AFIO Weekly Intelligence Notes #36-13 dated 17 September 2013

[Editors' Note: The WIN editors attempt to include a wide range of articles and commentary in the Weekly Notes to inform and educate our readers. However, the views expressed in the articles are purely those of the authors, and in no way reflect support or endorsement from the WIN editors or the AFIO officers and staff. We welcome comments from the WIN readers on any and all articles and commentary.]
If you are having difficulties with the links or viewing this newsletter when it arrives by email, members may view the latest edition each week at this link: https://www.afio.com/pages/currentwin.htm You will need your LOGIN NAME and your PASSWORD.
REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs, click here.

CONTENTS

Section I - INTELLIGENCE HIGHLIGHTS

Section II - CONTEXT & PRECEDENCE

Section III - COMMENTARY

Section IV - Books and Coming Events

Books

Coming Educational Events

Current Calendar for Next Two Months ONLY

 

AFIO's Vice President, John Sano, was interviewed on C-SPAN Washington Journal Tuesday, 10 September 2013 on CIA Uses of Intelligence.

John Sano, who oversaw the day-to-day management of the CIA's covert operations as the former deputy director of its National Clandestine Service, talks about how the CIA gathers and uses intelligence. Click image or link to view 41 minute program.

http://www.c-spanvideo.org/program/314938-5


"Safeguarding Intelligence"

Theme of the National Cryptological Museum Foundation's Annual Membership Meeting

16 October 2013
Laurel, Maryland

The Meeting will be held at the Kossiakoff Center, JHU/APL, 11100 John Hopkins Rd, Laurel, MD 20723, 240-228-7574

Agenda with following Outstanding Speakers:

0815-0900:  Registration and breakfast

0900-0915: Welcome by NCMF President, Mr. Richard Schaeffer

0915-0930: Opening address by Deputy Director, National Security Agency, Mr. Chris Inglis.

0930-1000: National Cryptologic Museum update by museum curator, Mr. Patrick Weadon

1000-1045: guest speaker, Ms. Jane Holl Lute, Deputy Secretary, Homeland Security

1045-1100: break

1100-1145: Guest speaker, Mr. David G. Major, Founder and President, Counterintelligence Centre for Security Studies

1145-1315: LUNCH.
 
Schaeffer Inglis
Weadon Lute
Major Chertoff
Isler Robinson
1500-1510: closing remarks by
Brig Gen Billy Bingham
  Bingham
1315-1415: Keynote Address by The Honorable Michael Chertoff, Founder of the Chertoff Group and former Secretary, Homeland Security
1415-1500: New Museum Project and capital campaign update by MG Rod Isler and Brig Gen Neal Robinson
The fee for NCMF members is $20 and for non members $50 which includes one year membership in the NCMF. The fee includes breakfast, lunch and refreshments at the morning break.  There will also be A.M and P.M. shuttle service to and from the parking lot.You can register on line at our secure NFG site or you can download and complete the NCMF Registration form and mail to the NCMF at PO Box 1682, Ft. George G. Meade, MD 20755.  Call 301-688-5436 for assistance or send an email to cryptmf@aol.com

  

The Two Day Cryptographic History Event of the Year

"Technological Change and Cryptology: Meeting the Historical Challenges"

NSA's 2013 Cryptologic History Symposium, 17-18 October 2013
Laurel, Maryland

Contact the Center at 301-688-2336 or via email at history@nsa.gov
or visit their website

      The Center for Cryptologic History hosts a biennial international symposium in October during odd-numbered years. The speakers and audience are a mix of outside scholars, current practitioners, retired veterans, and interested members of the public. Past symposia have had presenters from over a dozen countries.

      The theme for the 2013 symposium, to be held on October 17-18 at the Johns Hopkins Applied Physics Laboratory's Kossiakoff Conference Center (just west of Laurel, Maryland) is "Technological Change and Cryptology: Meeting the Historical Challenges." The conference will include sessions on "A Tribute to Alan Turing," a "Roundtable on Cyber History," "Bletchley Park," "COMINT and the Civil War," "The Cryptologic Legacy of the Great War Era," "SIGINT and the Vietnam War Era," and "A Technological Advantage: Historical Perspectives on Cryptologic Research and Development."

      In all there will be 21 separate sessions and over 70 presentations. Speakers will include scholars such as David Kahn and cryptologic pioneers such as Whitfield Diffie.

      All symposium sessions are unclassified and open to the registered public. A complete agenda and registration information will be available here at the website or by contacting the Center for Cryptologic History at 301-688-2336 or via email at history@nsa.gov.

      Note also that the National Cryptologic Museum Foundation has an excellent program the day before - 16 October - at the same venue. See details above this announcement.



Section I - INTELLIGENCE HIGHLIGHTS

Former NSA and CIA Director Says Terrorists Love Using Gmail.  Former NSA and CIA director Michael Hayden stood on the pulpit of a church across from the White House on Sunday and declared Gmail the preferred online service of terrorists. As part of an adult education forum at St. John�s Episcopal Church, Hayden gave a wide ranging speech on "the tension between security and liberty."

During the speech, he specifically defended Section 702 of the Foreign Surveillance Intelligence Act (FISA), which provides the legal basis for the PRISM program. In doing so, Hayden claimed "Gmail is the preferred Internet service provider of terrorists worldwide," presumably meaning online service rather than the actual provider of Internet service. He added: "I don't think you're going to see that in a Google commercial, but it's free, it's ubiquitous, so of course it is."

Asked whether the United States' promiscuous surveillance was setting a harmful example for other nations, Hayden suggested that the Internet's origins in the United States partially justifies the NSA's conduct. If the Web lasts another 500 years, he said, it may be the thing the United States is remembered for "the way the Romans are remembered for their roads."

"We built it here, and it was quintessentially American," he said, adding that partially due to that, much of traffic goes through American servers where the government "takes a picture of it for intelligence purposes." [Read more: Peterson/WashingtonPost/15September2013]

Serbian Intelligence Agency Says Alerted Croatia to Seized Weapons. The Serbian intelligence agency BIA said on Friday it had provided Croatia with intelligence concerning a cargo seized in the northern Adriatic port of Rijeka and that the weapons discovered did not belong to Serbian businessman Slobodan Tesic, the Serbian RTS public television network said on Friday evening.

BIA said in a statement that the consignment in question had come to Serbia from Italy and had been transported to Croatia. It said that seven days ago it alerted the Croatian authorities to the suspicious cargo containing "dual-purpose components and goods", adding that secret services from several countries were involved in the intelligence work.

RTS broadcast a statement by Slobodan Tesic, owner of the Tenex company, in which he accused the competition of trying to hurt the Serbian defence industry and the deals it had already concluded. In an interview with the Belgrade broadcaster B92 earlier in the day, he strongly denied any connection with the consignment seized in Rijeka.

The Serbian Customs Authority told Hina it was acquainted with the case, but would not discuss details before Monday, citing the interests of the investigation. [Read more: Dalje/14September2013]

Intelligence Agency Director Discusses Roadmap for Future. In a global environment where crises such as the one occurring in Syria become sudden priorities and where fiscal, cyber and geopolitical disasters simmer on the world's back burners, intelligence is a critical guarantor of U.S. national security, the director of the Defense Intelligence Agency said here last week.

Army Lt. Gen. Michael T. Flynn spoke to those attending a panel on intelligence community challenges and priorities at the Intelligence and National Security Alliance Summit. INSA is a nonprofit public-private organization whose members include current and former high-ranking intelligence, military and government agency leaders, analysts and experts.

"In light of future trends - and in light of the absolutely critical role of intelligence for our national security, we must do the following," Flynn said. "We must adjust our operating model to refocus on our mission and our unique strengths. We must continually emphasize burden sharing, partnerships and integration. And we must instill flexibility and agility to respond to crises. That is our new normal."

Flynn said these undertakings must be woven into the fabric and culture of DIA and everything it does.

"At DIA," he said, "we have already laid the groundwork for that future." [Read more: Pellerin/AFPS/16September2013]

Intelligence Scandal Shakes Macedonia. Macedonian police arrested 17 people, including several state intelligence agents, during an investigation into their alleged involvement in "spying, extortion, scams and formation of a criminal organization while working for foreign intelligence services." Police are looking for three more wanted persons.

Spokesperson for the Macedonian Ministry of Interior Ivo Kotevski told the media that the arrested persons included two employers from the Security and Intelligence Agency of Macedonia, two from the Ministry of Defense, four former employees of the Ministry of Interior, one of the National Assembly, a former director of the State Archive and an employee of the Financial Intelligence Service.

Kotevski announced that all the suspects were arrested under suspicion of giving information to foreign intelligence agencies, as well as of organizing and blackmailing a number of people under the threat that information about their personal lives would be made public. [Read more: WorldBulletin/17September2013]

South Korean Spy Agency Raids Homes of Opposition Party Members Over Treason Case. The state intelligence agency on Tuesday raided the houses of five members of a minor opposition party as part of an ongoing probe into allegations some party members plotted to overthrow the government.

The move comes after the National Intelligence Service (NIS) arrested Rep. Lee Seok-ki, a legislator of the Unified Progressive Party (UPP), and the other key party members on charges of leading a secret organization called the "Revolutionary Organization" with suspected close ties to North Korea.

They allegedly talked about blowing up key infrastructure, including communication lines and railways, and pledged to side with the North in case of a war on the Korean Peninsula.

A team of investigators swooped down on the houses and offices of the five UPP members, including the party's spokesman, Hong Seong-kyu. [Read more: Yonhap/17September2013]

Belgian Phone Firm Hacked; Suspected Spy Attack. Belgium's main phone operator said Monday its systems have been hacked in what the government described as a suspected incident of cyber-espionage.

Initial information points toward a sophisticated system of intrusion not for sabotage purposes but for "strategic information gathering" with the technology used suggesting "a high-level involvement by another country," Belgian Prime Minister Elio di Rupo said in a statement.

Belgacom said its teams of experts found "traces of a digital intrusion in the company's internal IT system" but restored the system's integrity over the weekend. The company said it currently has no indication of any impact on its customers or their data. It has filed a complaint with federal prosecutors against an unknown third party.

Neither the government nor Belgacom commented on whom they suspected was behind the spying attack, citing the ongoing judicial investigation. [Read more: Baetz/AP/17September2013]

Elton John Had Sex Romp With Russian KGB Spy. Sir Elton John has admitted to having sex with a Russian spy on a hotel roof during a trip to the Soviet Union.

The 66-year-old singer believes that the KGB spy was planted in his entourage by the country's secret police at the height of the Cold War to follow his every move.

He says that after discovering that the man was a mole who worked for the Russian security agency, he slept with him to compromise him.

"I went to Russia in 1979 and I knew we were being watched all the time," John told the Observer.

"I had an interpreter that they'd clearly set up. I ended up having sex with him on the hotel roof." [Read more: Owoseje/IBTimes/17September2013]

Bill to Strengthen Oversight, Improve Accountability of Intelligence Community Introduced. U.S. Reps. Mike Thompson, Frank LoBiondo, Luis Gutierrez, and J. Randy Forbes have introduced bipartisan legislation today that would strengthen Congressional oversight and improve accountability of the Intelligence Community (IC).

The Intelligence Oversight and Accountability Act of 2013, H.R. 3103, requires that any Foreign Intelligence Surveillance Court (FISC) decision, order or opinion that includes a denial of an IC request, a modification of an IC request, or results in a change to any legal interpretation of the Foreign Intelligence Surveillance Act (FISA) be shared with Congress.

"Our government has a responsibility to both protect American lives and our citizens' civil liberties," said Thompson (D-CA-05), who represents a portion of Lake County. "This bill helps us meet that responsibility by strengthening Congress' aggressive oversight of our Intelligence Community. Through the oversight and accountability provided by this bill, we can help make sure our Intelligence Community operates within legal and constitutional boundaries while they continue their brave work to keep Americans safe." [Read more: LakeCountyNews/17September2013]

CIA Employee Who Refused to Sign Non-Disclosure on Benghazi Suspended. A CIA employee who refused to sign a non-disclosure agreement barring him from discussing the Sept. 11, 2012 terrorist attack in Benghazi, Libya, has been suspended as a result and forced to hire legal counsel, according to a top House lawmaker.

Rep. Frank Wolf (R., Va.) revealed at an event on Monday that his office was anonymously informed about the CIA employee, who is purportedly facing an internal backlash after refusing to sign a legal document barring him from publicly or privately discussing events surrounding the Benghazi attack.

The revelation comes about a month after several media outlets reported that CIA employees with knowledge of the terror attack had been forced to sign non-disclosure agreements (NDA) and submit to regular polygraph tests. [Read more: Kredo/FreeBeacon/17September2013]

Egypt Detains Turkish Citizen on Charges of Espionage. Egypt has detained a Turkish citizen on suspicion of spying and collusion with the Muslim Brotherhood, the state news agency MENA said on Saturday.

The arrest could be a new source of tension between Ankara and Cairo whose relations have all but broken down since Mohamed Mursi, whose Muslim Brotherhood has close ties with Turkey's ruling AK Party, was ousted from the Egyptian presidency in July.

Rasit Oguz, a 46-year-old Turk, was arrested in the city of Ismailia northeast of Cairo on August 28 while taking photographs of military establishments, security sources said. [Read more: Reuters/14September2013]


Section II - CONTEXT & PRECEDENCE

The Military's Cyber Arms Race Includes Middle School Hackers and a Really Important Piece Of Plywood. In the eastern New Jersey suburbs, a train carrying radiological material is barreling toward a small town, and it is up to Pentagon cyber-operators to derail it. The town is the kind of idyllic whistle-stop hamlet where residents socialize at a cafe with complimentary Wi-Fi while surfing FaceSpace, a social networking site.

But danger lurks all around. Terrorists are using the open Wi-Fi connection to hack into the laptop of a patron who works at the hospital down the street. They plan to find the hospital codes stored in his computer to access the mayor's medical records, in which they will change the dosage of a prescription the mayor refills regularly in an effort to poison him.

They have other nefarious future schemes, too: They will cut the power grid with a nasty cybervirus and destroy the local water supply by engineering a program to make it appear as though the reservoir is polluted. When employees dump chemicals into the water to fix the problem, they will inadvertently be doing just what the terrorists want: contaminating the water supply.

This model town - CyberCity - is one of the US military's premier cyberwar simulators. [Read more: Mulrine/ChristianScienceMonitor/16September2013]

List of One Time Pad Encryption Programs. One Time Pad encryption, also known as the Vernam or perfect cipher, is the holy grail of encryption security, when used correctly it makes cryptanalysis nearly impossible because it is not possible to compare old messages. As long as the one time pad is perfectly random all the clues on what coding was used for encryption remain in a single message, it is not easy to accomplish because high quality random numbers are difficult to generate.

This type of encryption was widely used by spy agencies during World War II and the Cold War period, protecting diplomatic and military communications, the advantage of one time pad encryption is that it can done by hand with pencil and paper, without the need to carry any special device compromising undercover operations. A downside for this type of encryption is that the password is made up of as many characters as the text you encrypt, resulting in extremely long passphrases difficult to disseminate. When all rules are followed this one time encryption method remains secure and unbreakable but in order to solve the key transmission problem one time pads have been replaced by symmetric block ciphers and public key encryption.

I have only managed to find old one time pad encryption tools, most of them developed by a single hobbyist and could be listed as abandonware, you should not assume developer's claims are truth just because he says so, without truly random numbers one time pad security will be compromised and reusing any part of the pad makes the cipher vulnerable to attack, there is no way to know for sure how secure these programs are but some of them provide the source code for you to look at it. [Read more: Hacker10/SecurityHacker/10February2013]

Finding Out That Grandpa Was a Super Spy. Two good stories have come my way about exciting discoveries grownup grandchildren have made about their grandfathers. The first is from Deborah Campbell of Houghs Neck. After Campbell's mother, Josephine Conrad Campbell, died in 2006, she was sorting through her belongings and found her late grandfather's military medals and papers. Her mother worked for the U.S. Information Agency.

When Campbell was quite young, her mother had told her stories about her grandfather, Owen Conrad, being a spy during World War II. She had only known him briefly at the end of his life when he was ill; she knew he had been stationed in Germany, Japan and Korea, but not much more. She does have vivid memories of attending his military funeral at Arlington National Cemetery in 1960.

"I'll never forget the white horses pulling the caisson with his casket, the 12-gun salute and the soldiers folding the flag taken from the top of the coffin," she emailed. [Read more: Scheible/PatriotLedger/17September2013]

The Double Life af a Frog-Loving Spy. This has all the makings of a grand tale: A spy leading a double life. An exotic locale. And - an obsession with frogs? It turns out prolific amphibian researcher Edward Taylor, who died in 1978, led quite the life.

"The elder herpetologist had logged 23 years in the field over his lifetime, collecting more than 75,000 specimens around the world, and naming hundreds of new species," Brendan Borrell writes in Nature. And yet, that isn't the most interesting part of his legacy: "He was a racist curmudgeon beset by paranoia - possibly a result of his mysterious double life as a spy for the US government."

His extensive career obsessively cataloging new species of frogs, lizards and snakes, mostly in the Philippines, took precedent over anything else in his life, Borrell describes. "'I named about 500 species,' he would later tell a reporter, 'but I can't always remember the names of my own children.' His wife, Hazel, could not bear his long absences, and they divorced in 1925."

But Taylor still found some time for "extracurricular" activities: [Read more: Ferro/PopSci/11September2013]

North Korea Has a Process. Over the last few years South Korea has been releasing a lot of what it knows about the North Korean espionage effort against the south. The latest revelations describe how North Korea has trained its spies. For decades North Korea has recruited some of its most capable people and put them through extensive training to operate as spies in the south. These operatives were expected to enter South Korea via submarine or a third country. False documents gave the spy a new identity that could pass all but the most intense scrutiny. But what really made these agents so effective was their training in the culture of South Korea. Until the last decade most North Koreans had always lived in near total isolation from the south. The North Korean accent was distinctive and trainee spies had to lose that and then learn thousands of facts about South Korea culture so they would not stand out. To make this training work North Korea had long kidnapped South Koreans (using commandos landing on the coast from a sub and escaping the same way or grabbing them in third countries) who were then forced to spend the rest of their lives providing cultural training for spies. These kidnapped trainers ensured that the accent of the new spies was flawless and that their knowledge of the culture (including the latest TV shows, movies, pop songs and celebrity gossip) was extensive enough to make them appear as natives. [Read more: StrategyPage/17September2013]


Section III - COMMENTARY

Threat-Intelligence Sharing is Dead, and Here's How to Resuscitate It. At this year's RSA Conference, my colleague, Art Coviello, executive chairman of EMC's security division, RSA, quoted President Lincoln when discussing the state of the security industry today: "The dogmas of the quiet past are inadequate to the stormy present. The occasion is piled high with difficulty and we must rise with the occasion. As our cause is new, we must think anew and act anew."

This same quote is also relevant when considering our industry's current processes for threat-intelligence sharing. By sharing information equally with everyone, what results is information that is ultimately helpful to no one, and these "dogmas of the quiet past" will simply no longer cut it.

Today, many global organizations are continuing to rely on security information sharing procedures with significant shortcomings, including: [Read more: Moriarity/SCMagazine/17September2013]

The Bay of Pigs' Unfinished Battle. At 4 a.m. on Jan. 1, 1959, an hour when there were never commercial flights from Havana, David Atlee Phillips was lounging in a lawn chair there, sipping champagne after a New Year's Eve party, when a commercial aircraft flew low over his house. He surmised that dictator Fulgencio Batista was fleeing because Fidel Castro was arriving. He was right. Soon he, and many others, would be spectacularly wrong about Cuba.

According to Jim Rasenberger's history of the Bay of Pigs invasion, The Brilliant Disaster, Phillips was "a handsome 37-year-old former stage actor" who "had been something of a dilettante before joining the CIA." There, however, he was an expert. And in April 1960, he assured Richard Bissell, the CIA's invasion mastermind, that within six months radio propaganda would produce "the proper psychological climate" for the invasion to trigger a mass Cuban uprising against Castro.

The invasion brigade had only about 1,400 members but began its members' serial numbers at 2,500 to trick Castro into thinking it was larger. Castro's 32,000-man army was supplemented by 200,000 to 300,000 militia members. U.S. intelligence was ignorant of everything from Castro's capabilities to Cuba's geography to Cubans' psychology. [Read more: Will/WashingtonPost/13September2013]

Stop Trying to Stop Leaks. Engage the Press Instead. Long before Edward Snowden, even before Bradley Manning, Washington has over the past decade - and with growing prosecutorial zeal - focused on deterring leakers. The government could do many things to cut down on leaks, such as repairing the broken whistle-blower process and fixing a system that rewards overclassification.

But above all else, engaging journalists and the public about the possible harms from such stories with greater detail and realism would acknowledge that leaks will occur, improve the government's credibility on such matters, enhance our national security, and strengthen the tense but delicate relationship between the media and government that our nation's founders created.

In 2006, at a moment of high tensions between the media and government, journalists convened by the Aspen Institute identified several best practices when reporting based on classified information: Carefully consider the consequences of publishing. Take government concerns seriously. Check sources. Tell readers when making agreements with governments regarding what stays in (or is left out of) a story.

Around that same time, some in Congress called for the prosecution of The New York Times' top editor; others sought to rewrite the Espionage Act. Just last year the Senate Intelligence Committee sought to cut a wide valley between journalists and the intelligence community. That would have seriously damaged the flow of news about global events and crossed that delicate line our founders drew two centuries ago. [Read more: Blum/RollCall/16September2013]


Section IV - Books and Coming Events

Books

High on Hog: Montana Native's Covert Life with the Hmong. Somebody ought to write the movie treatment to Gayle L. Morrison's new book, Hog's Exit: Jerry Daniels, the Hmong, and the CIA. It should start with a scene in the Missoula airport in May 1982, where more than 150 people, including CIA agents, grizzled smokejumpers, Hmong immigrants and a former general, sat drinking beer.

As Deirdre McNamer, a reporter with the Missoulian at the time, recounts in the book, "There were these people who showed up who looked like old Asia hands with white linen suits on ... a look that you don't often see walking down the street in Missoula, Montana." They were waiting for an aircraft bearing the sealed casket of one remarkable man: Jerry Daniels, nicknamed "Hog."

Hog's Exit is an oral history that tells Daniels' story through letters, newspaper articles, Department of State cables and quotes from dozens of his family and friends. The book has everything you'd want from a gritty political thriller: revelations about the secret war the CIA orchestrated in Laos, heartening camaraderie, glimpses into a foreign culture, hard-drinking American boys and a mysterious death to top it off. I highly recommend Hog's Exit to people intrigued by war, U.S. government meddling, or anyone who's ever wondered why Missoula is home to a Hmong community. [Read more: Whittle/MissoulaIndependent/12September2013]

On Its 50th Anniversary, an Appreciation of John le Carré's Classic Spy Novel. Every year we holiday in a small village in Cornwall, where there's a church, the odd gift shop, a gastro pub and a bar. From the main street, concrete steps lead to a beach that is almost always deserted, and buffeted by the wind. The few brave souls who venture into the water make sure to don wetsuits. We, however, are content to roam freely on the unspoiled sand, waiting for the tide to go out and allow us access to the coastline's second bay.

The "we" is a somewhat disparate group of people: a Siberian grandma, two Anglo-American children and a Russian mother, plus a suitcase full of books. This year my wife Galina read, with tears in her eyes, The Reason I Jump, written by a 13-year-old Japanese boy, Naoki Higashida, who has managed to escape the prison of autism and recount his inner life. The book was recommended to us by family friends who live around here, in a large house that stands high at the edge of the earth. I re-read The Spy who Came in from the Cold, by John le Carr�. It is hard to say why, for the third time, I picked up this classic of English literature. Perhaps because I associate Cornwall with le Carr�, who has lived here for 30 years. Perhaps because it is a book that creates a long-lasting, incurable addiction.

The story is rather complex: [Read more: Varese/WorldCrunch/15September2013]


Coming Educational Events

EDUCATIONAL EVENTS IN COMING TWO MONTHS....

MANY more International Spy Museum Events in 2013 and some for 2014 with full details are listed on the AFIO Website at www.afio.com. The titles for some of these are in detail below and online.

Thursday, 19 September 2013, 11:30 am - Colorado Springs, CO - The Rocky Mountain Chapter presents Mark Pfoff, Detective El Paso County Sheriff's Office

The Rocky Mountain Chapter presents Mark Pfoff, Detective, El Paso County Sheriff's Office will talk on a case he has been working since 2006 regarding an Online Predator that is finally coming to a close. This event will take place on 19 Sep 2013 at 11:30am. To be held at The Inn at Palmer Divide, 443 S. Highway 105 Palmer Lake, CO, Exit 161 westbound off I-25, West on Highway 105. Please RSVP to Tom VanWormer at robsmom@pcisys.net

20 - 24 September 2013, 8:30 AM - 4 pm EDT - Herndon, VA - 2013 ERII Counterespionage Conference

You are invited to attend The 2013 ERII Counterespionage Conference in Herndon, Virginia. September 20th, 21st & 22nd.
This year, our keynote address will be given by: Mr. Gennady S. Vasilenko
Vasilenko was a KGB "Line KR" counterintelligence officer identified as a Central Intelligence Agency spy by Robert Hanssen, Vasilenko had been unsuccessfully cultivated for years by the CIA's Jack Platt and FBI Sp. Agent Dion Rankin. In fact, Vasilenko never succumbed to American blandishments. But, in January 1988 while on a visit to Havana, Vasilenko was arrested and taken by ship back to Moscow to face six months of interrogation in the infamous Lefortovo prison.
Vasilenko was among the four convicted Russians who were "traded " in exchange for U.S. "deportation" of ten Russian nationals - part of a large "Illegal intelligence aparat" living in the United States and reporting to the SVR foreign intelligence service. (Exchange date was 10 July 2010).
And, we have also lined up the following exciting presentations and vendors:
CLICK HERE FOR DRAFT CONFERENCE AGENDA
"Remote Spectrum Surveillance and Monitoring" by Professional Development TSCM Group Inc., Paul D Turner, TSS TSI; "Practical NLJD Evaluation, Comparisons, Findings and Recommendations". By Steve Whitehead - Eavesdropping Detection Solutions - CBIA - BECSA; "Covert Audio Technical Surveillance - Burst & TMVWB Systems Presentation" by LJM Tech Support, Alain-Pierre LACLOTTE; "Wireless MAC Address Interception & Tracking" by Arizona Technical Security. Jeff Evert; "Cyber Counterintelligence" by SpearTip, LLC. Jarrett Kolthoff; "Cellebrite" Mobile Forensics" by Richard B. Wejnert and Lee Papathanasious; "CI Centre" by David Major; GSM Cellular Eavesdropping and Detection" & "Searchlight Demo" By Jason Dibley - QCC Interscan, Ltd.; "Berkeley Varitronics Systems" by Scott Schober and Carmine Caferra; "Research Electronics International" by Lee Jones; and "SPYPEDIA" by Ms. Meaghan Smith. Includes SPECIAL SUNDAY TSCM WORKSHOP BY PAUL TURNER - Professional Development TSCM Group Inc.; "Kestrel TSCM Professional Software - Operational Deployment."
Register here.
Questions?: Contact J.D. LeaSure, Director, Espionage Research Institute International (ERII), email: JDL@ERII.org or phone 1.757.716.7353

Saturday, 21 September 2013 - Kennebunk, ME - The AFIO Maine Chapter hears Robert Wallace on "Who's Really Spying On You?"

The chapter opens its fall programs with Robert W. Wallace addressing "WHO IS REALLY SPYING ON YOU?" Is individual freedom being undermined by a government constituted to preserve liberty? The speaker describes the post WWII development of surveillance tools and communications technology and the implications of the 'big data' phenomena for intelligence capabilities, national policy, and individual behavior.
Bob Wallace�s 32-year career with CIA (1971-2003) included assignments as operations officer, station chief, resource manager, and director of clandestine technical programs. Between 1991 and 2003 he held senior positions including Director of CIA�s Office of Technical Services (OTS). After his retirement in 2004 he founded ArtemusConsulting Group, a network of intelligence professionals which offers management counsel and strategic planning.
He is author of SPYCRAFT: the Secret History of the CIA�s Spytechs from Communism to al-Qaeda, contributor to Vaults, Mirrors & Masks: Rediscovering U.S. Counterintelligence and co-author of The Official CIA Manual of Deception and Trickery. His presentations include such diverse groups as The Smithsonian, National Archives, Oak Ridge National Laboratory, the International Spy Museum and, of course, AFIO/ME.
Because of the increasing interest in and attendance at our meetings, beginning September 21 our meetings will be held at the Kennebunk High School main auditorium located at 89 Fletcher Street (Route 35), Kennebunk. The building is 1 � miles north from US Route 1 (Junction of Rte 35 & 1) and � mile south from Maine Turnpike Exit 25. The auditorium is at the south end of the building through the door marked #3. Park along Fletcher St in front of the building or behind the south side of the building. The meeting is open to the public. For information call 207-967-4298.

Thursday, 26 September 2013, 6:30 pm - Washington, DC - "Enemies Within: Inside the NYPD's Secret Spying Unit and bin Laden's Final Plot Against America," at the International Spy Museum

Six months after the 9/11 attacks, New York Police Commissioner Ray Kelly initiated a straightforward, yet audacious, antiterrorist plan to be implemented in the Big Apple, dispatching a vast network of undercover officers and informants to track suspected terrorists. In Enemies Within, Pulitzer Prize-winning investigative journalists Matt Apuzzo and Adam Goldman for Associated Press reveal the effectiveness of the domestic spying plan. Based on hundreds of previously unpublished New York Police Department internal memos and exclusive interviews with intelligence sources, including 25-year FBI veteran Don Borelli who assisted with the book, they found that many of those strategies aren't even close to being useful, functional, or successful. As Assistant Special Agent in Charge in the New York Joint Terrorism Task Force (JTTF), Borelli was responsible for top investigations and counterterrorism missions that spanned the globe. Join Apuzzo and Borelli for an unbridled look at the breathtaking race to avert a second devastating terrorist attack on American soil.
Join the co-author and contributor for an informal chat and book signing.
Tickets: Free! No registration required. For more information visit www.spymuseum.org.

Saturday 28 September 2013 - Milford, MA - AFIO New England Chapter hosts their Fall Meeting

Location: Courtyard by Marriott in Milford, Mass. Hotel web site is here: http://www.marriott.com/hotels/travel/bosml-courtyard-boston-milford
Schedule: Registration & gathering, 1000 - 1130, Membership meeting 1130 - 1200; Luncheon at 1200 followed by keynote speaker; Adjournment at 2:30PM.
Questions to afionechapter@gmail.com

Tuesday, 01 October 2013, 6 pm - Washington, DC - "Witness to History: The Investigation of Robert Hanssen," at the International Spy Museum

In 1979, FBI special agent Robert Hanssen volunteered to spy for Soviet Military Intelligence (GRU). To enrich his lifestyle and that of his family, the counterintelligence expert shared US intelligence community secrets, the identities of dozens of secret intelligence agents working for the US around the world, caused deaths of Russians aiding the US, and leaked the existence of an FBI eavesdropping tunnel under the Russian Embassy in DC. Hanssen remained anonymous to his Soviet handlers and to the US government for over 20 years. Building the case against Hanssen was a joint effort between the FBI, CIA, Department of State, and the Justice Department. Hanssen's arrest and conviction led to a full security review of the FBI. Panelists for this inside look at the case include: Mike Rochford, (ret.) FBI Section Chief, Russian Overseas Espionage and David Wise, Author of Spy: The Inside Story of How the FBI's Robert Hanssen Betrayed America
Light hors d'oeuvres at 6:00PM. Panel begins at 6:45pm. Free! Registration required, space is limited! For more information visit www.spymuseum.org.

Tuesday, 8 October 2013, 11:30 am - 3 pm - MacDill AFB, FL - AFIO Suncoast Chapter hosts Daniel T. Cohen, RSA, The Security Division of EMC

Daniel Cohen is Head of Knowledge Delivery and Business Development for RSA's Online Threats Managed Services Group (OTMS). RSA is the security division of EMC. He will be presenting from Israel via Skype link. As described in Wikipedia, EMC Corporation (stylized as EMC�) is an American multinational corporation that offers data storage, information security, virtualization, and cloud computing products and services which enable businesses to store, manage, protect, and analyze massive volumes of data. EMC's target markets include large FORTUNE 500 companies as well as small business across various vertical markets. It is headquartered in Hopkinton, Massachusetts. In his role as Head of Knowledge Delivery, Mr. Cohen and his team are responsible for gathering, analyzing and reporting on intelligence findings recovered by the different cyber teams operating within the group. This intersection of data - human-based intelligence, malware research, and anti-phishing operations - provides Mr. Cohen with unique visibility into the ever-changing cyber-crime landscape. Coupled with his industry insight as Head of Business Development, Mr. Cohen has a wealth of experience in working with leading companies worldwide in strategizing their security needs. Mr. Cohen holds a Bachelor's degree in Business Administration from the Herzliya Inter-Disciplinary Center, Israel.
Location: MacDill AFB Bay Palms Golf Complex, 1803 Golf Course Avenue, MacDill AFB, FL 33621.
Please RSVP to the Chapter Secretary no later than Wednesday, October 2, for yourself and include the names of any guests. Email or call the Chapter Secretary. You will receive a confirmation via email. If you do not, please contact the Chapter Secretary.
You must present your $20 check payable to "Suncoast Chapter, AFIO" (or cash) at check-in to cover the luncheon. If you make a reservation, don't cancel and get a cancellation confirmation by the response deadline and then don't show up, you will be responsible for the cost of the luncheon.
Note that the base is now enforcing a handscan registration for those with ID cards so, if you haven't been on-base recently, you should look into this or allow some extra time when you arrive for the meeting. Should you not have a 'bumper sticker' or ID card for access to MacDill AFB, please so state in your RSVP. If you have not already submitted information required for the Gate Access List, be sure to include your license number, name on drivers license and state of issue for yourself and for any guests you are bringing. Anyone with special AFIO Gate Access should proceed to the Bayshore Gate. If you need directions, please let us know. The main gate will send you to the visitor's center and they will not be able to help you enter the base, only give you directions to the Bayshore Gate. The cash wine and soda bar will open at 1100 hours for those that wish to come early to socialize.
Questions or reservations to Michael F. Shapiro at mfshapiro@att.net

Wednesday, 9 October 2013, 11:30am - 1:30pm - Scottsdale, AZ - AFIO Arizona hears from Dr. Thomson on SWOT Analysis of Nepal

Brendan D. Thomson, M.D., MBA, speaks on SWOT Analysis of Nepal from a 28-Year Perspective.
To help others appreciate the dynamics of a small country situated between almost 2 billion people, Dr. Thomson will share with us a very unique perspective from his vast array of experiences whilst living in Nepal.
Thomson is Board Certified in Internal Medicine and Pulmonary Disease physician and member of the Society of Critical Care Medicine. He holds an MBA from Arizona State University West.
He has been involved with the people of Nepal since 1985. He was a founding member of the American Nepal Medical Society.
In 2013 he was awarded a Fulbright Specialist Grant to assist the Patan Academy of Health Sciences in Kathmandu, Nepal transition from the Case based method to the Clinical Presentation Method of teaching.
Dr. Thomson was a Lt. Cmdr. in the uniformed services with the Indian Health Services and the US Coast Guard.
His nephew is the current Captain of the US John Paul Jones, guided missile destroyer.
Event location: McCormick Ranch Golf Course, 7505 McCormick Parkway, Scottsdale AZ 85258 ~ Phone 480.948.0260
RSVP NO LATER than 72 hours ahead of time. If you do not show up for the lunch meeting and have not cancelled 48 hours prior, please send your check to Simone you will be charged for the lunch.
Fees: $20.00 for AFIO AZ Member; $22.00 for Non-Members
For reservations or questions email Simone: simone@afioaz.org or simone@4smartphone.net or call 602.570.6016.

Wednesday, 9 October 2013, noon - Washington, DC - Global Terrorism, Espionage and Cybersecurity (a Monthly Update), at the International Spy Museum with David Major.

Presented in partnership with the CI Centre, these monthly briefings will provide you with the opportunity to be the first to learn of the most current worldwide happenings in the field of intelligence and terrorism. Drawn from the Centre's SPYPEDIA�, a comprehensive online subscription database of espionage information, each of these updates covers important events and information which may not be reported by mainstream media outlets. Such as: espionage penetrations and arrests, cyber espionage reporting, and terrorist events. Briefings led by CI Centre founder David Major will include trend analysis and coverage of new emerging issues of value to the intelligence and security professional and individuals with an interest in national security matters. Major will also highlight and review, as appropriate, new books and reports to keep you current with breaking developments in the national security arena.
Tickets: Free! No registration required. For more information visit www.spymuseum.org

10 - 11 October 2013 - Charleston, SC - The Citadel - The Military College of South Carolina presents the Southeast Region Security & Intelligence Conference with the theme: "Securing Our Intelligence & Protecting Our Ports" 

Keeping with the tradition of The Citadel's historic role in defending the country, the Criminal Justice Department and the School of Humanities is pleased to announce the next chapter in Homeland Security. The Citadel will hold its first conference dedicated to Homeland Security and Intelligence. The conference will feature professionals and academics from various disciplines and agencies related to homeland security and intelligence. Keynote speakers include: Letitia Long, Director of the National Geospatial-Intelligence Agency; Robert Cardillo, Deputy Director for Intelligence Integration, Office of the Director of National Intelligence; Stu Shea, Chief Operating Officer, SAIC, and many other senior officials and experts. http://www.citadel.edu/root/criminaljustice-sersi-conference
Conference Registration: https://foundation.citadel.edu/sersi

16 October 2013 - Laurel, Maryland - "Safeguarding Intelligence" - Theme of the National Cryptological Museum Foundation's Annual Membership Meeting

Details on the speakers, agenda and other events will be provided as soon as they become available.

The Meeting will be held at the Kossiakoff Center, JHU/APL, 11100 John Hopkins Rd, Laurel, MD 20723, 240-228-7574

The fee for NCMF members is $20 and for non members $50 which includes one year membership in the NCMF.  The fee includes breakfast, lunch and refreshments at the morning break.  There will also be A.M and P.M. shuttle service to and from the parking lot.

You can register securely online here on the donation page, or you can download and complete the Registration form and mail to the NCMF at PO Box 1682, Ft. George G. Meade, MD 20755.  Call 301-688-5436 for assistance or send an email to cryptmf@aol.com

17-18 October 2013 - Laurel, MD - "Technological Change and Cryptology: Meeting the Historical Challenges" is theme at the Biennial Cryptologic History Symposium

The Two Day Cryptographic History Event of the Year - "Technological Change and Cryptology: Meeting the Historical Challenges" - NSA's 2013 Cryptologic History Symposium, 17-18 October 2013 Laurel, Maryland

The Center for Cryptologic History hosts a biennial international symposium in October during odd-numbered years. The speakers and audience are a mix of outside scholars, current practitioners, retired veterans, and interested members of the public. Past symposia have had presenters from over a dozen countries.
The theme for the 2013 symposium, to be held on October 17-18 at the Johns Hopkins Applied Physics Laboratory's Kossiakoff Conference Center (just west of Laurel, Maryland) is "Technological Change and Cryptology: Meeting the Historical Challenges." The conference will include sessions on "A Tribute to Alan Turing," a "Roundtable on Cyber History," "Bletchley Park," "COMINT and the Civil War," "The Cryptologic Legacy of the Great War Era," "SIGINT and the Vietnam War Era," and "A Technological Advantage: Historical Perspectives on Cryptologic Research and Development."
In all there will be 21 separate sessions and over 70 presentations. Speakers will include scholars such as David Kahn and cryptologic pioneers such as Whitfield Diffie.
All symposium sessions are unclassified and open to the registered public. A complete agenda and registration information will be available here at the website or by contacting the Center for Cryptologic History at 301-688-2336 or via email at history@nsa.gov.

Note also that the National Cryptologic Museum Foundation has an excellent program the day before - 16 October - at the same venue described above.

Thursday, 17 October 2013, 6:30 pm - Washington, DC - "Hezbollah's Reach Around the World" at the International Spy Museum

"We will not take rejection or humiliation." - Hassan Nasrallah, Secretary-General of Hezbollah

Hezbollah - Lebanon's "Party of God" - is much more than a political party. It's an Islamic Shia religious and social movement, Lebanon's largest militia, a close ally of Iran, and a terrorist organization. But Hezbollah's reach is not limited to Lebanon; it extends far beyond that country's borders with worldwide financial and logistical networks supporting its covert criminal and terrorist operations worldwide from the Middle East to Europe, Asia, Africa, and the Americas. And what is the extent of Hezbollah's role in Iran's shadow war with Israel and the West, including plots targeting civilians around the world? Explore Hezbollah's footprint and future goals with expert commentators: Matthew Levitt, Senior Fellow and Director of The Washington Institute for Near East Policy's Stein Program on Counterterrorism and Intelligence, author of Hezbollah: The Global Footprint of Lebanon's Party of God, and a former FBI counterterrorism analyst as well as former Deputy Assistant Secretary for Intelligence and Analysis at the US Department of the Treasury; and Reuel Marc Gerecht, Senior Fellow at the Foundation for Defense of Democracies, author of The Wave: Man, God, and the Ballot Box in the Middle East, and a former Middle East specialist in the CIA's Clandestine Service.
In collaboration with the Foundation for the Defense of Democracy.
Tickets: $15. To register or for more information visit www.spymuseum.org

2 November 2013 - Indialantic, FL - AFIO Florida Satellite Chapter Hears from FBI Sr Resident Agent Russell Hayes

The AFIO Florida Satellite Chapter will host Russell Hayes, Supervisory Senior Resident Agent, Brevard Resident Agency, Federal Bureau of Investigation, a sub-office of the FBI Tampa Division. Mr. Hayes also heads the Brevard (County) Joint Terrorism Task Force and will address a variety of topical issues. The meeting will take place at the Eau Gallie Yacht Club, Indialantic, FL, and the Meet and Greet will begin at 1130. For information and reservations, please contact Bobbie Keith, 321.777.5561 or bobbie6769@juno.com.

Thursday, 14 November 2013, noon - Washington, DC - "The Family Jewels: The CIA, Secrecy and Presidential Power," at the International Spy Museum

In December 1974, a front-page story in the New York Times revealed the explosive details of years of illegal domestic operations by the Central Intelligence Agency including political surveillance, eavesdropping, and detention. These revelations shocked the public and led to investigations by a presidential commission and committees in both houses of Congress. Investigators soon discovered that the CIA abuses were described in a top-secret document that Agency insiders dubbed the "Family Jewels." That document became ground zero for a political firestorm that lasted more than a year. John Prados, a Senior Fellow of the National Security Archive in Washington, DC, recounts the secret operations that constituted the "Jewels," shows that the abuses have since been replicated by the intelligence agencies at the global level, and exposes the strenuous efforts -- by the Agency, the Executive Branch, and even presidents -- to evade accountability.
Join the author for an informal chat and book signing.
Tickets: Free! No registration required. More information at www.spymuseum.org

Friday, 15 November 2013, 10:30am - 2pm - Tysons Corner, VA - AFIO National Fall Luncheon features National Security Reporter Walter Pincus, and former CIA DO Officer Marti Peterson

1 p.m. speaker is Walter Pincus, National Security Reporter for The Washington Post, speaks on "45 years covering national security."
3-course Lunch at Noon
11 a.m. speaker is Martha [Marti] D. Peterson, author of The Widow Spy: MY CIA Journey from the Jungles of Laos to Prison in Moscow.
The Widow Spy is Marti Peterson's personal story of a life among heroes. The first was her husband John, a CIA officer, whom she accompanied on her first overseas assignment in Laos, conducting paramilitary operations to contain the North Vietnamese Army. John was killed in a helicopter crash.
The story continues with her joining CIA and becoming one of the first women operations officers ever assigned to Moscow in the mid-70s. She details the challenges of working covertly for nearly two years in Moscow, facing the potential of being discovered by the KGB, as she serviced dead drops and recovered secret packages from a highly valuable agent TRIGON. In the end, she was ambushed and arrested by the KGB.
TRIGON, often compared to Penkovsky, provided documents that revealed the Soviet government's plans and intentions in influencing world events and the negotiating positions of Soviet government officials in talks with the US and its allies.
The memoir contains descriptions of operational acts and real life within the enemy's camp (Moscow).
Marti Peterson's presentation will provide unique insights into the intelligence advantage the US had over the USSR, and provides a personal account of the covert life of a female CIA officer in Moscow. It also provides a look at how women were seen and treated in the DO in that era.
Check-in for badge pickup at 10:30 a.m. Morning and Afternoon programs are On The Record. The latest intelligence books, and many others, for sale throughout event.
Event closes at 2 p.m.
Location: Crowne Plaza Hotel, Tysons Corner, VA.
Registration is here.

For Additional Events two+ months or greater....view our online Calendar of Events


Disclaimers and Removal Instructions

Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers. 

REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs: 

a)  IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list.  If this link doesn't open a blank email, create one on your own and send to afio@afio.com with the words:  REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.

 b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to afio@afio.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.

CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at afio@afio.com. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm


WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor(s) or author(s) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!

(c) 2000, 2012, 2013, Please note AFIO's new address: AFIO, 7600 Leesburg Pike, Suite 470 East, Falls Church, VA 22043-2004. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: afio@afio.com

Click here to return to top.