AFIO Weekly Intelligence Notes #34-13 dated 3 September 2013

[Editors' Note: The WIN editors attempt to include a wide range of articles and commentary in the Weekly Notes to inform and educate our readers. However, the views expressed in the articles are purely those of the authors, and in no way reflect support or endorsement from the WIN editors or the AFIO officers and staff. We welcome comments from the WIN readers on any and all articles and commentary.]
If you are having difficulties with the links or viewing this newsletter when it arrives by email, members may view the latest edition each week at this link: https://www.afio.com/pages/currentwin.htm You will need your LOGIN NAME and your PASSWORD.
REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs, click here.

CONTENTS

Section I - INTELLIGENCE HIGHLIGHTS

Section II - CONTEXT & PRECEDENCE

Section III - COMMENTARY

Section IV - Career Fairs, Obituaries, and Coming Events

Careers

Obituaries

Coming Educational Events

Current Calendar for Next Two Months ONLY

 

Starting Wednesdays, 04 September - 25 September 2013
10:15 a.m. - 11:45 a.m.

The International Spy Museum 4-session Daytime Course Begins

James Bond: Fact Into Fiction (and Back)

No one has introduced more people to the secret realm of espionage than James Bond. The man we know as 007 has been the face of clandestine operations for more than half a century, giving readers and movie audiences glimpses of a hidden world few are able to imagine.
Bond and his onscreen exploits represent fiction informed by some truth - some of it drawn from author Ian Fleming's own experiences in covert operations as a WWII British naval intelligence officer. In books and onscreen, the ablest agent of British secret intelligence service MI6 faces threats - from Cold War cliffhangers in the Caribbean to mass-media manipulation in the 1990s - that seemed fantastic at the time, but occasionally foreshadowed future headlines.
In Bond's flamboyant adventures, he deploys techniques and technologies that genuine spies use - or perhaps will, should fact catch up with cinematic imagination. His onscreen gadgets are said to have inspired innovations in disguise and communications technologies by real intelligence agency technical services units.

In this series, experts and former intelligence officers explore the intersecting powers of James Bond in fiction and fact, presented in conjunction with the International Spy Museum's continuing exhibition Exquisitely Evil: 50 Years of Bond Villains. They place Bond and his nemeses in historical context, exploring how the evildoers and their plots have changed to reflect their times. (The series price includes a ticket to tour Exquisitely Evil.) More information is here or visit www.spymuseum.org


The Central Intelligence Agency
and Smith College Invite AFIO Members

to a special conference

Please RSVP for this no-cost CIA Document Release Event at Smith College

From Typist to Trailblazer
The Evolving View of Women in the CIA's Workforce

A CIA Historical Documents 'Release Event' Conference
co-hosted with Smith College, Northampton, Massachusetts

Wednesday, October 30, 2013, 4 - 6pm EDT

RSVP here

Smith College
Carroll Room, Campus Center
Northampton, Massachusetts

From Typist to Trailblazer: The Evolving View of Women in the CIA's Workforce is a collection of declassified documents shedding light on the CIA's efforts to examine and address the status of its women employees from 1947 to today. The first study to look at career opportunities for women was completed in 1953, just six years after the Agency's establishment. This Panel on career Service for Women was dubbed the "Petticoat Panel," and a lightly redacted version of their final report is included in the collection. From its inception, the CIA has been a forerunner in the federal government in women's and minority rights initiatives. These initiatives, along with numerous meeting minutes and memos, reflect conversations that were also happening on the national level. The timely release of these documents includes some discussion about what challenges remain for the Agency to day, and how it is currently working to implement change.

Features release of newly declassified documents [which will be made available later on a CIA website microsite - address supplied in the booklet], a printed booklet of the program, and a panel of distinguished speakers.

There is no fee to attend this event. Generous nearby no-cost parking.

Full details on the conference are here.

If you think you would like to attend this event, please RSVP here.


The Two Day Cryptographic History Event of the Year

"Technological Change and Cryptology: Meeting the Historical Challenges"

NSA's 2013 Cryptologic History Symposium, 17-18 October 2013
Laurel, Maryland

      The Center for Cryptologic History hosts a biennial international symposium in October during odd-numbered years. The speakers and audience are a mix of outside scholars, current practitioners, retired veterans, and interested members of the public. Past symposia have had presenters from over a dozen countries.

      The theme for the 2013 symposium, to be held on October 17-18 at the Johns Hopkins Applied Physics Laboratory's Kossiakoff Conference Center (just west of Laurel, Maryland) is "Technological Change and Cryptology: Meeting the Historical Challenges." The conference will include sessions on "A Tribute to Alan Turing," a "Roundtable on Cyber History," "Bletchley Park," "COMINT and the Civil War," "The Cryptologic Legacy of the Great War Era," "SIGINT and the Vietnam War Era," and "A Technological Advantage: Historical Perspectives on Cryptologic Research and Development."

      In all there will be 21 separate sessions and over 70 presentations. Speakers will include scholars such as David Kahn and cryptologic pioneers such as Whitfield Diffie.

      All symposium sessions are unclassified and open to the registered public. A complete agenda and registration information will be available here at the website or by contacting the Center for Cryptologic History at 301-688-2336 or via email at history@nsa.gov.

      Note also that the National Cryptologic Museum Foundation has an excellent program the day before - 16 October - at the same venue.


"Safeguarding Intelligence"

Theme of the National Cryptological Museum Foundation's Annual Membership Meeting

16 October 2013
Laurel, Maryland

Details on the speakers, agenda and other events will be provided as soon as they become available.

The Meeting will be held at the Kossiakoff Center, JHU/APL, 11100 John Hopkins Rd, Laurel, MD 20723, 240-228-7574

The fee for NCMF members is $20 and for non members $50 which includes one year membership in the NCMF.  The fee includes breakfast, lunch and refreshments at the morning break.  There will also be A.M and P.M. shuttle service to and from the parking lot.

You can register securely online here on the donation page, or you can download and complete the Registration form and mail to the NCMF at PO Box 1682, Ft. George G. Meade, MD 20755.  Call 301-688-5436 for assistance or send an email to cryptmf@aol.com



Section I - INTELLIGENCE HIGHLIGHTS

Biggest U.S. Rocket Blasts Off with Spy Satellite. An unmanned Delta 4-Heavy rocket, the largest in the U.S. fleet, blasted off from Vandenberg Air Force Base in California on Wednesday to put a classified spy satellite into orbit for the National Reconnaissance Office, officials said Wednesday.

The 23-story-tall rocket lifted off at 11:03 a.m. local time/1803 GMT from a launch pad originally built for, but never used by, NASA's now-retired space shuttles.

No details about the rocket's spy-satellite payload were released. [Read more: Reuters/28August2013]

Egyptian Authorities Detain Suspected 'Spy' Bird. In a case that ruffled feathers in Egypt, authorities have detained a migratory bird that a citizen suspected of being a spy.

A man in Egypt's Qena governorate, some 450 kilometers (280 miles) southeast of Cairo, found the suspicious bird among four others near his home and brought them to a police station Friday, said Mohammed Kamal, the head of the security in the region.

There, officers and the man puzzled over the electronic device attached to the suspected winged infiltrator. On Saturday, a veterinary committee called by concerned government officials determined the device was neither a bomb nor a spying device.

Instead, they discovered it was a wildlife tracker used by French scientists to follow the movement of migrating birds, said Ayman Abdallah, the head of Qena veterinary services. [Read more: Gabriel/AP/31August2013]

Leaked 'Black Budget' Shows How the CIA Progressed From Spy Agency to Paramilitary Force. The Washington Post has published the U.S. intelligence community's 2013 'Black Budget,' which it obtained from Edward Snowden, and it provides an unprecedented view into CIA funding since 9/11.

Barton Gellman and Greg Miller of the Post report that the U.S. has spent more than $500 billion on intelligence since September 11, 2001, and during that time it transformed "a spy service struggling to emerge from the Cold War into a paramilitary force."

To accomplish that, a surge in CIA resources "funded secret prisons, a controversial interrogation program, the deployment of lethal drones and a huge expansion of its counterterrorism center," according to the Post.

At the same time the agency built a "Global Response Staff," which hired former U.S. commandos and began collaborating with U.S. Special Operations teams on capture/kill missions in addition to training and deploying a 3,000-member Afghan paramilitary force.

Gellman and Miller note that the Agency's increasingly dominant slice of intelligence community's (IC) $52.6 billion budget over the last 12 years "will likely stun outside experts."

Here are some of the more striking numbers from the Post and the budget: [Read more: Kelley/BusinessInsider/29August2013]

US Intelligence Agencies 'Targeted for Infiltration by Al-Qaeda'. The discovery, reported by The Washington Post, has heightened fears that America's intelligence community is being targeted by terrorist and other extremist organisations for infiltration, as well as by foreign governments' own spies. All such US agencies are investigating thousands of their own employees to counter the threat.

The classified budget document which revealed the extent of the CIA's efforts was itself passed to the newspaper by the former National Security Agency contractor Edward Snowden, now a fugitive in Russia under temporary asylum after leaking thousands of secret documents.

Although the file did not describe the nature of the jobseekers' extremist or hostile ties, it cited Hamas, Hizbollah and al-Qaeda and its affiliates most often.

The fear of infiltration is such that the NSA planned last year to investigate at least 4,000 staff who obtained security clearances. It detected potentially suspicious activity among staff members after trawling through trillions of employee keystrokes at work. [Read more: AFP/2September2013]

Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.'s. For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans' phone calls - parallel to but covering a far longer time than the National Security Agency's hotly disputed collection of phone call logs. 

The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.

The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987.

The project comes to light at a time of vigorous public debate over the proper limits on government surveillance and on the relationship between government agencies and communications companies. It offers the most significant look to date at the use of such large-scale data for law enforcement, rather than for national security. [Read more: NYTimes/1September2013]

U.S. Spy Agencies Spend $37 Billion on Data. Top-secret budget figures detailing the vast operations of U.S. spy agencies reveal not only the agencies' expansive reach, but also the massive size of their enterprise IT and data processing capabilities.

The figures, provided by former National Security Agency contractor Edward Snowden and published Aug. 30 by the Washington Post, provide a glimpse into the money the CIA, the NSA and the intelligence community as a whole spend annually to collect, process and analyze data. 

The budget figures, from a top-secret report called the Fiscal 2013 Congressional Budget Justification Book, show that the U.S. budgeted $52.6 billion in fiscal 2013 to support the operations of 16 intelligence agencies, including $14.7 billion for the CIA, $10.8 billion for the NSA and $10.3 billion for the National Reconnaissance Office. For data collection, processing and analysis across intelligence agencies, the budget breaks down as follows: [Read more: Kash/InformationWeek/30August2013]

U.S. Geospatial Intelligence Foundation Accepting Nominations for Intelligent Members' Awards. USGIF is now accepting nominations for its annual geospatial awards program. The USGIF Awards Program recognizes the exceptional work of community members for intelligence achievement, to include government, military industry, administrative support, academic achievement and academic research.

Nominate an individual, or team or yourself, deserving of such recognition. Download applications from the Awards Program page here . The deadline for awards nominations is 5 p.m. ET Friday, August 30. 

The USGIF Awards Program recognizes the exceptional work of community members for geospatial intelligence achievement, to include government, military, industry; administrative support, academic achievement, and academic research. 

If you'd like to submit a nomination, you can download applications at usgif.org/community/usgifAwards.

Those selected for awards will receive free registration to the GEOINT 2013 Symposium where their achievements will be acknowledged on stage during the general session, in the program guide, on our multiple websites, and in press releases and news articles. [Read more: SatNewsDaily/28August2013]

Germany Tries 92-Year-Old for Nazi War Crime. Germany put a 92-year-old former member of the Nazi Waffen SS on trial Monday on charges that he killed a Dutch resistance fighter in 1944.

Dutch-born Siert Bruins, who is now German, entered the Hagen state courtroom using a walker, but appeared alert and attentive as the proceedings opened.

No pleas are made in the German system, and Bruins offered no statement. His attorney, Klaus-Peter Kniffka, said after the short 35-minute opening session that it was unlikely his client would ever address the court personally.

"I will probably deliver a defense declaration, but it depends upon the course of the trial," he told reporters. [Read more: AP/2September2013]

Netanyahu Lauds Israeli Secret Services. Prime Minister Binyamin Netanyahu visited the headquarters of Israel's non-military intelligence services - the "external" Mossad intelligence agency, which operates outside of Israel, and the domestic Shin Bet (also known as Shabak, or Israeli Security Agency/ISA).

At the headquarters of the Mossad, which is currently headed by Tamir Pardo, Netanyahu praised the organization's accomplishments.

"Your secret activity is an important element in the security of the citizens of Israel," he told the agency's employees. "It is part of the aggressive security policy that has restored Israel's power of deterrence in recent years." [Read more: IsraeliNationalNews/2September2013]


Section II - CONTEXT & PRECEDENCE

How Reliable is the Administration's Evidence on Syria? Intelligence veterans said Friday that the unclassified presentation of the intelligence assessment appeared solid.

"This is a pretty strong assessment," said John McLaughlin, who served as deputy director of the Central Intelligence Agency from 2000 to 2004. "The intelligence community does not say 'high confidence' about something unless they have really chewed it over." Intelligence agencies state their findings in terms of high, medium, or low confidence.

Mr. McLaughlin said the term "high confidence" is not "used lightly" particularly since the 2003 Iraq intelligence failure. But he noted that the assessment includes a caveat that "high confidence" falls short of confirmation.

He said that confirmation, or indisputable evidence, of sensitive intelligence matters is rare, and in this case it could be physical samples or a confession by a regime official. "There is always some element, in this case small," of uncertainty, he said. [Read more: Gorman/WallStreetJournal/30August2013]

Robert Seldon Lady: Fugitive CIA Spy, Hostage of Italian Politics. This was supposed to be Robert Seldon Lady�s time to sit back, sip the wine at his restored northern Italian farmhouse and make some extra money as a consultant after retiring as a decorated CIA officer.

Instead, the 24-year U.S. intelligence veteran lost the farm in the small Italian town of Penango when it was seized by the Italian government, and he is essentially living as an international fugitive trapped in the U.S.

His crime, a court in Italy declares, is that he carried out orders from top Bush administration officials to capture an Egyptian cleric on the streets of Milan in 2003 and transport that terrorist suspect to another country, a practice known in the intelligence community as rendition.

Mr. Lady was convicted in absentia by an Italian court, which concluded that the rendition operation - though approved under the Silvio Berlusconi administration - was an illegal kidnapping under Italian law.

Nothing has been the same since for Mr. Lady, 59. [Read more: Ruth/WashingtonTimes/2September2013]

Secret CIA Museum: Video Cameras Give the Public a Glimpse Inside. A secret CIA museum that had been closed to the public recently allowed NBC to bring video cameras in.

The museum, known as the "coolest museum you'll never see," has a new addition to their collection, the gun found next to the body of Osama bin Laden during the raid in Pakistan by Navy SEALs.

The weapon is an AK-47 and it's in a museum that is tucked into the hallways at the CIA headquarters in Langley, Virginia. The museum displays gadgets, artifacts and trophies resulting from 70 years of spycraft. It dates back from World War II through to the War on Terror.

Bin Laden's weapon, which is Russian-made, is stored next to an al Qaeda training manual that was found in Afghanistan.

"this is the rifle that was recovered from the third floor of the Abbottabad compound by the assault team," Toni Hiley, the museum's curator. "Because of its proximity to [bin Laden] there on the third floor in the compound, our analyst determined it to be his.

"It's a Russian AK with counterfeit Chinese markings," Hiley continued. [Read more: Fredrickson/TravelersToday/29August2013]

The NSA Has Its Own Team of Elite Hackers. Our Post colleagues have had a busy day. First, they released documents revealing the U.S. intelligence budget from National Security Agency (NSA) leaker Edward Snowden. Then they recounted exactly how the hunt for Osama bin Laden went down.

In that second report, Craig Whitlock and Barton Gellman shared a few tidbits about the role of the government's hacking unit, Tailored Access Operations (TAO) in the hunt, writing that TAO "enabled the NSA to collect intelligence from mobile phones that were used by al-Qaeda operatives and other �persons of interest' in the bin Laden hunt."

So just what is Tailored Access Operations? [Read more: Peterson/WashingtonPost/29August2013]

FBI Director Bob Mueller's "War on Terror" Comes to an End. The SUVs and helicopters arrived one by one all morning at Camp David, the presidential retreat hidden deep within the Catoctin Mountains on Maryland's border, assembling on September 15, 2001, the men who would lead the nation into war. There was President Bush, Vice President Cheney, Secretary of Defense Donald Rumsfeld and his deputy, Paul Wolfowitz, Secretary of State Colin Powell and his deputy, Richard Armitage, National Security Adviser Condoleezza Rice and her deputy, Stephen Hadley, General Hugh Shelton, CIA Director George Tenet with the agency's head of counterterrorism, Cofer Black, and Attorney General John Ashcroft with the head of the FBI, Robert Mueller. Sitting at a large conference table in casual clothes - the President wore a parka - they spent the morning and afternoon plotting the nation's response to the devastating terrorist attacks and by day's end settled on a course that would lead the country first into Afghanistan and, later, into Iraq.

Twelve years later, they're all gone from the government - their war on terror over, their memoirs written, their speaking tours mostly wrapped up, their consulting firms up and running. The George W. Bush presidential library opened this spring in Dallas, and the former president has now taken up painting.

They're all gone, that is, except one.

Robert Mueller's war on terror has continued. [Read more: Graf/Washingtonian/3September2013]


Section III - COMMENTARY

Why the U.S. Should Use Cyber Weapons Against Syria. If the Obama administration does conduct military strikes against Syria, as seems likely, it should use military cyber weapons at the earliest possible moment to show the upside of military cyber power. Though this is risky, as it puts the focus on the U.S. militarization of cyberspace, it is likely worth doing to show that cyber operations are not evil witchcraft but can be humanitarian. 

This is not the first time the United States has been here. In 1999, the White House was reported to have initially approved a plan for covert "computer attacks on foreign bank accounts held by [Slobodan] Milosevic and other Serbian leaders, such as draining assets or altering banking records." A few years later, during the time of the second invasion of Iraq, a similar plan was rolled out to "cripple" the financial system of Saddam Hussein's Iraq, leaving him "no money for war supplies. No money to pay troops."

Neither plan seems to have been executed. The Treasury Department and senior political officials apparently blocked these attacks, for fear of cascading failures and setting a precedent of targeting banks.

More recently, according to the New York Times, the Obama administration and military commanders considered "a cyberoffensive to disrupt and even disable the Gaddafi government's air-defense system." [Read more: Healey/DefenseOne/30August2013

Opinion: Meaning of Secrecy is Changing. One interesting conclusion that emerges from The Washington Post's revelation Thursday of the secret "black budget" for intelligence activities is that the United States doesn't have many secrets anymore - not in the age of WikiLeaks and omnipresent whistle-blowers. It's only because of the forbearance of Post editors that all 178 pages of this top-secret "Talent-Keyhole" document were not blasted to the world.

The demonstrated inability of the U.S. government to keep secrets causes obvious problems for the intelligence agencies, which exist to steal other peoples' classified goodies and protect their own. But it's not so clear that this world of leaks threatens the security of the American republic. That's because the very meaning of secrecy is changing in a world of transparent social media, where it must be assumed that every keystroke and GPS location may be captured by someone.

I write this reluctantly, as someone who favors a strong intelligence community for the United States that can protect the country against real threats from abroad. But if there's one theme that emerges from these documents, it's that the U.S. has been spending an awful lot more for intelligence, especially at the CIA, without getting enough in return. What's needed is better management, rather than more secrecy. [Read more: Ignatius/LJWorld/1September2013]

Restoring Faith in the Intelligence Agencies. Throughout the post-World War II history of the United States, a tension has existed between the demands of an open society and the need for intelligence to protect the country from danger. As a democracy we thrive on open debate, but also depend on spies who can work only in the deepest secrecy. At various times, the pendulum has swung from surprising openness and self-examination to intelligence operations that were locked up in the vaults for decades. The disclosure in The Post on Friday of new details of the intelligence budget is a good moment to reflect on these often-conflicting imperatives.

We need penetrating intelligence. Overseas adversaries can be difficult to locate and even harder to understand. They exist in shadowy terrorist groups and cyberwarfare units. Sixteen U.S. intelligence agencies, employing tens of thousands of people, form an impressive line of defense for the nation's security. Their work must often be done in secret to protect sources, methods and ongoing operations, and we believe that a democratic society must understand and support the need for this secrecy. 

At the same time, the intelligence community has clung for too long to an outdated Cold War mindset that any public information can be used by an adversary, so the best approach is to keep as much as possible under wraps. [Read more: WashingtonPost/31August2013]

If The CIA Gets Simple Stuff Like This Wrong Then Little Hope for the Rest of Us. I've long been annoyed at a simple mistake that the CIA makes. It's one that makes the USA look a lot worse than it actually is, too. Further, given that a lot of people then use this mistake to bolster their own theories about what's going on this mistake has extensive effects.

The mistake is here in the CIA Factbook. Here in this listing of the Gini Index for each country around the world. They've got the value for the US at 45. Which is fine, under one system of measurement the Gini for the US is indeed around 45. They've also got Sweden at 23: this is similarly fine because under one method of measurement Sweden does indeed have a Gini of around that number. However, we shouldn't have both of those numbers in the same chart because they're both from very different ways of measuring the Gini.

A little step back: the Gini index is one of the methods of measuring how unequal a country is. The lower the number the more equal the income distribution is. It's a general assumption (one I don't entirely share but so what?) that the more equally that income is distributed then the better the country. However, there are two very different indeed methods one can use to measure that income distribution. [Read more: Worstall/Forbes/30August2013]


Section IV - Careers, Obituaries, and Coming Events

Careers
 [IMPORTANT: AFIO does not "vet" or endorse these research inquiries or job offers. Reasonable-sounding inquiries and career offerings are published as a service to our members, and for researchers, educators, and subscribers. You are urged to exercise your usual caution and good judgment when responding or supplying any information.]

TECH EXPO CAREER FAIRS

Tuesday, 10 September 2013 - McLean, VA - TECHEXPO Top Secret Hiring Event
Location: Ritz-Carlton Tysons Corner, McLean, VA
Please call Nancy Mathew for more information: 212-655-4505 ext. 225

Tuesday, 17 September 2013 - Baltimore, MD - TECHEXPO Top Secret Hiring Event
Location: BWI Marriott, Baltimore, MD
Please call Nancy Mathew for more information: 212-655-4505 ext. 225

Tuesday, 8 October 2013 - Baltimore, MD - TECHEXPO Cyber Security Hiring Event
Location: Baltimore Convention Center, Baltimore, MD
Please call Nancy Mathew for more information: 212-655-4505 ext. 225

Polygraph-Only Hiring Events
16 October 2013 - Baltimore, MD - TECHEXPO Polygraph-Only Hiring Event
Location: BWI Marriott, Baltimore, MD
Please call Nancy Mathew for more information: 212-655-4505 ext. 225

17 October 2013 - Reston, VA - TECHEXPO Polygraph-Only Hiring Event
Location: Sheraton Reston, Reston, VA
Please call Nancy Mathew for more information: 212-655-4505 ext. 225

Obituaries

Joseph E. Lazarsky. Joseph E. Lazarsky, a retired operations officer of the Central Intelligence Agency, died July 30 at Jackson House assisted living of Boston, Va. He was 91.

He died of heart disease, said a son, Joseph S. Lazarsky.

Mr. Lazarsky was a CIA officer from 1952 until he retired in 1978, serving in various posts in Asia and at CIA headquarters at Langley. He was chief of station in Vietnam from 1969 to 1972, a period of intense U.S. involvement in the Vietnam War.

Joseph Edward Lazarsky was born in Luzerne County, Pa. He attended Pennsylvania State University but left to join the Army before the United States entered World War II.

During the war, he served in the China-Burma-India theater with a detachment of the Office of Strategic Services, a predecessor of the CIA. He was a paratrooper and engaged in guerrilla combat operations behind enemy lines. His decorations included the Legion of Merit and a Distinguished Flying Cross.

After the war, Mr. Lazarsky returned to study at Penn State and later served as an Air Force officer. He was an air attach� in India from 1948 to 1951.

He received the CIA Certificate of Distinction in 1968 and the National Intelligence Medal in 1978.

Since the late 1960s, Mr. Lazarsky had lived in Middleburg. His avocations included gardening and fishing.

His wife, Barbara Ward Lazarsky, whom he married in 1952, died in 2001.

Survivors include three children, Edward S. Lazarsky of Chittenango Falls, N.Y., Jinx Fox of Orlean and Christopher Lazarsky of Middleburg; and a granddaughter. [Read more: Barnes/WashingtonPost/30August2013]

Stuart C. Duncan. Stuart C. Duncan, who worked for the CIA's Directorate of Operations from 1953 to 1986, died July 29 at his home in Annandale. He was 84.

The cause was prostate cancer, said his wife, Ruth Duncan.

Mr. Duncan became deputy chief of reports and requirements and received a certificate of distinction for his contributions, his family said.

Stuart Claxton Duncan was born in Bedford, Ind., and raised in Bloomington, Ind.

He graduated in 1950 with a bachelor's degree in French from Indiana University, where he received a master's degree in Slavic studies in 1951. He then spent a year in the Air Force.

His first marriage, to Margaret Davis, ended in divorce. Survivors include his wife of 30 years, Ruth Dickinson Duncan of Annandale; four children from his first marriage, Douglas C. Duncan of Raleigh, N.C. Diane Beckwith of Lansing, N.Y., Devon Hill of Woodbridge and Denise Knox of Winchester, Va.; a stepson, Christopher Dickinson of Woodbridge; a brother; eight grandchildren; and a great-granddaughter. [Read more: Bernstein/WashingtonPost/28August2013]


Coming Educational Events

EDUCATIONAL EVENTS IN COMING TWO MONTHS....

MANY more International Spy Museum Events in 2013 and some for 2014 with full details are listed on the AFIO Website at www.afio.com. The titles for some of these are in detail below and online.

Wednesdays, 04 September - 25 September 2013, 10:15 a.m. - 11:45 a.m. - Washington, DC - James Bond: Fact Into Fiction (and Back) 4-Session Daytime Course, at the International Spy Museum.

No one has introduced more people to the secret realm of espionage than James Bond. The man we know as 007 has been the face of clandestine operations for more than half a century, giving readers and movie audiences glimpses of a hidden world few are able to imagine.
Bond and his onscreen exploits represent fiction informed by some truth - some of it drawn from author Ian Fleming's own experiences in covert operations as a WWII British naval intelligence officer. In books and onscreen, the ablest agent of British secret intelligence service MI6 faces threats - from Cold War cliffhangers in the Caribbean to mass-media manipulation in the 1990s - that seemed fantastic at the time, but occasionally foreshadowed future headlines.
In Bond's flamboyant adventures, he deploys techniques and technologies that genuine spies use - or perhaps will, should fact catch up with cinematic imagination. His onscreen gadgets are said to have inspired innovations in disguise and communications technologies by real intelligence agency technical services units.

In this series, experts and former intelligence officers explore the intersecting powers of James Bond in fiction and fact, presented in conjunction with the International Spy Museum's continuing exhibition Exquisitely Evil: 50 Years of Bond Villains. They place Bond and his nemeses in historical context, exploring how the evildoers and their plots have changed to reflect their times. (The series price includes a ticket to tour Exquisitely Evil.)

Sept. 4 - Bond Begins: A Cold War Spy
When Ian Fleming created James Bond in 1953, he drew on his own espionage career with British naval intelligence during WW II. Explore the roots of Fleming and Bond with Alexis Albion, PhD, an intelligence historian who served as a guest co-curator of Exquisitely Evil and is a former 9/11 Commission staff member. Learn how the Bond of Fleming's novels evolved to become the superspy universally known for impeccable taste, wit, and physical prowess. Dr. Albion is joined by Burton Gerber, a former CIA Clandestine Service officer and station chief in critical Cold War hotspots, who uncovers the realities of operating behind the Iron Curtain.

Sept. 11 - Bond After the Fall
Bond's fictional world changed after the fall of Communism - just as the collapse of the Soviet Union brought the Western intelligence community a range of challenges, from the absence of a major adversary to slashed funding. Hear from the Museum's Executive Director Peter Earnest, a former CIA Clandestine Service officer, on the transition from the Cold War to the post-Soviet era, and how Bond's adventures mirror the real-world issues and villains of the late-20th century. Jack Platt, another former Clandestine Service officer, provides firsthand observations of the fall of the Soviet Union, the decline of the Russian economy and way of life, and the growth of syndicated crime and corruption in that country.

Sept. 18 - 21st-Century Bond
The museum's historian and Exquisitely Evil co-curator Mark Stout, PhD, a former CIA intelligence analyst, brings you up to speed on the latest Bond villains and their connections to reality. How does Skyfall's Raoul Silva reflect Julian Assange of Wikileaks? How has radicalism and terrorism altered both Bond plotlines and our approach to intelligence? Cindy Storer, a former CIA officer in the Counterterrorism Center, adds perspective on how the intelligence business has changed in response to terrorism.

Sept. 25 - Bond's Women: More Than Meets the Eye
The museum's Adult Programs Director Amanda Ohlke explores the role of women in Bond's universe, from beautiful-but-deadly villains like Elektra King to Judi Dench's steely take on spy boss M. Former CIA officer Melissa Mahle discusses what it was like to undertake an espionage career in the shadow of the femme fatale. Did the Bond girl mystique help or hinder her career? She shares how she took control of the stereotypes and turned them upside down.

Tickets: $120. Obtain yours now via phone: 202.633.3030; or online at www.SmithsonianAssociates.org. Internet Quick Tix code for the program: 1M2-675.
Includes admission to Exquisitely Evil: 50 Years of Bond Villains commemorating the 50th anniversary of the Bond films. See over 100 film artifacts from the archives of EON Productions, the Bond film producers.

Thursday, 5 September 2013, 6:30 - 7:45 pm - McLean, VA - "Marked for Destruction: Christians in Syria and Egypt" - Dr. Patrick Sookhdeo, Chairman of the Board, The Westminster Institute

Syrian Christians have long feared a repeat of what happened to their counterparts in Iraq following the US-led invasion of 2003; they were scapegoated by Islamist militants who perceived them as allies of the West because of their Christian faith. That nightmare is fast becoming a reality in Syria. The last haven for Christians in Syria is no longer safe. A massacre last week in the Wadi al-Nasara ("Valley of the Christians") was the first attack on Christians there; it was previously a relatively peaceful area. More than 90,000 Christians have fled to the Wadi to escape danger in other parts of the country.
In Egypt, Christians are also being scapegoated, by the Muslim Brotherhood for the ousting of Islamist president Mohammed Morsi at the beginning of July. Attacks against them and their property began immediately after his removal but ratcheted up severely following the dispersal of the Brotherhood's sit-in protests by the authorities on 14 August; more than 60 churches were torched as well as countless other Christian institutions, homes and businesses.
Patrick Sookhdeo is a leading expert on jihadist ideology and radical Islam, advising governments around the globe. He has spoken at many military and security events and is the author of numerous books, including Global Jihad: The Future in the Face of Militant Islam, Understanding Shari'a Finance: The Muslim Challenge to Western Economics, and Faith, Power, and Territory: A Handbook of British Islam. He received his Ph.D. from the School of Oriental and African Studies of the University of London, and he is currently Visiting Professor at the Defence Academy of the UK, and Adjunct Professor at the George C. Marshall European Center for Security Studies. He has served as advisor to Permanent Joint Headquarters UK and as Cultural Advisor to RC South, Afghanistan (2010), to ISAF, in Kabul, Afghanistan (2007) and to GOC, Basra, Iraq (2007).
Location: The Westminster Institute, 6731 Curran St, McLean, VA 22101.
To Register for this event please click here. For questions about the event, contact Katie Gorka, The Westminster Institute, kcg@westminster-institute.org or call 703-288-2885

Friday, 6 September 2013, 9 a.m. - 2:15 p.m. - Washington, DC - Al Qaeda and the Muslim Brotherhood: A New American Strategy, a One-Day Conference by Westminster Institute

Recent events in Egypt, Syria, Benghazi, Mali, and Nigeria demonstrate that U.S. policy in the Middle East and Africa is failing - neither is it making Americans safer nor is it helping to bring about regional peace and democracy. The U.S. government built its strategy on the belief that supporting "non-violent" Islamists, notably the Muslim Brotherhood, would weaken the violent Islamists - Al Qaeda and all affiliated movements. With the violence throughout the region signaling a clear failure of this strategy, the United States must radically reassess its strategic approach. This conference brings together leading experts on Islamist ideology, terrorism, and the Middle East, to lay out a new U.S. strategy which will increase domestic security at home, undermine al Qaeda, and stabilize the region.
SPEAKERS: Dr. Patrick Sookhdeo on "Religion's Role in the Battlefield Since 9/11"; Tawfik Hamid on " The Psychology and Ideology of Islamist Extremism"; J. Michael Waller PhD on " The Muslim Brotherhood and the Mobilizational Power of Ideology"; Stephen Ulph on "The Importance of Muslim Reformers"; Robert R. Reilly on "Information Operations: Successes and Failures"; Walid Phares on " A New U.S. Response to Upheaval in the Middle East"; Diana West on "Countering Subversion: Lessons from History"; Katharine C. Gorka on "The OIC's Political Warfare"; and Sebastian Gorka PhD on "A New American Strategy."
Location: U.S. Capitol Visitor Center, Room HVC 201
To Register for this event please click here. For questions about the event, contact Katie Gorka, The Westminster Institute, kcg@westminster-institute.org or call 703-288-2885.

Saturday, 07 September 2013, 11:30 am - Williamsburg, VA - The Norman Forde Hampton Roads Chapter presents Larry Wortzel on the US-China Economic and Security Review Commission

The AFIO Hampton Roads Chapter presents Dr. Larry Wortzel, who spent much of his thirty-two-year military career in the Asia-Pacific region, including two tours of duty as a military attach� in China. He will be discussing his new book The Dragon Extends its Reach, a clear and sobering picture of the PLA's modernization effort as it expands into space and cyberspace, and as it integrates operations in the traditional domains of war. The event will be held at the Center Street Grill, 5101 Center Street, Williamsburg, VA 23188. See PDF of this announcement with more information about speaker and location.
Please RSVP to Clayton Farrington at mclaytonfarrington@gmail.com

Tuesday, 10 September 2013, noon - Washington, DC - "Cyber War Will Not take Place," at the International Spy Museum with author Thomas Rid.

Is cyber war really coming? Scholar Thomas Rid of the Department of War Studies at Kings College London argues that the focus on war distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways. In this provocative talk, the author will trace the most significant hacks and attacks and explore some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber-attack against a country's critical infrastructure? How serious is the threat of cyber-espionage? And who is most vulnerable in the cyber realm?
Join this British author for an informal chat and book signing. Tickets: Free! No registration required. For more information visit www.spymuseum.org

Tuesday, 10 September 2013, noon - Washington, DC - Global Terrorism, Espionage and Cybersecurity (a Monthly Update), at the International Spy Museum with David Major.

Presented in partnership with the CI Centre, these monthly briefings will provide you with the opportunity to be the first to learn of the most current worldwide happenings in the field of intelligence and terrorism. Drawn from the Centre's SPYPEDIA®, a comprehensive online subscription database of espionage information, each of these updates covers important events and information which may not be reported by mainstream media outlets. Such as: espionage penetrations and arrests, cyber espionage reporting, and terrorist events. Briefings led by CI Centre founder David Major will include trend analysis and coverage of new emerging issues of value to the intelligence and security professional and individuals with an interest in national security matters. Major will also highlight and review, as appropriate, new books and reports to keep you current with breaking developments in the national security arena.
Tickets: Free! No registration required. For more information visit www.spymuseum.org

Wednesday, 11 September 2013, 11:30 - 1:30 - Scottsdale, AZ - AFIO Arizona Chapter features LTG Zahner on Future Instability & Threat Analysis - Solving a "Big Data" Problem

Guest Speaker: Lieutenant General (ret.) RICHARD P. ZAHNER speaks on Future Instability & Threat Analysis - Solving a "Big Data" Problem.
Synopsis: The Intelligence Community has just achieved an Initial Operating Capability for its next-generation analytic platform, one that leverages "CLOUD" technology to support the entire National Intelligence Program Information Technology needs.
While GOOGLE, AMAZON, APPLE and a host of other recently created US technology giants have shown the power of "CLOUD" in commerce:
Does CLOUD hold the same promise for the intelligence discipline? Does vastly greater volumes of data, derived from an extensive range of sources and delivered within seconds solve the problems of intelligence prediction that have bedeviled the IC and policy leadership? What does the impact of a post-WikiLeaks/Snowden environment have on creation and retention of "ig Data" across the IC? Is CLOUD central to the future of intelligence or momentary fad or distraction? The talk will NOT delve into the complexities of CLOUD computing, but will assess the impacts of this IT revolution on existing and emergent analytic frameworks and national strategy and decision-making.
Location: McCormick Ranch Golf Course, 7505 McCormick Parkway, Scottsdale AZ 85258 ~ Phone 480.948.0260
RSVP September 9, 2011 (no later please)
As always, for reservations or questions, please email Simone: simone@afioaz.org or simone@4smartphone.net. To call, please leave a message on 602.570.6016. If you are going to bring a guest, please send me their full names and with a note if they are paying or you, the member will be paying.

Wednesday, 11 September 2013, 6 p.m. - Las Vegas, NV - The AFIO Las Vegas Chapter hears Col James Harvey, USAF on "Silent Shield"

Our featured speaker for the evening will be: COL James P. Harvey, USAF
Topic: SILENT SHIELD: AFSOC's Direct Support Operators. As a result of a hostile fire incident during Operation JUST CAUSE, AFSOC and AIA established a program called SILENT SHIELD. This program uses a special group of airborne cryptologic linguists (called Direct Support Operators) to provide a direct threat warning "shield" around special operations aircraft. Over the decades, the SILENT SHIELD mission has grown into a joint, special operations capability featuring airborne cryptologic linguists and their language skills as a weapon and extending the shield around ground and maritime special operations forces. During operations ENDURING and IRAQI FREEDOM, these intelligence professionals even became a "go no-go" criteria for many critical special operations ground missions.
In November 1991, Knife 01 crashed in Afghanistan with one of these special operations intelligence professionals on board. The DSO's actions in the air and on the ground saved the lives of the crew and several Afghan civilians.
Presenter: Col J.P. Harvey is an AFSOC plank-holder, was an MH-60G pilot from 1987-1991, and commanded the 25th Intelligence Squadron (SILENT SHIELD) from 2006-2008.
Colonel James P. Harvey is the Air Force Intelligence Surveillance and Reconnaissance Agency's representative to the Commander, USAF Warfare Center, Nellis AFB, Nevada, and serves as the Center's Director of Intelligence, Surveillance and Reconnaissance. The USAFWC is responsible for assuring combat air, space, and information operations forces are trained and equipped to conduct integrated combat operations. As the A2, Colonel Harvey integrates ISR across the Center's air, space and cyberspace advanced testing, tactics development and training efforts.
Colonel Harvey was commissioned in May 1986 and following Undergraduate Helicopter Training, he served as a pilot in the 55th Special Operations Squadron. Following this assignment, he instructed at the Air Force Academy as a Course Director and Assistant Professor. Colonel Harvey then attended the Intelligence Officers Course, completed as the Honor Graduate, and has held numerous joint, interagency and Air Force positions leading to his current post.
at Nellis Air Force Base Officers' Club
(Guest names must be submitted along with their birth date to me by 4:00 p.m., Monday, August 19, 2013
Please join us at 5 p.m. in the "Robin's Roost" bar area for liaison and beverages.

Place: The Officers' Club at Nellis Air Force Base. All guests must use the MAIN GATE, located at the intersection of Craig Road and Las Vegas Blvd. Address: 5871 Fitzgerald Blvd., Nellis AFB, NV 89191 Phone: 702-644-2582.

Nellis Air Force Base Access:
If you have provided your name, date of birth and either a drivers' license number or a social security number, your name will be at the guarded main gate at the entrance of Nellis Air Force Base. If not, please provide this information to me by Monday August 19, 2013, or you will not be admitted on base. If you currently have adequate base access, you do not need to provide this information.

RSVP to Mary Bentley (mary.bentley@doe.gov) or call her at 702-295-0417, if you have any questions. We look forward to seeing you!

Wednesday, 11 September 2013, noon - Washington, DC - "Global Terrorism, Espionage and Cybersecurity" (a Monthly Update), at the International Spy Museum featuring David Major.

Presented in partnership with the CI Centre, these monthly briefings will provide you with the opportunity to be the first to learn of the most current worldwide happenings in the field of intelligence and terrorism. Drawn from the Centre's SPYPEDIA�, a comprehensive online subscription database of espionage information, each of these updates covers important events and information which may not be reported by mainstream media outlets. Such as: espionage penetrations and arrests, cyber espionage reporting, and terrorist events. Briefings led by CI Centre founder David Major will include trend analysis and coverage of new emerging issues of value to the intelligence and security professional and individuals with an interest in national security matters. Major will also highlight and review, as appropriate, new books and reports to keep you current with breaking developments in the national security arena.
Tickets: Free! No registration required. For more information visit www.spymuseum.org

Wednesday, 11 September 2013, 7 pm - 10 pm - Washington, DC - "Dinner with a Spy," An Evening with Malcolm Nance.

He's been undercover in terrorist hotspots, passed hostile border crossings in disguise, submitted to waterboarding, and now he's prepared to dine with you. Malcolm W. Nance is a counterterrorism and terrorism intelligence expert with wide-ranging field and combat experience. A frequent guest commentator on breaking news, he's the author of The Terrorist Recognition Handbook among other books. Drawing on his experience as a 20-year veteran of the US intelligence community's Combating Terrorist program, he's been a consultant for the US government on special operations, homeland security, and intelligence. As a master Survival, Evasion, Resistance and Escape (SERE) instructor, he can handle any tricky situation including testifying before the US Congress. You will be one of only 20 guests at Poste for a three-course dinner where you'll talk with him about his extraordinary experiences and thoughts on today's intelligence issues.
Tickets: $225. Please call 202.654.0932 or email lhicken@spymuseum.org to register and provide any special dietary needs.
Ticket includes hors d'oeuvres and three-course dinner with wines. Registration required, space is limited! For more information visit www.spymuseum.org.
Location: Poste, 555 8th St NE, Washington, DC 20002

Monday, 16 September 2013, 5:30 - 8 pm - New York, NY - "Putin's Russia" featuring KGB Maj Gen Oleg D. Kalugin, addressing AFIO NY Metro Chapter

Gen. Kalugin was one of the youngest generals in the history of the KGB, and his intelligence career spanned the better part of the Cold War. As deputy resident at the Soviet embassy in Washington, DC, he oversaw Moscow's spy network in the United States, and as head of KGB foreign counter-intelligence, he directed several Soviet covert actions against the West. In his memoirs, Spymaster, KGB Major General Oleg Kalugin (Ret.) provided an unparalleled look at the inner workings of Moscow's famed spy agency. Join Kalugin to hear firsthand of his assessment of how Russia and its intelligence organs have fared under Russian president Vladimir Putin, including the death of Russian intelligence defector Alexander Litvinenko in London in 2006, up to the present quandary dealing with the Edward Snowden leaker affair.
Location:  Society of Illustrators Building  128 East 63rd Street (between Park Ave and Lexington Avenue). 
Times:  Registration starts at 5:30 PM with 6 PM meeting start. 
Fee: $50/pp - advanced registration required at afiometro@gmail.com or call 646-717-3776.

17 September 2013, 11:30am - 2 pm - McLean, VA - DIAA Forum hears MajGen Michael Ennis speaks on "Intelligence Contributions to DIA and the IC by the USMLM to the Group of Soviet Forces, Germany"

MajGen Michael E. Ennis, USMC (ret) will speak on "Intelligence Contributions to DIA and the Intelligence Community by the U.S. Military Liaison Mission to the Group of Soviet Forces Germany."
The Military Liaison Missions arose from reciprocal agreements formed between the Western allied nations (the US, the UK and France) and the USSR shortly after the end of the Second World War. These agreements established liaison offices in each other's sectors in Germany staffed with military personnel. While the initial purpose of the Missions was to address post-war logistical issues between the four occupying powers, the presence of allied liaison missions inside the Soviet sector (East Germany) provided a rare opportunity to monitor Soviet military activity behind the Iron Curtain. The intelligence collected by the members of these small but unique organizations was a major contribution to DIA's understanding of Soviet military capabilities throughout the Cold War (1946-1990).
MajGen Ennis was one of the few Marine officers selected for the Army's Russian Foreign Area Officer program where he became a Russian linguist and a specialist on the Soviet Union. This led to an assignment as a translator on the Washington-Moscow Hotline (MOLINK) and then to Potsdam, East Germany where he spent nearly four years conducting clandestine reconnaissance and intelligence operations in communist East Germany in the 1980s as part of the US Military Liaison Mission. General Ennis later served as the Assistant Naval Attache in Moscow, the Director of Human Intelligence at the Defense Intelligence Agency and the Deputy Director of the National Clandestine Service for Community Human Intelligence.
He is a native of Minnesota and a graduate of Concordia College with BA degrees in French and International Relations. He also holds an MA degree in Government and National Security Studies from Georgetown University.
This forum will follow a modified Chatham House rule. You may use the information, but with the exception of speaker's name and subject, you may make no attribution. Everything will be off the record.
Location: Pulcinella Restaurant, 6852 Old Dominion Drive, McLean, VA. Pay at the door with a check for $29.00 payable to DIAA, Inc. Pay at the door with a check for $29.00 per person, payable to DIAA, Inc. Checks are preferred, but will accept cash; however credit card payments are discouraged
Make reservations by 16 September 2013 by email to diforum@diaalumni.org. Include names, telephone numbers, and email addresses. For each attendee, choose among chicken cacciatore, tilapia puttanesca, lasagna, sausage with peppers, or fettuccini with portabella for your lunch selection.

Thursday, 19 September 2013, 11:30 am - Colorado Springs, CO - The Rocky Mountain Chapter presents Mark Pfoff, Detective El Paso County Sheriff's Office

The Rocky Mountain Chapter presents Mark Pfoff, Detective, El Paso County Sheriff's Office will talk on a case he has been working since 2006 regarding an Online Predator that is finally coming to a close. This event will take place on 19 Sep 2013 at 11:30am. To be held at The Inn at Palmer Divide, 443 S. Highway 105 Palmer Lake, CO, Exit 161 westbound off I-25, West on Highway 105. Please RSVP to Tom VanWormer at robsmom@pcisys.net

20 - 24 September 2013, 8:30 AM - 4 pm EDT - Herndon, VA - 2013 ERII Counterespionage Conference

You are invited to attend The 2013 ERII Counterespionage Conference in Herndon, Virginia. September 20th, 21st & 22nd.
This year, our keynote address will be given by: Mr. Gennady S. Vasilenko
Vasilenko was a KGB "Line KR" counterintelligence officer identified as a Central Intelligence Agency spy by Robert Hanssen, Vasilenko had been unsuccessfully cultivated for years by the CIA's Jack Platt and FBI Sp. Agent Dion Rankin. In fact, Vasilenko never succumbed to American blandishments. But, in January 1988 while on a visit to Havana, Vasilenko was arrested and taken by ship back to Moscow to face six months of interrogation in the infamous Lefortovo prison.
Vasilenko was among the four convicted Russians who were "traded " in exchange for U.S. "deportation" of ten Russian nationals - part of a large "Illegal intelligence aparat" living in the United States and reporting to the SVR foreign intelligence service. (Exchange date was 10 July 2010).
And, we have also lined up the following exciting presentations and vendors:
CLICK HERE FOR DRAFT CONFERENCE AGENDA
"Remote Spectrum Surveillance and Monitoring" by Professional Development TSCM Group Inc., Paul D Turner, TSS TSI; "Practical NLJD Evaluation, Comparisons, Findings and Recommendations". By Steve Whitehead - Eavesdropping Detection Solutions - CBIA - BECSA; "Covert Audio Technical Surveillance - Burst & TMVWB Systems Presentation" by LJM Tech Support, Alain-Pierre LACLOTTE; "Wireless MAC Address Interception & Tracking" by Arizona Technical Security. Jeff Evert; "Cyber Counterintelligence" by SpearTip, LLC. Jarrett Kolthoff; "Cellebrite" Mobile Forensics" by Richard B. Wejnert and Lee Papathanasious; "CI Centre" by David Major; GSM Cellular Eavesdropping and Detection" & "Searchlight Demo" By Jason Dibley - QCC Interscan, Ltd.; "Berkeley Varitronics Systems" by Scott Schober and Carmine Caferra; "Research Electronics International" by Lee Jones; and "SPYPEDIA" by Ms. Meaghan Smith. Includes SPECIAL SUNDAY TSCM WORKSHOP BY PAUL TURNER - Professional Development TSCM Group Inc.; "Kestrel TSCM Professional Software - Operational Deployment."
Register here.
Questions?: Contact J.D. LeaSure, Director, Espionage Research Institute International (ERII), email: JDL@ERII.org or phone 1.757.716.7353

Saturday, 21 September 2013 - Kennebunk, ME - The AFIO Maine Chapter hears Robert Wallace on "Who's Really Spying On You?"

The chapter opens its fall programs with Robert W. Wallace addressing "WHO IS REALLY SPYING ON YOU?" Is individual freedom being undermined by a government constituted to preserve liberty? The speaker describes the post WWII development of surveillance tools and communications technology and the implications of the 'big data' phenomena for intelligence capabilities, national policy, and individual behavior.
Bob Wallace�s 32-year career with CIA (1971-2003) included assignments as operations officer, station chief, resource manager, and director of clandestine technical programs. Between 1991 and 2003 he held senior positions including Director of CIA�s Office of Technical Services (OTS). After his retirement in 2004 he founded ArtemusConsulting Group, a network of intelligence professionals which offers management counsel and strategic planning.
He is author of SPYCRAFT: the Secret History of the CIA�s Spytechs from Communism to al-Qaeda, contributor to Vaults, Mirrors & Masks: Rediscovering U.S. Counterintelligence and co-author of The Official CIA Manual of Deception and Trickery. His presentations include such diverse groups as The Smithsonian, National Archives, Oak Ridge National Laboratory, the International Spy Museum and, of course, AFIO/ME.
Because of the increasing interest in and attendance at our meetings, beginning September 21 our meetings will be held at the Kennebunk High School main auditorium located at 89 Fletcher Street (Route 35), Kennebunk. The building is 1 � miles north from US Route 1 (Junction of Rte 35 & 1) and � mile south from Maine Turnpike Exit 25. The auditorium is at the south end of the building through the door marked #3. Park along Fletcher St in front of the building or behind the south side of the building. The meeting is open to the public. For information call 207-967-4298.

Thursday, 26 September 2013, 6:30 pm - Washington, DC - "Enemies Within: Inside the NYPD's Secret Spying Unit and bin Laden's Final Plot Against America," at the International Spy Museum

Six months after the 9/11 attacks, New York Police Commissioner Ray Kelly initiated a straightforward, yet audacious, antiterrorist plan to be implemented in the Big Apple, dispatching a vast network of undercover officers and informants to track suspected terrorists. In Enemies Within, Pulitzer Prize-winning investigative journalists Matt Apuzzo and Adam Goldman for Associated Press reveal the effectiveness of the domestic spying plan. Based on hundreds of previously unpublished New York Police Department internal memos and exclusive interviews with intelligence sources, including 25-year FBI veteran Don Borelli who assisted with the book, they found that many of those strategies aren't even close to being useful, functional, or successful. As Assistant Special Agent in Charge in the New York Joint Terrorism Task Force (JTTF), Borelli was responsible for top investigations and counterterrorism missions that spanned the globe. Join Apuzzo and Borelli for an unbridled look at the breathtaking race to avert a second devastating terrorist attack on American soil.
Join the co-author and contributor for an informal chat and book signing.
Tickets: Free! No registration required. For more information visit www.spymuseum.org.

Tuesday, 01 October 2013, 6 pm - Washington, DC - "Witness to History: The Investigation of Robert Hanssen," at the International Spy Museum

International Spy Museum events In 1979, FBI special agent Robert Hanssen volunteered to spy for Soviet Military Intelligence (GRU). To enrich his lifestyle and that of his family, the counterintelligence expert shared US intelligence community secrets, the identities of dozens of secret intelligence agents working for the US around the world, caused deaths of Russians aiding the US, and leaked the existence of an FBI eavesdropping tunnel under the Russian Embassy in DC. Hanssen remained anonymous to his Soviet handlers and to the US government for over 20 years. Building the case against Hanssen was a joint effort between the FBI, CIA, Department of State, and the Justice Department. Hanssen's arrest and conviction led to a full security review of the FBI. Panelists for this inside look at the case include: Mike Rochford, (ret.) FBI Section Chief, Russian Overseas Espionage and David Wise, Author of Spy: The Inside Story of How the FBI's Robert Hanssen Betrayed America
Light hors d'oeuvres at 6:00PM. Panel begins at 6:45pm. Free! Registration required, space is limited! For more information visit www.spymuseum.org.

Tuesday, 8 October 2013, 11:30 am - 3 pm - MacDill AFB, FL - AFIO Suncoast Chapter hosts Daniel T. Cohen, RSA, The Security Division of EMC

Daniel Cohen is Head of Knowledge Delivery and Business Development for RSA's Online Threats Managed Services Group (OTMS). RSA is the security division of EMC. He will be presenting from Israel via Skype link. As described in Wikipedia, EMC Corporation (stylized as EMC²) is an American multinational corporation that offers data storage, information security, virtualization, and cloud computing products and services which enable businesses to store, manage, protect, and analyze massive volumes of data. EMC's target markets include large FORTUNE 500 companies as well as small business across various vertical markets. It is headquartered in Hopkinton, Massachusetts. In his role as Head of Knowledge Delivery, Mr. Cohen and his team are responsible for gathering, analyzing and reporting on intelligence findings recovered by the different cyber teams operating within the group. This intersection of data –human-based intelligence, malware research, and anti-phishing operations – provides Mr. Cohen with unique visibility into the ever-changing cyber-crime landscape. Coupled with his industry insight as Head of Business Development, Mr. Cohen has a wealth of experience in working with leading companies worldwide in strategizing their security needs. Mr. Cohen holds a Bachelor's degree in Business Administration from the Herzliya Inter-Disciplinary Center, Israel.
Location: MacDill AFB Bay Palms Golf Complex, 1803 Golf Course Avenue, MacDill AFB, FL 33621.
Please RSVP to the Chapter Secretary no later than Wednesday, October 2, for yourself and include the names of any guests. Email or call the Chapter Secretary. You will receive a confirmation via email. If you do not, please contact the Chapter Secretary.
You must present your $20 check payable to "Suncoast Chapter, AFIO" (or cash) at check-in to cover the luncheon. If you make a reservation, don't cancel and get a cancellation confirmation by the response deadline and then don't show up, you will be responsible for the cost of the luncheon.
Note that the base is now enforcing a handscan registration for those with ID cards so, if you haven't been on-base recently, you should look into this or allow some extra time when you arrive for the meeting. Should you not have a 'bumper sticker' or ID card for access to MacDill AFB, please so state in your RSVP. If you have not already submitted information required for the Gate Access List, be sure to include your license number, name on drivers license and state of issue for yourself and for any guests you are bringing. Anyone with special AFIO Gate Access should proceed to the Bayshore Gate. If you need directions, please let us know. The main gate will send you to the visitor's center and they will not be able to help you enter the base, only give you directions to the Bayshore Gate. The cash wine and soda bar will open at 1100 hours for those that wish to come early to socialize.
Questions or reservations to Michael F. Shapiro at mfshapiro@att.net

Wednesday, 9 October 2013, noon - Washington, DC - Global Terrorism, Espionage and Cybersecurity (a Monthly Update), at the International Spy Museum with David Major.

Presented in partnership with the CI Centre, these monthly briefings will provide you with the opportunity to be the first to learn of the most current worldwide happenings in the field of intelligence and terrorism. Drawn from the Centre's SPYPEDIA®, a comprehensive online subscription database of espionage information, each of these updates covers important events and information which may not be reported by mainstream media outlets. Such as: espionage penetrations and arrests, cyber espionage reporting, and terrorist events. Briefings led by CI Centre founder David Major will include trend analysis and coverage of new emerging issues of value to the intelligence and security professional and individuals with an interest in national security matters. Major will also highlight and review, as appropriate, new books and reports to keep you current with breaking developments in the national security arena.
Tickets: Free! No registration required. For more information visit www.spymuseum.org

10 - 11 October 2013 - Charleston, SC - The Citadel - The Military College of South Carolina presents the Southeast Region Security & Intelligence Conference with the theme: "Securing Our Intelligence & Protecting Our Ports" 

Keeping with the tradition of The Citadel's historic role in defending the country, the Criminal Justice Department and the School of Humanities is pleased to announce the next chapter in Homeland Security. The Citadel will hold its first conference dedicated to Homeland Security and Intelligence. The conference will feature professionals and academics from various disciplines and agencies related to homeland security and intelligence. Keynote speakers include: Letitia Long, Director of the National Geospatial-Intelligence Agency; Robert Cardillo, Deputy Director for Intelligence Integration, Office of the Director of National Intelligence; Stu Shea, Chief Operating Officer, SAIC, and many other senior officials and experts. http://www.citadel.edu/root/criminaljustice-sersi-conference
Conference Registration: https://foundation.citadel.edu/sersi

16 October 2013 - Laurel, Maryland - "Safeguarding Intelligence" - Theme of the National Cryptological Museum Foundation's Annual Membership Meeting

Details on the speakers, agenda and other events will be provided as soon as they become available.

The Meeting will be held at the Kossiakoff Center, JHU/APL, 11100 John Hopkins Rd, Laurel, MD 20723, 240-228-7574

The fee for NCMF members is $20 and for non members $50 which includes one year membership in the NCMF.  The fee includes breakfast, lunch and refreshments at the morning break.  There will also be A.M and P.M. shuttle service to and from the parking lot.

You can register securely online here on the donation page, or you can download and complete the Registration form and mail to the NCMF at PO Box 1682, Ft. George G. Meade, MD 20755.  Call 301-688-5436 for assistance or send an email to cryptmf@aol.com

17-18 October 2013 - Laurel, MD - "Technological Change and Cryptology: Meeting the Historical Challenges" is theme at the Biennial Cryptologic History Symposium

The Two Day Cryptographic History Event of the Year - "Technological Change and Cryptology: Meeting the Historical Challenges" - NSA's 2013 Cryptologic History Symposium, 17-18 October 2013 Laurel, Maryland

The Center for Cryptologic History hosts a biennial international symposium in October during odd-numbered years. The speakers and audience are a mix of outside scholars, current practitioners, retired veterans, and interested members of the public. Past symposia have had presenters from over a dozen countries.
The theme for the 2013 symposium, to be held on October 17-18 at the Johns Hopkins Applied Physics Laboratory's Kossiakoff Conference Center (just west of Laurel, Maryland) is "Technological Change and Cryptology: Meeting the Historical Challenges." The conference will include sessions on "A Tribute to Alan Turing," a "Roundtable on Cyber History," "Bletchley Park," "COMINT and the Civil War," "The Cryptologic Legacy of the Great War Era," "SIGINT and the Vietnam War Era," and "A Technological Advantage: Historical Perspectives on Cryptologic Research and Development."
In all there will be 21 separate sessions and over 70 presentations. Speakers will include scholars such as David Kahn and cryptologic pioneers such as Whitfield Diffie.
All symposium sessions are unclassified and open to the registered public. A complete agenda and registration information will be available here at the website or by contacting the Center for Cryptologic History at 301-688-2336 or via email at history@nsa.gov.

Note also that the National Cryptologic Museum Foundation has an excellent program the day before - 16 October - at the same venue described above.

Thursday, 17 October 2013, 6:30 pm - Washington, DC - "Hezbollah's Reach Around the World" at the International Spy Museum

"We will not take rejection or humiliation." - Hassan Nasrallah, Secretary-General of Hezbollah

Hezbollah - Lebanon's "Party of God" - is much more than a political party. It's an Islamic Shia religious and social movement, Lebanon's largest militia, a close ally of Iran, and a terrorist organization. But Hezbollah's reach is not limited to Lebanon; it extends far beyond that country's borders with worldwide financial and logistical networks supporting its covert criminal and terrorist operations worldwide from the Middle East to Europe, Asia, Africa, and the Americas. And what is the extent of Hezbollah's role in Iran's shadow war with Israel and the West, including plots targeting civilians around the world? Explore Hezbollah's footprint and future goals with expert commentators: Matthew Levitt, Senior Fellow and Director of The Washington Institute for Near East Policy's Stein Program on Counterterrorism and Intelligence, author of Hezbollah: The Global Footprint of Lebanon's Party of God, and a former FBI counterterrorism analyst as well as former Deputy Assistant Secretary for Intelligence and Analysis at the US Department of the Treasury; and Reuel Marc Gerecht, Senior Fellow at the Foundation for Defense of Democracies, author of The Wave: Man, God, and the Ballot Box in the Middle East, and a former Middle East specialist in the CIA's Clandestine Service.
In collaboration with the Foundation for the Defense of Democracy.
Tickets: $15. To register or for more information visit www.spymuseum.org

2 November 2013 - Indialantic, FL - AFIO Florida Satellite Chapter Hears from FBI Sr Resident Agent Russell Hayes

The AFIO Florida Satellite Chapter will host Russell Hayes, Supervisory Senior Resident Agent, Brevard Resident Agency, Federal Bureau of Investigation, a sub-office of the FBI Tampa Division. Mr. Hayes also heads the Brevard (County) Joint Terrorism Task Force and will address a variety of topical issues. The meeting will take place at the Eau Gallie Yacht Club, Indialantic, FL, and the Meet and Greet will begin at 1130. For information and reservations, please contact Bobbie Keith, 321.777.5561 or bobbie6769@juno.com.

Thursday, 14 November 2013, noon - Washington, DC - "The Family Jewels: The CIA, Secrecy and Presidential Power," at the International Spy Museum

In December 1974, a front-page story in the New York Times revealed the explosive details of years of illegal domestic operations by the Central Intelligence Agency including political surveillance, eavesdropping, and detention. These revelations shocked the public and led to investigations by a presidential commission and committees in both houses of Congress. Investigators soon discovered that the CIA abuses were described in a top-secret document that Agency insiders dubbed the "Family Jewels." That document became ground zero for a political firestorm that lasted more than a year. John Prados, a Senior Fellow of the National Security Archive in Washington, DC, recounts the secret operations that constituted the "Jewels," shows that the abuses have since been replicated by the intelligence agencies at the global level, and exposes the strenuous efforts -- by the Agency, the Executive Branch, and even presidents -- to evade accountability.
Join the author for an informal chat and book signing.
Tickets: Free! No registration required. More information at www.spymuseum.org

For Additional Events two+ months or greater....view our online Calendar of Events


Disclaimers and Removal Instructions

Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers. 

REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs: 

a)  IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list.  If this link doesn't open a blank email, create one on your own and send to afio@afio.com with the words:  REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.

 b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to afio@afio.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.

CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at afio@afio.com. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm


WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor(s) or author(s) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!

(c) 2000, 2012, 2013, Please note AFIO's new address: AFIO, 7600 Leesburg Pike, Suite 470 East, Falls Church, VA 22043-2004. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: afio@afio.com

Click here to return to top.