[Editors' Note: The WIN editors attempt
to include a wide range of articles and commentary in the Weekly Notes
to inform and educate our readers. However, the views expressed in the
articles are purely those of the authors, and in no way reflect support
or endorsement from the WIN editors or the AFIO officers and staff. We
welcome comments from the WIN readers on any and all articles and
News account from the Las Vegas Review-Journal
"Typists to Trailblazers"
30 October 2013 -
This was rescheduled from April to October. Put on your OCTOBER calendar.
Wednesday, 30 OCTOBER 2013 will be "Typists to Trailblazers"The History of Women's Advancement and Achievements at CIA
Members and Guests are invited to a free lecture
A Panel Discussion will be moderated by CIA historian David Waltrop
In the predawn hours of April 26, 1972, the U.S. Navy's most advanced deep sea submersible surfaced about 350 miles north of the Hawaiian Islands after salvaging a mysterious item from a depth of 16,400 feet below the Pacific Ocean. Publicly known as a "data package" from the Scripps Institution of Oceanography, the object was actually part of a film return capsule on the first mission of a new American spy satellite, codenamed HEXAGON. The United States launched the satellite in June 1971 to photograph denied intelligence targets, but the following month the parachute on one of its four capsules containing the valuable photographs malfunctioned on reentry, causing it to crash into the ocean and sink on impact. The U.S. Navy and CIA devised a bold plan to use the manned Trieste II (DSV-1) to salvage the capsule from the ocean floor, in what would become the deepest underwater operation conducted to date.
Learn about this now-declassified mission as operation participants and experts on deep sea research discuss the events that transpired.
Presentation is free, but tickets are required. Request Free Tickets
National Cryptologic Museum Foundation
To donate to fund this new award
This is a worthy cause and fitting tribute to a man who devoted most of his career to the education of students in the field of cryptology.
SPYPEDIA Update - as of 15 March 2013:
SPYPEDIA is following closely Director of National Intelligence James R. Clapper's 2013's Worldwide Threat Assessment of the US Intelligence Committee address he gave to the Senate Select Committee on Intelligence. For the first time since 9/11, cyber attacks topped the list of security threats that face the United States, ahead of terrorism. See SPYPEDIA's tracking of Major Cybersecurity Events and additional cybersecurity resources. Other highlights of the assessment include: • The threat to the nation's economy from the theft of critical proprietary data and economic espionage; Threats from hacktivists and cybercriminals • The fragmentation and diminished capacity of the core of al Qaeda, and the destabilization created by regionally-focused groups and affiliates such as: AQI in Iraq, al-Shabaab in Somalia, al-Nusrah Front in Syria, AQIM in Northern Africa , and Boko Haram in Nigeria • Threats posed by WMD proliferation in Iran and North Korea • The accelerating erosion of the Syrian regime
Section I - INTELLIGENCE HIGHLIGHTS
Sources: Amazon and CIA Ink Cloud Deal. In a move sure to send ripples through the federal IT community, FCW has learned that the CIA has agreed to a cloud computing contract with electronic commerce giant Amazon, worth up to $600 million over 10 years.
Amazon Web Services will help the intelligence agency build a private cloud infrastructure that helps the agency keep up with emerging technologies like big data in a cost-effective manner not possible under the CIA's previous cloud efforts, sources told FCW.
Amazon officials would not confirm the existence of the contract, and a CIA spokesperson likewise declined to comment on the matter.
"As a general rule, the CIA does not publicly disclose details of our contracts, the identities of our contractors, the contract values, or the scope of work," a CIA spokesperson told FCW. [Read more: Konkel/FCW/18March2013]
New Twist in British Spy's Case Unravels in U.S. Mark Kennedy, a British police officer who spent seven years infiltrating environmental and activist groups while working undercover for the Metropolitan Police force in London, may have monitored an American computer scientist and spied on others while in the United States.
The computer scientist, Harry Halpin, said that he was at a gathering of activists and academics in Manhattan in January 2008 that Mr. Kennedy - then using the pseudonym Mark Stone - also attended. He said Mr. Kennedy collected information about him and about a man and a woman who were accused later that year of associating with "a terrorist enterprise" and sabotaging high-speed train lines in France.
In addition to Mr. Halpin's assertions, documents connected to the case indicate that prosecutors in Paris looked to American officials to provide evidence about a handful of people in the United States and events that took place in New York in 2008.
"Mark Kennedy spied upon myself on United States soil, as well as Julien Coupat and Yildune Levy," Mr. Halpin wrote in an e-mail, naming two defendants in the group known in France as the Tarnac 10, after the small mountain village where several of them had lived in a commune.
Mr. Halpin added that Mr. Coupat introduced him to Mr. Kennedy in the fall of 2007. "It appears that Mark Kennedy also passed information to the F.B.I. that I knew Julian Coupat," he added.
Reached via e-mail on Thursday, Mr. Kennedy, who now works with The Densus Group, a security consulting firm based in the United States, declined to comment on Mr. Halpin's statements. [Read more: Moynihan/NYTimes/15March2013]
US to Let Spy Agencies Scour Americans' Finances. The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document seen by Reuters.
The proposed plan represents a major step by U.S. intelligence agencies to spot and track down terrorist networks and crime syndicates by bringing together financial databanks, criminal records and military intelligence. The plan, which legal experts say is permissible under U.S. law, is nonetheless likely to trigger intense criticism from privacy advocates.
Financial institutions that operate in the United States are required by law to file reports of "suspicious customer activity," such as large money transfers or unusually structured bank accounts, to Treasury's Financial Crimes Enforcement Network (FinCEN).
The Federal Bureau of Investigation already has full access to the database. However, intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, currently have to make case-by-case requests for information to FinCEN.
The Treasury plan would give spy agencies the ability to analyze more raw financial data than they have ever had before, helping them look for patterns that could reveal attack plots or criminal schemes. [Read more: Reuters/13March2013]
German Telecom Company Provides Real-Time Map of Cyber Attacks. In hopes of blunting mounting electronic assaults, a German telecommunications carrier unveiled a free online capability that shows where Cyber attacks are happening around the world in real time.
Deutsche Telekom, parent company of T-Mobile, put up what it calls its "Security dashboard" portal on March 6. The map, said the company, is based on attacks on its purpose-built network of decoy "honeypot" systems at 90 locations worldwide.
Deutsche Telekom said it launched the online portal at the CeBIT telecommunications trade show in Hanover, Germany, to increase the visibility of advancing electronic threats.
"New cyber attacks on companies and institutions are found every day. Deutsche Telekom alone records up to 450,000 attacks per day on its honeypot systems and the number is rising. We need greater transparency about the threat situation. With its security radar, Deutsche Telekom is helping to achieve this," said Thomas Kremer, board member responsible for Data Privacy, Legal Affairs and Compliance.
The Web site contains a digital map of the world revealing the origin of cyber attacks recorded around the clock on the company's sensors, with a real-time ticker that reports which targets attackers have chosen. [Read more: Rockwell/GSN/13March2013]
Cyber Attacks are Leading Threat Against US: Spy Agencies. Intelligence leaders said for the first time on Tuesday that cyber attacks and cyber espionage have supplanted terrorism as the top security threat facing the United States.
That stark assessment, in an annual "worldwide threat" briefing that covered concerns as diverse as North Korea's belligerence and Syria's civil war, was reinforced in remarks by the spy chiefs before the Senate Intelligence Committee.
They expressed concern that computer technology is evolving so quickly it is hard for security experts to keep up.
"In some cases, the world is applying digital technologies faster than our ability to understand the security implications and mitigate potential risks," James Clapper, the director of National Intelligence, told the committee.
In written testimony, Clapper softened his analysis somewhat, playing down the likelihood of catastrophic attacks on the United States in the near term - either through digital technologies, or from foreign or domestic militants employing traditional violence.
But this year's annual threat briefing underscored how, a decade after the Iraq war began and nearly two years after the killing of al-Qaida leader Osama bin Laden, digital assaults on government and computer networks have supplanted earlier security fears. [Read more: Reuters/13March2013]
US Intelligence Agency Wants to Know How to use Alternate Reality Gaming to Bolster Research. The researchers at the government's "high-risk, high-payoff research" group, Intelligence Advanced Research Projects Activity
(IARPA) want to know how alternate reality environments such as games in particular can help it develop "high-quality behavioral and psychological research in near real-world contexts."
IARPA, which is part of the Office of National Intelligence is looking to gather information about these settings for a project known as Using Alternate Reality Environments to Help Enrich Research Efforts (UAREHERE) though it doesn't specify exactly how such research would be used. Alternative reality games are usually quite complicated and can involve many people and situations to bring to fruition.
Specifically the group said it is looking for information to answer the following questions: [Read more: Cooney/NetworkWorld/14March2013]
Pakistan Captures Suspect in Death of Journalist Daniel Pearl, Officials Say. A suspect has been captured in connection with the 2002 murder of U.S. journalist Daniel Pearl, Pakistani officials said Tuesday.
A spokesman for Pakistan's Inter Services Public Relations Directorate confirmed the arrest by a paramilitary unit known as the Sindh Rangers and said the suspect had been transferred to police custody.
Qari Abdul Saeed, also known as Asadullah, had been sought in connection with terrorist activities dating back almost two decades, including his suspected involvement in Pearl's slaying.
Saeed was apprehended in a "covert joint intelligence operation where street intelligence, signals intelligence, agents as well as his own associates spilling the beans led us to him," according to the Sindh Rangers' operational commander who led the raid. [Read more: NBCNews/19March2013]
A Spy at NASA? FBI Investigating Chinese Man Arrested Fleeing Country. The FBI said Tuesday it is actively investigating a Chinese man arrested Saturday with a one-way ticket out of U.S. - a scientist potentially carrying highly confidential military secrets and rocket technology from NASA labs.
Bo Jiang, a contractor at the National Institute of Aerospace (NIA) who had been working at NASA-Langley, was arrested at Dulles International Airport on Saturday by FBI and DHS agents as he was trying to leave the country, Fox News has confirmed.
Bill Daly, a former FBI investigator, said Tuesday that the agency is currently investigating Jiang to determine whether there was actual espionage going on.
"The fact that people can take information, bring it back to their home country, get a fast forward on our dime, on the money we've spent and the time we've spent developing technology, and move their programs that much further along..." Daly told Fox News.
Rep. Frank Wolf, R-Va., chairman of the House Appropriations subcommittee that funds NASA, held a press conference on Monday to reveal the security breach. Jiang was arrested carrying several data storage devices, including hard drives, flash drives and computers that likely contained sensitive information. [Read more: FoxNews/19March2013]
Rebels Capture Syrian Intelligence Base Near Israeli Border. Sunni rebels have captured a Syrian military intelligence facility near the Golan Heights.
The Free Syrian Army said it captured the military intelligence facility in the Hauran Plain in southern Syria.
FSA said the compound, located eight kilometers from the Israeli frontier, fell in a five-day siege that ended on March 17.
"The heroes of the Free Syrian Army broke into the military facility in the city of Jara after [Syrian President Bashar] Assad's gangs took fighters of the Free Syria Army as prisoners of war and used them as human shields," a rebel statement said. "They were found dead when the facility was broken into."
Rebels said the military intelligence compound served as a command and control center for Assad's Shabiha militia. They said the fall of the compound led to the rebel capture of the nearby town of Shagara. [Read more: WorldTribune/18March2013]
Section II - CONTEXT & PRECEDENCE
CIA's One-Time Lao Base Still Shrouded in Secrecy. Electricity and an unsealed road now run through what was once known as Lima Site (LS) 20A. But 38 years after the Central Intelligence Agency (CIA) abandoned its secret Long Tieng base in one of the last acts of the Indochina War, it remains just that - a secret place.
Off-limits to outsiders, special permission is needed to enter the mist-shrouded valley that served as the nerve centre of the CIA's private war in which Hmong hilltribe irregulars fought North Vietnamese and Pathet Lao forces across the mountains of north-east Laos.
But driving along the overgrown 1,350m runway, once the busiest in the world, it is not readily apparent why it remains closed - especially when the present communist government has turned its own wartime headquarters into a fascinating tourist attraction.
Seven years ago, Vientiane dissolved the Xaysomboune special military zone, which since 1994 had encompassed Long Tieng and nearby Phou Bia, the country's highest mountain and for decades a refuge for armed Hmong holdouts. [Read more: Mcbeth/StraitsTimes/13March2013]
Iraq: The Spies Who Fooled the World. The lies of two Iraqi spies were central to the claim - at the heart of the UK and US decision to go to war in Iraq - that Saddam Hussein had weapons of mass destruction. But even before the fighting started, intelligence from highly-placed sources was available suggesting he did not, Panorama has learned.
Six months before the invasion, the then Prime Minister Tony Blair warned the country about the threat posed by Saddam Hussein's weapons of mass destruction (WMD).
"The programme is not shut down," he said. "It is up and running now." Mr. Blair used the intelligence on WMD to justify the war.
That same day, 24 September 2002, the government published its controversial dossier on the former Iraqi leader's WMD.
Designed for public consumption, it had a personal foreword by Mr. Blair, who assured readers Saddam Hussein had continued to produce WMD "beyond doubt".
But, while it was never mentioned in the dossier, there was doubt. The original intelligence from MI6 and other agencies, on which the dossier was based, was clearly qualified.
The intelligence was, as the Joint Intelligence Committee noted in its original assessments, "sporadic and patchy" and "remains limited".
The exclusion of these qualifications gave the dossier a certainty that was never warranted. [Read more: Taylor/BBC/17March2013]
Painting Commemorating ARGO Operation Joins Intelligence Art Gallery. CIA's Intelligence Art Gallery recently acquired its newest item - a painting titled "ARGO - The Rescue of the Canadian Six."
The painting's unveiling coincided with the 33rd anniversary of the ARGO operation. In this operation, CIA and Canadian officials smuggled six American diplomats out of Iran after the 1979 takeover of the U.S. Embassy in Tehran. The painting depicts two CIA officers preparing alias documents used by the Americans, known as the "Canadian Six," in their escape from Iran.
The ARGO operation was successful thanks to a strong partnership with the Canadian Government. "ARGO - this operation - is one of our great successes, and its lessons of innovation and partnership will inspire our technical intelligence officers as we forge new pathways into the future," said Glenn Gaffney, Director for Science and Technology, at the unveiling ceremony.
Gaffney offered special thanks to the Canadian Government for its assistance in the rescue. "At great personal risk to themselves and their families, senior diplomats at the Canadian Embassy in Tehran readily took in the Americans and provided sanctuary for 79 days while the rescue was planned," he said. "Our Canadian partners enabled the rescue, and without their participation, it is unlikely that we could have brought the Canadian Six home." [Read more: CIA/14March2013]
Top Government Spy Agency Seeks High School Computer Hackers. Bored with classes? Carnegie Mellon University and one of the government's top spy agencies want to interest high school students in a game of computer hacking.
Their goal with "Toaster Wars" is to cultivate the nation's next generation of cyber warriors in offensive and defensive strategies. The free, online "high school hacking competition" is scheduled to run from April 26 to May 6, and any U.S. student or team in grades six through 12 can apply and participate.
David Brumley, professor of computer science at Carnegie Mellon, said the game is designed to be fun and challenging, but he hopes participants come to see computer security as an excellent career choice.
At a glance of its webpage, the contest seems lightweight.
"When a robot from space crash lands in your backyard, it's up to your hacking skills to fix him and uncover the secrets he carries," the webpage says. But, it adds, students "will learn how to identify security vulnerabilities and perform real-world attacks" on computer. And there is the small tag that reads: "Sponsorship provided by the NSA."
National Security Agency representative Vanee Vines said the U.S. has a great need for cyber security professionals. [Read more: AP/16March2013]
Revealed: The 1962 CIA Paper That Predicts the Big Deal With Big Data. Last week the Central Intelligence Agency published for the first time "Some Far-Out Thoughts on Computers", a 1962 internal document that shows how eager the agency was to exploit the power of data for Cold War spying purposes. The author, CIA analyst and self-described "computer hobbyist" Orrin Clotworthy, described with eerie clarity the promise of data analytics and computer modeling to predict the future - what the intelligence community today might call "beating the news." Herein, the highlights: [Read more:
Talking Leadership with NSA's Deputy Director. The National Security Agency (NSA), home to America's codemakers and codebreakers, recently celebrated its 60th anniversary. Tom Fox spoke with the agency's deputy director, John Inglis, about this unique defense agency and its goals for the future. As deputy director, Inglis is the agency's chief operating officer, responsible for guiding and directing strategies, operations and policy. Fox is a guest writer for On Leadership and vice president for leadership and innovation at the nonprofit Partnership for Public Service. He also heads up their Center for Government Leadership. [Read more: Fox/WashingtonPost/13March2013]
Top 20 Fears of the U.S. Intelligence Community. A United States senate committee has released the 2013 "Worldwide Threat Assessment of the US Intelligence Community."
The annual report offers a cursory snapshot of what American citizens have to fear for the year ahead.
Noteworthy in the 2013 edition is the prominence given to threats of cyber attacks, which receives more attention than terrorism or the proliferation of weapons of mass destruction.
"In some cases, the world is applying digital technologies faster than our ability to understand the security implications and mitigate potential risks," the report states. "The growing use of cyber capabilities to achieve strategic goals is also outpacing the development of a shared understanding of norms of behavior, increasing the chances for miscalculations and misunderstandings that could lead to unintended escalation." [Read more: Lupick/Straight.com/12March2013]
The Lion and the Vortex. In early April of 1982, Argentine forces invaded the small, sleepy archipelago known as the Falkland Islands in the South Atlantic. Very quickly British forces mobilized in response to retake the islands. One of the long-standing questions about the conflict is the degree of help provided by the United States to Great Britain. A newly-declassified document from the US National Reconnaissance Office (NRO) reveals that a top secret American signals intelligence satellite launched only a few months before the conflict was pressed into service to provide intelligence to the United Kingdom. The satellite was known as VORTEX (classified code words are often printed in all-caps) and it was launched in October 1981 from Cape Canaveral.
British warships sailed from ports in the United Kingdom only a few days after the invasion, but it took them several weeks to arrive at the cold, wind-swept islands. After that, the war became a bloody slug-fest. The Argentines suffered 649 killed, including 323 men lost when the cruiser General Belgrano was sunk by a British submarine, and Great Britain suffered 258 of its soldiers, sailors and marines killed. The Royal Navy lost two destroyers, two frigates, and three other vessels to Argentine Exocet missiles and bombs.
Last year was the thirtieth anniversary of the war and, in response, the British government released a number of new documents, many of them concerning diplomatic relations with the United States soon after the Argentine invasion. The Reagan Administration initially sought a diplomatic solution in order to maintain favor with Latin American countries that it was enlisting in opposition to communist influence in Cuba, Nicaragua, and El Salvador. The public American position created the impression, even among some within the British government, that the United States was not helping out its longstanding ally. The reality was that the United States was offering extensive support to Britain, but in such a low-key manner that even many in the British government were unaware of it. [Read more: Day/SpaceReview/11March2013]
Section III - COMMENTARY
Will Iran Detonate a "Super Dirty" Bomb Inside America? I always wonder about the possibility of Iran taking Mitt Romney's advice and detonating a "super-dirty" radioactive bomb in a densely-populated urban region. For specifics, let's take Orange County, Ca. as an example. To help me analyze the possibility of Iran detonating a "super dirty" radioactive bomb inside America, I consulted Dr. Gregory Moore, Director of the Center for Intelligence Studies at Notre Dame College in South Euclid, Ohio.
On May 17, 2012 Mitt Romney said during a fundraiser at the home of private-equity executive Marc Leder that if he were Iran, he would give fissile material to Hezbollah and if the US doesn't stand down, he'd "let off a dirty bomb in Chicago or some other place."
What if their "some other place" pick was Orange County? It would be a top choice location due to an extremely high human population density - the sixth most populated county in the U.S., with over 3 million residents, all confined in the smallest area-wise county in southern California. I discussed the possibility of Iran detonating a "super-dirty" radioactive bomb, in general, somewhere inside the U.S. and not specifically in this affluent and mostly-suburban Ca. county with Dr. Gregory Moore, an intelligence expert and his feedback was both comforting and unsettling. [Read more: Morton/OSINT/12March2013]
Spy Chiefs Point to a Much, Much Weaker
Al-Qaida. Don't ever expect the heads of the U.S.' 16-agency spy apparatus to say it outright. But the testimony they provided Tuesday morning to a Senate panel described al-Qaida, the scourge of the U.S. for 12 years, as a threat that's on the verge of becoming a spent force, if they're not already.
James Clapper, the director of national intelligence, and his colleagues at the CIA, Defense Intelligence Agency, National Counterterrorism Center and State Department, never made that contention outright to the Senate Select Committee on Intelligence on Tuesday. But in their annual public briefing on the threats America faces, they focused on their budgets and on cyber attacks more than they did terrorism. Not only was that itself a big change in the annual exercise, what they said about the threat from al-Qaida was mostly cheerful news.
Al-Qaida's core in Pakistan is so degraded that it is "probably unable to carry out complex, large-scale attacks in the West," Clapper testified. Its regional affiliates, in Iraq, Somalia and northern Africa, are focused on local attacks. Despite all the online propaganda seeking to radicalize American Muslim, homegrown jihadis will attempt "fewer than ten domestic plots per year."
Last year, the plots hit the single digits; no one died from them. Matt Olsen, the director of the National Counterterrorism Center, testified that these attempts are likely to remain "unsophisticated." Al-Qaida manages to inspire many "wayward knuckleheads," Olsen said, but they'll remain a challenge for the spy apparatus to monitor and disrupt.
The exception is al-Qaida in the Arabian Peninsula, the Yemen affiliate of the organization, which remains the one most inclined to attack the U.S. at home. [Read more: Ackerman/Wired/12March2013]
I Tried to Make the Intelligence Behind the Iraq War Less Bogus. Ten years ago this week, the U.S. invaded Iraq, citing intelligence that turned out to be bogus. I had to work on some of it - and I also had to work on keeping the really, really terrible versions of it out of our analysis.
Specifically, I was a CIA analyst working in the Counterterrorism Center in the overburdened days after 9/11. As analysts, we spend most of our time identifying burgeoning issues based on communications intercepts, reports from CIA case officers, imagery from satellites, accounts from other governments, and piecing together a story.
What we don't do routinely is tie one catastrophe to another. But that was exactly what I was asked to do in November 2002, shortly after Congress voted to authorize war with Iraq. That war was predicated on Saddam Hussein's (ultimately nonexistent) stockpiles of deadly weapons, but lurking in the background was the assertion that he'd pass them on to al-Qaida. At the CIA's Iraq Branch in the Counterterrorism Center, we didn't think Saddam had any substantial ties to al-Qaida. But soon we found ourselves fielding questions from determined Bush administration officials about whether Saddam was tied to 9/11.
That's how my team ended up in a windowless room with my branch chief, "Karen," who was pretending to be Dick Cheney or his chief of staff, Scooter Libby.
That month, Vice President Cheney scheduled a meeting with our Branch to discuss our assessment of Iraq's relationship with al-Qaida and 9/11. It was his second visit to the Branch; there always seemed to be more questions. The Branch Chief called us together for a practice session in a bland conference room a few days before their arrival. At this so-called �murderboard� session, we weren't stripping down our analysis to find data we'd missed. We were practicing how to defend our perspective when questioned by the Vice President of the United States. [Read more: Bakos/Wired/18March2013]
Section IV - Jobs, Books, Obituaries and Coming
[IMPORTANT: AFIO does not "vet" or endorse these research inquiries or job offers. Reasonable-sounding inquiries and career offerings are published as a service to our members, and for researchers, educators, and subscribers. You are urged to exercise your usual caution and good judgment when responding or supplying any information.]
[IMPORTANT: AFIO does not "vet" or endorse these research inquiries or job offers. Reasonable-sounding inquiries and career offerings are published as a service to our members, and for researchers, educators, and subscribers. You are urged to exercise your usual caution and good judgment when responding or supplying any information.]
Dari-Pashto Linguists Sought
The Walsingham Group is seeking CAT II/III Dari-Pashto [Pushtu, Pashtu] linguists. Location: OCONUS 100%
Job Description: Interprets, translates, or transcribes reports, memos, correspondence, media, audio, or oral communication that range from simple to technical and complex in nature both from the source language into English and from English into the source language. Reviews audio or video material transcribes and summarizes.
Requirements: Minimum secret security clearance is required.
Proficiency in Dari, Pashto, and English. Must pass exam for speaking, listening, reading and writing for all languages. Apply through our website www.walsinghamgroup.com
How a Soviet Spy Outmaneuvered John Maynard Keynes to Ensure U.S. Financial Dominance. In July of 1944, as the end of World War II started to come into sight, financial leaders from around the world gathered at the Mt. Washington Hotel in Bretton Woods, N.H. There, they hammered out what would be the post-war global monetary system, agreed to create the International Monetary Fund and World Bank, and generally established the world economic order that has shaped the global economy ever since.
But in a new book explaining what really happened at Bretton Woods, Benn Steil shows that what happened in the mountains of New Hampshire that summer is not quite the story we have been told. The gathering was more about the United States seizing from Britain its role as dominant global financial power and establishing the dollar as the world's reserve currency - steps engineered by senior US Treasury official and sometime Soviet spy Harry Dexter White.
Steil, a senior fellow at the Council on Foreign Relations, spoke with Wonkblog recently about his book, "The Battle of Bretton Woods: John Maynard Keynes, Harry Dexter White, and the Making of a New World Order," available now from the Princeton University Press. Our conversation has been edited for length and clarity. [Read more: Irwin/WashingtonPost/14March2013]
Cartha D. DeLoach. Cartha D. DeLoach, who as a top aide and confidant to J. Edgar Hoover was the F.B.I.'s liaison to the White House and a powerful intermediary between Hoover and President Lyndon B. Johnson during an especially tense political era, died on Wednesday on Hilton Head Island, S.C. He was 92.
The death was confirmed by his son Tom.
Mr. DeLoach, who was known as Deke, spent more than 25 years in the Federal Bureau of Investigation, rising to deputy associate director, the No. 3 position, behind only Mr. Hoover and the associate director, Clyde Tolson.
Cartha Dekle DeLoach was born on July 20, 1920, in Claxton, Ga., about 50 miles west of Savannah. His father, Cartha Calhoun DeLoach, was a "merchant of some kind," Tom DeLoach said. The father died when Cartha, his only child, was 10 and "left the family in a whole lot of debt," Tom DeLoach said. Young Cartha worked in cotton fields to help pay the bills, and his mother, the former Eula Dekle, took in boarders. He played football at Claxton High School and on a football scholarship went to Stetson University in Florida, where he played quarterback.
Mr. DeLoach joined the F.B.I. in August 1942 as a clerk and became a special agent that December. He worked in field offices in Norfolk, Va., and Cleveland before going on military leave. He served in the Navy from 1944 to 1946. During his tenure at the bureau under Hoover, its priorities shifted from ferreting out spies during and after World War II, to combating communist ideologues during the early years of the cold war, to pursuing perceived threats to the country in the civil rights and anti-Vietnam War movements.
"Deke's commitment to the F.B.I. and to the American people at large was a hallmark of his life," Robert S. Mueller III, the F.B.I. director, said in a statement.
In addition to his son Tom, Mr. DeLoach is survived by his wife of 68 years, the former Barbara Owens; three other sons, Cartha Jr., who is also known as Deke, Gregory and Mark; three daughters, Barbara Lancaster, Theresa DeLoach and Sharon Bleifeld; and "countless grandchildren and great-grandchildren," Tom DeLoach said.
After retiring in 1970, Mr. DeLoach worked as a corporate affairs executive for Pepsico until 1985 and later in banking in South Carolina. When Hoover died in 1972, Mr. DeLoach was considered a possible replacement. In 1995, he published a memoir, "Hoover's F. B. I.: The Inside Story by Hoover's Trusted Lieutenant," in which he defended the F.B.I. against its many critics. [Read more: Weber/NYTimes/15March2013]
Coming Educational Events
EDUCATIONAL EVENTS IN COMING TWO MONTHS....
MANY Spy Museum Events in 2013 with full details are listed on the AFIO Website at www.afio.com. The titles for some of these are in detail below and online.
Thursday, 21 March 2013, 11:30 am � Colorado Springs, CO - "Bugs, Snakes, Rats, Torture and the Sex Life of a Naval Aviator in the Hanoi Hilton" at the Rocky Mountain Chapter of AFIO
The title of this meeting would catch the attention of anyone! Attend to hear Capt John Michael McGrath, USN(R) talk about "Bugs, snakes, rats, torture and the Sex Life of a Naval Aviator in the Hanoi Hilton 1967-73." McGrath was a Vietnam POW for six years and has some remarkable accounts to share. Please RSVP to Tom VanWormer at email@example.com and also to obtain directions.
27 March 2013 - New York, NY - "Circle of Treason" with Sandy Grimes, former CIA, at the AFIO NY Chapter Meeting
Sandy Grimes, one of the CIA principals behind the
search and unmasking of Aldrich Ames - the traitor in their midst at CIA
HQ - discusses in "Circle of Treason," her new book, co-authored with
the late Jeanne Vertefeuille, about the mole who nearly escaped capture. A
Location: Society of Illustrators Building, 128 East 63rd St, New York City.
For further information contact Jerry Goodwin, Chapter President, at 646-717-3776 or email to firstname.lastname@example.org
2 April 2013, 8 am - 3 pm - Washington, DC - CACI Hosts conference on Combating Asymmetric Threats: The Interplay of Offense and Defense
Discuss Asymmetric Threats on April 2 at an event co-sponsored by The
U.S. Naval Institute, the Center for Security Policy, and CACI
Participants will have a unique opportunity to explore America's capability to counter asymmetric threats by assessing the interplay of our nation's offensive and defensive powers. In particular, we will examine whether the United States has forfeited any of its asymmetric advantages, as well as what needs to be done in order to reclaim those advantages and ultimately defeat asymmetric threats to our national security and national interests. Winning the asymmetric fight is the core issue to be explored.
Speakers: ADM James G. Stavridis, USN - Commander, US European Command and NATO Supreme Allied Commander, Europe (invited); LTG Michael T. Flynn, U.S. Army -Director, Defense Intelligence Agency (confirmed); The Honorable Jon Kyl - US Senator, Arizona, 1995-2012 (confirmed).
Location: Ronald Reagan Building and International Trade Center, 1300 Pennsylvania Ave NW, Washington, DC 20004
This symposium is complimentary and open to participants by invitation only. Registration and further information at www.asymmetricthreat.net. To request an invitation to register, do so here.
Wednesday, 3 April 2013, 6 pm - Nellis AFB, NV - the AFIO Las Vegas Chapter Meets to discuss "Maritime Piracy" with Col. John Alexander
�Maritime Piracy: The Best Business Model Available� is the topic Col. John B. Alexander, PhD will discuss. Piracy has been a fact of life ever since seafaring
began. Hollywood�s portrayal of swashbuckling pirates of the Caribbean
is far off the mark. Their actions are not funny, and complex business
has evolved, especially near the Horn of Africa with over 100 million
dollars a year paid in ransom. With a cost of billions to maritime
industries, navies from around the world are now cooperating to stifle
the trade. There have been dramatic rescues, such as Maersk Alabama, and
a tragic escalation of violence. In February, Dr. Alexander transited
the Gulf of Guinea which has a rising piracy problem. Explored will be
the history of piracy and what is being done to ensure safe passage on
the high seas. �It�s complicated� is an understatement.
Dr. John Alexander holds a M.A., Pepperdine University, Ph.D., Walden University, and later attended the Anderson School of Management at UCLA, the Sloan School of Management at MIT, and the Kennedy School of Government general officer program �National and International Security for Senior Executives� at Harvard University.
Come early - 5 pm - to join a group in the "Robin�s Roost" bar area for liaison and beverages.
Location: Nellis Air Force Base Officers' Club. Guest names must be submitted along with their birth date to email below, by 4 pm, Thursday, 21 March 2013
All guests must use the MAIN GATE, located at the intersection of Craig Road and Las Vegas Blvd.
Address: 5871 Fitzgerald Blvd., Nellis AFB, NV 89191 Phone: 702-644-2582.
Email Mary Bentley (email@example.com) anytime or call 702-295-0417 if you have any questions. We look forward to seeing you!
Tuesday, 9 April 2013, 11:30 am - MacDill AFB, FL - "My Life in the CIA" with Richard Holm at Meeting/Luncheon by Florida Suncoast Chapter
Richard Holm, a former paramilitary adviser,
decorated operations officer, senior manager and station chief for the
Central Intelligence Agency, will share fascinating stories of his
experiences during the Cold War. Drawing from the material he used in
writing his book, The Craft We Chose: My Life in the CIA,
he will recount highlights of his 35-year Agency career and explain why
it is imperative for Americans to understand and support what the CIA
does--a goal that also underlies AFIO's efforts to raise public
awareness of the importance of national intelligence. He will also touch
on the impact of an intelligence career on one's family and family
Location: MacDill AFB Surf's Edge Club, 7315 Bayshore Blvd, MacDill AFB, FL 33621.
RSVP: no later than Wednesday, April 3, for yourself and include the names of any guests.
Email or call the Chapter Secretary at (813) 832-1164 or at firstname.lastname@example.org or visit www.suncoastafio.org
Cost: $20. You must present your $20 check payable to "Suncoast Chapter, AFIO" (or cash) at check-in to cover the luncheon. If you make a reservation, don't cancel and get a cancellation confirmation by the response deadline and then don't show up, you will be responsible for the cost of the luncheon.
Wednesday, 10 April 2013, 11:30 am – 1:30 pm - Scottsdale, AZ - The AFIO Arizona Chapter hosts Professor Don Costello on "Computational Intelligence"
Don Costello, Associate Professor Emeritus, University of Nebraska-Lincoln's Computing Science and Engineering Department, Member of AFIO AZ, speaks on "Computational Intelligence: Yesterday, Today and Tomorrow."
Don Costello is also a fellow of The British Computer Society and a Distinguished Lecturer for the Association for Computing Machinery. He is a retired Air Force Reserve Major and worked as an Airborne Telecommunications Officer out of Eielson Air Force Base in Alaska and as an Intelligence Officer focusing on Soviet Computer Technology and Missile Technology in Wright Patterson Air Force Base where he worked for the Foreign Technology Division (now a part of NSA). He is the President of Expert Security Systems.
He has monitored the change in technology used in Intelligence for many years. He will discuss those changes and how emerging computational and communications technology coupled to the change in the profile of aggressor nations and groups in light of the vulnerability of our National Computational Infrastructure forces the intelligence community to continuously upgrade the first and second team on the ground in the Intelligence community. He will present his thought on the need for new ORGWARE.
He has worked in Security and Cryptography for many years and will be again teaching Cryptography and Network Security at the University of Nebraska – Lincoln later this year. He also is designing and teaching new courses in Robotics.
Event Location: McCormick Ranch Golf Course at 7505 McCormick Parkway, Scottsdale AZ 85258 ~ Phone 480.948.0260.
RSVP NO LATER than 72 hours ahead of time.
Reservations or questions to Simone: email@example.com or firstname.lastname@example.org, or call, please leave a message on 602.570.6016. No Shows without 48-hr cancellation are charged for the missed lunch. Fee: $20.00 for AFIO AZ Member| $22.00 for Non-Members. Send check to Simone.
Wednesday, 10 April 2013, 6:30 pm - Washington, DC - Insider Espionage Update: A Worldwide Review, at the International Spy Museum
Get a worldwide overview of espionage and terrorism today - the
trends, threats, and evolution of today's intelligence from the ultimate
insider. As a retired FBI Supervisory Special Agent and former Director
of Counterintelligence, Intelligence and Security Programs for the FBI,
International Spy Museum Board Member David Major will
help you become an informed citizen of the world. As the founder of the
CI Centre, which provides counterintelligence and security studies and
training to the US government and private sector, Major tracks the most
important spy cases from around the globe and has the most up-to-date
information on their statuses. He'll reveal how many individuals have
been indicted in the US for espionage-related crimes from 1945 to the
present. He'll explore how aggressive China is in stealing information
and analyze the reality of Russia as an espionage threat to Europe and
North America. You'll also find out what terrorism and economic
espionage have in common in the 21st century. Come learn, laugh, think,
and ponder the very real world of spy games that we live in.
Mr. Major's seminar is based on information his organization, the CI Centre, collects and analyzes and then makes available to members via SPYPEDIA�, the world's largest resource for information on, and analysis of, worldwide espionage, terrorism, and cybersecurity.
Tickets: $15. Purchase tickets at www.spymuseum.org
Wednesday, 17 April 2013, 6:30 pm - Washington, DC - Cyber Terror on the Silver Screen: Skyfall's Raoul Silva, at the International Spy Museum
His nicotine hair flops queasily over his forehead on the Silver Screen: Skyfall's Raoul Silva on Silva, The Daily Telegraph.
Javier Bardem's Raoul Silva, from the newest Bond movie Skyfall, just might be the best Bond villain ever. Like the other iconic evildoers from the series, Silva has an intense persona and a cutting edge connection to current issues―in this case cyberterrorism. Silva gets whatever he wants with a click of the mouse, but just how real is this harrowing hacker? Join Dave Marcus, Director and Chief Architect of Threat Research and Intelligence for McAfee's Federal Advanced Programs Group, when he'll put Silva's astounding control of systems and cyberspace into a real world context. In his work, Marcus focuses on advanced research and threat intelligence projects such as Open Source Intelligence (OSINT) analysis, financial fraud malware, hardware-assisted security architecture, and SCADA/ICS research. In addition, Mark Stout, International Spy Museum Historian and a curator of the Museum's exhibition Exquisitely Evil: 50 Years of Bond Villains will discuss how Silva's actions mirror Julian Assange and today's cyber struggles as well as other intelligence issues.
Tickets: $15. Register at www.spymuseum.org
18 April 2013, 12:30 - 2:30pm - Los Angeles, CA - "Situation Awareness" - topic at AFIO LA Chapter Meeting
Clinton Emerson, President of Escape the Wolf, Risk
Mitigation will be discussing "Situation Awareness" at the Los Angeles
Area AFIO Chapter. Mr. Emerson is a respected authority and author on
preemptive risk mitigation and provides personal travel safety awareness
instruction for corporations & various branches of the government,
including the National Security Agency. His military service experience
in combat and highly sensitive operations worldwide as a Department of
Defense employee for nearly 20 years, including multiple deployments
during Operation Enduring Freedom and Operation Iraqi Freedom, has been
recognized with numerous awards for bravery and leadership. Location: LAPD Ahmanson Training Center, RM 1F, 5651 W. Manchester Blvd., Los Angeles, CA 90045
Please RSVP for attendance and location information:AFIO_LA@yahoo.com
Friday, 19 April 2013, 5:30-7 PM - Washington, DC - Ronald Reagan: Counterintelligence and the Evil Empire by Dr. Raymond Batvinis, at the Institute of World Politics
The Institute hosts their Third Annual Reagan Intelligence Lecture featuring Raymond J. Batvinis, Former Supervisory Special Agent, FBI, and IWP Professor. Dr. Raymond Batvinis joined the Federal Bureau of Investigation on July 17th, 1972. Entering the FBI just two years before Watergate, he was able to watch firsthand the subsequent "Age of Reform" in that agency - which involved reform chiefly in the intelligence and counterintelligence communities. He proceeded to spend twenty-five years in the FBI, gaining invaluable experience as well as deep knowledge about the organization itself.
After working in Cleveland on organized crime and fugitive work, he
moved to the Washington field office, where he was introduced to
counterintelligence. He eventually went to the FBI headquarters, and
taught FBI agents about counterintelligence, espionage, and
international and domestic terrorism investigations.
Dr. Batvinis also spent twelve years in the Baltimore field office as the Supervisory Special Agent of Counterintelligence. He was responsible for counterterrorism and domestic terrorism, as well as counterintelligence. There, he also arranged for training of the staff - and recommended to some of them that they attend IWP! He ultimately attained a senior-level position coordinating the National Foreign Intelligence Program.
Twelve years into his retirement from the FBI, Dr. Batvinis works today as a Consultant/Investigator at RJB Associates. He continues to teach history at FBI field offices around the nation, and he works for the J. Edgar Hoover Foundation, which awards scholarships and grants, and engages in other charitable work in memory of the first Director of the FBI.
Dr. Batvinis devotes much of his spare time to historical research
and analysis of the FBI. One of the readings for his class at IWP is a
book that he wrote himself: The Origins of FBI Counterintelligence.
Location: The Institute of World Politics, 1521 16th St NW, Washington, DC 20036.
Click here to RSVP.
Important note: Attendance at all IWP events requires an RSVP in advance. In addition, prospective attendees must receive an e-mail confirmation from IWP indicating that seating will be available for them at the event. A government-issued ID that matches your name on the confirmed attendee list must be presented at the door for admission to any event. The use of photographic and/or recording equipment is prohibited except by advanced permission from IWP, the event organizer, and the speaker(s). IWP is a private organization; as such, all attendees are guests of the Institute.
Saturday 20 April 2013 - Milford, MA - AFIO New England Chapter hosts Mike Stedman on "'A' for Argonaut" and Charles A. Morgan, M.D., at their Spring Meeting
Mike Stedman, South Boston born and bred, is a former political columnist, magazine writer, and intelligence consultant to major corporations. Formerly on the New England board of the Association for Intelligence Officers, he has been both a practitioner and critic of the spy world. Stedman, a former U.S. Army Reserve soldier with the 94th Infantry, has served as chairman of the New England Chapter of the Republican Jewish Coalition and President of his local Rotary Club. He lives outside of Boston with his wife. They have three sons, three daughters-in-law, and seven grandchildren, including identical twin boys.
But really... who is Michael J. Stedman?
Born Michael J. Hurley into a pre-arranged adoption at St. Mary's Infant Asylum in Boston's Dorchester neighborhood, Michael J. Stedman considers himself one of the luckiest people alive.
Charles A. Morgan, M.D., will be our second April 20th luncheon speaker, speaking on "Actuarial Project on Behalf of FBI: Truth and Deception through Manual and Cognitive tasks." Dr. Morgan's talk promises to be interesting, enlightening & perhaps even eye-opening. You are encouraged not to miss the opportunity to hear this Bureau-engaged researcher.
Location: Courtyard by Marriott in Milford, Mass. Hotel web site is here: http://www.marriott.com/hotels/travel/bosml-courtyard-boston-milford
Schedule: Registration & gathering, 1000 – 1130, Membership meeting 1130 – 1200; Luncheon at 1200 followed by keynote speaker; Adjournment at 2:30PM.
Questions to email@example.com
20 April 2013, 2 pm - Kennebunk, ME - "The Chinese Intelligence Threat to America" topic of AFIO Maine Chapter Meeting
"The Chinese Intelligence Threat to America: How it Operates and Why It Succeeds" will be the topic at the April 20, 2013 meeting of the AFIO Maine Chapter. The guest speaker, who will be identified at the meeting, is recognized in the Intelligence Community as an expert on Chinese Counterintelligence and operational planning. He has held senior CIA positions in both headquarters and overseas directing operations in a high risk counterintelligence environment. He will describe the organization of the intelligence services of the Peoples Republic of China (PRC) and explain why their methods of collection pose such a serious threat to the U.S.
The speaker's extensive CIA experience includes managing all counterintelligence activities for the Agency's Clandestine Services' East Asia Division. After retirement, as a senior officer with Athena Innovative Solutions and CACI, he was responsible for developing a Department of Defense (DOD) counterintelligence strategy to combat PRC espionage against DOD facilities, personnel, and programs. The speaker is the recipient of numerous CIA and Intelligence Community awards. Prior to his Agency service he served in the U.S. Marine Corps and was awarded the Navy Commendation Medal with "V" indicating valor in combat. He holds an MA in history from Syracuse University and a BA in history from Centre College, Danville, Kentucky.The meeting, which is open to the public, will be held at 2:00 p.m., Saturday, April 20, 2013, at the Brick Store Museum Program Center, 2 Dane Street, Kennebunk. For information call: 207-967-4298.
Wednesday, 24 April 2013, 10-11:30 am plus lunch - Annapolis Junction, MD - Sandy Grimes, former CIA/NCS, addresses National Cryptologic Museum Foundation members and guests
Ms. Sandy Grimes, author and former employee of the
CIA National Clandestine Service, will be the guest speaker for the
National Cryptologic Museum Foundation's spring program. The program
will be held Wednesday, 24 April, from 1000-1130, at the L3 Conference
Center in National Business Park. A booksigning and lunch will follow
Ms. Grime's co-authored Circle of Treason: A CIA Account of Traitor Aldrich Ames and the Men He Betrayed, with her colleague, the late Jeanne Vertefeuille. Together they worked on a CIA task force to investigate the disappearance of Soviet agents who were working undercover for the CIA. The lecture will focus on the decade-long investigation and the clues that led to the exposure of one of the most dangerous traitors in U.S. history.
Fluent in Russian, Ms. Grimes was recruited by the CIA in 1967 and spent most of her 26-year career targeting the former Soviet Union and Eastern Europe. She and her husband of 43 years reside in Great Falls, Virginia.
Join us for this riveting story of Cold War espionage. The Program fees are $15 for NCMF members, $40 for guests. The guest fee includes an annual membership in the Foundation. Make check payable to NCMF and send to PO Box 1682, Fort George G Meade, MD 20755-3682 by 17 April. The L3 conference center is located at: 2720 Technology Drive, Annapolis Junction, MD 20701.
Questions? Contact Mary J. Faletto, Senior Administrator, National Cryptologic Museum Foundation, Office: 301-688-5436 Cell: 443-250-8621. E-mail: firstname.lastname@example.org
Saturday, 4 May 2013, 1130 am � Indian Harbour Beach, FL - "My Life in the CIA" with Richard Holm at Meeting/Luncheon by AFIO Florida Satellite Chapter
Richard Holm, a former paramilitary adviser, decorated operations officer, senior manager and station chief for the Central Intelligence Agency, will share fascinating stories of his experiences during the Cold War. Drawing from the material he used in writing his book, The Craft We Chose: My Life in the CIA, he will recount highlights of his 35-year Agency career and explain why it is imperative for Americans to understand and support what the CIA does--a goal that also underlies AFIO's efforts to raise public awareness of the importance of national intelligence. He will also touch on the impact of an intelligence career on one's family and family life. POC: Bobbie Keith, email@example.com, 321.777.5561
Friday, 10 May 2013, 10:30 am - 2 pm - Tysons Corner, VA - David Shedd, DD/DIA, and Col. John B. Alexander, PhD.
AFIO National Spring Luncheon features Deputy Director David Shedd, Defense Intelligence Agency. The morning speaker is Col. John B. Alexander, PhD on UFOs and the Intelligence Community. Alexander, Senior Fellow with the Joint Special Operations University; Former Green Beret Commander, Los Alamos Project Director, recently released a book: UFOs: Myths, Conspiracies and Realities. Early registration is here.
For Additional Events two+ months or greater....view our online Calendar of Events
Disclaimers and Removal Instructions
Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers.
REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs:
a) IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list. If this link doesn't open a blank email, create one on your own and send to firstname.lastname@example.org with the words: REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.
b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to email@example.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.
CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at firstname.lastname@example.org. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm
WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor(s) or author(s) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!
(c) 2000, 2012, 2013, AFIO, 7700 Leesburg Pike Suite 324, Falls Church, Virginia 22043. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: email@example.com
Click here to return to top.