Section I - INTELLIGENCE HIGHLIGHTS
British Intelligence Tipped Off Americans on Mumbai Suspect. David Coleman Headley, also known as Daood Sayed Gilani, made frequent visits to the Indian city where he mixed with the Bollywood set as a cover for his activities.
He joined a local gym in the upmarket Breach Candy area and stayed at the Taj Mahal hotel, one of the targets, in April and May 2007.
According to a US indictment, Headley, 49, was a freelance reconnaissance agent for terrorist groups including Lashkar-e-Taiba, the group behind the Mumbai attacks a year ago.
Intelligence sources say British officers collected the vital information that identified Headley, a US citizen living in Chicago who was arrested in October. They declined to give further details.
British intelligence was also responsible for the arrest of another US terrorist suspect, Najibullah Zazi, 24, who was allegedly planning attacks on the New York subway when he was arrested in Denver in September.
Investigators in India are still trying to piece together Headley's activity in the country around the crucial period, when he posed as a businessman running an immigration service.
He is said to have befriended a man called Rahul who has identified himself to Indian police as Rahul Bhatt, a young actor from one of Bollywood's leading families.
Apart from his visit to the Taj Mahal hotel in 2007, when he stayed in the heritage building attacked by the terrorists the following year, he also visited New Delhi, staying in the city's Paharganj area, in October 2007 and March 2009.
He is reported to have rented an apartment close to his gym in Mumbai from April 2008, where his landlady has described him as a "sweet and charming man".
Headley's associate, Tahawwur Hussain Rana, 48, a Canadian living in Chicago, stayed in a guesthouse in south Mumbai close to the Chhatrapati Shivaji railway station, another target, until November 21 last year, five days before the attacks, when he returned to North America.
Headley was in Pakistan at the time of the attacks working on another plan he called the "Mickey Mouse Project". Headley and Rana both attended the Hasan Abdal Cadet College in Pakistan and were members of an internet group called the Abdalians.
While investigations continue into Headley's activities in India, he has been charged in Chicago with a number of other terrorist offences. He is also accused of plotting an attack on the culture editor and cartoonist who published cartoons of the prophet Mohammed in the Jyllands-Posten newspaper in Denmark. [Gardham&Nelson/Telegraph/26November2009]
Military Intelligence Researchers Want New SIGINT Approaches to Measure Electromagnetic Signatures. The U.S. Defense Intelligence Agency (DIA) in Washington is asking industry for new ways to collect military intelligence information - particularly from measurement and signatures intelligence (MASINT), which detects, locates, and identifies the electromagnetic signature of stationary and moving targets.
The Virginia Contracting Activity (VACA) at Patrick Air Force Base, Fla., is issuing a broad agency announcement (BAA 01-10-VACA) on behalf of the DIA for new approaches for MASINT and signal processing, with the goal of developing and fielding new capabilities for intelligence gathering and signals intelligence (SIGINT).
DIA leaders are asking for demonstrations of first- or next-generation MASINT prototypes that can be developed within one to two years. DIA is interested in new systems and approaches, as well as new ways to use existing systems and data, to fill gaps in intelligence collection.
For this program, DIA officials are particularly interested in using MASINT approaches to provide persistent, undetected, and difficult-to-counter surveillance.
The DIA budget for this program is about $6 million per year through 2014. The BAA is open for the five-year period from now to 30 Nov. 2014. Much of the work will be classified secret or above.
[FBO.Gov/29November2009]
Mental State Cited in 9/11 Case. When five defendants are brought before a New York federal judge to face charges for the terror attacks of Sept. 11, 2001, the first question may be whether some of them are competent to stand trial at all.
Military lawyers for Ramzi Binalshibh, an accused organizer of the 9/11 plot, and Mustafa al-Hawsawi, the conspiracy's alleged paymaster, say their clients have mental disorders that make them unfit for trial, likely caused or exacerbated by years of harsh confinement in Central Intelligence Agency custody.
The issue already has arisen in military-commission proceedings at the military's detention facility at Guantanamo Bay, Cuba. According to an August ruling by a military judge, prosecutors have made an "apparent concession" that Mr. Binalshibh "suffers from a delusional disorder-persecutory type" disorder. Mr. Binalshibh has been prescribed "a variety of psychotropic medications used to treat schizophrenia and/or bipolar disorder, including Haldol, Abilify, risperidone and Ativan," according to commission records.
In October 2008, a military medical board reported Mr. Binalshibh may suffer from "severe mental disease" that could "impair his ability to conduct or cooperate intelligently in his defense."
A military attorney for Mr. Hawsawi, Lt. Cmdr. Gretchen Sosbee, said the military judge ordered a mental evaluation of her client, but its results haven't yet been entered into the record.
It long has been unconstitutional to prosecute people who are unable to understand proceedings against them or assist in their defense, whether in federal court, court-martial or military commission.
However, Cmdr. Suzanne Lachelier, a lawyer for Mr. Binalshibh, said a military judge has refused to allow a full examination into her client's condition, in particular by denying access to any information regarding his treatment in CIA custody between 2002 and 2006. An order by the judge, Col. Stephen Henley, said that information was "not relevant" to Mr. Binalshibh's condition.
In court papers, Cmdr. Lachelier cited Bush administration memorandums endorsing the use of sleep deprivation, solitary confinement and other harsh techniques intended to induce a prisoner's cooperation.
Khalid Sheikh Mohammed is not the only accused terrorist set to go on trial in New York. But WSJ's Jess Bravin says two of KSM's co-accused have mental competency issues that may jeopardize a trial.
Military records cited by the defense say Mr. Binalshibh "was seen 'acting out' in various manners, including breaking cameras placed in his cell" and covering cameras "with toilet paper...and with feces." At a June 2008 hearing, Mr. Binalshibh said "we're still in the black site" - the term for CIA secret prisons. Mr. Binalshibh said he couldn't sleep because, among other reasons, his bunk is "always shaking automatically."
Much remains unknown about the prisoners' mental state, and prosecutors may have evidence to demonstrate their fitness that isn't currently public.
Justice Department spokesman Dean Boyd declined to comment specifically on the mental-capacity issue but said the government expects "a host of motions" to be filed. "It's the job of prosecutors to anticipate these challenges and plan their cases accordingly, and that is certainly being done in this case," he said.
A strong defense case for mental unfitness may force prosecutors to choose between unappealing options. They could sever Messrs. Binalshibh and Hawsawi from the joint conspiracy trial, allowing the case against the defendants whose capacity isn't at issue to proceed.
That would deprive prosecutors of a favored tool in conspiracy cases, because a joint trial allows the alleged guilt of one defendant to be imputed to the others. In this case, where the notoriety of alleged 9/11 organizer Khalid Sheikh Mohammed far exceeds that of his co-defendants, the separation could be beneficial to Messrs. Binalshibh or Hawsawi should they contest the charges.
If federal prosecutors decide to pursue a joint trial, proceedings will have to wait until each defendant's fitness is established.
In determining competence, "the key issue is the capacity to assist counsel," said Norman Poythress, a University of South Florida specialist in mental-health law.
Last year, the Supreme Court established a two-tier system of mental capacity, allowing judges to find defendants able to stand trial yet unfit to represent themselves. Mr. Mohammed and two co-defendants - Walid bin Attash and Ali Abdul Aziz Ali - have been acting as their own attorneys before the military commission. Mr. Binalshibh asked to do so, but was denied until his mental competence has been determined.
[Bravin/WSJ/27November2009]
Pollard Enraged by Deal to Free
Schalit. The jailed Israeli spy, Jonathan Pollard, came out fiercely against the proposed deal with Hamas in which Israel would release 980 Palestinian prisoners in return for kidnapped soldier Gilad Schalit.
Speaking to journalists, Pollard said he wanted Schalit to come home, but the thought of terrorists being released "boiled him with anger."
"This is a horrible hilul Hashem [blasphemy]," Pollard said. "Instead, [Prime Minister Binyamin] Netanyahu should take the list of prisoners Hamas requested and kill one of them every day until they release Gilad from prison. He should not free terrorists, no matter what."
Pollard, who has served 25 years in prison for spying for Israel in the United States, stressed that he would not want any terrorists released in a deal to bring about his own release. He has strongly rejected a rumored deal in which he would be released at the same time as convicted murderer Marwan Barghouti.
Pollard's attorney said Pollard is in poor health and felt betrayed by Israel. He said that when a relative recently called the Israeli embassy in Washington, the person he spoke to claimed to have never heard of him.
"Twenty-five years ago, they threw me out of the embassy, and now they are making me disappear," Pollard said.
[Hoffman/JPost/1December2009]
Czech Artist Accused of Being a Spy. A Czech artist and dissident has dismissed allegations that he once spied on the U.S. Embassy in Prague for the Communist secret service.
In addition to denying the charge, Joska Skalnik said he would not comment on the specific facts in the case, the Czech news agency CTK reported Wednesday.
Last month the Czech Institute for the Studies of Totalitarian Regimes published information about Skalnik's alleged contacts with the Communist secret service. The institute said it found a number of documents showing that Skalnik was a secret collaborator operating under the cover name "Black" in files dealing with the shadowing of U.S. diplomats.
A local newspaper reports that the secret service planned to use Skalnik and other agents in an operation aimed at discrediting and then expelling Robert Lloyd Norman, the secretary of the embassy's political department.
[UPI/2December2009]
FBI Uses Facebook to Locate Youth Who Threatened Uribe's Son. Colombian intelligence agency DAS requested the assistance of the FBI in using the social networking site Facebook to locate the perpetrator of threats made recently against the son of the Colombian president.
The FBI was able to determine the IP address of the computer from which the threats were made and thus locate the person responsible.
The investigation lead to the arrest of a youth, allegedly a college student, who will be brought before justice to face charges of incitement to commit crime.
[ColombiaReports/2December2009]
Lawsuit Seeks Information on How Government Uses Social-Networking Sites. A prominent hi-tech civil liberties organization filed suit in federal court to impel a half-dozen government agencies to disclose the policies and procedures that govern how they access, collect, and store information from social networking Web sites.
The 8-page lawsuit filed by the Electronic Frontier Foundation (EFF) "seeks the release of records requested from the Department of Defense, Department of Homeland Security, Department of Justice, Department of Treasury, Central Intelligence Agency, and Office of the Director of National Intelligence concerning the use of social-networking websites as investigative, surveillance, and data collection tools."
In early October, the EFF sent Freedom of Information Act (FOIA) requests to each government agency to release all records "about federal guidelines on the use of social-networking websites (including but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative ... or data gathering purposes created since January 2003."
The EFF's request was prompted by various media reports describing law enforcement using social networking Web sites to investigate crimes, surveil targets, and collect data. One article cited by the EFF describes the case of an anarchist social worker, Elliot Madison, who was arrested by the FBI for using Twitter to broadcast police movements to protesters during the G-20 summit in Pittsburgh in September.
According to EFF's request, the organization filed these FOIA requests "to help inform Congress and the public about the effect of such uses and purposes on citizens' privacy rights and associated legal protections."
So far no government agency has processed the EFF's FOIA request within the applicable statutory deadline of 20 days.
[Harwood/SecurityManagement/2December2009]
Terrorist Hacker Faces Six Years in Turkish Prison.
Ramazan �akil, a Diyarbakir computer hacker, has been sentenced to six years and eight months in prison for being in possession of classified information belonging to the military and Turkey's intelligence service.
After stopping �akil in a local neighborhood on suspicion of theft, police found the suspect to be in possession of CDs and DVDs detailing action plans of Turkish military units along with top-secret information belonging to the National Intelligence Organization, or MIT.
The court originally sentenced him to 12 years in prison for helping a terrorist organization, before reducing this sentence to eight years based on the Penitence Law.
Meanwhile, the court has decided to use the 924 CDs and 57 DVDs pertaining to military and intelligence matters as evidence.
In his initial testimony, the 19-year-old �akil said he first joined a hacker group calling itself "Sniper Team" in Diyarbakir four years ago. He said the group's main activities included sending viruses and hacking Web sites that contained adult porn material.
[HurriyetDailyNews/2December2009]
NSA/CSS Inducts Four Pioneers into the National Cryptologic Museum's Hall of Honor. Four pioneers of American cryptology were inducted into the NSA/CSS Hall of Honor at the National Cryptologic Museum. In his keynote remarks during the induction ceremony, John C. Inglis, Deputy Director, National Security Agency, highlighted the distinguished achievements of each of the inductees:
* Mr. Richard A. Day, Jr.: a pioneer and architect whose foresight led to CRITICOM, Time Division Mutliplex, and the use of fiber optic technology, making NSA the first government organization to engineer and implement fiber-optic communications worldwide
* Ms. Minnie M. Kenny: introduced new education and career enhancing programs for all NSA employees by expanding partnerships with institutions of higher learning, military academies, and foreign language training schools
* Maj Gen Doyle E. Larson, USAF: significantly increased the Air Force's role in Command, Control, and Communications Countermeasures; he served as the first commander of the Electronic Security Command, established the Joint Electronic Warfare Center, and saved countless American lives by helping to devise the TEABALL system
* Mr. Arthur J. Levenson: known for his ground-breaking accomplishments in cryptanalysis, introducing professional computer management structure professionals from the private workforce, and bringing NSA into the modern machine era.
The Hall of Honor, created in 1999, pays tribute to the pioneers and heroes who have made significant and enduring contributions to American cryptology. For more information on the NSA/CSS Hall of Honor or the National Cryptologic Museum, visit the NSA Homepage at www.nsa.gov.
The National Cryptologic Museum is located at the intersection of Maryland Route 32 and the Baltimore-Washington Parkway (I-295), adjacent to the headquarters of the National Security Agency. Hours of operation are 9:00 a.m. to 4:00 p.m. Monday through Friday (except Federal holidays), and 10:00 a.m. to 2:00 p.m. on the 1st and 3rd Saturdays of each month. Admission is free. [Isiria/3December2009]
Saakashvili Accuses Russian Researchers of Espionage. Georgian President Mikheil Saakashvili has stated that two Russian academics banned from entering Georgia were spies who support the Russian occupation of Georgian territory.
Russian State Archive Director Sergei Mironenko and senior researcher at the Center of Caucasus Studies at the Moscow State Institute of Foreign Affairs Nikolai Silayev were denied entry into Georgia upon arriving at Tbilisi International Airport.
The two researchers, together with four others, had planned to attend a conference on Georgian-Russian relations from December 1 - 3.
The four other researchers in the delegation left in protest at the decision, and all six returned together to Moscow.
A spokesperson for the President asserted that the two researchers work for the Russian security services. She added that Georgia "is open for Russian tourists, businessmen, people of the arts, sportsmen or ordinary citizens."
According to the Moscow Times, the Georgian Institute of Russian Studies invited the Russian delegation, and the researchers had been warned that they might encounter some problems entering the country.
Both banned researchers, however, expressed shock at the decision, and Silayev said that he had recently been able to visit Georgia.
Relations between Russia and Georgia broke down in August 2008 during a military conflict between the two countries over the breakaway republic of South Ossetia. Russia has since recognized the independence of South Ossetia and Abkhazia, another breakaway republic. Russia and Georgia both blame each other for instigating the war.
[TheOtherRussia/3December2009]
Brussels Gives CIA the Power to Search UK Bank
Records. The CIA is to be given broad access to the bank records of millions of Britons under a European Union plan to fight terrorism.
The Brussels agreement, which will come into force in two months' time, requires the 27 EU member states to grant requests for banking information made by the United States under its terrorist finance tracking program.
In a little noticed information note released last week, the EU said it had agreed that Europeans would be compelled to release the information to the CIA "as a matter of urgency". The records will be kept in a US database for five years before being deleted.
Critics say the system is "lopsided" because there is no reciprocal arrangement under which the UK authorities can easily access the bank accounts of US citizens in America.
They also say the plan to sift through cross-border and domestic EU bank accounts gives US intelligence more scope to consult our bank accounts than is granted to law enforcement agencies in the UK or the rest of Europe.
In Britain and most of Europe a judge must authorize a specific search after receiving a sworn statement from a police officer.
This weekend civil liberties groups and privacy campaigners said the surveillance program, introduced as an emergency measure in 2001, was being imposed on Britain without a proper debate.
Shami Chakrabarti, director of Liberty, said: "The massive scope for transferring personal information from Europe to the United States is extremely worrying, especially in the absence of public debate or parliamentary scrutiny either at EU or domestic level.
"No one is saying that allies should not co-operate, but where is the privacy protection? Where are the judicial safeguards in such a sweeping scheme?
"This looks like yet another example of lopsided post-9/11 compromise and of the ease with which temporary emergency measures are foisted on us permanently."
US counter-terrorism officials say the data-mining program aims to trace the transactions of people suspected of having ties to Al-Qaeda.
They say it helped to thwart a plot by an Islamist terror cell in Britain to blow up seven aircraft flying from London to the United States in 2006.
The terrorist finance tracking program mines thousands of transactions by sifting through records from the nerve centre of the global banking industry, a Belgian co-operative known as Swift. This routes about �3 billion between banks and other financial institutions each day.
According to the EU information note, the United States can request "general data sets" under the scheme based on broad categories including "relevant message types, geography and perceived terrorism threats".
The scheme is run out of the CIA's headquarters in Langley, Virginia. The covert spying operation remained secret until 2006.
[TimesOnline/6December2009]
Section II - CONTEXT & PRECEDENCE
CIA Cookbook Dishes Up Spy Tales. And now, just in time for the holidays, here's something for that special someone who has everything: It's the CIA's latest cookbook, "More Spies, Black Ties & Mango Pies." This is the sequel to the spy agency's out-of-print 1997 cookbook. The bureaucracy moves slowly, it seems, or maybe good cooking just takes time.
The more than 200 recipes - with names like Post-Soviet Thai Crab Cakes With Jam Sauce - mostly come from agents and family members whose names aren't given and whose places of assignment remain murky. This means there's no one to complain to if you carefully followed the directions but the dish was inedible. (Same as with any black ops gambit.)
For example, there's a recipe for Om Ali (Mother of Ali) Pudding, which is described as a "dessert... similar to a sweet bread putting." The unnamed contributor assures us "the recipe is from the wife of a Middle Eastern diplomat, given in a shared third language."
Even so, entertaining yarns about coping in exotic and less-developed countries - including scrounging for potatoes while being tailed or what to do after the flamb� sets a top guest's napkin on fire - precede many of the recipes.
The stories, mostly from wives of the spies, often evoke a bygone era and mindset. "Living in Southeast Asia in the mid 1960's, my husband once had to leave home very early, before the cook had arrived for the day," one CIA spouse wrote. "He wished to eat before he departed," but "the kitchen was outside and locked."
"The garden boy had a key," she reported, "so he was called upon to prepare breakfast. He said he knew how to make soft-boiled eggs. Time passed. My husband grew impatient. I went out to investigate and found a huge pot of bubbling, boiling water filled with eggs and the egg timer!" The Chinese Five Spice Chicken recipe that follows looks pretty good, however. And there's the Top Secret Hot Dip.
Another operative talks about eating aloco (plantains) and shish kebab at an outdoor shack/restaurant run by "Mamma" in West Africa. "The following recipe captures some of the flavors of that meal," he or she writes, "although I have substituted beef for rat... (Mamma served just the Aloco and rat with our beer.)"
The Calamari Risotto, looks especially tempting and comes with precise details on how to clean the squid along with a note that "the smallest, youngest squid taste best, as old, larger ones can be very tough and chewy. In this case, bigger is definitely not better!"
In addition to the recipes, there are useful tips for high-altitude cooking, "using meat of uncertain origin," metric conversions and such.
The book's greatest shortcoming is that there's no section - or even a page or two - of favorite drink recipes. Given the CIA's legendary mastery of this important part of spook life abroad, that should have been included. (Unless the concoctions are classified.)
The hardcover book, available perhaps at some bookstores but for sure at http://www.morespies.com for $29.95, was compiled by the agency's Family Advisory Board - agency spouses who promote attention to employee families' needs. All royalties benefit the board's education scholarship committee.
The 1997 book sold out at 60,000 copies. First printing on the new one was 10,000, and we're told that another 10,000 are in the works. Amazon doesn't appear to be selling the book, though it has one used copy listed for $12.95. Wonder what they'll with pair this in the "customers who bought this item also bought" section. The CIA World Factbook?
[Kamen/WashingtonPost/25November2009]
Aiding North Korea Defectors: A High Stakes Spy Mission. As he cased the security at the foreign embassies in Hanoi, the 78-year-old retiree was seized with sudden self-doubt. He was certainly no John le Carre. Who was he to play spy?
But this wasn't a game. Waiting in nearby safe houses were nine North Korean defectors whom Kim Sang-hun had helped spirit into Vietnam from China - among them a young doctor and his wife, a mother and daughter, and a woman who'd been sold as a sex slave in Beijing.
"I thought, 'What am I doing here? I'm not a spy. Espionage takes resources and support,' "recalled the activist, who has devoted his retirement to helping refugees escape the repressive Stalinist regime. " 'I have no training. Is the mere will to succeed enough?' "
Days earlier, Kim had received devastating news. Five other defectors, including a woman and her 6-year-old son, had been captured at the Chinese border en route to joining the other nine in Hanoi.
"They were almost there, and now they were gone, being sent back to North Korea to prison and perhaps death," he said. "I remember saying to someone, 'I wish I was dead.' "
He thought about the defectors under his care: For months, they had lived under the constant threat of being caught by Chinese officials and returned to North Korea. Now in Hanoi, the activists' goal was to find the right embassy - one away from a busy street and out of the steely gaze of Vietnamese secret police - and then shepherd the defectors inside.
Once within the embassy compound, the refugees could request sanctuary, taking another step toward freedom in South Korea.
The plan was all set. Then Kim and other activists learned about the capture of the five. The three activists - Kim, another South Korean and an American missionary - gathered to discuss their options. Should they press forward with the nine remaining defectors, or was the embassy gambit now too risky?
"We were all so tormented," Kim recalled. "At the same time we had to be reasonable. We had nine lives under our custody, people for whom we had assumed total responsibility."
The activists finally posed their dilemma to the defectors themselves. "We told them, 'This is our plan,' " Kim said. " 'Do you want to go forward? It's all up to you.' "
The gripping details of the September operation offer a rare peek inside the covert workings of the "underground railroad," a network of safe houses and secret border crossings that assists in the escape of North Korean refugees.
The activists spoke out to bring attention to the plight of the detained defectors. They have received conflicting reports as to whether the five were still being held in China or had been sent back to North Korea, where they could face severe punishment as an example to other would-be runaways.
At a news conference Nov. 18 near the U.S. Embassy in Seoul, they read an open letter to President Obama, who was visiting on a diplomatic swing through Asia. Protesters wanted Obama to challenge the Chinese policy of "forced repatriation" of North Korean refugees, which they say violates China's obligations under the 1951 United Nations convention on the protection of refugees.
Most defectors from North Korea steal into China across the porous border between the two nations. But their journey to freedom is far from over. In China, the women risk being sold into sex rings. Chinese secret police are always set to pounce, prepared to usher the unlucky back to North Korea. So many lie low and wait. They live in safe houses, often working illegally.
They scrape by, waiting for a chance to leave China, knowing the tap on the shoulder from Chinese authorities could come at any time.
"They're afraid of being stopped by some official, asked a question in Chinese they cannot answer," said Tim Peters, the American missionary who took part in the September operation.
"The collar could come on trains, on the street, en route between safe houses. Many North Koreans are physically shorter than Chinese. And the police can smell fear," said Peters, founder of Helping Hands Korea.
No one knows for sure how many people try to escape from North Korea each year, or how many are caught in the attempt. But they do know this: The number of escape attempts is tied to a roulette wheel of economic and political factors, including widespread famine and brutal government crackdowns.
Officials in South Korea estimate that nearly 20,000 North Koreans have relocated here since the 1950s, most within the last decade.
Documents obtained from Chinese border police three years ago suggest that officials in one province alone deported 100 people per month back to North Korea, activists say.
"But nobody knows if that is still the case," said Joanna Hosaniak, a senior program officer with the Citizens Alliance for North Korean Human Rights.
North Korea recently launched a crackdown, expanding the notorious Chongori concentration camp - known for its brutal conditions and high death rates - to handle defectors, the Seoul-based newspaper Chosun Ilbo reported.
Meanwhile, activists try to expand escape routes for refugees.
"It's strategically important to find new pathways," Peters said. "Not just new routes across borders, but safe houses and countries where they can be moved along the way."
Vietnam, activists charge, has recently turned a deaf ear to the plight of defectors. After South Korea's 2004 airlift of 468 refugees from its embassy in Hanoi, embarrassed Vietnamese officials have tried to mend relations with North Korea, activists allege.
The South Korean Embassy in Hanoi has also quietly refused to accept defectors since the incident, Kim says. South Korean officials declined to comment. A Vietnamese Embassy spokesman in Seoul denied that his country rejected defectors.
Activists sought a well-publicized defector case to highlight what they termed the political recalcitrance of both nations.
For months, they scoured China for the right defectors. Finally, they identified 14 refugees willing to take the risk.
In Hanoi, things went wrong at the start.
The activists had chosen the Danish Embassy, a building without high fences or gates and a security guard who often became distracted while assisting visitors.
They ruled out simply storming the door, a tactic Kim has used before, deciding to sneak the defectors inside disguised as tourists.
Moments after Peters entered the lobby as a lookout, activist Peter Chung, director of the group Justice for North Korea, posed as a guide and quickly ushered the group inside.
According to the plan, Chung would then leave the embassy. To linger would risk being detained by Vietnamese officials on possible charges of human trafficking and assisting illegal immigrants.
The physician in the group was chosen to approach embassy employees behind a glass security window and present a letter expressing the group's plea for asylum.
"We are now at the point of such desperation and live in such fear of persecution within North Korea that we have come to the decision to risk our lives for freedom rather than passively await our doom," the note read in English. "The only power we have left is to appeal to you on our knees and with tears."
But suddenly, the doctor lost his nerve. Chung had to act.
He called South Korean Embassy officials, who promised to assist, as long as the activists did not make the incident public. Then he approached Danish officials, who he said at first refused to aid the group. Chung persisted. "These are refugees," he said. "They have a right to be protected."
Hours later, with the South Koreans a no-show, the Danish relented, demanding that Chung hand over his passport information as part of the negotiations. The Danish ambassador in Hanoi was not available to comment on the episode.
Chung then left for the airport, where he was detained by Vietnamese police and held for two weeks. No charges were filed.
After nearly a month of living in tents on the Danish Embassy grounds, the nine defectors are in South Korea. But activists still worry about the fate of the captured five.
For Kim, the episode demonstrates the roller-coaster highs and lows of his work: "You lose so much the very moment you thought you were going to achieve something great."
[Glionna/LATimes/25November2009]
Sex, Spies, and AudioTape: What to Watch Out for on Your Official Trip to China. Ian Clement said he should have known better when he travelled to the Beijing Olympics in 2008 as London's deputy mayor. He had been briefed by Britain's intelligence service, but he didn't listen.
"They told me about honeytraps and warned me that the Chinese secret service often use women to entice men to bed to get information. I didn't think for one minute that I would fall for it," Clement admitted to the Mirror newspaper last week.
Clement said the attractive Chinese woman he met at a party likely drugged his drink. After he'd passed out, she went through his room, collecting information about London's operations and business dealings.
Indeed, Mr. Clement should have known better. Just a few weeks before his Olympic trip, the story of another U.K. government staffer caught with his pants down in China was splashed over the British media. That man, an aide to the British Prime Minister, also fell victim to a "honeytrap." He woke from a night with a Chinese woman to find his blackberry stolen, a theft that security experts said jeopardized U.K. Parliamentary email servers.
Stephen Harper didn't attend the 2008 Summer Olympics, the largest-ever collection of world leaders at a sporting event. But as he arrives in Beijing this week for his first visit as Prime Minister, former Chinese officials and Canadian security experts say he and his entourage should be on their guard.
"Foreign officials should always be careful when they visit China. The authorities may influence them in a certain way and they may also ensnare them in a trap. They should always be careful," says former Chinese diplomat Chen Yonglin.
Before defecting in Australia, Chen was the consul for political affairs in the Chinese consulate in Sydney. His main responsibility was to monitor Chinese political dissidents in Australia.
Sex and money are often used as bait, he says. The honeytrap is a favorite tactic Chinese intelligence uses to try to catch an official in a sex scandal. In this scenario, the official or staffer is approached by a beautiful Chinese vixen who proceeds to seduce him. She may ransack his hotel room, search through his laptop or cell phone, or use video of the indiscretion as blackmail.
Chen says while he was in office one Australian official on a visit to China was detained by the authorities after he was caught having sex with a girl who was not yet 16 years old. They released the man, keeping evidence of his affair, after he "offered to work for the regime, similar to an agent," Chen says.
Another former Chinese official specifically warned Canadian officials visiting China in an interview he gave to the Canadian Press in 2005. Guangsheng Han made headlines that year when he tried to defect to Canada. In Shenyang, a city of nearly 8 million, Han spent 14 years as head of the Public Security Bureau and another five years with the Judicial Bureau.
This week he told the Epoch Times that the Chinese regime is zealous about gathering intelligence and Chinese hotels - including hotels owned by foreign companies - are staffed with national security agents. Unwary officials can expect that their luggage will be secretly searched and any documents copied.
Like the Brits, Canadian intelligence is aware of the risk and warns Canadian officials visiting China, but those warnings are often ignored, says former CSIS agent Michel Juneau-Katsuya, who used to head up the agency's Asia-Pacific desk.
"Definitely CSIS (Canadian Security Intelligence Service) will give them a briefing, but we are not really sure they pay attention to CSIS. They are often extremely naive and believe that CSIS [agents] have seen too many James Bond movies."
Juneau-Katsuya says Chinese intelligence will likely be more careful when dealing with a high-level official like Harper because of the extra security and media attention, but will "deploy their entire arsenal of surveillance and electronic monitoring" for middle or lower-ranking officials and their staff.
"I am quite sure that anybody and everybody who will be there will have what we call the 'fully equipped room,'" he says.
"You can be sure that every single conversation, they will try to monitor it. They will have every single person on this delegation with people assigned to follow them, to make sure they don't meet with the wrong people or whoever, and who knows, perhaps collect some dirt along the way."
But besides looking for useful information, Chinese intelligence agents are also looking for sympathetic politicians and well-placed staff who can be either coerced, bribed, or simply charmed into helping the Chinese regime achieve its foreign policy objectives.
If they do identify a likely target, Juneau-Katsuya said that Chinese diplomats will then approach them in Canada later to court them.
"They will definitely try to develop what is referred to as soft power."
Canada is a prime target for Chinese intelligence, he says, because it is relatively unprotected and has the natural resources China depends on. Potential targets tend to be susceptible to China's "charm offensive" as well, making it easy to win over supporters that can be groomed over time to act either knowingly or unknowingly on Beijing's behalf.
"Canada, from a political point of view, has always been extremely important and useful to China," he says, adding that friendly gestures from Canada toward the regime have helped the Communist Party maintain its legitimacy at home and on the world stage.
The aim of all the intelligence-gathering is to gain influence, he said. The Chinese have long known "that control is not the ultimate power. Influence is much greater - it demands less energy and allows you to do much, much more."
David Harris, a terrorism expert and former chief of strategic planning for CSIS who is now director of the international and terrorist intelligence program at Insignis Strategic Research in Ottawa, says the Chinese regime's favorite and most effective way to collect intelligence is through flattery, said Harris, and establishing what might appear to be a genuine and sincere lasting friendship. Chinese intelligence agents are masters of psychology and manipulation techniques. Their files on prime targets can go back decades and they look for vulnerabilities that can be exploited.
The warm reception many visiting Western officials receive in China counters the image of a repressive, communist regime.
"When I go to China, they treat me like an emperor," former Vancouver mayor Sam Sullivan famously told a reporter. Sullivan, an unabashed friend of the Chinese regime, attracted much attention when he waged a court battle to dismantle a protest site held by Falun Gong meditators in front of the Vancouver Chinese consulate.
"The vulnerabilities can range from issues of money, debt, greed, sexual habits and orientations - anything that would permit openings. So if someone has a taste for business, then of course business propositions can come their way."
The payoffs can be monumental, he says. For example, a private briefing to the Prime Minister might reveal Canada's fallback position in important trade negotiations. With that knowledge, the Chinese can push their advantage to the maximum at a potential cost of billions to Canada.
Besides winning economic advantage, the regime hopes to sway or significantly influence Canadian foreign policy as it relates to China. Some of the bureaucrats and others who fall under Chinese influence become unconscious agents of the regime, he says. Others may act knowingly.
"People think bureaucracy is regulated and regimented, reliable, but if you can gain influence over a director general who travels in the delegation, then policy options can be narrowed in favour of China very early on in the policy development and decision-making stage of government."
That scenario is most dangerous, he says, because someone high in government or the bureaucracy coming under strong Chinese influence compromises the decision making process of Canada from within.
Harris says he's heard of cases where policy decisions become widely known among the ranks of those close to China before they are even finalized in Canada. When pressed for more details, he said he was not prepared say more due to security concerns. "I can't go beyond that but it is not surprising, of course."
In the end, the only lasting solution according to Harris and Juneau-Katsuya is that Canadian officials and their staff are well aware of the risks and keep Canada's own interests firmly in mind.
"It is extremely disturbing to see some former senior politicians, diplomats, and others who have made cosy perches for themselves in China - at who knows what cost to Canadian interests," says Harris.
We should also keep delegations as small as possible to limit vulnerabilities, he says. And beware the so-called 'friend of China' tactic.
"One periodically sees stunningly naive Canadians, including very high-ranking Canadian officials and former officials, who are vastly flattered that a Chinese official and other well-placed Chinese persons will declare the Canadian a 'friend of China.'
"If that kind of thing happens, people need not feel flattered - they can properly feel used and manipulated.... You have one country to which you owe loyalty in law and policy, and you better decide which one that is."
[EpochTimes/2December2009]
The Spy Who Saved Me. Small acts of bravery can save a
life, as these unsung heroes of the Holocaust show.
After being captured by Nazi soldiers during WWII, Denis Avey, a British soldier, was placed in a POW camp adjoining Auschwitz, arguably the most infamous German concentration camp. While there, he twice swapped places with a Jewish inmate overnight, a fact that he only recently revealed. According to the BBC, "[H]e wanted to witness what was going on inside and find out the truth about the gas chambers, so he could tell others."
Perhaps more important than the intelligence Avey brought to the world outside Auschwitz were the goods he delivered inside. During one visit, Avey befriended Ernst Lobethall, an Auschitz inmate. Writing a letter in code to his own mother, Avey managed to smuggle a package from Lobethall's sister, who had escaped to England before the war started. Through Avey, Susana Lobethall sent her brother 10 packs of cigarettes, a bar of chocolate and a letter.
In a video, Lobethall recounted the good deed: "Ten packs of cigarettes. It's like being given the Rockefeller Center." Lobethall traded the cigarettes for other items and favors. Two packs of English Player cigarettes bought him new heavy soles for his boots, which "later came to save my life on the death marches," he explained.
Another WWII hero was Vera Laska, who became part of the Czechoslovakian Resistance, and, like Avey, did not at first recognize the significance of her actions.
Laska had a friend who was asked by resistance members to take two French men across the border and through the mountains of Czechoslovakia in secret. But because the friend did not want to go alone, she invited Laska. "I said, 'Sure why not'. But it wasn't like 'This is the Resistance! I am here!'" she said in a mock serious, low voice. After the crossing was successful, they were asked to do it again. And Laska again said she would help. "Then we realized, 'Hey, we are the Resistance.' And then we stayed."
Witold Pilecki, like Avey, willingly entered Auschwitz by posing as a prisoner. In Auschwitz, he formed a clandestine resistance network, and leaked intelligence reports for two years, including one confirming the existence of the gas chambers. He and other resistance factions were planning a revolt, when key resistance leaders were arrested, and Pilecki decided to escape.
Pilecki later helped lead the failed Warsaw uprising of 1944. He was arrested by the Germans and lived in a POW camp until it was liberated in 1945. Two years later, Pilecki, strongly anti-communist and loyal to the pre-war Polish government, was executed by the Soviet-backed government in 1948, on charges of espionage and other crimes against the new government.
Women also proved talented spies. Virginia Hall, an American Europhile, born to a Baltimore aristocrat, pursued a career as a diplomat, and later a journalist, before joining up with the SOE (Special Operations Executive), an espionage agency created under Winston Churchill. In spite of losing one leg in a hunting accident in Turkey in 1933, Hall became a gifted spy and "the lynchpin of her section's activities in southern France," according to the CIA Web site.
Codenamed, the "Heckler," she financially and emotionally supported other agents, helped pilots whose planes had crashed to avoid capture, and cut electrical wires that enabled German communication.
She was the first woman ever to be given the Distinguished Service Cross, the second-highest U.S. military award for bravery.
Pearl Cornioley, n�e Witherington, a French secretary living in England was also hired as an agent for the SOE, after insisting on a greater role for herself than "pencil-pushing" for the WAAF (Women's Auxiliary Air Force), according to the Daily Telegraph.
In training, she learned sabotage and combat techniques; she was considered "the best shot, male or female, the service had seen," according to the New York Times. At 29, Witherington parachuted into Nazi-occupied France. At first she delivered coded messages; however, when her superior was arrested, she assumed his role leading 1,500 members of the French Resistance - a number that soon doubled. Her troops blocked supply routes and cut off railway lines, preventing Nazis moving north from the south of France.
Many believe Witherington's romance with her eventual husband Henri Cornioley, also a member of the Resistance, inspired the novel, "Charlotte Gray" by Sebastian Faulks, reported the Times. But Cornioley told the Telegraph in a 2002 interview, "There was a job to be done." She did not go to France to pursue romance.
After the war, she scoffed at the offer of a civilian military cross, saying, "There was nothing civil about what I did," reported the Telegraph. She received the Commander of the British Empire, (CBE) an award she'd been denied decades earlier, from the Queen in 2004. [Firth/FindingDulcinea/7December2009]
Section III - OBITUARIES, BOOKS, RESEARCH REQUESTS AND COMING EVENTS
Seeking Recollections of Dr. Ross Jung and Dr. Alan Cameron, formerly with OSS and CIA. I am writing a scholarly history of the OSS and CIA Office of Medical Services during the COld War. I am looking for anyone with recollections of the late Dr. Ross Jung or Dr. Alan S. Cameron. Dr. Jung served initially as the Strategic Services Unit (SSU) China Theater Surgeon in Shanghai in early 1946 and then stayed on as a regional medical officer with the Agency in the Far East until 1959. Dr. Cameron served as a regional medical officer in the Far East (Thailand and Laos) from 1958 until the mid 1960s and then as a staff psychiatrist in the CIA Center for the Analysis of Personality and Political Behavior (CAPPB). While serving in Thailand, he played a key role in overseeing the medical care of Thai Field Marshall Sarit Thanarat. I can be reached at jonathan_clemente@yahoo.com
Robert W. Magee. Born in Chicago, Illinois on Aug. 12, 1931. Departed on Nov. 25, 2009 and resided in Rockville, MD. Beloved husband of 53 years of Catherine H. Magee; loving father of Kevin Magee of Herndon, VA, Shayne Magee of Cary, NC, Capt. Clifford Magee (USMC) currently serving in HI, Pamela Tadken of Rockville, MD, Kimberly Magee on assignment overseas and the late Matthew Magee; brother of Richard Magee of White Pigeon, MI; grandfather of 12. He was the son of the late Helen B. Woehler and the late Alexander Charles Magee.
After graduating from Oak Park Illinois High School in 1949, Mr. Magee earned a track and field scholarship to Stanford University, where he majored in Science and Economics. Since earning his Stanford degree, he devoted his entire life to government service, having served in several Southeast Asian posts with the U.S. Department of State. His interest in China transferred to the Central intelligence Agency in 1978. He was awarded the Agency's highest honor, the Distinguished Intelligence Medal on two separate occasions, recognizing a series of increasingly challenging management positions.
Upon retiring from the CIA, Mr. Magee, along with several other retirees, founded the "Ride With Me" audiotape program, available in most libraries. His flair for storytelling and his thirst for continuous learning launched this unique program where people learn historical facts and entertaining trivia while traveling the nation's Interstate system.
After the attacks on September 11, 2001, the Central Intelligence Agency started a program to hire and train additional officers capable of filling the nation's demand for better protection. Mr. Magee returned to contract service with the CIA and worked to help train these new officers, passing along his knowledge, focus and professionalism to another generation of officers.
Robert Magee leaves behind a legacy of service to his nation. As Director of Personnel, he implemented new and innovative programs for which he received the Distinguished Service Medal. All who had the privilege of his tutorial appreciated his constant intellectual pursuits and generosity of imparted advice. Dispending support and loving criticism in the proper proportions was a talent appreciated by those who had the privilege of his advice, particularly his students, children and grandchildren.
[PumphreyFunderalHome/5December2009]
--------------------------------
Vince Daly. Vincent Stephen Daly, 68, died at his home in Winding River Plantation in Bolivia, NC on 28 October 2009.
Born on 14 August 1941 in Washington, DC, to the late James Daly and Virginia Woodhouse Daly, Vince is survived by his wife, Rhonda, two brothers Robert and Thomas, two sons Gregory and Brian, and three grandchildren.
Vince served in the U.S. Army, 101st Airborne, from 1960 to 1963 where he was assigned to Germany as a paratrooper. He is a graduate of the University of Maryland.
His career with the Central Intelligence Agency (CIA) as an operations officer with the Directorate of Operations spanned over 29 years (1963-1993) and took him to four continents and over two dozen countries.
He moved from Great Falls, VA to Bolivia, NC in 2005. A public visitation service was held at Peacock-Newman and White Funeral Home in Southport on Monday, 2 November, from 3 - 5 PM. The funeral and inurnment will be held at Arlington National Cemetery on 28 December at 10:45 am.
In lieu of flowers, the family request that memorials be made to the American Heart Association , 7272 Greenville Avenue, Dallas, TX 75231 or to the Sunset Harbor / Zion Hill Volunteer Fire Department, 2706 Sunset Harbor Rd, Bolivia NC 28422.
You may send online condolences to www.peacocknewnamwhite.com.
[WilmingtonStarNews/31October2009]
--------------------------------
Charles B. Hall. Charles Bruce Hall, 74, of Selbyville died peacefully Friday, Nov. 27, 2009.
Born on Oct. 7, 1935, in Whaleyville, he was a son of the late Charles Davis and Edna Banks Hall.
His survivors are his wife of 49 years, Sonya Whiteford Hall; a brother, Ronald C. Hall and wife, Dorothy, of Venice, Fla., and Snow Hill; three brothers-in-law, Theron O. Whiteford of Street, Md., Farrell D. Whiteford of Delta, Pa., and Gregory Scott Whiteford of Whiteford, Md.; a sister-in-law, Martha W. Reed of Carlsbad, N.M.; and five nephews and six nieces.
Mr. Hall was a 1953 graduate of the former Buckingham High School in Berlin. He earned an Associate of Arts degree from Goldey-Beacom School of Business in Wilmington and a Bachelor of Science degree from the University of Nebraska at Omaha.
He joined the U.S. Army from 1953-56 and was a veteran of the Korean conflict. In 1962, he joined the U.S. Air Force, retiring from military service in 1979. He then worked for the Defense Intelligence Agency in Washington as a systems analyst, retiring from federal service in 1995.
He was a recipient of the Air Force Commendation Medal and the DIA Defense Meritorious Medal.
Mr. Hall enjoyed troubleshooting technical equipment problems and was an avid reader and motorcycle enthusiast.
Following cremation, services will be private.
Arrangements were handled by Harkins Funeral Home in Delta, Pa. [DelmarvaNow/6December2009]
Targeted Killing: Self-Defense, Preemption, and the War on Terrorism, by Thomas B. Hunter, reviewed by B. Brackett. Except for the use of torture in interrogating terrorist prisoners, no other topic in the field of counterterrorism generates as much heated controversy and debate as "targeted killing." In this small but comprehensive book Thomas Hunter provides counterterrorism scholars, analysts, and experts with a much needed primer that defines, explains and discusses the practice of targeted killing.
Hunter begins by distinguishing the difference between assassination, which he defines as the premeditated killing of a prominent person for political or ideological reasons, and targeted killing, which he asserts is a valid method of state self-defence in the war on terrorism. Despite a number of serious legal and moral issues raised by opponents of targeted killing, Hunter makes a well reasoned, clearly articulated and altogether persuasive case for using it as a defensive tactic against terrorist threats. Backed by exhaustive research, he explores the legal and moral issues involved, the position of the United Nations on a state's right to self-defense and preemption, and includes a sensible discussion of how targeted killing may be used to prevent the spread of weapons of mass destruction.
Hunter also reviews several case studies of targeted killing by the US, Israel, and Great Britain. In addition he provides a most useful appendix of selected international instances of targeted killing between 1973 and 2004. Soon after taking office, President Barack Obama quickly made clear that his administration intended to continue the policy of targeted killing, primarily through the use of unmanned armed drone aircraft, against radical muslim terrorists in Iraq, Afghanistan, and the border areas of Pakistan. This policy is unlikely to change in the foreseeable future thus making Thomas Hunter's seminal book a required tool for understanding the growing complexity of the struggle against terrorism. [Brackett/Amazon.com/30November2009]
EVENTS IN COMING TWO MONTHS....
Tuesday,
08 December 2009, 1130 hrs - Tampa, FL - The AFIO Suncoast Chapter will
hold its Holiday Season meeting and luncheon at the MacDill AFB
Officer’s Club. Check-in registration will
commence at 1130 hours, opening ceremonies and lunch at noon, followed
by guest speaker with a most interesting and timely presentation. The
lunch entr�e is Holiday fare, Turkey, dressing, cranberry and veggies,
accompanied with salad, hot rolls, and finished with pumpkin pie topped
with whipped cream. -- again, all for $15.00, inclusive. We will have
the wine and soda bar open at 1100 for those that wish to come early
for our social time. As a result of our ongoing close relations with
various major commands in the Central and South Florida areas, we have
been able to secure a commitment from SOCOM (J2) to provide a guest
speaker on current state of intelligence within SOCOM. We recommend you
not miss this luncheon and presentation. Reply ASAP to Gary Gorsline at garyg@x-link.info or Bill Brown at billbrown1@tampabay.rr.com with your name and any guests accompanying you. Your check payable to
'Suncoast Chapter, AFIO' (or cash) should be presented at time of
check-in for the luncheon. Should you not have 'bumper stickers' or ID
card for access to MacDill AFB, please so state in your response. If we
don't have your license number at hand in our member/guest roster we'll
be in quick contact with you to gather needed data. And don't forget,
all of you needing special roster access should proceed to the Bayshore
Gate entrance to MacDill AFB (need directions, let us know). We look
forward to your response -- hopefully also seeing you at the O'Club, on
08 December. If not, we'll have you on the list for our February
luncheon. Questions/Inquiries to:• Gary Gorsline, President v/ (813)
920-0771 or by email to garyg@x-link.info
Bill Brown, Treasurer, v/ 352 746-1010 or by e-mail to billbrown1@tampabay.rr.com
8 December 2009 - Hampton Roads, VA - The December meeting of AFIO's Norman Forde Hampton Roads VA chapter will occur in the evening on this date. Further details will follow. Inquiries to Melissa Saunders, President, AFIO Norman Forde Hampton Roads Chapter, mwsaunders@cox.net 757-897-6268
8 December 2009 - San Francisco, CA - The AFIO Jim Quesada Chapter hosts Thomas C.
Reed,
former Secretary of the Air Force and Special Assistant to the
President for National Security Policy. Reed will be discussing the
political history of nuclear weapons: where they came from, the
surprising ways in which the technology spread and the lessons learned
from that proliferation.
RSVP required. The meeting will be
held at United Irish Cultural Center, 2700 45th Avenue, San Francisco
(between Sloat and Wawona). 11:30 AM no host cocktails; noon -
luncheon. $25 member rate with advance reservation and payment; $35
non-member. E-mail RSVP to Mariko Kawaguchi (please indicate meat or
fish): afiosf@aol.com and mail check made out to "AFIO" to the delightful: Mariko Kawaguchi, P.O. Box 117578 Burlingame, CA 94011.
9 December 2009 - Albuquerque, NM - The December meeting will feature Jim Hoffsis' presentation on the UAVs featured during the AFIO National Symposium.
19 December 2009, 9:30am - noon - Seattle, WA - AFIO Pacific Northwest Chapter meeting on B-29 Bomber and WWII.
Guest Speaker: Mike Lavelle,
Director of Development, The Museum of Flight
Topic: History of the B-29 bomber and the B-17 and its effect of winning World War 2.
Where: The Museum of Flight, South View Lounge
Cost: $15.00
Make checks payable to AFIO and mail to:
Fran Dyer, 4603 NE University Village Suite 495, Seattle, WA 98105
Inquiries to Judd Sloan at judd@afiopnw.org
13 January 2010, 11:30 a.m. - Scottsdale, AZ – The AFIO Arizona Chapter hosts Victor Oppleman who will speak on "National Security Vulnerabilities to Cyber Attacks."
Victor Oppleman is an accomplished author, speaker, and patent-holder in the field of network security and a specialized consultant to some of the world’s best known companies. His open source software is used by thousands of engineers worldwide. He is coauthor of Extreme Exploits: Advanced Defenses Against Hardcore Hacks (McGraw Hill 2005) and author of The Secrets to Carrier Class Network Security (Auerbach, 2009). This event is being held at: McCormick Ranch Golf Club (7505 McCormick Parkway, Scottsdale AZ 85258 ~ Phone 480.948.0260) Our meeting fees will be as follows: • $20.00 for AFIO members• $22.00 for guests. For reservations or questions, please email Simone sl@4smartphone.net or simone@afioaz.org or call and leave a message on 602.570.6016. Contact Arthur Kerns, President of the AFIO AZ Chapter, president@afioaz.org
21 January 2010, 12 - 2 pm - The Los Angeles AFIO Chapter hosts business meeting.
Place: the LMU campus in room 302. The January business meeting will not host a speaker nor will lunch be provided, the focus of the meeting will be to tabulate the results of the chapter elections for the officers and focus on establishing chapter goals for the upcomming year 2010. The January meeting is open to chapter members only, no guests. Replies to Vincent Autiero afio_la@yahoo.com
24 February 2010, 9 am - 5 pm - Ft Lauderdale, FL - The FBI/INFRAGARD has invited AFIO Members to the FEBRUARY 24, 2010 Conference on Counterterrorism measures at Nova Southeastern University.
If you plan to attend, please RSVP to AFIO Miami Chapter President, Tom Spencer, at TRSMIAMI@aol.com. Provide your AFIO National member number, address, phone number. Your information will be provided to the FBI for assessment. Their decision of which members can attend is final. AFIO bears no responsibility for costs or arrangements made in anticipation of attending this Infragard/FBI event based on the decisions of their security personnel. If available, bring your government issued ID. Infragard is the public/private partnership of the FBI. You can get more information on Infragard at www.infragard.net.
Please respond to Tom Spencer no later than February 10, 2010 via email.
Location: NOVA Southeastern University , Knight Lecture Hall, Room # 1124
3301 College Ave, Ft. Lauderdale, Fl 33314
Abbreviated AGENDA
09:00 - 09:30 AM - Registration and coffee
09:30 - 10:00 AM Welcoming Remarks - Carlos "Freddy" Kasprzykowski, InfraGard South Florida Chapter President; Eric S. Ackerman, Ph.D., NSU Assistant Dean and Director of Graduate Programs; SA Nelson J. Barbosa, InfraGard Coordinator/FBI Miami
10:00 - 11:00 AM - Stephanie M. Viegas, Weapons of Mass Destruction (WMD) Coordinator, Miami FBI Field Division Will give an overview on how the FBI responds and coordinates WMD threats and related cases.
11:00 - 11:15 AM - Break
11:15 -11:30 AM - FBI employment needs - SA Kathleen J. Cymbaluk, Miami FBI Recruiter. This presentation will discuss current hiring needs of the FBI and
requirements on how to qualify and apply.
11:30 - 12:30 PM - Christopher L. Eddy, Supervisory Intelligence Analyst. The use of Intelligence Information in the FBI. This presentation will discuss how intelligence is collected, analyzed, and pushed to the right people at the right time and place and how vitally important it is to the security of our nation and its interests.
12:30 - 01:45 PM - LUNCH (Food court available on campus)
01:45 - 02:45 PM - Gun Running from Broward and Palm Beaches Counties
SSA Mark A. Hastbacka; This presentation will touch on IRA gun running operation in the above counties from a Counter terrorism investigation point-of-view.
02:15 - 03:15 PM - FBI Extraterritorial Responsibilities: Focus Iraq ASAC Scott A. Gilbert, FBI Miami. This presentation will focus on FBI activities in the International
Terrorism Organizations (ITO) and in the Middle East in general, with specific focus on IT and kidnapping investigations.
03:15 - 03:30 PM - BREAK
03:30 - 04:30 PM - Overview of Current Terrorism Trends: South Florida
SIA Vincent J. Rowe. This presentation will focus on terrorism trends in the South Florida
territory.
04:30 - 05:00 PM - Conclusion
26 January 2010 - Arlington, VA - The Defense Intelligence Forum meets at the Alpine
Restaurant, 4770 Lee Highway, Arlington, VA 22207. This event is open to members of all IC associations. The speaker will be John Moore, who will speak on the Middle East after One Year with President Obama. He will cover the peace process, Iraq, Iran, Yemen, and the on-going battle with Islamic terrorists. Mr. Moore was the Defense Intelligence Officer for the Middle East, South Asia, and Terrorism, DIA's senior expert for the region. He was twice awarded the Director of Central Intelligence Distinguished Service Medal. He has been a witness at the International Court of Justice in the Hague. To encourage candor at this forum, there may be no media, notes, recordings, or attribution. Pay at the door with a check for $29 per person payable to DIAA, Inc. Social hour starts at 1130, lunch at 1200. Make reservations by 15 January by email to diforum@verizon.net. Give names, telephone numbers, email addresses, and choices of chicken, veal, or salmon. Pay with a check. THE FORUM DOESN'T TAKE CASH.
15 - 17 February 2010 - Heidelberg, Germany - The United States European Command Director for Intelligence is using this convention outfit to arrange an Intelligence Summit.
The website for this event managers is https://www.ncsi.com/eucom09/index.shtml
For Additional Events two+ months or greater....view our online Calendar of Events
-----------------------------------------------------------------------
Disclaimers and Removal Instructions
Weekly Intelligence Notes (WINs) are commentaries on Intelligence and related national security matters, based on open media sources, selected, interpreted, edited and produced for non-profit educational uses by members and WIN subscribers.
REMOVAL INSTRUCTIONS: We do not wish to add clutter to inboxes. To discontinue receiving the WINs:
a) IF YOU ARE A MEMBER -- click here: UNSUBSCRIBE and supply your full name and email address where you receive the WINs. Click SEND, you will be removed from list. If this link doesn't open a blank email, create one on your own and send to afio@afio.com with the words: REMOVE FROM WINs as the subject, and provide your full name and email address where you are currently receiving them.
b) IF YOU ARE NOT A MEMBER, and you received this message, someone forwarded this newsletter to you [contrary to AFIO policies]. Forward to afio@afio.com the entire WIN or message you received and we will remove the sender from our membership and distribution lists. The problem will be solved for both of us.
CONTENTS of this WIN [HTML version recipients - Click title to jump to story or section, Click Article Title to return to Contents. This feature does not work for Plaintext Edition or for some AOL recipients]. If you wish to change to HTML format, let us know at afio@afio.com. The HTML feature also does not work for those who access their e-mail using web mail...however NON-HTML recipients may view the latest edition each week in HTML at this link: https://www.afio.com/pages/currentwin.htm
-----------------------------------------------------------------------
WINs are protected by copyright laws and intellectual property laws, and may not be reproduced or re-sent without specific permission from the Producer. Opinions expressed in the WINs are solely those of the editor(s) or author(s) listed with each article. AFIO Members Support the AFIO Mission - sponsor new members! CHECK THE AFIO WEBSITE at www.afio.com for back issues of the WINs, information about AFIO, conference agenda and registrations materials, and membership applications and much more!
(c) 2009, AFIO, 6723 Whittier Ave Suite 200, McLean, VA 22101. Voice: (703) 790-0320; Fax: (703) 991-1278; Email: afio@afio.com
Click here to return to top.