AFIO Weekly Intelligence Notes #26-15 dated 30 June 2015

If you are having difficulties with the links or viewing this newsletter when it arrives by email, members may view the latest edition each week at this link: https://www.afio.com/pages/currentwin.htm You will need your LOGIN NAME and your PASSWORD.
[Editors' Note are now below the CONTENTS]
REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs, click here.

CONTENTS

Section I - INTELLIGENCE HIGHLIGHTS

Section II - CONTEXT & PRECEDENCE

Section III - COMMENTARY

Section IV - Research Requests, Obituaries, and Upcoming Events

Research Requests

Obituaries

Upcoming AFIO Events

Other Upcoming Events

For Additional AFIO and other Events two+ months or more... Calendar of Events 

WIN CREDITS FOR THIS ISSUE: The WIN editors thank the following special contributors:  cf, pjk, and fwr.  They have contributed one or more stories used in this issue.

The WIN editors attempt to include a wide range of articles and commentary in the Weekly Notes to inform and educate our readers. However, the views expressed in the articles are purely those of the authors, and in no way reflect support or endorsement from the WIN editors or the AFIO officers and staff. We welcome comments from the WIN readers on any and all articles and commentary. IMPORTANT: AFIO does not "vet" or endorse research inquiries, career announcements, or job offers. Reasonable-sounding inquiries and career offerings are published as a service to our members, and for researchers, educators, and subscribers. You are urged to exercise your usual caution and good judgment when responding, and should verify the source independently before supplying any resume, career data, or personal information.]
If you are having difficulties with the links or viewing this newsletter when it arrives by email, members may view the latest edition each week at this link: https://www.afio.com/pages/currentwin.htm You will need your LOGIN NAME and your PASSWORD.

STEPTOE's CYBERLAW PODCASTS

Steptoe Cyberlaw Podcast Resources for Cybersecurity, Privacy & National Security:

AFIO's Board Member Stewart Baker, with Steptoe & Johnson, joins law colleagues, industry leaders, and others for weekly interviews released as informative Cyberlaw Podcasts. The interviews are on late-breaking topics with major national security, legal, and cyber experts. Here are a few of the latest:

Steptoe Cyberlaw Podcast – Interview with Robert Knake, Sr Fellow for Cyber Policy at the CFR on June 30, 2015
Discusses: attribution and the Astros Hack; WikiLeaks says NSA spied on French leaders; Google fights for Jake Applebaum; cyberattacks on Polish flight network; Google joins the fight on online harassment; and Toshiba and quantum cryptography. In the second half they have an interview with Robert Knake, Senior Fellow for Cyber Policy at the Council on Foreign Relations, where we discuss the OPM hack, attribution, and the pros and cons of norms.

Interview with James Baker, General Counsel, FBI on June 23, 2015
Discussants: Stewart A. Baker, Michael Vatis, Jason M. Weinstein, Alan Cohn cover growing threats to free speech: France’s censorship of Google; the European Court of Human Rights endorses liability for intermediaries; the Right to be Forgotten returns to Russia; Houston Astros’ database hack; FBI faces criticism over stingray disclosures and aerial surveillance; US Supreme Court boosts privacy rights in hotel case; White House orders all .gov sites to use SSL encryption; FISA court decides it doesn’t need an amicus; Sony is still at risk in an employee class action for the data breach; Hackback gets interest from a Congressional hearing; and In Other News: Jacob Applebaum appeals to the Chinese to release OPM files to Wikileaks; Glenn Greenwald stands up for Russia. In our second half we have an interview with James Baker, General Counsel of the FBI, where we discuss the FBI’s aerial surveillance capabilities, stingrays, “Going Dark,” encryption, and the bureau’s attribution of cyberattacks. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.

Interview with Dan Kaminsky, Chief Scientist at WhiteOps, researcher who fixed DNS security flaw on June 9, 2015

Stewart A. Baker, Michael Vatis, Jason M. Weinstein June 9, 2015 In our seventieth episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Michael Vatis, and Jason Weinstein discuss: this week in NSA: the USA Freedom bill takes effect; a New York Times article claims that the NSA’s cybersecurity monitoring is a privacy issue; failed MasterCard settlement with Target; Office of Personnel Management hack; US response to Russia’s censorship laws; Supreme Court ruling on online threats; and FBI asks for CALEA to be expanded to social media. In our second half we have an interview with Dan Kaminsky, Chief Scientist at WhiteOps and the cybersecurity researcher who found and helped fix a DNS security flaw. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.

Jason Brown, the Assistant to the Special Agent in Charge of the Cyber Intelligence Section at the US Secret Service on 2 June 2015

Julian Sanchez, senior fellow at the CATO Institute where he studies issues at the busy intersection of technology, privacy, and civil liberties, with a particular focus on national security and intelligence surveillance on 27 May 2015

Dan Geer, a legendary computer security commentator and current CISO for In-Q-Tel on 19 May 2015

Subscribe to the Cyberlaw Podcast here. We are also now on iTunes and Pocket Casts!

Also suggested is to explore Steptoe's superb Cyber Blog.


SPECIAL Announcements

EVENT RESTRICTIONS HAVE BEEN CHANGED: You can attend Day One at CIA if you have been an employee, at some time, of any member agency of the Intelligence Community (or are now currently with, or retired from, one of those agencies). A spouse or guest accompanying you may attend regardless of no prior IC employment. Restrictions do not apply to Day Two.

CIRA (Central Intelligence Retirees Association) and
AFIO (Association of Former Intelligence Officers) are holding a joint conference and celebration of our 40th anniversaries
on 25-26 August 2015.


Day One - Tuesday, 25 August: This celebration coincides with the next CIA Annuitant Reunion on 25 August where many CIRA and AFIO members, who are CIA retirees, will be in attendance.
AFIO and CIRA members who are CIA annuitants and who retired on an even year, have been invited directly by CIA and should sign up for that day when the CIA invitation arrives in your inbox. Annuitants of odd years who wish to attend may register through the links below.
RESTRICTION: To attend Day One at CIA you need to have been an employee, at some time, of any member agency of the Intelligence Community (or are now currently with, or retired from, one of those agencies). A spouse accompanying you may attend without prior IC employment. Restriction does not apply to Day Two.

Day Two - Wednesday, 26 August: The conference expands and continues on Day Two at the Sheraton Tysons Hotel, with many CIA, CIRA, AFIO, and other IC speakers and panelists. This second day ends with a "Spies in Black Ties"™ Anniversary Reception and Awards Banquet.

pdf is attached Invitation Letter to Members

pdf is attached Tentative Agenda

To apply securely online, use form here.

To print-and-mail a pdf is attached registration form, open it here.

Space at this special event is limited.

If you have questions, contact us at afio@afio.com


AFIO Members...are you a victim of the OPM Data Breach?

All notices regarding the breach will come from CSID, a private identity protection company hired by OPM to provide services to those affected by the data breach. The notice you receive may be either an email or a mailed letter. If an email, it will come from opmcio@csid.com; a letter will be on CSID letterhead and will contain phone numbers and websites to contact them. Every individual whose personal information has been compromised will be covered by a $1 million identity theft protection policy and will have access to full-service identity restoration provided by CSID. In addition, you will be offered the option to enroll in the CSID Protector Plus program - free of charge for 18 months. Other firms, e.g., Life Lock, offer similar programs.
Be CAUTIOUS. There are now many fake emails [phishing] being sent to look like CSID or OPM. If you have received notification, you should not click on any of the links and should, instead, visit the website established by CSID for OPM: www.csid.com/OPM. On this site you will be able to enroll in the program and get related information.

In addition to security guidelines sent to you separately by your agency and from CSID,
as well as placing fraud alerts on your credit accounts with a credit reporting firm, here are a few additional suggestions for ID, banking, and credit protection:

  1. The latest updates from OPM on this major breach of their data systems
  2. Watch video here by the National Counterintellience and Security Center (NCSC) Deputy Director.
  3. Slides from the program are here.
  4. FBI Guidance to Government Employees and Contractors is here and notes from an FBI SA presentation on ID Theft is here.
  5. The Office of the Inspector General, Social Security Administration provides the following guidelines.
  6. The U.S. Department of Justice has issued these guidelines.
  7. Of interest is the Center for Identity Management and Information Protection at Utica College.
[AFIO thanks cf and others for several of the above suggestions]

Silver Anniversary Gala and Chancellor's Dinner by Institute of World Politics
6 - 9 pm on 14 October 2015
The Ritz-Carlton, Pentagon City, Arlington, VA

Since its founding, IWP has grown into the nation's premier graduate school dedicated to developing leaders with a sound understanding of international realities and the ethical conduct of statecraft, based on knowledge and appreciation of the founding principles of the American political economy and the Western moral tradition.
Location: The Ritz-Carlton, Pentagon City, 1250 South Hayes St, Arlington, VA 22202
Sponsorship & Tickets: For information on sponsorship opportunities and ticket purchases, please contact Jennifer Giglio at 202.462.2101 ext. 312 or jgiglio@iwp.edu.
Accommodations: A limited room block held at The Ritz-Carlton, Pentagon City is available at the rate of $269 per night.
To make your reservation, please click here. Input the Arrival Date, Departure Date and Group Code: WPGWPGA.
To make your reservation, by phone, please call 1.800.241.3333. Reference the Group Name: The Institute of World Politics
Schedule of Events: 6:00 pm Cocktail Reception, 7:00 pm Dinner and Program
Keynote Speaker: Lt. Gen. Michael T. Flynn, USA (Ret.), 18th Director of the Defense Intelligence Agency
Entertainment: Keni Thomas, Award winning Nashville singer-song writer and a decorated combat veteran with the elite 75th Ranger Regiment special operations unit.
Attire: Black Tie or Military Dress Equivalent
Guests: An estimated 500 guests will gather to celebrate 25 years of The Institute of World Politics' accomplishments and inspire the next generation of leaders. The event will bring together national and international civic and business leaders, members of Congress, and IWP supporters to reflect on the work of the Institute.
Questions to Jennifer E. Giglio at JGiglio@iwp.edu.


NEW Gift item....

AFIO Mousepad

NEW: AFIO's Intelligence Community Mousepad

Show your colors! The full colors of the seals of all 18 members of the US Intelligence Community on this 8" round, slick surface, nonskid, rubber-backed mouse pad. Price: $20.00 for 2 pads [includes shipping to US based address, only. For foreign shipments, we will contact you with a quote.] Great gift for colleagues and self. Click photo above for larger image. Also we've heard some use it as a large drink coaster.

...ORDER NOW



Section I - INTELLIGENCE HIGHLIGHTS

After 3 Attacks, Intelligence Community Braces for More. After three terrorist attacks Friday in France, Kuwait and Tunisia, the US intelligence community is bracing for more in the coming weeks.

Two US intelligence officials told me that analysts are trying to piece together information on the three attacks to see whether they were inspired by the Islamic State's message last week urging mass murder during the Muslim month of Ramadan.

The audio message posted online from Abu Mohammed al-Adnani, the spokesman for the Islamic State, urged followers to kill infidels and Shiite Muslims, the minority sect within Islam considered apostasy by the Sunni fundamentalists at the helm of the Islamic State.

The attacks on Friday were gruesome. In Lyon, France, at least one attacker beheaded an individual at a US-owned factory. In Tunisia, gunmen killed 27 people on a beach. And in Kuwait a suicide bomber exploded himself at one of the country's largest Shiite Muslim mosques. [Read more: Lake/Bloomberg/26June2015]

Work Unveils First Space Ops Center for Intel Community and Military. For the first time, all the nation's spy satellites and the military's satellites will be tracked from a single location, allowing the two communities to develop tactics, techniques and procedures together, Deputy Defense Secretary Bob Work said here today.

"But the thing we need most is s space operations center, and we are intent on setting up a joint interagency and combined space operations in which both the IC and DoD sit," he told a standing-room only audience at the GEOINT conference. Work said this center is his "highest priority," presumably in the space realm. A spokesman for Work clarified that this would not be the lead operations center for American satellites but a backup, part of the pentagon's urgent development of space resilience in the face of the growing threats from Russia and Chinese space weapons.

Work said the new center would be operational within six months, which means it must have been in development for some time. One well informed former senior Pentagon official said Air Force Gen. John Hyten, head of Air Force Space Command, was tasked with developing the center in coordination with the National Reconnaisance Office (NRO), which builds and operates the nation's spy satellites.

"The Department is committed to creating space resiliency. As such, we are working closely with the Intelligence Community (IC) to establish a back-up to the Joint Space Operations Center that is located at Vandenberg Air Force Base in California. Details on the back-up continue to be worked," Work's spokeswoman Lt. Cmdr. Courtney Hillson said in an email. [Read more: Clark/BreakingDefense/23June2015]

Rwandan Spy Chief Heads to London to Meet Head of MI6, Gets Arrested. On Saturday, Rwanda's spy chief Gen. Karenzi Karake, who is wanted in Spain for war crimes, was arrested in London on a European Arrest Warrant. On Tuesday, he was granted bail of $1.6 million by a court in London.

Karake was to meet Alexander Younger, SIS Chief last Thursday but the meeting was canceled at the last moment, BBC reported citing the sources familiar with the official's itinerary.

The sources in Westminster neither confirmed nor denied claims about Karake's alleged engagement with MI6, the news outlet stressed.

Karake's extradition hearings are scheduled for October. [Read more: SputnikNews/26June2015]

Ex-CIA Counterterrorism Officer Challenges Dem Stalwart Steny Hoyer for Maryland's 5th District. Rep. Steny Hoyer has represented - often controversially - the residents of Maryland's 5th Congressional District, which includes Calvert, Charles and St. Mary's Counties, as well as parts of Anne Arundel and Prince George's Counties, since 1981, making him the longest-serving member of Congress from Maryland.

But also being the home to significant military facilities like the Patuxent Naval Air Station, St. Inigoes, Indian Head Naval Surface Warfare Center, the Federal Law Enforcement Training Center and NASA's Goddard Space Flight Center, Hoyer - the minority whip and de facto leader of the Democrat's shrinking moderate wing in the House - has received plenty of criticism over the impact of sequestration on the Department of Defense and Intelligence Community, both of which are pervasive in the district he represents.

"Hoyer, he's a shark who never sleeps... He's a shark with a killer disposition," Missouri Democrat Emanuel Cleaver, a senior Black Caucus member, told Politico.

Enter Charles "Sam" Faddis, who has officially thrown his proverbial hat into the ring to challenge Hoyer for his long held seat in Congress. And Faddis could prove formidable - he's a man whose intelligence, military and foreign policy experience can't be disputed. Faddis just may have the ability to be a forbidding challenger, given his background and the significant military and Intelligence Community presence in Maryland's 5th District he's vying to represent. [Read more: Kimery/HomelandSecurity/29June2015]

Intelligence Community Loves Its New Amazon Cloud. US intelligence agencies moving from legacy systems to new cloud computing infrastructure built by Amazon Web Services are pretty happy about it thus far, according to a report in NextGov.

Speaking at an AWS-sponsored conference Friday, Alex Voultepsis, chief of the National Security Agency's Engineering and Planning Office said the new cloud is helping agencies "stuck in heritage systems" start moving to the new C2S cloud, according to the report. C2S is shorthand for the commercial cloud services contract that resulted in the new cloud which started going live last August.

The use of a single set of infrastructure improves security over using older multiple data centers, speakers said. Jason Hess, cloud security manager for the National Geospatial-Intelligence Agency, the first of 17 agencies to put an application in the new cloud, said consolidation means less complexity, which makes the infrastructure easier to protect.

Two years ago, the CIA selected AWS to build and run a special, secure cloud to be used by 17 intelligence-related agencies, in a contract valued at $600 million. That was a watershed event for Amazon, the leader in public cloud services. [Read more: Darrow/Fortune/29June2015]

Afghanistan's Intelligence Service Accused a Pakistani Intelligence Officer of helping a Taliban Attack on Kabul. Afghanistan's intelligence service on Wednesday said a Pakistani intelligence officer helped the Taliban carry out an attack on the parliament in Kabul earlier this week.

Afghan intelligence services spokesman Hassib Sediqqi said the officer in Pakistan's Inter-Services Intelligence helped the Haqqani network carry out the attack outside parliament, which killed two people and wounded more than 30 as lawmakers were meeting inside.

He identified the officer as Bilal, without providing his full name.

Sediqqi says the suicide car bomb used in Monday's attack was manufactured in Peshawar, Pakistan, just across the border. He says Afghan authorities were made aware of the attack on June 10 and had deployed extra security. [Read more: AP/25June2015]

US Spy Agencies May Start Hunting Wildlife Poachers in Africa. US intelligence agencies are considering whether to provide information, analysis and possibly tactical lessons to African governments about how to attack wildlife poaching networks, according to a top official.

"We are looking for opportunities" where "we can contribute", Mr. Terrance Ford, the national intelligence manager for Africa in the office of Director of National Intelligence James Clapper, said in an interview last week.

"We haven't settled on" the next opportunity, but "it's an issue of where we can make a difference," Mr. Ford said after speaking to an intelligence conference in Washington. "We have a role to play in this, so we are trying to do that."

Infrared and photographic imagery from satellites and other data could help locate and track herds of animals and bands of poachers, and wildlife rangers would benefit from better equipment and by adapting some of the techniques, tactics and procedures used by military intelligence officers, said Mr. Ford and other US officials. [Read more: Today/29June2015]

McChrystal: More Cooperation Needed Between Military Operators, Intelligence. Information sharing and cooperation between military and intelligence communities has significantly improved but more can still be done, said retired Army Gen. Stanley McChrystal, former commander of US and International Security Assistance Forces in Afghanistan.

Intelligence and operations communities need to think alike and understand each other, McChrystal said June 23 at the 2015 GeoInt Symposium in Washington, DC.

"I tell commanders you better become intelligence [experts] because this is just a fight for information," he said. "We can kill anybody we can locate. It's no longer a case of being able to defeat the Soviet tank division. It's a case of you can defeat whatever you can find but you have to know where you're looking. You have to understand it enough. It's a different mindset."

McChrystal, who served as commander of the Joint Special Operations Command from 2003 to 2008, said the 2006 mission that killed terrorist leader Abu Musab al-Zarqawi in Iraq is good example. Following the mission's completion, McChrystal gave out one medal to an intelligence sergeant, who he said "pulled it all together," and was able to think as both an intelligence and operations perspective. [Read more: Feuss/NationalDefense/24June2015]

Fourth of July Terror Warning Issued by FBI, Homeland Security. Federal authorities have warned local law enforcement officials across the country about a heightened concern involving possible terror attacks targeting the July 4th holiday, a US law enforcement official said.

While there was no specific or credible threat of attack, the official said the intelligence bulletin prepared by the Department of Homeland Security and the FBI alerted local colleagues to the ongoing threats posed by the Islamic State and other homegrown extremists. The official was not authorized to comment publicly.

The bulletins are frequently issued in advance of major US holidays out of an abundance of caution and concern that operatives may exploit the timing to generate greater attention.

The warning comes as federal investigators have worked to disrupt a number of Islamic State-inspired plots, including a planned assault earlier this month on police officers in Boston. In that case, authorities fatally shot Usaamah Rahim as he allegedly planned to attack police with military-style knives. [Read more: Keveney&Johnson/USAToday/28June2015]

FBI Rounds up Suspected Lone Wolves. The FBI has been rounding up more potential "lone wolf" terrorists, congressional leaders and the Justice Department say, in response to the perception of a mounting threat of domestic attacks inspired by the Islamic State.

Since the thwarted attack on a "Draw Mohammed" conference in Garland, Texas, on May 3, the Justice Department has announced the arrests of 10 individuals it says were inspired by and supporting the Islamic State. The lawmakers say there have been more arrests that have not yet been announced.

They say the FBI has shifted its approach toward arrests rather than keeping suspects under surveillance, and is also targeting individuals thought to be planning attacks in the US, unlike the bureau's past focus on volunteers preparing to join Islamic State's fight abroad.

"Lately, we have seen an uptick in the number of arrests of ISIL followers who were planning violent acts in our homeland," said John Carlin, the assistant attorney general for national security. "ISIL, differing from some other foreign terrorist organizations, has demonstrated that they see value in mobilizing sympathizers anywhere in the world." [Read more: Rogin&Lake/Bloomberg/25June2015]

Geospatial Intel Will Grow in Importance, Official Says. The role of geospatial intelligence in making American special operators the best in the world cannot be understated, Theresa Marie Whelan, the principal deputy assistant secretary of defense for special operations/low-intensity conflict, said here today.

"In the course of the hand-in-glove operational and intelligence work that has spanned over a decade in two theaters, [special operations forces] operators and battlespace owners have come to expect premier intelligence collection, data and all-source analysis that paint a very clear picture of the battlefield," Whelan said at the GEOINT Symposium.

The collection of intelligence has changed the way the US military does business, she said.

"I believe the relationships between the intelligence community, the operators and the policy-making communities are more productive now than ever," Whelan said. [Read more: Garamone/DODNews/23June2015]


Section II - CONTEXT & PRECEDENCE

How Hackers Unlocked OPM Systems and 6 Other Things We Learned About the Breach. Office of Personnel Management chief Katherine Archuleta wants you to know she is mad about the breach of personal identification data and background investigations on millions of federal employees. Just don’t blame OPM, she said. The hack at Archuleta’s agency is not the fault of computer security staff or a contractor who lost key login data, she testified today.

Archuleta's newly expressed empathy with infuriated breach victims and the news that attackers used credentials from background check provider KeyPoint Government Solutions are just two of the revelations that came out of a Senate hearing Tuesday. The session was the first of four public congressional grillings this week on the handling of the OPM breach.

Today, we learned: [Read more: Sternstein/NextGov/23June2015]

The Korean War Controversy: An Intelligence Success or Failure? Less than three years after its creation, the CIA became involved in its first "hot war" after North Korea launched an invasion of South Korea on June 25, 1950. The new Agency conducted an array of espionage and covert operations unilaterally and in support of US Armed Forces taking part in a UN coalition.

The most persistent controversy about the CIA and the Korean War concerns whether the Agency warned US policymakers that North Korea would attack its southern neighbor. As is typical in situations involving warning, the reality is complex, and a collection of declassified CIA documents help dispel widely held assertions that the Agency committed a serious intelligence failure.

On Sunday June 25, 1950, Communist North Korean troops, supported by Soviet-supplied tanks, heavy artillery, and aircraft, crossed the 38th parallel and invaded the Republic of South Korea. Notified at his home in Independence, MO, by Secretary of State Dean Acheson, President Harry Truman acted quickly and decisively, instructing Acheson to contact the UN to seek a resolution condemning the invasion and aid in the effort to provide assistance to South Korea.

By all appearances, the North Korean attack seemed to have caught the Truman Administration, the US Army's Far Eastern Command under Gen. Douglas A. MacArthur, and the fledgling CIA by surprise. Within days, administration and congressional critics charged that the Agency did not fulfill its primary mission of providing warning to the president, an intelligence failure of the highest magnitude. [Read more: CIA.gov/25June2015]

Why Open Data Is the Future of the National Geospatial-Intelligence Agency. Times are a changin' for the National Geospatial-Intelligence Agency.

In the past, it was the supercool, secret sauce-worthy stuff NGA did to deliver world-class geospatial intelligence to warfighters, stakeholders and decision-makers on which the agency focused the majority of its efforts.

In recent years, with the explosion of publicly available open data and tools like cloud computing, startups and talented data gurus have encroached on what used to be territory occupied by NGA and its partners. 

The agency still relies heavily on its classified operations, but in recent months, NGA Director Robert Cardillo announced a "seismic shift" underfoot that elevated the importance of unclassified sources of intelligence. To drive that effort, the agency has launched the "GEOINT Pathfinder" team to answer intelligence questions with unclassified data, agile acquisition tools and commercial technology. [Read more: Konkel/NextGov/29June2015]

Spying's Hard in Iraq, Even Harder in Syria. The United States is being forced to rely on its regional partners to provide intelligence on the Islamic State in Iraq, and particularly Syria, according to a former CIA deputy director.

For US spies, "the challenges are significant" in both countries, said Stephen Kappes, who retired in 2010 as the CIA's second in command. "On the Iraqi side, I think there's more opportunity for success," he said. "It's never good enough, but there is some collection that is solid."

US intelligence officials have long cautioned that they no longer have the ability to directly gather much ground-level information in Syria, given that most American personnel pulled out of the country several years ago. Kappes' comments Monday made clear that US intelligence is struggling to gain a foothold in the war against the Islamic State, even as President Barack Obama's administration ramps up its military presence in the extremists' self-declared caliphate.

Speaking at the Center for Strategic and International Studies, a Washington think tank, Kappes said Iraq held two advantages over Syria for US spies. He referred to "a significant number of what I call forward platforms from which you could launch" in Iraq. He would not be more specific than that, but a platform is anything from which intelligence collection can be performed, from an embassy to a satellite. [Read more: Naylor/ForeignPolicy/30June2015]


Section III - COMMENTARY

Keep Calm and Spy On: Why the OPM Hack Won't Bring Down US Intelligence. I finally got my letter from the Office of Personnel Management (OPM). What a relief. I was worried my credibility as a commentator would be damaged if my data wasn't stolen. Imagine how Dan Rather would have felt had he not received Anthrax.

In any case, in the weeks since the story broke, OPM has yet to change their story. The official number is still 4.2 million and the data that was lost is still, according to my letter, "your name, social security number, date and place of birth, and current or former address." News outlets, however, are putting the number as high as 18 million and are reporting that the Electronic Questionnaires for Investigations Processing (EQIP) system that contains information collected on form SF-86 was compromised. That would be worse than just the loss of employee personally identifiable information. It would include information on employees and contractors as well as their friends and families.

Ian Bremmer is worried about the impact on US human intelligence. He even posted a comment on CFR's Facebook page about it in response to my last piece. I'm not as concerned. Here's why: [Read more: Knake/DefenseOne/26June2015]

Why Would the US Spy on Its Allies? Because Everyone Does. The spotlight must be an uncomfortable position for intelligence organisations that would far prefer to remain in the shadows. But since Edward Snowden fled the United States in the summer of 2013, there has been an almost constant drip-feed of stories concerning the operations of the US National Security Agency (NSA) and the UK Government Communications Headquarters (GCHQ). Yet the most recent scoop - originating from Wikileaks - has shown that we would do well to consider these kinds of "revelations" with a little greater care.

At its heart, the claim that the NSA spied on French presidents Jacques Chirac, Nicolas Sarkozy and Francois Holland, effectively boils down to: "country A spied on country B." As a piece of news, this surely sits alongside the Pope's status as a Catholic. What else would we expect a national intelligence gathering agency to do? The fundamental purpose of such organizations is to seek out national advantage, in whatever field - whether it is political, economic, military, or otherwise.

The "twist" that makes the story newsworthy, we are told, is the fact that it reveals "spying on friends." A similar claim was made in October 2013, when the NSA was accused of targeting the German chancellor, Angela Merkel. A theatre of moral outrage followed, and the US ambassador was summoned to meet with the foreign minister.

But Merkel's statement that "spying on friends is not on at all" was soon undermined when Der Spiegel claimed that German intelligence had "accidentally" eavesdropped on both secretaries of state Hillary Clinton and John Kerry. Earlier this year, it was also claimed that German intelligence had spied on both the French government and the EU Commission, and passed on the products to the US.

The press (and indeed the politicians) would perhaps do well to remember the pragmatic reality that, in the world of intelligence, there are no "friends." [Read more: Murphy/CNN/25June2015]

The Education Impact on Broadening Intelligence Career Options. In my day-to-day work, I'm often asked questions like: What research paper topics are important to the intelligence community? What classes should I take? I'm currently working in (or would like to work in) the intelligence community, in what program should I enroll for my next degree? When it comes to this last question, students are often thrown through a loop when I respond with, "Well, what do you want to do within the intelligence community?" It's almost as if we default to jobs like that of those of actors played by Claire Danes or Rupert Friend on the popular TV show Homeland. While these roles are no doubt made salient by Hollywood, careers within the intelligence community are pretty diverse.

There appears to be a common misconception that people seeking intelligence community (IC) jobs, or to move their IC careers forward, should only be focused on studying political science or intelligence studies. In actuality, getting a degree in these areas is a good start, but it doesn't end there. For students looking to work in IC, the first thing they should realize is that it's an extremely interdisciplinary career field with a lot of job variety. By interdisciplinary I mean that it pulls from a wide variety of subject areas, similar to jobs in international relations, or homeland security. To capitalize on this diversity, students should spend time contemplating what interests them, and examine how different degrees might make them more marketable, either in their current positions, or later should they ever want to change careers.

If I were a student completing a bachelor's in intelligence studies, it might make sense for me to continue to pursue a master's degree in the same area. But just because you get one degree in intelligence studies, doesn't mean you have to get a second. For example, think about a person that already has a bachelor's in intelligence studies. What kind of doors might open up if they were to pursue a master's in economics, finance or business? With such a degree combination, one could pursue a path focusing on illicit finance, business intelligence and corporate espionage, for example. Some of the more obvious degree pairings may include intelligence studies (either a bachelor's or master's) coupled with psychology, anthropology, history or ever- proliferating degrees in cybersecurity. But the options don't end here. [Read more: Drumhiller/InHomelandSecurity/25June2015]


Section IV - Research Requests, Obituaries, and Upcoming Events


Research Request

Historian seeks assistance on Berlin Tunnel, Michael Goleniewski, George Blake, Pyotr Popov, and Donald Vogel

Former Washington Post reporter Steve Vogel, author of books on the history of the Pentagon and the War of 1812, is looking for assistance with a history of the Berlin Tunnel (1954-56) built to gather intelligence on the Soviet Union during the Cold War. Vogel would like to speak to anyone involved with the planning, construction, intelligence collection, processing, translation, or any other aspect of the tunnel operation and its aftermath. He also would like to speak to speak to anyone involved in the Michael Goleniewski case, which led to the arrest of British double agent George Blake, as well as the case of Pyotr Popov. Vogel is also interested in hearing from anyone who worked with his father, Donald Vogel (former CIA), in Berlin from 1957-1962. Anyone wishing to assist with this project may contact Vogel at sfvogel5@gmail.com, telephone at (301) 349-5013.

Obituaries

Hugh Tovar, CIA Operative at the Center of Cold War Intrigues, Dies at 92. Hugh Tovar, 92, who was at the center of two of the CIA's most controversial covert action operations during the Cold War, died of natural causes just after midnight June 27. He was a life member of AFIO.

Tovar was the CIA station chief in Malaysia and Indonesia in the 1960s and then Laos and Thailand in the 1970s, while the US and Soviet Union were locked in proxy wars around the world, most directly in Southeast Asia. For a time he was also chief of the CIA's covert action and counterintelligence sections at its headquarters in Langley, Virginia.

Tovar's assignments put him on the cutting edge of CIA operations at the time, much like the today's counterterrorism specialists, said Colin Thompson, a former CIA officer who served under Tovar in Thailand and later in the CIA's counterintelligence branch.

"Hugh was one of a small group of senior East Asia officers...who were to the CIA in the '60s and '70s what the [agency's] leaders in Middle East operations are today," said Thompson, who also worked in Laos, where Tovar was station chief from 1970 to 1973, at the height of the CIA's so-called "secret war" there. [Read more: Stein/Newsweek/29June2015]

Phil W. Kaufman. Phil W. Kaufman, 90, a former CIA Operations Officer, died 30 May 2015, in Rockville, MD, of sudden heart failure while traveling to a dinner engagement with family near his home.

Phil graduated high school early eager to join the WWII war effort serving with the US Navy as a radioman monitoring German submarines in the North Atlantic. This activity was later revealed to have produced invaluable information fed to Turing machines (Enigma decoders) in Bletchley Park, England much hastening the end of the War as told in the recent Imitation Game book and film. After the war he graduated in journalism from the University of Iowa and went to Washington, DC, where he studied political science at American University and began work in what was to become the US Information Agency.

Phil began his original CIA appointment in 1950 as an Information and Editorial Spec. GS-5. In 1952 he was assigned to a Foreign Broadcast Information Service [FBIS] post northwest of London, England where he served for four years while living in Henley-on-Thames embarking on a career in political liaison and intelligence that spanned the Cold War era. From 1956 to 1960 he worked in the Washington, DC area until a post in London vacated and he took that position - liaising with British Foreign Intelligence (MI-6) and rising to become a Branch Chief for Covert Action in Western Europe - until 1964. On return to the US he served in the EUR/DDO Division in the new headquarters building of CIA until his retirement in 1981 with over 30 years of service. After retirement he was presented with a career achievement award.

His long association with England developed in Phil an abiding love and admiration for the British people, country and culture. Upon retirement he returned to England and there he met his new life partner Pamela Blank (surviving) and stayed on for 33 years, playing golf and snooker, enjoying the Suffolk countryside of fields and thatched roof cottages.

His wife predeceased him. He is survived by a son, seven grandchildren, six great-grandchildren, and other relatives. [Read more: RoyWBarberFuneralHome/June2015]


AFIO EDUCATIONAL EVENTS IN COMING TWO MONTHS....

15 July 2015, 11:30am - 2pm - San Francisco, CA - The AFIO Andre LeGallo Chapter hosts John Lightfoot, Assistant Special Agent in Charge of the Counterterrorism branch in the FBI San Francisco Division.

Topic will be "Current Issues in Terrorism: Here and Over There". ASAC Lightfoot will discuss Al-Q'aida today, the rise and threat of the Islamic State, domestic groups and updates on recent Bay Area cases. 11:30AM no host cocktails; meeting starts at noon. Note different location: Basque Cultural Center: 599 Railroad Ave, South San Francisco, CA 94080.
E-mail RSVP to Mariko Kawaguchi at afiosf@aol.com with your meal choice (Salmon with Champagne Sauce OR Breast of Chicken Chasseur) and you will be sent an Eventbrite link to register. Alternately, mail a check made out to "AFIO" to: Mariko Kawaguchi, P.O. Box 117578, Burlingame, CA 94011. Members and students: $25; non-members $35. $35 at the door. RSVP is required by July 3, 2015 - no walk-ins.

Tuesday, 11 August 2015 - MacDill AFB, Florida - The AFIO Suncoast Chapter hosts Karl D. Klicker, EdD, speaking on the Islamic State.

Dr. Karl Klicker is a retired Marine Corps Intelligence Officer, currently employed by Jacobs Technology as Principal Strategist supporting US Special Operations Command. He has served on psychological operations, civil affairs, interagency task force and strategic planning teams.
Klicker is the author of Indoc: Ideology, Propaganda and Conflict in the Corps and al-Qaida, a study of internal cultural tensions within the Marine Corps, the roots of division in the Sunni and Shi’a camps; the social psychology of recruiting for war; and the ongoing conflict between radical Islamists and America’s armed forces.

LOCATION: MacDill AFB Surf’s Edge Club, 7315 Bayshore Blvd, MacDill AFB, FL 33621. Please RSVP by 15 August to the Chapter Secretary for yourself and include the names and email addresses of any guests. Email or call Michael Shapiro at sectysuncoastafio@att.net. You will receive a confirmation via email. If you do not, contact the Chapter Secretary to confirm your registration. Check-in at noon; opening ceremonies, lunch and business meeting at 1230 hours, followed by our speaker.
FEE: You must present your $20 check payable to “Suncoast Chapter, AFIO” (or cash) at check-in to cover the luncheon. If you make a reservation, don’t cancel and get a cancellation confirmation by the response deadline and then don’t show up, you will be responsible for the cost of the luncheon.

25 - 26 August 2015 - McLean, VA - CIRA and AFIO's 40th Anniversary Conference and Celebration
CIRA (Central Intelligence Retirees Association) and AFIO (Association of Former Intelligence Officers) are holding a joint conference and celebration of our 40th anniversaries on 25-26 August 2015.
Day One - Tuesday, 25 August: This celebration coincides with the next CIA Annuitant Reunion on 25 August where many CIRA and AFIO members, who are CIA retirees, will be in attendance.
AFIO and CIRA members who are CIA annuitants and who retired on an even year, have been invited directly by CIA and should sign up for that day when the CIA invitation arrives in your inbox. Annuitants of odd years who wish to attend may register through the links below.
RESTRICTION: To attend Day One at CIA you need to have been an employee, at some time, of any member agency of the Intelligence Community (or are now currently with, or retired from, one of those agencies). A spouse accompanying you may attend regardless of no prior IC employment. Restriction does not apply to Day Two.
Day Two - Wednesday, 26 August: The conference expands and continues on Day Two at the Sheraton Tysons Hotel, with many CIA, CIRA, AFIO, and other IC speakers and panelists. This second day ends with a "Spies in Black Ties"™ Anniversary Reception and Awards Banquet.

Invitation Letter to Members

pdf is attached Tentative Agenda

To apply securely online, use form here.

To print-and-mail a pdf is attached registration form, open it here.

Space at this special event is limited.

If you have questions, contact afio@afio.com

Monday 28 September 2015 - New York, NY - AFIO Metro NY Chapter hears former FBI Special Agent Edward M. Stroz

Speaker Edward Stroz, former FBI, now with the NYC-based firm of Stroz Friedberg, a global leader in investigations, intelligence, and risk management. Topic and registration details to follow in coming weeks. 
Stronz was a Special Agent for the FBI before founding Stroz Friedberg in 2000. He is an expert on electronic evidence and investigations, internet extortions, denial of service attacks, computer hacking, insider abuse, theft of trade secrets, electronic discovery matters, and regularly provides expert testimony on these matters. Mr. Stroz pioneered the use of behavioral science in investigations to gain insights about intent and state-of-mind of computer users. He has supervised hundreds of forensic assignments in assisting corporate clients, trial counsel, individuals, and has conducted security assessments for major public and private entities. While at the Bureau, Stroz was responsible for the formation of the FBI’s Computer Crime Squad in New York City, where he supervised investigations involving computer intrusions, denial of service attacks, illegal Internet wiretapping, fraud, and violations of intellectual property rights, including trade secrets. 
Location: Society of Illustrators building, 128 East 63rd St, between Park Ave and Lexington Ave.
COST: $50/person Cash or check, payable at the door only. Dinner to follow talk & Q&A. Cash bar. RESERVATIONS: Strongly suggested, not required, Email Jerry Goodwin afiometro@gmail.com or phone 646-717-3776.


Other Upcoming Events

Wednesday, 1 July 2015, 6:30pm - Washington DC - "Tracking the Elusive Pueblo" at the International Spy Museum

In January 1968, at the height of the Vietnam War, North Korea captured the USS Pueblo. The seizure of the ship, equipped with electronic and signals intelligence systems and 83 crewmen, provoked outrage in the US, with some calling for a nuclear response. What really happened during this hot Cold War incident? CDR Douglas Hackett, USN (Ret.) will explore the Pueblo’s surveillance mission, and provide the definitive naval intelligence assessment of whether the Pueblo was in North Korean waters, based on North Korean-provided information. He’ll also share the US government’s response to the crisis, North Korea’s motivation, what happened to the crew who were held prisoner for nearly a year, and what has become of the Pueblo today."

Tickets: $8. Visit www.spymuseum.org

Wednesday, 8 July 2015, noon - Washington, DC - Global Terrorism, Espionage and Cybersecurity Monthly Update

Be the first to learn the latest intelligence news! Join David Major, a retired Supervisory Special Agent of the FBI and Director of Counterintelligence and Security Programs at the National Security Council staff at the White House, for a briefing on the hottest intelligence and security issues, breaches, and penetrations.

Presented in partnership with The Centre for Counterintelligence and Security Studies (CI Centre), these updates will cover worldwide events such as breaking espionage cases and arrest reports, cyber espionage incidents, and terrorist activity.

Find out Snowden’s current status and what could happen next with this case. Major uses his expertise to analyze trends and highlight emerging issues of interest to both intelligence and national security professionals and the public.

Cases are drawn from the CI Centre’s SPYPEDIA®, the most comprehensive source of espionage information in the world, containing events and information that may not be reported by mainstream media outlets.

Tickets: FREE! No reservation required. Visit www.spymuseum.org

Thursday, 9 July 2015, 6:30pm - Washington DC - "code name: CYNTHIA" - A Spy Musical - at the International Spy Museum

Get yourself to this staged reading and singing of the action-packed new spy musical celebrating the exploits of Betty Thorpe whose real spy career ranged from Madrid to Warsaw to Washington.

Presented by the Pallas Theatre Collective, "code name: CYNTHIA" opens as Paris falls to the Nazis and master spy Betty Thorpe (code name: Cynthia) barely escapes with her life. When a mysterious mastermind blackmails the stunning beauty back into intelligence for the Allies, Betty resolves to seduce the enemy, steal France's naval codes from the Vichy Embassy in Washington, DC, and save her own delicate world from falling to pieces. This lyrical homage features music by Karen Multer and book and lyrics by Steve Multer, a 2014 finalist for the Kleban Prize in Musical Theatre.

Tickets: FREE! No reservation required. Visit www.spymuseum.org

Wednesday, 15 July 2015, noon - Washington, DC - The Billion Dollar Spy: Author Debriefing at the International Spy Museum

While getting into his car on the evening of February 16, 1978, the chief of the CIA's Moscow station was handed an envelope by an unknown Russian. Its contents stunned the Americans: details of top secret Soviet research and development in military technology that was totally unknown to the United States.

From David Hoffman, the Pulitzer Prize-winning author of The Dead Hand, comes the riveting story of the CIA's most valuable spy in the Soviet Union and an evocative portrait of the agency's Moscow station, an outpost of daring espionage in the last years of the Cold War. Drawing on previously secret documents obtained from the CIA, as well as interviews with participants, Hoffman will reveal how the depredations of the Soviet state motivated one man to master the craft of spying against his own nation until he was betrayed to the KGB by a disgruntled former CIA trainee. No one has ever told this story before in such detail, and Hoffman's deep knowledge of spycraft, the Cold War, and military technology makes him uniquely qualified to bring to the International Spy Museum this real life espionage thriller.

Tickets: FREE! No reservation required. Visit www.spymuseum.org

14 October 2015, 6 - 9 pm - Arlington, VA - Silver Anniversary Gala and Chancellor's Dinner by Institute of World Politics

Since its founding, IWP has grown into the nation's premier graduate school dedicated to developing leaders with a sound understanding of international realities and the ethical conduct of statecraft, based on knowledge and appreciation of the founding principles of the American political economy and the Western moral tradition.
Location: The Ritz-Carlton, Pentagon City, 1250 South Hayes St, Arlington, VA 22202
Sponsorship & Tickets: For information on sponsorship opportunities and ticket purchases, please contact Jennifer Giglio at 202.462.2101 ext. 312 or jgiglio@iwp.edu.
Accommodations: A limited room block held at The Ritz-Carlton, Pentagon City is available at the rate of $269 per night.
To make your reservation, please click here. Input the Arrival Date, Departure Date and Group Code: WPGWPGA.
To make your reservation, by phone, please call 1.800.241.3333. Reference the Group Name: The Institute of World Politics
Schedule of Events: 6:00 pm Cocktail Reception, 7:00 pm Dinner and Program
Keynote Speaker: Lt. Gen. Michael T. Flynn, USA (Ret.), 18th Director of the Defense Intelligence Agency
Entertainment: Keni Thomas, Award winning Nashville singer-song writer and a decorated combat veteran with the elite 75th Ranger Regiment special operations unit.
Attire: Black Tie or Military Dress Equivalent
Guests: An estimated 500 guests will gather to celebrate 25 years of The Institute of World Politics' accomplishments and inspire the next generation of leaders. The event will bring together national and international civic and business leaders, members of Congress, and IWP supporters to reflect on the work of the Institute.
Questions to Jennifer E. Giglio at JGiglio@iwp.edu.


Disclaimers and Removal Instructions

Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers. 

REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs: 

a)  IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list.  If this link doesn't open a blank email, create one on your own and send to afio@afio.com with the words:  REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.

 b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to afio@afio.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.

CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at afio@afio.com. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm


WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor's) or author's) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!

(c) 2000, 2012, 2013, 2014, 2015. Please note AFIO's new address: AFIO, 7700 Leesburg Pike Suite 324, Falls Church, Virginia 22043. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: afio@afio.com

Click here to return to top.