AFIO Weekly Intelligence Notes #23-13 dated 11 June 2013

[Editors' Note: The WIN editors attempt to include a wide range of articles and commentary in the Weekly Notes to inform and educate our readers. However, the views expressed in the articles are purely those of the authors, and in no way reflect support or endorsement from the WIN editors or the AFIO officers and staff. We welcome comments from the WIN readers on any and all articles and commentary.]
If you are having difficulties with the links or viewing this newsletter when it arrives by email, members may view the latest edition each week at this link: https://www.afio.com/pages/currentwin.htm You will need your LOGIN NAME and your PASSWORD.
REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs, click here:

CONTENTS

Section I - INTELLIGENCE HIGHLIGHTS

Section II - CONTEXT & PRECEDENCE

Section III - COMMENTARY

Section IV - Jobs and Coming Events

Jobs

Coming Educational Events

Current Calendar New and/or Next Two Months ONLY

 

SPYPEDIA [a private, corporate database] has just released the following for their Subscribers.


Pfc. Bradley MANNING's court martial is beginning in Baltimore. Prosecutors have alleged that MANNING's leaks to WikiLeaks allowed Osama BIN LADEN and other al Qaeda militants to acquire classified Afghanistan battlefield reports and U.S. State Department cables.
A U.S. filmmaker, Timothy Hallet Tracy, accused by the Venezuelan government of being a spy, has been released from custody and deported. He had been arrested and charged in late April 2013 for allegedly directing funds to the Venezuelan student protests against the government, which occurred after the Venezuelan presidential election on 14 April 2013. Mr. Tracy was released and deported shortly before a meeting between U.S. Secretary of State and Venezuelan Foreign Minister Elias Jauna at a regional summit in Guatemala.
Jury selection for Maj. Nidal HASAN's court martial has started. Major HASAN has outlined his defense in claiming that he specifically targeted American soldiers to prevent harm against Taliban fighters and leaders in Afghanistan. Maj. HASAN has claimed that he acted to prevent additional U.S. soldiers from being deployed to Afghanistan.
More than 1,500 people attended a demonstration organized by the English Defence League (EDL) in Newcastle, Northumbria in late May to honor Woolwich victim Lee Rigby. A counter-demonstration by the group called Newcastle Unites, arranged before the murder, also took place.
Iraq has accused four AQI militants of plotting to launch a chemical attack in the country. The militants planned to load sarin and mustard gas in remote-controlled toy planes and release the chemical agents above Baghdad. Iraqi officials also accused AQI of plotting to smuggle chemical weapons to Europe and North America, which would mark one of the times that the al Qaeda affiliate has targeted Western targets abroad.

France and Great Britain have stated that they have confirmation that the Government of Syria has used chemical weapons in the Syrian Civil War and that all options remain on the table. This comes as a Hezbollah-backed offensive has retaken a key town in central Syria as the violence and tensions begin to rise in Lebanon.
If you are not a subscriber to the CiCentre's SPYPEDIA, you are missing a lot of the latest documents and news on espionage and counterterrorism. Spypedia subscribers should login on a daily basis to stay abreast of the latest espionage, counterterrorism, security and cybersecurity news from around the globe. All new additions can be found by simply navigating to the "New Content" tab, which features the most recent updates in the SPYPEDIA database. Subscribe to SPYPEDIA with a 30% discount. Use code SPY30 -Centre for Counterintelligence and Security Studies (CI Centre)


NCMF

Just released was the June 2013 edition of the
National Cryptologic Museum Foundation's NCMF Web Link
This is a publication discussing coming events, new museum acquisitions,
special invitations, insider news, and other items of intel interest.
This recent issue featured...

To see what you're missing explore their website here,
sign up for the newsletter, explore membership options,
and plan your visit to the museum or special event.


Important Upcoming Event ...

7-10 July 2013 - Dungarvan, Ireland
3rd Annual Global Intelligence Forum

"Preparing Intelligence Analysts for the 21st Century"

Hosted by Mercyhurst University

Join us in Dungarvan, Ireland for a very special worldwide gathering of intelligence professionals, academics, and decision makers.
Preparing Intelligence Analysts for the 21st Century is the theme of the conference. The Global Forum continues down the path of intelligence innovation and discovery we embarked on in July 2010. Then, we began by exploring the nature of analysis and its application in various intelligence professions. Later, in 2011, we discussed the interaction between the intelligence analyst/practitioner and the decision-maker. In July 2013 we hope to continue to build bridges between practitioners and scholars within intelligence related professions, and discuss emerging 21st century intelligence best practices.
This year's forum will center on the greater shift the intelligence analysis field must make to account for a changing world. Panelists and contributors from the national security, law enforcement, business and academic communities will discuss the emerging trends and the necessary steps intelligence practitioners must take to address 21st century problems.
View the agenda here,
check out our current speaker list,
view the website,
and most importantly REGISTER here to join us!


 

Section I - INTELLIGENCE HIGHLIGHTS

The CIA Invests in Robot Writers. The Obama administration may be shifting control of the country's drone program from the Central Intelligence Agency to the Pentagon, but robots can still find jobs at Langley - as writers, apparently.

The CIA's venture capital wing, In-Q-Tel, has invested an unknown amount in a company called Narrative Science, which codes software capable of turning massive data sets into easy-to-read written prose, according to All Things D.

Chicago-based Narrative Science got its start by turning baseball box scores into readable accounts of games - not unlike a piece you might see in your local newspaper's sports pages. 

Naturally, Narrative Science raised many questions about the impact on journalism: Will we still need writers to pen rote accounts of the day's events if robots can do the job just fine? Should more journalists move away from the "here's what happened" to the "here's why it matters"? And so on. [Read more: Fitzpatrick/Mashable/5June2013]

Ex-NSA Employee Named as Source of Leaked NSA Reports. Edward Snowden, the ex-NSA worker who revealed a secret U.S. electronic surveillance program, says he likes Hong Kong's independence and free speech. He may be about to learn about its extradition deal with the U.S. 

The 29-year-old American, a former technical assistant for the Central Intelligence Agency and, recently, a contractor with the National Security Agency, provided the information to journalists and revealed his identity voluntarily, according to a video interview posted on the website of the U.K.'s Guardian newspaper. Snowden, an employee of defense contractor Booz Allen Hamilton Holding Corp (BAH)., has been working at the National Security Agency for the past four years for various contractors, according to reports by the Guardian and the Washington Post, which said he provided them with documents.

It may be up to China to decide if Snowden could be sent to the U.S. Under an extradition treaty signed in 1996, Hong Kong and the U.S. agreed to surrender those wanted for prosecution or for imposition of a sentence. China, which has sovereignty over Hong Kong, can refuse the transfer if it relates to its defense and foreign affairs. The Guardian said Snowden is in hiding in a Hong Kong hotel after leaving the U.S. May 20.

"The Chinese have no interest in making this an issue," said David Zweig, professor of social science at Hong Kong University of Science and Technology. "He hasn't helped China necessarily. This is an internal affair within the United States. They'll see it that way. If they hold on to him then it just strengthens the American right to intervene in China's internal affairs." [Read more: Bloomberg/10June2013]

Administration, Lawmakers Defend NSA Program to Collect Phone Records. Growing evidence of far-reaching federal surveillance of the phone records and Internet activity of millions of Americans reignited the debate Thursday about how aggressively the federal government uses its surveillance powers to protect against terrorist attacks.

In the latest revelation, The Washington Post found that the National Security Agency and the FBI have been secretly gathering the data of nine leading U.S. Internet companies, extracting a huge cache of audio, video, photograph and e-mail information and other records, according to a document intended for senior NSA officials. That news brought outrage from civil liberties advocates, especially coming on the heels of a disclosure Wednesday that the NSA has been secretly collecting Americans' phone records since 2006.

"I'm completely astonished. It's hard to think of what remains of privacy in this country,'' said Leslie Harris, president of the Center for Democracy & Technology.

Jameel Jaffer, deputy legal director for the American Civil Liberties Union, said the Internet data program, code-named PRISM, "is very disturbing. ...". These companies have an obligation to their subscribers and their customers to protect sensitive information.''

Several of the firms named have denied any knowledge of the program and said the government did not have direct access to their servers. U.S. officials say the program cannot be used to intentionally target any U.S. citizen or anyone in the United States.

The outrage among civil liberties advocates followed a day-long furor over a report Wednesday night on the Web site of the Guardian newspaper that a Verizon subsidiary, Verizon Business Network Services, was providing the NSA with "all call detail records" for domestic and international calls by its customers under an order from the federal court that oversees the Foreign Intelligence Surveillance Act. [Read more: WashingtonPost/6June2013]

Source: Panetta Wasn't Aware of Mark Boal's Attendance at CIA Ceremony. When CIA Director Leon Panetta ebulliently thanked members of SEAL Team Six at an agency ceremony honoring participants in the manhunt for Osama bin Laden, he was not aware that the CIA's public affairs shop had allowed writer Mark Boal to attend, an associate of Panetta's said today.

A report published by the Project for Government Oversight implied that Panetta knowingly disclosed classified information to someone who was not cleared to hear it because Panetta had endorsed the project that Boal and director Kathryn Bigelow had proposed.

But the associate, who asked not to be identified because the report deals with classified information, said Panetta was not told by his staff about Boal's attendance. The associate said that the CIA's public affairs staff allowed Boal to attend with the promise that he not divulge any information provided, although he could use the ceremony for "atmospherics." At the ceremony, Panetta identified by name the unit that conducted the raid, and, apparently departing from his speech text, which had been written for him by the public affairs staff, disclosed information that the Defense Department considered in retrospect to be classified at the Top Secret/Sensitive Compartmented Information level. [Read more: Ambinder/TheWeek/6June2013]

Coroner Requests Public Inquiry into Litvinenko Death. A public inquiry into the death of former KGB spy Alexander Litvinenko has been requested by the coroner in charge of his inquest.
Sir Robert Owen has written to the justice secretary to call for an inquiry after ruling the inquest could not hear evidence linked to alleged Russian state involvement.
A government spokesman said it would carefully consider the request.
Mr. Litvinenko was poisoned with radioactive polonium in London in 2006.
Last month the coroner accepted a request by Foreign Secretary William Hague to exclude certain material from the inquest on the grounds its disclosure could be damaging to national security.
This meant the inquest would be unable to look at whether the Russian state was behind the killing or whether the British state could have done more to protect Mr. Litvinenko. [Read more: BBC/5June2013]

Venezuela Deports U.S. Filmmaker Accused of Being Spy. Venezuela on Wednesday deported an American filmmaker who was arrested in April on accusations of spying for Washington and plotting with opposition student groups to destabilize the South American OPEC nation.
"The gringo Timothy Hallet Tracy, who was captured while spying in our country, has been expelled," Interior and Justice Minister Miguel Rodriguez Torres said on Twitter.
The American's lawyer, Daniel Rosales, said the charges against his client had been dropped, and the 35-year-old returned to the United States on a commercial flight to Miami.
"It was a traumatic experience. He's going to need some time," his sister, Tiffany Klaasen, told Reuters, saying he was still trying to come to grips with his imprisonment.
"We're just really happy that my brother is back and safe," she said by phone from her home in Grosse Pointe Farms, Michigan.
The outcome of the case was seen as a test of new Venezuelan President Nicolas Maduro's intentions toward Washington following years of hostility from his predecessor, late socialist leader Hugo Chavez.
During a trip to Latin America in May, President Barack Obama called the accusations against Tracy "ridiculous." [Read more: Reuters/5June2013]

South Korea's Ex-Intelligence Chief Accused of Meddling in Presidential Race. State prosecutors said on Tuesday that they would indict a former chief of the South Korean National Intelligence Service on charges of illegally trying to influence the election in December in favor of Park Geun-hye, who was elected president as the governing party candidate. 

The former official, Won Sei-hoon, served as the top intelligence official under President Lee Myung-bak, Ms. Park's predecessor, until February. He is accused of being involved in a secretive campaign in which intelligence agents and bloggers hired by the agency posted negative comments on the Internet about Ms. Park's rivals.

No evidence has emerged that Ms. Park - who defeated her main opposition rival, Moon Jae-in, by one million votes - was involved in the operation. It also remained unclear whether or how much the online campaign, if it existed, influenced the result of the election. But the announcement added weight to a long-held suspicion among the political opposition that the intelligence agency engaged in illegal campaigning for Ms. Park. [Read more: NYTimes/11June2013]

Lawsuit Details Alleged Waste at Intel Agency. The watchdog for the National Geospatial-Intelligence Agency is investigating a whistle-blower's complaints about fraud and waste atop the agency, including details of a 2011 "Family Day" event with clowns, dunk tanks, and ponies that cost more than a quarter million dollars, according to court records.

The inspector general's probe began after a former contract employee said she was fired last year after raising concerns about, among other things, the lease of a new Cadillac for NGA's director, Letitia Long, and potential transit card abuse among hundreds of employees, court records show.

The former Raytheon Technical Services program manager, Raissa Wilson, filed a lawsuit against her old employer, Raytheon, in U.S. District Court in Alexandria, Va., in December. She had been fired in February 2012.

A judge put the litigation on hold May 17 after Wilson's lawyers filed a motion to delay the case pending the outcome of an active NGA IG investigation into Wilson's accusations, which include a complaint about potential misuse of a government vehicle involving Long. Wilson's lawsuit said NGA ditched a lease in 2010 for a new Chevy Suburban to be used as Long's dedicated support vehicle and insisted on a more expensive Cadillac DTS instead. [Read more: McElhatton/FederalTimes/4June2013]

Switzerland Seeks US Answers on Whistleblower Spy Claims. Switzerland on Tuesday, June 11, revealed that it has asked the United States to explain an alleged CIA blackmail operation to spy on the Alpine country's banks, exposed by whistleblower Edward Snowden.
The Swiss foreign ministry told AFP that it was aware of media reports about the issue and that it had sent the US embassy in the capital Berne a diplomatic note seeking "clarification".
The ministry also confirmed that Snowden was accredited as a diplomatic attach� at the US permanent mission to the United Nations in Geneva from March 2007 to February 2009.
"The role of members of permanent missions in Geneva is to represent their country at international organisations based in Switzerland," the ministry said.
"In line with the Vienna Convention on diplomatic relations, Switzerland expects members of diplomatic missions in Berne and permanent missions in Geneva to respect the laws and rules of the country," it added. [Read more: AgenceFrancePresse/11June2013]

CIA-Bound Ricin Letter Found In Spokane. The 5th letter in a ricin-poisoning investigation, addressed to the Central Intelligence Agency, has been retrieved in Spokane. Paige Browning reports.

The FBI says postal workers in Spokane discovered the letter Saturday when it was returned as undeliverable.

Supervisory Senior Agent Frank Harrill, from the FBI in Spokane, said in an email the letter was addressed to the CIA, and is "similar in appearance to four other letters sent from Spokane last month." It's postmarked May 13th, written in red ink, and contains the deadly poison ricin. There are no related reports of illness.

Matching letters were addressed to President Barack Obama, a federal judge in Spokane, a Spokane post office, and Fairchild Air Force Base. [Read more: Browning/NWPR/11June2013]


Section II - CONTEXT & PRECEDENCE

The CIA, Zero Dark Thirty and Me: A Female Officer on Life Under Cover. It is hard to think of a film that courted more controversy this year than Zero Dark Thirty.
The story of the real-life female CIA officer who spends a decade hunting down Osama Bin Laden was boycotted by a member of the Oscars judging panel, and its director Kathryn Bigelow accused of "normalizing" torture.
The film also made in excess of $100 million, and was praised by critics worldwide for its ability to weave the exhausting 10 year search into a watchable whole, with the redheaded Maya (Jessica Chastain) pale and coolly focused at its center.
For Lindsay Moran, former spy and vocal critic of the Bush-era CIA, a six-year career at the Agency began in 1998, three years before Zero Dark Thirty begins.
Speaking on the phone from Washington DC, where she now lives with her husband and children, Moran talks with obvious excitement as she recalls learning the skills of an "operations agent" at "The Farm," the CIA's training facility rumored to be based in Virginia. 
She quickly learned that a spy had to make friends easily, and with people for whom she might have little respect.
"It came easier to the women," she says. "In fact, the CIA's biggest secret is that the best guys are women". [Read more: O'Mahony/TheTelegraph/5June2013]

NSA: The Finder and Keeper of Countless US Secrets. An email, a telephone call or even the murmur of a conversation captured by the vibration of a window - they're all part of the data that can be swept up by the sophisticated machinery of the National Security Agency.

Its job is to use the world's most cutting edge supercomputers and arguably the largest database storage sites to crunch and sift through immense amounts of data. The information analyzed might be stolen from a foreign official's laptop by a CIA officer overseas, intercepted by a Navy spy plane flying off the Chinese coast, or, as Americans found out this past week, gathered from U.S. phone records.

Code-breakers at the Fort Meade, Md.-based NSA use software to search for keywords in the emails or patterns in the phone numbers that might link known terrorist targets with possible new suspects. They farm out that information to the 16 U.S. intelligence agencies and to law enforcement, depending on who has the right to access which type of information, acting as gatekeeper, and they say, guardian of the nation's civil liberties as well as its security.

The super-secret agency is under the spotlight after last week's revelations of two surveillance programs. One involves the sweeping collection of hundreds of millions of phone records of U.S. customers. The second collects the audio, video, email, photographic and Internet search usage of foreign nationals overseas - and probably some Americans in the process - who use major Internet companies such as Microsoft, Google, Apple, and Yahoo.

NSA was founded in 1952. Only years later was the NSA publicly acknowledged, which explains its nickname, "No Such Agency." [Read more: Dozier/AP/9June2013]

CIA Releases Analyst's Fascinating Tale of Cracking the Kryptos Sculpture. It took eight years after artist Jim Sanborn unveiled his cryptographic sculpture at the CIA's headquarters for someone to succeed at cracking Kryptos's enigmatic messages.

In 1998, CIA analyst David Stein cracked three of the sculpture's four coded messages after spending 400 hours diddling over the problem with paper and pencil during many lunch breaks.

Though many people, on and off the CIA campus in Langley, Virginia, had tried to break the 865-character coded puzzle, Stein, a member of the agency's Directorate of Intelligence, was the first to succeed.

Only his CIA colleagues knew about his achievement at the time, however, because he wasn't allowed to go public with the news. A year later, California computer scientist Jim Gillogly stole the spotlight when he announced that he'd cracked the same three messages, only he used a Pentium II to do it.

In 1999, Stein wrote a fascinating account of how he cracked the messages. The suspenseful 11-page tale, which appeared in the CIA's classified journal Studies in Intelligence, is one of perseverance and pluck, not unlike the epic story of Captain Ahab pursuing Moby Dick (Stein himself references the literary tale in his entertaining piece).

This week, the National Security Archive published the now-unclassified document after receiving it from the CIA. Though the article has been published publicly before, it's never been widely disseminated. [Read more: Zetter/Wired/5June2013]

Silicon Valley and the Intelligence Agencies. PRISM and the NSA whistleblower scandal have been sparking public discussion of collaboration between tech giants and intelligence agencies.  Here's a brief primer to the long history of what happens when spooks go to the Valley.

The ongoing NSA surveillance leak raised questions about the relationship between major tech firms such as Google, Yahoo, Apple, Dell, and Facebook with the National Security Agency and America's security apparatus. But even before Edward Snowden contacted Glenn Greenwald with a potential scoop, Silicon Valley's biggest players all entered into relationships of one sort or another with the NSA. A cat's cradle of ties exists between American tech firms and intelligence agencies - and these ties appear to be a mix of self-interest and patriotic duty. Here's a look at just a few of the connections: [Read more: Ungerleider/FastCompany/10June2013]

The Mysterious Plainfield Pistol: CIA or CYA? At first glance, it looks like a throwaway cheapo Saturday night special but the second your hands make contact with this pocket rocket, you know this gun is something far different.

Based in Middlesex, New Jersey, the firm of Plainfield Machine Company was one of the many small firms that took advantage of a situation in the 1960s. You see the US Government was liquidating enormous stocks of WWII-era M1 and M2 Carbines along with their spare parts inventories, magazines, extra barrels and everything else that looked carbine-like. This led a few new companies, like Universal, MOCO, and others started making new receivers for these salvaged parts and selling semi-auto carbines as fast as the checks could make it to the bank. Plainfield was one of these outfits and from 1962-1978 they produced some 112,000 M1 carbines for the civilian market.

They also made a couple of pistols that, while quality made, faded into history. These were the Model 71 and 72. [Read more: Eger/Guns.com/11June2013]

Use this Spy Bolt to Smuggle Pills, Diamonds Through Customs. Pill poppers and diamond smugglers take notice: this is the apparatus you need in your tool box, literally. It's called the Spy Bolt and it has a secret compartment inside of its body that can hold your weekend dose of ecstasy or stash of diamonds as you pass through US customs from a weekend trip to Antwerp.

The Spy Bolt is in fact derived from Cold War era technology used by the KGB, though this one is said to be larger in size. That said, the head, or top of the Spy Bolt features a reverse threading, so if someone attempts to unscrew it they'll be thwarted, unless of course they can't remember the old adage left loosie, righty tighty.

Not for nothing, you could use the Spy Bolt to hold a small stash of emergency cash. Or if you're truly in the spy business, a sliver of microfilm that could be used to extort a wealthy business executive that could you net you enough cash to flee the country. [Read more: Costa/GadgetReview/10June2013]


Section III - COMMENTARY

The Spy Who Turned Me. During my thirty-plus years working abroad for the CIA, the unspoken truth among case officers like me was that you'd have to be nuts, as the citizen of another country, to be a spy for a foreign intelligence service. In recruiting an agent or "asset," we were asking him to ignore the instinct of self-preservation, to break the laws of his own country - to become a traitor. And we were asking him to trust that no leak or mole would ever expose him. 

Today, there are still secrets that need stealing, and the consequences of detection remain dangerous. Moscow's recent expulsion of an alleged CIA officer was dramatic, but such moves are among the lesser costs of espionage gone awry.

How, then, does a case officer persuade someone to become a traitor? There is no definitive handbook. The process is as complex as human relationships. If possible, a friendship should develop between the case officer and the prospective agent; bonds of trust must be established. But beneath the surface, there is the CIA officer's constant and often uncharitable assessment of the target's aspirations, fears and desires. You must know what motivates the potential recruit so that you can better exploit his vulnerabilities and, in the end, put him in the right frame of mind for your "pitch."

In making this assessment, the CIA relies on four basic human motivations, described by the acronym MICE: money, ideology, conscience and ego. [Read more: Matthews/WSJ/31May2013]

The Outsourcing of U.S. Intelligence Raises Risks Among the Benefits. The unprecedented leak of National Security Agency secrets by an intelligence contractor, including bombshells about top-secret programs to collect telephone records, e-mail and other personal data, was probably an inevitable consequence of the massive growth of the U.S. security-industrial complex.

Edward Snowden, the 29-year-old man who identified himself as the source behind stories in The Washington Post and The Guardian newspapers, has worked at Booz Allen Hamilton and other intelligence contractors. Before entering the private sector, he says he held a series of technical jobs at the Central Intelligence Agency. 

In a statement Sunday, Booz Allen said, "Booz Allen can confirm that Edward Snowden, 29, has been an employee of our firm for less than 3 months, assigned to a team in Hawaii. News reports that this individual has claimed to have leaked classified information are shocking, and if accurate, this action represents a grave violation of the code of conduct and core values of our firm. We will work closely with our clients and authorities in their investigation of this matter."
Snowden was among tens of thousands of private intelligence contractors hired in the unprecedented push to "connect the dots" after the Sept. 11, 2001, terrorist attacks. They work side by side with civil servants as analysts, technical support specialists and mission managers. An unknown number have access to secret and top-secret material.

Several years ago, the Office of the Director of National Intelligence estimated that almost one in four intelligence workers were employed by contractors.

The growing reliance on contractors reflects a massive shift toward outsourcing over the past 15 years, in part because of cutbacks in the government agencies. [Read more: O'Harrow/WashingtonPost/9June2013]

Is Snowden a Traitor or a Public Servant? Hero? Traitor? Or someone in between?

How you view Edward Snowden, who exposed two sweeping U.S. online surveillance programs, probably has a lot to do with which you fear more - terrorist bombers or government snoopers.

Snowden's admission that he was the one who'd released evidence of the top-secret programs - one of the most sensational leaks of classified material in U.S. history - expanded an already blistering debate over the clash between national security and online privacy.

With Snowden's assistance, The Guardian and The Washington Post have recently published a series of top-secret documents detailing the government surveillance programs. One gathers hundreds of millions of U.S. phone records while searching for possible links to suspected terrorists abroad; the second allows the government to tap into U.S. Internet companies' data to detect suspicious behavior that begins overseas.

Who is Ed Snowden? That depends on who's asking. [Read more: Hampson/USAToday/11June2013]

Spy vs Spy in the Cyber Age. Despite very public pressure, US President Barack Obama and his Chinese counterpart, Xi Jinping, failed to reach an agreement on combating cyber-espionage at their weekend meeting in California. Beijing and Washington are trading increasingly harsh accusations of launching state-sanctioned cyber attacks. Meanwhile, a covert program of Internet data mining by US intelligence agencies has been revealed by a young whistleblower, who has taken refuge in China's Special Administrative Region of Hong Kong.

China and the United States are contesting a vast and uncharted arena of superpower rivalry. The cyber war has already begun.

Obama and Xi left their summit in Palm Springs with a series of important agreements, covering such pressing issues as the North Korean nuclear weapons program and global warming. However, Obama's efforts to persuade Xi to work out an agreement on cyber-espionage were entirely unsuccessful.

To avoid electronic eavesdropping, Xi and his delegation decided at the last minute to stay in a downtown hotel away from the summit's grounds. If he wants to prevent American intelligence from accessing his personal communications, Xi would be wise to avoid Facebook and Gmail.

In recent weeks, Washington and Beijing have very publicly exchanged allegations of cyber malfeasance. [Read more: O'Reilly/AsiaTimes/11June2013]


Section IV - Jobs and Coming Events


Jobs
 [IMPORTANT: AFIO does not "vet" or endorse these research inquiries or job offers. Reasonable-sounding inquiries and career offerings are published as a service to our members, and for researchers, educators, and subscribers. You are urged to exercise your usual caution and good judgment when responding or supplying any information.]

CI Instructors. The Mission Support Group of SAIC is actively seeking seasoned CI Instructors to provide instruction for mid- and senior-level counterintelligence professionals that will develop their capabilities and knowledge to operate in support of DoD requirements worldwide. This position will be located onsite in Quantico, VA.

The candidate for this position serves as an instructor for the Defense HUMINT and CI Enterprise. The specific focus of this requirement is to deliver training and educational curriculum based on common DoD CI standards, principles, and procedures. He or she is expected to be a graduated from an accredited CI program and have operational experience in the discipline. He/she is expected to maintain a working knowledge of HUMINT and CI operational tradecraft as well as to have experience in teaching the CI curriculum. The candidate will ensure course materials are maintained, updated and or improved as needed to meet current competencies and guidance as set forth in DoD instructions and policies. In addition, the candidate must be able to instruct in a fast paced environment where the curriculum and training environment continually evolves. He or she will provide timely responses to queries and support requests from higher headquarters and will provide sound and accurate advice, guidance and counsel to program managers on any issues dealing with training and curriculum. The candidate will also serve as a mentor to students. The candidate will coordinate and work with DoD components and other federal agencies to review course materials and subject matter for incorporation or adoption into course curriculum. At all times the candidate will portray a highly professional demeanor when dealing with other DoD components and students. He or she will maintain liaison contacts with officials of appropriate national agencies and the Services to ensure timely exchange of training related materials and information. In addition, the candidate will ensure distance learning packages/computer based training (CBT) on information operations meets the needs of field personnel. The candidate will develop, prepare, and present briefings/lessons to students at all levels, senior level and community officials.

MINIMUM REQUIRED QUALIFICATIONS:
Candidate must possess a TS/SCI with Polygraph Security Clearance. Must be a graduate of JCITA's Advanced Foreign CI Operations Course (AFCIOC) or comparable legacy training offered by the Military, such as AFCITC, the USAF Counterespionage Case Officer's Course, or the Navy Counterespionage Operations Course. A bachelors degree and/ or a Minimum of 5 years for the mid-level in support of DoD or other government agency. Excellent interpersonal skills. Outstanding oral and communication skills. Proficient in the full suite of Microsoft Office tools.

Specialized CI operational experience in a geographic or functional area. Valid state driver's license. Physical ability to participate in field exercises that include walking up to 6 miles in uneven terrain in rural and urban environments; in a variety of weather conditions.

If interested, please contact Mike Bruni of SAIC at brunim@saic.com or 703-270-8211.

- - - -

See TechExpo Events below for other job opportunities for Cleared Personnel: June 18 and June 25.


Coming Educational Events

EDUCATIONAL EVENTS IN COMING TWO MONTHS....

MANY Spy Museum Events in 2013 with full details are listed on the AFIO Website at www.afio.com. The titles for some of these are in detail below and online.

Wednesday, 12 June 2013, 11am - 2pm - Albuquerque, NM - The AFIO New Mexico Chapter to Discuss Current Intel Issues

11:00 AM: Arrive, socialize, order lunch 11:45 Meeting Program. Location: Lunch at "The Egg & I" (Menaul just East of Louisiana).
Questions to B.E. Pete Bostwick, Jr., President, AFIO Tom Smith New Mexico Chapter, 436 Chimaja Rd., Corrales NM 87048; Tel: 505-898-2649 or email him at foreigndevil@yahoo.com

12 June 2013, 6:30 pm - Washington, DC - Wallis Simpson, Duchess of Windsor: Nazi Spy? at the International Spy Museum

When King Edward VIII abdicated the English thrown in December 1936 to marry Wallis Simpson, the world was agog. And many feared the political implications of a former king on the loose. What would these notorious lovers do? Would they attempt to influence world affairs? It seemed that the worst nightmare of many observers was coming to pass when photos of the two gleefully gladhanding Hitler appeared in 1937. During World War II, the former King was given governorship of the Bahamas - a post that those in-the-know rightly considered a form of exile. But just how dangerous were they? Amanda A. Ohlke, Adult Education Director at the International Spy Museum, will overview the most serious accusations and credit or debunk them. Much is made of secret files and gossip, but this June, the 76th anniversary of their controversial marriage, find out the truth about Wallis and Edward. After the presentation, toast the famed couple's marriage with some bubbly and trade a quip with the Baltimore-born Duchess. The Duchess, as brought to life by historical enactor Emily Lapisardi, will answer to some of the most heinous accusations in the spirit of Mrs. Simpson.
Space is limited - advance registration required! For more information or to purchase tickets please visit: www.spymuseum.org

14 June 2013, 6:30 pm - Washington, DC - Surveillance 201 with Eric O'Neill - Spy School Workshop at the International Spy Museum

What if you were assigned to watch the most damaging spy in US history? As a young operative in the FBI, Eric O'Neill was put into position as Robert Hanssen's assistant with the secret task of spying on his boss, who was under suspicion of working for Russia. O'Neill's background with the FBI was in surveillance, so he was up to the challenge. O'Neill has run some previous recruits through a surveillance basics course, and now he's ready to take those with the expertise to the next level. This advanced small group surveillance exercise is best suited to those who already know how to track the "Rabbit" without being "made." O'Neill will rate your clandestine prowess while you spy on secret meetings and operational acts and see if you can uncover the spy skullduggery that's afoot while you are on foot. There is no guarantee that your "Rabbit" won't escape!
Space is limited to only 10 participants - advance registration required! For more information or to purchase tickets please visit: www.spymuseum.org

14 June 2013, 7 - 8:30 pm - Arlington, VA - 15 Minutes with "POTUS" Briefing Competition Final Presentation at Founders Hall, George Mason University - No Charge To Attend.

15 Minutes with "POTUS" takes place at Founders Hall, George Mason University, Arlington, VA. This Policy Briefing Competition enters the Final Stage. The three finalists now will display their briefing skills to high-level policymakers.
They were assigned to imagine that they are policy analysts at the National Security Council. They have been asked to prepare a decision memo for the President. The President has allocated 15 minutes for their briefing

The three great finalists will be presenting policy briefs to Chuck Robb, Michael Hayden, and Janine Davidson. POTUS - played by The Honorable Charles S. Robb, former U.S. Senator (D-VA); National Security Advisor - played by General Michael V. Hayden, former director, CIA and NSA; Secretary of Defense - played by Dr. Janine Davidson, former Deputy Assistant Secretary of Defense for Plans.
There is no charge to attend.

Here is the link to the RSVP page if AFIO members would like to attend to cheer-on and encourage these students and other attendees, and to meet the presidential stand-ins. 15minutes.gmu.edu/

15 Minutes with POTUS is hosted by George Mason School of Public Policy, in Founders Hall Auditorium, Friday, June 14, 2013, 7 PM to 8:30 PM (EDT) Arlington, VA.

18 June 2013, 1130am - 2pm - McLean, VA - The Defense Intelligence Forum hears Hon. James Longley, Jr. on Congressional Relations with Intel Community

The Honorable James B. Longley, Jr. will speak on Congressional Relations with the Intel Community. Longley is an attorney, Marine Corps veteran, communicator and long-standing analyst who uses this diverse background in law, business, the military, politics, media and government to provide a clearer understanding of some the critical and complicated issues confronting the federal government. As a member of the famous, "Gingrich Congress" (1995-1997) and House Armed Services Committee, he was one of six members who, well in advance of 9/11, self-funded the House Task Force on Terrorism and Unconventional Warfare. He was also a founder on the House Shipbuilding Caucus and participated in a number of matters of intense interest to the armed services and the intelligence community, especially in the area of acquisition.
Event location: Pulcinella Restaurant, 6852 Old Dominion Drive, McLean, VA
RSVP by 17 June 2013 by email to diforum@diaalumni.org. Include names, telephone numbers, and email addresses. For each attendee, choose among Chicken Cacciatore, Tilapia Puttanesca, Lasagna, Sausage with Peppers, Fettuccini with Portabella for your lunch selection.
FEE: Pay at the door with a check for $29pp payable to DIAA, Inc.
Check is preferred, but will accept cash; however, credit card payments are discouraged.

Tuesday, 18 June 2013, 10am - 3pm - Baltimore, MD - TECHEXPO Hiring Event For Cleared Personnel
Location: BWI Marriott - 1743 West Nursery Road.
ACTIVE SECURITY CLEARANCE REQUIRED
Invitation For Security-Cleared Professionals. New career opportunities await you at the Nation's leading hiring events for Security-Cleared Professionals at TECHEXPO Top Secret's June events. Opportunities available in Information Technology, Cyber Security, Engineering, Aerospace, Telecom, Project Management, Intelligence, Operations, Homeland Security, Research & much more.
Please forward this invitation to your Security-Cleared colleagues & friends. Click here to register.

Saturday 22 June 2013, 10am - 2:30pm - Milford, MA - AFIO New England Chapter hosts John Strauchs at their Summer Meeting

Schedule: Registration & gathering, 1000 - 1130, Membership meeting 1130 - 1200; Luncheon at 1200 followed by keynote speaker John J. Strauchs; Adjournment at 2:30PM.
Our afternoon speaker is John J. Strauchs.  His presentation is titled: The 1993 Bombing of the World Trade Center:  The Wellspring of Counterterrorism Planning for Public Buildings
John Strauchs was the chief security engineering consultant for the World Trade Center following the 1993 bombing. John will discuss the risk assessment that was conducted for the Port Authority of New York and New Jersey in May 1994 and, despite comments to the contrary by political and news media pundits, that the possibility of the deliberate crashing of an aircraft into the towers was considered. He will reveal the many security innovations that were developed for the World Trade Center, as well as lessons learned - both good and bad - and how the 1993 bombing changed life in America and how we live and work today.  The resultant security systems design consisted of more than 1000 security design drawings and an initial security construction budget of $54 million.
Note, as this meeting is a one day event we have not made any hotel arrangements.
Advance reservations are $25.00 per person.  We can no longer accept walk-ins.  Emails regarding your plans to attend will be accepted if you are late meeting the deadline.  These must be sent to Mr. Arthur Hulnick no later than 7 days prior to the event. Location: Courtyard by Marriott in Milford, Mass. Hotel website is here.
********Luncheon reservations must be made by 12 June 2013. ************** Mail your check and the reservation form to:  Mr. Arthur Hulnick, 216 Summit Avenue # E102, Brookline, MA 02446 or contact him at hlnk@aol.com Questions to afionechapter@gmail.com

22 June 2013, 2:30 pm - Kennebunk, ME - AFIO Maine meets to hear Martha Peterson, former CIA Ops Officer, describe her arrest, interrogation by KGB

Guest speaker will be Martha D. Peterson, who retired from CIA after a 32-year career as an operations officer. Martha describes what it was like to be a CIA Operations Officer assigned to Moscow during the Cold War and be arrested and interrogated by the KGB. Peterson has written The Widow Spy: My CIA Journey from the Jungles of Laos to Prison in Moscow (Wilmington: Red Canary Press, $18.95 paperback).
Event will be held at the Brick Store Museum Program Center in Kennebunk, Maine. Further information available at 207-967-4298.

Tuesday, 25 June 2013, 10am - 3pm - Arlington, VA - TECHEXPO Hiring Event For Cleared Personnel
Location: The Ritz Carlton Pentagon City - 1250 South Hayes Street
ACTIVE SECURITY CLEARANCE REQUIRED. Invitation For Security-Cleared Professionals
New career opportunities await you at the Nation's leading hiring events for Security-Cleared Professionals at TECHEXPO Top Secret's June events. Opportunities available in Information Technology, Cyber Security, Engineering, Aerospace, Telecom, Project Management, Intelligence, Operations, Homeland Security, Research & much more.
Please forward this invitation to your Security-Cleared colleagues & friends. Click here to register

7-10 July 2013 - Dungarvan, Ireland - 3rd Annual Global Intelligence Forum - "Preparing Intelligence Analysts for the 21st Century" - Hosted by Mercyhurst University

Join us in Dungarvan, Ireland for a very special worldwide gathering of intelligence professionals, academics and decision makers.
Preparing Intelligence Analysts for the 21st Century is the theme of the conference. The Global Forum continues down the path of intelligence innovation and discovery we embarked on in July 2010. Then, we began by exploring the nature of analysis and its application in various intelligence professions. Later, in 2011, we discussed the interaction between the intelligence analyst/practitioner and the decision-maker. In July 2013 we hope to continue to build bridges between practitioners and scholars within intelligence related professions, and discuss emerging 21st century intelligence best practices.
This year's forum will center on the greater shift the intelligence analysis field must make to account for a changing world. Panelists and contributors from the national security, law enforcement, business and academic communities will discuss the emerging trends and the necessary steps intelligence practitioners must take to address 21st century problems.
View the agenda here, check out our current speaker list, view the website, and most importantly REGISTER here to join us!

Wednesday, 10 July, 2013, noon - Washington, DC - Global Terrorism, Espionage and Cybersecurity Monthly Update, at the International Spy Museum

Presented in partnership with the CI Centre, these monthly briefings will provide you with the opportunity to be the first to learn of the most current worldwide happenings in the field of intelligence and terrorism. Drawn from the Centre's SPYPEDIA�, the most comprehensive source of espionage information in the world, each Update will cover important events and information which may not be reported by mainstream media outlets. Such as: espionage penetrations and arrests, cyber espionage reporting, and terrorist events. Briefings led by CI Centre founder David Major will include trend analysis and coverage of new emerging issues of value to the intelligence and security professional and individuals with an interest in national security matters. Major will also highlight and review, as appropriate, new books and reports to keep you current with breaking developments in the national security arena.
Tickets: Free! No registration required. See www.spymuseum.org

10 July 2013, 10 am - Annapolis Junction, MD - The National Cryptologic Museum Foundation Summer Program features Dr. Melvin Goodman discussing "National Insecurity"

Dr. Melvin A. Goodman, a former senior CIA analyst, author and senior fellow at the Center for International Policy,currently serving as an adjunct professor of government at Johns Hopkins University, will be discussing his latest book, National Insecurity: The Cost of American Militarism at this NCMF Program. A booksigning and lunch will follow the presentation.
An accomplished author, Dr. Goodman gained an exceptional knowledge of national security while serving under every Administration from Johnson to Bush, Sr. Dr. Goodman decries that the Government’s persistent misdirection of power stems from its dependency on the military-industrial complex. He believes that allowing the military to dominate national security is both exorbitant and ineffective in results. He offers a prescription for curbing the costs, calling for diplomacy as a better tool for dealing with foreign policy issues such as North Korea, Iran, and Syria. In his book he contends, “The United States must abandon its notion of ‘exceptionalism’ which has led this country to gratuitously deploy military forces overseas to advance U.S. values.” An exciting, provocative speaker with strong views and thoughts on the last two Administrations’ handling of major crisis areas challenging the U.S., Goodman is ready to discuss these vexing issues in the lively Q&A session sure to follow his presentation. We hope you can join us for this exciting program. The Program fees are $40 which includes lunch and a year's membership in the Foundation. You may register and pay online at www.cryptologicfoundation.org. Or make your check payable to NCMF and return by 30 June to NCMF, PO Box 1682, Fort George G Meade, MD 20755-3682.Questions? Contact cryptmf@aol.com.
Location: the program will be held at the L-3 Conference Center at the National Business Park in Annapolis Junction, MD. More information here.

Thursday, 11 July 2013, 11:30 am - Colorado Springs, CO - The Rocky Mountain Chapter presents Don Shannon, FBI  Supervisory Special Agent In Charge of Southern Colorado Joint Terrorism Task Force

The AFIO Rocky Mountain Chapter presents Don Shannon, FBI Supervisory Special Agent In Charge of Southern Colorado Joint Terrorism Task Force.  SSA Don Shannon will talk on his trip to Thailand.  This event will take place a week before normal meetings to allow for scheduling issues again... 11 July 13.  To be held at The Inn at Palmer Divide, 443 S. Highway 105 Palmer Lake, CO, Exit 161 westbound off I-25, West on Highway 105.  Please RSVP to Tom VanWormer at robsmom@pcisys.net

25 July 2013, 12:30 - 2:30pm - Los Angeles, CA - David Glazier speaks on "Drones, Targeted Killing, and the Law" at AFIO LA Chapter

Glazier will provide a legal overview assessment of the use of drones for targeted killing.
Location: LAPD ARTC 5651 W Manchester Ave, Los Angeles, CA 90045
Please RSVP for attendance: AFIO_LA@YAHOO.COM

26 July 2013 - Washington, DC - Commencement Speaker at National Intelligence University's Graduation Ceremony is James R. Clapper, Jr., Director of National Intelligence

The Honorable James R. Clapper, Director of National Intelligence (DNI) will deliver the commencement address to National Intelligence University graduates on Friday, July 26, 2013. The commencement is the closing event in the University's 50th Anniversary year and coincidentally marks the 50th anniversary of Director Clapper's intelligence career: he was first commissioned as an Air Force intelligence officer in 1963.
NIU President Dr. David Ellison expects to present diplomas to approximately 250 graduating students from around the Intelligence Community as they cross the stage to receive one of the University's three degrees: Master of Science of Strategic Intelligence, Master of Science and Technology Intelligence, or Bachelor of Science in Intelligence.
The National Intelligence University is a federal degree-granting institution whose main campus is located in Washington, DC. Its alumni are past, present and future leaders in the intelligence and national security communities and in the private sector. Notable alumni include a former Director of National Intelligence; former directors of DIA, CIA, NSA, and NGA; former heads of military intelligence and a growing number of senior government executives and corporate leaders. For more information, visit www.ni-u.edu

Saturday, 3 August 2013, 11:30 am - Melbourne, FL - "When Clerics Say Kill" the topic at the AFIO Satellite Chapter Meeting

The topic will be "When Clerics Say Kill" and the speaker will be Don White. He asks: How do devout, intelligent, educated, religious leaders drift from their core beliefs to the point of ordering the deaths of innocent people? What do they look for in recruiting a suicide bomber? Could it happen here in America in significant numbers?
Meeting being held at: the Indian River Colony Club's At Ease Club, starting at 11:30 AM. Questions or to register contact Bobbie Keith, 321 777 5561 or email her at bobbie6769@juno.com

19 - 21 August 2013 - Long Beach, CA - Maritime Security 2013 West - "Technology and Strategies to Mitigate Security Threats to the Maritime Domain"

Captain James D. Jenkins, Sector Commander, U.S. Coast Guard Sector Los Angeles - Long Beach, to give opening keynote address on August 20th.
SEE NEWLY REVISED AND MORE DETAILED AGENDA
Maritime Security 2013 West will bring together public and private stakeholders from all levels to discuss, learn and collaborate on strategies and technology use in mitigating security threats posed to the maritime domain.
The panel sessions and presentations are designed to give all participants the actionable knowledge on how to better secure their maritime areas of responsibility by highlighting available resources and best practices. Each topic will be comprehensively addressed with the critical perspectives of those who have implemented successful strategies and cutting-edge technologies in their maritime security operations.
DHS Science & Technology, Maritime Security Division in cooperation with SRI International presents the Maritime Security Technology Program (MSTP) Coastal Surveillance System (CSS). Built on an innovative open source platform, the CSS allows stakeholders at all levels to have access to critical data and information. From AIS and radar feeds to cameras and sensors, the CSS allows real time information sharing in an unclassified setting anytime, anywhere. By integrating highly robust naval sensors and data fusion capabilities, the MSTP provides the most comprehensive maritime domain awareness available and will set a new standard for maritime information sharing.
The demonstrations conducted in small groups of 20 or less will allow government entities to learn about the most cost effective and robust system to assist them in their information sharing needs. For solutions providers, this demonstration allows them to understand the immense opportunity for them to integrate their data into the system and potentially partner with DHS S&T in the deployment of the system.
Please read the following article by Thomas Tomaiko that will give great insight into the program and it's objectives: Reality Check: Balancing the Need to Enhance Maritime Security While Maximizing Legitimate Use of the Maritime Domain
Registration here:
- All access registration rates range from $95 to $445
- Discounts available for Maritime Security East and Small Vessel Security Threats Program attendees and NASBLA Members
- Please click here for Registration information or call us at 203-221-2664 or email us at customerservice@hsoutlook.com

For Additional Events two+ months or greater....view our online Calendar of Events


Disclaimers and Removal Instructions

Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers. 

REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs: 

a)  IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list.  If this link doesn't open a blank email, create one on your own and send to afio@afio.com with the words:  REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.

 b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to afio@afio.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.

CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at afio@afio.com. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm


WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor(s) or author(s) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!

(c) 2000, 2012, 2013, Please note AFIO's new address: AFIO, 7600 Leesburg Pike, Suite 470 East, Falls Church, VA 22043-2004. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: afio@afio.com

Click here to return to top.