General Interests
Senate Intel Committee Blocks CIA Job for RFK Jr. Daughter-in-Law - Daily Beast, 16 Dec 24
Robert F. Kennedy Jr‘s elaborate scheme to get his daughter-in-law a top job at the CIA is coming apart at the seams, after the Senate Intelligence Committee reportedly blocked the move. Axios reported last Tuesday that the Department of Health and Human Services secretary nominee has been back-channeling support to get his former campaign manager Amaryllis Fox Kennedy nominated to deputy director of the intelligence agency under John Ratcliffe. The move is reportedly part of an effort to uncover more details about the 1963 killing of his uncle, President John F. Kennedy. But Fox Kennedy, who is married to RFK’s son Bobby Kennedy III, has now been ruled out of the running because of opposition on the Senate Intelligence Committee, Axios reports. But all is not lost as she could get her hands on another administration job—potentially in Tulsi Gabbard’s team. The former Hawaii congresswoman is President-elect Donald Trump’s nomination for director of national intelligence. (Read more here.)
South Korean Defense Intelligence Commander arrested on "suspicion of rebellion" - FNN, 14 Dec 24 (Member Contribution)
A fourth arrest has been made amid the state of emergency in South Korea. On the 14th, South Korean media reported that prosecutors had arrested Yeo In-hyun, commander of the National Defense Intelligence Agency, on suspicion of playing an important role in the civil unrest. Commander Lu is suspected of sending martial law soldiers to the National Assembly and the Central Election Commission during the state of emergency on December 3rd, and ordering the arrest of leaders of the ruling and opposition parties and the securing of the Election Commission's server. So far, former Defense Minister Kim Yong-hyun, who is said to have recommended the emergency martial law, has been arrested by prosecutors, and on the 13th, National Police Agency Commissioner General Cho Ji-ho and Seoul Metropolitan Police Agency Commissioner General Kim Bong-sik were arrested by police on suspicion of playing an important role in the civil unrest, making this the fourth arrest in connection with the emergency martial law. Investigations into President Yoon, whose impeachment bill was passed on the 14th, have also begun in earnest. (Read more here.)
Trump Taps Truth Social CEO, Former California GOP Rep. Devin Nunes To Lead President’s Intelligence Advisory Board - Daily Caller, 14 Dec 24 (Member Contribution)
President-elect Trump announced Saturday that Truth Social CEO and former Republican California Rep. Devin Nunes will lead the President’s Intelligence Advisory Board (PIAB). Nunes will “provide me with independent assessments of the effectiveness and propriety of the U.S. Intelligence Community’s activities” as the leader of the group of “distinguished citizens from outside of the Federal Government,” Trump posted on Truth Social. Nunes will lead the independent group “[w]hile continuing his leadership of Trump Media & Technology Group,” Trump added. Trump also stated his expectation Nunes would “draw on his experience as former Chairman of the House Intelligence Committee, and his key role in exposing the Russia, Russia, Russia Hoax.” (Read more here.)
Ukrainian intel strikes deep: Aircraft destroyed in Russia - MSN, 14 Dec 24 (Member Contribution)
Ukrainian military intelligence (HUR) announced on Saturday that it destroyed a Su-30 multirole aircraft at a military airfield in Krasnodar Krai, Russia. The military services emphasized that this is part of the diversionary activities conducted by Ukraine on enemy territory. The day before the destruction of the Su-30, HUR conducted an operation resulting in the burning of three locomotives in the city of Krasnodar. Ukrainian intelligence noted that the destroyed railway infrastructure was used by Russia in its invasion of Ukraine.(Full article here.)
Prince Andrew ‘invited alleged Chinese spy to Buckingham Palace’ - The Guardian, 14 Dec 24 (Member Contribution)
A businessman accused of being a Chinese spy was invited to Buckingham Palace and other royal residences by the Duke of York, it has been reported. The man – who was banned from Britain by the government on national security grounds – visited Buckingham Palace twice, and also entered St James’s Palace and Windsor Castle at the invitation of Andrew, the Times reported. On Friday, the duke said he had “ceased all contact” with the businessman when concerns were first raised about him. A statement from his office said Andrew met the individual through “official channels”, with “nothing of a sensitive nature ever discussed”. Last March, the businessman, only known as H6, brought a case to the Special Immigration Appeals Commission (Siac) after the then home secretary, Suella Braverman, said he should be excluded from the UK in March 2023. (Full article here.)
Counterintelligence director reveals extent of damage from China telecom hacks - Washington Times, 12 Dec 24 (Member Contribution)
“At least eight U.S. companies have been breached; at least a dozen worldwide,” he said. “The PRC actors have extensive access to the companies.” The damage is said to be serious since the stolen information included requests for federal court surveillance. Such information would allow China to better mask its intelligence operatives or to pass disinformation to U.S. intelligence. Mr. Casey, a former congressional intelligence staff director, said the hacking includes very broad access and, in some cases, specific high-profile people have been targeted and their messages, calls and in some cases call audio files have been obtained. Metadata, or summary information that provides information about more detailed information, has been secured by Chinese hackers. (Access here.)
RFK Jr. Wants Daughter-in-Law Appointed to High CIA Post To Probe Agency’s Alleged Involvement in Uncle’s Assassination - New York Sun, 11 Dec 24 (Member Contribution)
Robert F. Kennedy Jr. wants his daughter-in-law, Amaryllis Fox Kennedy, to lead the internal investigation into the CIA’s possible involvement in President Kennedy’s assassination, according to a new report from Axios. Mrs. Kennedy, who served as a CIA agent before running her father-in-law’s presidential campaign, is being pushed by Mr. Kennedy to be nominated as the agency’s deputy director. Mr. Kennedy — who has been tapped to lead the health and human services department by President Trump — has long asserted that both his own father and his uncle were killed by government agents, in part, because of their opposition to military operations in Vietnam. In an interview with the New York Sun earlier this year, Mr. Kennedy reiterated that claim, saying that his father was likely assassinated by one of his own Secret Services agents. The rest of the Kennedy family have said they do not share this view. (Access here.)
Counterespionage - Recent arrests, convictions, expulsions, and more...
Cyberespionage - New actors, collection and sabotage ops, countermeasures, policy, other...
- Congress investigates China’s cyber spies: ‘Everyone on this committee is a target’ - Washington Times, 11 Dec 24 (Member Contribution)
- Russian government spies targeted Ukraine using tools developed by cybercriminals - Tech Crunch, 11 Dec 24 (Member Contribution)
- Suspected Russian hackers target Ukrainian defense enterprises in new espionage campaign - The Record, 09 Dec 24
- Democrats and Republicans condemn espionage-driven Chinese hack - The Guardian, 13 Dec 24 (Member Contribution)
- Researchers Uncover Espionage Tactics of China-Based APT Groups in Southeast Asia - The Hacker News, 11 Dec 24
Covert Action - Influence ops, assassinations, sabotage, intel agency paramilitary action, countermeasures, etcetera...
Open-Source Intelligence and the Challenges of Overclassification - Lawfare, 12 Dec 24
Open-source intelligence (OSINT) has become an integral component of national security, providing valuable insights from publicly available sources. As a career OSINT practitioner, I have seen firsthand how OSINT can be a game changer in real-time decision-making and operational planning, particularly in the field of nuclear non-proliferation. However, its potential is often undermined by pervasive overclassification within the U.S. Intelligence Community (IC), which results from the tendency to consider information valuable as a matter of national security only when it has been classified—a phenomenon known informally in OSINT practitioner circles as “James Bond syndrome.” OSINT generation involves the collection, exploitation, analysis, and dissemination of information derived from publicly available sources such as media reports, social media, and public records. In the field, we rely on OSINT to provide timely and relevant information supporting everything from tactical operations, to strategic planning, to monitoring nuclear activities. Despite its importance, OSINT is frequently overclassified, restricting its accessibility and utility. This overclassification stems from a risk-averse culture that prioritizes the safeguarding of information over its practical use, often leading to frustration among policymakers and intelligence members who need quick access. (Access here.)
An All-of-Society Approach to US Counterintelligence - Cipher Brief, 13 Dec 24
State-sponsored espionage, led by China, seeks not just to undermine our nation’s economic and technological prowess, but to erode the very foundation of our society. The United States has certainly been the sustained target of hostile state espionage in the past, most obviously during the Cold War. The nature, scale, magnitude, and relentlessness of these efforts by China today, however, are something our nation has never experienced. We now confront a shadowy conflict, a battle waged not with tanks and planes, but with stolen technologies, infiltrated cyber networks and supply chains, whispered alliances with think tanks, and covert agents in classrooms and corporations. In the heartland of America, in towns like Ann Arbor and Raleigh, young men and women—students and scientists—are conscripted, knowingly or not, into a clandestine battle. A quiet infiltration unfolds: five students from the University of Michigan arrested for photographing military installations at Cam Grayling; a former University of Minnesota student caught taking drone footage over Langley Air Force Base in Virginia. Chinese students at George Washington University, in the heart of our capital, publicly proclaiming that they are under “a specter of fear” and “systemic repression” by Chinese Communist Party minders on campus with no apparent response from the university or law enforcement. (Access here.)
Chinese Espionage Against the West: No Sign of Letting Up - Grey Dynamics, 13 Dec 24
We assess that the level of Chinese espionage activities against the West is increasing in intensity and scope. The People’s Republic of China (PRC) intelligence network has a vast reach and includes multiple agencies such as the Ministry of State Security (MSS), the Ministry of Public Security (MPS), and the intelligence wings of the People’s Liberation Army (PLA). Together, they form an important arm of Chinese foreign policy and conduct intelligence through a mix of state and non-state actors, employing untraditional methods, cyber operations, private citizens, and institutions. Chinese espionage operations against the West range from covert influence operations to traditional HUMINT sources – in a recent case from September 2024, former CIA officer Alexander Yuk Ching Ma was sentenced for spying for the MSS. Estimates suggest that Beijing’s intelligence apparatus could be as high as 600,000 people – more than that of all Western nations together. (Access here.)
Asim Malik: Pakistans New ISI Chief - Grey Dynamics, 13 Dec 24
Muhammad Asim Malik is the new pick of the Pakistani Intelligence Community to lead the Inter Services Intelligence (ISI). The Lieutenant General was appointed on 23 September 2024 to succeed Nadeem Anjum as the Director-General of the security apparatus in the middle of a crisis. ISI meddling in politics is at the moment in the center of the national debate, as former Prime Minister Imran Khan alleges the intelligence agency undermined his authority, eventually leading to his ousting and indictment. The security service also faces issues relating to tensions, between military leaders and civilian officials, over influence and decisions in the intelligence community. Furthermore, internal threats are also emerging from radical elements entrenched in the tribal areas. Asim Malik will not only have to navigate Pakistan politics and deal with radical elements pouring in from Afghanistan through the border, but also maintain the delicate balance between the elected civilian officials and the military deep state. (Access here.)
Fact or Fiction? UK Intelligence Agencies’ Representation in the Press - International Journal of Intelligence and Counterintelligence, 13 Dec 24
In recent years, much has been written about the “openness” of modern-day intelligence agencies and the role of the press. It has been argued that openness and wider engagement fits a pattern of manipulation, presenting a softened image of agencies to a wider audience and disseminating key national security themes. Through an analysis of five UK national newspapers between 2021 and 2023—The Sun, The Mirror, The Daily Mail, The Times, and The Guardian—this article assesses the impact of “openness” on the reporting of intelligence and security matters in the United Kingdom and whether the so-called lobby has shaped mainstream reporting, reflecting on the relationship between intelligence and the media more generally. (Full article here.)
A risk science perspective on how to evaluate the quality of intelligence assessments - Intelligence and National Security, 11 Dec 24
Recent articles on intelligence theory have shown that guidelines for evaluating and expressing the quality of intelligence assessments are based on weak theoretical justifications and lack a proper theoretical foundation. Risk and intelligence analysts face similar issues related to understanding, assessing, and communicating threats and uncertainties. This article draws on risk science’s advances in evaluating the strength of the knowledge used in risk assessments. Using a fictitious arms trafficking case, we demonstrate the compatibility of a strength-of-knowledge approach to quality with the current understanding of confidence in intelligence studies. The aim is to show that risk science’s theoretical framework and formalized language is applicable to the evaluation of intelligence assessment quality as well as to intelligence theory in general. Implications for intelligence practice and research are discussed. (Access here.)
Section III - FORMERS' FORUM
(Legacy Intel Practitioners' Informed Perspectives
and Recent Endeavors)
Booby Traps set for Trump by Obama and Biden MUST be overcome (35 mins) - with Former CIA Analyst John Gentry, Stephen Gardner Podcast, 15 Dec 24 (Member Contribution)
Dr. John A. Gentry and Stephen Gardner discuss how Obama and Biden weakened the US military and corporate America by pushing DEI and Marxist policy (Access here.)
Cybersecurity: Doomed To Fail? - by insider threat expert and former Intelligence Community consultant David Charney, Cipher Brief, 10 Dec 24 (Member Contribution)
The most recent Cipher Brief Threat Conference was better than ever, providing a unique opportunity to get a full sense of what’s truly “top of mind” for intelligence community thought leaders. Every speaker’s central concern was cybersecurity, threats posed by our most dangerous antagonists, mainly China, and the three other usual suspects, Russia, North Korea and Iran. For example, for his “top of mind,” to quote General Michael Hayden, former Director of both the NSA and the CIA: “It’s China, China, China.” I was especially alarmed hearing about stealthy intrusions into our public utilities, such as our water supplies. Our most basic survival systems could easily be shut down, leaving us unable to conduct our daily lives, much less survive a war. Government agencies as well as private sector companies make enormous efforts to build protective defenses against these multiplying hacks and intrusions. It’s become a vast game of Whack-A-Mole with threat actors inserting their malicious code everywhere they please and we can barely keep up. By the end of the second day of the conference, I became bothered by something more—and it finally came to me. Close to the entirety of our efforts to counter cyberattacks are devoted exclusively to defensive measures, with almost no discussion of offensive measures. (Access here.)
The Right Questions on Havana Syndrome and Where to Go from Here by former NSC, NSA, and CIA lawyer James Petrila - Just Security, 10 Dec 24 (Member Contribution)
Since U.S. officials first reported Anomalous Health Incidents (AHI) in Cuba in 2016, the issue has been surrounded by controversy, as the cause and perpetrator of the attacks remain unknown and some continue to deny that AHI is a real event. A February 2022 report issued by the Intelligence Community Experts Panel on AHI concluded that the signs and symptoms of AHI in a small number of U.S. government officials are genuine, cannot be easily explained by known environmental or medical conditions, and could be due to external stimuli. In March 2023 an Intelligence Community Assessment (ICA) concluded that the very real symptoms reported by U.S. government officials were painful and traumatic, but “were probably” the result of otherwise unidentified “preexisting conditions, conventional illnesses, and environmental factors” but that it is “very unlikely” that these injuries were the result of a foreign adversary. (Access here.)
Memo to the President: A ‘Perfect Pressure Campaign’ Against Iran by former ODNI Deputy Director for National Intelligence Beth Sanner - Cipher Brief, 13 Dec 24
Mr. President-elect: There are deals, and there are Nobel Peace Prize-worthy deals. You have the opportunity for the latter, by forging a comprehensive deal with Iran. The context of a weakened – although still dangerous – Iran and your stated approach put you on a path to do so. You have said that you do not seek regime change in Iran, that negotiations are required, and that you will prevent Iran from obtaining nuclear weapons, including by using military force if necessary. That all sounds absolutely right. Now the hard part. Challenge your staff to answer these questions: How do we get Iran to the negotiating table, what should we seek in negotiations, and how do we conclude a deal or a series of deals? Having participated for nearly two years in an Atlantic Council project to develop a comprehensive U.S. strategy toward Iran, and given my experience as your briefer during an intense period of confrontation with Iran, I have some ideas of my own. Let’s start by being honest. U.S. policies pursued over decades have failed to constrain Iran’s destabilizing influence across the Middle East or hobble its growing capacity to build a nuclear weapon. This is undeniably evident looking at facts on the ground today. (Access here.)
An Exclusive Chat with Cyber Legend Dan Geer by Former NSA Director of Signals Intelligence Teresa Shea - Cipher Brief, 11 Dec 24
Hello, my name is Teresa Shea, and I am super excited this morning, to be talking with the famous Dan Geer, who I consider to be one of our very few national assets in this country. I first met Dan when I worked at In-Q-Tel, a strategic investment firm for the intelligence community, back in the 2015 timeframe. He is now a senior fellow at In-Q-Tel as a consultant, but he was the CISO there for many, many years, and he’s currently on a small farm in rural Tennessee, where his only phone is the landline. So we’re doing this via audio, but I certainly hope you can all enjoy some of the commentary from Dan. He’s done so many things in his career, and he’s just a famous, I think, computer security analyst and risk management specialist. He is recognized for raising awareness of critical computer and network security issues before the risks were really widely understood, and what I consider to be groundbreaking work on the economics of security. He’s a brilliant technologist, but also a profoundly deep thinker, and he has just been an invaluable mentor to me and so many others. He received his Bachelor of Science in electrical engineering and computer science from MIT, where he worked on Project Athena, a campus-wide distributed computing environment that was launched back in 1983, and received a Doctorate of Science and Biostatistics from Harvard. And he’s just worked for a variety of companies, and has so many firsts, to include being the first information security consulting firm on Wall Street, and the first academic conference on electronic commerce and mobile computing. Back in 1998, he delivered the speech that really changed the focus of security, titled Risk Management is Where the Money Is. He was the president of USNIC’s Association, and author of numerous groundbreaking works, just to name a few, Cybersecurity and the Cost of Monopoly, 2003, and the Economics and Strategies of Data Security. (Access here.)
Running Spies Is Not a Game for Amateurs by Former CIA Executive John Sipher and Former NSA and CIA Director Michael Hayden - New York Times, 09 Dec 24 (Member Contribution)
President-elect Donald Trump’s promises to destroy what he calls the “deep state” predate his first term in the White House. The sentiment raises fears in the intelligence community that there will be purges of career professionals, and that intelligence designed to protect American lives will be twisted to fit Mr. Trump’s personal interests. During his first term, Mr. Trump believed he was undermined by public servants in the national security apparatus and vowed to appoint officials in his next administration who would shatter any resistance to his will and carry out his plans without question. The Project 2025 blueprint for the intelligence community offers little clarity into what Mr. Trump might have in store for the C.I.A. and the F.B.I., as it is limited to cataloging a litany of misperceptions about the agencies and grievances against individuals, such as the former C.I.A. director John Brennan and the former director of national intelligence James Clapper, both of whom left public service at the close of the Obama administration. (Access here.)
Watching the Jackals: Prague's Covert Liaisons with Cold War Terrorists and Revolutionaries
by Daniela Richterova
(Georgetown University Press, 02 Jan 25)
In the 1970s and 1980s, Prague became a favorite destination for the world's most prominent terrorists and revolutionaries. They arrived here to seek refuge, enjoy recreation, or hold secret meetings aimed at securing training, arms, and other forms of support. While some were welcome with open arms, others were closely watched and were eventually ousted. Watching the Jackals is the untold history of Czechoslovakia's complex relations with Middle Eastern terrorists and revolutionaries during the closing decades of the Cold War. Based on recently declassified intelligence files, Richterova unveils the story of Prague's engagement with various factions of the Palestine Liberation Organization, along with some of the era's most infamous terrorists, including Carlos the Jackal, the Munich Olympics massacre commander Abu Daoud, and the Abu Nidal Organization. In this gripping account, Richterova explains why "Cold War Jackals" gravitated toward Prague and how the country's leaders reacted to their visits, and she uncovers the role Czechoslovakia's security and intelligence apparatus – the StB (Státní bezpečnost) played in these, at times, dangerous liaisons. Drawing on interviews and remarkably detailed records from the former Czechoslovakia (now the Czech Republic and the Slovak Republic), Richterova offers readers interested in the intelligence world a fascinating account of how states use their spies to pursue covert policies with violent nonstate actors. The book also introduces new evidence and nuances into old debates about whether the Communist Bloc supported terrorism.
Order book here.
Counterfeit Spies: How World War II Intelligence Operations Shaped Cold War Spy Fiction
by Oliver Buckton
(Rowman and Littlfield, 01 Oct 24)
World War II deception operations created elaborate fictions and subterfuges to prevent the enemy from apprehending the true targets and objectives of Allied forces. These operations shortened the war considerably and saved countless lives—and they were often invented, proposed, and sometimes executed by creative minds that would come to be known worldwide for their spy novels. In Counterfeit Spies: How World War II Intelligence Operations Shaped Cold War Spy Fiction, Oliver Buckton reveals the involvement of writers in wartime deceptions and shows how those operations would later impact their work. He also examines how the details, personnel, and methods of the GARBO network, Operation Mincemeat, Philby’s treason, Operation Bodyguard, and more were translated from real life into spy fiction by these authors, necessitated by the Official Secrets Act which prevented writers from revealing their experiences in memoirs or other nonfiction works. Featuring Ian Fleming, Dennis Wheatley, Graham Greene, Helen MacInnes, John Bingham, and John le Carré, Counterfeit Spies is a captivating examination of the brilliant novelists who took wartime espionage and deception to another level with their enduring works that continue to entertain and fascinate readers today.
Order book here.
Farewell: The Greatest Spy Story of the Twentieth Century
by Sergei Kostin, Eric Raynaud
(02 Aug 11)
1981. Ronald Reagan and François Mitterrand are sworn in as presidents of the Unites States and France, respectively. The tension due to Mitterrand’s French Communist support, however, is immediately defused when he gives Reagan the Farewell Dossier, a file he would later call “one of the greatest spy cases of the twentieth century.” Vladimir Ippolitovitch Vetrov, a promising technical student, joins the KGB to work as a spy. Following a couple of murky incidents, however, Vetrov is removed from the field and placed at a desk as an analyst. Soon, burdened by a troubled marriage and frustrated at a flailing career, Vetrov turns to alcohol. Desperate and needing redemption, he offers his services to the DST. Thus Agent Farewell is born. He uses his post within the KGB to steal and photocopy files of the USSR’s plans for the West―all under Brezhnev’s nose. Probing further into Vetrov’s psychological profile than ever before, Kostin and Raynaud provide groundbreaking insight into the man whose life helped hasten the fall of the Communist Soviet Regime.
Order book here.
True Intelligence Matters on Film - Mafia Spies - Tom Donahue (2024)
Intrigue, spies, gangsters, Frank Sinatra, JFK and even James Bond! Using recently declassified material, an unbelievable-yet-true documentary series reveals a very real conspiracy between the CIA and the American Mafia to assassinate Fidel Castro. It is a Cold War game of cat and mouse whose effects still resonate today.
More on this based-on-true-events production here.
Intelligence in Pop Culture - The GCHQ Christmas Challenge 2024 -
GCHQ, 11 Dec 24
We are delighted to release our annual Christmas Challenge and both children and adults alike are encouraged to give it a try. You can download this year’s Christmas Challenge at the bottom of this page. The focus this year is the surprising geography of GCHQ, which many people won’t realise operates from several sites across the UK including Manchester, London, Scarborough, Bude and our iconic headquarters in Cheltenham. The Challenge is contained in a Christmas card sent by Director Anne Keast-Butler and features a series of seven puzzles, which range in difficulty and test different problem-solving skills. The puzzles are masterminded by a team of puzzling experts who work at GCHQ, who are encouraging school groups across the UK to work as a team to reveal the final hidden message.
Access puzzle here.
Intelligence in History - A Collection of Recently Released Content
Walking Tours - "Spies of Embassy Row" and "Spies of Georgetown" - Washington, DC - Sundays (Dates/Times Vary)
Former intelligence officers guide visitors on two morning and afternoon espionage-themed walking tours: "Spies of Embassy Row" and "Spies of Georgetown." For more information and booking, click here or contact rosanna@spyher.co
(Research Requests, Academic Opportunities, Employment)
Victor Brombert — WWII Ritchie Boy
Victor Brombert, a respected scholar of comparative literature who late in life revealed that he had worked for a secret American intelligence program in World War II, which took him to D-Day, the liberation of Paris and the Battle of the Bulge, died on Nov. 26 at his home in Princeton, N.J. He was 101. The death was confirmed by his wife, Beth Archer Brombert. Professor Brombert (pronounced brom-BEAR) was one of the Ritchie Boys, a U.S. Army unit whose members, armed with foreign language skills, gathered battlefield intelligence in Europe. Many of them, like Professor Brombert, were Jewish refugees from fascism. They were all trained at Camp Ritchie in rural Maryland. The program was little known until “The Ritchie Boys,” an acclaimed documentary by Christian Bauer, came out in 2004. The group became an object of public fascination, and it was widely reported that its members had fought in every major European battle and supplied most of the intelligence that the United States gathered on the continent. Professor Brombert was one of the film’s main interviewees. He became a major figure in other histories of the Ritchie Boys and appeared on “60 Minutes.” Until then, he had been known mainly as an intellectual historian at Princeton and Yale. He contributed articles about French culture to The New York Times Book Review from the early 1960s to the late ’90s. He wrote book-length studies of literary tropes — on the antihero and what he called “the intellectual hero” — as well as books of criticism about authors like Stendhal, Flaubert and Victor Hugo.
- Information Sought: Researcher is seeking information about the document known in the West as the “KGB Wanted List,” the 1969 version of which was brought to the West by a KGB defector in 1972. Vladislav Krasnov analysed a portion of the list in his 1986 book titled “Soviet Defectors.” Both CIA and the FBI responded to FOIA requests indicating that they cannot find the 1969 list (although both CIA and NACIC have cited it in various forums). If you have a copy of the 1969 list, suggestions where it might be found in its entirety, or knowledge of any earlier lists in the series, please contact Kevin Riehle at kevin.riehle@brunel.ac.uk.
- Call for Collaboration: AFIO member seeks a collaborator with YouTube technical expertise to launch a channel that will highlight specific examples of Russian and Chinese misinformation. Please contact Greg Rushford at gregrushford@gmail.com.
- Internship Opportunity: U.K.-based private intelligence company Grey Dynamics is accepting applications for its analyst internship program. Excellent resume building experience for aspiring intel analysts and, for intelligence studies students (and graduates) who are interested in analysis and writing, a great entry-level opportunity to exercise your skills in a real editorial and publication setting. See full details and application instructions here.
- Call for Information: Child of former CIA Commo Officer Walter E. MacLeod seeks information on her father's life and work to help build a better understanding of the family's history. MacLeod EODed in 1951 and served in Saipan, Havana, WTC, Caracas, Jakarta, Saigon, Paris, Phnom Penh, Vientiane, and Bangkok. He retired in 1975. If you have information to share, contact Kathy MacLeod katherinemacleod@gmail.com.
- Call for Intelligence Studies Course Syllabi: An adjunct professor in the criminology department at Florida International University in Miami is developing a course in intelligence studies for the school and would welcome the opportunity to review syllabi used by other intel studies teachers. If you have a syllabus that you are willing to share, contact Salvador Rivas at salvador.rivas@fiu.edu or (786) 547-0428.
- Call for Interviews: Kingston Trinder is a Los Angeles-based nonfiction author and documentary film and television executive who is seeking extraordinary true, untold, stories featuring unforgettable characters, and unbelievable narrative arcs. He develops compelling factual storytelling with a variety of international publishing houses and television networks, and is in search of primary source material from former intelligence officers about their lives, specific cases or projects that they can get cleared for discussion, or other aspects of working in the shadows that would be informative and entertaining for readers who live outside of that world. Please email hello@kingstontrinder.com or call (323) 570-5715.
- Call for Online Survey Participants: Northeastern University is conducting an Institution Review Board approved research project on critical thinking skills for national security intelligence analysts and welcomes the input, via online survey, of AFIO members. Access survey here.
- Call for Information and Interview Subjects: In search of information on possible espionage activity in New York City in the WWII and post-war era to help a family investigating their heritage. Specifically looking at The Plaza (1955), Hotel Pierre (1935 through 1970), and Hotel Delmonico (1945) (now Trump Park Avenue) as well as "Office of 39" Room 3603, and the OWI (Office of War Information) (1945). Details on the Grand Central Station underground and Waldorf Astoria Secret Elevator are also of interest. Other areas of interest for any information on the following people or more generally who may be able to speak to the climate include Swiss involvement in the Abwehr, The Nestle Company 1935-1945, Reinhard Gehlen, German Soldier Thilo Von Trotha in Addis Ababa in 1948-53, Michael Wardell in London, John B. McNair, Canada, Lord Beaverbrook in Cromarty 1948-49. Contact Rosanna Minchew at Rosanna@spyher.co.
- Assistant Professor in Intelligence and National Security Studies - University of Texas, El Paso
The University of Texas at El Paso invites applications for the position of Assistant Professor of Intelligence Studies in the Department of Criminal Justice and Security Studies. We seek applicants with demonstrated research expertise in one or more of these areas: Open-Source Intelligence, Cybersecurity, Cyberwarfare, or Intelligence Analysis. Successful candidates will indicate how they can contribute to establishing and growing UTEP's Open-Source Intelligence Center. More information about our program and dynamic campus, as well as application materials, can be found here.
- 2 Assistant Professors in Intelligence and Security - Institute of Security and Global Affairs, University of Leiden - Netherlands
The successful candidates will have demonstrable research records in themes related to the vacancy and strong teaching background in intelligence and security, or a related field, as well as in topics related to the Institute's Bachelor's and Master's programme offerings. The candidate will be expected to teach across several programmes in the Institute, notably the master's programme Crisis and Security Management and the bachelor programme Security Studies, and our minor in Intelligence Studies. The positions are aimed at strengthening the Institute's teaching, research and grant-acquisition capacities in a phase of growth and exciting interdisciplinary research opportunities. Full details on qualifications, duties, and application here.
- Assistant Professor of Intelligence Studies - Mercyhurst University - Erie, Pennsylvania
Mercyhurst University in Erie, PA, invites applications for the position of Assistant Professor of Intelligence Studies in the School of Intelligence, Computing and Global Politics. The position is at the Erie campus and begins Fall Semester 2024. Successful candidates will teach introductory and applied courses in Crime and Law Enforcement intelligence analysis at the undergraduate and graduate levels, in addition to the ability to teach undergraduate or graduate courses in: Leadership in Intelligence; Advanced Analytic Techniques; Intelligence Collection and Analysis. Additional information and application instructions here.
- Associate Professor and Chair of National Security - University of New Haven, Connecticut
The Department of National Security invites nominations and applications for a tenured Full/Associate Professor and Chair of National Security. The department includes a dynamic undergraduate program encompassing four distinct bachelor's degrees (Security & Defense Policy, Intelligence Analysis, Homeland Security, and International Affairs), a robust master's degree program, and several practitioner-oriented certificates. Qualifications: A terminal degree in national security, public policy, political science, or related field is required; Ph.D. preferred. The successful applicant will have a record of teaching excellence at the university level, established catalog of academic publications, and an innovative research agenda. Applicants should also possess experience in university-level service and leadership. The department is particularly interested in candidates with policymaking experience in national security at either the federal, state, or local level. Tenurable Assistant Professors may also be considered in accordance with the aforementioned qualifications. Application Instructions: Please submit a brief cover letter explaining teaching experience and philosophy, publication record, practitioner-oriented experience (if applicable), CV, and the name and contact information for three references. Applicants may also include up to 3 artifacts of teaching ability (examples include syllabi, student evaluations, learning exercises, assignments, or other feedback) that illustrate teaching experience. More information and application here or contact Search Committee Chair, Dr. Jeffrey Treistman at jtreistman@newhaven.edu.
- Wanted: Former intelligence officers to lead spy-themed walking tours in Washington D.C. - Spyher Tours
These are 90-120 minute historical tours with an interactive "operational" component. Most tours start at 10am on select Thursdays-Sundays. The immediate opportunity is for dates in March, but additional opportunities are available through June, and new opportunities are likely to become available throughout the year. This is a fun way to get back out on the streets, engage/educate the public on the world of espionage, and make some extra cash. The next opportunities to see a tour in action (and train before the Spring rush) are Sunday 2/18 and Sunday 3/3. Please contact Rosanna at 571-236-9052 or rosanna@spyher.co. Visit https://spyher.co.
- Assistant/Associate Professor of Intelligence Studies (Global Security and Intelligence Studies) - Embry-Riddle Aeronautical University - Prescott, Arizona
Embry-Riddle Aeronautical University's Prescott, Arizona campus is accepting applications for a tenure-track assistant or associate-level professor of intelligence studies to teach intelligence courses to students in the Global Security and Intelligence program. The successful candidate will teach students about the intelligence community, strategic intelligence, the intelligence cycle and intelligence analysis, writing, and briefing. Prior experience working in the intelligence community is strongly preferred. We are interested in candidates with teaching acumen in intelligence analysis and writing using structured analytical techniques.
Additional information and application here.
None scheduled.
30 Apr - 02 May 2025 – In Person – Cryptologic History Symposium - National Cryptological Foundation and NSA Center for Cryptologic History, Johns Hopkins University, Maryland
Since 1990, the Cryptologic History Symposium has served as an opportunity to present historical scholarship found in unclassified and declassified cryptologic records and engage in discussion about their significance to history. The event is an occasion for historians and those interested in history to gather for reflection and debate on relevant and important topics from the cryptologic past. Regular speakers include historians from CCH, the Intelligence Community, the defense establishment, the military services, scholars from American and international academic institutions, veterans of the cryptologic profession, graduate and undergraduate students, and noted authors. Past symposia have featured scholarship that set out new ways to consider our cryptologic heritage. The conference provides many opportunities to interact with leading historians and other experts. The mix of practitioners, scholars, and interested observers guarantees a lively debate that promotes an enhanced appreciation for past events and their applicability to current and future issues. More information and registration here.
30 Aug - 8 Sep 2025 - Mediterranean Cruise - Spies, Lies & Nukes announce Espionage on the High Seas! Plan NOW to join the late-summer 2025 cruise. Instead of their traditional Spies, Lies & Nukes conference in 2024, Valerie Plame and other intelligence colleagues are thrilled to introduce an exciting variation for 2025: Spies at Sea. A combined cruise and conference through the breathtaking Mediterranean, from
August 30 to September 8, 2025! See brochure here.
What to Expect:
• Intimate Conference Setting: Enjoy the same close-knit, engaging environment you've come to expect, with unparalleled access to our expert speakers.
• Exclusive Shore Excursions: Explore clandestine meeting spots, delve into espionage history, and more on excursions EXCLUSIVE TO OUR GROUP.
• Seminars at Sea: Participate in lectures and presentations led by Valerie Plame and other top intelligence professionals, all the while cruising through some of the Mediterranean's most iconic destinations.
• Special Events: Enjoy exclusive cocktail receptions, surprise activities, and one-on-one conversation time.
Exclusive Spies, Lies & Nukes Itinerary Highlights:
• Barcelona, Spain: Begin your adventure in this vibrant city.
• Valletta, Malta: Walk through history with guided tours led by espionage experts who will lift the veil on area spy stories and meeting sites.
• Mykonos, Greece: Discover the charm and beauty of this picturesque island.
• Ephesus, Turkey: Explore ancient ruins with a private guide and enjoy a unique group lunch, all while learning about intelligence activities that took place at each spot.
• Santorini, Greece: Experience the iconic beauty of Santorini with endless photographic opportunities.
• Naples, Italy: Enjoy a group lunch at a local restaurant and an exclusive walking tour with a private guide while learning a few spy secrets from Naples,
Capri, and the Amalfi Coast.
We've secured a discounted rate that includes your stateroom, meals, classic beverage package, wi-fi, exclusive excursions, and all conference activities. These
cabins will get booked quickly, so don't wait—
Gray long-sleeved polo shirts with embroidered AFIO logo. Men's sizes only.
Show your support for AFIO with our new Gray Long-sleeve Polo Shirts. Shirts are shrink and wrinkle resistant of fine cotton with a soft, "well-worn, comfy" yet substantial feel. They feature a detailed embroidered AFIO seal. Get a shirt for yourself and consider as gifts for colleagues, family, and friends. Only $60 each including shipping.
Sizes for men, only: Small, Medium, Large, XL, XXL, and XXXL. $60 per shirt. Order this and other store items online here.
20 oz ceramic Mug with color glazed logo. Made in America. Check out our new tapered, sleek AFIO coffee mug!! This handsome 20 oz. ceramic mug is made in the USA, has a white matte exterior, sports a beautiful navy-blue interior, and is dishwasher safe. Order yours today! $35 per mug includes shipping to a CONUS address. [includes shipping to U.S. based address, only. For foreign shipments, we will contact you with a quote.] SHIPPING: For shipment to a U.S.-based CONUS address, shipping is included in price. For purchases going to AK, HI, other US territories, Canada, or other foreign countries the shipping fees need to be calculated, so please call our office M-F 8 a.m. to 2 p.m. ET at 703-790-0320 or email afio@afio.com providing following information: 1) your name, 2) mailing address (or addresses where each gift item will be shipped), 3) name of the AFIO store items you wish to purchase, 4) quantity of each, 5) your credit card number and expiration date, 6) amount (except for additional of shipping fees) authorized to charge, and 7) your phone number and email should we have questions. Foreign shipments fees will be calculated and estimates emailed to you, awaiting your approval. Order this and other store items online here.
Black short-sleeved polo shirts with Embroidered AFIO logo
Show your support for AFIO with our new Black Short-sleeve Polo Shirts. Shirts are shrink and wrinkle resistant of fine cotton with a soft, "well-worn, comfy" yet substantial feel. They feature a detailed embroidered AFIO seal. Get a shirt for yourself and consider as gifts for colleagues, family, and friends. Only $50 each including shipping.
Sizes for (M) men, only; Small, Medium, Large, XL, XXL, and XXXL. $50 per shirt.
You may pay by check or credit card. Complete your order online here or mail an order along with payment to: AFIO, 7600 Leesburg Pike, Ste 470 East, Falls Church, VA 22043-2004. Phone orders at 703-790-0320. Questions? Contact Annette at: annettej@afio.com.
PopSocket for cellphones or tablets
Show your support to AFIO while enjoying the convenience offered by our AFIO Logo PopSocket. The PopSocket is most commonly used as a stand and as a grip for your mobile phone or tablet; handy for taking selfies, watching videos, and for texting. The PopSocket looks like a small button or sticker which, when closed, sticks flat to your mobile device. However, its accordion-like design enables it to pop open for use. The benefits of using a PopSocket make it a must-have accessory for your mobile phone or tablet. It also aids in keeping your phone from slipping off your hand during use, falling, or breaking.
Price: $15. Order this and other store items online here.
Duffel Bags - Royal Blue and Black with Full Color AFIO Logo This duffel has it all when it comes to value, style and organization.
600 denier polyester canvas with polyester double contrast; D-shaped zippered entry for easy access. Front pocket with hook and loop closure. End mesh pocket Easy-access end pockets. Four durable, protective feet and built-in bottom board for added strength. Web handles with padded grip. Detachable, adjustable shoulder strap.
Dimensions: 11"h x 19.75"w x 9.75"d; Approx. 2,118 cubic inches
Price: $50. Order this and other store items online here.
Caps - Dark Navy with Navy AFIO Logo
An authentic silhouette with the comfort of an unstructured, adjustable fit. Fabric: 100% cotton. Unstructured. Fabric strap closure with adjustable D-clip. Price: $30. Order this and other store items online here.
AFIO's Guide to the Study of Intelligence...and...When Intelligence Made a Difference
"AFIO's Guide to the AFIO's Guide to the Study of Intelligence has sold out in hard-copy.
It is available in digital form in its entirety on the
AFIO website here.
Also available on the website here are the individual articles of AFIO's
history project "When Intelligence Made a Difference" that have been
published to date in The Intelligencer journal.
More articles will be appear in future editions.
PUBLISHED IN 2023—Be informed on career opportunities in the U.S. Intelligence Community
Intelligence as a Career - with updated listings of colleges teaching intelligence courses, and Q&As on needed foreign languages, as well as the courses, grades, extracurricular activities, and behavioral characteristics and life experiences sought by modern U.S. intelligence agencies.
AFIO's popular 47-page booklet reaches thousands of high school, college students, university guidance offices, and distributed in classes teaching intelligence, to help those considering careers
in the U.S. Intelligence Community.
This is the fifth edition.
The publication is also popular with University Career Guidance Centers, professors and academic departments specializing in national security, and parents assisting children or grandchildren in choosing meaningful, public service careers.
This booklet is provided online as a public service from the generosity of AFIO board, volunteer editors/writers, donors, and members.
We thank all for their support which makes this educational effort possible.
Careers Booklet (2023 Fifth Edition) can be read or downloaded here
Address Technical Issues Or Unsubscribe
To unsubscribe from the WIN email list, please click the "UNSUBSCRIBE" link at the bottom of the email. If you did not subscribe to the WIN and are not a member, you received this product from a third party in violation of AFIO policy. Please forward to afio@afio.com the entire message that you received and we will remove the sender from our membership and distribution lists.
Disclaimer and Legal Protection
Weekly Intelligence Notes (WINs) are a carefully selected collection of timely open source reports and announcements and other media focused on intelligence and related national security matters that is produced for non-profit educational use by AFIO members and WIN subscribers. WINs are protected by copyright and intellectual property laws. They may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the materials contained in the WINs are solely those of the content creators listed with each item. Notices in the WINs about non-AFIO events do not constitute endorsement or recommendation by AFIO.
(c) 1998 thru 2024
AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!
AFIO | 220 Spring St Suite 220, Herndon, Virginia 20170-6205 | (703) 790-0320 (phone) | (703) 991-1278 (fax) | afio@afio.com
About AFIO | Membership Renewal | Change of Address | Upcoming Events | Chapter Locations | Corporate/Institutional Memberships | Careers in Intelligence Booklet | Guide to the Study of Intelligence | Intelligencer Journal | Weekly Intelligence Notes | Make A Donation | AFIO Store | Member-Only Section | Code of Ethics | Home Page
RETURN TO TOP
|