny Weiner another Pulitzer next month.

The awards will be announced April 6.

Until recently, "Legacy of Ashes" had been considered a shoo-in. No longer.

"I can't think of another spook book that has aroused similar passions for a long time," says Thomas Powers, the acclaimed intelligence historian and author of "The Man Who Kept the Secrets: Richard Helms & the CIA."

Some of the criticism, of course, has came from predictable quarters, such as the CIA's house organ, "Studies in Intelligence."

Nicholas Dujmovic, a CIA historian, wrote there that Weiner's book "is the advocacy of a particularly dark point of view under the guise of scholarship."

Dujmovic charged that Weiner had twisted dates, documents and conversations between President Dwight D. Eisenhower and his CIA director, Allen Dulles, to suit his thesis that the spy agency had resisted repeated efforts at overhaul.

"The phrase 'legacy of ashes' comes from a critical remark President Dwight D. Eisenhower uttered near the end of his administration when, Weiner tells us, Ike finally blew up at Director of Central Intelligence (DCI) Allen Dulles and the failings of CIA generally, and more particularly at Dulles's resistance to recommendations for intelligence reform from the president's board of consultants," Dujmovic wrote.

Not so, countered Dujmovic - and eventually, a growing passel of others who read through the documents he assembled.

"The central episode in Weiner's book is an invented dialogue," Dujmovic wrote, "a created exchange that never happened."

The rest of Dujmovic's slashing piece was a litany of Weiner's alleged factual errors, distortions and "cheap shots" at the agency's handling of key events and developments through the decades.

Richard K. Betts, the distinguished Columbia University professor and former staff member of the Senate Intelligence Committee, forwarded Dujmovic's piece to the National Book Foundation, adding his own outrage.

"There is no law against giving the National Book Award to a hatchet job," wrote Betts, who has consulted with the CIA on analytical issues, "and of course few intellectuals will ever feel sorry for the CIA. It is quite another matter, however, for a book to claim to be deeply researched, and to be lauded as a prodigious work of history, when it is built on errors in the reporting of facts." 

Other CIA critics were stirred to re-examine the book.

Steve Weissman, a former staff member of the House Foreign Affairs Committee, who in recent years has specialized in public corruption issues, wrote an unsolicited piece for the prestigious Columbia Journalism Review repeating the earlier charges of Dujmovic and adding more of his own questioning of Weiner's use of documents.

"I have greatly respected Tim Weiner's reporting for the New York Times on intelligence," he told me, "but I was shocked by the abuse of journalistic standards of accuracy and truthfulness in this book..."

A longtime CIA critic, Weissman said the alleged errors by such a prestigious and respected reporter for the nation's leading newspaper could make it harder for future reporters to take on the spy agency's shortcomings.

Even some of Weiner's many admirers think he overreached, and not just with the grandiose subtitle.

I've talked to a number of experts on Asia and Latin America, all admirers of Weiner and sympathetic to his point of view, who think his sprawling, dramatic narrative goes off track - or worse - from time to time, in his effort to show the CIA as hopelessly inept, short-sighted, even cruel.

My own take on Weiner's treatment of the CIA and Vietnam, which he has called "its finest hour" (and where I served as an intelligence officer myself) is that he ignores strong evidence to the contrary.

Perhaps these are the predictable battles of historians that come with any ambitious, daring piece of work - especially one that amounts to a pie in the face of the CIA.  [Stein/CQPolitics/15March2008]

N.B. - The Pulitzer committee just announced awards, and Legacy of Ashes is not on the list.

Surveillance Standoff, by Shane Harris, National Journal. In the old days, everyone was linked to a lug nut, and Jim Kallstrom liked it that way.

It was 1985, a simpler time for a cop like Kallstrom, who was in charge of setting telephone wiretaps on suspected drug dealers and mobsters for the FBI's New York City field office. In New York, Kallstrom's cases were often won on the basis of incriminating evidence surreptitiously snatched from the mouths of criminal defendants through their phone lines. With a mere 203,000 Americans using mobile phones, people were still tied to the ground, and that gave Kallstrom's world a certain comforting order.

On any given day, he could stand on a street corner in Manhattan, gaze up at an apartment building with its neat rows and columns of units stacked atop each other, and know that inside each one there was a telephone, tethered by thin copper wire to a single point, sometimes several miles away. In his mind's eye, Kallstrom could have imagined shrinking himself to the size of an electron and traveling over the phone line, down to the bottom of the building, then shooting beneath the streets, until he ended up in the basement of the telephone company's switching station. There, the wire emerged, pegged to a rack by a single copper lug nut. Acres of racks lined the walls, each holding rows and columns of lug nuts and their wires, neatly stacked atop each other - the city of New York in analog miniature.

With a warrant in hand, Kallstrom could tell the technicians at the phone office, with whom he had become friendly over the years, "Go up on RR326." The tech would walk to the rack, find the wire, and clamp on a listening device. Instantly, Kallstrom became an invisible interloper.

FBI agents and federal prosecutors depended on these legal wiretaps to penetrate drug cartels, incriminate money launderers, and spy on mob families. And they needed to be absolutely certain that the line they were on belonged to the suspected dealer, or launderer, or capo named in the court-approved warrant. Not the guy in the apartment next door. Not someone down the block. This guy. This phone. RR326. Lest the agents violate a judge's order, and perhaps land themselves in jail, this had to be the very same line that snaked back through the subterranean maze of Manhattan, through all those blocks of concrete caverns, back to that certain apartment building, up through the walls and out of the jack and into the phone that was in the hand and next to the mouth of Kallstrom's target. It was, by design and necessity, a neat, specific system.

And then it all went sideways.

Kallstrom's friends in the phone company put him on notice in 1985: Over the next few years, those racks and stacks of wires and lug nuts would be swept into the technological dustbin. The telephone network was going digital. Technicians would no longer stand at a rack; they would sit at a keyboard. In some parts of the country that had already made the change, phone calls were traveling as a stream of 1's and 0's. Thousands of lines commingled in a single computer. When New York went digital, the phone techs told Kallstrom, they would no longer be able to tap him directly into RR326. In fact, they couldn't even tell him for sure where RR326 resided in this new engineering matrix.

At the same time that the phone companies were preparing for the transition to digital, the use of cellphones - which were inherently harder to tap because they used phone lines differently than analog devices - mushroomed. From 1985 to '86, the number of registered mobile-phone subscribers in the United States doubled to 500,000. Within two years after that, the number climbed to 1.6 million. By the end of the decade, the cellphone universe had skyrocketed past 4 million.

Organized crime was an early adopter of the mobile phone. In a communications technique presaging that of Islamic terrorists today, members of the Colombian Cali drug cartel operating in New York would briefly use a phone, toss it, and get a new one. To tap a mobile device, technicians had to install listening equipment on the new version of a lug nut - an "electronic port." But in most switching stations in New York, there were only half a dozen or so ports available at any one time. Federal prosecutors and agents had to stand in line at phone company offices and fight with each other over whose investigation should take priority. Some prosecutors threatened to haul company employees into court on contempt charges so they could explain to a judge why the phone company was unwilling to execute a wiretap order. 

Electronic surveillance, once such a dependable, relatively easy craft, was becoming inordinately difficult, Kallstrom thought. The phone companies, whose annual revenues from mobile subscriptions were cresting over $2 billion in the late 1980s, showed little willingness to make the FBI's life easier. As the 1990s approached, with the promise of more digitization and more mobility, Kallstrom called his bosses in Washington: "If we don't do something, we'll be out of the wiretapping business."

Kallstrom may have been the first to alert the FBI and the Justice Department to this new reality. The digital revolution generated a constant tension that exists to this day, a push and pull between the federal government in one camp and technology corporations and civil-liberties activists in the other to control the development of the global communications system, and so the balance of power in the Information Age.

This struggle's latest manifestation is the intensely politicized effort to rewrite the Foreign Intelligence Surveillance Act. At issue is nothing less than the government's authority to broadly monitor communications networks to spot terrorists and other national security threats. The Bush administration finds itself across the battle lines from many of the same groups that more than a decade ago argued that the government was already extending its reach too far into personal conversations in the name of pursuing criminals.

While FISA governs wiretapping for intelligence-gathering purposes, as distinct from law enforcement, surveillance in both worlds follows the same essential philosophy - the best evidence in a court of law or in an intelligence operation is one's own words. Today's dispute is not very different from the one that occurred during the dawn of digitization in the 1990s. Indeed, both are part and parcel of the same long-running debate. 

The Communications Assistance for Law Enforcement Act passed in the closing days of the 103rd Congress, two weeks before Republicans won control of both chambers in November 1994. CALEA (pronounced kuhLEEuh) would let the industry set its own standards to meet the Justice Department's needs. The department could list its surveillance requirements, but the act let companies decide how to build their equipment. Justice won the right to petition the Federal Communications Commission if its officials felt that the companies weren't fulfilling their obligations. But civil-liberties groups also secured the right to challenge the government's requirements in court.

In early 1995, the Justice Department issued its list of requirements for wiretapping, known as the punch list. Not surprisingly, many telecom executives and their attorneys viewed the demands as unreasonable. Al Gidari, a lawyer representing the wireless industry, was among the first to see the FBI's requirements, during the initial meeting to develop standards for CALEA, which was held that spring in Vancouver, British Columbia. The Justice Department's wish list, he said, amounted to "the Cadillac of wiretaps."

Over the next few years, the Justice Department continued to seek increasingly sophisticated surveillance capabilities, including real-time geographical tracking of mobile phones; the ability to monitor all parties in a conference call regardless of whether they are on hold or participating; and "dialed digit extraction," a record of any numbers that a subject under surveillance punched in during a call, such as a credit card or bank account number. The government got a lot of what it wanted, but not all.

To be sure, criminals' use of new technologies helped drive the law enforcement demands. But telecom carriers worried that the cost of compliance was too high and that the FBI's technical requirements were illegally broad. CALEA, they argued, had forbidden the government from requiring specific system designs or technologies.

Justice, frustrated by its inability to get all the demands on the punch list, finally asked the FCC to step in. In 1997, the Cellular Telecommunications Industry Association, which then represented mobile carriers, and the Center for Democracy and Technology complained to the commission that the negotiations had deadlocked because of "unreasonable demands by law enforcement for more surveillance features than either CALEA or the wiretap laws allow." The FCC, however, sided with the Justice Department on a host of requirements that privacy groups found overly broad. The tussle dragged on for two more years and ended up in the U.S. Court of Appeals for the District of Columbia Circuit, which overruled the FCC. After the commission took up matters again, it granted some of the FBI's requests, and the CALEA standards were amended.

When Justice Department officials reported to Congress on CALEA implementation in January 1998, no manufacturer of telecom equipment said that the FBI's demands were impossible to meet, but they did say that complying would be difficult and very expensive. (Although Congress had set aside $500 million to reimburse companies for retrofitting their networks, the law required the carriers to bear the cost of compliance on any equipment put in place after CALEA was enacted. Several experts believe that the final cost for compliance on telephone networks has been two to eight times the amount originally allotted.)

The level of government surveillance was so low at that time that some questioned why the FBI wanted such multifaceted access at all. In 1994, federal and state authorities were running 1,154 wiretaps nationwide, mostly for drug investigations, at an average cost of $50,000. The government was asking carriers to "design a nuclear rocket ship" for a rarely used tool, Gidari thought. "In [the FBI's] view, there was no limit to the expense the carrier should spare in order to save a life."

CALEA continued to evolve, shaped by the ongoing arguments over the terms of its birth. Activists and carriers thought that the FBI was reneging on its bargain, asking for more than the law allowed. The FBI believed that carriers were stalling when they failed to meet compliance deadlines. As all sides dug in, the meetings on implementation turned bitter. FBI and Justice officials slammed their hands on tables and screamed at carrier representatives, Gidari recalls. "You're unpatriotic! What do you want to do, help the criminals?"

The government asked those same questions after September 11, 2001. And this time, telecommunications carriers responded. Outside the normal FISA warrant process, which covers intelligence-gathering, carriers opened access to their networks, their customer call data, and their valuable transactional information - the kind that CALEA had intended to exclude. President Bush and his administration believed that the extraordinary nature of the terrorist attacks demanded emergency actions that FISA couldn't accommodate, and the carriers answered the call from law enforcement and intelligence agencies. But government officials also seized on the post-9/11 mentality to change other surveillance laws and procedures, which they believed - just as their predecessors did in 1994 - were out of step with technology and reality. About three years after 9/11, officials set their sights on rewriting CALEA. 

Law enforcement agencies have never suffered for lack of access to the phone network. Kallstrom recalls only a few instances in which agents were unable to execute a wiretap order because of new technology. But as digital, mobile technology has proliferated, the copper lug nuts that Kallstrom remembers from the 1980s have disappeared. Today, state and federal agents spend most of their tap time on mobile devices. In 1994, most wiretaps, by far, targeted private residences. There were few taps on mobile devices. Ten years later, 88 percent of the 1,710 wiretaps were on mobile devices. Only 5 percent were on residential lines. Without CALEA, some experts believe that Kallstrom's initial fears would have come true and the federal government would have been shut out of the wiretapping business. 

 If ever there was a time for the bare-knuckled negotiations of the past, it's now.

As things stand, Congress appears more likely to punt the FISA debate to the new administration, and has shown little interest in revisiting CALEA. [Harris/NationalJournal/4April2008]


Research Requests

Information on Arthur Schloss.  My name is Fred Schloss and I am researching my father's involvement with the CIC. He died in 1974. His name was Arthur Schloss, and he was with the 513th MI at Camp King, Oberursel, Germany. I am currently reading a book by John Koehler on the Stasi, as I am interested in learning more about the activities of the 513th in general and my father in particular.

While I realize that some or most of this information may be classified, I would appreciate it if AFIO members could tell me whether they knew my father and anything they might be able to tell me about his activities and achievements.

I knew Col. Franz Ross when he was the post commander at Camp King. I also knew John Willms, and went to high school with his son, Michel. Colonel Ross was eventually replaced by Colonel "Tall" Paul Lutjens. I understand that both are in the MI Hall of Fame.

My dad was involved in CIC for a large part of his military career. We were stationed, during the '50's, in Bad Hersfeld, where he operated as a CIC agent. I even inadvertently learned his cover name, which caused a rather big stink when I asked my Dad who that person was. 

In Bad Hersfeld, dad worked with a man named Lasswell, and I have some of the documents that Lasswell signed, including one that authorized my father to use privately owned weapons. 

Please send comments to me at



7 - 11 April 2008 - Boston, MA - The International Association of Law Enforcement Intelligence Analysts (IALEIA), and the Law Enforcement Intelligence Unit (LEIU), will be co-hosting the 2008 Annual Conference in Boston. The conference takes place at the Park Plaza Hotel. This is the only event of its kind for law enforcement intelligence, serving an international audience, and is a "must attend" conference. The training will be first-rate and the opportunities to foster professional relationships with colleagues and peers from around the world will be extraordinary. To register on line, or for more information about the conference, please go to For hotel information and registration, please go to:

9 April 2008, 11:30 am - Albuquerque, NM - AFIO-NM luncheon meeting. Their speaker will be E. Bruce Held who will discuss Espionage in New Mexico. Bruce Held is Chief of Counterintelligence at Sandia National Laboratories where he reports directly to the Laboratory Director. Prior to becoming a Sandian, Held was a clandestine operations officer in CIA where he received the Intelligence Commendation Medal for “tenacity and extraordinary accomplishments during a period of hostilities.” Held served three times as a CIA Chief of Station in Asia, Latin America, and Africa. He also served as Special Assistant to Anthony Lake, National Security Adviser to President Clinton, and as Special Assistant to George Tenet, the Director of Central Intelligence. Inquiries to ROBERT F CLARK []

10 April 2008 – San Francisco, CA – The AFIO Jim Quesada Chapter hosts Rich Hanson on Joint Military and CIA Operations. Hanson's presentation will include a discussion of US Code Title 50, recent history of military and CIA joint operations, his personal experiences locating and reporting on bomb targets in Cambodia, and a discussion of the current state of the “Target Support Group,” as well as current military/CIA relations at Major Command level and at Langley.
The meeting will be held at United Irish Cultural Center, 2700 45th Ave SF (between Sloat and Wawona). 11:30 AM no host cocktails; noon - luncheon. $25 member rate with advance reservation; $35 non-member rate or at door. RSVP to Mariko Kawaguchi (please indicate pot roast or fish) no later than 5 PM 3/27/08:, (650) 743-2873 or send a check to P.O. Box 117578 Burlingame, CA 94011.

15 April 2008, 1130 - 1400 - Arlington, VA - National Intelligence Forum Buffet Luncheon at Dan & Brads, Arlington Hilton, 950 N Stafford St. Arlington, VA 22203. Speaker: Mr. Robert Slate on an article he wrote: “China's National Intellectual Property Strategy: Implications for U.S. National Security” which was recently published in the DI Journal. Slate is a Lead Multi-Discipline Systems Engineer at The MITRE Corporation. He formerly served as a Captain in the US Army and faculty member at the National Defense Intelligence College, Post-Graduate Intelligence Program-Reserves. Prior to obtaining his Juris Doctorate, Slate received his M.A. from the Fletcher School of Law and Diplomacy and B.A. from Oberlin College. Pay at the door with a CHECK for $26 made payable to DIAA, Inc. Social hour starts at 1130, lunch at 1215, program at 1300
RSVP by 8 April by email to Give your: Name and the names of your guests, Your association, Your telephone number, and your e-mail address.

Wednesday, 16 April 2008, 6:30 PM - Washington, DC - Spy vs. Spy: FBI and KGB Secrets from the Cold War - Event held at International Spy Museum."I was beginning to like these guys."-Oleg Kalugin on the FBI surveillance team observing him in Miami, December 1968. Once they worked against each other. Now Oleg Kalugin and David Major are colleagues and friends. In this unique evening the former KGB acting Washington station chief and FBI director of counter-intelligence retrace their exciting careers and how they intersected. They book-ended the espionage career of John Walker-Kalugin supervised the notorious spy and it was to Major's office that the traitor was brought after his arrest. From surveillance to recruitment, all will be shared. As columnist Jack Anderson once wrote, Kalugin's "undercover activities were known to the FBI, but only the State Department knows the reason he is still here." Now that the dust has somewhat settled on their overlapping cases, this is your chance to hear both sides of the story from FBI successes and snafus to KGB plots and procedures.
Location: International Spy Museum, 800 F St NW, Washington, DC, Gallery Place/Chinatown Metrorail Station. Tickets: $20; Advance Registration required. Tickets are non-refundable and do not include admission to the International Spy Museum. To register, call Ticketmaster at 800.551.SEAT or the Museum at 202.393.7798; order online at; or purchase tickets in person at the International Spy Museum.

Thursday, 17 April 2008, 12:30 - 2:30 pm - Los Angeles, CA - The AFIO L.A. Chapter luncheon features talk on Belle Boyd and Confederate Secret Service. AFIO Member Frances Hamit will address the group about his upcoming book Belle Boyd and the Confederate Secret Service. Chapter business meeting will follow. Complimentary Buffet Lunch will be served. Francis Hamit is a professional writer who once spent four years in the Army Security Agency between stints at the Iowa Writers Workshop. During the 1980s he worked for the Encyclopedia Britannica where he wrote most of the short articles on various world intelligence agencies and notable figures such as Ralph Van Deman, Edward Lansdale, Yuri Andropov and, yes, Belle Boyd.
He is best known as a journalist but now works mostly as a novelist, playwright and travel writer. His last active duty job, which ended in 1971, was as the NCOIC for the Public Information Division of the U.S. Army Security Agency, Europe in Frankfurt. That's his story and he's sticking to it. He will, in an act of shameless self promotion, be discussing his novel, The Shenandoah Spy, which will be in a new print edition this spring.
Location: Hilton business building located at the Loyola Marymount University [LMU] campus (Playa del Rey).
RSVP to no later than April 8, 2008.

Thursday, 17 April 2008, 12 Noon - 1 pm - Washington, DC - The Terrorist Recognition Handbook - A Manual for Predicting and Identifying Terrorist Activities - event held at the International Spy Museum. Terrorists can come from any background, any age group, either gender, and yet somehow they must be identified and neutralized. As an internationally recognized expert, author, and educator on the Iraq insurgency, Jihadist tactics and Al Qaeda's global organization, Malcolm Nance has studied the telltale characteristics of terrorist operations and developed an intelligence-based approach to observing and analyzing behavior for warning signs. In The Terrorist Recognition Handbook he uncovers the terrorists' means, methods, organization, and motivations. He identifies the key steps that every terrorist group will always follow, and how and why groups use and choose their weapons. Join Nance for an eye-opening look at terrorism as the sum of its parts rather than as an incomprehensible force.
Location: International Spy Museum, 800 F St NW, Washington, DC, Gallery Place/Chinatown Metrorail Station. Tickets: Free. No registration required

17-19 April 2008 - London, UK - The German Historical Institute in London hosts "Keeping Secrets" conference. The German Historical Institute in London is hosting a conference entitled "Keeping Secrets:  How Important was intelligence to the conduct of international relations from 1914 to 1939." Among the scholars expected to speak are Zara Steiner, General William Odom, Christopher Andrew, Ernest May, Paul Kennedy, Gerhard Weinberg, Mark Lowenthal, Richard Aldrich, Georges-Henri Soutou, and David Kahn. The conference will take place at the institute in central London from 17 to 19 April. For further information write Karina Kurbach at <>

18-19 April 2008 - Great Lakes, IL - The Midwest Chapter of AFIO will host its annual conference at the Great Lakes Naval Station. Registration is $10 per person. Hotel reservations ($62 per night) can be made April 17th-19th by calling the Navy Lodge at 1-847-689-1485. Mention that you are with the Midwest AFIO Chapter. For more information on speakers and meal pricing, please contact Angelo Di Liberti ASAP at 847-931-4184.

Thursday, 24 April 2008 11:30 am - Phoenix, AZ - AFIO Phoenix hosts luncheon featuring Dr. John Pye, PhD, P.E. on the value of support to Intel and Military Units.
Location: Hilton Garden Inn in Phoenix, (One block West of Central Avenue on Clarendon and one block South of Indian School Road). Pye is the Office Director and Principal Engineer at Exponent ( - a large engineering firm which provides embedded PhD's and Engineers to a US Army Special Support unit in Iraq to provide rapid prototyping and specialized engineering support to units in Iraq and Afghanistan. Support ranges from lock picks through small robots for security and search support. Dr. Pye has been by one of our members, he is articulate, interesting and sends a strong message about the value of direct support to intel and military units by smart and engaged technical people. Furthermore, to make his presentations ever more interesting, he will be bringing a little robot vehicle that can run around the room with a camera!
For reservations or concerns, please call Simone Lopes at 480.368.0374 or email her at

Friday, 25 April 2008, 10:30 am - 2 pm - Vienna, VA - AFIO National Luncheon - High Technology Wizardry in U.S. Intelligence Community - Dr. Lisa J. Porter; and Mind of Terrorists by Jerrold Post, M.D.

"Cutting-Edge Technical Wizardry in the U.S. Intelligence Community"

Speaking at 11 a.m. is Dr. Lisa J. Porter, Director of the Intelligence Advanced Research Projects Activity (IARPA).
Office of the Director of National Intelligence
Dr. Porter is the first Director of IARPA.
The IARPA sponsors research aimed at game-changing breakthroughs to complement the mission-specific science-and-technology research
being conducted by intelligence agencies.


Speaking at 1 p.m. is Jerrold M. Post, M.D., former CIA Psychiatrist,
The Psychology of Terrorism from the IRA to Al-Qaeda

Space limited. Make reservations now at this secure page.

EVENT LOCATION: The Capitol Club at the Sheraton-Premiere Hotel, 8661 Leesburg Pike � Vienna, Virginia 22182.
Driving directions here.

Monday, 28 April 2008, 1 p.m. - 5 p.m. - Washington, DC - Symposium on Richard M. Helms, former Director, CIA - His Life and Career. CIA's Historical Collections Division (HCD), Information Review and Release Group, Information Management Services - in concert with Georgetown University, CIRA, and AFIO are hosting a half day symposium in the main auditorium, Gaston Hall, on the life of Richard McGarrah Helms. A group of distinguished panelists will discuss his career in OSS and CIA and his tenure as Director of CIA. A reception will follow at Georgetown's Lauinger Library. Keynote speaker will be CIA Director General Michael V. Hayden and Henry Kissinger, former Secretary of State, followed by two panel discussions. Panelists include: Brent Scowcroft, former National Security Advisor; Michael R. Beschloss, author; David S. Robarge, CIA Historian; William Hood, author; Dr. Jennifer E. Sims, Director of Intelligence Studies: Center for Peace and Security Studies Georgetown University; and Burton L. Gerber, moderator, Professor in Practice in Intelligence: Security Studies Program, Center for Peace and Security Studies Georgetown University. Cynthia Helms, Richard Helm's wife, will be attending with her son. A display of Helms' mementos, letters, and personal effects will be exhibited in Lauinger Library beginning in April. Very limited space and no available parking at Georgetown. Modest fee-based bus service will be provided by AFIO. Buses to depart from a McLean location and a Chevy Chase location. Further information and online reservation forms.

Thursday, 29 April 2008 - Washington, DC - Institute of World Politics Open House. The IWP invites you to join them this evening for their monthly open house program to learn more about the programs and career opportunities through graduate study at IWP. Each program begins at approximately 5:30 pm and concludes by 8:00 pm. RSVPs are strongly encouraged, and preferences are easily requested by visiting the IWP home page at The Institute is located at 1521 16th Street NW, Washington, DC, eight blocks north of the White House and three blocks east of the Dupont Circle metro station (red line). IWP enrolls new students during the spring, summer, and fall terms. Make sure you're one of them.

Thursday, 1 May 2008, 12 Noon - 1 PM - Washington, DC - Our Man in Mexico: Winston Scott and the Hidden History of the CIA. Mexico City in the 1960s was a hotbed of spies, revolutionaries, and assassins. In the thick of this Cold War Casablanca was spymaster Winston Mackinley Scott. As chief of CIA's Mexico City station from 1956 to 1969, Scott played a key role in the creation and rise of the Agency. In his new book, Our Man in Mexico, investigative reporter Jefferson Morley traces Scott's career from wartime G-man to consummate intelligence officer with three Mexican presidents on his payroll. But it was Scott's role in the surveillance of Lee Harvey Oswald just prior to President John F. Kennedy's assassination that led to the spymaster's disillusionment. Join Morley for a revealing look at Scott's life and his startling rebuttal of a key finding in the Warren Report.
Where: International Spy Museum, 800 F Street, NW, Washington, DC, Gallery Place/Chinatown Metrorail Station
Tickets: Free. No registration required.

15 May 2008, 4:30 pm - 10 pm - Houston, TX - AFIO Houston Spring 2008 Dinner featuring Michael F. Scheuer, Carlos J. Barron and others. This will be an exclusive evening at the Sheraton Suites, near the Houston Galleria, featuring Michael F. Scheuer, PH.D., former CIA Chief of the Bin Laden Unit at the Counterterrorism Center, and Carlos J. Barron, FBI Assistant Special Agent in Charge, Of The FBI Counter Terrorism Intelligence Group, (CTIG) Houston Division - an FBI Joint Task Force (JTIF) initiative CIA. In addition to there will be a surprise "THIRD SPEAKER" to be named soon.
Preceding dinner, the author's reception will include appetizers and book signing of Mike Scheuer's latest and prior books: "Imperial Hubris" also "Why the West is Losing the War on Terror and Through Our Enemies Eyes" and "Osama bin Laden, Radical Islam and the Future of America." Event fee: USD60.00 per person.
There will be Special Rate offered to AFIO members as well as to all guests and attendees for Rooms at the Sheraton Suites Hotel located at 2400 West Loop South, Houston, Texas 77027. Hotel Phone 713-856-5187
Arrangements must be made thru AFIO Houston. Please contact us for assistance in reservations and booking room(s) by email listed below or by phone: 713-851-5200
Kindly RSVP here: Full program can be found at:

16 - 18 May 2008 - Bar Harbor, ME - The Naval Cryptologic Veterans Association hosts mini-reunion. The NCVA of New England will hold a mini-reunion at the Bar Harbor Regency, Bar Harbor, Maine.  The reunion is open to all personnel that worked for the US NAVSECGRU or its successor organization in NETWARCOM. Contact Vic Knorowski at 518-664-8032 or visit for information.

Wednesday, 28 May 2008 - Washington, DC - Institute of World Politics Open House. The IWP invites you to join them this evening for their monthly open house program to learn more about the programs and career opportunities through graduate study at IWP. Each program begins at approximately 5:30 pm and concludes by 8:00 pm. RSVPs are strongly encouraged, and preferences are easily requested by visiting the IWP home page at The Institute is located at 1521 16th Street NW, Washington, DC, eight blocks north of the White House and three blocks east of the Dupont Circle metro station (red line). IWP enrolls new students during the spring, summer, and fall terms. Make sure you're one of them.

Wednesday, 28 May 2008, 6:30 pm -The Devil May Care: A Celebration of the New Bond Novel and Ian Fleming's 100th Birthday
What better way to celebrate Ian Fleming's 100th birthday then with a briefing on the newest Bond novel and a shaken, not stirred, icy martini? Sebastian Faulks, author of Birdsong and Charlotte Gray, is now taking on the most famous spy ever. Hear how Faulks channeled Fleming to write "Devil May Care"- a madcap Bond adventure and romantic romp. And then salute Fleming and 007 with a Bondian cocktail. Zola's own in-house expert on "mixology," Ralph Rosenberg, will demystify the popularity of the restaurant's signature cocktails, while you enjoy drinks and hors d'oeuvres, and mingle with James Bond's real-life counterparts. Shaken or stirred? You decide.
Where: International Spy Museum, 800 F Street, NW, Washington, DC, Gallery Place/Chinatown Metrorail Station
Tickets: $32; Advance Registration required. Tickets include martinis, specialty drinks, and hors d'oeuvres from Zola. Tickets are non-refundable and do not include admission to the International Spy Museum. Phone registration only for this program; to register, call 202.654.0930.

Tuesday, 3 June 2008, 6:30PM - Washington, DC - From the Secret Files of the International Spy Museum(tm) Spycraft 101: CIA Spytech From Communism to Al-Qaeda.
Rubber airplanes, messages hidden inside dead rats, and subminiature cameras hidden inside ballpoint pens...a few of the real-life devices created by CIA's Office of Technical Service (OTS). These and other clever technical devices are featured in Spycraft: The Secret History of the CIA's Spytechs from Communism to Al-Qaeda, by the former director of OTS Bob Wallace teams up with espionage gadget collector H. Keith Melton to discuss the operations of OTS...from the Cold War, the Cuban Missile Crisis, and the war on terror. Rare OTS devices including concealments, microdots, and disguises will be on display.
Where: International Spy Museum, 800 F St NW, Washington, DC, Gallery Place/Chinatown Metrorail Station
Tickets: $20; Advance Registration required. Tickets are non-refundable and do not include admission to other the Museum exhibits. To register, call Ticketmaster at 800.551.SEAT or the Museum at 202.393.7798; order online at; or purchase tickets in person at the Museum.

For Additional Events two+ months or greater....view our online Calendar of Events


Disclaimers and Removal Instructions

Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers. 

REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs: 

a)  IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list.  If this link doesn't open a blank email, create one on your own and send to with the words:  REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.

 b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.

CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link:


WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor(s) or author(s) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!

(c) 2008, AFIO, 6723 Whittier Ave, Suite 303A, McLean, VA 22101. Voice: (703) 790-0320; Fax: (703) 991-1278; Email:

Click here to return to top.