AFIO Weekly Intelligence Notes #27-15 dated 7 July 2015

If you are having difficulties with the links or viewing this newsletter when it arrives by email, members may view the latest edition each week at this link: https://www.afio.com/pages/currentwin.htm You will need your LOGIN NAME and your PASSWORD.
[Editors' Note are now below the CONTENTS]
REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs, click here.

CONTENTS

Section I - INTELLIGENCE HIGHLIGHTS

Section II - CONTEXT & PRECEDENCE

Section III - COMMENTARY

Section IV - Upcoming Events

Upcoming AFIO Events

Other Upcoming Events

For Additional AFIO and other Events two+ months or more... Calendar of Events 

WIN CREDITS FOR THIS ISSUE: The WIN editors thank the following special contributors:  pjk, and fwr.  They have contributed one or more stories used in this issue.

The WIN editors attempt to include a wide range of articles and commentary in the Weekly Notes to inform and educate our readers. However, the views expressed in the articles are purely those of the authors, and in no way reflect support or endorsement from the WIN editors or the AFIO officers and staff. We welcome comments from the WIN readers on any and all articles and commentary. IMPORTANT: AFIO does not "vet" or endorse research inquiries, career announcements, or job offers. Reasonable-sounding inquiries and career offerings are published as a service to our members, and for researchers, educators, and subscribers. You are urged to exercise your usual caution and good judgment when responding, and should verify the source independently before supplying any resume, career data, or personal information.]
If you are having difficulties with the links or viewing this newsletter when it arrives by email, members may view the latest edition each week at this link: https://www.afio.com/pages/currentwin.htm You will need your LOGIN NAME and your PASSWORD.

STEPTOE's CYBERLAW PODCASTS

Steptoe Cyberlaw Podcast Resources for Cybersecurity, Privacy & National Security:

AFIO's Board Member Stewart Baker, with Steptoe & Johnson, joins law colleagues, industry leaders, and others for weekly interviews released as informative Cyberlaw Podcasts. The interviews are on late-breaking topics with major national security, legal, and cyber experts. Here are a few of the latest:

Steptoe Cyberlaw Podcast – Interview with Catherine Lotrionte, Assoc Dir Institute for Law, Science, Global Security at Georgetown University, on 7 July 2015
Discussants: Stewart A. Baker, Michael Vatis, Jason M. Weinstein China’s new security law; FTC settles with a virtual currency mining app makers; This Week in Hacks: FBI report ties Anthem and OPM hack; Anthem class action filed; OPM class action; FTC releases new security guidance; Foreign Intelligence Surveillance Court reauthorizes metadata program; WikiLeaks rolls out more alleged NSA docs; Russia modifies its right to be forgotten bill. In our second half we have an interview with Catherine Lotrionte, Associate Director of the Institute for Law, Science and Global Security at Georgetown University.

Interview with Robert Knake, Sr Fellow for Cyber Policy at the CFR on 30 June 2015
Discusses: attribution and the Astros Hack; WikiLeaks says NSA spied on French leaders; Google fights for Jake Applebaum; cyberattacks on Polish flight network; Google joins the fight on online harassment; and Toshiba and quantum cryptography. In the second half they have an interview with Robert Knake, Senior Fellow for Cyber Policy at the Council on Foreign Relations, where we discuss the OPM hack, attribution, and the pros and cons of norms.

Interview with James Baker, General Counsel, FBI on 23 June 2015
Discussants: Stewart A. Baker, Michael Vatis, Jason M. Weinstein, Alan Cohn cover growing threats to free speech: France’s censorship of Google; the European Court of Human Rights endorses liability for intermediaries; the Right to be Forgotten returns to Russia; Houston Astros’ database hack; FBI faces criticism over stingray disclosures and aerial surveillance; US Supreme Court boosts privacy rights in hotel case; White House orders all .gov sites to use SSL encryption; FISA court decides it doesn’t need an amicus; Sony is still at risk in an employee class action for the data breach; Hackback gets interest from a Congressional hearing; and In Other News: Jacob Applebaum appeals to the Chinese to release OPM files to Wikileaks; Glenn Greenwald stands up for Russia. In our second half we have an interview with James Baker, General Counsel of the FBI, where we discuss the FBI’s aerial surveillance capabilities, stingrays, “Going Dark,” encryption, and the bureau’s attribution of cyberattacks. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.

Interview with Dan Kaminsky, Chief Scientist at WhiteOps, researcher who fixed DNS security flaw on 9 June 2015

Stewart A. Baker, Michael Vatis, Jason M. Weinstein June 9, 2015 In our seventieth episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Michael Vatis, and Jason Weinstein discuss: this week in NSA: the USA Freedom bill takes effect; a New York Times article claims that the NSA’s cybersecurity monitoring is a privacy issue; failed MasterCard settlement with Target; Office of Personnel Management hack; US response to Russia’s censorship laws; Supreme Court ruling on online threats; and FBI asks for CALEA to be expanded to social media. In our second half we have an interview with Dan Kaminsky, Chief Scientist at WhiteOps and the cybersecurity researcher who found and helped fix a DNS security flaw. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.

Subscribe to the Cyberlaw Podcast here. We are also now on iTunes and Pocket Casts!

Also suggested is to explore Steptoe's superb Cyber Blog.


SPECIAL Announcements

EVENT RESTRICTIONS HAVE BEEN CHANGED: You can attend Day One at CIA if you have been an employee, at some time, of any member agency of the Intelligence Community (or are now currently with, or retired from, one of those agencies). A spouse accompanying you may attend regardless of no prior IC employment. In a few cases a nonspousal guest (check with us first) may attend as well. Restrictions do not apply to Day Two.

CIRA (Central Intelligence Retirees Association) and
AFIO (Association of Former Intelligence Officers) are holding a joint conference and celebration of our 40th anniversaries
on 25-26 August 2015.


Day One - Tuesday, 25 August: This celebration coincides with the next CIA Annuitant Reunion on 25 August where many CIRA and AFIO members, who are CIA retirees, will be in attendance.
AFIO and CIRA members who are CIA annuitants and who retired on an even year, have been invited directly by CIA and should sign up for that day when the CIA invitation arrives in your inbox. Annuitants of odd years who wish to attend may register through the links below.
RESTRICTION: To attend Day One at CIA you need to have been an employee, at some time, of any member agency of the Intelligence Community (or are now currently with, or retired from, one of those agencies). A spouse accompanying you may attend without prior IC employment. Restriction does not apply to Day Two.

Day Two - Wednesday, 26 August: The conference expands and continues on Day Two at the Sheraton Tysons Hotel, with many CIA, CIRA, AFIO, and other IC speakers and panelists. This second day ends with a "Spies in Black Ties" Anniversary Reception and Awards Banquet.

Invitation Letter to Members

pdf is attached Tentative Agenda

To apply securely online, use form here.

To print-and-mail a pdf is attached registration form, access it here.

If you have questions, contact afio@afio.com


Newly released catalog from CIA:

Notes From Our Attic: A Curator's Pocket History of the CIA

History can be studied in more than one way. You can learn about facts and ideas from books. You can search for the documents that the books are based on. You can take the material approach: go to the places where history was made, perhaps join a group of re-enactors, and absorb the atmosphere. Or you can go to a museum. Museums are where you discover history by studying things, that is, artifacts, in context. What we do here is tell the story of the Central Intelligence Agency through a selection of the artifacts collected by the CIA Museum, often called "The Best Museum You’ve Never Seen" because we display our artifacts in their true CIA context—but only staff and official visitors to the CIA Headquarters compound can see them.


AFIO Members...are you a victim of the OPM Data Breach?

All notices regarding the breach will come from CSID, a private identity protection company hired by OPM to provide services to those affected by the data breach. The notice you receive may be either an email or a mailed letter. If an email, it will come from opmcio@csid.com; a letter will be on CSID letterhead and will contain phone numbers and websites to contact them. Every individual whose personal information has been compromised will be covered by a $1 million identity theft protection policy and will have access to full-service identity restoration provided by CSID. In addition, you will be offered the option to enroll in the CSID Protector Plus program - free of charge for 18 months. Other firms, e.g., Life Lock, offer similar programs.
Be CAUTIOUS. There are now many fake emails [phishing] being sent to look like CSID or OPM. If you have received notification, you should not click on any of the links and should, instead, visit the website established by CSID for OPM: www.csid.com/OPM. On this site you will be able to enroll in the program and get related information.

In addition to security guidelines sent to you separately by your agency and from CSID,
as well as placing fraud alerts on your credit accounts with a credit reporting firm, here are a few additional suggestions for ID, banking, and credit protection:

  1. The latest updates from OPM on this major breach of their data systems
  2. Watch video here by the National Counterintellience and Security Center (NCSC) Deputy Director.
  3. Slides from the program are here.
  4. FBI Guidance to Government Employees and Contractors is here and notes from an FBI SA presentation on ID Theft is here.
  5. The Office of the Inspector General, Social Security Administration provides the following guidelines.
  6. The US Department of Justice has issued these guidelines.
  7. Of interest is the Center for Identity Management and Information Protection at Utica College.

NEW Gift item....

AFIO MousepadNEW: AFIO's Intelligence Community Mousepad

Show your colors! The full colors of the seals of all 18 members of the US Intelligence Community on this 8" round, slick surface, nonskid, rubber-backed mouse pad. Price: $20.00 for 2 pads [includes shipping to US based address, only. For foreign shipments, we will contact you with a quote.] Great gift for colleagues and self. Click photo above for larger image. Also we've heard some use it as a large drink coaster.

...ORDER NOW


Silver Anniversary Gala and Chancellor's Dinner by Institute of World Politics
6 - 9 pm on 14 October 2015
The Ritz-Carlton, Pentagon City, Arlington, VA

Since its founding, IWP has grown into the nation's premier graduate school dedicated to developing leaders with a sound understanding of international realities and the ethical conduct of statecraft, based on knowledge and appreciation of the founding principles of the American political economy and the Western moral tradition.
Location: The Ritz-Carlton, Pentagon City, 1250 South Hayes St, Arlington, VA 22202
Sponsorship & Tickets: For information on sponsorship opportunities and ticket purchases, please contact Jennifer Giglio at 202.462.2101 ext. 312 or jgiglio@iwp.edu.
Accommodations: A limited room block held at The Ritz-Carlton, Pentagon City is available at the rate of $269 per night.
To make your reservation, please click here. Input the Arrival Date, Departure Date and Group Code: WPGWPGA.
To make your reservation, by phone, please call 1.800.241.3333. Reference the Group Name: The Institute of World Politics
Schedule of Events: 6:00 pm Cocktail Reception, 7:00 pm Dinner and Program
Keynote Speaker: Lt. Gen. Michael T. Flynn, USA (Ret.), 18th Director of the Defense Intelligence Agency
Entertainment: Keni Thomas, Award winning Nashville singer-song writer and a decorated combat veteran with the elite 75th Ranger Regiment special operations unit.
Attire: Black Tie or Military Dress Equivalent
Guests: An estimated 500 guests will gather to celebrate 25 years of The Institute of World Politics' accomplishments and inspire the next generation of leaders. The event will bring together national and international civic and business leaders, members of Congress, and IWP supporters to reflect on the work of the Institute.
Questions to Jennifer E. Giglio at JGiglio@iwp.edu.



Section I - INTELLIGENCE HIGHLIGHTS

CIA Has Paid Millions to a Consulting Firm to Help With Reorganization. The CIA has paid more than $10 million to a management consulting firm advising senior US intelligence officials on a broad reorganization that agency Director John O. Brennan began earlier this year, current and former US officials said.

The agency also is requiring some of its departments to surrender portions of their annual budgets in an effort to collect enough money to cover other costs associated with the restructuring, officials said.

The payments to the firm, McKinsey & Co., have been viewed with skepticism by some at CIA headquarters and on Capitol Hill at a time when the agency is confronting significant new security threats as well as pressure to trim costs.

Several current and former US officials said they were surprised by the magnitude of the consulting contract, an arrangement that officials said Brennan did not mention to workers when he announced the reorganization or explain to lawmakers in briefings. [Read more: Miller/WashingtonPost/1July2015]

Obama's Counterterrorism Policy Facing Mounting Criticism. At the CIA's Counterterrorism Center, it was a cause for celebration: Meticulous intelligence analysis backed by Hellfire missiles had paid off, once again.

The CIA launched a drone strike last month on a Yemeni beach at three men it determined were al-Qaida militants. One of them turned out to be Nasser al-Wahishi, about as important a figure as agency man-hunters could hope to eliminate. He had been both al-Qaida's second in command and the leader of the group's dangerous Yemeni affiliate.

American officials touted the death as a big victory. But did the demise of another senior extremist, the latest in a long line to be taken off the battlefield, make the United States and its allies any safer?

To many experts, including a growing number of former Obama administration national security advisers, that proposition is less convincing by the day. [Read more: Dilanian/AP/4July2015]

US Defense Secretary Names Ace Cyber Warrior as New Right Hand Man. Secretary of Defense Ashton Carter emphasized the central role of electronic intelligence in future US strategy by appointing veteran master cyber-strategist Eric Rosenbach to be his chief of staff, he said in a statement on Monday.

Rosenbach is a former US Army intelligence officer, Harvard University faculty member and a private executive, who also served as Assistant Secretary of Defense for Homeland Defense and Global Security.

Rosenbach served as national security advisor for then-Senator Chuck Hagel and as a professional staff member on the Senate Select Committee on Intelligence (SSCI), the release noted.

During his time on the SSCI, Rosenbach provided oversight of counterterrorism programs and led investigations of prewar intelligence on Iraqi weapons of mass destruction, it said. [Read more: Sputnik/6July2015]

Army Researcher Invents New Ways for Intelligence Analysts to Visualize, Interact With Information. Army researchers are improving how computers manage a myriad of images, which will help analysts across the DOD intelligence community.

In a new user interface developed for the Defense Advanced Research Projects Agency, or DARPA, the US Army Research Laboratory's Dr. Jeff Hansberger designed and created a system that facilitates the visualization, navigation and manipulation of tens of thousands of images.

Hansberger works at the US Army Research Laboratory, or ARL Human Research and Engineering Directorate field element at Redstone Arsenal in Alabama. DARPA selected his design earlier this year for its Visual Media Reasoning, or VMR.

"That is quite an achievement for Jeff and another example of our superior science and engineering staff and the great work we are doing for the Soldier," said Dr. Thomas Russell, ARL director. [Read more: Conant/Army.mil/30June2015]

US and France to Boost Intelligence Sharing in Fight Against Militants. The French military has taken a leading role in the fight against militants in Africa, and will be aided soon by more intelligence sharing with the United States, Defense Secretary Ashton B. Carter said Monday.

Carter appeared alongside French Defense Minister Jean-Yves Le Drian during his first visit to the Pentagon since Carter became the Pentagon chief earlier this year. He credited the French for their broad-ranging involvement in operations against militant organizations, which include airstrikes in Iraq against the Islamic State and operations against Boko Haram in Africa.

"Our cooperation overall with France in the security sector has never [been] stronger," Carter told reporters. "That's true of the sharing of military information and intelligence information. And we took some actions this morning to increase that yet further."

Carter did not elaborate on how that will occur, but said France's only aircraft carrier, the FS Charles de Gaulle, since it deployed to the Persian Gulf this spring, has integrated "seamlessly" with US forces who are launching airstrikes on Islamic State militants in Iraq. [Read more: Lamothe/WashingtonPost/6July2015]

FBI Chief Punches Back on Encryption. James Comey, director of the Federal Bureau of Investigation, said Monday the country needs to have a "robust debate" about the use of message encryption by technology firms, warning that Islamic State militants and other terrorist groups could use this method to recruit "troubled Americans to kill people."

Mr. Comey's warnings, made in a blog post he wrote for the national security and legal blog Lawfare, come two days before he testifies on the matter to the Senate Intelligence Committee amid concerns from technology firms that the government could interfere with its security processes.

In June, a large coalition that includes tech firms wrote to President Barack Obama to voice concern about any new policy that would allow the government to weaken the security of encrypted text messages or emails.

"We appreciate that, where appropriate, law enforcement has the legitimate need for certain information to combat crime and threats," said the June 8 letter, which was signed by trade groups whose members include Apple Inc. and Google Inc. "However, mandating the weakening of encryption or encryption ‘work-arounds' is not the way to address this need." [Read more: Paletta/WallStreetJournal/6July2015]

Sutiyoso Vows to Open up Intelligence Agency. The Indonesian House of Representatives has all but cemented its decision to approve President Joko "Jokowi" Widodo's nomination of retired Army general Sutiyoso as the new chief of the National Intelligence Agency (BIN).

The head of House Commission I overseeing intelligence, defense and foreign affairs, Mahfudz Siddiq, said that all 10 political party factions had given their approval to Sutiyoso following his four-hour fit-and-proper test on Tuesday.

"In passing judgment on the interview session, Commission I has decided to accept and support Sutiyoso as the sole candidate for BIN chief," Mahfudz said in his closing remarks before striking the gavel to end the meeting at the House complex in Jakarta.

Speaking after hearing of the official support from Commission I, Sutiyoso vowed to make the intelligence agency more open in terms of public participation and information sharing, while at the same time overturning public perception of BIN as a scourge of the masses. [Read more: Salim&Aritonang/JakartaPost/1July2015]

Military Looks to Private Sector to Build Cyber Mission Force. The US is continuing to build its cyber force with hopes of eventually gaining over 6,000 civilian and military personnel and 133 teams. While not quite there yet, the military recently released a few proposals looking for help from the private sector in building its new force.

On behalf of US Cyber Command and through a partnership, the General Services Administration's Federal Systems Integration and Management Center issued a request for information seeking support for building up the Cyber National Mission Force and developing a multiple award indefinite-delivery, indefinite-quantity contract.

Under the RFI, task orders will utilize one or a combination of major support task areas, which include: [Read more: Pomerleau/DefenseSystems/6July2015]


Section II - CONTEXT & PRECEDENCE

How the CIA Ran a 'Billion Dollar Spy' in Moscow. The spy had vanished.

He was the most successful and valued agent the United States had run inside the Soviet Union in two decades. His documents and drawings had unlocked the secrets of Soviet radars and weapons research years into the future. He had smuggled circuit boards and blueprints out of his military laboratory. His espionage put the United States in position to dominate the skies in aerial combat and confirmed the vulnerability of Soviet air defenses - showing that American cruise missiles and strategic bombers could fly under the radar.

In the late autumn and early winter of 1982, the CIA lost touch with him. Five scheduled meetings were missed. KGB surveillance on the street was overwhelming. Even the "deep cover" officers of the CIA's Moscow station, invisible to the KGB, could not break through.

On the evening of Dec. 7, the next scheduled meeting date, the future of the operation was put in the hands of Bill Plunkert. After a stint as a Navy aviator, Plunkert had joined the CIA and trained as a clandestine operations officer. He was in his mid-30s, 6-foot-2, and had arrived at the Moscow station in the summer. His mission was to give the slip to the KGB and make contact. [Read more: Hoffman/WashingtonPost/4July2015]

Inside Toronto's Secret Cold War History. At the height of the Cold War, Toronto was the site of an elaborate game of espionage played between the US and the Soviet Union, declassified CIA documents show.

The records provide new details about how the CIA and the KGB spied on the city's growing community of eastern European immigrants.

And those details came as a surprise to at least one Toronto target who learned she was the subject of the CIA investigations.

"I'm amazed. I'm absolutely in shock," says Ukrainian-born Natalie Bundza, 78, who worked as a travel agent at an agency on Bloor St. when the CIA first began to monitor her travels. [Read more: Corbeil/TorontoStar/2July2015]

Intelligence Agencies Grapple With Embracing Mobility. At most intelligence agencies, smart phones don't get much further than the front doors of the facility: standard operating procedure is to lock them away, inaccessible to either owners or would-be adversaries. But as smart devices - not even just phones - become more pervasive in everyday life, some intelligence leaders are realizing their policies will have to change.

"I just had a discussion with the [National Security Agency] leadership team...and the topic was how do we bring mobility [and] unclassified architecture into what we do, much of which is in a much more compartmented, much more segmented arena?" Adm. Mike Rogers, NSA director and commander of US Cyber Command, said June 24 at the GEOINT Symposium in Washington, DC. "Mobility and the ability to maintain a digital interface no matter where we are, no matter what we're doing, is increasingly a cornerstone of our personal lives, and it's increasingly a cornerstone of our professional lives as well. So NSA, like many organizations, is trying to figure out our ability to execute on that in our missions."

Solutions are not necessarily easy to come by. In some cases, the intelligence community can likely take cues from the Defense Department, where information-sharing on the move has become ingrained in military operations. These days it's not unusual to see personal smart phones in the halls of the Pentagon, but the same cannot be said for Fort Meade or other of the intelligence agencies' highly secure facilities.

Much of the intelligence community's operations and information ride on top-secret - or higher - networks. Those networks are more tightly held than those of the military services', making it tougher to try to connect mobile devices, move data and share information. [Read more: Corrin/C4ISR&Networks/6July2015]

An American Tip to German Spies Points to a More Complex Relationship. In the summer of 2011, American intelligence agencies spied on a senior German official who they concluded had been the likely source of classified information being leaked to the news media.

The Obama administration authorized the top American spy in Germany to reveal to the German government the identity of the official, according to German officials and news media reports. The decision was made despite the risk of exposing that the United States was monitoring senior national security aides to Chancellor Angela Merkel.

The tip-off appears to have led to a senior German intelligence official being barred from access to sensitive material. But it also raises suspicions that Ms. Merkel's government had strong indications of the extent of American surveillance at least two years before the disclosures by Edward J. Snowden, which included the number of a cellphone used by the chancellor.

The decision by the United States to risk disclosing a surveillance operation against a close ally indicates the high level of concern over the perceived security breach. It is unclear, however, what that information might have been or if it involved intelligence provided to Germany by the United States. [Read more: Smale,Eddy,Sanger&Schmitt/NYTimes/3July2015]

Hidden Cameras, Invisibility Cloaks in Israeli Spy Expo . Hidden cameras, invisibility cloaks and mini-drones were among the gadgets on display Tuesday at an exhibition of Israeli surveillance technology, offering a rare peek into the secretive world of Israeli espionage.

The expo was part of a conference promoting business partnerships between military and civilian industries. About two dozen Israeli companies - some of them founded by ex-intelligence officers - exhibited products used by militaries, police units and intelligence agencies in Israel and around the world.

It was the first such display of Israeli-made surveillance products in a non-covert setting in Israel, said Ron Kitrey, a retired Israeli military intelligence official who chaired the conference.

"It's the tip of the iceberg, what we show here," Kitrey said. "We would be irresponsible and stupid to show people the roots of the iceberg." [Read more: Estrin/AP/2July2015]

What the United Nations Knows About Rwanda's Powerful Spy Chief. Over the last two decades, Emmanuel Karenzi Karake has cut a striking figure in the world of Rwandan intelligence, having navigated the corridors of power with intellectual prowess.

His former colleagues describe him first and foremost as a master at exploiting weakness, a man able to target enemies with astounding precision and never missing his mark. He understood on a visceral level what Paul Kagame wanted to accomplish in the aftermath of the 1994 genocide and knew on a cerebral level how it should be done.

"Quite simply, Karake is the most brilliant officer that Kagame has ever had," said an ex-colleague now in exile.

"He is observant and careful. Kagame trusted him most of the time - except when he suspected Karake might be building his own power base," the officer explained. [Read more: Rever/ForeignPolicyJournal/3July2015]

Japan's Spy Service Offers Students One-Day Immersion Course in Tradecraft.  Psst! The Public Security Intelligence Agency - which carries out both domestic and overseas intelligence gathering - is offering college students a chance to try their hand at spycraft.

The free, one-day introduction to the secret world of espionage is slated for August 31 and is open to first- and second-year college students. Only 10 or so will be selected to participate, but the PSIA hopes the experience will "expand" their future career choices.

A spokesman for the PSIA said the students will be assigned a mission to investigate the activity of a certain foreign country. They will go through the whole process of intelligence assessment, from obtaining confidential information to analyzing it and reporting the result to the prime minister's office.

"Compared to the police and Self-Defense Forces, little is known about our work, which is not widely covered by media," the spokesman said. [Read more: Osumi/JapanTimes/1July2015]

5 Surprising Things I Learned About the FBI. The FBI. What do those letters mean to you?

There's the obvious literal meaning: the Federal Bureau of Investigation, the nation's top federal law enforcement agency.

But given that the FBI has either been glorified or demeaned throughout the years in movies, TV shows and in the news media, no one from the outside can really know what it's like to work for the agency.

So when I was nominated to take part in the eight-week Citizens Academy put on by the Cincinnati office, I jumped at the chance. [Read more: Pilcher/Enquirer/7July2015]


Section III - COMMENTARY

The Spy Tech That Will Keep Iran in Line. The Obama administration can make all the nuclear deals it wants. Iran will still cheat and keep working toward a bomb, skeptics say. But cheating is harder than it seems, due to the development of new surveillance and nuclear verification technologies.

The International Atomic Energy Agency can field a sophisticated array of gadgetry to detect if Iran is departing from its obligations: fiber-optic seals on equipment that can signal the IAEA if they are cut; infrared satellite imagery that can track down hidden reactors; environmental sensors that can detect minute signs of nuclear particles; hardened cameras built to withstand tampering and radiation.

To that list, the West's intelligence services can add even more: sophisticated cyber espionage operations; an array of seismic and acoustic sensors; and networks of old-fashioned, human spies.

As a deal nears - another deadline looms this week - the Obama administration's allies are emphasizing these technologies as evidence that the United States will be able to detect Iranian cheating, and in so doing, be able to deter such action. [Read more: Mak/TheDailyBeast/6July2015]

It's Simple: Stop the Oil, Stop ISIS. Last September, at President Obama's request, Congress authorized the United States military to begin operations against the Islamic State of Iraq and Syria - a radicalized Islamist terrorist organization.

With the President's request came a guarantee: that the US would search out and destroy ISIS globally. A goal that few, if any, would challenge - as ISIS is the most advanced and threatening terrorist group our nation has ever encountered.

In the months to follow, the administration's line to me was consistent: Degrading and destroying ISIS is the top priority.

However, by his own admission, the president confirmed recently he has no strategy in the fight against ISIS, a group that has grown exponentially through propagandized media and a diversified fundraising operation. [Read more: Pearce/AlbuquerqueJournal/5July2015]

US Government Must Improve Its Efforts to Counter Terrorist Messaging Campaigns & Communications Methods Online. A recent Senate Senate Intelligence committee report noted that violent terrorist extremists groups like al-Qa’ida, Boko Haram, Al Shabaab, the Islamic State of Iraq and the Levant (ISIL) have demonstrated that they can successfully use the Internet to recruit, train, radicalize, fundraise and inspire attacks. The report also notes how the US government, particularly the intelligence community must do more to fight against this kind of propaganda online.

The report notes that through popular public websites, video sharing and social networking sites, terrorists can spread their violent extremism and hate filled ideology and misleading information online very effectively. This is having the effect in many cases of diminishing the effectiveness of US Government campaigns to counter extremist content online.

These efforts will not be confined solely to intelligence analysts; operational personnel, including intelligence and defense officials, must be aware of how terrorist groups make use of open source messaging.

The Director of National Intelligence and the Under Secretary of Defense for Intelligence will jointly brief the congressional intelligence committees on a plan for improving the use of open source information throughout the Intelligence Community and the Department of Defense (DoD), including the US Special Operations Command. [Read more: Tilford/GroundReport/5July2015]

The Iranian Spy Empire. The Kurdish opposition was marching through one of the main streets and chanting anti-Iranian regime slogans. He followed me from the protest down a back street and called out. I stopped and he showed me a map and asked if I knew how to get to the destination he had circled. Weird he didn't have Google Maps like almost everyone else in the city, I thought. It was only a matter of time before the city elders would carve out a separate pedestrian lane for tourists whose eyes were fixed on their phones.

I explained to him I didn't know how to get to where he wanted to go. I wasn't from here. "Where are you from?" he asked. "America," I said, wished him luck and was on my way. He called out again and caught up alongside me. "Where are you from?" he asked again. "Argentina?" I walked off without answering him, eyeing my way back to the main road.

The next time a voice rang out behind me it belonged to an undercover cop who had the tourist by his shoulder. "Excuse me," he asked. "What did this guy want from you?" "Just directions," I said.

The policeman's presence was sufficient evidence that my new friend was not, as I briefly suspected, an Iranian intelligence officer. Had he really been with the Ministry of Intelligence or the IRGC, there is no chance he would've been stopped by the Vienna police since Iranian intelligence works in the Austrian capital with impunity. [Read more: Smith/TheWeeklyStandard/2July2015]

The New Normal: China's Risky Intelligence Operations. Thirty years ago, Beijing placed restrictions on its overseas intelligence gathering to prevent political blowback from exposed operations from jeopardizing Deng Xiaoping's Reform and Opening Policy. Today, such political considerations no longer appear to influence Chinese policymakers and intelligence policy. China's widespread theft of information in cyberspace probably has done more to poison the well of US-China relations than almost anything else. The possibility of any meaningful fallout from such operations seems remote from the concerns of Chinese leaders, even as Washington considers more aggressive responses to cyber intrusions.

This shift is remarkable for two reasons related to both China and outsiders watching it. First, while Beijing may speak the language of cooperation, its more aggressive pursuit of intelligence speaks to greater Chinese expectations of competition - expectations that go back at least five years. Second, that this has gone unremarked highlights how little outsiders evaluate Chinese cyber activities in the context of the country's intelligence and security apparatus. Though a forensic accounting of intrusions is useful for policy and security, deriving meaning about Chinese intentions requires this context and answering questions about what cyber gets China that other sources do not.

The idea of a communist system restricting intelligence operations sounds almost absurd on its face; however, 1985 was a big year for China and Chinese intelligence. That year, a mid-level but politically-connected Chinese intelligence official defected to the United States, prompting a chain of events that led to the dismissal of the Minister of State Security Ling Yun, China's civilian intelligence chief. The defection lent credence to the Ministry of Foreign Affairs (MFA) argument to Deng Xiaoping that intelligence operations from official missions overseas should be restricted on the grounds that exposure could jeopardize Deng's efforts to forge links abroad to modernize the Chinese economy. The defection, according to the diplomats, presaged exposure of Chinese intelligence operations abroad, and restricting the kinds of operations and the number of intelligence officers in embassies would be beneficial. Deng, who had suffered at the hands of the previous intelligence services, took the side of the Ministry of Foreign Affairs and placed onerous restrictions on the intelligence officers in embassies - if they were allowed to stay at all. [Read more: Mattis/TheNationalInterest/6July2015]


Section IV - Upcoming Events



AFIO EDUCATIONAL EVENTS IN COMING TWO MONTHS....

15 July 2015, 11:30am - 2pm - San Francisco, CA - The AFIO Andre LeGallo Chapter hosts John Lightfoot, Assistant Special Agent in Charge of the Counterterrorism branch in the FBI San Francisco Division.

Topic will be "Current Issues in Terrorism: Here and Over There". ASAC Lightfoot will discuss Al-Q'aida today, the rise and threat of the Islamic State, domestic groups and updates on recent Bay Area cases. 11:30AM no host cocktails; meeting starts at noon. Note different location: Basque Cultural Center: 599 Railroad Ave, South San Francisco, CA 94080.
E-mail RSVP to Mariko Kawaguchi at afiosf@aol.com with your meal choice (Salmon with Champagne Sauce OR Breast of Chicken Chasseur) and you will be sent an Eventbrite link to register. Alternately, mail a check made out to "AFIO" to: Mariko Kawaguchi, P.O. Box 117578, Burlingame, CA 94011. Members and students: $25; non-members $35. $35 at the door. RSVP is required by July 3, 2015 - no walk-ins.

Tuesday, 11 August 2015 - MacDill AFB, Florida - The AFIO Suncoast Chapter hosts Karl D. Klicker, EdD, speaking on the Islamic State.

Dr. Karl Klicker is a retired Marine Corps Intelligence Officer, currently employed by Jacobs Technology as Principal Strategist supporting US Special Operations Command. He has served on psychological operations, civil affairs, interagency task force and strategic planning teams.
Klicker is the author of Indoc: Ideology, Propaganda and Conflict in the Corps and al-Qaida, a study of internal cultural tensions within the Marine Corps, the roots of division in the Sunni and Shi’a camps; the social psychology of recruiting for war; and the ongoing conflict between radical Islamists and America’s armed forces.

LOCATION: MacDill AFB Surf’s Edge Club, 7315 Bayshore Blvd, MacDill AFB, FL 33621. Please RSVP by 15 August to the Chapter Secretary for yourself and include the names and email addresses of any guests. Email or call Michael Shapiro at sectysuncoastafio@att.net. You will receive a confirmation via email. If you do not, contact the Chapter Secretary to confirm your registration. Check-in at noon; opening ceremonies, lunch and business meeting at 1230 hours, followed by our speaker.
FEE: You must present your $20 check payable to “Suncoast Chapter, AFIO” (or cash) at check-in to cover the luncheon. If you make a reservation, don’t cancel and get a cancellation confirmation by the response deadline and then don’t show up, you will be responsible for the cost of the luncheon.

25 - 26 August 2015 - McLean, VA - CIRA and AFIO's 40th Anniversary Conference and Celebration
CIRA (Central Intelligence Retirees Association) and AFIO (Association of Former Intelligence Officers) are holding a joint conference and celebration of our 40th anniversaries on 25-26 August 2015.
Day One - Tuesday, 25 August: This celebration coincides with the next CIA Annuitant Reunion on 25 August where many CIRA and AFIO members, who are CIA retirees, will be in attendance.
AFIO and CIRA members who are CIA annuitants and who retired on an even year, have been invited directly by CIA and should sign up for that day when the CIA invitation arrives in your inbox. Annuitants of odd years who wish to attend may register through the links below.
RESTRICTION: To attend Day One at CIA you need to have been an employee, at some time, of any member agency of the Intelligence Community (or are now currently with, or retired from, one of those agencies). A spouse accompanying you may attend regardless of no prior IC employment. Restriction does not apply to Day Two.
Day Two - Wednesday, 26 August: The conference expands and continues on Day Two at the Sheraton Tysons Hotel, with many CIA, CIRA, AFIO, and other IC speakers and panelists. This second day ends with a "Spies in Black Ties" Anniversary Reception and Awards Banquet.

Invitation Letter to Members

pdf is attached Tentative Agenda

To apply securely online, use form here.

To print-and-mail a pdf is attached registration form, open it here.

Space at this special event is limited.

If you have questions, contact afio@afio.com

Monday 28 September 2015 - New York, NY - AFIO Metro NY Chapter hears former FBI Special Agent Edward M. Stroz

Speaker Edward Stroz, former FBI, now with the NYC-based firm of Stroz Friedberg, a global leader in investigations, intelligence, and risk management. Topic and registration details to follow in coming weeks. 
Stronz was a Special Agent for the FBI before founding Stroz Friedberg in 2000. He is an expert on electronic evidence and investigations, internet extortions, denial of service attacks, computer hacking, insider abuse, theft of trade secrets, electronic discovery matters, and regularly provides expert testimony on these matters. Mr. Stroz pioneered the use of behavioral science in investigations to gain insights about intent and state-of-mind of computer users. He has supervised hundreds of forensic assignments in assisting corporate clients, trial counsel, individuals, and has conducted security assessments for major public and private entities. While at the Bureau, Stroz was responsible for the formation of the FBI’s Computer Crime Squad in New York City, where he supervised investigations involving computer intrusions, denial of service attacks, illegal Internet wiretapping, fraud, and violations of intellectual property rights, including trade secrets. 
Location: Society of Illustrators building, 128 East 63rd St, between Park Ave and Lexington Ave.
COST: $50/person Cash or check, payable at the door only. Dinner to follow talk & Q&A. Cash bar. RESERVATIONS: Strongly suggested, not required, Email Jerry Goodwin afiometro@gmail.com or phone 646-717-3776.


Other Upcoming Events

Wednesday, 8 July 2015, noon - Washington, DC - Global Terrorism, Espionage and Cybersecurity Monthly Update

Be the first to learn the latest intelligence news! Join David Major, a retired Supervisory Special Agent of the FBI and Director of Counterintelligence and Security Programs at the National Security Council staff at the White House, for a briefing on the hottest intelligence and security issues, breaches, and penetrations.

Presented in partnership with The Centre for Counterintelligence and Security Studies (CI Centre), these updates will cover worldwide events such as breaking espionage cases and arrest reports, cyber espionage incidents, and terrorist activity.

Find out Snowden’s current status and what could happen next with this case. Major uses his expertise to analyze trends and highlight emerging issues of interest to both intelligence and national security professionals and the public.

Cases are drawn from the CI Centre’s SPYPEDIA®, the most comprehensive source of espionage information in the world, containing events and information that may not be reported by mainstream media outlets.

Tickets: FREE! No reservation required. Visit www.spymuseum.org

Thursday, 9 July 2015, 6:30pm - Washington DC - "code name: CYNTHIA" - A Spy Musical - at the International Spy Museum

Get yourself to this staged reading and singing of the action-packed new spy musical celebrating the exploits of Betty Thorpe whose real spy career ranged from Madrid to Warsaw to Washington.

Presented by the Pallas Theatre Collective, "code name: CYNTHIA" opens as Paris falls to the Nazis and master spy Betty Thorpe (code name: Cynthia) barely escapes with her life. When a mysterious mastermind blackmails the stunning beauty back into intelligence for the Allies, Betty resolves to seduce the enemy, steal France's naval codes from the Vichy Embassy in Washington, DC, and save her own delicate world from falling to pieces. This lyrical homage features music by Karen Multer and book and lyrics by Steve Multer, a 2014 finalist for the Kleban Prize in Musical Theatre.

Tickets: FREE! No reservation required. Visit www.spymuseum.org

Wednesday, 15 July 2015, noon - Washington, DC - The Billion Dollar Spy: Author Debriefing at the International Spy Museum

While getting into his car on the evening of February 16, 1978, the chief of the CIA's Moscow station was handed an envelope by an unknown Russian. Its contents stunned the Americans: details of top secret Soviet research and development in military technology that was totally unknown to the United States.

From David Hoffman, the Pulitzer Prize-winning author of The Dead Hand, comes the riveting story of the CIA's most valuable spy in the Soviet Union and an evocative portrait of the agency's Moscow station, an outpost of daring espionage in the last years of the Cold War. Drawing on previously secret documents obtained from the CIA, as well as interviews with participants, Hoffman will reveal how the depredations of the Soviet state motivated one man to master the craft of spying against his own nation until he was betrayed to the KGB by a disgruntled former CIA trainee. No one has ever told this story before in such detail, and Hoffman's deep knowledge of spycraft, the Cold War, and military technology makes him uniquely qualified to bring to the International Spy Museum this real life espionage thriller.

Tickets: FREE! No reservation required. Visit www.spymuseum.org

14 October 2015, 6 - 9 pm - Arlington, VA - Silver Anniversary Gala and Chancellor's Dinner by Institute of World Politics

Since its founding, IWP has grown into the nation's premier graduate school dedicated to developing leaders with a sound understanding of international realities and the ethical conduct of statecraft, based on knowledge and appreciation of the founding principles of the American political economy and the Western moral tradition.
Location: The Ritz-Carlton, Pentagon City, 1250 South Hayes St, Arlington, VA 22202
Sponsorship & Tickets: For information on sponsorship opportunities and ticket purchases, please contact Jennifer Giglio at 202.462.2101 ext. 312 or jgiglio@iwp.edu.
Accommodations: A limited room block held at The Ritz-Carlton, Pentagon City is available at the rate of $269 per night.
To make your reservation, please click here. Input the Arrival Date, Departure Date and Group Code: WPGWPGA.
To make your reservation, by phone, please call 1.800.241.3333. Reference the Group Name: The Institute of World Politics
Schedule of Events: 6:00 pm Cocktail Reception, 7:00 pm Dinner and Program
Keynote Speaker: Lt. Gen. Michael T. Flynn, USA (Ret.), 18th Director of the Defense Intelligence Agency
Entertainment: Keni Thomas, Award winning Nashville singer-song writer and a decorated combat veteran with the elite 75th Ranger Regiment special operations unit.
Attire: Black Tie or Military Dress Equivalent
Guests: An estimated 500 guests will gather to celebrate 25 years of The Institute of World Politics' accomplishments and inspire the next generation of leaders. The event will bring together national and international civic and business leaders, members of Congress, and IWP supporters to reflect on the work of the Institute.
Questions to Jennifer E. Giglio at JGiglio@iwp.edu.


Disclaimers and Removal Instructions

Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers. 

REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs: 

a)  IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list.  If this link doesn't open a blank email, create one on your own and send to afio@afio.com with the words:  REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.

 b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to afio@afio.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.

CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at afio@afio.com. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm


WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor's) or author's) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!

(c) 2000, 2012, 2013, 2014, 2015. Please note AFIO's new address: AFIO, 7700 Leesburg Pike Suite 324, Falls Church, Virginia 22043. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: afio@afio.com

Click here to return to top.