[Editors' Note: The WIN editors attempt
to include a wide range of articles and commentary in the Weekly Notes
to inform and educate our readers. However, the views expressed in the
articles are purely those of the authors, and in no way reflect support
or endorsement from the WIN editors or the AFIO officers and staff. We
welcome comments from the WIN readers on any and all articles and
Georgetown University Press features for AFIO members:
Section I - INTELLIGENCE HIGHLIGHTS
Al-Qaida Said To Be Changing Its Ways After Leaks. U.S. intelligence agencies are scrambling to salvage their surveillance of al-Qaida and other terrorists who are working frantically to change how they communicate after a National Security Agency contractor leaked details of two NSA spying programs. It's an electronic game of cat-and-mouse that could have deadly consequences if a plot is missed or a terrorist operative manages to drop out of sight.
Terrorist groups had always taken care to avoid detection - from using anonymous email accounts, to multiple cellphones, to avoiding electronic communications at all, in the case of Osama bin Laden. But there were some methods of communication, like the Skype video teleconferencing software that some militants still used, thinking they were safe, according to U.S. counterterrorism officials who follow the groups. They spoke anonymously as a condition of describing their surveillance of the groups. Those militants now know to take care with Skype - one of the 9 U.S.-based Internet servers identified by former NSA contractor Edward Snowden's leaks to The Guardian and The Washington Post.
Two U.S. intelligence officials say members of virtually every terrorist group, including core al-Qaida members, are attempting to change how they communicate, based on what they are reading in the media, to hide from U.S. surveillance. It is the first time intelligence officials have described which groups are reacting to the leaks. The officials spoke anonymously because they were not authorized to speak about the intelligence matters publicly.
The officials wouldn't go into details on how they know this, whether it's terrorists switching email accounts or cellphone providers or adopting new encryption techniques, but a lawmaker briefed on the matter said al-Qaida's Yemeni offshoot, al-Qaida in the Arabian Peninsula, has been among the first to alter how it reaches out to its operatives. [Read more: Dozier/AP/26June2013]
Company Allegedly Misled Government About Security Clearance Checks. Federal investigators have told lawmakers they have evidence that
USIS, the contractor that screened Edward Snowden for his top-secret clearance, repeatedly misled the government about the thoroughness of its background checks, according to people familiar with the matter.
The alleged transgressions are so serious that a federal watchdog indicated he plans to recommend that the Office of Personnel Management, which oversees most background checks, end ties with USIS unless it can show it is performing responsibly, the person said.
Cutting off USIS could present a major logistical quagmire for the nation's already-jammed security clearance process. The federal government relies heavily on contractors to approve workers for some of its most sensitive jobs in defense and intelligence. Falls Church-based USIS is the largest single private provider for government background checks.
The inspector general of OPM, working with the Justice Department, is examining whether USIS failed to meet a contractual obligation that it would conduct reviews of all background checks the company performed on behalf of government agencies, the people familiar with the matter said, speaking on the condition of anonymity because the investigation has not yet been resolved. [Read more: Hamburger&Goldfarb/WashingtonPost/27June2013]
CIA Cracks Down On Its Own To Stop Leaks. CIA Director John Brennan is launching a new campaign aimed at pressuring CIA officers to keep the intelligence agency's secrets secret, after a series of leaks to the media.
In a memo to the CIA workforce this week, Brennan says the "Honor the Oath," campaign is intended to "reinforce our corporate culture of secrecy" through education and training. The Associated Press obtained the memo Wednesday, marked unclassified and for official use only.
Brennan writes that the campaign stems from a review of CIA security launched last summer by former director David Petraeus, following what Brennan calls "several high-profile anonymous leaks and publications by former senior officers."
The review concluded the CIA also needs to be tougher with pre-publication review of articles or books by former employees. [Read more: Dozier/AP/26June2013]
Special Program: NSA Surveillance Leaks: Facts and Fiction. In the first major program sponsored by the newly launched Newseum Institute - a civics education initiative committed to preserving First Amendment freedoms - experts in the fields of journalism, education and national security met at the Newseum June 25 to discuss the First Amendment implications of the National Security Agency's clandestine surveillance program, also known as PRISM.
Disclosure of the clandestine surveillance program has inspired intense debate about the constitutionality of the covert government surveillance, privacy, and the era of "Big Data."
Laurel Bellows, president of the American Bar Association, introduced the program titled "NSA Surveillance Leaks: Facts and Fiction," and emphasized the importance of addressing the issue in-depth.
"As lawyers, we cannot accept sound-bite constitutionality," she said.
Harvey Rishikof, chairperson of the American Bar Association's committee on law, moderated the program. [Read more: Douglas/Newseum/25June2013]
Snowden Waits in Moscow as Asylum Rejections Pile Up. The options for former National Security Agency contractor Edward Snowden are narrowing quickly as he sits in a Moscow transit terminal and waits for responses to asylum requests sent around the globe this week.
Mr. Snowden, who leaked top-secret NSA intelligence and is wanted by the US on charges of espionage, has already been rejected by seven European countries which told him his requests for asylum were invalid, reports the BBC.
Russia told Snowden he was welcome to enter the country and stay, but that he would have to stop leaking information about the US surveillance program, The Christian Science Monitor reports. "Snowden is free to go but if he decides to stay, he has to stop his work directed to hurt our American partners. I know that this kind of statement sounds strange from me," said Russian President Vladimir Putin.
President Obama has "made clear to a number of countries that granting him asylum would carry costs," according to Reuters. Snowden has accused Obama of using "deception" and "bad tools of political aggression" to convince countries not to accept his asylum request, according to the LA Times.
Ecuador, which as of last week was viewed as the target destination for Snowden, seems to be backpedaling from early indications of support. [Read more: Eulich/ChristianScienceMonitor/2July2013]
Russia Loses $200 Million Satellites as Launch Ends in Failure. A Russian rocket carrying three navigation satellites worth around $200 million crashed shortly after lift-off from the Russian-leased Baikonur launch facility in Kazakhstan on Tuesday after its engines suddenly switched off.
The accident led to a large spill of heptyl, a highly toxic rocket propellant, but there were no reports of casualties or of any immediate threat to nearby settlements.
State-run Rossiya-24 television showed footage of the Proton-M booster rocket veering off course seconds after lift-off. It fell apart in flames in the air and crashed in a ball of fire near the launch pad.
Interfax news agency quoted an unnamed source as saying launch-pad personnel were in bunkers when the rocket lifted off.
Russia's space agency Roscosmos said the accident had been caused by the emergency switch-off of the rocket's engines 17 seconds into the flight.
Russia's state-run RIA news agency said the switch-off could have been caused by a problem with the engine or the guidance system. [Read more: Solovyov/Reuters/2July2013]
What's a Little Spying Among Friends? President Barack Obama had a simple answer to European outrage over new allegations that the U.S. spies on its allies: The Europeans do it too.
Obama said Monday during his trip to Africa that every intelligence service in Europe, Asia and elsewhere does its best to understand the world better, and that goes beyond what they read in newspapers or watch on TV. It was an attempt to blunt European reaction to new revelations from National Security Agency leaker Edward Snowden that the U.S. spies on European governments.
"If that weren't the case, then there'd be no use for an intelligence service," Obama told reporters in Tanzania.
"And I guarantee you that in European capitals, there are people who are interested in, if not what I had for breakfast, at least what my talking points might be should I end up meeting with their leaders," Obama said. "That's how intelligence services operate."
European spies have been spying on the U.S. for years, according to two former intelligence officials who spoke on the condition of anonymity because they weren't authorized to discuss espionage programs. They said such spying includes tracking senior U.S. officials to see what they are doing in countries like France and Germany, which have both complained bitterly about the EU reports. [Read more: Dozier/AP/2July2013]
S. Korea Asks U.S. to Check on Spying Claims. South Korea has asked the United States to check on recent allegations that its intelligence agency bugged the South Korean mission there, Seoul's foreign ministry said Tuesday.
The South Korean Embassy in the U.S., along with European Union missions and 37 other diplomatic missions, was allegedly targeted by the U.S. National Security Agency (NSA), which tapped their phone calls and e-mails, according to media reports based upon documents leaked by former NSA contractor Edward Snowden.
"(The South Korean government) has asked the U.S. government to check on the revealed facts via diplomatic channels," Seoul's foreign ministry spokeswoman Han Hye-jin told reporters.
"Now we are trying to verify the reports, and we will take appropriate measures if necessary," she added, without elaborating further.
While the embassy declined to comment officially on the incident, an official told Yonhap News Agency a day earlier that it "has no knowledge" about the NSA's alleged eavesdropping or other surveillance activities. [Read more: Yonhap/2July2013]
Outrage in Europe Grows Over Spying Disclosures. Damage from the disclosures of United States spying on its European and Asian allies spread on Monday, threatening negotiations on a free trade agreement, hurting President Obama's standing in Europe and raising basic questions of trust among nations that have been on friendly terms for generations.
President Fran�ois Hollande of France issued some of the harshest language yet from a European leader on the issue, telling reporters that "we cannot accept this kind of behavior between partners and allies" and suggesting that talks on the trade pact, scheduled to start next week, should be delayed at least until questions over the spying issue were resolved and confidence restored.
It was not so much the fact of the spying as its sheer scale that alarmed European leaders and others here. Elmar Brok, an outspoken German who is chairman of the European Parliament's foreign affairs committee, said that "the spying has reached dimensions that I did not think were possible for a democratic country." He said the United States had "lost all balance - George Orwell is nothing by comparison." [Read more: Erlanger/NYTimes/1July2013]
MI5 and GCHQ: Britain Facing 70 Advanced Cyber Attacks Per Month. The UK's MI5 and the Government Communications Headquarters (GCHQ) have revealed that according to their information-gathering activities, Britain faces around 70 sophisticated cyber-espionage operations per month against its government and industry networks.
Sir Iain Lobban, GCHQ director, told the BBC that secrets are being stolen on an "industrial scale" with the main purpose being to steal intellectual property for national gain - indicating that foreign governments are the threat actors rather than individual hackers.
He added that it's not just government and military secrets at risk. "We started a couple of years ago thinking this was going to be very much about the defense sector but really it's any intellectual property that can be harvested."
"Everyone is equally a target, and governments, NGOs and commercial organizations need to recognize that this trend is rapidly becoming the new norm," said Jarno Limn�ll, doctor in military science and director of cyber-security for Stonesoft, in an emailed statement. [Read more: Infosecurity/2July2013]
Section II - CONTEXT & PRECEDENCE
The Least Likely Spy. The morning light was just breaking over Washington, D.C. At the White House, the early cleaning shift was already on the job. As Avril Haines walked through the quiet, darkened halls, she smiled and waved to a worker pushing a polishing machine, buffing the marble floors. It was 5:30 a.m. in mid-May and Haynes was leaving work. She would return by 7, after a shower and change of clothes at her Capitol Hill home - and after picking up her habitual iced grande whole milk latte at the local Starbucks, where the baristas are on a first-name basis with her.
The past few weeks had been a grueling run for Haines, the top lawyer for the National Security Council. On this morning, she was laboring over the "playbook," President Obama's massively complex and bureaucratically contentious effort to reform the administration's lethal drone program. But the truth is, it was only a slight departure from Haines's typically relentless work routine. Since becoming the National Security Council's legal adviser in 2011, she had been working on a wide array of highly complicated and legally sensitive issues - generally until 1 or 2 in the morning, sometimes later - that go to the core of U.S. security interests. Among them were the legal requirements governing U.S. intervention in Syria and the range of highly classified options for thwarting Iran's nuclear program. All the while, Haines was sometimes summoned in the middle of the night to weigh in on whether a suspected terrorist could be lawfully incinerated by a drone strike.
Earlier this month, Obama selected Haines to be deputy director of the CIA, where she will serve under the new CIA director, John Brennan. In some respects, picking Haines made a lot of sense, given her national-security credentials and her well-known work ethic. But in another respect, it was a surprising choice. Ask around about Haines, and colleagues will often describe some character traits not usually associated with the CIA - or, for that matter, with rapid ascent inside the Beltway: a sweet personality, humility bordering on shyness, a deep empathy for others. "She may quite literally be the nicest person any of us have ever met," says Deputy National Security Adviser Benjamin Rhodes, who has worked closely with Haines.
There are plenty of jaded intelligence hands who see nothing but trouble ahead for Haines. Even some of her colleagues advised against taking the job. And Haines herself raised questions - at first - about whether the post was a good fit, before Obama coaxed her into taking it. [Read more: Klaidman/Newsweek/26June2013]
Declassified Gov't Report Details Decades of NSA Computer Spying. The clandestine National Security Agency is partly responsible for the modern PC era, a newly declassified document reveals, thanks to decades of custom computers built for one thing: espionage.
Declassified by the NSA on May 29 and posted online on Monday, the 344-page report "It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis, 1930s - 1960s," details the unknown high-tech history of computers so secretive even their code names were kept confidential.
It's a never-before seen history of code-breaking, spying and its role in the birth of the computer.
"NSA has arguably been the largest single user of advanced computing machines in the world," reads the introduction to the report, written by Colin Burke, former scholar-in-residence at the NSA and recently retired professor of history at the University of Maryland, Baltimore County. "[The NSA's] computer purchases and its research and development contracts helped establish America as the world's leading computer manufacturer."
They have names like Mercury, Rattler, Madame X, MAGIC Atlas and Abner, and some of the early machines have never been mentioned before. [Read more: Kaplan/FoxNews/26June2013]
Lights, Camera, Leaks! Watch Edward Snowden: The Movie. While Hong Kong residents spent two weeks obsessing over the whereabouts of Edward Snowden as he remained holed up in the city, a group of young filmmakers saw opportunity.
Working at lightning speed, four friends produced a short movie based on the National Security Agency leaker's time in the city and the scramble to locate him.
The result is "Verax," a five-minute film that imagines what might have happened as the CIA, China's Ministry of State Security, and a Hong Kong reporter tried to track down Mr. Snowden, who declared on June 9 that he was the source of leaked documents disclosing sensitive details about the NSA's surveillance programs.
The film, which gets its title from the codename Mr. Snowden used for himself, has gotten more than 5,000 views since it was posted on YouTube on Tuesday - two days after he departed Hong Kong on a flight to Moscow. [Read more: WallStreetJournal/1July2013]
Can DIA Become the Defense Innovation
Agency? "Innovation" is pretty big as far as government buzzwords go. Often found hand-in-hand with "doing more with less," the idea of innovation is one that seems to excite leaders and frequently surfaces in briefings and talking points.
But what is actually getting done? Who is really out there taking innovation for a spin?
The intelligence community might not immediately seem like the leader, but if the Defense Intelligence Agency has anything to say about it, it is in the driver's seat.
"The agency was established to understand the plans of the adversary. In the process of that, we became an organization that focuses on planning," said Dan Doney, DIA's chief innovation officer. "Planning and sticking to the plan are the opposite of innovation. Innovation is deviating from the plan, rapidly moving it and changing. When it comes to innovation, we haven't had a great reputation. Put that in the past."
Today, DIA is moving forward with what officials call an entirely new approach -- one that eradicates traditional silos, aggressively seeks outside input and quickly implements new ideas. The objective is to avoid strategic surprise and push forward with a new way of conducting the government's intelligence business after more than a decade of war. [Read more: Corrin/FCW/1July2013]
Section III - COMMENTARY
Espionage? Moi? If you buy the latest reporting out of Europe, France is outraged, simply outraged, at news that the National Security Agency has been eavesdropping on the European Union through its mission in New York and embassy in Washington. French political parties are now rumbling about offering asylum to Edward Snowden, the former NSA contractor at the center of the leaks. The French government is demanding answers from the United States about its snooping. Monsieur Le Pr�sident himself, Fran�ois Hollande, is calling for an end to the spying.
All of which is pretty hilarious, given France's penchant for stealing American defense technology, bugging American business executives and generally annoying U.S. counterintelligence officials. If you've been paying attention, you know that France is a proficient, notorious and unrepentant economic spy. "In economics, we are competitors, not allies," Pierre Marion, the former director of France's equivalent of the CIA, once said. "America has the most technical information of relevance. It is easily accessible. So naturally your country will receive the most attention from the intelligence services."
It's thus tempting to toss aside France's protests as rank and witting hypocrisy over economic espionage, which of course they are. But the leaks about the NSA collection of economic information and the difficulty in explaining the differences in how it's used on the opposite sides of the Atlantic spell trouble for American cyberdiplomacy around the world.
Lest you doubt that France has dirty hands in corporate spying, there's a long, storied and public bill of particulars against La R�publique Fran�aise's intelligence agencies. [Read more: Rawnsley/ForeignPolicy/1July2013]
NSA Secrets Revealed - in 1960. The young man was employed by the National Security Agency for only a couple of years before feeling shocked at its intrusions into other countries' affairs and even private mail addressed to U.S. citizens. He was also disgusted at the contrast between the idealistic language of the president, serving his second term, and the behavior of the government he headed.
The young man talked repeatedly with a close friend who also worked at the NSA. The two tried informing a member of Congress of the agency's activities. But the representative - Wayne Hays (D-Ohio) - did not expose what they told him. So the two devised a plan to publicize what they considered the extraordinarily hypocritical actions of the government. They would travel secretly to a country where no extradition agreements could affect them and tell the press what the NSA had done.
It was the summer of 1960, and 29-year-old William Martin and 31-year-old Bernon Mitchell told their bosses they were going on a three-week vacation. On June 25, they took a cab from their homes near NSA headquarters in Maryland to National Airport, discussing chess during the ride. They flew to New Orleans and then Mexico City before making their way to Cuba and then - by way of a long boat ride - to the Soviet Union.
A month later, NSA officials obtained a warrant to open a safe-deposit box rented by Mitchell and learned of the defection. In August, the government announced that two mathematicians working for the NSA had defected but played down the significance. But on Sept. 6, 1960, the two walked into the elaborately gilded Soviet Journalists Union headquarters in Moscow and faced an audience of reporters from around the world, including the United States. [Read more: Barrett/WashingtonPost/21June2013]
The Danger Of What Edward Snowden Has Not Revealed. Since fleeing the United States, National Security Agency leaker Edward Snowden has publicly disclosed top-secret information that has aided America's enemies and damaged relations with America's allies.
But the real danger may be the classified information he has not publicly disclosed.
Snowden's revelations have been damaging to be sure. He has exposed details of U.S. intelligence collection efforts against China, including the fact that the NSA had infiltrated the computer networks of Tsinghua University in Beijing, which houses one of China's six major backbone networks through which Internet data for millions of Chinese citizens pass. He has exposed our intelligence collection efforts on our allies, including the fact that the United States bugged the offices of the European Union and infiltrated its internal computer networks. He has revealed to a German newsmagazine that the NSA has been using data from Internet hubs in south and west Germany to monitor Internet traffic to Syria and Mali - two hotbeds of al-Qaeda activity - tipping off our enemies to these vital U.S. intelligence operations.
Of course, this is all in addition to broader leaks about details of two NSA spying programs - revelations that, according to the Associated Press, have U.S. intelligence agencies "scrambling to salvage their surveillance of al-Qaida and other terrorists who are working frantically to change how they communicate."
But for U.S. intelligence officials, the far bigger concern is what foreign intelligence services are learning from Snowden that has not made the front pages of the world's newspapers. [Read More: Thiessen/WashingtonPost/1July2013]
Edward Snowden's Misplaced Idealism. Journalists have a professional commitment to the idea that more debate is better, so we instinctively side with leakers. But I'm skeptical about some of the claims of Edward Snowden, the young National Security Agency contractor who leaked secrets about that agency's surveillance programs to The Post and The Guardian.
Snowden has described his actions in idealistic terms. "I'm willing to sacrifice .... because I can't in good conscience allow the U.S. government to destroy privacy, Internet freedom and basic liberties," he said in an interview with the Guardian. But it's hard for me to see him as a hero.
What worries me is that Snowden is challenging the rule of law. The NSA Internet surveillance program he decided to reveal is legal, in the sense that it was passed by both houses of Congress and is reviewed regularly by the intelligence committees. It is overseen by judges who sit on the Foreign Intelligence Surveillance Court. In 2008, that court ruled against a company that challenged the law.
Perhaps Snowden would argue that Congress and the courts �haven't been aggressive or diligent enough in their oversight, and that the NSA has dangerously misused its surveillance authority. Or maybe he would argue that he's answering to a higher moral code, or that Congress and the courts are wrongly interpreting the Constitution. These claims will be tested in the coming debate, but we should be wary about endorsing any contention that it's okay to violate laws because you're acting on higher authority.
Snowden's case is similar to that of CIA dissident Philip Agee. [Read more: Ignatius/WashingtonPost/12June2013]
Where Are The Spies? The news is full of details of previously undisclosed National Security Agency (NSA) programs intended to monitor cellular and internet-based communications within the United States. Considerable angst has been expressed by politicians, on both sides of the aisle, regarding the scope of the eavesdropping. I share the concerns. We have a Fourth Amendment for a reason. Simply trusting the government to always act in good faith is not an option. Our Founding Fathers understood that all too well from personal experience.
I have another concern as well.
All of these programs are justified in terms of national security. All of them are characterized as essential. We are told that without programs of this type we would go "blind", that our citizens would be put at risk, that we would leave ourselves open to future attacks on the scale of 9/11. The choice, we are told, is clear. Either accept this invasion of privacy or accept the resulting loss of life.
Why are we so dependent on signals intelligence obtained by the NSA to tell us what terrorist networks are plotting?
Why do we need signals intelligence to identify individuals in our midst who wish us harm?
Where are the spies? Where is our human intelligence? [Read more: Faddis/AND/14June2013]
Dishonor in High Places: Sandbagging the Intelligence Chief - Again. On March 12 of this year, Senator Ron Wyden asked James Clapper, the director of national intelligence, whether the National Security Agency gathers "any type of data at all on millions or hundreds of millions of Americans."
"No, sir," replied the director, visibly annoyed. "Not wittingly."
Wyden is a member of the Senate Select Committee on Intelligence and had long known about the court-approved metadata program that has since become public knowledge. He knew Clapper's answer was incorrect. But Wyden, like Clapper, was also under an oath not to divulge the story. In posing this question, he knew Clapper would have to breach his oath of secrecy, lie, prevaricate, or decline to reply except in executive session - a tactic that would implicitly have divulged the secret. The committee chairman, Senator Diane Feinstein, may have known what Wyden had in mind. In opening the hearing she reminded senators it would be followed by a closed session and said, "I'll ask that members refrain from asking questions here that have classified answers." Not dissuaded, Wyden sandbagged the director.
This was a vicious tactic, regardless of what you think of the later Snowden disclosures. Wyden learned nothing, the public learned nothing, and an honest and unusually forthright public servant has had his credibility trashed. Unfortunately the tactic has a pedigree, but for that, we've got to wind the clock back forty years. [Read more: Brenner/Lawfare/2July2013]
Section IV - Jobs, Books, and Coming Events
[IMPORTANT: AFIO does not "vet" or endorse these research inquiries or job offers. Reasonable-sounding inquiries and career offerings are published as a service to our members, and for researchers, educators, and subscribers. You are urged to exercise your usual caution and good judgment when responding or supplying any information.]
Attention Security-Cleared Professionals! Interview for your new career at TECHEXPO Top Secret's July events.
TECHEXPO Top Secret is YOUR solution for connecting with the
Nation's leading defense companies!
Opportunities are available in Information Technology, Cyber Security, Engineering, Aerospace, Telecom,
Project Management, Intelligence, Operations, Homeland Security, Research & much more.
Tuesday, July 16 • 10am - 3pm
BWI Marriott, 1743 West Nursery Road, Linthicum Heights, MD 21090
ACTIVE SECURITY CLEARANCE REQUIRED
Wednesday, July 17 • 10am - 3pm
Sheraton Reston Hotel, 11810 Sunrise Valley Drive, Reston, VA 20191
ACTIVE SECURITY CLEARANCE REQUIRED
Register for each event and for details visit: www.TechExpoUSA.com Please forward this invitation to your Security-Cleared colleagues & friends.
Admission: Any level of Active Security Clearance issued by the US Federal Government or Military is REQUIRED to attend (or clearance last used within past 24 months.)
Walsingham Group is seeking two Counterintelligence Analyst for immediate positions in Afghanistan.
Walsingham Group is seeking Counterintelligence Analyst candidates for immediate positions in Afghanistan. Please submit your resume through the www.walsinghamgroup.com careers portal. You may also e-mail inquiries to email@example.com.
Counterintelligence Analyst Supports a CI/HUMINT or intelligence analytical team of military and/or DoD civilian analysts in support of CJ2X and CJ2 analytical requirements. Provides analysis of Intelligence Information Reports (IIR)s/HUMINT Reports (HR)s and CI INTREPs, provides feedback and IIR/HR and CI INTREP evaluations, source directed requirements (SDR)s, time sensitive collection requirements (TSCR)s, ad-hoc collection requirements (AHCR)s, and supports source validation. Conducts analysis of source reliability and report credibility, and communicates the analysis to the collector in support of the source validation process. The counterintelligence Analyst provides CI analysis and assessments in support of HUMINT source validation. This position is mid level analyst. The Counterintelligence Analyst is responsible for researching, developing and presenting CI/HUMINT and all-source intelligence products at the tactical, operational and strategic level as part of an overall analytical team. The Counterintelligence Analyst is also responsible for counterintelligence and or intelligence analysis related to counter-terrorism, HUMINT, SIGINT, counterintelligence, force protection, Afghanistan and South West Asia regional issues, political/military analysis and support to targeting. Minimum Qualifications • This position requires a minimum of 4 years analytical experience within DoD or equivalent Government agencies required, with Counterintelligence experience preferred. Experience in either CT, Afghanistan/South West Asia regional issues, HUMINT, CI or military analysis is desired. • This position requires Associate's Degree, a Bachelor's Degree preferred. • The contractor shall be proficient in utilizing basic computer applications and intelligence related automation to support analytical efforts and product development. • The contractor shall possess strong research and writing skills and be capable of effectively operating as a member of a strategic level analytical team in the accomplishment of assessments of sources and their reporting through the corroboration of source reporting, analytic feedback, quality assurance and the development of counterintelligence and intelligence products and assessments. • This position requires former 35L, 97G,or equivalent. • This position requires Top Secret/SCI clearance.
Art of Intelligence: Rainy Street Stories. Having created a section of the SoHo Journal many years ago that fosters an appreciation for the creative talent of current and former American intelligence professionals, we were recently offered a new book to review. On our Art of Intelligence commentary we have displayed paintings, described novels and published poetry by those who have fought the secret wars for our country. Often, (as is described in The Book of Honor by Ted Gup) those who have served are neither publicly acknowledged nor identified after having made the ultimate sacrifice. Only a star is affixed in place of a name.
Along this road of discovery, which provided entertainment, appreciation and pathos for the writer and the readers, we met an Army Intelligence Officer of particular talent - John W. Davis. He offered poetry, essays, observations and support for our publication in the mission which we were intent on undertaking. This officer, now retired after 40 years of service to our country, has just completed a book of poetry, essays and remembrances that give us, the readers, a glimpse of the secret world of espionage war.
John Davis, recently retired from Army Intelligence, provides us with the conundrum of America in the current world of terrorism and hidden wars. How do we maintain our freedoms as we change and adapt to the new realities of engagement? While he gives us some answers, he describes the choices that we must make through analogies that clearly make the decision much easier. [Read more: MacPherson/SoHoJournal/25June2013]
Coming Educational Events
EDUCATIONAL EVENTS IN COMING TWO MONTHS....
MANY Spy Museum Events in 2013 with full details are listed on the AFIO Website at www.afio.com. The titles for some of these are in detail below and online.
7-10 July 2013 - Dungarvan, Ireland - 3rd Annual Global Intelligence Forum - "Preparing Intelligence Analysts for the 21st Century" - Hosted by Mercyhurst University
Join us in Dungarvan, Ireland for a very special worldwide gathering
of intelligence professionals, academics and decision makers.
Preparing Intelligence Analysts for the 21st Century is the theme of the conference. The Global Forum continues down the path of intelligence innovation and discovery we embarked on in July 2010. Then, we began by exploring the nature of analysis and its application in various intelligence professions. Later, in 2011, we discussed the interaction between the intelligence analyst/practitioner and the decision-maker. In July 2013 we hope to continue to build bridges between practitioners and scholars within intelligence related professions, and discuss emerging 21st century intelligence best practices.
This year's forum will center on the greater shift the intelligence analysis field must make to account for a changing world. Panelists and contributors from the national security, law enforcement, business and academic communities will discuss the emerging trends and the necessary steps intelligence practitioners must take to address 21st century problems.
View the agenda here, check out our current speaker list, view the website, and most importantly REGISTER here to join us!
NOTE NEW LOCATION - 10 July 2013, 10 am - Laurel, MD - The National Cryptologic Museum Foundation Summer Program features Dr. Melvin Goodman discussing "National Insecurity"
Dr. Melvin A. Goodman, former senior CIA analyst, author and senior fellow at the Center for International Policy [currently serving as an adjunct professor of government at Johns Hopkins University] will be discussing his latest book, National Insecurity: The Cost of American Militarism. Goodman gained an exceptional knowledge of national security while serving under every Administration from Johnson to Bush, Sr. Mr. Goodman decries that the Government's persistent misdirection of power stems from its dependency on the military-industrial complex. He believes that allowing the military to dominate national security is both exorbitant and ineffective in results. He offers a prescription for curbing the costs, calling for diplomacy as a better tool for dealing with foreign policy issues such as North Korea, Iran, and Syria. In his book he contends, "The United States must abandon its notion of 'exceptionalism' which has led this country to gratuitously deploy military forces overseas to advance U.S. values." Mr. Goodman is an exciting, provocative speaker with strong views and thoughts on the last two Administrations' handling of major crisis areas challenging the U.S. These will be vexing issues for some that will more than likely lead to a lively Q&A session. We hope you can join us for this exciting program. A book signing and lunch will follow the presentation.
The Program fees are $40 which includes lunch and a year's membership in the Foundation. You may register and pay online at www.cryptologicfoundation.org. Or make your check payable to NCMF and return by 30 June to NCMF,
PO Box 1682,
Fort George G Meade, MD 20755-3682.Questions? Contact firstname.lastname@example.org.
NEW Location: the program will be held at the Patuxent Greens Country Club, 14415 Greenview Dr, Laurel, MD 20708, (301) 776-5533. Location and Directions are here: http://goo.gl/maps/zeBw1
Wednesday, 10 July 2013, noon-1:15 p.m. - Washington, DC - Global Terrorism, Espionage, and Cyber Security monthly update by David Major
Presented in partnership with the CI Centre, these monthly briefings will provide you with the opportunity to be the first to learn of the most current worldwide happenings in the field of intelligence and terrorism. Drawn from the Centre's SPYPEDIA®, the most comprehensive source of espionage information in the world, each Update will cover important events and information which may not be reported by mainstream media outlets. Such as: espionage penetrations and arrests, cyber espionage reporting, and terrorist events. Briefings led by CI Centre founder David Major will include trend analysis and coverage of new emerging issues of value to the intelligence and security professional and individuals with an interest in national security matters. Major will also highlight and review, as appropriate, new books and reports to keep you current with breaking developments in the national security arena.
For more information please visit or RSVP to Meaghan.Smith@cicentre.com or call (240) 281-1627.
Thursday, 11 July 2013, 11:30 am - Colorado Springs, CO - The Rocky Mountain Chapter presents Don Shannon, FBI Supervisory Special Agent In Charge of Southern Colorado Joint Terrorism Task Force.
The AFIO Rocky Mountain Chapter presents Don Shannon, FBI Supervisory Special Agent In Charge of Southern Colorado Joint Terrorism Task Force. SSA Don Shannon will talk on his trip to Thailand. This event will take place a week before normal meetings to allow for scheduling issues again... 11 July 13. To be held at The Inn at Palmer Divide, 443 S. Highway 105 Palmer Lake, CO, Exit 161 westbound off I-25, West on Highway 105. Please RSVP to Tom VanWormer at email@example.com
Tuesday 16 July 2013, 8:30 am to 4
pm EDT - Virginia Beach, VA - Combating Corporate Espionage, a Cyber
Counterespionage Event Comes to Virginia
Businesses today are in real danger of espionage, both technical and physical, and knowing how to protect against these dangers could make all the difference. SpearTip, LLC, a cyber counterespionage and counterintelligence firm, is sponsoring this event alongside CI Centre and ComSec, LLC on Tuesday, July 16, 2013 in Virginia Beach, VA. "Combating Corporate Espionage" Protecting Your Organization From "Spies, Hacks & Taps" is a chance to participate with like-minded counterintelligence experts as they share ways to help protect organizations from foreign and domestic, corporate, cyber, and electronic espionage attacks. The event starts at 8:30 a.m. and ends at 4:00 p.m. EDT.
Jarrett Kolthoff, President / CEO of SpearTip, LLC has 20 years of experience in the Information Security field. As a former Special Agent - U.S. Army Counterintelligence, he has experience in cyber investigations, counterintelligence, and Fusion Cell analysis that assist SpearTip�s clients to identify, assess, neutralize, and exploit threats leveled against their corporation. His civil casework includes investigations in anti-trust lawsuits, embezzlement, collusion, theft of intellectual property, and corporate espionage. He has testified in civil cases as an expert computer forensic witness in depositions in U.S. Federal Court - Eastern District of Missouri and has acted as a liaison between companies and law enforcement agencies. Jarrett led assignments throughout the United States with both national and international corporations. He continues to serve his community as an Adjunct Professor at Webster University, and through membership with the Association of Former Intelligence Officers (AFIO), Espionage Research Institute International (ERII), and board membership as past-President of the St. Louis InfraGard Chapter and the St. Louis Chapter of the International High Technology Crime Investigation Association (HTCIA).
David G. Major, President of CI Centre, is a retired Senior FBI Supervisory Special Agent. David�s skills and abilities propelled him to being named as the first FBI official assigned to the National Security Council. He served as the Director, Intelligence and Counterintelligence Programs in 1985 and 1986, and briefed and advised President Reagan on counterintelligence matters. He worked with the FBI in counterintelligence and counterterrorism for 24 years and for over 38 years David has been a student, practitioner, and lecturer on CI and CT. David Major has made a life-long commitment to the practice and study of counterintelligence and its subset, counterterrorism, making him one of the nation's top experts on the subject. His views and advice are sought out by the government, private companies, and national and international media.
J.D. LeaSure, President / CEO, of ComSec, LLC has over 24 years of experience in counterintelligence operations ranging from both HUMINT and Technical Surveillance Countermeasures (TSCM) in both governmental and private sectors. J.D. is one of the few U.S. practitioners who maintains the internationally recognized Certified Counterespionage Information Security Management Certification (CCISM). J.D. also leads SpearTip�s Cyber TSCM, counterintelligence, and counterespionage consulting services. J.D. possesses extensive training, knowledge, and experience in the identification of eavesdropping devices, espionage detection methods and the intelligence collection tactics most often employed by global perpetrators of electronic espionage. He has traveled the globe to provide counterespionage advisory services to businesses, corporate counsels, chief executives, government agencies, non-profit organizations, celebrities, and high net worth clients. He continues to serve his country as the Director of Espionage Research Institute International (ERII).
Registration for the seminar costs $45. This includes access to all presentations, question and answer sessions, and a networking lunch. Click here for more information and to register for the seminar. http://events.r20.constantcontact.com/register/event?llr=94diz6jab&oeidk=a07e7iogqgd966939dd&oseq=
16 July 2013, 11:30am - 2 pm - McLean, VA - "Counter Surveillance: Keeping Your Secrets Your Own" by Jeffrey Berkey at DIAA Forum
Mr. Jeffrey Alan Berkey will speak on "Counter surveillance: Keeping
Your Secrets Your Own." This presentation will discuss how tools often
associated with securing our personal safety can also be used by
individuals for nefarious purposes. This discussion will consider the
range of the surveillance threat and tools used to provide counter
surveillance and privacy protection. This needed protection is obtained
by considering the following: The Environment, The Surveillance
Consciousness, Counter surveillance Resources, and Recognized
Objectives. He will bring some devices and provide handouts to provide a
clearer understanding of this threat.
He is a Human Resources Manager for Professional Maintenance of Indiana which works in conjunction with American Sound Masking. These companies provide commercial and industrial sound reduction devices for business applications and distribute Electronic Surveillance Countermeasures devices for the U.S. Department of Defense, Homeland Security and U.S. Embassies Worldwide. Mr. Berkey received a B.A. degree from Bob Jones University and is enrolled in an MBA program at the University of Indianapolis.
Make reservations by 15 July 2013 by email to firstname.lastname@example.org. Include names, telephone numbers, and email addresses. For each attendee, choose among chicken cacciatore, tilapia puttanesca, lasagna, sausage with peppers, or fettuccini with portabella for their luncheon selection.
Event location: Pulcinella Restaurant, 6852 Old Dominion Drive, McLean, VA. Pay at the door with a check for $29.00 payable to DIAA, Inc.
Registration starts at 11:30 AM, lunch at 12:00 PM. Pay at the door with a check for $29.00 per person, payable to DIAA, Inc. Check is preferred, but will accept cash; however. Credit card payment are discouraged.
25 July 2013, 12:30 - 2:30pm - Los Angeles, CA - David Glazier speaks on "Drones, Targeted Killing, and the Law" at AFIO LA Chapter
The Los Angeles Chapter of AFIO will host an open forum discussion on the use of Drones & Target Assessment in the 21st Century battlefield. David Glazier will provide a legal overview analysis of the use of drones with a counterpoint view provided by an individual from the IC known to the chapter as ‘Coop’.”
Location: LAPD ARTC 5651 W Manchester Ave, Los Angeles, CA 90045
Please RSVP for attendance: AFIO_LA@yahoo.com
25-26 July 2013 - Fairfax, VA - Workshop on Terrorism Analysis at George Mason University
FAS Senior Fellow on State and Non-State Threats Mr. Charles Blair
will be hosting a workshop at George Mason University in Fairfax,
Virginia, titled Terrorism Analysis: Quantitative and Qualitative
Research Methodologies and Tools on July 25-26, 2013.
This non-credit course introduces participants to a variety of quantitative and qualitative methodologies for the study of terrorism and learn how to create and utilize analytical tools for preventing, preparing for, responding to, or predicting terrorism.
DEADLINE EXTENDED! Early Bird Rate- register by July 15, 2013: $600.00
1 Continuing Ed Units awarded
If you are interested, please sign up as soon as possible. For more information or to register online, visit the course's page. Direct any questions about the course to Charles P. Blair at email@example.com
For more information on the workshop and to register, click here
26 July 2013 - Washington, DC - Commencement Speaker at National Intelligence University's Graduation Ceremony is James R. Clapper, Jr., Director of National Intelligence
The Honorable James R. Clapper, Director of National Intelligence
(DNI) will deliver the commencement address to National Intelligence
University graduates on Friday, July 26, 2013. The commencement is the
closing event in the University's 50th Anniversary year and
coincidentally marks the 50th anniversary of Director Clapper's
intelligence career: he was first commissioned as an Air Force
intelligence officer in 1963.
NIU President Dr. David Ellison expects to present diplomas to approximately 250 graduating students from around the Intelligence Community as they cross the stage to receive one of the University's three degrees: Master of Science of Strategic Intelligence, Master of Science and Technology Intelligence, or Bachelor of Science in Intelligence.
The National Intelligence University is a federal degree-granting institution whose main campus is located in Washington, DC. Its alumni are past, present and future leaders in the intelligence and national security communities and in the private sector. Notable alumni include a former Director of National Intelligence; former directors of DIA, CIA, NSA, and NGA; former heads of military intelligence and a growing number of senior government executives and corporate leaders. For more information, visit www.ni-u.edu
Saturday, 3 August 2013, 11:30 am - Melbourne, FL - "When Clerics Say Kill" the topic at the AFIO Satellite Chapter Meeting
The topic will be "When Clerics Say Kill" and the speaker will be Don White.
He asks: How do devout, intelligent, educated, religious leaders drift
from their core beliefs to the point of ordering the deaths of innocent
people? What do they look for in recruiting a suicide bomber? Could it
happen here in America in significant numbers?
Meeting being held at: the Indian River Colony Club's At Ease Club, starting at 11:30 AM. Questions or to register contact Bobbie Keith, 321 777 5561 or email her at firstname.lastname@example.org
19 - 21 August 2013 - Long Beach, CA - Maritime Security 2013 West - "Technology and Strategies to Mitigate Security Threats to the Maritime Domain"
Captain James D. Jenkins, Sector Commander, U.S. Coast Guard Sector Los Angeles - Long Beach, to give opening keynote address on August 20th.
SEE NEWLY REVISED AND MORE DETAILED AGENDA
Maritime Security 2013 West will bring together public and private stakeholders from all levels to discuss, learn and collaborate on strategies and technology use in mitigating security threats posed to the maritime domain.
The panel sessions and presentations are designed to give all participants the actionable knowledge on how to better secure their maritime areas of responsibility by highlighting available resources and best practices. Each topic will be comprehensively addressed with the critical perspectives of those who have implemented successful strategies and cutting-edge technologies in their maritime security operations.
DHS Science & Technology, Maritime Security Division in cooperation with SRI International presents the Maritime Security Technology Program (MSTP) Coastal Surveillance System (CSS). Built on an innovative open source platform, the CSS allows stakeholders at all levels to have access to critical data and information. From AIS and radar feeds to cameras and sensors, the CSS allows real time information sharing in an unclassified setting anytime, anywhere. By integrating highly robust naval sensors and data fusion capabilities, the MSTP provides the most comprehensive maritime domain awareness available and will set a new standard for maritime information sharing.
The demonstrations conducted in small groups of 20 or less will allow government entities to learn about the most cost effective and robust system to assist them in their information sharing needs. For solutions providers, this demonstration allows them to understand the immense opportunity for them to integrate their data into the system and potentially partner with DHS S&T in the deployment of the system.
Please read the following article by Thomas Tomaiko that will give great insight into the program and it's objectives: "Reality Check: Balancing the Need to Enhance Maritime Security While Maximizing Legitimate Use of the Maritime Domain"
- All access registration rates range from $95 to $445
- Discounts available for Maritime Security East and Small Vessel Security Threats Program attendees and NASBLA Members
- Please click here for Registration information or call us at 203-221-2664 or email us at email@example.com
Friday, 23 August 2013, 10:30 am - 2 pm - Tysons Corner, VA - Letitia Long, Director, National Geospatial-Intelligence Agency, and Luke Bencie on Counterespionage for Travelers.
AFIO National Summer Luncheon features Letitia Long, the Director of the National Geospatial-Intelligence Agency, and Luke Bencie, author of AMONG ENEMIES: Counter-Espionage for the Business Traveler.
Anywhere the warfighter has to be... Any decision the policymaker has to make... Any mission the intelligence community has to accomplish... Any disaster that responders have to overcome... NGA is there to Know the Earth… Show the Way… Understand the World.
The National Geospatial-Intelligence Agency (NGA) delivers geospatial intelligence to policymakers, warfighters, intelligence professionals, and first responders. NGA is a unique combination of intelligence agency and combat support agency. Anyone who sails a U.S. ship, flies a U.S. aircraft, makes national policy decisions, fights wars, locates targets, responds to natural disasters, or even navigates with a cellphone relies on NGA. NGA enables all of these through timely, relevant, accurate and actionable GEOINT. NGA manages a global consortium of more than 400 commercial and government relationships. Director Long serves as the functional manager for GEOINT, the head of the National System for Geospatial Intelligence (NSG), and the coordinator of the global Allied System for Geospatial Intelligence (ASG). In these multiple roles, NGA receives guidance and oversight from DOD, the Director of National Intelligence (DNI), and Congress. Headquartered in Springfield, Virginia, NGA has two major locations in St. Louis and Arnold, Mo. Hundreds of NGA employees serve on support teams at U.S. military, diplomatic, and allied locations around the world.
Check-in for badge pickup at 10:30 a.m. Luke Bencie begins his presentation at 11 a.m. Lunch served at noon, NGA Director Long begins her presentation at 1 pm. Morning and Afternoon programs are On The Record The latest intelligence books, and many others, for sale throughout event. Event closes at 2 p.m.
EVENT LOCATION: The Crowne Plaza, 1960 Chain Bridge Road • McLean, Virginia 22102; Driving directions here or use this link: http://tinyurl.com/boey9vf
Monday, 16 September 2013, 5:30 - 8 pm - New York, NY - "Putin's Russia" featuring KGB Maj Gen Oleg D. Kalugin, addressing AFIO NY Metro Chapter
Gen. Kalugin was one of the youngest generals in the history of the KGB, and his intelligence career spanned the better part of the Cold War. As deputy resident at the Soviet embassy in Washington, DC, he oversaw Moscow's spy network in the United States, and as head of KGB foreign counter-intelligence, he directed several Soviet covert actions against the West. In his memoirs, Spymaster, KGB Major General Oleg Kalugin (Ret.) provided an unparalleled look at the inner workings of Moscow's famed spy agency. Join Kalugin to hear firsthand of his assessment of how Russia and its intelligence organs have fared under Russian president Vladimir Putin, including the death of Russian intelligence defector Alexander Litvinenko in London in 2006, up to the present quandary dealing with the Edward Snowden leaker affair.
Location: Society of Illustrators Building 128 East 63rd Street (between Park Ave and Lexington Avenue).
Times: Registration starts at 5:30 PM with 6 PM meeting start.
Fee: $50/pp - advanced registration required at firstname.lastname@example.org or call 646-717-3776.
For Additional Events two+ months or greater....view our online Calendar of Events
Disclaimers and Removal Instructions
Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers.
REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs:
a) IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list. If this link doesn't open a blank email, create one on your own and send to email@example.com with the words: REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.
b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to firstname.lastname@example.org the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.
CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at email@example.com. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm
WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor(s) or author(s) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!
(c) 2000, 2012, 2013, Please note AFIO's new address: AFIO, 7700 Leesburg Pike Suite 324, Falls Church, Virginia 22043. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: firstname.lastname@example.org
Click here to return to top.