If you are having difficulties with the links or viewing this
newsletter when it arrives by email, members may view the
latest edition each week at this link: https://www.afio.com/pages/currentwin.htm You will need your LOGIN NAME and your PASSWORD.
For Additional AFIO and other Events two+ months or more... Calendar of Events
WIN CREDITS FOR THIS ISSUE: The WIN editors thank the following special contributors: pjk and fwr. They have contributed one or more stories used in this issue.
The WIN editors
to include a wide range of articles and commentary in the
to inform and educate our readers. However, the views
expressed in the
articles are purely those of the authors, and in no way
or endorsement from the WIN editors or the AFIO officers and
welcome comments from the WIN readers on any and all articles
commentary. IMPORTANT: AFIO does not "vet" or endorse research
inquiries, career announcements, or job offers. Reasonable-sounding
inquiries and career offerings are published as a service to our
members, and for researchers, educators, and subscribers. You are urged
to exercise your usual caution and good judgment when responding, and
should verify the source independently before supplying any resume,
career data, or personal information.]
CIRA and AFIO's 40th Anniversary Conference
Tentative Agenda here.
If you have questions, contact us at firstname.lastname@example.org
AFIO Chapter Events this week or next....
Students / Parents -
College Costs Giving You Sticker-Shock?
An intelligence education can be expensive,
Do you qualify for several of our scholarships? Great! If so, you need apply only one time by submitting the seven items described under "Applicants Must Provide..." Do that by using this form. Indicate whether you are applying for an UNDERGRADUATE or GRADUATE scholarship. You will be considered for all other scholarships if you do not receive approval for the main one you selected. If you are granted one, you will not be considered for others.
Have you already received a scholarship from AFIO? Apply again. We occasionally grant scholarships to individuals who received a grant in prior years, so feel free to apply again.
Deadline for applications: 1 July 2015 to have all your materials to our office. Materials may be submitted via our online form, or by mail to: AFIO Scholarship Committee, 7700 Leesburg Pike Suite 324, Falls Church, VA 22043.
NEW Gift item....
NEW: AFIO's Intelligence Community Mousepad
Show your colors! The full colors of the seals of all 18 members of the US Intelligence Community on this 8" round, slick surface, nonskid, rubber-backed mouse pad. Price: $20.00 for 2 pads [includes shipping to US based address, only. For foreign shipments, we will contact you with a quote.] Great gift for colleagues and self. Click photo above for larger image. Also we've heard some use it as a large drink coaster.
Section I - INTELLIGENCE HIGHLIGHTS
Secret CIA Effort in Syria Faces Large Funding Cut. Key lawmakers have moved to slash funding of a secret CIA operation to train and arm rebels in Syria, a move that U.S. officials said reflects rising skepticism of the effectiveness of the agency program and the Obama administration's strategy in the Middle East.
The House Intelligence Committee recently voted unanimously to cut as much as 20 percent of the classified funds flowing into a CIA program that U.S. officials said has become one the agency's largest covert operations, with a budget approaching $1 billion a year.
"There is a great deal of concern on a very bipartisan basis with our strategy in Syria," said Rep. Adam B. Schiff (Calif.), the ranking Democrat on the intelligence panel. He declined to comment on specific provisions of the committee's bill but cited growing pessimism that the United States will be in a position "to help shape the aftermath" of Syria's civil war.
The cuts to the CIA program are included in a preliminary intelligence spending bill that is expected to be voted on in the House next week. The measure has provoked concern among CIA and White House officials, who warned that pulling money out of the CIA effort could weaken U.S.-backed insurgents just as they have begun to emerge as effective fighters. The White House declined to comment. [Read more: Miller&DeYoung/WashingtonPost/12June2015]
CIA Reorganizes to Target Islamic State. Top Central Intelligence Agency officials are pressing spies, analysts, scientists and even economists into new teams as they broaden their efforts against Islamic State militants and other global threats.
The reorganization is part of a broader effort by director John Brennan to break down CIA "stove pipes" that have been in place for decades, which some felt isolated the agency's secretive spy network from its internal religious experts, computer hackers, linguists, and others.
"As our analysts gain better insight into how ISIL is operating, that will inform the efforts of the people in the [spy division] who are charged with collecting additional information and intelligence about ISIL," CIA Deputy Director David Cohen said in an interview, using another name for Islamic State. "It will help steer them into areas where we have gaps."
The White House, Pentagon, and numerous intelligence agencies are re-evaluating how they combat Islamic State, which has expanded its reach and influence in the past year into more corners of Iraq and Syria, as well as North Africa, Europe, and Southeast Asia. [Read more: Paletta/WallStreetJournal/14June2015]
Britain Pulls Spies as Moscow Cracks Snowden Files: Reports. Britain has been forced to remove some of its spies after Russia and China accessed the top secret raft of documents taken by former US intelligence contractor Edward Snowden, British media reported.
The BBC and the Sunday Times cited senior government and intelligence officials as saying agents had been pulled, with the newspaper saying the move came after Russia was able to decrypt more than one million files.
"It is the case that Russians and Chinese have information. It has meant agents have had to be moved and that knowledge of how we operate has stopped us getting vital information," a Downing Street source said, according to the newspaper.
Downing Street told AFP on Sunday that they "don't comment on intelligence matters" while the Foreign Office said: "We can neither confirm or deny these reports". [Read more: AFP/15June2015]
Former CIA Operative: Bergdahl was 'high' when captured in Afghanistan. Sgt. Bowe Bergdahl was apparently "high" with a small group of Afghan soldiers when they were picked up by nomads in 2009, according to a former CIA operative who was running a network of informants on the ground.
The information brings some additional detail to the otherwise murky picture of the circumstances of Bergdahl's disappearance and capture, five years before the Obama administration traded five Guantanamo prisoners for Bergdahl's freedom. The former CIA operative told Fox News Bergdahl was captured along with others, and sold to the Haqqani terrorist network in Pakistan within four days.
"The call came in and what it said was they had just broken out the message that an American soldier along with two or three Afghan soldiers had been captured or taken by a group of nomads," Duane 'Dewey' Clarridge told Fox News, speaking for the first time publicly about the incident.
He added that the call said, "they were using the Pashto 'diwana,' which in this case meant high on hashish." [Read more: Herridge/FoxNews/June]
German Intelligence 'To Be Reorganised in Response to Spy Scandal'. German intelligence is reportedly facing a major overhaul in response to a damaging scandal after it emerged it had spied on European partners at the request of the US.
Gerhard Schindler, the head of the BND intelligence service, wants to bring all 6,500 of its field officers back under central control, according to Süddeustche Zeitung newspaper.
Mr. Schindler told those close to him some of the service's field offices had taken on a "life of their own", the newspaper claimed.
His concerns appear to focus on the work of the BND's main listening post at Bad Aibling, in south Germany. [Read more: Huggler/TheTelegraph/15June2015]
Egyptian Engineer Pleads Guilty to Spy Charges. A former Navy civilian engineer pleaded guilty today to a charge of espionage in federal court.
Mostafa Ahmed Awwad, 36, of Yorktown, Va., admitted to attempting to provide schematics of the USS Gerald R. Ford, a nuclear aircraft carrier, while serving as a Navy engineer, the U.S. Department of Justice announced. The USS Gerald R. Ford is currently under construction and will the most advanced aircraft carrier in the world, with about 4,000 sailors on board. The schematics contain Naval Nuclear Propulsion Information and are marked "NOFORN," which means they are not releasable to foreign persons.
On Sept. 19, 2014, Awwad met with an undercover FBI agent posing as an Egyptian Intelligence Officer, according to court documents. During the meeting, Awwad told the agent that he planned to use his position to obtain military technology for the Egyptian government, including the designs of the USS Gerald R. Ford.
Investigators say Awwad also agreed to conduct clandestine communications with the agent and conduct "dead drops" in a concealed location. [Read more: Harris/CourthouseNewsService/15June2015]
Former CIA Chief Says Government Data Breach Could Help China Recruit Spies. Retired Gen. Michael Hayden, who once led the National Security Agency and later the Central Intelligence Agency, said the theft of millions of U.S. government personnel records could allow China to recruit U.S. officials as spies.
"This is a tremendously big deal," he said at The Wall Street Journal's CFO Network meeting in Washington. "My deepest emotion is embarrassment."
China has denied involvement in the breach of data from the Office of Personnel Management, which was first announced June 4. But several senior U.S. lawmakers and several people familiar with an investigation into the breach have said the computer intrusion that seized the records appeared to have ties to Chinese hackers.
Gen. Hayden took it a step further Monday evening, saying the hack appears to have signatures of China's Ministry of State Security, a secretive group within the Chinese government that collects intelligence in ways similar to the U.S. Central Intelligence Agency.
He said the personnel records were a "legitimate foreign intelligence target." [Read more: Paletta/WallStreetJournal/15June2015]
Section II - CONTEXT & PRECEDENCE
10 Ways Everyone Should Approach Cybersecurity. The security breaches of 2014 were more numerous than in any previous year. They ranged from nuisance hacks to identity theft to the attempt to extort a major motion picture organization. Many of these attacks were preventable, mostly because prior security breaches have demonstrated flaws, misconfigurations and design mistakes that many other organizations continue to have. Too many fail to learn from the mistakes and losses of others. If we hope to get ahead of the onslaught of hacks and attacks in the future, we have to learn from others. Here are 10 key lessons we need to learn (or learn again) from compromises. [Read more: Stewart/GlobalKnowledge/16June]
Press Release: FBI Intelligence Branch. Our Intelligence Branch is front and center making sure the FBI produces the intelligence necessary to protect the nation.
The Intelligence Branch is the strategic leader of the FBI's Intelligence Program and drives collaboration to achieve the full integration of intelligence and operations, and it proactively engages with the Bureau's partners across the intelligence and law enforcement communities. By overseeing intelligence policy and guidance, the Intelligence Branch ensures the FBI's intelligence production remains objective and strikes the correct balance between strategic and tactical work. [Read more: FBI.gov/12June2015]
The Secret Life of Intelligence Agents: What do Spies Actually Do? While most would accept that working for the security services is not all fast cars and fight scenes in exotic locations, what actually goes on day-to-day in the bowels of the secret intelligence service, MI6, is a mystery.
First of all, they don't call them spies; it's intelligence officers.
The days of a student in their final year at university being propositioned by a spook out of a John le Carré are gone and have been replaced by a more transparent recruitment page like many graduate employers.
MI6 insists that there is no "type" that they are looking for in its intelligence officers, although a 2.1 degree is a requirement. They say that "the ability to understand, interact and connect with a diverse range of people is central to what we do and defines a good officer".
Due to the nature of the game though, "you should only discuss your application with your partner or close family member, as long as they are British". [Read more: Ward/TheIndependent/14June2015]
Intelligence: Death By Cellphone. Cellphone cameras have become a major source of military intelligence and this is especially true with counter-terrorism operations. The United States recently revealed how a picture an Islamic terrorist took of himself with his cellphone (a selfie) revealed the location of an ISIL (Islamic State in Iraq and the Levant) headquarters, which was promptly bombed. Such incidents are more common with poorly trained irregulars, but even well trained troops have problems with "cellphone discipline". This problem is a 21 st century one and it has been getting worse.
Incorporating cameras into cell phones first showed up in 2000 and the practice quickly spread. This proved to be very popular and as such phones became cheaper, and their cameras more capable military intelligence agencies warned that troops were taking a lot of pictures, especially when in combat zones. This was leading to a lot of pictures that could reveal military secrets. Efforts to ban troops use of cellphones in combat zones or inside classified areas had some success, but that only reduced the flood of useful (so intelligence experts) cellphone photos it did not eliminate it. This became particularly the case as cellphone networks entered the 3rd generation (3G) about the same time cellphone cameras were introduced. This enabled cellphone users to take photos and immediately send them to someone else, or post them to a website. By 2010 social networks were growing in popularity and cellphone users competed to take and post photos of all sorts of things, often getting newsworthy photos into circulation well before the traditional media. Cellphones with 3G capabilities became so cheap that even many Islamic terrorists and most military personnel had them.
And so it came to pass that a U.S. Air Force general revealed on June 1, 2015 that one of his intelligence analysts, one of many assigned to monitoring the Internet for useful photos, found a picture taken by an ISIL member outside an ISIL headquarters that the air force did not have an exact location on. With that picture the air force was able to precisely locate the ISIL headquarters and 22 hours after the photo was noted an aircraft destroyed the building with three GPS guided (JDAM) bombs. The air force did not mention details of how the photo revealed the exact location but it was probably via analysis of the photo metadata (which these days often includes time and location) and/or automated analysis of geographic features shown in the photo as well as the shape and arrangement of the buildings.
Such errors by terrorists is no secret. [Read more: StrategyPage/14June2015]
Top Ten Findings of the CIA Inspector General's Report on 9/11. Last week, in response to long-standing FOIA requests, the CIA declassified - with significant redactions - five documents related to the terrorist attacks on September 11, 2001. The most notable was a June 2005 Office of the Inspector General (OIG) report into CIA accountability regarding the findings of the Report of the Joint Inquiry into the Terrorist Attacks of September 11, 2001, which was produced by the House and Senate intelligence committees. That joint inquiry was published in December 2002 - long before the 9/11 Commission report - and served as the most comprehensive public investigation into Intelligence Community (IC) shortcomings. The 2005 OIG report reviewed the joint inquiry's central findings to determine if senior CIA officials should be reprimanded for their actions.
Most attention on the OIG report has focused on the now-declassified finding about allegations of Saudi Arabia's support for al-Qaeda. Those who believed that the CIA had intentionally hid evidence of Saudi Arabia-al-Qaeda connections were surely disappointed by this key passage:
The [OIG Accountability Review] Team encountered no evidence that the Saudi Government knowingly and willingly supported al-Qa'ida terrorists. Individuals in both the Near East Division (NE) and the Counterterrorist Center (CTC) [redacted] told the Team they had not seen any reliable reporting confirming Saudi Government involvement with the financial support for terrorism prior to 9/11, although a few also speculated that dissident sympathizers within the government may have aided al-Qa'ida. (p. 440)
Beyond this brief declassified portion of the OIG report, there were many fascinating findings and insights, which are useful to understand the IC's approach to terrorism before 9/11, as well as the type of constraints and organizational biases that make intelligence analysis so inherently difficult. One wonders which of these pre-9/11 shortcomings - so obvious with the benefit of hindsight - are having a comparable impact on intelligence collection and analysis today. [Read more: Zenko/CouncilonForeignRelations/16June2015]
Section III - COMMENTARY
Airstrike Underscores the Need for more Intelligence Resources in Libya. Over the weekend, the U.S. Air Force sent two F-15 fighters to drop "multiple" 500-pound bombs on the Libyan lair of Mokhtar Belmokhtar, the sinister one-eyed head of an al-Qaeda-affiliated group known as the "Signed in Blood Battalion." The bombs hit the target and killed several terrorists, but who exactly was killed was not immediately known.
The U.S. believes that it "likely" killed Belmokhtar in the strike. However, "an Islamist with ties to Libyan militants" said that Belmokhtar wasn't at the site of the bombing, and that four members of a related group were killed instead. It's a significant win only if Belmokhtar himself was blown up, and this uncertainty underscores the problem of our administration's "airstrikes only" approach to terrorism. Without American boots or at least CIA spotters on the ground to guarantee the presence of the targets, such endeavors will always have ambiguous outcomes.
Belmokhtar was a major player in the North African terror world. His masterpiece of death was the January 2013 siege of the natural gas refinery at In-Amenas, Algeria. Knowing that Americans were inside, Belmokhtar's men entered the vast facility, taking hundreds of hostages, singling out the Westerners, and holding them all for four days. Algerian security forces surrounded the complex and four days later launched a rescue mission that resulted in the deaths of 39 hostages, including three Americans, and 29 terrorists. Belmokhtar considered it a great victory.
This terrorist leader, who might or might not be dead, strengthened the terrorist network al-Qaeda in the Islamic Maghreb (before he branched out this year and founded his own franchise) by introducing North African criminal networks into his equation. [Read more: Carson/AmericanThinker/16June2015]
Overhauling Iraq's Intelligence Services. Iraq's security and armed forces suffer from a lack of intelligence-gathering capabilities that has affected their ability to draft plans and mechanisms for combating terrorism. The parliament's Security and Defense Committee on Aug. 14, 2014, linked deterioration in the security situation to the ineptitude of the security apparatuses and the state of their intelligence capabilities.
This reality stems from the bitter experience of authorities having failed to anticipate the ongoing attacks on Iraqi cities, particularly Baghdad. The Security and Defense Committee noted on May 11 that security breaches and criminal acts are escalating in the city and asserted that the breaches there are part of the Islamic State's (IS) strategy to take its battle to the capital. Iraqi authorities have also failed to thwart terrorist acts during direct confrontations with IS. On May 17, IS announced its full control over the city of Ramadi, after the Iraqi army fled the scene.
Iraq's inability to establish an effective intelligence apparatus, despite security forces waging daily battles against terrorism and thousands giving their lives, has had a grave and detrimental effect in reducing the government's political as well as security options. It has also had catastrophic repercussions on the ground through IS' expansion and with security breaches costing the country dearly in material and human losses.
On June 10, Hashd, a nongovernmental organization examining crimes committed in Iraq for potential genocide, announced, "The losses incurred by the Iraqi security and popular mobilization forces since the fall of Mosul on June 10, 2014, followed by the security incidents and violent battles against terrorist groups, reached around 40,000 victims, 25,000 injured and 3,000 missing."
What has hindered Iraq from building of an effective intelligence apparatus, despite daily confrontations with terrorist forces in a fight that, by all measures, is sufficiently expansive to induce learning, increase knowledge and prompt reassessment? [Read more: al-Kadhimi/AlMonitor/15June2015]
Section IV - New Courses, Books, and Upcoming Events
New Courses or Teaching Opportunities
"Cybersecurity: The Intersection of Policy and Technology Program" - an Executive Education Program at Harvard's Kennedy School, 26 - 31 July 2015
In a world with almost limitless data collection capability, where cyber attacks can propagate instantaneously and where the identity or location of an adversary may not be known, individuals and institutions are increasingly vulnerable to network based intrusions that disrupt productivity, jeopardize privacy, and threaten national security. The security and resilience of critical infrastructure and technology in the U.S. and around the world requires constant vigilance against cyber threats. Despite the magnitude of the problem, the field of cybersecurity strategy, policy, and management is nascent. Watch as featured faculty member and noted cyber expert Joe Nye discusses the implications of cybersecurity policy on international security. "Cybersecurity: The Intersection of Policy and Technology Program" is holding this special Executive Education Program from July 26 to 31, 2015. Application Deadline is June 26, 2015. Program Fee::$7,400. Fee includes: tuition, housing, curricular materials, and most meals. Faculty Chair: Jim Waldo, Tad Oelstrom; Program Director: Sergei Konoplyov.
This program is an extension of the Cyber Project, a multidisciplinary research program based at the Belfer Center for Science and International Affairs at Harvard University. Harvard Kennedy School’s newest Executive Education program, the course is the first of its kind to focus on the intersection of policy and technology to address the critical threats of a cyber world. The objective is to bring together technologists and policy makers and provide them with a conceptual framework for the design of both cybersecurity policy and technology. Cybersecurity: The Intersection of Policy and Technology will equip practitioners with the tools necessary to conceptualize the cyber issue, develop policies appropriate for its resolution, and frame strategy and action to address the emerging threats. To that end, the course has four principal objectives:
Program brochure is here; registration here.
Seeking Guest Lecturers & Adjunct Professors - Daniel Morgan Academy, Washington, DC
The Daniel Morgan Academy, a new graduate school in Washington, DC serving the national security community, is looking for experienced intelligence and military professionals to be paid guest lecturers and adjunct professors. This is an opportunity to leave a legacy and impact the next generation of intelligence officers by passing down your knowledge and expertise. You will play an important part in shaping the future of the IC by training and mentoring people who will make a difference. We will work around your schedule and have video capabilities for those not in the DC area. For more information, go to: https://danielmorgan.academy/support/professors-and-mentors/.
How an American Slacker Caught a Russian Spy at a New Jersey
Hooters. Ever watched a spy thriller or a war film and fantasized about being that undercover agent or hunky officer outwitting the evil mastermind, defusing the bomb, seducing the love interest and saving the homeland?
Naveed Jamali has, probably far too many times. "Top Gun" and "Point Break." "Rocky IV" (that's the one where Rock knocks out Ivan Drago, the Soviet champion) and "Miami Vice" (not the '80s television series, but the 2006 movie with Colin Farrell and Jamie Foxx). He imagines himself as Tom Cruise suspended by cables over a top-secret computer in "Mission Impossible" and even reminisces about the unseen boss in "Magnum, P.I." Jamali knows dialogue, characters, scenes. You know those guys who trot out a film or TV reference for any life event? He's one of those guys.
But unlike those guys, Jamali was lucky enough to live out his fantasy. No, the FBI didn't pay him to learn how to surf, but Jamali, a smart, young New York techie, somehow spent three years going toe to toe with a Russian intelligence officer who thought he was developing an asset, even though all the while Jamali was quietly collaborating with U.S. federal agents. The fast-paced, occasionally stressful, often hilarious and invariably self-involved story of how it all went down is the subject of "How to Catch a Russian Spy."
Jamali's mother and father emigrated from France and Pakistan, respectively, and met in graduate school in New York, where they married and formed a company called Books & Research. It specialized in digging up articles, reports, technical data and books for businesses and government agencies, a sort of "Google for a pre-Google age," their son explains. [Read more: Lozada/WashingtonPost/11June2015]
AFIO EDUCATIONAL EVENTS IN COMING TWO MONTHS....
Saturday, 20 June 2015, 2 pm - Kennebunk, ME - The AFIO Maine Chapter hears former US Amb Dunbar (Yemen) on "YEMEN 2015: How and Why a Political Awakening Became a Nightmare"
Charles F. Dunbar, former US Ambassador to Yemen,
served 31 years as a State Department Foreign Service officer with
assignments to Iran, Afghanistan, Morocco, Algeria and Mauritania. He
became chargé d'affaires at the US Embassy in Kabul, Afghanistan from
1981 to 1983, and US Ambassador to Yemen 1988 to 1991. In 1991 he
became UN Secretary General Kofi Annan’s Special Representative leading a
UN Peace Operation in Western Sahara.
Since leaving the Foreign Service Ambassador Dunbar has taught at Simmons College and currently teaches at Boston University.
Yemen is one of the oldest centers of civilization in the Near East and believed to be the seat of biblical Sheba. Ambassador Dunbar describes the present Republic of Yemen as a failed Middle Eastern state along with Syria, Iraq and Libya. After the three years of UN-assisted negotiations failed, former President Saleh presided over and abetted the country’s slide into civil war after popular protests forced his resignation. Each country neighboring Yemen has its own special conflicting interests. Ambassador Dunbar sees the US policy of droning al-Qa’ida operatives as short sighted, failing to fully appreciate what state failure in Yemen would mean.
Location: The meeting, open to the public, will be at the Brick Store Museum program center, 4 Dane Street, Kennebunk. For information call 207-967-4298.
15 July 2015, 11:30am - 2pm - San Francisco, CA - The AFIO Andre LeGallo Chapter hosts John Lightfoot, Assistant Special Agent in Charge of the Counterterrorism branch in the FBI San Francisco Division.
Topic will be "Current Issues in Terrorism: Here and Over There".
ASAC Lightfoot will discuss Al-Q'aida today, the rise and threat of the
Islamic State, domestic groups and updates on recent Bay Area cases.
11:30AM no host cocktails; meeting starts at noon. Note different
location: Basque Cultural Center: 599 Railroad Ave, South San Francisco,
E-mail RSVP to Mariko Kawaguchi at email@example.com with your meal choice (Salmon with Champagne Sauce OR Breast of Chicken Chasseur) and you will be sent an Eventbrite link to register. Alternately, mail a check made out to "AFIO" to: Mariko Kawaguchi, P.O. Box 117578, Burlingame, CA 94011. Members and students: $25; non-members $35. $35 at the door. RSVP is required by July 3, 2015 - no walk-ins.
25 - 26 August 2015 - McLean, VA - CIRA and AFIO's 40th Anniversary Conference and Celebration
CIRA (Central Intelligence Retirees Association) and AFIO will be holding a joint conference and celebration of our 40th anniversaries on 25-26 August 2015.
Day One - Tuesday, 25 August: This celebration coincides with the next CIA Annuitant Reunion on 25 August where many CIRA and AFIO members, who are CIA retirees, will be in attendance.
AFIO and CIRA members who are CIA annuitants and who retired on an even year, will be invited directly by email by CIA and should sign up for that day when the CIA invitation arrives in your inbox.
ONE RESTRICTION: Day One at CIA is limited to current/retired CIA employees or, through AFIO/CIRA, retirees of other Federal IC Agencies.
Day Two - Wednesday, 26 August: The conference expands and continues on Day Two at a local Tysons, Virginia hotel, with many more CIA, CIRA, AFIO, and other IC speakers and panelists. This second day ends with a large "Spies in Black Ties"™ Anniversary Reception and Awards Banquet.
Tentative Agenda here.
To apply, use online form here. To apply with print-and-mail form, it is here.
Space at this special event is limited.
If you have questions, contact us at firstname.lastname@example.org
Monday 28 September 2015 - New York, NY - AFIO Metro NY Chapter hears former FBI Special Agent Edward M. Stroz
Speaker Edward Stroz, former FBI, now with the NYC-based firm of Stroz Friedberg, a global leader in investigations, intelligence, and risk management. Topic and registration details to follow in coming weeks.
Stronz was a Special Agent for the FBI before founding Stroz Friedberg in 2000. He is an expert on electronic evidence and investigations, internet extortions, denial of service attacks, computer hacking, insider abuse, theft of trade secrets, electronic discovery matters, and regularly provides expert testimony on these matters. Mr. Stroz pioneered the use of behavioral science in investigations to gain insights about intent and state-of-mind of computer users. He has supervised hundreds of forensic assignments in assisting corporate clients, trial counsel, individuals, and has conducted security assessments for major public and private entities. While at the Bureau, Stroz was responsible for the formation of the FBI’s Computer Crime Squad in New York City, where he supervised investigations involving computer intrusions, denial of service attacks, illegal Internet wiretapping, fraud, and violations of intellectual property rights, including trade secrets.
Location: Society of Illustrators building, 128 East 63rd St, between Park Ave and Lexington Ave.
COST: $50/person Cash or check, payable at the door only. Dinner to follow talk & Q&A. Cash bar. RESERVATIONS: Strongly suggested, not required, Email Jerry Goodwin email@example.com or phone 646-717-3776.
Other Upcoming Events
17-18 June 2015 - Arlington, VA - Analyst Training: Writing, Analysis, and Preparing Briefings
Dr. Mark Lowenthal teaches this course which provides analytic
skills for any intelligence-related or analytical
function. This course examines the role of intelligence in the policy
process (within government or business), then offers an
introduction to analytic skills, beginning with critical
thinking and reading, writing analysis, and preparing and presenting
successful briefings. The course is designed to get analysts
off to a good start in as little time as possible,
recognizing that there are important time constraints in such training
and that much will also be learned on the job.
INDIVIDUAL ENROLLMENT COURSE at The Intelligence & Security Academy, a provider of innovative education and training in a broad range of national security issues and the more general area of analytic training, is pleased to announce the schedule for its 2015 OpenAcademy individual enrollment course offerings. All courses will be held in Arlington, Virginia. AFIO members will receive a 10% discount on all OpenAcademy courses! Register on-online and select “AFIO Registration” as an option for the discounted registration fee.
Courses are typically held in our classroom in Arlington, Virginia (just 2 blocks from the Ballston metro stop) unless otherwise noted. Individual enrollment courses are unclassified.
Visit us at www.theintelligenceacademy.net/openacademy for more information.
Saturday, 20 June 2015, 1-4pm - Washington, DC - Unlikely Warriors: The Army Security Agency's Secret War in Vietnam 1961-1973 at the International Spy Museum
Come to the International Spy Museum Store for an in-store book signing of "Unlikely Warriors" by authors Lonnie M. Long and Gary B. Blackburn. The military history book takes readers into the Vietnam War and follows members of the Army Security Agency (ASA) as they conduct top secret missions.
Long and Blackburn chart the years that ASA operated in Vietnam – occurring from 1961 to 1973. With each story, many of which have never been told, readers will find themselves in awe as they learn about specific operations, incidents and battles that involved ASA personnel.
“We want the reader to come away with an appreciation for the job those thousands of young men did and the many thousands of lives they saved through their efforts,” say Long and Blackburn.
“Powerful. Compelling. Insightful. Exciting. A much needed historical account of the many first-hand heroic and harrowing events in America's most misunderstood war.”―Colonel David E. Servinsky, US Army (retired), Ph.D., Executive Communications and Support, National Security Agency/Central Security Service Colorado; former professor - National War College; former Deputy Director - National Security Operations Center (NSOC), NSA.
“A great read about an important part of our military history. The authors have opened the door to a critical warfighting capability that has for too long been held a close secret to only a few. It is time that the door was flung wide open and the true nature of their work revealed.”
Tickets: FREE! No reservation required. Visit www.spymuseum.org
Wednesday, 24 June 2015, noon - Washington DC - How to Catch a Russian Spy at the International Spy Museum
For three nerve-wracking years, Naveed Jamali spied
on the US for the Russians―or so the Russians believed. Hear Naveed
bring his unbelievable, yet true, story to life. By trading thumb drives
of sensitive technical data for envelopes of cash, he pretended to sell
out his own country across noisy restaurant tables and in quiet parking
lots. Although he had no formal espionage training, with the help of an
initially reluctant FBI duo he ended up at the center of a highly
successful CI operation that targeted Russian espionage in New York
City. With news about Russia’s disintegrating relationship with the US a
frequent headline and political hot topic, How to Catch a Russian Spy is the one-of-a-kind story of how one young man’s post-college adventure became a real-life US counterintelligence coup.
Tickets: Free! No reservation required. Visit www.spymuseum.org
22 - 25 June 2015 - Arlington, VA - 11th Annual IAFIE Conference "Preparing the Next Generation of Intelligence Analysts for a Changing World."
Marymount University is host to the 11th Annual Conference of the International Association for Intelligence Education. (IAFIE).
There continues to be enormous challenges that threaten US national security and the global world order. A growing sense of urgency to try to understand these events and anticipate new challenges has forced us to rethink how we will confront the future. In a changing world this means focusing attention on how we prepare future scholars and practitioners that will be called on to explore these challenges.
This IAFIE conference will revolve around the theme of “Preparing the Next Generation of Intelligence Analysts in a Changing World.” The conference panel discussions will be divided along two tracks. One track will explore the pedagogical developments and innovations that are emerging to provide prospective and current analysts will the skill sets needed to tackle analytic problems. The second track will explore some of the challenges that analysts may have to confront during the remainder of the 21st Century.
The conference will host an opening reception on the evening of
Monday, 22 June followed by two and one half days of speakers, panels
and presentations. The cost of the event is $400 for non-members and
$100 for students. Other rates apply. Payment Instructions: Credit card
online. To pay by check contact Michelle Henderson at firstname.lastname@example.org for instructions.
The conference agenda, when made available, will be posted here.
Event Location: Marymount University, 2807 N Glebe Rd, Arlington, VA 22207; 814-824-2131. Registration is open. Register here.
Additional Event Information: Michelle Henderson, Phone: 814-824-2131, Email: email@example.com
Friday, 26 June 2015, 1-4pm - Washington, DC - Meet a Counterintelligence Officer - Christopher Lynch at the International Spy Museum
Come to the Spy Museum store and meet Christopher Lynch! Lynch was a Counterintelligence Officer, first in the FBI, and then in the CIA, for thirty years. As an Operations Analyst, he specialized in the KGB in assessing tradecraft and in detecting hostile control.
Watch Christopher in Inside the Secrets: Counter Intelligence, where he talks about his experience in a counter intelligence office and compares it to the popular FX show The Americans.
Tickets: FREE! No reservation required. Visit www.spymuseum.org
Wednesday, 1 July 2015, 6:30pm - Washington DC - "Tracking the Elusive Pueblo" at the International Spy Museum
In January 1968, at the height of the Vietnam War, North Korea captured the USS Pueblo. The seizure of the ship, equipped with electronic and signals intelligence systems and 83 crewmen, provoked outrage in the US, with some calling for a nuclear response. What really happened during this hot Cold War incident? CDR Douglas Hackett, USN (Ret.) will explore the Pueblo’s surveillance mission, and provide the definitive naval intelligence assessment of whether the Pueblo was in North Korean waters, based on North Korean-provided information. He’ll also share the US government’s response to the crisis, North Korea’s motivation, what happened to the crew who were held prisoner for nearly a year, and what has become of the Pueblo today."
Tickets: $8. Visit www.spymuseum.org
Thursday, 9 July 2015, 6:30pm - Washington DC - "code name: CYNTHIA" - A Spy Musical - at the International Spy Museum
Get yourself to this staged reading and singing of the action-packed new spy musical celebrating the exploits of Betty Thorpe whose real spy career ranged from Madrid to Warsaw to Washington.
Presented by the Pallas Theatre Collective, "code name: CYNTHIA" opens as Paris falls to the Nazis and master spy Betty Thorpe (code name: Cynthia) barely escapes with her life. When a mysterious mastermind blackmails the stunning beauty back into intelligence for the Allies, Betty resolves to seduce the enemy, steal France's naval codes from the Vichy Embassy in Washington, DC, and save her own delicate world from falling to pieces. This lyrical homage features music by Karen Multer and book and lyrics by Steve Multer, a 2014 finalist for the Kleban Prize in Musical Theatre.
Tickets: FREE! No reservation required. Visit www.spymuseum.org
Wednesday, 15 July 2015, noon - Washington, DC - The Billion Dollar Spy: Author Debriefing at the International Spy Museum
While getting into his car on the evening of February 16, 1978, the chief of the CIA's Moscow station was handed an envelope by an unknown Russian. Its contents stunned the Americans: details of top secret Soviet research and development in military technology that was totally unknown to the United States.
From David Hoffman, the Pulitzer Prize-winning author of The Dead Hand, comes the riveting story of the CIA's most valuable spy in the Soviet Union and an evocative portrait of the agency's Moscow station, an outpost of daring espionage in the last years of the Cold War. Drawing on previously secret documents obtained from the CIA, as well as interviews with participants, Hoffman will reveal how the depredations of the Soviet state motivated one man to master the craft of spying against his own nation until he was betrayed to the KGB by a disgruntled former CIA trainee. No one has ever told this story before in such detail, and Hoffman's deep knowledge of spycraft, the Cold War, and military technology makes him uniquely qualified to bring to the International Spy Museum this real life espionage thriller.
Tickets: FREE! No reservation required. Visit www.spymuseum.org
14 October 2015, 6 - 9 pm - Arlington, VA - Silver Anniversary Gala and Chancellor's Dinner by Institute of World Politics
Hold the date. Dr. Lenczowski and the Trustees of The Institute of
World Politics invite members to attend the Silver Anniversary Gala and
Chancellor's Dinner with Keynote Speaker Lieutenant General Michael T. Flynn, US Army(Ret), 18th Director of DIA.
Location: The Ritz-Carlton, Pentagon City, Arlington, VA. Further details to follow. Questions to Jennifer E. Giglio at JGiglio@iwp.edu.
Disclaimers and Removal Instructions
Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers.
REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs:
a) IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list. If this link doesn't open a blank email, create one on your own and send to firstname.lastname@example.org with the words: REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.
b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to email@example.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.
CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at firstname.lastname@example.org. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm
WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor's) or author's) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!
(c) 2000, 2012, 2013, 2014, Please note AFIO's new address: AFIO, 7700 Leesburg Pike Suite 324, Falls Church, Virginia 22043. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: email@example.com
Click here to return to top.