AFIO Weekly Intelligence Notes #33-15 dated 25 August 2015

If you are having difficulties with the links or viewing this newsletter when it arrives by email, members may view the latest edition each week at this link: https://www.afio.com/pages/currentwin.htm You will need your LOGIN NAME and your PASSWORD.
[Editors' Note are now below the CONTENTS]
REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs, click here.

CONTENTS

Section I - INTELLIGENCE HIGHLIGHTS

Section II - CONTEXT & PRECEDENCE

Section III - COMMENTARY

Section IV - Movies and Upcoming Events

Movies

Upcoming Events

Upcoming AFIO Events

Other Upcoming Events

WIN CREDITS FOR THIS ISSUE: The WIN editors thank the following special contributors:  pjk, th and fwr.  They have contributed one or more stories used in this issue.

The WIN editors attempt to include a wide range of articles and commentary in the Weekly Notes to inform and educate our readers. However, the views expressed in the articles are purely those of the authors, and in no way reflect support or endorsement from the WIN editors or the AFIO officers and staff. We welcome comments from the WIN readers on any and all articles and commentary.
CAVEATS: IMPORTANT: AFIO does not "vet" or endorse research inquiries, career announcements, or job offers. Reasonable-sounding inquiries and career offerings are published as a service to our members, and for researchers, educators, and subscribers. You are urged to exercise your usual caution and good judgment when responding, and should verify the source independently before supplying any resume, career data, or personal information.]
If you are having difficulties with the links or viewing this newsletter when it arrives by email, members may view the latest edition each week at this link: https://www.afio.com/pages/currentwin.htm You will need your LOGIN NAME and your PASSWORD.


SPECIAL Announcements

AFIO warmly thanks CIA Director John Brennan, tireless colleagues at the Office of Public Affairs, Toni H and the CIA Museum, the EAA store, the Office of Security, the Office of Protocol, CIA Recruitment Office, our colleagues and conference co-hosts at CIRA, Charles Allen, and the many other speakers and panelists who gave of their highly valuable time to participate in this 40th Anniversary of CIRA and AFIO. We also thank the many members of both associations, the annuitants, guests, students, and universities/bookstore/vendors who participated (more than 450) in the remarkable two day CIRA-AFIO Conference at CIA and the Sheraton Tysons Hotel.

Click image above to view larger version. Just a few of the many special moments at this 2-day educational review of 40 years of changes at CIA, CIRA, AFIO, and the U.S. Intelligence Community.


CIA Invites AFIO Members and Guests
in the Austin, Texas region
or visitors to that area
to a special Document-Release Event
at the LBJ Library

16 September 2015
on
"The President's Daily Brief:
Delivering Intelligence to the First Customer"

A special reception will follow

D/CIA John O. Brennan will speak

CIA invites AFIO members and guests to attend this no-fee CIA document release event on the President's Daily Brief being held at the LBJ Library in Austin, Texas. Almost 2,500 previously classified CIA documents will be released on Wednesday, September 16 at the Lyndon B. Johnson Presidential Library in Austin, Texas at a public symposium entitled The President’s Daily Brief: Delivering Intelligence to the First Customer. CIA director John O. Brennan will present the event’s keynote speech.

The President’s Daily Brief (PDB) contains the highest level intelligence analysis of key national security issues and concerns of the President. Only the President, the Vice President, and a select group of Cabinet-level officials designated by the President receive the briefing.

This release highlights the role of the PDB in foreign and national security policy making.The collection includes the President’s Intelligence Checklists (PICLs)—which preceded the PDB—published from June 1961 to November 1964, and the PDBs published from December 1964 through the end of the Johnson’s term in January 1969. The documents, when released, can be viewed online.

Speakers: John O. Brennan, Director, CIA; James Clapper, Director of National Intelligence; David Robarge, Chief Historian, CIA; Mark Updegrove, Director, Johnson Library (also will serve as Emcee); Porter Goss, former Director/Central Intelligence Agency; Bobby Inman,Former Deputy Director of Central Intelligence; Peter Clement, Senior Intelligence Officer and former PDB briefer; David S. Ferriero, Archivist of the United States; John Helgerson, former Deputy Director for Intelligence, CIA; William Inboden, Executive Director, Clements Center, University of Texas. Closing remarks by Joseph Lambert, Director, Information Management Services, CIA. (*unconfirmed).

LOCATION: The symposium will be held at the Lady Bird Johnson Auditorium in the Lyndon B. Johnson Presidential Library, 2313 Red River St, Austin, TX, located in the building that houses the LBJ Museum and Library on the UT Austin Campus.

RSVPs: To attend this no-fee event, register NOW at this link.

The collection to be released above on the PDB was put together as part of the CIA’s Historical Review Program, which identifies, reviews, and declassifies documents on historically significant events or topics. Previous releases can be seen here.


17th NCMF GENERAL MEMBERSHIP MEETING & SYMPOSIUM
21 OCTOBER 2015

NCMF_GMM

Registration is now open for the 17th NCMF General Membership Meeting & Symposium on 21 October 2015 in Laurel, MD. The theme for this year's event is "The Changing Face of Terrorism," and the program will feature guest speakers, including keynote speaker Mr. Robert Grenier, author of 88 Days to Kandahar. The program will also include a tribute to NCMF friend and former Chairman of the BoD Lt Gen Lincoln D. Faurer. Registration includes breakfast and lunch. Registration fees are $30 for NCMF members and $50 for non-members (includes a one-year complimentary NCMF membership). Registration deadline is 16 October.Remember, this year the Annual Meeting coincides with the Cryptologic History Symposium (see description at this link). Register HERE for both and enjoy multiple days of cryptology!

22 and 23rd October follow featuring NSA's Center for Cryptologic History on "A Century of Cryptology."
More information on that special Symposium is here.


Section I - INTELLIGENCE HIGHLIGHTS

Prosecutors Launch Case Against CIA Double Agent. Federal prosecutors have brought charges against a former worker at Germany's foreign intelligence agency who is suspected of passing information to American spies.

The 32-year-old former Bundesnachrichtendienst (BND) worker is accused of treason, infringing official secrets and corruption after passing secrets to the Central Intelligence Agency (CIA) in exchange for cash.

Prosecutors said in a statement on Thursday that they had filed charges at the state court (Oberlandesgericht) in Munich.

The alleged spy joined the BND in 2007 and worked for the CIA from 2008, they said. [Read more: TheLocal/20August2015]

Inquiry Weighs Whether ISIS Analysis Was Distorted. The Pentagon's inspector general is investigating allegations that military officials have skewed intelligence assessments about the United States-led campaign in Iraq against the Islamic State to provide a more optimistic account of progress, according to several officials familiar with the inquiry.

The investigation began after at least one civilian Defense Intelligence Agency analyst told the authorities that he had evidence that officials at United States Central Command - the military headquarters overseeing the American bombing campaign and other efforts against the Islamic State - were improperly reworking the conclusions of intelligence assessments prepared for policy makers, including President Obama, the government officials said.

Fuller details of the claims were not available, including when the assessments were said to have been altered and who at Central Command, or Centcom, the analyst said was responsible. The officials, speaking only on the condition of anonymity about classified matters, said that the recently opened investigation focused on whether military officials had changed the conclusions of draft intelligence assessments during a review process and then passed them on. [Read more: Mazzetti&Apuzzo/NewYorkTimes/25August2015]

Nečasov� Acquitted of Abuse of Military Intelligence. The court has acquitted Jana Nečasov�, who headed then Czech PM Petr Nečas's office in the early 2010s and whom he later married, of abuse of military intelligence (VZ) based on the testimony of Nečas and VZ officers who dismissed the VZ having spied on then Nečas's wife Radka, daily Pr�vo writes.

People could hear neither Nečas's nor the suspects' testimony at Prague 1 District Court because the judge, Helena Kr�lov�, ordered that the proceedings be closed to the public.

Pr�vo writes it has the judge's explanation of the verdict at its disposal.

Kr�lov� did not explain her verdict when she acquitted Nečasov� (formerly Nagyov�) and three former VZ officers in May, which caused embarrassment among commentators and the public. [Read more: CzechNewsAgency/26August2015]

Military Intelligence Research Seeks to Uncover Threats From Social Media, Other Text. US Air Force military intelligence experts are asking industry for new ways of uncovering existing and future global military threats from mountains of openly available text data, such as social media, blogs, and chat rooms.

Officials of the Air Force Research Laboratory Information Directorate in Rome, N.Y., issued a solicitation Tuesday (BAA-AFRL-RIK-2015-0019) for the Multi-Source Information Extraction & Network Analysis (MUSIENA) program.

MUSIENA seeks to develop analytics, analytical tools, algorithms, and projects to help Air Force and other intelligence analysts sift vast amounts of text data quickly to discover and identify global military threats, as well as analyze emerging global threats.

Although previous research has led to automated tools to extract information from large volumes of textual data, it has not kept pace with the sheer volume of data that analysts must investigate. MUSIENA seeks to move beyond current capabilities and move to new data types and domains. [Read more: Keller/Military&Aerospace/20August2015]

CIA Plans Huge Release of Top Secret Reports From the 1960s. The Central Intelligence Agency is set to release 2,500 previously top secret briefings it gave to presidents John F. Kennedy and Lyndon B. Johnson in the 1960s, a private pro-CIA group announced on Wednesday.

"The vast majority of the documents have never been previously released," an informed official said, although a number of CIA presidential briefings have surfaced in heavily redacted form over the years. Intelligence officials from the Kennedy and Johnson administrations have also discussed their private conversations with the presidents in memoirs and other books.

The reports, customarily provided personally to the president each morning by a senior CIA officer, if not the director himself, will almost certainly show much of what the spy agency was telling Kennedy and Johnson about Vietnam, Cuba, the Soviet Union, China and conflicts in Africa and the Middle East. They may well also include the CIA's private assessments of world leaders.

It could not be immediately learned whether the CIA records to be released include what the agency told Johnson about the November 1963 assassination of his predecessor, Kennedy. Many critics have leveled unproven charges over the years that CIA-linked personnel may have been involved in the assassination. [Read more: Stein/Newsweek/26August2015]

US Intelligence Community Provides Innovation Exchange. Global Marketing Insights Inc. today issued an invitation for Industry, Federal Civil, First Responders and Local Law Enforcement communities to participate in a Community Innovation Exchange with the US Intelligence Community. Hosted by the US Multi-INT Tradecraft Community of Practice (MINT-T CoP), this no fee event includes classified and unclassified sessions 21-25 Sept. 2015 in Chantilly, VA.

Participation is open to US citizens and Commonwealth allies, and the Call for Engagement (Presentation) responses for speakers and demonstrations must be submitted by Friday, Aug. 28. Registration for attendance must be completed with security clearance information by Sept. 4.

"This event is an opportunity for the federal civil, industry, first responders and law enforcement personnel to share tradecraft knowledge with Department of Defense and intelligence community practitioners," said Dr. Shawana Johnson, President of Global Marketing Insights. "The goal of this cross-discipline exchange is to solve complex intelligence issues and maximize resource allocation."

Following a similar session at the 2015 GEOINT Conference in June, MINT-T CoP requested Global Marketing Insights (GMI) - a geospatial business intelligence firm - organize the Exchange on behalf of the DoD and Intelligence Community. The event is open to all analysts, collection officers and technical subject matter experts within the Industry, Fed/Civil, Local Law Enforcement and First Responder community. DoD and intelligence community counterparts and decision makers will be in attendance. [Read more: DirectionsMagazine/25August2015]

Intelligence-Sharing and Foreign Expertise to Contain Terrorism During Brazil Olympics but Lone-Wolf Attacks Remain a Concern. For the 2016 Olympics, Brazil is doubling the manpower deployed during the 2014 FIFA football World Cup and is focusing on intelligence-sharing and leveraging foreign expertise.

Although Brazil does not have home-grown terrorist groups, the authorities fear foreign terrorist groups may stage an attack to garner international attention.

Brazil benefits from the experience of organising previous major sporting events such as the World Cup; manpower appears sufficient and centralisation of intelligence will help to prevent terrorism. However, lone-wolf attacks pose the major concern as their prevention is extremely difficult.

According to the special secretary for the security of mega-events, Brazil's security operation for the Rio Olympics will be the largest in the country's history. [Read more: Caicedo&Selman/IHSJane's/25August2015]

Massive Blast Hits Intelligence Service Building in Aden. The blast is believed to have been caused by explosives planted around the facility, which is sited in central Aden, they said.

The explosion was felt across the southern city. Heavy columns of smoke were seen billowing from the building.

No casualties were reported. There was no immediate claim of responsibility.

However, independent news site Aden al-Ghad said that the attack is thought to have been carried out by al-Qaeda-linked insurgents. [Read more: Dalje/22August2015]


Section II - CONTEXT & PRECEDENCE

Tycoon's Hush-Hush Plan for Spy Museum. A secretive serial entrepreneur who has helped to create companies worth billions is in discussions with British spies to bring their work into the open.

John Hunt, who co-founded the Seattle Coffee Company that was sold to Starbucks for �75m, is planning to create a spy museum at the London Trocadero, the entertainment complex that was home to the Guinness World of Records until the 1990s.

He is understood to have held discreet talks with current and former spymasters from MI5, MI6 and GCHQ, the government's listening agency, about his vision to create Spyscape, a homage to "intelligence and cybersecurity." 

Having launched a series of businesses including Syzygy, an internet consulting company that was floated on the German stock market for about �145m, Hunt has decided to fill a gap in British museums by exploring the world of the double-cross and dead letter drop. [Read more: Kerbaj/TheSundayTimes/23August2015]

Cedric Belfrage - 'Sixth Man' Soviet Spy Who Hid in Plain Sight. Cedric Belfrage - Hollywood promoter, superstar film critic, newspaper proprietor, philanderer and consummate self-publicist - was the unlikeliest of Soviet spies.

A trove of newly declassified documents, released on Friday by the British security service MI5, reveal him as a "sixth man" to stand alongside the notorious Cambridge Five spy ring that sat at the heart of British intelligence during the second world war and the early years of the atomic age. 

Unlike the more famous quintet of his contemporaries, however, Mr. Belfrage has been almost lost to history. He never defected to Moscow and he was never prosecuted for his crimes.

Details of his life, contained in nine volumes comprising hundreds of official top-secret documents, shed fresh light on the extent of the Soviet Union's infiltration of Britain's wartime spy networks - and the bloody-minded determination of British officials not to believe it. [Read more: Jones/FinancialTimes/21August2015]

How MI5 Failed to Expose Matriarch of Cambridge Spy Ring. The grave fascination that MI5 developed for an emigre photographer living in a small flat in north London - and the eventual realisation that she had been a key figure behind the Cambridge spy ring at the height of the cold war - has emerged from the secret files the agency compiled about her.

Declassified after 50 years, they show that MI5 subjected Edith Tudor-Hart to round-the-clock surveillance, opened her mail, tapped her telephone, bugged her home and eavesdropped on the conversations of her friends and associates. The agency even set up an observation post from which they could see her retiring to bed.

At one point in January 1952, after the defection of the Foreign Office spies Guy Burgess and Donald Maclean had dumbfounded the British government and threatened its intelligence relationships with the United States, two MI5 officers barged into Tudor-Hart's home and interrogated her while she lay in bed.

The MI5 files detail the way in which the agency's close scrutiny of Tudor-Hart's life eventually drove her to a breakdown and serious mental illness. Its officers never caught her spying, however; the only time they witnessed her committing an offence was when she dodged paying her bus fare. [Read more: Cobain/TheGuardian/20August2015]

Cryptology, Whack-a-Mole, & Time Travel: NSA's Research Director on Securing Cyberspace. Not every leading scientist in the US government can pack a conference room for a talk about securing cyberspace. But when the scientist is Dr. Deborah Frincke, who leads the National Security Agency's Research Directorate and is one of the nation's top researchers in the field, people sit up and listen.

On Thursday afternoon, August 13, 2015, Frincke addressed a roomful of academic and industry members at the 24th annual USENIX Security Symposium on Capitol Hill in Washington, DC. Many sat on the floor or leaned against the walls to hear Frincke's talk about NSA's research efforts, "Perspectives on Securing Cyberspace." USENIX, the nonprofit Advanced Computing Systems Association, and its annual Security Symposium attract researchers, practitioners, systems programmers and engineers, and others interested in advancement of security of computer systems and networks.

"It's my job to make sure the US maintains an advantage over threats and adversaries using science," Frincke said.

She explained three research areas that support NSA's missions of foreign signals intelligence and information assurance: protecting America's cyberspace, discovering information about America's adversaries, and defending the nation by putting information assurance and signals intelligence together in real, "cyber" time, Frincke said. [Read more: NSA.gov/18August2015]

Sharing Cyber Intelligence to Fight Cyber Crime and Fraud-as-a-Service (FaaS). Wired reported earlier this week that hackers posted a "data dump, 9.7 gigabytes in size" to the dark web using an Onion address accessible only through the Tor browser." The data included names, passwords, addresses, profile descriptions and several years of credit card data for 32 million users of Ashley Madison, a social network billing itself as the premier site for married individuals seeking partners for affairs.

"I want to show you the dark side of the net," Etay Maor told me when we met a couple of weeks ago at the IBM offices in Cambridge, Massachusetts. He then proceeded to give me a tour of the Internet's underground, where cyber criminals and hackers exchange data, swap tips, and offer free and for-fee services. "Information sharing is a given on the dark side," said Maor, "but for the good guys, it's not that easy."

Maor is a senior fraud prevention strategist at IBM and has watched the dark side of the Web at RSA, where he led the cyber threats research lab, and later at Trusteer, a cybersecurity startup which IBM has acquired in 2013 for a reported $1 billion. His focus is cybercrime intelligence, specifically malware - understanding how it is developed and the networks over which it is distributed. Maor is an expert on how cyber criminals think and act and shares his knowledge with IBM's customers and also with the world at large by speaking at conferences and blogging at securityintelligence.com.

The Web is like an iceberg divided into three segments, each with its own cluster of hangouts for cyber criminals and their digital breadcrumbs. The tip of the iceberg is the "Clear Web" (also called the Surface Web), indexed by Google and other search engines. The very large body of the iceberg, submerged under the virtual water, is the "Deep Web" - anything on the Web that's not accessible to the search engines (e.g., your bank account). Within the Deep Web lies the "Dark Web," a region of the iceberg that is difficult to access and can be reached only via specialized networks. [Read more: Press/Forbes/20August2015]

U-2 Spy Plane Pilot Lives on the Edge - of Space, Danger and Obsolescence. Maj. David Brill squeezes into a bulky yellow spacesuit, lowers a fishbowl-size helmet onto his head and readies himself for a flight into the stratosphere.

In an hour, he will roar aloft in a U-2, the iconic single-seat spy plane - capable of flying to 70,000 feet, or more than 13 miles high - first built in the early Cold War.

At that altitude, the only humans higher are in the International Space Station. The curving Earth appears like a ghostly vision below and the blackness of outer space looms overhead.

"There are these moments when I can see the sun over my left shoulder and the moon over my right," said Brill, 36. "There aren't a lot of people that get to experience that." [Read more: Hennigan/LATimes/26August2015]

Sophia Burnell Gathered Intelligence, Broke Japanese Code in WWII. In 1943, Sophia Burnell enlisted with the WAACs (Women's Army Auxiliary Corps) because she wanted to get out of Ellwood, see the world and do something for her country - and she did all three.

After graduating from Lincoln High School in 1940, Burnell was working as a clerk at Sam Burkowitz's United Foods store on Lawrence Avenue when she decided to join the WAACs.

"I said I needed the day off to go to the doctor because, I thought, 'If I don't pass the test, then no one will know,'" Burnell said.

She passed the test with high scores, took her physical in Pittsburgh and went to Daytona Beach, Fla., for her basic training at a camp next to the Daytona Beach race track, which was closed during the war.

Basic training for women began at 6 a.m. with roll call and drill. [Read more: Carroll/TheLedger/24August2015]


Section III - COMMENTARY

Israeli Military Intelligence: Is Israeli Intelligence for the Iran Deal? J.J. Goldberg at the Forward has been running a campaign to persuade Americans that Israel's intelligence community is at odds with Prime Minister Benjamin Netanyahu over the Iran deal. Not only the preponderance of retired professionals but also currently serving ones, dissent from Netanyahu's read of the deal. Netanyahu can't silence the former, but he's given a "gag order" to the latter - to no avail. Military intelligence has even produced a "surprising," "game-changing" assessment that undermines him completely, according to which the "upsides [of the deal] aren't perfect," but "the downsides aren't unmanageable... The disadvantages are not too calamitous for anyone to cope with them." Military intelligence sees "an imperfect but real opening in Iran. It believes that opportunities are being lost." Netanyahu's own "diagnosis doesn't match his own intelligence."

It's all polemical and politicized nonsense.

A real expert, Emily Landau (at the Institute for National Security Studies in Tel Aviv) has already taken Goldberg to the woodshed about the retired professionals (Goldberg has a weird predilection for calling them "spooks"). Landau, without naming the names of these "experts," points out that Iranian politics and nuclear issues are well beyond the expertise of most of them. Not everyone with a pension and an opinion is equal. And most of those who think that Israel should back off a fight over the deal still think it's a bad one. They just argue that it's inevitable anyway, so why provoke Barack Obama? This isn't support for the deal, it's resigned acquiescence. (The military correspondent of The Times of Israel did a parallel debunking, after the White House began to tweet similar claims.)

But what about the "game-changing" assessment by those who serve now? [Read more: Kramer/Commentary/24August2015]

A Guide to Chinese Intelligence Operations. Discussion of China's intelligence threat often seems over-hyped if not disconnected from reality. Apart from cyber intrusions, little evidence suggests Chinese intelligence deserves the credit for quality that it has received. The most common anecdote of Chinese collection, repeated since the 1990s, is a Chinese official dipping his tie in a chemical solution to get a sample at a tradeshow, and one of the most recent Chinese intelligence success in the United States resulted from the hustling of a Louisiana furniture salesman. This is not the kind of operational sophistication and savvy one would expect of Sun Tzu's successors.

Instead, the Chinese intelligence threat for many years has come from the scope, scale, and potential impact of Beijing's collection efforts. From the 1980s onward, the FBI complained of hundreds of potential espionage-related cases involving China, and the Bureau continues to raise the alarm about the persistence of Chinese collectors attempting to steal from US companies. Amid the cacophony of potential economic espionage cases, the Chinese intelligence services have quietly attempted to penetrate foreign governments by recruiting serving officials, use retirees to work back against their former colleagues, and use Track II or scholarly exchanges to capture the policy atmosphere in foreign capitals. These operations have never been about operational creativity and skill, but rather persistence and volume.

This is not to say that the Chinese Communist Party does not have a history of sophisticated intelligence operations in the 20th century, or that its intelligence services are not capable of skilled operations. Many of China's top diplomats and leaders, from Premier Zhou Enlai to the less well-known Li Kenong and Xiong Xianghui spearheaded the party's intelligence efforts during the civil war. However, in the battles between ideology and professionalism that characterized Mao's China, many professional spies were purged, gutting the ranks of expertise to be passed down to the next generation on the current scale of the state intelligence bureaucracy. But, as China builds experience and Beijing becomes a global player, operational skill is likely to increase and add another dimension to Chinese intelligence efforts. [Read more: Mattis/WarOnTheRocks/18August2015]


Section IV - Movies and Upcoming Events


Movies

Secrets and Lies on the Bridge of Spies: A Brave Spy Shot Down Over Russia, or a Traitor Too Weak to Take His Suicide Pill? Brilliant new Tom Hanks movie solves the Cold War mystery of CIA operative Gary Powers. 

At an agreed signal, the two men began to walk slowly towards each other through the fog shrouding Berlin's iron-framed Glienicke Bridge.

It was February 1962 - the height of the Cold War, with the Cuban missile crisis just a few months away - and the mood was beyond tense: after all, this strange meeting in the darkness above the Havel river was the first official 'Spy Exchange' between Soviet Russia and the West.

Gary Powers, the CIA operative famously shot down above Russian territory, was edging his way to freedom. His extraordinary story of survival should have led to him being hailed an all-American hero. [Read more: Witheridge/DailyMail/22August2015]


Upcoming Events

AFIO EDUCATIONAL EVENTS IN COMING TWO MONTHS....

Wednesday, 9 September 2015, 11 a.m. - Albuquerque, NM - The AFIO New Mexico Chapter meets to hear Eric Burkhart

Mr. Eric Burkhart is a retired CIA Officer living in Texas, where there is - remarkably -no AFIO Chapter. Texas� void is our gain, as Mr. Burkhart has volunteered to travel here to speak to our group in September. Fortunately, Mr. Burkhart recently retired following a successful career as a CIA Case Officer. He spent most of his career in war zones, including Iraq, Kosovo, and various locations in Africa. He will discuss his book about his experiences and career. The book, just published, is Mukhabarat, Baby! Mortars, WMD, Mayhem and Other - Memoirs of a Wartime Spy - A CIA Spy Memoir available at here.
Location: �The Egg & I�, 6909 Menaul Blvd (just East of Louisiana)
Registrations to Pete Bostwick (505) 898-2649 foreigndevil@yahoo.com or to Mike Ford (505) 294-6133 Secpro39@yahoo.com

11 September 2015, noon-1 p.m. - San Diego, CA - The AFIO SD Chapter hears Matt Miller on "Snapshot of Global Security as of 9/11/2015."

Please mark your calendars for a San Diego AFIO meeting on 9/11/15 from 1200-1300. The distinguished speaker will be Mr. Matt Miller, the Private Sector Coordinator at the Law Enforcement Coordination Center. Mr. Miller is an incredibly engaging and knowledgeable speaker with a vast knowledge and career in intel, military operations, and global affairs.

Mr. Miller will present a "Snapshot of Global Security as of 9/11/15," which will cover the threats from global terrorist organizations and state sponsored adversaries.

In addition to Mr. Miller, I am looking to schedule a brief updated on what the SDSU's VizLab has accomplished recently (in the homeland security arena), as well as bring in a speaker on social media exploitation to identify violent extremists (timely given recent identification of such extremists in California).

Lunch will be coordinated so that you can order ahead, and have the meal waiting for you.

I look forward to seeing you all on 9/11/15! RSVP to Alex Carrillo, AFIO San Diego

Saturday 12 September 2015 - Melbourne, FL - AFIO Florida Satellite Chapter hears a speaker from the American Security Council Foundation

Brigadier General Donald B. Smith, Chairman of the Board of the American Security Council Foundation will be on hand to address us on the history of the American Security Council and the ASCF with emphasis on the Step Up America Program, "The Call to Good Citizenship". The American Security Council Foundation (ASCF) was formed in 1958, and was originally known as the Institute for American Strategy. For almost 50 years the Foundation has focused on a wide range of educational programs which address critical challenges to U.S foreign policy, national security and the global economy.

Location: Indian River Colony Club, 1936 Freedom Drive, Melbourne, FL 32962, 12 noon.

Reservations Required: contact FSC Chapter President at afiofsc@afio.com.

Monday 28 September 2015, 6:30 - 8 p.m. - New York, NY - AFIO Metro NY Chapter hears former FBI Special Agent Edward M. Stroz on "Impact of Edward Snowden on US Security and Cyber Warfare."

Speaker Edward Stroz, former FBI, now with the NYC-based firm of Stroz Friedberg, a global leader in investigations, intelligence, and risk management. Topic and registration details to follow in coming weeks. He will speak on Edward Snowden - His impact on American security and cyber warfare. Mr. Stroz will speak about why information security is such a vexing goal and how insider threats are being addressed today.
Stronz was a Special Agent for the FBI before founding Stroz Friedberg in 2000. He is an expert on electronic evidence and investigations, internet extortions, denial of service attacks, computer hacking, insider abuse, theft of trade secrets, electronic discovery matters, and regularly provides expert testimony on these matters. Mr. Stroz pioneered the use of behavioral science in investigations to gain insights about intent and state-of-mind of computer users. He has supervised hundreds of forensic assignments in assisting corporate clients, trial counsel, individuals, and has conducted security assessments for major public and private entities. While at the Bureau, Stroz was responsible for the formation of the FBI�s Computer Crime Squad in New York City, where he supervised investigations involving computer intrusions, denial of service attacks, illegal Internet wiretapping, fraud, and violations of intellectual property rights, including trade secrets.
Location: Society of Illustrators building, 128 E 63rd St, between Park Ave and Lexington Ave.
COST: $50/person Cash or check, payable at the door only. Dinner to follow talk & Q&A. Cash bar. RESERVATIONS: Strongly suggested, not required, Email Jerry Goodwin afiometro@gmail.com or phone 646-717-3776.


Other Upcoming Events

Friday, 25 September 2015, 6:30pm - Washington, DC - Annie Jacobsen - The Pentagon's Brain. An Uncensored History of DARPA, America's Top-Secret Military Research Agency at the International Spy Museum

The Defense Advanced Research Projects Agency (DARPA) is the radical force behind the nation's most revolutionary, high-tech military initiatives over the past half century. To write the first definitive history of the world's most powerful and productive military science agency, bestselling author Annie Jacobsen tracked down DARPA scientists, past and present, including current neuroscientists building an artificial brain, cell biologists working on limb regeneration, and even the Nobel Laureate who invented the laser. From conflict-tested science experiments, like Agent Orange and electronic barriers on the battlefield during Vietnam, to War on Terror insect drones, smart rockets, camera-filled war zones and advanced computer programs, she tracks DARPA from its Cold War inception to present day research controversies. Jacobsen will share her journey to the heart of the military-industrial complex-a place where science fiction and military science meet-and will reveal a future that is fascinating and potentially frightening.
Tickets: FREE! No reservation required. Visit www.spymuseum.org

Tuesday, 29 September 2015, noon - Washington, DC - Jason Hanson - Spy Secrets That Can Save Your Life at the International Spy Museum

Jason Hanson is a former CIA officer, security specialist, and recent successful contestant of ABC's reality show Shark Tank. Jason teaches everyday citizens to defend themselves at his Spy Escape and Evasion school. He has been interviewed by major media outlets for his security expertise, including The Wall Street Journal, Fox News and The Huffington Post. He currently lives in Cedar City, Utah, with his family.

When Jason Hanson joined the CIA in 2003, he never imagined that the same tactics he used as a CIA officer for counter intelligence, surveillance, and protecting agency personnel would prove to be essential in everyday civilian life.

In addition to escaping handcuffs, picking locks, and spotting when someone is telling a lie, he can improvise a self-defense weapon, pack a perfect emergency kit, and even disappear off the grid if necessary. He has also honed his "positive awareness"--a heightened sense of his surroundings that allows him to spot suspicious and potentially dangerous behavior - on the street, in a taxi, at the airport, when dining out, or in any other situation.

In this engaging book, Hanson shares this know-how with readers, revealing how to: prevent home invasions, carjackings, muggings, and other violent crimes; run counter-surveillance and avoid becoming a soft target; recognize common scams at home and abroad; become a human lie detector in any setting; gain peace of mind by being prepared for anything instead of uninformed or afraid.

With the skill of a trained operative and the relatability of a suburban dad, Hanson brings his top-level training to everyday Americans in this must-have guide to staying safe in an increasingly dangerous world.
Tickets: FREE! No reservation required. Visit www.spymuseum.org

Tuesday, 29 September 2015, 7-10 pm - Washington, DC - Dinner with a Spy - An Evening with Jon Monett at the International Spy Museum

A passion for developing and using cutting edge technology has taken Jon Monett from Cold War warrior to successful entrepreneur to 21st century philanthropist. Monett served more than 26 years at the CIA in the Office of Technical Services (OTS), initially as a technical operations specialist and ultimately becoming responsible for managing the CIA�s technical activity worldwide. OTS is where technological innovations are launched and operationally deployed - not just where gadgets are made, but where the stuff of science fiction becomes reality.

When he retired, Monett started the global security consulting and intelligence advisory services company Telemus Solutions. After selling Telemus he wanted to use his technological background to support wounded warriors; in 2008 he established Quality of Life Plus at Cal Poly in San Luis Obispo, California to foster and generate innovations to aid and improve the quality of life of those injured in the line of duty. At this gathering, International Spy Museum Executive Director Peter Earnest will lead a conversation with Monett about the technological advances in intelligence operations that he�s been involved with, and cover everything from Monett�s days participating in technical operations to his thoughts on cyber-terrorism and his current philanthropic application of fostering innovation. You will be one of only twelve guests at nopa Kitchen+Bar for this three-course dinner.
Tickets: $300* includes hors d�oeuvres and three-course dinner with wines. Reservations can be made atwww.spymuseum.org

14 October 2015, 6 - 9 pm - Arlington, VA - Silver Anniversary Gala and Chancellor's Dinner by Institute of World Politics

Since its founding, IWP has grown into the nation's premier graduate school dedicated to developing leaders with a sound understanding of international realities and the ethical conduct of statecraft, based on knowledge and appreciation of the founding principles of the American political economy and the Western moral tradition.
Location: The Ritz-Carlton, Pentagon City, 1250 South Hayes St, Arlington, VA 22202
Sponsorship & Tickets: For information on sponsorship opportunities and ticket purchases, please contact Jennifer Giglio at 202.462.2101 ext. 312 or jgiglio@iwp.edu.
Accommodations: A limited room block held at The Ritz-Carlton, Pentagon City is available at the rate of $269 per night.
To make your reservation, please click here. Input the Arrival Date, Departure Date and Group Code: WPGWPGA.
To make your reservation, by phone, please call 1.800.241.3333. Reference the Group Name: The Institute of World Politics
Schedule of Events: 6:00 pm Cocktail Reception, 7:00 pm Dinner and Program
Keynote Speaker: Lt. Gen. Michael T. Flynn, USA (Ret.), 18th Director of the Defense Intelligence Agency
Entertainment: Keni Thomas, Award winning Nashville singer-song writer and a decorated combat veteran with the elite 75th Ranger Regiment special operations unit.
Attire: Black Tie or Military Dress Equivalent
Guests: An estimated 500 guests will gather to celebrate 25 years of The Institute of World Politics' accomplishments and inspire the next generation of leaders. The event will bring together national and international civic and business leaders, members of Congress, and IWP supporters to reflect on the work of the Institute.
Questions to Jennifer E. Giglio at JGiglio@iwp.edu.

22-23 October 2015 - Laurel, MD - "A Century of Cryptology" - NSA's Center for Cryptologic History hosts Biennial Symposium on Cryptologic History - Registration now open

The Center for Cryptologic History invites you to attend the Center’s biennial Symposium on Cryptologic History which will take place October 22-23, 2015. The Symposium will be held at the Johns Hopkins Applied Physics Laboratory's Kossiakoff Center in Laurel, Maryland. Following the Symposium, on Saturday, October 24, participants will be given an opportunity to tour the National Cryptologic Museum and participate in a workshop on sources for research in cryptologic history. The Symposium is an occasion for historians to gather for reflection and debate on relevant and important topics from the cryptologic past. Regular participants include historians from the Center for Cryptologic History, the Intelligence Community, the defense establishment, the military services, distinguished scholars from American and foreign academic institutions, veterans of the cryptologic profession, graduate and undergraduate students, and the interested public. Past symposia have featured scholarship that set out new ways to consider our cryptologic heritage, and this one will be no exception. The conference will provide many opportunities to interact with leading historians and other distinguished experts. The mix of practitioners, scholars, and interested observers always guarantees a lively debate promoting an enhanced appreciation for past events.

Event Location: Johns Hopkins APL Kossiakoff Auditorium - 11100 Johns Hopkins Road, Laurel, MD 20723-6099 PDF of the Symposium Agenda is here. One of the speakers will be AFIO's president emeritus, Gene Poteat.

In addition to the two-day symposium, on Saturday, October 24, participants will have an opportunity to tour the National Cryptologic Museum and participate in a workshop in the NCM Library from 1000-1130 on sources for research in cryptologic history. Bring your research and questions. Sign up to attend this workshop at Registration on the 22nd or 23rd. Also on Saturday at the NCM from 1000-1130 - visit the NCM's Magic Room for "Museum History and Treasures" (no sign-up required).

As we mark the centenary years of World War I (1914–1918), when so many significant advancements occurred in the field of cryptology, we will also examine the impact cryptologists made throughout the twentieth century, especially during such periods as World War II, the Cold War, the Korean War, the War in Vietnam, and the post-Cold War era. The Symposium will also include panels that look at the foundations of cryptology before the “Great War.” We welcome submissions from those who are new to the field and those who have presented at previous symposiums.

The Symposium is a prestigious program of the NSA's Center for Cryptologic History that showcases speakers who are recognized as cryptologic authorities from around the world. The theme and agenda topics for the Symposium always attract the interest of scholars, professionals, and the public. Since 2003, the Foundation (NCMF) has teamed with the CCH to help stage this exciting bi-annual event that attracts international attention from academia and the Intelligence Community.

Registration per person: $70/day. Full-time student rate: $35/day (please bring student ID to Symposium)

REGISTRATION MUST BE RECEIVED BY 19 OCTOBER. Unfortunately, we will not be able to make any refunds after 19 October.

Fee includes daily lunch, plus morning and afternoon refreshments. Shuttle bus service will be available from the lower level parking lot. For special accommodations or dietary needs, please contact history@nsa.gov.

Register on-line here or mail your registration form (download a PDF of the form) with payment to: National Cryptologic Museum Foundation (NCMF) POB 1682, Fort George G. Meade, MD 20755. Make checks payable to: NCMF.

For registration assistance call (301) 688-5436. For symposium information call (301) 688-2336.


Disclaimers and Removal Instructions

Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers. 

REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs: 

a)  IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list.  If this link doesn't open a blank email, create one on your own and send to afio@afio.com with the words:  REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.

 b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to afio@afio.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.

CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at afio@afio.com. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm


WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor's) or author's) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!

(c) 2000, 2012, 2013, 2014, 2015. Please note AFIO's new address: AFIO, 7600 Leesburg Pike, Suite 470 East, Falls Church, VA 22043-2004. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: afio@afio.com

Click here to return to top.