[Editors' Note: The WIN editors attempt
to include a wide range of articles and commentary in the Weekly Notes
to inform and educate our readers. However, the views expressed in the
articles are purely those of the authors, and in no way reflect support
or endorsement from the WIN editors or the AFIO officers and staff. We
welcome comments from the WIN readers on any and all articles and
SPYPEDIA updates as of 7 June: In a U.S.-based economic espionage case, on 04 June, Jianyu Huang was
indicted on several counts for taking nanotechnology research from
Sandia National Labs and providing it to Chinese state-run universities
as his own research.
-Centre for Counterintelligence and Security Studies (CI Centre)
Section I - INTELLIGENCE HIGHLIGHTS
Panetta Warns of Cyber Pearl Harbor. Defense Secretary Leon Panetta warned a Senate panel today that
America faces "the potential for another Pearl Harbor" launched by
enemies who have the capability to wield a cyberattack that would
"paralyze this country."
Panetta made his remarks under questioning by Sen. Lindsey Graham (R-S.C.) during a Department of Defense (DOD) budget hearing held by the Senate Appropriations Subcommittee on Defense.
Referring to a potential cyberattack against the United States, Graham asked, "You said something that just kind of went over everybody's head, I think, that there's a Pearl Harbor in the making here. You're talking about shutting down financial systems, releasing chemicals from chemical plants, releasing water from dams, shutting down power systems that can affect the very survival of the nation. What's the likelihood in the next five years that one of these major events will occur?"
Panetta answered, "All I can tell you is that technologically the capability to paralyze this country is there now."
When Graham asked whether a "growing will" existed among enemies of the United States to engage in cyberattack, Panetta said, "I think that the more this technology develops, the more the will to potentially use it is going to take place."
Graham, who also serves on the Senate Armed Services Committee, then followed up and asked, "Would you say there's a high probability?"
"I think there's a high risk," said Panetta. [Read more: Mora/CNSNews/13June2012]
NSA Delves Into Next Level of Data Analysis. The National Security Agency has launched an initiative to better trace and record the origins and accuracy of data the agency collects and its movement between databases, a discipline known as data provenance, which is becoming more important as the intelligence community attempts to fuse and analyzes troves of data from a variety of sources.
NSA has a pilot initiative that runs on top of a big data, standard cloud architecture that lets the agency track the entire life cycle of data, said Neal Ziring, technical director of NSA's Information Assurance Directorate.
Big data technologies offer potential advantages for extracting knowledge and actionable information from mountains of raw data, but there are still challenges that government and industry must overcome to reap the benefits, Ziring said.
The intelligence community needs big data technologies to make sense of the complex patterns and behaviors of adversaries who have become more and more sophisticated, he said.
Ziring spoke June 13 at the National Institute of Standards and Technology's Big Data Workshop in Gaithersburg, Md., citing several challenges that hamper government agencies from getting the full benefit from big data analytics, including the fusing of data from multiple sources, handling data subject to different forms of constraint, supporting analytic multi-tenancy and enabling exploration and discovery.
Often intelligence analysts want to derive actionable knowledge from data but find that there are constraints or restrictions on the data. They get a data feed from a source that comes with strings attached: It might be top secret, privacy protected or subject to legal considerations. [Read more: Yasin/GCN/14June2012]
U.S. Expands Secret Intelligence Operations in Africa. The U.S. military is expanding its secret intelligence operations
across Africa, establishing a network of small air bases to spy on
terrorist hideouts from the fringes of the Sahara to jungle terrain
along the equator, according to documents and people involved in the
At the heart of the surveillance operations are small, unarmed turboprop aircraft disguised as private planes. Equipped with hidden sensors that can record full-motion video, track infrared heat patterns, and vacuum up radio and cellphone signals, the planes refuel on isolated airstrips favored by African bush pilots, extending their effective flight range by thousands of miles.
About a dozen air bases have been established in Africa since 2007, according to a former senior U.S. commander involved in setting up the network. Most are small operations run out of secluded hangars at African military bases or civilian airports.
The nature and extent of the missions, as well as many of the bases being used, have not been previously reported but are partially documented in public Defense Department contracts. The operations have intensified in recent months, part of a growing shadow war against al-Qaeda affiliates and other militant groups. The surveillance is overseen by U.S. Special Operations forces but relies heavily on private military contractors and support from African troops. [Read more: Whitlock/WashingtonPost/13June2012]
Nicaragua Accuses Colombia of Spying. Nicaragua has accused Colombia of sending a spy to obtain classified information about the Central American country for its armed forces.
Inspector General Armando Juarez said at a press conference Friday that "convincing evidence" has been gathered about the activities of Colombian Luis Felipe Rios Castaqo, whom the Attorney General's Office charged Thursday with espionage.
Rios Castaqo's purpose was to obtain and gather "restricted, reserved and classified" army information and transmit it to the general command of the Colombian armed forces, Juarez said.
The purported spy, who has been jailed and is scheduled to appear in court for an initial hearing on June 26, could face up to eight years in prison,
The alleged spying "is not a peaceful action. It's not an action that would be expected between fraternal nations or between governments that have legal relations," Juarez said.
Nicaragua's army chief, Gen. Julio Cesar Aviles, said the espionage case comes at a time when the two countries are awaiting a ruling by The Hague, Netherlands-based International Court of Justice in a maritime dispute. [Read more: FoxNews/16June2012]
Kenya Denies Hosting US Spy Plane Operations. Kenyan military officials have denied the United States is using Kenyan territory or airspace to conduct regional surveillance missions, as mentioned in a Washington Post newspaper report describing expanding U.S. intelligence operations across Africa.
On Friday, the U.S. military confirmed it runs "broad ranging" intelligence operations in Africa, but it stopped short of verifying it has set up air bases.
The Post article included Kenya among a list of East African countries where the United States is reportedly conducting air surveillance operations, along with Ethiopia, Djibouti, Uganda and the Seychelles.
A spokesman for the Kenyan military, Colonel Cyrus Oguna, said he had no knowledge of such a program in the country.
"As far as we are concerned, the U.S. is not using any Kenyan airspace or any bases from where they can be able to launch observation vessels," Oguna said. "However, I know that we do have bilateral arrangements in terms of sharing information and intelligence to fight terror." [Read more: Joselow/VOA/15June2012]
Turkey Arrests 49 Military Officers for Espionage. Turkey has arrested 49 military officers in the second phase of an operation to dismantle a military espionage ring in the country.
Turkish newspaper Today's Zaman quoted Izmir Chief Public Prosecutor's Office as saying that the 49 arrestees were among the 51 officers against whom arrest warrants had been issued on Wednesday.
Sting operations were launched simultaneously in 16 provinces. The detainees are reportedly holding high-profile positions in the Ministry of Defense, the Land Forces Command, the Naval Forces Command and the G|lhane Military Academy of Medicine (GATA).
The officers are accused of blackmailing, and illegally obtaining military information. The gang reportedly used prostitutes to blackmail and obtain classified security information from high-ranking officers and senior bureaucrats.
The first phase of the operation was launched in May when 20 people were arrested for involvement in the espionage gang.
Based in Izmir, the gang is reported to have branches in a number of provinces, including Istanbul, Ankara, Bursa, Antalya, Mugla, Manisa, Zonguldak and Ordu. [Read more: PressTV/15June2012]
NSA Launches Cyber Operations Program. The U.S. National Security Agency has launched a new Cyber Operations Program at four select universities to fill gaps in existing cybersecurity curriculum and technical training.
The primary goal of the Center of Academic Excellence (CAE) in Cyber Operations is to produce a larger pool of professionals with deeper technical expertise in inter-disciplinary areas of computer science, computer engineering and electrical engineering.
The Cyber Operations program will specifically train students for intelligence, military and law enforcement jobs, which require extra education in operating and protecting networks against enemy attacks. For example, students will learn to defend against the new generation of Stuxnet.
"The program will focus on the hardcore fundamentals of cyber offense and defense strategies," says Steven LaFountain, NSA technical leader for the CAE program.
The traditional CAEs include programs focused in information assurance education (CAE-IAE) and research (CAE-R).
However, NSA finds that many of the traditional CAE schools lack courses in emerging areas like reverse engineering, device security and malware analysis. In addition, schools do not have resources or focus to produce the quality of technical folks needed by the government to protect critical infrastructure.
"We found a lot of schools weren't updating their curriculum and keeping up with emerging technologies," LaFountain says.
Of the 20 universities that applied, only four received the new Cyber Operations designation for the year 2012-2013. The four schools are: Dakota State University in South Dakota, the Naval Postgraduate School in California, Northeastern University in Massachusetts, and the University of Tulsa in Oklahoma.
These institutions were chosen because they offer a deeply technical, interdisciplinary curriculum within specific fields of computer science, computer engineering and electrical engineering. [Read more: Gupta/GovInfoSecurity/14June2012]
Atlas V Launch Delayed Until Wednesday. The scheduled launch of an Atlas V rocket carrying a top-secret national security-related payload originally scheduled for Monday morning has been delayed, the United Launch Alliance (ULA) announced on Sunday.
According to WFTV.com and Brevard Times reports, the launch was originally scheduled to take place between 8:26am and 9:25am EDT on Monday.
However, an environmental control system duct failure discovered Saturday has delayed the launch of the Atlas V 401 rocket and its National Reconnaissance Office (NRO) NROL-38 payload until Wednesday, June 20. The vehicle was reportedly returned to the Vertical Integration Facility in order for the duct to be removed and replaced.
"The rocket is carrying a classified payload into orbit for the U.S. National Reconnaissance Office," the Orlando Sentinel reported Sunday afternoon. "Because it is a national security mission, the window of opportunity of the launch has not been disclosed yet. However, the spaceflight web site SpaceflightNow.com said the launch has a target of 8:28 a.m., and weather is forecast with a 70 percent chance of acceptable conditions for launch."
The launch will take place at Space Launch Complex-41 at Cape Canaveral, Florida, and will be the fifth ULA launch this year, the Alliance said. It is also the second of four scheduled NRO launches to take place in 2012, and the first of three set to occur over the next six weeks, the ULA added. [Read more: RedOrbit/18June2012]
US Declassifies Attacks in Yemen, Somalia. The White House is partially lifting the lid of secrecy on its counterterrorism campaign against al-Qaida in Yemen and Somalia by formally acknowledging for the first time that it is conducting lethal attacks in those countries.
The White House's semiannual report to Congress on the state of U.S. combat operations abroad, delivered Friday, mentions what has been widely reported for years but never formally acknowledged by the administration: The U.S. military has been taking "direct action" against members of al-Qaida and affiliates in Yemen and Somalia.
The report does not elaborate, but "direct action" is a military term of art that refers to a range of lethal attacks, which in the case of Yemen and Somalia include attacks by armed drones. The report does not mention drones, which are remote-controlled, pilotless aircraft equipped with surveillance cameras and sometimes armed with missiles.
The report applies only to U.S. military operations, including those by special operations forces - not those conducted by the CIA.
"In all cases we are focused on those al-Qaida members and affiliates who pose a direct threat to the United States and to our national interests," Pentagon press secretary George Little said after the report's release. "This report contains information about these operations owing to their growing significance in our overall counterterrorism effort."
The report does not provide details of any military operations in either Yemen or Somalia. It merely acknowledges they have happened. Killings of terror suspects overseas are acknowledged by the administration, but it does not mention the involvement of drones. The CIA and military have separate drone fleets. [Read more: Burns/AP/15June2012]
CIA Director Among Winners of Jefferson Awards. The director of the CIA, two musicians and a former Buffalo Bills quarterback are among the people being honored with a national prize for public service that was co-founded 40 years ago by former first lady Jacqueline Kennedy Onassis.
Recipients of the 2012 Jefferson Awards will accept their honors Tuesday in Washington during a luncheon at the Hyatt Regency Hotel and at an evening celebration at Constitution Hall.
Three sports stars are being given awards. They are Hall of Fame hockey player Pat LaFontaine, who created a group that pays for game rooms for kids in hospitals around the country; race car driver Charlie Kimball, a diabetic who has become a spokesman for the issue; and Hall of Fame Bills quarterback Jim Kelly, who with his wife, Jill, created a foundation in honor of his son Hunter. Hunter was diagnosed with Krabbe disease, a rare genetic disorder that affects the central nervous system, and died in 2005 at age 8.
Most of the 18 recipients of the awards, dubbed a ''Nobel Prize'' for public service, are not celebrities. Finalists who will learn whether they won Tuesday include a leader of the Boy Scouts in Michigan, a Wisconsin woman who runs a local clothing drive, an Ohio mom who advocates for bicycle safety, and a grocery store employee from California who is the driving force behind the company's volunteer program.
The more well-known honorees include retired four-star Army general-turned-CIA director David Petraeus, who led U.S. forces in Iraq and Afghanistan and became head of the CIA in 2011. He's accepting the award for greatest public service by an elected or appointed official. [Read more: Gresko/AP/18June2012]
Obama to Rebuff Israel's Peres on Clemency for Israeli Spy Pollard. President Barack Obama will roll out the red carpet Wednesday for visiting Israeli President Shimon Peres but the White House said he will slam the door on any appeal to commute the life sentence of convicted Israeli spy Jonathan Pollard.
"Our position has not changed, and will not change today," Obama spokesman Jay Carney told reporters at his daily briefing. "Mr. Pollard was convicted of extremely serious crimes."
Obama was to meet with Peres and then host a gala dinner to give the Israeli leader America's highest civilian honor, the presidential medal of freedom. Peres, who has been under pressure from Pollard supporters to reject the award if Obama refuses to free the convicted spy, was expected to press his host for clemency. Obama previously rejected a January 2011 request from Israeli Prime Minister Benjamin Netanyahu to free Pollard, a former U.S. Navy intelligence analyst convicted in 1985 of passing classified information to Israel. Netanyahu's appeal was the first such public plea, and it drew support from most of Israel's parliament, the Knesset. Pollard, who has been ill recently, has been held in federal prison in North Carolina since 1986. [Read more: Knox/ABCNews/13June2012]
Section II - CONTEXT & PRECEDENCE
George Washington Bacon III, MACV-SOG Operator, CIA Para-Military Officer, and Eccentric Genius. George Washington Bacon shook his head.
Crammed into the back of a door-less gray Land Rover, the mercenaries accelerated, sliding across the muddy road as it twisted through the Angolan jungle. As a veteran of MACV-SOG recon missions into Cambodia and having worked as a CIA Para-Military Officer in Laos, George would have known that something was wrong. Fellow mercenary, Gary Acker, had voiced his uncertainty as they raced to link up with another FNLA patrol. George clutched a 9mm Uzi submachine gun while Acker manned a German MG42 machine gun. The Portuguese driver was about to lose control of the vehicle until Douglas "Canada" Newby ordered him to slow the hell down.
"Canada bought most of us another minute of life," wrote Gary Acker.
In 1976 the Cuban and Soviet sponsored FAPLA was engaged in a vicious war of attrition against the CIA sponsored FNLA. It was a proxy war fought by the world's two superpowers in which little quarter was shown by either side. The CIA was never actually in it to win it, rather they were simply trying to deny the Soviets an easy victory. If the Russians wanted Angola, they were going to bleed for it.
George would have understood the precarious situation they were in. FAPLA was once again on the offensive and he had just finished prepping a bridge with TNT explosives for demolition in order to delay the enemy advance.
FNLA recruiting drives in England and the United States had signed up a number of adventurers to fight in Angola. Some were qualified for the work having had military experience in the US Marines, British Paras, or SAS. George Washington Bacon was in a category all his own writes British safe-cracker and mercenary David Tompkins, "Another recruit was George Bacon, a political science major and holder of the CIA's second-highest award, the Intelligence Star. He was considerably overqualified for the work; he should have been a CIA station chief in Kinshasa, not a grunt in Angola."
But there was more to George Bacon. Much more.
Rounding a bend in the road, with the vehicle barely under control, the Land Rover ran right into the back end of a stake bed truck, the Land Rover's hood actually going under the bed of the truck before they came to a halt. Acker spotted a Soviet BRDM armored vehicle, suddenly realizing that they had just crashed into the rear end of a Cuban FAPLA convoy.
In seconds, the Land Rover was being turned into a sieve by enemy gunfire. [Read more: Murphy/HumanEvents/5June2012]
Still Tapping Into Watergate. Unlike most guys his age, Phil Mellinger actually sat down and watched the Watergate hearings when he was 16.
He was entering his junior year at Wyomissing High School and already was hooked on the thing the newspapers were calling "wire tapping" and "bugging."
"I was fascinated," Mellinger said. "I couldn't figure out how the White House counsel was just 14 years ahead of where I was, and there he was calmly testifying before Congress."
In 40 years, Mellinger, 54, has gone from Watergate hobbyist to national expert on the investigation that brought down a president and threatened the very foundation of American government.
And he still has questions:
"Who was the original White House source of Deep Throat's information?
"What was said on the missing portions of President Richard Nixon's Oval Office tapes?
"What were the burglars looking for at The Watergate Hotel?
Young Phil Mellinger was not without distractions. He played basketball and tennis. His two older brothers, Byron and Marty, were in rock bands.
Phil and his twin brother, Scott, graduated high school in 1975 and each went to Penn State, class of 1979.
Scott joined the National Security Agency right out of college but Phil went into the Air Force to pursue his passion for audio surveillance before also joining the NSA. The brothers weren't done learning though, each earning a master's degree in computer science from Johns Hopkins University.
Phil Mellinger said his fascination with Watergate caused him to pursue a career as a bugging-debugging specialist in the Air Force.
He later worked as a special agent in charge of investigating cyberattacks and worked as the chief of cryptography for NATO before leaving government service for the private sector, where he now works as a computer network security expert.
At least, that's his day job. [Read more: Kelly/ReadingEagle/17June2012]
Meet Triton, the Navy's New Spy Drone. Though at first glance it looks a lot like the Air Force's high-flying spy drone, the Navy's new surveillance aircraft doesn't want to be confused with the Global Hawk.
Northrop Grumman today unveiled its MQ-4C Triton, an unmanned aircraft the company has built for the Navy's Broad Area Maritime Surveillance (BAMS) program. The new unmanned aircraft, based on Northrop's Global Hawk, will soon help patrol the oceans along with Navy aircraft such as the P-3 by providing overhead surveillance. "It's been made more robust," Walt Kreitler, Northrop's director of business development for BAMS, says of the new Triton aircraft.
The MQ-4C maintains many basic elements of the Global Hawk design, along with airframe improvements including anti-icing capabilities, improved anti-lightning protection, and a new wing design. The Triton is designed to be vertically agile - meaning, for example, that it could descend quickly through clouds to take a picture of a ship. It's bigger than the Global Hawk, with a wingspan of 130 feet. The Triton will be based at five locations around the world and will have a range of 8000 nautical miles.
Beyond the changes to the airframe, the MQ-4C also carries different equipment to optimize it for maritime surveillance. The Triton will be equipped with a Multi-Function Active Sensor (MFAS) designed specifically for spotting objects in the ocean. This "field of regard" radar will provide 360-degree coverage of the area below, allowing it to spot ships and other objects of interest. The Triton will also fly a "due regard" radar that will help provide sense-and-avoid capabilities, a critical component for allowing unmanned aircraft to fly in the national airspace alongside manned aircraft.
Once the aircraft are delivered to the Navy it will begin flight testing, first at Edwards Air Force Base in California, and then at Patuxent River in Maryland. Currently the Triton's 360-degree radar is being flown on a Gulf Stream aircraft, which Kreitler says has been a big success. The next step will be integrating it on the unmanned airframe. The Navy is scheduled to begin operating the Triton in 2015, with full capability fielded about five years after that. [Read more: Weinberger/PopularMechanics/14June2012]
An In-Mouth Mic and Other Crazy Spy Technologies Subsidized by the CIA's Investment Fund. A social media data mining engine and a tiny microphone that sits inside a person's mouth are just two of the technologies that have attracted investment from the U.S.'s most secretive government agencies in recent years.
Casting a spotlight on In-Q-Tel, an investment fund for the CIA and other intelligence agencies, the San Jose Mercury News detailed Monday the behind-the-scenes role a number of Silicon Valley companies are playing in developing various spy tools.
Several of the companies - which are said to typically receive $1 million to $3 million from the fund - were "hesitant to talk" to the paper. Others declined to be interviewed or said they were prohibited from doing so. But those who did go on the record let slip some interesting details.
San Mateo-based Sonitus Medical revealed it is developing a tiny two-way wireless communications device for the U.S. intelligence community. The device covertly sits in a person's mouth, the CEO of Sonitus said, and one of its chief attributes is that "nobody knows you are wearing anything." Sonitus previously announced in 2009 that it had received In-Q-Tel funding and was designing a "hearing device to transmit sound via the teeth."
Other firms to have attracted investment from the fund include San Francisco company 3VR, which offers a "facial surveillance" camera tool that it says allows organisations to "build, manage, and share watch lists of faces"; NetBase, which sells "semantic-search capabilities" that can analyze social networks in a number of languages and read "billions of sources in public and private online information"; and Silver Tail Systems, which sells a technology that can spot "suspicious activity" on government websites.
The Massachusetts-based Recorded Future, one of the companies based outside the Bay Area to have received In-Q-Tel funding, builds tools for intelligence analysts that it says help "foresee what may happen in the future." [Read more: Gallagher/Slate/13June2012]
Section III - COMMENTARY
The Embers Begin To Glow: A Rebirth for Italian Terrorism? On March 16, 1978, Aldo Moro, the former Prime Minister of Italy and
head of Italy's largest and most powerful political party, the Christian
Democrats, was kidnapped in broad daylight in downtown Rome. Enroute to
the Parliament building for important political discussions, Moro's
two-car convoy was hit on Via Mario Fani. A single vehicle brought the
cars carrying Moro and his bodyguards to a halt in the narrow street.
Another blocked them in from behind. Gunmen dressed as Alitalia, the
Italian state airline, personnel so as to ensure they could identify
each other in the chaos, opened fire.
Ninety-one bullets were fired by the assailants. Forty-five of those struck the bodyguards riding with Moro and in a following vehicle. All five individuals were killed. Only one even had a chance to return fire. Moro himself was untouched as were all of his attackers.
Moro was kidnapped and taken from the scene. He was held for fifty-four days in an apartment in Rome. Then, when it became clear the Italian government would not negotiate for his release, he was shoved into a vehicle and shot eleven times with a shotgun. His body was dumped near the headquarters of the Christian Democratic Party in Rome.
Moro's murderers were members of the Red Brigades, an Italian terrorist group active in the 1970's and 1980's in Italy. They are credited with a grand total of some 14,000 actions during their existence. Their ideology was a potent mix of Marxism-Leninism and anarchism. They opposed Italy's membership in NATO and sought to create a revolutionary Communist state in Italy. In their prime, they were as lethal as any terrorist group on the planet, and they came very close to igniting a revolutionary fire in Italy that would have consumed that nation from within.
The Red Brigades as we they existed in 1978 are no longer with us. Internal ideological disputes, the end of the Cold War and determined police work by the Italians ultimately brought them down. Many of their key personnel, once in custody, rolled over and agreed to provide testimony against their former comrades. The blaze, which had threatened to destroy democratic Italy, was beaten back.
But not extinguished.
Last week, an Italian anarchist group calling itself the Olga Nucleus of the Informal Anarchist Federation-International Revolutionary (FAI), took responsibility for the shooting of Roberto Adinolfi, the CEO of Ansaldo Nucleare in Genoa on June 4, 2012. Ansaldo Nucleare, part of the Italian industrial conglomerate, Finmeccanica, builds, operates and decommissions nuclear power plants. Adinolfi was ambushed near his residence in Genoa and shot in the legs by two assailants, who then fled the scene on motorbikes. [Read more: Faddis/AND/June2012]
The New Obama Doctrine: A Six-Point Plan for Global War. It looked like a scene out of a Hollywood movie. In the inky darkness, men in full combat gear, armed with automatic weapons and wearing night-vision goggles, grabbed hold of a thick, woven cable hanging from a MH-47 Chinook helicopter. Then, in a flash, each "fast-roped" down onto a ship below. Afterward, "Mike," a Navy SEAL who would not give his last name, bragged to an Army public affairs sergeant that, when they were on their game, the SEALs could put 15 men on a ship this way in 30 seconds or less.
Once on the aft deck, the special ops troops broke into squads and methodically searched the ship as it bobbed in Jinhae Harbor, South Korea. Below deck and on the bridge, the commandos located several men and trained their weapons on them, but nobody fired a shot. It was, after all, a training exercise.
All of those ship-searchers were SEALs, but not all of them were American. Some were from Naval Special Warfare Group 1 out of Coronado, California; others hailed from South Korea's Naval Special Brigade. The drill was part of Foal Eagle 2012, a multinational, joint-service exercise. It was also a model for - and one small part of - a much publicized U.S. military "pivot" from the Greater Middle East to Asia, a move that includes sending an initial contingent of 250 Marines to Darwin, Australia, basing littoral combat ships in Singapore, strengthening military ties with Vietnam and India, staging war games in the Philippines (as well as a drone strike there), and shifting the majority of the Navy's ships to the Pacific by the end of the decade.
That modest training exercise also reflected another kind of pivot. The face of American-style war-fighting is once again changing. Forget full-scale invasions and large-footprint occupations on the Eurasian mainland; instead, think: special operations forces working on their own but also training or fighting beside allied militaries (if not outright proxy armies) in hot spots around the world. And along with those special ops advisors, trainers, and commandos expect ever more funds and efforts to flow into the militarization of spying and intelligence, the use of drone aircraft, the launching of cyber-attacks, and joint Pentagon operations with increasingly militarized "civilian" government agencies.
Much of this has been noted in the media, but how it all fits together into what could be called the new global face of empire has escaped attention. And yet this represents nothing short of a new Obama doctrine, a six-point program for twenty-first-century war, American-style, that the administration is now carefully developing and honing. Its global scope is already breathtaking, if little recognized, and like Donald Rumsfeld's military lite and David Petraeus's counterinsurgency operations, it is evidently going to have its day in the sun - and like them, it will undoubtedly disappoint in ways that will surprise its creators.
For many years, the U.S. military has been talking up and promoting the concept of "jointness." An Army helicopter landing Navy SEALs on a Korean ship catches some of this ethos at the tactical level. But the future, it seems, has something else in store. Think of it as "blur-ness," a kind of organizational version of war-fighting in which a dominant Pentagon fuses its forces with other government agencies - especially the CIA, the State Department, and the Drug Enforcement Administration - in complex, overlapping missions around the globe. [Read more: Turse/Salon/14June2012]
Stopping the Chinese Hacking Onslaught. History may one day reveal that as the United States fretted over the possibility of a "cyber Pearl Harbor" - a catastrophic attack that would take down electrical grids - its economic lifeblood was being slowly drained away by a massive hacking enterprise located in the People's Republic of China.
Cyber Command Commander Army Gen. Keith Alexander last year called the cyber-espionage being conducted against U.S. companies the largest transfer of intellectual property from one nation to another in the history of the world.
Eric Rosenbach, deputy assistant secretary of defense for cyber policy, said the nation is not as focused on intellectual property theft as it should be. A catastrophic cyberwar is important to prepare for, but an unlikely scenario. Stealing data important to the nation's economic security, meanwhile, is occurring here and now.
"It is the day-by-day cut that is bleeding us - the death by a thousand cuts to watch out for," he said at the Air Force Association's CyberFutures Conference recently.
Experts describe a large, technologically advanced and well organized enterprise coming out of China that is going after businesses large and small. Any firm that has a trade secret, or could be used as a stepping stone to a larger company, is a potential target. Intellectual property theft has the potential to erode a company's profits or even bankrupt it. There is no magical software that can stop every intrusion attempt, but even companies with few resources can take steps to mitigate the risk, experts told National Defense.
To thwart the Chinese cyber-espionage enterprise, it is important to characterize it. In the world of network security, it was once called the "advanced persistent threat." But government officials have done away with using that euphemism: it's China, they now say. The October 2011 "Foreign Spies Stealing U.S. Economic Secrets in Cyberspace" report, produced by the FBI's office of the national counterintelligence executive, acknowledged that the attacks came from China, but stopped short of blaming the Chinese government, which routinely denies involvement.
These espionage enterprises seem to have the full force and resources of the Chinese government behind them, analysts said.
Jason Lewis, chief technology officer of Looking Glass Cyber Solutions, said, "In general, when you have a situation where the state runs everything, you have to assume that the state is involved in any enterprise."
How much intellectual property, trade secrets and business intelligence is being exfiltrated across the Pacific every day? [Read more: Magnuson/NDIA/July2012]
An Internal Review of CIA Spy Memoirs - Seriously? Let's look at Intelligence Leaks That Matter. The news arrived the way it usually does in Washington - via a leak. Someone told the Washington Post that the Central Intelligence Agency had launched an investigation of its Publications Review Board (PRB) which is charged with vetting manuscripts, articles and other writings that current and former Agency employees wish to make public.
The allegation in the Post story on May 31 was that, according to anonymous sources, the PRB plays favorites in clearing some submissions such as my recent book "Hard Measures: How Aggressive CIA Actions After 9/11 Saved American Lives" but makes life difficult for Agency critics.
CIA officials refused to confirm or deny the existence of an investigation. But given CIA's penchant for circular firing squads and self-destructive self-examination, some sort of review is probably taking place.
My going in position is to state that yes "Hard Measures" reveals some huge secrets and everyone should rush out and get a copy to try to find them.
I'll give you a head start.
The biggest secret revealed is that, in the years immediately after 9/11, the men and women of CIA did their jobs extraordinarily well. Taking actions that were approved by the President of the United States, judged legal by the Department of Justice, and fully briefed to appropriate members of Congress, we were able to capture or kill the majority of Al Qaeda's top leadership and prevent numerous follow-on terrorist attacks that were intended to rival September 11, 2001.
Why is this a secret? In part, because of inability or unwillingness of the CIA to defend itself.
Time and again politicians, journalists and agency critics have been able to spout demonstrably untrue nonsense with no response from CIA. Documents and facts, which should have remained secret, however, have been tossed out the door by the Obama administration and then misinterpreted by the chattering class. Frustration with this pattern contributed to my decision to write my book in an effort to set the record straight.
The result? Apparently the bureaucracy reacts by investigating their own apparatus which (correctly) declared that my final manuscript did no harm to national security. I say "final" manuscript because the PRB did object to large portions of my original submission.
I challenged some of the proposed cuts - sometimes with success, often without. For example, the PRB demanded that I remove in its entirety a more than 2,000-word-long section about a sensitive and widely misunderstood and mischaracterized program. While I disagreed with their decision, I complied.
There were many other instances where I was required to modify facts, figures and details to protect Agency programs, officers and those who worked with us.
In virtually every instance, if I had been permitted to be more precise, the case I made in the book about the value and necessity of Agency actions would only have been strengthened.
Well, what of the allegation that the PRB has gutted books critical of the CIA but let mine go through relatively unscathed?
If the Agency has been trying to prevent negative things being said about it by people who are required to get their manuscripts reviewed - they have been doing a miserable job of it.
The brief review of the literature will show countless examples of Agency-cleared books dumping on the organization that cleared them. Some will point to a handful of books printed with a large number of blacked out redactions and big sections of text removed. Doesn't this prove the Agency treats its critics harshly?
Not at all. [Read more: Rodriguez/FoxNews/13June2012]
Section IV - Obituaries, Books and Documentaries and Coming Events
Dick Stolz. Dick
Stolz, a veteran intelligence officer whose poise and integrity as the
CIA's top spymaster brought stability to the agency's clandestine
service in the aftermath of the Iran-contra affair, died June 9 at a
hospital in Williamsburg. He was 86.
He had complications from a fall, said his son Richard Stolz III.
Mr. Stolz joined the CIA in 1950 and became one of the agency's most respected covert officers, serving in Cold War hot spots around Eastern Europe before he became the chief of Soviet operations in the mid-1970s.
"There is nothing 'cowboy' about Dick," Sen. Patrick J. Leahy (D-Vt.), a former member of the Senate Select Committee on Intelligence, said in a tribute to Mr. Stolz in 1991. "He epitomizes the careful, calm intelligence operator."
Mr. Stolz was serving as chief of station in London in 1981 when President Ronald Reagan appointed William Casey to be director of the CIA
Not long after, Casey approached Mr. Stolz and offered him a new position. Casey had tapped his campaign aide, Max Hugel, to be his deputy responsible for covert action. Asked by Casey to assist Hugel, who had no experience in intelligence, Mr. Stolz promptly refused and retired from the CIA.
Within months, Hugel resigned from the agency amid accusations of financial wrongdoing by former business associates. A respected CIA veteran, Clair E. George, eventually took Hugel's place as deputy director for operations.
During the mid-1980s, George became ensnared in an operation to sell weapons to Iran and divert the profits to right-wing Nicaraguan rebels known as the contras. The White House-led mission was supported by the CIA and violated a congressional mandate restricting open U.S. support to the contras.
George was forced to resign in 1987 for his role in Iran-contra. Casey died the same year. Reagan appointed former FBI director and federal judge William H. Webster to take over the deeply shaken agency.
Seeking a steady hand to lead the directorate of operations, Webster coaxed his old Amherst College friend, Mr. Stolz, out of retirement.
In an interview with The Washington Post on Tuesday, Webster said he had "total respect" for Mr. Stolz. "He was the kind of person that would help me restore confidence and credibility in the agency. I felt that Dick's background in intelligence had been superb, and his personal character and the respect he had within the agency were A number one." [Read more: Shapiro/WashingtonPost/12June2012]
Henry Ozga. Henry Ozga, 85, a retired officer in the CIA clandestine service who became a landscape and garden designer after 27 years in espionage, died May 28 at MedStar Washington Hospital Center of complications after a stroke.
The death was confirmed by his daughter, Ellen O. Boardman.
Mr. Ozga retired from the CIA in 1978 as deputy chief of the clandestine service's European division. On retirement, he received a medal for exceptional achievement.
Henry Adam Ozga was born in Trenton, N.J., the son of Polish immigrants.
He served in the Navy during World War II. In 1951, he graduated from Georgetown University's School of Foreign Service and joined the CIA. His overseas posts included London and Frankfurt, Germany.
On his retirement from the CIA, Mr. Ozga turned a lifelong avocation in horticulture and landscape design into a full-time vocation. He went back to college and received a certificate in landscape design from George Washington University. For two decades, he specialized in designing nursing home and retirement home gardens and landscapes, including the landscaping at the Ingleside at Rock Creek retirement community in Washington.
He was a former president of the Master Gardeners of Washington and a director of Garden Resources of the District of Columbia.
Except for his overseas tours with the CIA, Mr. Ozga had lived in Washington since 1947. He was known around his neighborhood near Chevy Chase Circle for always wearing at least two sweaters even in the warmest weather. When asked why, he usually answered, Cold hands, warm heart.
In 1955, Mr. Ozga married Ellen Louise Englert. She died in 2006.
After her death, Mr. Ozga returned to Georgetown University as a student in program that permits senior citizens to attend graduate and undergraduate classes. He found a symmetry in ending his higher education at the same place where it began more than 60 years earlier, his daughter said.
Survivors include three children, David A. Ozga of Seattle, Ellen O. Boardman of Washington and H. Adam Ozga of Jacksonville, Fla.; a sister; and five grandchildren. [Read more: Barnes/WashingtonPost/14June2012]
Books and Documentaries
Former CIA Espionage Director Lands Book Deal with Georgetown University Press. Former CIA espionage director Michael Sulick has inked a deal with Georgetown University Press for a nonfiction book called Spying in America. The publisher will release the book in November.
Negotiations are reportedly underway for a TV show based on the book. The show would discuss the history of espionage within the United States and how it has impacted society. UK director Ian Knox could work on the project.
Here's more about the forthcoming book: "Spying in America presents a history of more than thirty espionage cases inside the United States. These cases include Americans who spied against their country, spies from both the Union and Confederacy during the Civil War, and foreign agents who ran operations on American soil. Some of the stories are familiar, such as those of Benedict Arnold and Julius Rosenberg, while others, though less well known, are equally fascinating." [Read more: Yin/MediaBistro/14June2012]
"OSS: The History, People and Legacy of America's First Shadow Warriors" will be a documentary to memorialize the history, people and legacy of the Office of Strategic Services (OSS): America's first Shadow Warriors. But they need your help.
It will be a first person, primary source narrative, told by veteran OSS operatives, and reinforced by historians, leaders, and current members of the Intelligence and Special Operations community who have benefited from this unique heritage.
Not merely a historical study, OSS, the documentary, will focus on the individual lives and sacrifices of the original operatives. It will document the pioneering role of the OSS, the evolution of this breed of warrior through time, and how the hard lessons learned at the outset are being applied to today's battlefields. In tribute, members of today's Intelligence and Special Operations community, fresh of of the front lines, will share personal stories of how the OSS impacted their missions and lives.
Documentary Details: This documentary will be based on interviews with OSS veterans, current members of the intelligence community, and special operations forces, archival footage from World War II and new footage from locations relevant to the OSS
Individuals and organizations to be interviewed will include: Veterans of the OSS; Surviving family members of OSS veterans; Historians specializing in the OSS and WWII; Current and past leaders of the CIA, DIA and other intelligence agencies; Current and past commanders of Special Operations Command; Current special operations and intelligence community officers, including recent veterans of the wars in Iraq and Afghanistan.
Locations for shooting will include: OSS training facility, Camp X (near Toronto), Area B (Camp David), Area F (Bethesda Congressional Country Club) Headquarters of US intelligence agencies and military commands
Footage and historical documents: First person interviews of individuals; Footage of locations relevant to the OSS; Publically released footage of OSS operations, US National Archives; Private footage provided by OSS veterans and family members; and Archival documentation of the OSS and those who served.
The documentary will be feature length. It will be filmed in high-definition color with some archival footage in black and white.
To offer advice, to participate, or to assist in other ways, please contact Anthony Vinci at email@example.com or call him at (703) 504-8654.
Coming Educational Events
EDUCATIONAL EVENTS IN COMING TWO MONTHS....
MANY Spy Museum Events in June, July, and beyond, with full details are listed on the AFIO Website at www.afio.com. The titles for some of these are in detail below and online.
Tuesday, 19 June 2012, 6:30 – 9:30 pm – Washington, DC - Surveillance 101 with Eric O'Neill Workshop 2 at the International Spy Museum
Test your surveillance skills on the mean streets of DC!
What if you were assigned to watch the most damaging spy in US history? As a young operative in the FBI, Eric O'Neill was put into position as Robert Hanssen's assistant with the secret task of spying on his boss, who was under suspicion of working for Russia. O'Neill's background with the FBI was in surveillance, so he was up to the challenge. But how would you measure up? It's your chance to find out. O'Neill is prepared to share his hard-earned expertise with you. This intense small group introduction to surveillance will include learning the basics and conducting surveillance in the streets of DC. Will you be able to track the "Rabbit" without being "made?" You'll learn how to snap clandestine shots and keep your target in view so you won't miss operational acts or secret meetings. O'Neill will lead the exercise and help you learn how to blend into the shadows for the best spy results!
19 June 2012, 11:30 am - McLean, VA - Defense Intelligence Forum meets to hear Gary Ross on "The Conflict between National Security and Freedom of the Press."
Gary Ross is a Special Agent with the U.S.
Department of Homeland Security. His academic background includes a
Master of Science of Strategic Intelligence degree from the National
Intelligence University and a Bachelor of Arts degree from Michigan
State University, with a dual major in Criminal Justice and Psychology.
He has completed advanced training at the National Foreign Affairs
Training Center, the Joint Counterintelligence Training Academy, and the
Federal Law Enforcement Training
During his 20-year career in federal law enforcement, Mr. Ross has conducted and supervised criminal, counterintelligence, and counterterrorism investigations and operations with the Department of Homeland Security, the Office of the Director of National Intelligence, the Naval Criminal Investigative Service, and the Department of Labor. He was a recipient of the Department of Defense Team Award for National Security Investigations in 2007 and the Director of Central Intelligence Team Award for Countering Foreign Denial and Deception in 2003. His work has taken him to Japan, South Korea, Thailand, Sri Lanka, Singapore, Indonesia, Bahrain, England, Italy, and Mexico. Mr. Ross' speech is based on his book, Who watches the Watchmen? The Conflict between National Security and Freedom of the Press. One of the primary themes of this book is the attempt to reconcile the conflict between a journalist's motivation for publishing classified information and the perceived harm resulting from the loss of intelligence sources and methods. Thus, discussing these conflicts should foster an improved understanding of how these Security issues are being confronting by the Intelligence Community and the Public.
For this forum, you may attribute the speaker's remarks. Everything will be on the record.
The Defense Intelligence Forum is open to members of all Intelligence Community associations and their guests.
LOCATION: Pulcinella Restaurant, 6852 Old Dominion Drive, McLean, VA. Pay at the door with a check for $29 payable to DIAA, Inc. Registration starts at 11:30 AM, lunch at 12:00 PM
Make reservations by 18 June 2012 by email to firstname.lastname@example.org. Include names, telephone numbers, and email addresses. For each attendee, choose among (Chicken Cacciatore, Tilapia Puttanesca, Lasagna, Sausage with Peppers, and Fettuccini with Portabella for your luncheon selection.
Pay at the door with a check for $ 29.00 per person, payable to DIAA, Inc.
Check is preferred, but will accept cash; however, credit card payments are discouraged.
21 June 2012, 12:30 - 2 pm - Los Angeles, CA - The Los Angeles Area AFIO Chapter meeting features "Airport Security at LAX"
Los Angeles Airport Police Detectives Yves Didier and Edward Martinez - will be discussing Airport Security and issues facing LAX in the next decade.
Event will take place at the LMU Campus.
RSVP to afio_LA@yahoo.com if you plan to attend this event, and indicate whether you wish to purchase lunch.
21 June 2012, 5 - 8pm - Arlington, VA - FAOA on Tap "Happy Hour" features talk by Douglas Waller on "Wild Bill Donovan."
Douglas Waller, author of Wild Bill Donovan will speak at this FAOA
Happy Hour at the Sine Irish Pub and Restaurant, Pentagon City, 1301 S
Arlington,VA. (703) 415-4420
What: Cash Bar with heavy appetizers provided, compliments of the FAO Association. Open FREE to all FAO Association members, guests, sponsors, and interested friends and colleagues
Register HERE to let them know you are coming!
23 June 2012, 2 pm - Kennebunk, ME - "THE THIRD JIHAD" film will be shown and is theme of meeting of AFIO Maine Chapter
National security and political analyst Ryan Mauro will participate in a showing of the film "The Third Jihad." Mauro is
Fellow and Associate Director of Media Relations at the Clarion Fund/ Radicalislam.org.
He has made over 300 appearances on talk radio and television programs
internationally from both political spectrums and is a regular guest
expert on FOX News Channel and FOX Business Network programs. Mauro is
regularly quoted in books and newspapers including the New York Times
A terrorism consultant to government agencies, Mauro founded WorldThreats.com in 2003 where he is chief editor. He is Adjunct Professor of Homeland Security at Regent University and Liberty University. Mauro has a Bachelor's degree in intelligence studies and a Master's degree in political science.
Mauro will introduce the film "The Third Jihad" which has been described as a blockbuster and will answer questions at the end of the showing. "The Third Jihad" is partially based on a document discovered by the FBI. The film discusses how radical Islam is spreading in the U.S. through the use of prison recruitment, the establishment of Islamist compounds on U.S. soil and the use of front groups to spread the radical form of Islam undermining traditional institutions.
The meeting will be held at 2:00 p.m. at the Brick Store Museum Program Center, 2 Dane Street, Kennebunk, and is open to the public.
Non-members are asked to make a donation of $5.00. The annual membership fee for AFIO/ME is $25.00. Become a member of the Maine Chapter and save $20.
For information call 207-967-4298.
Saturday, 23 June 2012, 1000 - 1430 - Milford, MA - AFIO New England Hears Christopher Hickey, USN, on USCG's COASTWATCH and the ONI's Terrorist Sea Search Programs.
Our main speaker will be member Christopher Hickey.
Chris will be speaking to us about two GWOT related programs, the Coast
Guard's COASTWATCH and ONI's effort to find terrorists at sea. Chris
has been intimately involved with both of these programs.
Christopher Hickey is the founder/principal of Prospect Street Consulting. With over 24 years experience in maritime security operations, intelligence collection & analysis operations, maritime domain awareness, crisis management, state & local intelligence fusion center operations, counter/anti terrorism analysis, and open source intelligence, Hickey is regarded as a leader in the fields of maritime and open source intelligence. His intelligence career encompasses 24+ years in the U.S. Navy and the national intelligence community in operational and key positions pertaining to counter terrorism, maritime and homeland security.
Chris is a graduate of the US Naval Academy, Naval War College, US Sports Academy, and the University of Maryland's School of Public Affairs.
This semester Chris is teaching two courses at Daniel Webster College. They are Intro to Intel Studies and a class on analytical methods using the new Heuer/Pherson book.
Note, as this meeting is a one day event we have not made any hotel arrangements.
Location: Courtyard by Marriott in Milford, Mass. The hotel web site is here http://www.marriott.com/hotels/travel/bosml-courtyard-boston-milford
Schedule: Registration & gathering, 1000 - 1130, membership meeting 1130 – 1200. Luncheon at 1200 followed by our speaker, with adjournment at 2:30PM.
For additional information contact us at email@example.com
Advance reservations are $25.00, $30.00 at the door - per person. ********Luncheon reservations must be made by 9 June 2012.**************
Mail your check and the reservation form to: Mr. Arthur Hulnick, 216 Summit Avenue # E102, Brookline, MA 02446, 617-739-7074 or firstname.lastname@example.org.
Wednesday, 27 June 2012, 6:30 – 8:30 pm – Washington, DC - "The Russian Illegals Two Years Later: What Did It Mean?" at the International Spy Museum
It's been two years since Americans were stunned to learn of the
arrest of ten Russian "deep-cover" spies who had lived among us for
decades. What's become of these one-time neighbors and Facebook friends
and what have we learned about the success or failure of their mission
to meet influential Americans and exploit them for their knowledge of
government policy? "Illegals," like these spies, have been a Moscow
specialty for years, but traditionally are used sparingly—for only the
most sensitive of operations. What did we learn from these arrests?
Seldom has the US government been able to find and arrest "illegals," so
did this rare occurrence offer us important new information on Russian
intelligence collection practices? H. Keith Melton, renowned intelligence historian, technical advisor to American intelligence agencies, author of Spycraft: The Secret History of the CIA's Spytechs, from Communism to Al-Qaeda,
and International Spy Museum board member, will revisit the murky world
of these "illegals:" who they were, how they operated, the threat they
posed, and where they are now. With access to exclusive materials and
images, he'll bring us up-to-date on the case. Retired KGB Major General
Oleg Kalugin will also provide commentary based on his years of running
agents in the United States.
WHERE: International Spy Museum: 800 F Street, NW Washington, DC Gallery Place/Chinatown Metrorail Station
Tickets: $12.50 Register at www.spymuseum.org
Tickets: $94. Space is limited to only 10 participants. Advance registration required. Call 202-654-0932 to register
Friday, 29 June 2012, noon – 2 pm – Washington, DC - "Ministers of Fire" author presentation at The International Spy Museum
"Winter, 1979, on the Afghan-Soviet border. The atmosphere is electric as CIA Kabul station chief Lucius Burling and the Dari-speaking wife of another American operative - her name is
April, but she promises nothing but late winter - meet up with a ragtag
troop of Afghan tribal warriors and a Chinese agent. What begins as an
eccentrically arranged affair turns dark and darker. In a blast of
gunfire and flash of knives, an American pilot goes down, and before the
eyes of the helpless CIA agent, the Afghans kidnap April, who is never
to be seen again."
I haven't read as good a prologue to a spy thriller all year" writes Alan Cheuse, a book commentator for National Public Radio."Ministers of Fire" tells the story of mid-life career of fictional CIA station chief Lucius Burling and his involvement with the fate of a Chinese dissident. The novel starts in 1979, in Kabul, during the invasion of Afghanistan by the Soviet Union and shifts to China in 2002 where while trying to help a Chinese physicist flee, Burling is reunited with an old compatriot from the CIA's Afghanistan operations. The genesis of the book, according to the author, occurred in 1970 when his father was the assistant secretary of state for the Near East and South Asia, including Afghanistan. The ambassador was killed , and the widow became a good friend of the family.
"Veteran cold warriors confront the post-9/11 world in Saunders's impressive first novel, a complex spy thriller. . . . While the intricate plotting and vivid action scenes are sure to please genre fans, more general readers should also find plenty to enjoy, from Mark Harril Saunders's meticulous prose to his closely observed characterizations."
—Publishers Weekly (Starred review).
Free! No registration required. More info and directions at www.spymuseum.org
Monday, 2 July 2012, 6:30 pm – "Revolutionary Spies: General Washington's Spycraft" at the International Spy Museum
This year when you celebrate the 4th of July you'll know it's really the 4th of SPY!
Diplomatic codes, savvy spy catchers, secret bankrolls, and seductive women sound like the perfect components of a 21st century spy ring, but they worked just as well during the American Revolution. Join John A. Nagy, award-winning author of Invisible Ink: Spycraft of the American Revolution, for this exploration of the spycraft that forged a nation. No one knows this period like Nagy, who has spent over 20 years doing primary research uncovering secrets about the founding fathers and the lengths to which they would go to ensure Britain's defeat. He recounts tales from Washington's "Deception Battle Plan" to how he obtained "the earliest and best Intelligence of the designs of the enemy" in British-controlled New York and Philadelphia. Nagy will share sources and methods and the previously unknown spies that he discovered.
Fee: Tickets: $9. Register at www.spymuseum.org
Tuesday, 10 July 2012, noon – Washington, DC - "Spies Against Armageddon: History of Israel's Intelligence Community" author presentation at International Spy Museum
The history of Israel's intelligence community—led by the feared and
famous Mossad—includes stunning successes and embarrassing failures
with important implications for war and peace today. CBS journalist Dan Raviv and Israeli journalist Yossi Melman trace this history from the country's independence in 1948 right up to
the crises of today as a follow-up to their 1990 best seller, Every Spy a
Prince: The Complete History of Israel's Intelligence Community. Raviv
will map the major changes in Israeli intelligence priorities away from
Palestine and toward Iran. He will also describe how Israel has become
the most innovative country in the world in the use of espionage as an
alternative to war, since Meir Dagan, director of the Mossad from 2002
to 2011, put "the dagger back between the teeth" of that spy agency.
Join the authors for an informal chat and book signing. Free! No registration required. More info and directions at www.spymuseum.org
17-18 July 2012, 8:30-4:30 - Reston, VA - The CiCentre hosts Course 207: Introduction to the People's Republic of China (PRC) Intelligence and Counterintelligence Methodologies.
This course provides an introductory review of PRC intelligence and counterintelligence practices.
It focuses on the significant differences as well as the similarities between Chinese intelligence collection and counterintelligence practices and Western and European models.
The course looks at Chinese cultural considerations and PRC historical events which are essential to understanding collection practices and counterintelligence operations employed by the Chinese.
In addition to coverage of traditional espionage, the seminar also discusses the Chinese economic espionage threat.
Companies and government agencies concerned with the theft of dual-use, proprietary information and technology will find this seminar particularly useful in understanding that growing threat.
Information & registration here. Fee is $1,000. Course will be held in Reston, Virginia. For more information or to register contact: Adam Hahn
24-25 July 2012, 8:30 - 4:30 - Reston, VA - The CiCentre hosts Course 203: Vulnerabilities of Global Travel: Personnel & Information Protection
In today's international market place
and global national security environment, global travel is an
essential and absolute requirement for the corporate, military or
US personnel who travel internationally for personal or professional reasons, face enhanced threat realities from foreign intelligence collectors, unscrupulous business competitors and terrorists driven by many ideologies and objectives.
This essential seminar provides practical information and usable tactics to assist the global traveler.
This seminar covers pre-travel preparation planning, strategies to decrease individual profiles while traveling, plus arrival and personal conduct advice while at the travel destination(s) to enhance their personal safety.
Included in this seminar are strategies to recognize recruitment and elicitation operations, technical collection operations to assess the traveler and/or compromise their information, and/or criminal/terrorist pre-attack profile recognition.
Information & registration here. Fee is $1,000. Course will be held in Reston, Virginia. For more information or to register contact: Adam Hahn
Wednesday, 25 July 2012, 6:30 – 8:30 pm – "Lie Detection 101 Workshop" at the International Spy Museum
How to Use Your Eyes as Lie Detectors!
Every top interrogator learns how to catch a liar; now it's your turn. Join Gregory Hartley and Maryann Karinch as they debut the tools used to detect deception featured in their new edition of How to Spot a Liar. Hartley earned honors with the US Army as an interrogator and interrogation instructor and both teach law enforcement, business, and consumer audiences how to get the truth. Meet and assess new people at the Spy School Workshop, learn to spot the messages and emotions that people are really sending whether they know it or not, and enjoy your inner truth teller. You'll find out how to put your new understanding of prevarication to good use, whether you're trying to navigate a tough situation or simply want to win at poker.
Tickets: $20. Register at www.spymuseum.org
Wednesday, 1 August 2012, noon – Washington, DC - "Twilight War: The Secret History of America's Thirty-Year Conflict with Iran" - author presentation at International Spy Museum
The United States and Iran have been at daggers drawn for more than
thirty years. While this rivalry has never erupted into open war, it has
been an enduring "twilight war" in which spies and terrorists often
play the lead role. US Government historian David Crist will discuss his groundbreaking book which pulls back the curtain on
many of the deepest secrets of this lethal struggle. Hear about the
massive spy network that the CIA developed in Iran with German help in
the 1980s, how these spies communicated with their American handlers
using invisible ink, and how their discovery led to the deaths of more
than two dozen people. Hear his remarkable new findings about the
Iran-Contra affair that almost scuttled the Reagan administration, and
learn the story behind the Iranian nuclear scientist who defected to the
United States—and then redefected back to Iran in 2010.
Free! No registration required. More info and directions at www.spymuseum.org
4 August 2012, 11:30 am - Melbourne, FL - AFIO Florida Satellite Chapter hosts CIA's James Fletcher on "Three HUMINT Cases from Life."
Speaker will be James B. Fletcher,
former CIA operations officer and executive whose topic will be Three
HUMINT Cases From Life and How Their Intelligence Was Used.
Location: Indian River Colony Club, Melbourne, FL.
To attend or for more information contact: Donna Czarnecki, email@example.com
22-24 August 2012 - Raleigh, NC - "Dramatic Revelations - J. Edgar Hoover, Castro, Deep Throat, Carlos the Jackal, and Secret from CIA" the theme of the 8th Annual Raleigh Spy Conference
J. Edgar Hoover, Castro, Deep Throat, Carlos the Jackal, and Secrets from the CIA. The event underscores how recently declassified information re-writes history.
The FBI is not simply the nation's top cop agency, says RSC founder Bernie Reeves. The Bureau serves as America's domestic security service, responsible for tracking down spies in America and running counter-intelligence operations. And J. Edgar Hoover, the man who shaped and ran the FBI from 1924 to his death in 1972, was the nation's top domestic intelligence officer.
But who was the real Hoover? FBI Historian John Fox will present a session on Hoover's role as chief intelligence officer – and share the latest declassified data on one of the most significant figures in US history.
Fidel Castro casts a long shadow over modern American history. He led a revolution, unexpectedly embraced communism and invited the Soviets to Cuba who installed offensive nuclear weapons 90 miles from the United States.
Brian Latell, formerly a Cuba hand for the CIA, has plowed through newly declassified documents - and interviewed secret Cuban agents who can now talk for the first time – for his new book Castro's Secrets, revealing that the Cuban intelligence services were highly sophisticated. Cuban operatives duped the CIA and planted nearly 50 double agents in the US intelligence services. Latell also reveals from secret sources that Castro had prior knowledge of the assassination of John F. Kennedy.
Max Holland, editor of the insider website Washington Decoded - and a prolific and respected author on key events of the modern era – has dug into newly declassified documents to reveal the true story of the motivation that compelled FBI assistant director Mark Felt to disguise himself as the infamous Deep Throat, the source that allegedly brought down a presidency and elevated two obscure journalists to super-star status. Watergate remains a watershed event in American history –and Mark Felt was the man who made it happen.
David Waltrop, an active CIA officer currently serving as a Program Manager for the Agency's Historical Collections Division (who formerly worked in the National Reconnaissance Office and as curator for the Defense Intelligence Agency) will reveal one of the most secret CIA operations of the Cold War, the Trieste 11 Deep Sea Vehicle. Now called An Underwater Ice Station Zebra, the true mission of the Trieste 11 expedition was hidden in rumor and speculation – until now.
Albert Garajales, INTERPOL Director of Public Relations and assistant coordinator of anti-Terrorism for Puerto Rico, will present an insider's assessment of the profile of the modern terrorist, beginning with Carlos the Jackal up to today's dangerous operatives.
Go to www.raleighspyconference.com for more information and to register. Or call Carlie Sorosiak at the Metro Magazine office: 919-831-0999 or email firstname.lastname@example.org.
The Raleigh Spy Conference was founded in 2003 by Bernie Reeves, editor and publisher of Raleigh Metro Magazine (www.metronc.com). Discounts are offered for intelligence workers, members of the armed forces, students, and seniors.
Bernie Reeves and Raleigh Metro Magazine will be hosting this 8th Raleigh Spy Conference at the NC Museum of History in downtown Raleigh.
And if you missed the 7th Raleigh Spy Conference, a beautifully prepared set of DVDs of event are available here.
14 September 2012 - Jersey City, NJ - New Jersey City University hosts 2nd Northeast Regional Security Education Symposium on "Tradecraft Primer Skills Acquisition"
In concert with launching the inaugural LC #1 degree program described above, NJCU will be hosting a regional Security Symposium on September 14, 2012. Please save the date. This is NJCU's second regional symposium since being designated a National Center of Academic Excellence in 2009 by the ODNI. CEUs and limited vendor tables will be available. The one-day conference costs are being finalized (ca. $150-225). Corporate sponsorships are being pursued as well. Invited Speakers: National Security Agency – Signal Intelligence; Federal Bureau of Investigation; NJ Department of Homeland Security; ASIS – International (Headquarters – not Regional); Office of the Director for National Intelligence; Local Participants of The Bus mission [See http://www.space.com/12996-secret-spy-satellites-declassified-nro.html ] For forthcoming details and a registration form, contact (201) 200-2275.
14-15 September 2012 - Syracuse, NY - 3rd Annual Seminar on Teaching Law and National Security: Educating the Next Generation of Decisionmakers: The Intersection of National Security Law and International Affairs
In modern foreign affairs and national and international security governance, the policy and subject area experts and lawyers attend the same meetings, hash out common policy posi-tions, and worry about how to implement their prescriptions. Yet the international affairs ex-perts and national security lawyers work in parallel, not together. They speak different profes-sional languages, and their analytic reference points and methods are normally divergent, if not inharmonious. At times, a good deal of energy in governance is spent finding common ground between the lawyers and the policy experts. The objective of the Conference is to ex-plore ways to enrich the education in our related but disparate disciplines by exposing one side and its methods and ways of approaching problems to the other.
$150 registration fee. For more information or to register: http://insct.org/teaching-national-security-law-seminar/
8-11 October 2012 - Orlando, FL - GEOINT 2012 Symposium
Hosted by the US Geospatial Intelligence Foundation
(USGIF). The USGIF expects another agenda with insightful keynote
speakers, interesting panels and breakout sessions, cutting-edge
exhibitions from 250 organizations, and invaluable networking
Event is being held at the Gaylord Palms Hotel & Convention Center
For more information visit http://geoint2012.com/
For Additional Events two+ months or greater....view our online Calendar of Events
Disclaimers and Removal Instructions
Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers.
REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs:
a) IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list. If this link doesn't open a blank email, create one on your own and send to email@example.com with the words: REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.
b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to firstname.lastname@example.org the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.
CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at email@example.com. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm
WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor(s) or author(s) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!
(c) 2000, 2012, AFIO, 6723 Whittier Ave Suite 200, McLean, VA 22101. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: firstname.lastname@example.org
Click here to return to top.