Weekly Intelligence Notes #24-03 |
WIN
24-03 dtd
Weekly
Intelligence Notes (WINs) are produced and edited by
Roy Jonkers for non-profit educational uses by AFIO
members and WIN subscribers.
CONTENTS
of this WIN
[HTML version recipients - Click
title to jump to story or section, Click Article Title to return to Contents]
[This feature does not work for Plaintext Edition recipients. If you wish to
change to HTML format, let us know at
SECTION I -- CURRENT
INTELLIGENCE
DCI Takes Charge of Iraq
WMD Search
SECTION II -- CONTEXT
AND PRECEDENT
Personal Data Collection Systems Blossoming in
US
Mexico Refocusing Intelligence
Agency
SECTION III -- CYBER
INTELLIGENCE
Secret Service Cyber Crime Force
DoD Facial Recognition
Program
Pilot Program for International Cargo
Security
Surveillance Oversight Act
Proposed
SECTION IV -- BOOKS AND
SOURCES
House Compendium of Intelligence
Laws
SECTION V -- NOTES AND
ANNOUNCEMENT
AFIO Summer Luncheon 24 June
03
Andre M. Writes About Moscow Spy
Tour
SECTION I -- CURRENT
INTELLIGENCE
DCI TAKES CHARGE OF IRAQ
WMD SEARCH --
DCI George J. Tenet on 11 June announced the
appointment of Dr. David Kay as Special Advisor for Strategy regarding Iraqi
Weapons of Mass Destruction (WMD) Programs. Kay, 63,
will be based in
IRAN INTELLIGENCE -- The
National Security Presidential Directive on
The
State Department is currently proceeding with increased diplomatic pressure,
implementing statements by the President, to include stimulating actions by
international agencies (i.e. IAEA) and national actors
(i.e. Russia and the EU). Behind these opening moves
stands the US ability to commence an active destabilization campaign, involving
the whole spectrum of information war and clandestine operations, culminating in
possible "pre-emptive" strikes or operations against Iran's nuclear
power-generating plants. Bombing
strikes would be dangerous in their effect of spreading nuclear debris over a
wide area, but cannot be ruled out. Sophisticated special operations are more
likely. Active destabilization and covert attacks on
On balance one must expect greatly increased US intelligence priority for
Iran involving not only analysis but operations, increased "information war'
black and white propaganda and a variety of other destabilization measures, and,
with a Presidential finding or Directive, increased clandestine 'special'
operations -- or possibly selective bombing attacks -- against and within Iran
over the next year. (Jonkers) (WashPost 15 June 03, p. A20 //M./ Dobbs) (UK Evening
Standard,
SECTION II - CONTEXT AND PRECEDENT
PERSONAL DATA COLLECTION SYSTEMS BLOSSOMING IN
US -- In
the 20 months since
(1) The FBI
is working with outside contractors to build a 'Terrorism and Intelligence Data
Information Sharing Data Mart'. By
importing data from other federal agencies and linking to local police
intelligence databases, the data mart will get instant access to a broad range
of people. "Text-mining" software will then scan for common elements in more
than a billion documents from FBI field offices across the
country.
(2) The
Department of Homeland Security, intending to block suspected terrorists from
flying or killing tourists, is collecting passenger manifests from airlines and
cruise lines for every international trip to and from the
(3)
The
Defense Department, of course, is developing its much-critiqued Total
Information Awareness System, now re-named the 'Terrorist Information Awareness'
program, aimed at detecting patterns of terrorist activity.
(4) An FBI
database called the Violent Gang and Terrorist Organization File is expanding
rapidly. When it was launched in 1995, VGTOF was
mainly used to track violent urban street gangs. Early last year, its purpose
was quietly expanded to include all subjects of FBI domestic or international
terrorist investigations. A February 2002 memo citing the 2002 Winter Olympics
shows how the FBI's definition of potential terrorists has broadened. It now encompasses such categories as
"anarchists," "militia," "white supremacist," "black extremist," "animal rights
extremist," "environmental extremist," "radical Islamic extremist" and "European
origin extremist."
(5) A
police intelligence network called RISSNET has emerged
as a national bulletin board for police about people suspected, but not
necessarily convicted, of criminal activity. Since October, the Justice
Department has been connecting Rissnet to other
networks so that information on people of interest to local law enforcement --
including protest groups suspected of crimes, motorcycle gangs and members of
organized crime -- can be cross-checked by federal investigators. As an example,
the
(6)
Commercial organizations are also compiling data from as many sources as they
can find. Regulatory DataCorp International was set up
by a consortium of banks to comply with Patriot Act requirements forbidding
transactions with terrorists. It has gathered lists of arms dealers, people
mentioned in the media as being under investigation or indictment, people
sanctioned by regulators, and foreign rulers and their aides, friends and
families. Their database contains 1.5 million names and is growing.
Developed
as counter-terrorism tools, the systems are aimed at bridging gaps in
information that let the 9/11 hijackers slip past law enforcement. Conceptually
and basically they accomplish a needed function. But the coming flipside dangers
are clear, inherent in bureaucracy, prosecution zeal, and in the tendency to
expand the definition of "terrorist." In the short run there still are technical
inefficiencies -- a General Accounting Office report last month cited
incompatible computer languages and operating systems as a hurdle to merging the
dozens of watch lists kept by various agencies. In the longer run we must place
our confidence in the Constitution and the courage of our citizens in upholding
it to keep security and freedom in balance. (Jonkers)
(Wall St. Journal 22 May 03//A.
MEXICO REFOCUSING INTELLIGENCE AGENCY -- The
Mexican 'Center for Investigations and National Security' (CISEN) has the reputation of being a secretive espionage arm
of government used by presidents and political strongmen to intimidate
opponents, watch over the media and maintain power. More recently, however,
President Vicente Fox has reportedly focused CISEN's
formidable "human assets" also on the task of "guarding" America's southern
flank in the war on terrorism -- and more importantly, to prevent any
anti-American plots from being hatched or succeeding within Mexico. In the past
CISEN has worked with
CISEN has far
to go before it sheds its dark past: It was formed in the mid-1980s from the
ashes of the despised Federal Security Department. That secret police agency was
implicated in everything from the "dirty war" against opponents of the former
ruling party, the Institutional Revolutionary Party, or PRI, in the 1960s and
1970s, to the assassination of Enrique "Kiki"
Camarena of the U.S. Drug Enforcement Administration.
A large
part of the CISEN's work recently has been rooting out
government corruption -- such as the cleanup of
Information
(intelligence) is CISEN's only game. Its agents are
unarmed and carry no badges – nothing identifying their station. Said a Mexican
security analyst, "This government, this president (Fox), has pushed this agency
to be what it was originally intended to be -- an honest guard against internal
and external security threats." (Jonkers) (The
SECTION III - CYBER INTELLIGENCE
SECRET SERVICE CYBER CRIME FORCE -- The
U.S. Secret Service announced Monday that it will form an Electronic Crimes Task
Force in its Dallas bureau to combat regional computer-based crimes, including
fraud, identity theft and cyber terrorism. Officials said 15 agents would work
with the private sector, academia and local law enforcement to investigate
computer-based crimes, expanding the capability to battle hackers that attack
universities, businesses and government computer systems. "No one has the inside
track on cybercrimes. We are hoping that corporations
and academia will look to us as forensic experts," said Michael James, special
agent in charge of the
DOD FACIAL RECOGNITION PROGRAM -- The
use of facial recognition solutions is rapidly gaining steam in the Defense
Department, as evidenced by the recent award of two contracts to further develop
the technology. Contracts were awarded by DOD's Technical Support Working Group
and the Defense Advanced Research Projects Agency (DARPA). (Levine 18 June 03)
http://www.fcw.com/fcw/articles/2003/0616/web-face-06-18-03.asp
PILOT PROGRAM FOR INTERNATIONAL CARGO
SECURITY --
Boeing Co. has received a $4.2 million contract for a pilot project that will
demonstrate cargo container security systems by tracking shipments from foreign
ports to the
SURVEILLANCE OVERSIGHT ACT PROPOSED --
Reflecting lawmakers' growing unease with the Justice Department's use of
expanded surveillance powers, the Surveillance Oversight and Disclosure Act
(SODA) was introduced in the House of Representatives. It would require the
Department of Justice to publish an annual report counting and categorizing the
number of surveillance orders issued under the Foreign Intelligence Surveillance
Act (FISA) in the previous year. (Levine 13 June 03)
http://www.securityfocus.com/news/5772
SECTION IV - BOOKS AND SOURCES
SLEEPING WITH THE
DEVIL: HOW
Bob Baer
was a case officer in CIA's Directorate of Operations from 1976 to 1997. His
overseas assignments included stints in Northern Iraq, Dushanbe, Rabat, Paris,
Beirut, Khartoum, New Delhi, and elsewhere, handling agents that infiltrated
Hizballah, PFLP-GC,
PSF, Libyan intelligence, Fatah-Hawari, and al Qaeda. Fluent
in Arabic, Farsi, French, and German, he divides his time between
CHARLIE WILSON'S WAR: THE
EXTRAORDINARY STORY OF THE LARGEST COVERT OPERATION IN HISTORY, by George
Crile (Atlantic Monthly Press, April 2003; ISBN: 0871138549)
Charlie
Wilson's War is the untold story of how CIA armed the Afghan
Mujahideen in the battle against the Soviets, and what
became the Agency's largest and most successful campaign in history. It profiles
the men who conceived it and the journey they took to see it through. At its
core, it tells of an unorthodox alliance -- of a scandal-prone Texas Congressman
named Charlie Wilson -- an outsized, swaggering East Texas Congressman -- and an
out-of-favor CIA operative named Gust Avrakotos who
headed up a band of officers and agents that armed and sustained the Afghan
jihad and turned
HOUSE COMPENDIUM OF INTELLIGENCE LAWS -- The
House Intelligence Committee has updated its periodic "Compilation of
Intelligence Laws and Related Laws and Executive Orders of Interest to the
National Intelligence Community." It is a very handy compendium of major and
minor intelligence-related statutes, current as of
A copy is posted here
http://www.fas.org/irp/congress/2003_rpt/laws2003.pdf (2.6 MB
PDF file) (Secrecy News 06/18)
IRAQI WMD INTEL DOCUMENT --
House Intelligence Committee chairman Rep. Porter Goss invited members of the
House of Representatives who have signed non-disclosure oaths to review certain
classified intelligence documents concerning
SECTION V - NOTES AND
ANNOUNCEMENT
CI CENTRE SPY CRUISE -- QE2
Cabins Going Quickly! The cabins on
Cunard's QE2 cruise ship for the
AFIO SUMMER LUNCHEON 24 June 03 -- Milt
Bearden, James Risen, John Prados -- outstanding cast of speakers -- just about sold
out. If you forgot, perhaps we can still accommodate you -- call now!!
703-790-0320
Andre M. writes about MOSCOW SPY TOUR --
On Monday we met
in a conference room at the Aerostar where we heard
three lectures. (KGB/FSB Ret.) Gen. Alexander Zdanovich
discussed Cheka/OGPU Counterintelligence Operations
against the British and French Secret Services. Col. Oleg Tsarev discussed Cold War Intelligence during Stalin's time.
The third lecture was given by Ivan Kusmin, former
Senior Analyst and current a professor at the
After
lunch we got on a comfortable bus (with a bathroom!) and we visited agent
meeting locations and former apartments of Penkovsky
and Popov.
We also went to the
Dinner was at a
The second day we were
back in the conference room of the hotel.
Oleg Nechiporenko (KGB-Ret.) was to talk about
Intelligence Services and Counter Terrorism, but since he is the author the Lee
Harvey Oswald book “Passport to Assassination,” the discussion focused mostly on
his book. The Colonel was assigned
to the KGB station in
(KGB-Ret) Igor
Shevchuk discussed old KGB officers
activities in the New Market Economy.
Many are involved in private security for businesses and in private
investigations. General Zdanovich continued the
morning lectures with a discussion of Stalin’s SMERSH
unit, and a review of recently published books on intelligence. All of the books discussed were in
Russian only (as of now). The
morning ended with a case briefing on the Adolf
Tolkachev (betrayed by Aldrich
Ames).
After lunch
there were visits to intelligence sites and to the
Dinner was at a
restaurant in
On Wednesday, the
final day we visited the the
I enjoyed this
tour and experience. Mr.
Mulvenna and the
CI-Centre plan another conference and tour next year. (Andre M.) (CI Centre Web
Site www.cicentre.com)
WINs are
protected by copyright laws and intellectual property laws, and may not be
reproduced or re-sent without specific permission from the Producer. Opinions
expressed in the WINs are solely those of the
editor(s) or author(s) listed with each article. AFIO Members Support the AFIO
Mission - sponsor new members! CHECK THE AFIO WEBSITE at
www.afio.com for back issues of the
WINs, information about AFIO, conference agenda and
registrations materials, and membership applications and much more! (c) 2003,
AFIO,