If you are having difficulties with the links or viewing this
newsletter when it arrives by email, members may view the
latest edition each week at this link: https://www.afio.com/pages/currentwin.htm You will need your LOGIN NAME and your PASSWORD.
For Additional AFIO and other Events two+ months or more... Calendar of Events
WIN CREDITS FOR THIS ISSUE: The WIN editors thank the following special contributors: pjk, and fwr. They have contributed one or more stories used in this issue.
The WIN editors
to include a wide range of articles and commentary in the
to inform and educate our readers. However, the views
expressed in the
articles are purely those of the authors, and in no way
or endorsement from the WIN editors or the AFIO officers and
welcome comments from the WIN readers on any and all articles
commentary. IMPORTANT: AFIO does not "vet" or endorse research
inquiries, career announcements, or job offers. Reasonable-sounding
inquiries and career offerings are published as a service to our
members, and for researchers, educators, and subscribers. You are urged
to exercise your usual caution and good judgment when responding, and
should verify the source independently before supplying any resume,
career data, or personal information.]
CIRA (Central Intelligence Retirees Association) and
To apply securely online, use form here.
Newly released catalog from CIA:
Notes From Our Attic: A Curator's Pocket History of the CIA
History can be studied in more than one way. You can learn about facts and ideas from books. You can search for the documents that the books are based on. You can take the material approach: go to the places where history was made, perhaps join a group of re-enactors, and absorb the atmosphere. Or you can go to a museum. Museums are where you discover history by studying things, that is, artifacts, in context. What we do here is tell the story of the Central Intelligence Agency through a selection of the artifacts collected by the CIA Museum, often called "The Best Museum You’ve Never Seen" because we display our artifacts in their true CIA context—but only staff and official visitors to the CIA Headquarters compound can see them.
AFIO Members...are you a victim of the OPM Data Breach?
All notices regarding the breach will come
from CSID, a private identity protection company hired by OPM to provide
services to those affected by the data breach. The notice you receive
may be either an email or a mailed letter. If an email, it will come
from firstname.lastname@example.org; a letter will
be on CSID letterhead and will contain phone numbers and websites to
contact them. Every individual whose personal information has been
compromised will be covered by a $1 million identity theft protection
policy and will have access to full-service identity restoration
provided by CSID. In addition, you will be offered the option to enroll
in the CSID Protector Plus program - free of charge for 18 months. Other firms, e.g., Life Lock, offer similar programs.
In addition to security guidelines sent to you separately by your agency and from CSID,
NEW Gift item....
Show your colors! The full colors of the seals of all 18 members of the US Intelligence Community on this 8" round, slick surface, nonskid, rubber-backed mouse pad. Price: $20.00 for 2 pads [includes shipping to US based address, only. For foreign shipments, we will contact you with a quote.] Great gift for colleagues and self. Click photo above for larger image. Also we've heard some use it as a large drink coaster.
Silver Anniversary Gala and Chancellor's Dinner by Institute of World Politics
its founding, IWP has grown into the nation's premier graduate school
dedicated to developing leaders with a sound understanding of
international realities and the ethical conduct of statecraft, based on
knowledge and appreciation of the founding principles of the American
political economy and the Western moral tradition.
Section I - INTELLIGENCE HIGHLIGHTS
CIA Has Paid Millions to a Consulting Firm to Help With Reorganization. The CIA has paid more than $10 million to a management consulting firm advising senior US intelligence officials on a broad reorganization that agency Director John O. Brennan began earlier this year, current and former US officials said.
The agency also is requiring some of its departments to surrender portions of their annual budgets in an effort to collect enough money to cover other costs associated with the restructuring, officials said.
The payments to the firm, McKinsey & Co., have been viewed with skepticism by some at CIA headquarters and on Capitol Hill at a time when the agency is confronting significant new security threats as well as pressure to trim costs.
Several current and former US officials said they were surprised by the magnitude of the consulting contract, an arrangement that officials said Brennan did not mention to workers when he announced the reorganization or explain to lawmakers in briefings. [Read more: Miller/WashingtonPost/1July2015]
Obama's Counterterrorism Policy Facing Mounting Criticism. At the CIA's Counterterrorism Center, it was a cause for celebration: Meticulous intelligence analysis backed by Hellfire missiles had paid off, once again.
The CIA launched a drone strike last month on a Yemeni beach at three men it determined were al-Qaida militants. One of them turned out to be Nasser al-Wahishi, about as important a figure as agency man-hunters could hope to eliminate. He had been both al-Qaida's second in command and the leader of the group's dangerous Yemeni affiliate.
American officials touted the death as a big victory. But did the demise of another senior extremist, the latest in a long line to be taken off the battlefield, make the United States and its allies any safer?
To many experts, including a growing number of former Obama administration national security advisers, that proposition is less convincing by the day. [Read more: Dilanian/AP/4July2015]
US Defense Secretary Names Ace Cyber Warrior as New Right Hand Man. Secretary of Defense Ashton Carter emphasized the central role of electronic intelligence in future US strategy by appointing veteran master cyber-strategist Eric Rosenbach to be his chief of staff, he said in a statement on Monday.
Rosenbach is a former US Army intelligence officer, Harvard University faculty member and a private executive, who also served as Assistant Secretary of Defense for Homeland Defense and Global Security.
Rosenbach served as national security advisor for then-Senator Chuck Hagel and as a professional staff member on the Senate Select Committee on Intelligence (SSCI), the release noted.
During his time on the SSCI, Rosenbach provided oversight of counterterrorism programs and led investigations of prewar intelligence on Iraqi weapons of mass destruction, it said. [Read more: Sputnik/6July2015]
Army Researcher Invents New Ways for Intelligence Analysts to Visualize, Interact With Information. Army researchers are improving how computers manage a myriad of images, which will help analysts across the DOD intelligence community.
In a new user interface developed for the Defense Advanced Research Projects Agency, or DARPA, the US Army Research Laboratory's Dr. Jeff Hansberger designed and created a system that facilitates the visualization, navigation and manipulation of tens of thousands of images.
Hansberger works at the US Army Research Laboratory, or ARL Human Research and Engineering Directorate field element at Redstone Arsenal in Alabama. DARPA selected his design earlier this year for its Visual Media Reasoning, or VMR.
"That is quite an achievement for Jeff and another example of our superior science and engineering staff and the great work we are doing for the Soldier," said Dr. Thomas Russell, ARL director. [Read more: Conant/Army.mil/30June2015]
US and France to Boost Intelligence Sharing in Fight Against Militants. The French military has taken a leading role in the fight against militants in Africa, and will be aided soon by more intelligence sharing with the United States, Defense Secretary Ashton B. Carter said Monday.
Carter appeared alongside French Defense Minister Jean-Yves Le Drian during his first visit to the Pentagon since Carter became the Pentagon chief earlier this year. He credited the French for their broad-ranging involvement in operations against militant organizations, which include airstrikes in Iraq against the Islamic State and operations against Boko Haram in Africa.
"Our cooperation overall with France in the security sector has never [been] stronger," Carter told reporters. "That's true of the sharing of military information and intelligence information. And we took some actions this morning to increase that yet further."
Carter did not elaborate on how that will occur, but said France's only aircraft carrier, the FS Charles de Gaulle, since it deployed to the Persian Gulf this spring, has integrated "seamlessly" with US forces who are launching airstrikes on Islamic State militants in Iraq. [Read more: Lamothe/WashingtonPost/6July2015]
FBI Chief Punches Back on Encryption. James Comey, director of the Federal Bureau of Investigation, said Monday the country needs to have a "robust debate" about the use of message encryption by technology firms, warning that Islamic State militants and other terrorist groups could use this method to recruit "troubled Americans to kill people."
Mr. Comey's warnings, made in a blog post he wrote for the national security and legal blog Lawfare, come two days before he testifies on the matter to the Senate Intelligence Committee amid concerns from technology firms that the government could interfere with its security processes.
In June, a large coalition that includes tech firms wrote to President Barack Obama to voice concern about any new policy that would allow the government to weaken the security of encrypted text messages or emails.
"We appreciate that, where appropriate, law enforcement has the legitimate need for certain information to combat crime and threats," said the June 8 letter, which was signed by trade groups whose members include Apple Inc. and Google Inc. "However, mandating the weakening of encryption or encryption ‘work-arounds' is not the way to address this need." [Read more: Paletta/WallStreetJournal/6July2015]
Sutiyoso Vows to Open up Intelligence Agency. The
Indonesian House of Representatives has all but cemented its decision to approve President Joko "Jokowi" Widodo's nomination of retired Army general Sutiyoso as the new chief of the National Intelligence Agency (BIN).
The head of House Commission I overseeing intelligence, defense and foreign affairs, Mahfudz Siddiq, said that all 10 political party factions had given their approval to Sutiyoso following his four-hour fit-and-proper test on Tuesday.
"In passing judgment on the interview session, Commission I has decided to accept and support Sutiyoso as the sole candidate for BIN chief," Mahfudz said in his closing remarks before striking the gavel to end the meeting at the House complex in Jakarta.
Speaking after hearing of the official support from Commission I, Sutiyoso vowed to make the intelligence agency more open in terms of public participation and information sharing, while at the same time overturning public perception of BIN as a scourge of the masses. [Read more: Salim&Aritonang/JakartaPost/1July2015]
Military Looks to Private Sector to Build Cyber Mission Force. The US is continuing to build its cyber force with hopes of eventually gaining over 6,000 civilian and military personnel and 133 teams. While not quite there yet, the military recently released a few proposals looking for help from the private sector in building its new force.
On behalf of US Cyber Command and through a partnership, the General Services Administration's Federal Systems Integration and Management Center issued a request for information seeking support for building up the Cyber National Mission Force and developing a multiple award indefinite-delivery, indefinite-quantity contract.
Under the RFI, task orders will utilize one or a combination of major support task areas, which include: [Read more: Pomerleau/DefenseSystems/6July2015]
Section II - CONTEXT & PRECEDENCE
How the CIA Ran a 'Billion Dollar Spy' in Moscow. The spy had vanished.
He was the most successful and valued agent the United States had run inside the Soviet Union in two decades. His documents and drawings had unlocked the secrets of Soviet radars and weapons research years into the future. He had smuggled circuit boards and blueprints out of his military laboratory. His espionage put the United States in position to dominate the skies in aerial combat and confirmed the vulnerability of Soviet air defenses - showing that American cruise missiles and strategic bombers could fly under the radar.
In the late autumn and early winter of 1982, the CIA lost touch with him. Five scheduled meetings were missed. KGB surveillance on the street was overwhelming. Even the "deep cover" officers of the CIA's Moscow station, invisible to the KGB, could not break through.
On the evening of Dec. 7, the next scheduled meeting date, the future of the operation was put in the hands of Bill Plunkert. After a stint as a Navy aviator, Plunkert had joined the CIA and trained as a clandestine operations officer. He was in his mid-30s, 6-foot-2, and had arrived at the Moscow station in the summer. His mission was to give the slip to the KGB and make contact. [Read more: Hoffman/WashingtonPost/4July2015]
Inside Toronto's Secret Cold War History. At the height of the Cold War, Toronto was the site of an elaborate game of espionage played between the US and the Soviet Union, declassified CIA documents show.
The records provide new details about how the CIA and the KGB spied on the city's growing community of eastern European immigrants.
And those details came as a surprise to at least one Toronto target who learned she was the subject of the CIA investigations.
"I'm amazed. I'm absolutely in shock," says Ukrainian-born Natalie Bundza, 78, who worked as a travel agent at an agency on Bloor St. when the CIA first began to monitor her travels. [Read more: Corbeil/TorontoStar/2July2015]
Intelligence Agencies Grapple With Embracing Mobility. At most intelligence agencies, smart phones don't get much further than the front doors of the facility: standard operating procedure is to lock them away, inaccessible to either owners or would-be adversaries. But as smart devices - not even just phones - become more pervasive in everyday life, some intelligence leaders are realizing their policies will have to change.
"I just had a discussion with the [National Security Agency] leadership team...and the topic was how do we bring mobility [and] unclassified architecture into what we do, much of which is in a much more compartmented, much more segmented arena?" Adm. Mike Rogers, NSA director and commander of US Cyber Command, said June 24 at the GEOINT Symposium in Washington, DC. "Mobility and the ability to maintain a digital interface no matter where we are, no matter what we're doing, is increasingly a cornerstone of our personal lives, and it's increasingly a cornerstone of our professional lives as well. So NSA, like many organizations, is trying to figure out our ability to execute on that in our missions."
Solutions are not necessarily easy to come by. In some cases, the intelligence community can likely take cues from the Defense Department, where information-sharing on the move has become ingrained in military operations. These days it's not unusual to see personal smart phones in the halls of the Pentagon, but the same cannot be said for Fort Meade or other of the intelligence agencies' highly secure facilities.
Much of the intelligence community's operations and information ride on top-secret - or higher - networks. Those networks are more tightly held than those of the military services', making it tougher to try to connect mobile devices, move data and share information. [Read more: Corrin/C4ISR&Networks/6July2015]
An American Tip to German Spies Points to a More Complex Relationship. In the summer of 2011, American intelligence agencies spied on a senior German official who they concluded had been the likely source of classified information being leaked to the news media.
The Obama administration authorized the top American spy in Germany to reveal to the German government the identity of the official, according to German officials and news media reports. The decision was made despite the risk of exposing that the United States was monitoring senior national security aides to Chancellor Angela Merkel.
The tip-off appears to have led to a senior German intelligence official being barred from access to sensitive material. But it also raises suspicions that Ms. Merkel's government had strong indications of the extent of American surveillance at least two years before the disclosures by Edward J. Snowden, which included the number of a cellphone used by the chancellor.
The decision by the United States to risk disclosing a surveillance operation against a close ally indicates the high level of concern over the perceived security breach. It is unclear, however, what that information might have been or if it involved intelligence provided to Germany by the United States. [Read more: Smale,Eddy,Sanger&Schmitt/NYTimes/3July2015]
Hidden Cameras, Invisibility Cloaks in Israeli Spy Expo . Hidden cameras, invisibility cloaks and mini-drones were among the gadgets on display Tuesday at an exhibition of Israeli surveillance technology, offering a rare peek into the secretive world of Israeli espionage.
The expo was part of a conference promoting business partnerships between military and civilian industries. About two dozen Israeli companies - some of them founded by ex-intelligence officers - exhibited products used by militaries, police units and intelligence agencies in Israel and around the world.
It was the first such display of Israeli-made surveillance products in a non-covert setting in Israel, said Ron Kitrey, a retired Israeli military intelligence official who chaired the conference.
"It's the tip of the iceberg, what we show here," Kitrey said. "We would be irresponsible and stupid to show people the roots of the iceberg." [Read more: Estrin/AP/2July2015]
What the United Nations Knows About Rwanda's Powerful Spy Chief. Over the last two decades, Emmanuel Karenzi Karake has cut a striking figure in the world of Rwandan intelligence, having navigated the corridors of power with intellectual prowess.
His former colleagues describe him first and foremost as a master at exploiting weakness, a man able to target enemies with astounding precision and never missing his mark. He understood on a visceral level what Paul Kagame wanted to accomplish in the aftermath of the 1994 genocide and knew on a cerebral level how it should be done.
"Quite simply, Karake is the most brilliant officer that Kagame has ever had," said an ex-colleague now in exile.
"He is observant and careful. Kagame trusted him most of the time - except when he suspected Karake might be building his own power base," the officer explained. [Read more: Rever/ForeignPolicyJournal/3July2015]
Japan's Spy Service Offers Students One-Day Immersion Course in Tradecraft.
Psst! The Public Security Intelligence Agency - which carries out both domestic and overseas intelligence gathering - is offering college students a chance to try their hand at spycraft.
The free, one-day introduction to the secret world of espionage is slated for August 31 and is open to first- and second-year college students. Only 10 or so will be selected to participate, but the PSIA hopes the experience will "expand" their future career choices.
A spokesman for the PSIA said the students will be assigned a mission to investigate the activity of a certain foreign country. They will go through the whole process of intelligence assessment, from obtaining confidential information to analyzing it and reporting the result to the prime minister's office.
"Compared to the police and Self-Defense Forces, little is known about our work, which is not widely covered by media," the spokesman said. [Read more: Osumi/JapanTimes/1July2015]
5 Surprising Things I Learned About the FBI. The FBI. What do those letters mean to you?
There's the obvious literal meaning: the Federal Bureau of Investigation, the nation's top federal law enforcement agency.
But given that the FBI has either been glorified or demeaned throughout the years in movies, TV shows and in the news media, no one from the outside can really know what it's like to work for the agency.
So when I was nominated to take part in the eight-week Citizens Academy put on by the Cincinnati office, I jumped at the chance. [Read more: Pilcher/Enquirer/7July2015]
Section III - COMMENTARY
The Spy Tech That Will Keep Iran in Line. The Obama administration can make all the nuclear deals it wants. Iran will still cheat and keep working toward a bomb, skeptics say. But cheating is harder than it seems, due to the development of new surveillance and nuclear verification technologies.
The International Atomic Energy Agency can field a sophisticated array of gadgetry to detect if Iran is departing from its obligations: fiber-optic seals on equipment that can signal the IAEA if they are cut; infrared satellite imagery that can track down hidden reactors; environmental sensors that can detect minute signs of nuclear particles; hardened cameras built to withstand tampering and radiation.
To that list, the West's intelligence services can add even more: sophisticated cyber espionage operations; an array of seismic and acoustic sensors; and networks of old-fashioned, human spies.
As a deal nears - another deadline looms this week - the Obama administration's allies are emphasizing these technologies as evidence that the United States will be able to detect Iranian cheating, and in so doing, be able to deter such action. [Read more: Mak/TheDailyBeast/6July2015]
It's Simple: Stop the Oil, Stop ISIS. Last September, at President Obama's request, Congress authorized the United States military to begin operations against the Islamic State of Iraq and Syria - a radicalized Islamist terrorist organization.
With the President's request came a guarantee: that the US would search out and destroy ISIS globally. A goal that few, if any, would challenge - as ISIS is the most advanced and threatening terrorist group our nation has ever encountered.
In the months to follow, the administration's line to me was consistent: Degrading and destroying ISIS is the top priority.
However, by his own admission, the president confirmed recently he has no strategy in the fight against ISIS, a group that has grown exponentially through propagandized media and a diversified fundraising operation. [Read more: Pearce/AlbuquerqueJournal/5July2015]
US Government Must Improve Its Efforts to Counter Terrorist Messaging Campaigns & Communications Methods Online. A recent Senate Senate Intelligence committee report noted that violent terrorist extremists groups like al-Qa’ida, Boko Haram, Al Shabaab, the Islamic State of Iraq and the Levant (ISIL) have demonstrated that they can successfully use the Internet to recruit, train, radicalize, fundraise and inspire attacks. The report also notes how the US government, particularly the intelligence community must do more to fight against this kind of propaganda online.
The report notes that through popular public websites, video sharing and social networking sites, terrorists can spread their violent extremism and hate filled ideology and misleading information online very effectively. This is having the effect in many cases of diminishing the effectiveness of US Government campaigns to counter extremist content online.
These efforts will not be confined solely to intelligence analysts; operational personnel, including intelligence and defense officials, must be aware of how terrorist groups make use of open source messaging.
The Director of National Intelligence and the Under Secretary of Defense for Intelligence will jointly brief the congressional intelligence committees on a plan for improving the use of open source information throughout the Intelligence Community and the Department of Defense (DoD), including the US Special Operations Command. [Read more: Tilford/GroundReport/5July2015]
The Iranian Spy Empire. The Kurdish opposition was marching through one of the main streets and chanting anti-Iranian regime slogans. He followed me from the protest down a back street and called out. I stopped and he showed me a map and asked if I knew how to get to the destination he had circled. Weird he didn't have Google Maps like almost everyone else in the city, I thought. It was only a matter of time before the city elders would carve out a separate pedestrian lane for tourists whose eyes were fixed on their phones.
I explained to him I didn't know how to get to where he wanted to go. I wasn't from here. "Where are you from?" he asked. "America," I said, wished him luck and was on my way. He called out again and caught up alongside me. "Where are you from?" he asked again. "Argentina?" I walked off without answering him, eyeing my way back to the main road.
The next time a voice rang out behind me it belonged to an undercover cop who had the tourist by his shoulder. "Excuse me," he asked. "What did this guy want from you?" "Just directions," I said.
The policeman's presence was sufficient evidence that my new friend was not, as I briefly suspected, an Iranian intelligence officer. Had he really been with the Ministry of Intelligence or the IRGC, there is no chance he would've been stopped by the Vienna police since Iranian intelligence works in the Austrian capital with impunity. [Read more: Smith/TheWeeklyStandard/2July2015]
The New Normal: China's Risky Intelligence Operations. Thirty years ago, Beijing placed restrictions on its overseas intelligence gathering to prevent political blowback from exposed operations from jeopardizing Deng Xiaoping's Reform and Opening Policy. Today, such political considerations no longer appear to influence Chinese policymakers and intelligence policy. China's widespread theft of information in cyberspace probably has done more to poison the well of US-China relations than almost anything else. The possibility of any meaningful fallout from such operations seems remote from the concerns of Chinese leaders, even as Washington considers more aggressive responses to cyber intrusions.
This shift is remarkable for two reasons related to both China and outsiders watching it. First, while Beijing may speak the language of cooperation, its more aggressive pursuit of intelligence speaks to greater Chinese expectations of competition - expectations that go back at least five years. Second, that this has gone unremarked highlights how little outsiders evaluate Chinese cyber activities in the context of the country's intelligence and security apparatus. Though a forensic accounting of intrusions is useful for policy and security, deriving meaning about Chinese intentions requires this context and answering questions about what cyber gets China that other sources do not.
The idea of a communist system restricting intelligence operations sounds almost absurd on its face; however, 1985 was a big year for China and Chinese intelligence. That year, a mid-level but politically-connected Chinese intelligence official defected to the United States, prompting a chain of events that led to the dismissal of the Minister of State Security Ling Yun, China's civilian intelligence chief. The defection lent credence to the Ministry of Foreign Affairs (MFA) argument to Deng Xiaoping that intelligence operations from official missions overseas should be restricted on the grounds that exposure could jeopardize Deng's efforts to forge links abroad to modernize the Chinese economy. The defection, according to the diplomats, presaged exposure of Chinese intelligence operations abroad, and restricting the kinds of operations and the number of intelligence officers in embassies would be beneficial. Deng, who had suffered at the hands of the previous intelligence services, took the side of the Ministry of Foreign Affairs and placed onerous restrictions on the intelligence officers in embassies - if they were allowed to stay at all. [Read more: Mattis/TheNationalInterest/6July2015]
Section IV - Upcoming Events
AFIO EDUCATIONAL EVENTS IN COMING TWO MONTHS....
15 July 2015, 11:30am - 2pm - San Francisco, CA - The AFIO Andre LeGallo Chapter hosts John Lightfoot, Assistant Special Agent in Charge of the Counterterrorism branch in the FBI San Francisco Division.
Topic will be "Current Issues in Terrorism: Here and Over There".
ASAC Lightfoot will discuss Al-Q'aida today, the rise and threat of the
Islamic State, domestic groups and updates on recent Bay Area cases.
11:30AM no host cocktails; meeting starts at noon. Note different
location: Basque Cultural Center: 599 Railroad Ave, South San Francisco,
E-mail RSVP to Mariko Kawaguchi at email@example.com with your meal choice (Salmon with Champagne Sauce OR Breast of Chicken Chasseur) and you will be sent an Eventbrite link to register. Alternately, mail a check made out to "AFIO" to: Mariko Kawaguchi, P.O. Box 117578, Burlingame, CA 94011. Members and students: $25; non-members $35. $35 at the door. RSVP is required by July 3, 2015 - no walk-ins.
Tuesday, 11 August 2015 - MacDill AFB, Florida - The AFIO Suncoast Chapter hosts Karl D. Klicker, EdD, speaking on the Islamic State.
Dr. Karl Klicker is a retired Marine Corps
Intelligence Officer, currently employed by Jacobs Technology as
Principal Strategist supporting US Special Operations Command. He has
served on psychological operations, civil affairs, interagency task
force and strategic planning teams.
Klicker is the author of Indoc: Ideology, Propaganda and Conflict in the Corps and al-Qaida, a study of internal cultural tensions within the Marine Corps, the roots of division in the Sunni and Shi’a camps; the social psychology of recruiting for war; and the ongoing conflict between radical Islamists and America’s armed forces.
LOCATION: MacDill AFB Surf’s Edge Club, 7315 Bayshore Blvd, MacDill
AFB, FL 33621. Please RSVP by 15 August to the Chapter Secretary for yourself and include the names and email
addresses of any guests. Email or call Michael Shapiro at firstname.lastname@example.org. You will receive a confirmation via email. If
you do not, contact the Chapter Secretary to confirm your registration.
Check-in at noon; opening ceremonies, lunch and business meeting at 1230
hours, followed by our speaker.
FEE: You must present your $20 check payable to “Suncoast Chapter, AFIO” (or cash) at check-in to cover the luncheon. If you make a reservation, don’t cancel and get a cancellation confirmation by the response deadline and then don’t show up, you will be responsible for the cost of the luncheon.
25 - 26 August 2015 - McLean, VA - CIRA and AFIO's 40th Anniversary Conference and Celebration
CIRA (Central Intelligence Retirees Association) and AFIO (Association of Former Intelligence Officers) are holding a joint conference and celebration of our 40th anniversaries on 25-26 August 2015.
Day One - Tuesday, 25 August: This celebration coincides with the next CIA Annuitant Reunion on 25 August where many CIRA and AFIO members, who are CIA retirees, will be in attendance.
AFIO and CIRA members who are CIA annuitants and who retired on an even year, have been invited directly by CIA and should sign up for that day when the CIA invitation arrives in your inbox. Annuitants of odd years who wish to attend may register through the links below.
RESTRICTION: To attend Day One at CIA you need to have been an employee, at some time, of any member agency of the Intelligence Community (or are now currently with, or retired from, one of those agencies). A spouse accompanying you may attend regardless of no prior IC employment. Restriction does not apply to Day Two.
Day Two - Wednesday, 26 August: The conference expands and continues on Day Two at the Sheraton Tysons Hotel, with many CIA, CIRA, AFIO, and other IC speakers and panelists. This second day ends with a "Spies in Black Ties" Anniversary Reception and Awards Banquet.
Invitation Letter to Members
To apply securely online, use form here.
To print-and-mail a registration form, open it here.
Space at this special event is limited.
If you have questions, contact email@example.com
Monday 28 September 2015 - New York, NY - AFIO Metro NY Chapter hears former FBI Special Agent Edward M. Stroz
Speaker Edward Stroz, former FBI, now with the
NYC-based firm of Stroz Friedberg, a global leader in investigations,
intelligence, and risk management. Topic and registration details to
follow in coming weeks.
Stronz was a Special Agent for the FBI before founding Stroz Friedberg in 2000. He is an expert on electronic evidence and investigations, internet extortions, denial of service attacks, computer hacking, insider abuse, theft of trade secrets, electronic discovery matters, and regularly provides expert testimony on these matters. Mr. Stroz pioneered the use of behavioral science in investigations to gain insights about intent and state-of-mind of computer users. He has supervised hundreds of forensic assignments in assisting corporate clients, trial counsel, individuals, and has conducted security assessments for major public and private entities. While at the Bureau, Stroz was responsible for the formation of the FBI’s Computer Crime Squad in New York City, where he supervised investigations involving computer intrusions, denial of service attacks, illegal Internet wiretapping, fraud, and violations of intellectual property rights, including trade secrets.
Location: Society of Illustrators building, 128 East 63rd St, between Park Ave and Lexington Ave.
COST: $50/person Cash or check, payable at the door only. Dinner to follow talk & Q&A. Cash bar. RESERVATIONS: Strongly suggested, not required, Email Jerry Goodwin firstname.lastname@example.org or phone 646-717-3776.
Other Upcoming Events
Wednesday, 8 July 2015, noon - Washington, DC - Global Terrorism, Espionage and Cybersecurity Monthly Update
Be the first to learn the latest intelligence news! Join David Major, a retired Supervisory Special Agent of the FBI and Director of Counterintelligence and Security Programs at the National Security Council staff at the White House, for a briefing on the hottest intelligence and security issues, breaches, and penetrations.
Presented in partnership with The Centre for Counterintelligence and Security Studies (CI Centre), these updates will cover worldwide events such as breaking espionage cases and arrest reports, cyber espionage incidents, and terrorist activity.
Find out Snowden’s current status and what could happen next with this case. Major uses his expertise to analyze trends and highlight emerging issues of interest to both intelligence and national security professionals and the public.
Cases are drawn from the CI Centre’s SPYPEDIA®, the most comprehensive source of espionage information in the world, containing events and information that may not be reported by mainstream media outlets.
Tickets: FREE! No reservation required. Visit www.spymuseum.org
Thursday, 9 July 2015, 6:30pm - Washington DC - "code name: CYNTHIA" - A Spy Musical - at the International Spy Museum
Get yourself to this staged reading and singing of the action-packed new spy musical celebrating the exploits of Betty Thorpe whose real spy career ranged from Madrid to Warsaw to Washington.
Presented by the Pallas Theatre Collective, "code name: CYNTHIA" opens as Paris falls to the Nazis and master spy Betty Thorpe (code name: Cynthia) barely escapes with her life. When a mysterious mastermind blackmails the stunning beauty back into intelligence for the Allies, Betty resolves to seduce the enemy, steal France's naval codes from the Vichy Embassy in Washington, DC, and save her own delicate world from falling to pieces. This lyrical homage features music by Karen Multer and book and lyrics by Steve Multer, a 2014 finalist for the Kleban Prize in Musical Theatre.
Tickets: FREE! No reservation required. Visit www.spymuseum.org
Wednesday, 15 July 2015, noon - Washington, DC - The Billion Dollar Spy: Author Debriefing at the International Spy Museum
While getting into his car on the evening of February 16, 1978, the chief of the CIA's Moscow station was handed an envelope by an unknown Russian. Its contents stunned the Americans: details of top secret Soviet research and development in military technology that was totally unknown to the United States.
From David Hoffman, the Pulitzer Prize-winning author of The Dead Hand, comes the riveting story of the CIA's most valuable spy in the Soviet Union and an evocative portrait of the agency's Moscow station, an outpost of daring espionage in the last years of the Cold War. Drawing on previously secret documents obtained from the CIA, as well as interviews with participants, Hoffman will reveal how the depredations of the Soviet state motivated one man to master the craft of spying against his own nation until he was betrayed to the KGB by a disgruntled former CIA trainee. No one has ever told this story before in such detail, and Hoffman's deep knowledge of spycraft, the Cold War, and military technology makes him uniquely qualified to bring to the International Spy Museum this real life espionage thriller.
Tickets: FREE! No reservation required. Visit www.spymuseum.org
14 October 2015, 6 - 9 pm - Arlington, VA - Silver Anniversary Gala and Chancellor's Dinner by Institute of World Politics
Since its founding, IWP has grown into the nation's premier graduate
school dedicated to developing leaders with a sound understanding of
international realities and the ethical conduct of statecraft, based on
knowledge and appreciation of the founding principles of the American
political economy and the Western moral tradition.
Location: The Ritz-Carlton, Pentagon City, 1250 South Hayes St, Arlington, VA 22202
Sponsorship & Tickets: For information on sponsorship opportunities and ticket purchases, please contact Jennifer Giglio at 202.462.2101 ext. 312 or email@example.com.
Accommodations: A limited room block held at The Ritz-Carlton, Pentagon City is available at the rate of $269 per night.
To make your reservation, please click here. Input the Arrival Date, Departure Date and Group Code: WPGWPGA.
To make your reservation, by phone, please call 1.800.241.3333. Reference the Group Name: The Institute of World Politics
Schedule of Events: 6:00 pm Cocktail Reception, 7:00 pm Dinner and Program
Keynote Speaker: Lt. Gen. Michael T. Flynn, USA (Ret.), 18th Director of the Defense Intelligence Agency
Entertainment: Keni Thomas, Award winning Nashville singer-song writer and a decorated combat veteran with the elite 75th Ranger Regiment special operations unit.
Attire: Black Tie or Military Dress Equivalent
Guests: An estimated 500 guests will gather to celebrate 25 years of The Institute of World Politics' accomplishments and inspire the next generation of leaders. The event will bring together national and international civic and business leaders, members of Congress, and IWP supporters to reflect on the work of the Institute.
Questions to Jennifer E. Giglio at JGiglio@iwp.edu.
Disclaimers and Removal Instructions
Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers.
REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs:
a) IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list. If this link doesn't open a blank email, create one on your own and send to firstname.lastname@example.org with the words: REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.
b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to email@example.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.
CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at firstname.lastname@example.org. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm
WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor's) or author's) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!
(c) 2000, 2012, 2013, 2014, 2015. Please note AFIO's new address: AFIO, 7700 Leesburg Pike Suite 324, Falls Church, Virginia 22043. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: email@example.com
Click here to return to top.