AUG OCT FEB
Previous capture 4 Next capture
2007 2008 2010
39 captures
26 May 08 - 22 Dec 16
sparklines
Close Help
INTELCON 2005
National Intelligence Conference and Exposition
"Widening the Intelligence Domain"
 
Conference Organizers
  • Conference Chairman: Dr. William A. Saxton
  • Program Director: John J. Loftus
  • Deputy Program Director: Dr. Robert Katz
Program Advisory Group
  • Robert Baer
  • Stewart A. Baker, Esq.
  • Yossef Bodansky
  • Brent Budowsky
  • Sheldon Drobny
  • Dr. Rachel Ehrenfeld
  • Jamie Gorelick
  • Sen. Slade Gorton
  • Dr. Michael Ledeen
  • Gen. Tom McInerney
  • Dr. Walid Phares
  • Dr. Daniel Pipes
  • Steve Pomerantz
  • Harold Rhode
  • Hon. Stanley Sporkin
  • Gen. Paul Vallely
Community Liaison Committee
  • John Batchelor, ABC National Radio
  • Jeff Bliss, Hoover Institution
  • Robert Christie, The Wall Street Journal
  • Craig Crawford, Congressional Quarterly
  • Dr. Monica Crowley, Council on Foreign Relations
  • Bill Day, Homeland Defense Radio.Com
  • Steve Fustero, Int'l Association for Counterterrorism & Security Professionals
  • Steven Gottlieb, Alpha Group for Intelligence Analysis Training
  • David Jimenez, U.S. Border Patrol, DHS
  • Robert Jordan, Homeland Defense Journal
  • David Major, Centre for Counterintelligence & Security Studies
  • Don McDowell, Intelligence Study Centre
  • Yehoshuah Mizrachi, Operation Shiloh
  • Adam Shaneson, Shaneson Consulting Group
  • Eric Shawn, FOX News Channel
  • Richard Valcourt, International Journal of Intelligence & Counterintelligence
  • Gen. James Williams, National Military Intelligence Association
 
Exposition produced, and Logistics provided, by Federal Business Council
Schedule and speakers subject to change. Certain information omitted at request of speakers, or for security considerations.
Day 1 - February 8, 2005 - Professional Enhancement Seminars
Time
PE1: Trends in Intelligence Technology PE2: Political, Policy and Legal Issues PE3: Role of Congress in Intelligence Oversight PE4: Reforming the Intelligence Community PE5: Finding and Keeping Intelligence Specialists PE6: View from Abroad PE7: Sharing Intelligence PE8: Getting the Public Involved
07:30
-
09:00
Registration
09:00
-
09:45
Search Software & Intelligence Software
(09:00-09:40)


Izhar Shay
Shawn Geddis
Interrogation Law and Torture
(09:00-11:30)


Leader: Hon. Stanley Sporkin
Bill Tierney
Bruce Fein
Jed Babbin
Session 1

Brent Budowsky
Session 1

Reuel Gerecht
Spies - intelligence agents and analysts
(09:00-11:30)


Moderator: David Jimenez
Deborah Maklowski
Robert Baer
Bill Cowan
Wayne Simmons
Britain
(09:00-10:35)


Sir John Chilcot
Dame Pauline Neville-Jones
Dr. Philip H.J. Davies
Sharing Intelligence Part 1
(09:00-11:30)


Charles Intriago
Lorenzo Vidino
Dr. Rachel Ehrenfeld
Maria Velez de Berliner
Sharing Threat Information At All Levels

Brig.Gen. Matthew Broderick USMC (Ret)
09:50
-
10:35
Trends in Biometrics: Future & Past
(09:45-10:45)


Charles Archer
Stephen Price-Francis
Session 2
(09:50-11:30)


Sen. Slade Gorton
Gen. Paul Vallely USA (Ret)
Dr. Michael Ledeen
Session 2

Jamie Gorelick
Role of the Media

Mediator: John Batchelor
Eric Shawn
Sheldon Drobny
Jeff Bliss
10:45
-
11:30
Technology Challenges, Intelligence and the 21st Century
(10:50-11:30)


Gen. Kenneth Minihan USAF (Ret)
Reforming Intelligence: Using Medicine as a Model

Stephen Marrin
Asia

Dr. I-chung Lai
Gordon Cucullu
Stop Pandering To the American People

Joe Trento
12:00
-
13:45
Luncheon: The Long War of the 21st Century - Hon. R. James Woolsey
14:00
-
14:45
UAV vs. Satellite
(14:00-15:15)


Moderator: Gen. Tom McInerney USAF (Ret)
Greg Halpern
David Anhalt
Amending The Patriot Act
(14:00-16:45)


Brent Budowsky
Jeffrey Breinholt
Michael Shrimpton
Session 3

Craig Crawford

Session 3
(14:00-16:45)


Moderator: Harold Rhode
Frank Gaffney
Michael Scheuer
Gen. Paul Vallely USA (Ret)

Training

Jan Goldman
Hon. Dutch Ruppersberger
Syria

Farid Ghadry
Sharing Intelligence Part 2
(14:00-16:45)


David W. Henderman, Jr.
Steve Pomerantz
Gen. James Williams (USA Ret)
The Media & National Security: Views of an Intelligence Officer Turned Journalist

Dan Verton
15:00
-
15:45
Technology Aiding Intelligence Collection
(15:20-16:10)


Col. Oded Shoham, IDF (Res.)
Clara Conti
Session 4

James Andrew Lewis
Translators
(15:00-16:45)


Ken Meyer
Bill Tierney
Robert Baer
Rebecca Givner-Forbes
Israel

Jonathan Halevi
Dr. Rachel Ehrenfeld
Session 5

Yehoshuah Mizrachi
16:00
-
16:45
Securing Intelligence Networks
(16:15-17:00)


Moderator: Gen. Tom McInerney USAF (Ret)
Jim Butterworth
Ray Shanley
Session 5

Yossef Bodansky
Middle East
(16:00-16:30)


Dr. Walid Phares
Citizen Involvement - An American Tradition

Robert Jordan
Lebanon
(16:30-16:45)


Tom Harb
Col. Charbel Barakat
17:15
-
18:00
Reception
Time
PE1: Trends in Intelligence Technology PE2: Political, Policy and Legal Issues PE3: Role of Congress in Intelligence Oversight PE4: Reforming the Intelligence Community PE5: Finding and Keeping Intelligence Specialists PE6: View from Abroad PE7: Sharing Intelligence PE8: Getting the Public Involved

Day 2 - February 9, 2005 - Main Conference Program
Time
Track1: Federal Civilian Track2: DOD/Military Track3: State and Local Law Enforcement Track4: Business Track5: Private Sector
07:30
-
08:00
Registration
08:15
-
09:00
FD1: Immigration and Customs

Grant Begley
Michelle Malkin

DM1: Asia: the Next Assessment Crisis

Joseph DeTrani
Dr. I-Chung Lai

SL1: Profiling Terrorists Among Us

Evan Kohlmann
Walter Purdy
BN1: What Government and Business Intelligence Pros Can Learn From Each Other

Ken Sawka
Bill Fiora
PS1: Partnering on Intel with Private Research Institutions

The Investigative Project
09:15
-
10:00
Keynote Address 1: A look at the special relationship: policy and intelligence - Dame Pauline Neville-Jones
10:15
-
11:00
FD2: Surveilling Insurgent Movements

Dr. Harvey Kushner
DM2: Military Collection Inside America

Bill Cowan
Wayne Simmons
SL2: Intelligence Technology

Christopher Westphal
BN2: Identifying Analytical Aptitudes in Business Intelligence Professionals

Joseph Goldberg
PS2: US Courts & Terrorism

Kim Lindquist
11:00
-
14:00
Exposition Viewing and Open Lunch
14:00
-
14:45
FD3: The International Intelligence Community

Bruce Fein
Jonathan Halevi
DM3: Where we are in the Global War on Terror

Gen. Paul Vallely USA (Ret)
SL3: Working with the IC

Maureen Baginski
BN3: Improving the Interpretive Value of Demographic Data

Dr. Katherine Shelfer
PS3: Is the Media the IC's Friend or Foe?

Cliff May
Avi Jorisch
15:00
-
15:45
FD4: Jointness: The New IC Buzzword

Sir John Chilcot
DM4: Nuclear Intelligence

Alireza Jafarzadeh
SL4: Computer Forensics

Tom Maiorana
BN4: Corporate Espionage Countermeasures

Daniel Benny
PS4: Intelligence & Civil Society

Dr. Walid Phares
16:00
-
16:45
PL1: Counterintelligence Methods and Applications - David Major
Time
Track1: Federal Civilian Track2: DOD/Military Track3: State and Local Law Enforcement Track4: Business Track5: Private Sector

Day 3 - February 10, 2005 - Main Conference Program
Time
Track1: Federal Civilian Track2: DOD/Military Track3: State and Local Law Enforcement Track4: Business Track5: Private Sector
07:30
-
08:00
Registration
08:15
-
09:00
FD5: Reforming Covert Operations

Michael Scheuer
DM5: Are We Losing our Edge on Technical Collection?

Richard McPherson
Ted Whetstone
SL5: Convergence of Islamic Terrorist Groups

Steven Emerson
BN5: Industry and FBI Partnership for Counterintelligence

Ray Musser
David Szady
PS5: Recruiting Minorities

Hon. Alcee Hastings
09:15
-
10:00
Keynote Address 2: Intelligence disorganization: Where is the Community heading? - John Deutch
10:15
-
11:00
FD6: FBI vs. an American MI5

Dr. Philip H.J. Davies
DM6: Outsourcing or In-House?

Arnaud de Borchgrave
SL6: Terrorism Task Forces: Band-aid or Solution?

Steve Pomerantz
BN6: Global Risk Aversion: Role of the Corporate Intelligence Unit

Scott Swanson
PS6: Dialoguing with Ethnic and Religious Organizations

Dr. Walid Phares
Rev. Keith Roderick
11:00
-
14:00
Exposition Viewing and Open Lunch
14:00
-
14:45
FD7: Inter-Agency Task Forces

Steve Pomerantz
DM7: al-Qaeda's Messaging, Tactics and Targets

Ben Venzke
SL7: Biowarfare Intel

Clare Lopez
BN7: Managing Expectations for Better Intelligence Results

David Kalinowski
PS7: Academia: Terrorist Battleground?

Dr. Walid Phares
15:00
-
15:45
FD8: Follow the Money: Treasury's Battle Cry

Stuart Levey
DM8: Satellites vs. UAVs - and Other Tradeoffs

David Anhalt
SL8: Intelligence Training

Herb Williams
BN8: Business Perspective on Cybersecurity

Bill Boni
PS8: How Academia and the Intelligence Community Can Work Together

Dr. Charles Jacobs
16:00
-
16:45
PL2: Open Source Intelligence and 21st Century Threats - Dr. James Arnold Miller
Time
Track1: Federal Civilian Track2: DOD/Military Track3: State and Local Law Enforcement Track4: Business Track5: Private Sector
Day 1: February 8, 2005
The entire first day consists of the following Professional Enhancement Seminars which run concurrently from 9:00 a.m. to 5:00 p.m., with a luncheon featuring a prominent speaker.
PE1: Trends in Intelligence Technology
Seminar Leaders:
Gen. Tom McInerney USAF (Ret), Consultant and Media Analyst
Adam Shaneson, Shaneson Consulting Group
Andy Monagan, Consultant

SEMINAR ABSTRACT:
This Seminar features ground-breaking advances in intelligence technology, as well as a discussion of those key technology issues which affect the entire intelligence domain at every level - federal, state and local. Contemporary problems of interagency software capability and compatibility will be addressed, as well as recent advances in software for intelligence sharing. There will also be a discussion of new developments in facial identification and voice recognition, and a potentially major breakthrough in remote intelligence assessment of chemical and biological hazards, which will be of great interest to civilian first providers, as well as the military. In addition, this Seminar provides a forum for all intel interests to voice requests to industry vendors for future hardware, software and services - their wish lists for new technology. CEO's of major product development firms will be presenters along with a former NSA Director with significant interagency technological experience.
PE2: Political, Policy and Legal Issues
Seminar Leaders:
Brent Budowsky, Former Senior Staff, Democratic Leadership
Jeff Bliss, Hoover Institution

SEMINAR ABSTRACT:
In the morning, there will be a substantial discussion of the evolving standards regarding prisoner interrogation. Recent Supreme Court decisions have significantly changed the ground rules for intelligence exploitation, POW interrogations and traditional law enforcement investigations. A senior military interrogator, recently returned from Baghdad, will raise the issues surrounding the application of new interrogation restrictions in the real-world threat environment. Later in the Seminar, discussion will focus on the Patriot Act. In considering whether it is an inadequate response to a rising terrorism threat, or an over-the-top reaction to 9/11, there will be an analysis of those sections of the Act, which may be at risk of being struck down as unconstitutional. An examination of impending legislation, and its potential impact on intel organizations, will be the basis for timely discussion and debate. Key members from the House and Senate intelligence committees will participate as panelists and presenters to ensure thorough and comprehensive coverage. Also speaking are former General Counsels for the CIA and DIA, and a former Deputy Attorney General from DOJ.
PE3: Role of Congress in Intelligence Oversight
Seminar Leaders:
Sen. Slade Gorton, 9/11 Commission
Dr. Michael Ledeen, Freedom Scholar, American Enterprise Institute

SEMINAR ABSTRACT:
One of the more vexing perennial questions in intelligence oversight - how much is too much? - will be addressed in this Seminar. Is there meaningful evidence that too little oversight has taken place? Members of the 9/11 Commission shall present their points of view, as will former DCI's and Directors of other agencies, on the battle to balance the needs for executive secrecy against demands for public accountability. Issues of budget disclosure and notification of covert action will be visited at length. Another oversight-related problem which continues to plague the intelligence community - leaks to the media - will be tackled by members of the House and Senate intelligence committees who will offer their opinions and positions on which branch of government is most responsible for these breaches. Former senior IC leaders will take this opportunity to propose possible solutions, which can work for all parties.
PE4: Reforming the Intelligence Community
Seminar Leader:
Harold Rhode, Office of the Secretary of Defense

SEMINAR ABSTRACT:
Congress has passed a 600-page bill, which changes the intelligence chain-of-command and rearranges intel responsibilities. It's not hyperbole to suggest that we are going through the most dramatic structural reform in the history of the intelligence community…and this Seminar may be the first forum where members of Congress and the IC can share their reactions to the new legislation behind it all.

Among the questions slated to be discussed are: who reports to the new National Director of Intelligence, from where will staff be drawn, and what is the impact of budgetary control over the IC in the war against terror? Some of the speakers are optimists who see the NDI as a new and powerful force to compel greater cooperation and efficiency among members of the intelligence community, while others are cynics who say that the new Director doesn't even have a chair yet, let alone an office or staff. While some of the participants may underestimate the strength of the consensus shared by Capitol Hill and the White House on the need for radical change after 9/11, most seem to agree that if this legislation proves unworkable, Congress will readily pass a new bill. In any event, it will be a lively debate!

With this Seminar, INTELCON is providing a neutral setting for a frank and honest dialogue between lawmakers and the IC. Presenters include representatives of the 9/11 Commission and key members of the House and Senate intelligence committees; and, since this Event takes place only a few weeks after the new Congress convenes, what happens here may play a major role in shaping the results of the legislation.
PE5: Finding and Keeping Intelligence Specialists
Seminar Leader:
David Jimenez, U.S. Border Patrol, DHS

SEMINAR ABSTRACT:
How can the U.S. Government possibly hope to retain its intelligence and security specialists when private contractors in Iraq are offering them salaries up to $1000 a day? Is the solution better pension benefits, more suitable career tracks, more flexibility in their assignments? Or is the growth of private security companies the problem? After investing a quarter of a million dollars in training a special forces operator, what will it take to keep that resource on assignment? Congress may have to recognize that very substantial bonuses - in the quarter million dollar per annum range - may have to be paid before covert operatives volunteer to spend years risking their lives behind the lines in hard target countries such as North Korea and Iran. These are but a few of the issues that will be on the table in this Seminar.

With state and local, as well as federal, agencies similarly experiencing great difficulty in finding and retaining qualified translators, speakers will consider outsourcing these needs to the private sector, building a pool of security-cleared translators, or possibly creating a centralized national translation service. They will also discuss federal scholarships for those who wish to train as intelligence specialists with a minimum commitment of national service; the necessity for every translator to have a secret or top secret clearance [which is worse - an uncleared translator or an untranslated secret?]; and, non-compete covenants that are widely used in the private sector. All this, and more, are bound to remind congressional and other intel interests attending this Seminar that you get what you pay for [and right now the private sector is paying more!].
PE6: View from Abroad
Seminar Leader:
Lee Mason

SEMINAR ABSTRACT:
Since 9/11, we have learned that other nations do things differently, some of them better - in fact, much better! The British have an independent assessment capability at the Joint Intelligence Committee level, and a firewall between evaluation and collection. Israelis have a fully centralized and cross-integrated intelligence data system, whereas America lacks even a central index. The hodge podge of American jurisdictional boundaries causes utter bewilderment among our allies. For example, the U.S. military can investigate foreign threats to our domestic peace, but cannot collect domestic intelligence about foreign connections; the FBI handles domestic crimes, but so do Customs, Immigration, Treasury, etc.; the CIA handles positive collection overseas but so does DIA; DOD controls the satellites, but CIA controls their targeting. In this Seminar, attendees will hear our allies' perspectives of these and other facets of our modus operandi, and about their belief in the concept of "jointness" that transformed the U.S. military in the 1980's, which they feel should be applied to the intelligence community, as well.
PE7: Sharing Intelligence
Seminar Leader:
Dr. Rachel Ehrenfeld, Consultant to State and Defense Departments

SEMINAR ABSTRACT:
This is a forum for state and local law enforcement, business and the remainder of the private sector to discuss their relationships with the federal intelligence community, and with each other. For the first time, each partner within the intelligence domain will have the opportunity to listen to everyone's point of view. It may get uncomfortable, but INTELCON is not about sugar-coating or spin. Problems exist - federal agencies do not share well with others. For example, several states are working together to compile their own databases on biological warfare because the federal government will not provide them the necessary data; yet, it's the state and local first responders who will bear the brunt of any future NBC attack. There is no federal-state "need to know" policy, nor any integrated system for providing federal security clearances to our municipal level intelligence providers. On the other hand, very few, if any, state and local law enforcement officials are even minimally trained in federal intelligence collection needs. In this Seminar, sheriffs with real-world experience will share their concerns with governors' representatives and people from federal agencies. While allowing for some much needed venting, participants will focus on the creation of federal intelligence training centers for state and local providers, the use of shared databases, and increased access to federal security clearances by first responders with a potentially critical need to know.
PE8: Getting the Public Involved
Seminar Leader:
Robert Jordan, Editor, Homeland Defense Journal

SEMINAR ABSTRACT:
For many years, there has been a huge gap between the general public and the IC in the perception of intelligence. The hard truth is, that at local levels, more attention has been paid to the enmity of encroachment on civil liberties than to the possibility of partnership in fighting a common enemy. In the post-9/11 environment, however, there has been a willingness of the citizen soldier to participate in assisting the intelligence community. Some communities have first-rate programs for encouraging training in intelligence collection. A few federal agencies, particularly the CIA, have been doing a credible job in community outreach. Some of these efforts will be reviewed in this Seminar.

Recognizing that, in the long run, members of Congress and the intelligence community work for the same master - the people - and that "the boss" wants more involvement in the war on terror, speakers will also examine whether it is worth the effort, or is public involvement just another PR gimmick like the WWII scrap metal drives. They will attempt to determine if local communities can truly assist federal agencies in the war on terror; and, if so, where they go to get started.
INTELCON 2005
National Intelligence Conference and Exposition
Please Visit the Exposition Area February 9-10
 
Day 2: February 9, 2005
Registration 0730-0800
Keynote Address 0915-1000
Plenary Session 1600-1645
Plenary Session PL1: Counterintelligence Methods and Applications
Speaker:
David Major, Centre for Counterintelligence and Security Studies

SESSION ABSTRACT:
Any serious examination of intelligence reveals its impact on international relations; however, it is essential to also recognize the corresponding role of counterintelligence as an essential component of national strategy. In today's war on terrorism, the role of counterintelligence is at the front lines of identifying, penetrating and neutralizing the terrorist threat. All terrorist attacks are preceded by intelligence collection; and, the tools used to identify and counter espionage are the same tools, methods and applications required to defeat terrorist organizations.

As an example of how essential it will be for the US to use traditional counterintelligence methods to address the terror threat that it faces today, this Seminar will discuss how the British Security Service (MI-5) used them to play the leading role in breaking the back of the terrorism war in Ireland. How MI-5's methods apply to our society will be part of an analysis of US CI that includes a review of the legal and ethical conflict between the requirement to safeguard individual rights, and the need to protect the community, social structure and national security. Also to be addressed are the foundations of, and the relationships between, counterintelligence, internal security, intelligence, security/countermeasures programs and law enforcement.
Track 1: Federal Civilian
Track Leaders:
Yossef Bodansky, Former Director, Congressional Task Force On Terrorism and Unconventional Warfare
Robert Baer, Former Central Intelligence Agency
Dr. Robert Katz
TRACK ABSTRACT:
This Track brings related groups of several agencies together to work on specific common issues. Here - perhaps for the first time - the FBI, CIA, Treasury, DHS services, etc., will meet to discuss how they can achieve inter-agency "jointness" and interface with the international intelligence community. Sessions are intended for individual agencies to educate their peers, as well as members of Congress, on their positions regarding structural reform. Should there be an American MI5, or should the FBI continue to be the lead agency for domestic intelligence? Are the inter-agency task forces effective in intelligence collection, as well as counter-terrorism? Have Customs, Immigration and Treasury been fully utilized as front-line intelligence collectors? These are some of the questions that will be addressed. Additionally, speakers will look into whether the CIA's experience in surveilling insurgent movements is an applicable resource for domestic law enforcement agencies; and how all intel players can help each other achieve the common goal of protecting domestic tranquility.
FD1: Immigration and Customs 0815-0900
FD2: Surveilling Insurgent Movements 1015-1100
FD3: The International Intelligence Community 1400-1445
FD4: Jointness: The New IC Buzzword 1500-1545
Track 2: DOD/Military
Track Leaders:
Gen. James Williams USA (Ret), Chairman, National Military Intelligence Association
Gen. Paul Vallely USA (Ret), Consultant and Media Analyst
TRACK ABSTRACT:
This is an opportunity for career employees of the various armed services to interact with each other to address important contemporary issues, such as common problems in technical collection, al-Qaeda modus operandi, the latest developments in intelligence technology, terrorist profiling and forensic intelligence - and how all that information may be shared with state and local law enforcement. The military's experience with outsourcing will be discussed and, for example, whether translation should be done in-house or through a central facility. Panelists will also look into where Congress should allocate the greater of its resources - to satellites or UAVs? (Which gives the "bigger bang for the buck?") And no Track of this nature would be complete without examining how well the Pentagon works with the rest of the intelligence community, and what it can do better.

Even more significantly, this will be the first venue for those working in military intelligence to meet with members of the new Congress. At the top of the agenda for discussion is the recently enacted 600-page bill restructuring the IC under a National Director of Intelligence. Whether characterized as a turf battle, or a genuine effort to protect the military chain-of-command, the controversy over targeting authority and budgetary control has only just begun; and, it will be in full bloom in this INTELCON Track.
DM1: Military Collection Inside America 0815-0900
DM2: Asia: the Next Assessment Crisis 1015-1100
DM3: Where we are in the Global War on Terror 1400-1445
DM4: Nuclear Intelligence 1500-1545
Track 3: State and Local Law Enforcement
Track Leaders:
Eric Shawn, Fox TV
Terry Wonder, Consultant
TRACK ABSTRACT:
Our IC assumes and expects that state and local law enforcement agencies will provide key intelligence in the war against terror. But, thus far, intelligence sharing hasn't been a two-way street. Some states are even building their own intelligence databases on biological weapons threats. And what role will the new National Director of Intelligence have in sorting out this tangle of jurisdictions and split responsibilities? These are just a few of the issues that S&L specialists will address in this Track. They will also discuss what a state Governor needs to know; whether Intelligence 101 should be required for new members of Congress - as well as police chiefs; what county sheriffs have to know about profiles of terrorists living in their jurisdictions; new intel technology; and, helicopters versus UAVs for police forces.

Here are some of the other questions to be answered in these jam-packed two days: What should local law enforcement know about forensic intelligence for international money laundering? When do the needs for national intelligence overrule a local criminal investigation? Is it true that we should never catch – just surveil - a spy? How does the intelligence community share classified information with local leadership which doesn't have security clearances? Should sensitive law enforcement information be included in a central investigative database? Do we need to require that federal agencies keep state and local leadership in the loop? Are there ways of ensuring that our state and local first responders are truly part of the total intelligence mix?
SL1: Profiling Terrorists Among Us 0815-0900
SL2: Intelligence Technology 1015-1100
SL3: Working with the IC 1400-1445
SL4: Forensic Intelligence 1500-1545
Track 4: Business
Track Leader:
Joseph Goldberg, Director of Corporate Business Intelligence, Motorola
TRACK ABSTRACT:
Private-sector businesses have developed expertise in the legal and ethical collection and analysis of information regarding the capabilities, vulnerabilities and intentions of competitors. Their goal is to create strategic value and competitive advantage in business decision-making and company performance. This Track offers unique perspectives into this use of competitive intelligence in business and industry, and the issues surrounding the public/private intelligence relationship. An expert group of practitioners, many of whom are former government intelligence officers, will provide insights on how the business community collects and analyses relevant, timely and actionable intelligence for decision-makers in organizations of any size. Discussions will focus on the public/private intelligence partnership, counterintelligence, cyber security, global collection, analysis tools and data mining; and, provide an opportunity for professional intel organizations within government to dialogue with their corporate counterparts on common intelligence interests.
BN1: What Government and Business Intelligence Pros Can Learn From Each Other 0815-0900
BN2: Identifying Analytical Aptitudes in Business Intelligence Professionals 1015-1100
BN3: Improving the Interpretive Value of Demographic Data 1400-1445
BN4: Corporate Espionage Countermeasures 1500-1545
Track 5: Private Sector
Track Leaders:
Dr. Walid Phares, Senior Fellow, Foundation for Defense of Democracies
Brendan Howley, NGO/Media Consultant
TRACK ABSTRACT:
INTELCON's theme, "Widening the Intelligence Domain," reflects the broadening of the responsibility for intelligence in this age of terrorism well beyond the customary turf of the IC's civilian and military agencies. Today, intelligence is everyone's concern – or at least it should be - from the IC right down to the general public. And it may very well be that some of our best and brightest players are in the private sector, and being underutilized. With that in mind, this Track was planned as a forum for the often neglected stakeholders in the intel mix - members of the press, academia, ethnic and religious groups, and non-governmental organizations. A whole host of private-sector issues will discussed during these two days of sessions, none the least of which is how well the components within this group can work among themselves, and with federal, state and local government officials. Speakers will address ways to improve minority recruitment; how to do a better job of opening a dialogue with Muslim Americans and other groups, given a shortage of language and area expertise; and, the role of academic and private research organizations in contributing to our understanding of foreign trends and cultures. Then there's the media – does it have a legitimate complaint on declassification, or is the press selling our secrets for profit? Ground rules for the press, who makes the rules, the use of paraphrases instead of directly quoting from intercepts or classified documents; and, if true secrets must be kept, what is the press's role in exposing secret corruption? These issues, and plenty more, will be on the table. And, finally, there will be a no-holds-barred debate about whether the academic community and NGO's are becoming pawns of foreign powers who make generous donations, or are they bastions of free speech that the IC does not want to hear.
PS1: US Courts & Terrorism 0815-0900
PS2: Intelligence & Civil Society 1015-1100
PS3: Partnering on Intel with Private Research Institutions 1400-1445
PS4: Is the Media the IC's Friend or Foe? 1500-1545
INTELCON 2005
National Intelligence Conference and Exposition
Please Visit the Exposition Area February 9-10
 
Day 3: February 10, 2005
Registration 0730-0800
Keynote Address 0915-1000
Plenary Session 1600-1645
Plenary Session PL2: How To Find And Leverage Open-Source Intelligence
Speaker:
Dr. James Arnold Miller Chairman, Interaction Systems Incorporated

SESSION ABSTRACT:
Open Source Intelligence and 21st Century Threats

The recently approved intelligence reform legislation requires the Director of National Intelligence (DNI) to ensure that the intelligence community makes efficient and effective use of open source information and analysis. This special plenary presentation will address how anyone in the traditional intelligence community - or in the public safety community or companies - can systematically locate, select, organize, retrieve, analyze, and disseminate useful open source intelligence (OSINT). The speaker will emphasize how to "separate the wheat from the chaff," especially concerning the torrents of information besieging analysts on such pressing 21st century threats as weapons of mass destruction, terrorism, and insurgency.

Also in the new reform bill is the sense of Congress that the DNI should establish an intelligence center to coordinate collection, analysis, production, and dissemination of OSINT. The speaker will address whether such a center is necessary, and if so, how it might function to significantly improve the use of OSINT with regard to major threats. Also to be discussed is how electronically networked experts in the private sector could collaborate to substantially supplement secret and proprietary intelligence through such activities as building unclassified foundation databases on major threat topics; conducting alternative analysis; and providing strategic warning on global threats.
Track 1: Federal Civilian
Track Leaders:
Yossef Bodansky, Former Director, Congressional Task Force On Terrorism and Unconventional Warfare
Robert Baer, Former Central Intelligence Agency
Dr. Robert Katz
TRACK ABSTRACT:
This Track brings related groups of several agencies together to work on specific common issues. Here - perhaps for the first time - the FBI, CIA, Treasury, DHS services, etc., will meet to discuss how they can achieve inter-agency "jointness" and interface with the international intelligence community. Sessions are intended for individual agencies to educate their peers, as well as members of Congress, on their positions regarding structural reform. Should there be an American MI5, or should the FBI continue to be the lead agency for domestic intelligence? Are the inter-agency task forces effective in intelligence collection, as well as counter-terrorism? Have Customs, Immigration and Treasury been fully utilized as front-line intelligence collectors? These are some of the questions that will be addressed. Additionally, speakers will look into whether the CIA's experience in surveilling insurgent movements is an applicable resource for domestic law enforcement agencies; and how all intel players can help each other achieve the common goal of protecting domestic tranquility.
FD5: Reforming Covert Operations 0815-0900
FD6: FBI vs. an American MI5 1015-1100
FD7: Inter-Agency Task Forces 1400-1445
FD8: Follow the Money: Treasury's Battle Cry 1500-1545
Track 2: DOD/Military
Track Leaders:
Gen. James Williams USA (Ret), Chairman, National Military Intelligence Association
Gen. Paul Vallely USA (Ret), Consultant and Media Analyst
TRACK ABSTRACT:
This is an opportunity for career employees of the various armed services to interact with each other to address important contemporary issues, such as common problems in technical collection, al-Qaeda modus operandi, the latest developments in intelligence technology, terrorist profiling and forensic intelligence - and how all that information may be shared with state and local law enforcement. The military's experience with outsourcing will be discussed and, for example, whether translation should be done in-house or through a central facility. Panelists will also look into where Congress should allocate the greater of its resources - to satellites or UAVs? (Which gives the "bigger bang for the buck?") And no Track of this nature would be complete without examining how well the Pentagon works with the rest of the intelligence community, and what it can do better.

Even more significantly, this will be the first venue for those working in military intelligence to meet with members of the new Congress. At the top of the agenda for discussion is the recently enacted 600-page bill restructuring the IC under a National Director of Intelligence. Whether characterized as a turf battle, or a genuine effort to protect the military chain-of-command, the controversy over targeting authority and budgetary control has only just begun; and, it will be in full bloom in this INTELCON Track.
DM5: Are We Losing our Edge on Technical Collection? 0815-0900
DM6: Outsourcing or In-House? 1015-1100
DM7: al-Qaeda's Messaging, Tactics and Targets 1400-1445
DM8: Satellites vs. UAVs - and Other Tradeoffs 1500-1545
Track 3: State and Local Law Enforcement
Track Leaders:
Eric Shawn, Fox TV
Terry Wonder, Consultant
TRACK ABSTRACT:
Our IC assumes and expects that state and local law enforcement agencies will provide key intelligence in the war against terror. But, thus far, intelligence sharing hasn't been a two-way street. Some states are even building their own intelligence databases on biological weapons threats. And what role will the new National Director of Intelligence have in sorting out this tangle of jurisdictions and split responsibilities? These are just a few of the issues that S&L specialists will address in this Track. They will also discuss what a state Governor needs to know; whether Intelligence 101 should be required for new members of Congress - as well as police chiefs; what county sheriffs have to know about profiles of terrorists living in their jurisdictions; new intel technology; and, helicopters versus UAVs for police forces.

Here are some of the other questions to be answered in these jam-packed two days: What should local law enforcement know about forensic intelligence for international money laundering? When do the needs for national intelligence overrule a local criminal investigation? Is it true that we should never catch – just surveil - a spy? How does the intelligence community share classified information with local leadership which doesn't have security clearances? Should sensitive law enforcement information be included in a central investigative database? Do we need to require that federal agencies keep state and local leadership in the loop? Are there ways of ensuring that our state and local first responders are truly part of the total intelligence mix?
SL5: Convergence of Islamic Terrorist Groups 0815-0900
SL6: Terrorism Task Forces: Band-aid or Solution? 1015-1100
SL7: Biowarfare Intel 1400-1445
SL8: Intelligence Training 1500-1545
Track 4: Business
Track Leader:
Joseph Goldberg, Director of Corporate Business Intelligence, Motorola
TRACK ABSTRACT:
Private-sector businesses have developed expertise in the legal and ethical collection and analysis of information regarding the capabilities, vulnerabilities and intentions of competitors. Their goal is to create strategic value and competitive advantage in business decision-making and company performance. This Track offers unique perspectives into this use of competitive intelligence in business and industry, and the issues surrounding the public/private intelligence relationship. An expert group of practitioners, many of whom are former government intelligence officers, will provide insights on how the business community collects and analyses relevant, timely and actionable intelligence for decision-makers in organizations of any size. Discussions will focus on the public/private intelligence partnership, counterintelligence, cyber security, global collection, analysis tools and data mining; and, provide an opportunity for professional intel organizations within government to dialogue with their corporate counterparts on common intelligence interests.
BN5: Industry and FBI Partnership for Counterintelligence 0815-0900
BN6: Global Risk Aversion: Role of the Corporate Intelligence Unit 1015-1100
BN7: Managing Expectations for Better Intelligence Results 1400-1445
BN8: Business Perspective on Cybersecurity 1500-1545
Track 5: Private Sector
Track Leaders:
Dr. Walid Phares, Senior Fellow, Foundation for Defense of Democracies
Brendan Howley, NGO/Media Consultant
TRACK ABSTRACT:
INTELCON's theme, "Widening the Intelligence Domain," reflects the broadening of the responsibility for intelligence in this age of terrorism well beyond the customary turf of the IC's civilian and military agencies. Today, intelligence is everyone's concern – or at least it should be - from the IC right down to the general public. And it may very well be that some of our best and brightest players are in the private sector, and being underutilized. With that in mind, this Track was planned as a forum for the often neglected stakeholders in the intel mix - members of the press, academia, ethnic and religious groups, and non-governmental organizations. A whole host of private-sector issues will discussed during these two days of sessions, none the least of which is how well the components within this group can work among themselves, and with federal, state and local government officials. Speakers will address ways to improve minority recruitment; how to do a better job of opening a dialogue with Muslim Americans and other groups, given a shortage of language and area expertise; and, the role of academic and private research organizations in contributing to our understanding of foreign trends and cultures. Then there's the media – does it have a legitimate complaint on declassification, or is the press selling our secrets for profit? Ground rules for the press, who makes the rules, the use of paraphrases instead of directly quoting from intercepts or classified documents; and, if true secrets must be kept, what is the press's role in exposing secret corruption? These issues, and plenty more, will be on the table. And, finally, there will be a no-holds-barred debate about whether the academic community and NGO's are becoming pawns of foreign powers who make generous donations, or are they bastions of free speech that the IC does not want to hear.
PS5: Recruiting Minorities 0815-0900
PS6: Dialoguing with Ethnic and Religious Organizations 1015-1100
PS7: Academia: Terrorist Battleground? 1400-1445
PS8: How Academia and the Intelligence Community Can Work Together 1500-1545
INTELCON 2005
National Intelligence Conference and Exposition
Please Visit the Exposition Area February 9-10
 

David Anhalt
Senior Director, Special Programs
Advanced Programs Group, Orbital Sciences Corporation


 
Biography
Mr. Anhalt joined Orbital Sciences Corporation in January 2004 and currently serves as Senior Director, Special Programs in the Advanced Programs Group. In his position with the company, Mr. Anhalt leads efforts to provide innovative solutions to the problems facing the national security space sector today.

Prior to joining Orbital, Mr. Anhalt served in the U.S. Air Force, attaining the rank of Colonel. His last military assignment was Chief of the Space Control and Advanced Technologies Division for the Undersecretary of the Air Force where he directed the development and procurement of new systems to enhance U.S. military advantage. Before that Mr. Anhalt was the Air Force Military Assistant to the Director of Net Assessment, Office of the Secretary of Defense, where he directed comparative analyses of U.S. and foreign use of long-range strike and space systems in warfare.

Mr. Anhalt is a graduate of the U.S. Air Force Test Pilot School and has held several key positions in the test and evaluation of air and space systems including flight test engineer for the Airborne Laser Laboratory and the F-117 stealth fighter; chief scientist for acquisition, tracking and pointing at the Strategic Defense Initiative Organization in the Pentagon; director of engineering for the Joint Surveillance Target Attack Radar System (JSTARS) Test Force in Melbourne, Florida. After that, Mr. Anhalt served as the program manager for the JSTARS aircraft manufacturing program.

Mr. Anhalt earned his B.S. degree in Electrical Engineering from the U.S. Air Force Academy and holds an M.S.E. degree in Aerospace and Mechanical Sciences from Princeton University and an M.A. degree in International Relations from Queen's University, Ontario, Canada.


Seminar PE1: Trends in Intelligence Technology - UAV vs. Satellite
February 8, 14:00-15:15

Cost Effective ISR from Space
Abstract

This presentation will describe a cost-effective approach for satisfying tactical intelligence, surveillance, and reconnaissance requirements using small spacecraft.

The trade between using UAVs versus satellites for providing the warfighter sensor information is determined by a number of variables, including cost, threat environment, and performance requirements. During the Cold War, in order to address strategic intelligence requirements over huge landmasses of denied territory, the satellite-based approach was the cost-effective choice. For more recent wars where air superiority has been assured, the United States military has been successful in employing both manned aircraft-based sensors and UAVs.

Recently, the Air Force has initiated a Joint Warfighting Space concept to responsively deliver space capabilities directly to the Joint Force Commander to achieve operational and tactical effects. To be affordable, such a vision needs a new approach for providing satellite-based ISR. Orbital Sciences Corporation will describe its past experiences hosting sensor systems on lightweight satellite buses. Among the systems to be discussed will be commercial imagers such as OrbView 3 and OrbView 4, as well as a set of earth observation payloads hosted on NASA satellite programs. Comparisons will be drawn with UAV system implementations. The tradeoffs between hosting sensors on UAVs or satellites will be discussed from the standpoint of collection, processing, and dissemination.

 

Track 2: DOD/Military - DM8: Satellites vs. UAVs - and Other Tradeoffs
February 10, 15:00-15:45

Charles Archer
VP Federal Sector, Identix


 
Biography
Chuck Archer joined Identix in October 2004 as Vice President, Federal Sector, where he is responsible for leading and growing Identix' Federal sector customer relations and business.

Archer's career began with the Federal Bureau of Investigation, where in 1996, after a highly successful 28 years of service, he was appointed by the U.S. Attorney General and the Director of the FBI as Assistant Director In Charge of the Criminal Justice Information Services Division, with oversight of all criminal justice services, including IAFIS and Uniform Crime Reporting systems. As Assistant Director, Archer managed a $300 million annual budget, and launched the $1 billion expansion, development and automation of the agency's activities that culminated in the new National Crime Information Center (NCIC) and National Instant Check System for handguns. He led a workforce of more than 3,000 FBI employees and 600 outside contractors, and established and maintained strong relationships with other Federal agencies and Congress.

In addition to ever-increasing responsibilities during his FBI tenure, from 1993 to 1996 Archer served as Legal Attaché at the U.S. Embassy in Ottawa, Canada. As the senior US law enforcement official in Canada, he had absolute jurisdiction to render advice on laws, regulation, procedures and practices in the U.S.

Upon leaving the FBI, from 1998 to 1999, Archer served as President & CEO of publicly-traded STRATESEC, Inc., a single-source provider of comprehensive, technology-based security solutions for commercial, government and international facilities, where he spearheaded a period of rapid expansion, while broadening STRATESEC's offerings to a full suite of integrated services including engineering and design, systems integration, maintenance and technical support.

In 1999, Litton PRC appointed Archer Vice President, Strategic Business Development for Criminal Justice, subsequently promoting him to Vice President and General Manager, Office of Integrated Public Safety Programs. Serving in this position through 2002, he oversaw all PRC domestic and international public safety business units, and was a member of the PRC executive Quality Management Board, reporting directly to the company's President.

From 2002 until joining Identix, Archer served as Vice President Homeland Security for Northrop Grumman Information Technology, where he was responsible for managing domestic and international strategic planning issues involving homeland security and criminal justice. He regularly presented to senior State and Federal government officials on Northrop's homeland security capabilities, and was an active representative on numerous industry and government committees dealing with the use and integration of biometrics and the importance of interagency cooperation.

Archer received a BS in Accounting from Minnesota State College, and has attended a number of graduate programs, including post-graduate courses in statistics and government accounting at the USDA Graduate School; the Litton Executive Education Program in Finance at the University of Pennsylvania's Wharton School; the University of Maryland School of Business's program on international marketing strategies, and business development and execution at the University of Virginia's Darden Graduate School of Business Administration.


Seminar PE1: Trends in Intelligence Technology
February 8, 09:45-10:45
Trends in Biometrics: Future & Past
Abstract

We live in a changed world - a world that has become global and networked. As such, we are also facing new challenges, which include terrorism, transnational crime, cyber crime and identity fraud and theft. With new challenges, a new security paradigm is needed.

Security in this age must go beyond borders and firewalls to establish trusted identity. More than ever governments worldwide are turning to technology such as biometrics to identify people and link human action with identity.

Driven by post-9/11 legislation, the US government is leading the world in deploying biometrics technology. Among the significant pieces of legislation driving the awards of large-scale biometrics implementations are:

  • Aviation & Transportation Security Act
      - Live scans in all US airports for background checks
  • U.S. Patriot Act
      - Laid foundation for biometric entry/exit system
      - Mandated background checks for HAZMAT drivers (deadline January 2005)
  • Enhanced Border Security & Visa Reform Act
      - Initiated creation of VISIT system with single finger and live scan at all border crossings
      - Spurred DoS Facial Recognition award for travel documents
      - Laid out visa-waiver country requirements
  • Maritime Transportation Security Act of 2002
      - Mandated Seafarer's ID + background checks
  • 9/11 Commission Implementation Act

This presentation will cover the latest advancements in biometrics and the trends in military, intelligence and global security that are impacting the adoption of biometrics. We will provide an update on several high profile implementations such as the Department of Homeland Security, Department of State, and discuss how the military and intelligence community can continue to work with the biometrics industry in furthering the state of the art.

Jed Babbin
Former Deputy Under Secretary of Defense


 
Biography
Jed Babbin is the best-selling author of "Inside the Asylum: Why the UN and Old Europe are Worse than You Think" (Regnery 2004). He is a former Air Force officer who served as a deputy undersecretary in the first Bush administration (1990-1991).

Mr. Babbin writes regularly for National Review Online and for the American Spectator Magazine. His weekly column, "Loose Canons", appears in The American Spectator Online. Mr. Babbin's expertise is in national security and foreign affairs. However, he also writes about legal matters and for The American Spectator's "Saloon" series on subjects such as single barrel bourbon and fine cigars.

Mr. Babbin is a military analyst and appears frequently on the Fox News Channel and MSNBC, on shows such as "The O'Reilly Factor", "Hardball with Chris Matthews", "Scarborough Country" and many others. He served as guest host of Oliver North's "Common Sense Radio" when Col. North was unavailable – including for nine weeks straight during the Iraq war in 2003 -- and has also subbed for Laura Ingraham and Greg Garrison. "Common Sense Radio" was broadcast nationally by the Radio America Network. He wrote the novel, Legacy of Valor, (Pentland Press, 2000).

Mr. Babbin is a graduate of Stevens Institute of Technology (B.E. 1970), Cumberland School of Law (J.D. 1973) and the Georgetown University Law School (LL.M. 1978).


Seminar PE2: Political, Policy and Legal Issues
February 8, 09:00-11:30
Abstract

The two most pressing issues in intelligence policy. First, whether the new national intelligence director's powers are properly formulated. It does not appear to be the case at all. The intelligence community is not likely to benefit from another layer of bureaucracy, no matter how well intentioned. Instead, it should be remodeled in the manner the Defense Department was in the Goldwater-Nichols bill, requiring "jointness" in operation, strategy and budgeting. I remain entirely skeptical about whether this necessary result will obtain from the 2004 legislation. Second, the problem of congressional violations of trust. We have seen several horrific instances of security violations by members of the senate in recent years. Sen. Richard Shelby allegedly leaked the fact that we were monitoring Usama bin Laden's cell phone conversations, resulting in the loss of our ability to do so.

Second, three Democrats -- Jay Rockefeller, Richard Durbin and Ron Wyden -- apparently leaked details about a "black" satellite program. If the laws that require our secrets be kept secret aren't taken seriously by those who hold the public's trust -- such as Shelby and the "Misty Three" -- -- our system of government will not be able to function as the Constitution says it must. If Congress cannot be trusted with secrets such as these, it cannot provide the essential checks and balances on the Executive we rely on it to perform in order to protect us from a runaway president. Right now, we apparently have a runaway Senate. The Justice Department, and Sen. Frist's office, should be working day and night until this problem is solved, and cooperate to ensure the leakers are punished to the full extent of the law.

Robert Baer
Former CIA


 
Biography
A case officer in the Directorate of Operations for the CIA from 1976 to 1997, Robert Baer is the author of two books, Sleeping with the Devil: How Washington Sold Our Soul for Saudi Crude and See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism. Whether in those works or in his articles published in The Atlantic Monthly, The Wall Street Journal, and other media, Baer's audience can count on him for his candid exposition about the influence of presidential politics and political correctitude on our nation's judgment about terrorism emanating from the Middle East. Having worked in such diverse locations as New Delhi, Khartoum, Beirut, Paris, Rabat, Dushanbe, and Northern Iraq, Baer resigned from the CIA in 1997 and was awarded the organization's Career Intelligence Medal in 1998. Evidently, Baer's talent for providing refreshing analysis in a prosaic style rich in detail and direct quotes translates well into screenplay form. Indeed, veterans of this year's conference may look forward to a motion picture adaptation of his book See No Evil, re-titled Syriana and starring George Clooney, in Winter 2005.


Seminar PE5: Finding and Keeping Intelligence Specialists
Spies - Intelligence Agents & Analysts
February 8, 09:00-11:30
Spies
Abstract

Today the CIA faces two major problems in retaining new recruits: relatively low salaries and a stifling bureaucracy. You have a lot of young people smart enough to get in but wise enough to get out. The CIA needs to get rid of a couple layers of management. Not only would it improve moral it would allow new officers to get out in the field earlier. A lot of people applying to today, whether from Wall Street or K Street, are making salaries that let them afford Washington property prices; not so in the CIA. At one point not too long ago a starting CIA case officer was making less than a DC policeman. But above all the CIA has got to get out of the press. Getting blamed for 9/11 and WMD has done serious damage to its morale.


Seminar PE5: Finding and Keeping Intelligence Specialists
Translators
February 8, 15:00-16:45
Translators
Abstract

The CIA's directorate of operations cannot dispense with officers who fluently speak the language of the country they're working in. Translators do not cut it. Anyone who considers spying, putting their lives at risk, only want a one on one relationship with the American they're dealing with. They especially will not work with citizens of their own country afraid they would be betrayed.

Maureen Baginski
FBI, Executive Assistant Director, Office of Intelligence


 
Biography
Prior to joining the FBI, Ms. Baginski led the National Security Agency's Signals Intelligence Directorate--the Nation's high technology cryptologic organization. The Signals Intelligence Directorate manages, on behalf of the Director of NSA, the acquisition, production, and dissemination of foreign signals intelligence for customers ranging from policymakers to warfighters. As head of this organization, Ms. Baginski managed a complex, geographically dispersed extended enterprise engaged in distributed information production. Ms. Baginski established the SIGINT Directorate from what were once two separate organizations--one responsible for technology development and one responsible for information production. Ms. Baginski and her team led a successful transformation of processes, organizations, and technology to meet the challenges of 21st Century signals intelligence.


Track 3: State and Local Law Enforcement
SL3: Working with the IC
February 9, 14:00-14:45



Col. Charbel Barakat
Security Advisor to the President of the World Lebanese Cultural Union


 
Biography
Retired Officer from the Lebanese Army. Former Deputy Commander of the South Lebanon Army. Was the Foreign Minister of South Lebanon. Has a unique experience on Hizbollah's strategies and tactics. Historian based in Toronto.


Seminar PE6: View from Abroad
Lebanon
February 8, 16:30-16:45

John Batchelor
ABC National Radio


 
Biography
John has published seven political novels, as well as a history of the Republican Party, Ain't You Glad You Joined the Republicans?


Seminar PE8: Getting the Public Involved
Role of the Media
February 8, 09:50-10:35

Grant Begley
Unmanned and Reconnaissance Systems, Raytheon Company


 
Biography
Grant A. Begley is director of Architecture and Systems Integration – Unmanned and Reconnaissance Systems for Raytheon's Space and Airborne Systems business. In this role, Mr. Begley has responsibility for creating and leading growth initiatives in domestic and international unmanned airborne systems markets, with emphasis in the Homeland Security and Border Surveillance areas.

Mr. Begley's career has included assignments of significant leadership in the area of unmanned airborne systems at Lockheed Martin and with the U.S. Government. Mr. Begley served in the U.S. Navy for 26 years, including operational assignments flying fighter aircraft, development of next-generation weapon systems and joint assignments. Mr. Begley's last government assignment was as Navy Director for Stealth and Counter Stealth - Technologies, Policy and Advanced Programs. He holds a master's degree in aeronautic engineering from the Naval Post-Graduate School and a bachelor's degree in general engineering from the U.S. Naval Academy.


Track 1: Federal Civilian
FD1: Immigration and Customs
February 9, 08:15-09:00
Unmanned Airborne Systems: Opportunistic Environment for Border Control ... with Risk.
Abstract

Unmanned Airborne Systems (UASs) are currently being evaluated for procurement and use in Border Control and Homeland Security. These evaluations are an opportunistic exploitation of advances in UASs made possible by decades of investments, and billions of dollars, by the Department of Defense. The opportunistic environment for UASs introduction and use for Border Control comes with an obscure yet significant risk: the risk is an ad hoc procurement and insertion of UASs into service where there is no integrated plan for mission system capability, command and control, integration of manned and unmanned capabilities, asset and mission management, and budget process.

The February 2004 Defense Science Board Study titled "Unmanned Aerial Vehicles and Uninhabited Combat Aerial Vehicles" concluded, "There is no longer any question of the technical viability and operational utility of Unmanned Aerial Vehicles (UAVs). The benefits and promise offered by UAVs in surveillance, targeting and attack have captured the attention of senior military and civilian officials in the Department of Defense, members of congress, and the public alike". Military planners point to fewer investments in new weaponry and more spending on UASs, along with networked communications to assure command and control required to enable real-time and multi-organizational UASs mission capability. Concurrently a shift has occurred away from Unmanned Aerial Vehicles to Unmanned Aerial Systems (UASs), a shift from platform-centric to mission-centric capability. Future UASs capabilities and success for Border Control will rest upon the firm foundation of past and future DOD UASs investments; but, will require coordination of Border Control stakeholders who must weigh the opportunity for enhanced surveillance using highly capable mission-centric Unmanned Aerial Systems against the risk of ad hoc procurement and use of platform-centric Unmanned Aerial Vehicles , resulting potentially in unrealized capability.

Daniel J. Benny
M.A., CPP, PCI, CCO, CLET
Private Investigator & Security Consultant


 
Biography

Daniel J. Benny, M.A., CPP, PCI, CCO, CLET is a professionally licensed Private Investigator and Security Consultant. He is also a court-qualified expert witness in security matters. Since 1981 he has offered criminal, legal, corporate, fraud, background, private and pre-employment investigations, as well as assets protection, physical security, security management, protective service, counterintelligence and counterterrorism security consulting and training.

He holds a Master of Arts in Security Administration from Vermont College of Norwich University, a Bachelor of Arts in Security Administration from Alvernia College and Associate of Arts in both Commercial Security and Police Administration from Harrisburg Area Community College. He is a graduate of the United States Naval War College, and the Navy and Marine Corps Intelligence Training Center. He is Board Certified in Security Management holding the designations of Certified Protection Professional (CPP) and Board Certified as a Professional Certified Investigator (PCI) by ASIS International. He holds the designations of Certified Confidentiality Officer (CCO) from the Business Espionage Controls and Countermeasures Association, and Certified Law Enforcement Trainer (CLET) from the American Society for Law Enforcement Training. He is the author of over 1000 articles and the book, The Private Investigator's Professional Desk Reference . Benny is a contributing author to the ASIS International Protection of Assets Manual. He is also a Professor at Central Pennsylvania College and Harrisburg Area Community College teaching courses in Criminal Justice, Security, Intelligence and Terrorism.

As a Lieutenant in the United States Naval Reserve he served ten years as an Intelligence Officer with the Office of Naval Intelligence, the Naval Criminal Investigative Service and the Central Intelligence Agency. He is certified by the Commonwealth of Pennsylvania Act 235 Lethal Weapons Instructor and Terrorism Awareness and Prevention Instructor. He holds the rank of Black Sash in Jeet Kune Do and is a National Rifle Association instructor in firearms, personal protection, and Range Safety Officer. He holds a Federal Aviation Administration Private Pilot Certificate.

He is a member of the following: ASIS International, Business Espionage Controls and Countermeasures Association, International Association for Counterterrorism & Security Professionals, Pennsylvania Association of Licensed Investigators, National Association of Investigative Specialists, American Society for Law Enforcement Training, Pennsylvania Association of Criminal Justice Educators, National Criminal Justice Honor Society-Alpha Phi Sigma, International Association of Chiefs of Police, Pennsylvania Chiefs of Police Association, Association of Former Intelligence Officers, International Association for Intelligence Education, Naval Intelligence Professionals, United States Navy Memorial Foundation, Navy League of the United States, Military Order of the World Wars, American Legion Post 730, MG Car Club and MGB Register, Susquehanna Valley Vintage Sports Car Club, Jaguar Enthusiasts' Club, Antique Automobile Club of America, Central Pennsylvania Automobile Club, National Rifle Association of America, Sherlock Holmes Society of London, Knights of Columbus Council 869 "3rd Degree," Bishop J. W. Shanahan Assembly "4th Degree," Free and Accepted Masons of Pennsylvania, Brownstone Lodge 666, "3rd Degree," Ancient Accepted Scottish Rite of Freemasonry Harrisburg Consistory "32 nd Degree," National Sojourners, and Harrisburg Chapter "Heroes of '76 Degree."


Track 4: Business
BN4: Corporate Espionage Countermeasures
February 10, 15:00-15:45

Jeff Bliss
Hoover Institution, Associate Director - Communications


 
Biography
Jeff Bliss oversees all communications and outreach efforts. Before joining the Hoover Institution in 2002, he served as director of public affairs at California State University, San Luis Obispo. Previous to his work at Cal Poly, he was director of public information at Pepperdine University. He has written and spoken on crisis management, and his op-eds and photography have appeared in numerous regional and national publications. Jeff Bliss received his degree in journalism from Pepperdine.


Seminar PE8: Getting the Public Involved
Role of the Media
February 8, 09:50-10:35
Abstract

The history of the relationship between the media and government agencies has typically been one of distrust, distance and disinformation. There have been intermittent periods of "détente," but generally speaking, the two estates have more often than not been at loggerheads.

Now, in the post-9/11 – Iraq War – War on Terror world we live in, the media is forced to examine its (changing) role. In addition to having to rethink its practices -- particularly as it confronts the realities of asymmetrical war, the targeting of civilians (including journalists), and the rise of new/alternative forms of news gathering and dissemination – the media is trying to come to grips with the responsibilities it has to the public.

Yossef Bodansky
Director, Congressional Task Force on Terrorism


 
Biography
Yossef Bodansky is the Director of the Congressional Task Force on Terrorism and Unconventional Warfare at the US House of Representatives. He is also the Director of Research at the International Strategic Studies Association, as well as a Senior Editor for the Defense & Foreign Affairs group of publications. Bodansky is the author of nine books (Target America, Terror, Crisis in Korea, Offensive in the Balkans, Some Call It Peace, Arafat's "Peace Process", Islamic Anti-Semitism as a Political Instrument, Bin Laden: The Man Who Declared War on America and The High Cost of Peace), as well as several book chapters, entries for the International Military and Defense Encyclopedia, and numerous articles in several periodicals, including Global Affairs, Jane's Defence Weekly, Defense & Foreign Affairs: Strategic Policy, and Business Week.


Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 16:00-16:45



Bill Boni
VP Information Technology, Motorola


 
Biography
Mr. William C. Boni has spent his entire professional career as an information protection specialist and has assisted major organization's in both the public and private sectors. For more than 25 years Bill has helped a variety of organizations design and implement cost-effective programs to protect both tangible and intangible assets. In a wide range of assignments Bill has assisted clients in safeguarding their digital assets, especially their key intellectual property, against the many threats arising from the global Internet. In addition, he has pioneered the innovative application of emerging technologies including computer forensics, intrusion detection and others, to deal with incidents directed against electronic business systems.

Bill has served as a consultant in several professional service organizations and now works as the Vice President and Chief Information Security Officer of Motorola Information Protection Services. He is responsible for the company's overall program to protect critical digital proprietary information, intellectual property and trade secrets. He also directs the people, processes and technology programs that safeguard the company's global network, computer systems and electronic business initiatives.

Bill has been quoted by leading print publications such as the Wall Street Journal, US News & World Report the Financial Times, LA Times, and CIO Magazine. He has also appeared on many network broadcasts including Prime Time Live, CNN and CNN/fn discussing espionage and cyber crimes directed against American high technology corporations. Other assignments in his distinguished career include work as a U.S. Army counter-intelligence officer; Federal agent and investigator; investigator and security consultant; Vice President of Information Security for First Interstate Bank; and project security officer for "Star Wars" programs and other defense work with Hughes Aircraft Company and Rockwell.

Professional Associations / Certifications
Bill is the past chairman of the American Society of Industrial Security (ASIS) Council on Safeguarding Proprietary Information http://www.asisonline.org/safeguarding.html and he co-authored both the 1999 and 2001ASIS-PwC report on "Loss of Proprietary Information". He chaired the 1999 Information Systems Audit and Control Association annual conference on Computer Audit and Security. Bill is on the Board of Directors of the International Society for Policing Cyberspace (http://www.polcyb.org) and served as an industry delegate to the National Cyber crime Training Partnership (NCTP) and to the G-8 Cyber crime Task Force, both sponsored by the U.S. Department of Justice. He is a member of the Board for the Certified Information Security Manager's certification sponsored by ISACA.

In July 2003 he received a CSO "Compass Award" from the publisher's of CSO magazine recognizing him as one of a handful of thought leader's who "helped build security culture not just in their own organization but in the broader business community and the nation." Bill has also recently been appointed to the 2003/2004 Board of the Computing Technology Industry Association http://comptia.org/.

He holds the Certified Information Systems Auditor (CISA) from ISACA and the Certified Protection Professional (CPP) from ASIS International.

Professional Publications
He is co-author of "I-Way Robbery: Crime on the Internet", and "High Tech Investigator's Handbook: Working in the Global Environment" published by Butterworth-Heinemann (www.bh.com) in 1999. His most recent book "Netspionage: The Global Threat to Information" was released in September 2000.


Track 4: Business
BN8: Business Perspective on Cybersecurity
February 10, 15:00-15:45
Business Perspective on Cybersecurity
Abstract

One of the leading private Sector cyber security practitioner's and a Founding member of the Global Council of Chief Security Officers, Bill will share his perspective on the 21st century security challenges faced by both public and private Sectors. In their common struggle to address the new risks arising from the vast increase in connectivity and communications he will discuss what he believes are the new threats that must be appreciated and key protective measures that should be emphasized. The session will emphasize the critical importance of shaping an effective global response to economic cyber crime and deploying sufficient human and technical resources to address the both criminal abuse of the internet and the rapidly increasing range of cyber security issues.

Jeffrey Breinholt
Deputy Chief, Counter-Terrorism/Terrorist Financing
Department of Justice


 
Biography
Jeff Breinholt has been a federal prosecutor for 14 years, specializing in financial crime. After 9/11, he was asked to establish a nationwide program to uncover and redress incidents of international terrorist organizations raising funds from U.S. sources. The group of lawyers he formed has since evolved into a permanent Washington-based unit within the Criminal Division devoted to the prosecution of terrorist financing crimes. Mr. Breinholt is a frequent author and lecturer on intelligence and law enforcement issues, and is the recipient of the Attorney General's Award for Excellence in Furthering the Interests of US National Security. His latest publications include the book Counterterrorism Enforcement: A Lawyer's Guide (DOJ OLE, 2004) and the article, "How About a Little Perspective? The USA PATRIOT Act and the Uses and Abuses of History," 9 Texas Review of Law & Politics 225 (Fall 2004). He is currently at work on a book on the history of American criminal tax prosecutions.


Seminar PE2: Political, Policy and Legal Issues
February 8, 14:00-16:45



There is a tendency to focus on particular counterterrorism measures to the exclusion of others. This tendency is undoubtedly driven by media coverage, popular culture, and the American obsession with the question, What's hot and what's not? It too often ignores the multi-faceted nature of the US counterterrorism arsenal. Jeff Breinholt, who heads the Department of Justice's terrorist financing criminal enforcement program, analogizes effective US counterterrorism policy to a golf swing, where the goal is synchronicity. In golf, an unsynchronized swing results in a hook or a fade into the woods. In counterterrorism, the reliance on particular tools to the exclusion of others similarly results in missed opportunities. Synchronicity in counterterrorism means striving to maximize the menu of viable options available to operational decision makers. This ideal requires a healthy and constant competition among governmental components, which aggressively strive for approval to apply their tools to particular counterterrorism challenges. The best example of this dynamic since 9/11 may be the competition between US prosecutors and the Pentagon upon the detection of individual terrorist operatives. While the most prominent legal issues have involved the President's authority to designate enemy combatants, DOD-led military tribunals, and prisoner interrogation methods, academic commentators are beginning to take notice of the large number of terrorism-related criminal prosecutions undertaken in the last few years, seemingly without fanfare. American prosecutors have pushed regular criminal enforcement options and the application of established legal principles to terrorist supporters within the US, from sleeper cells and jihadist groups to seemingly legitimate charities that raise funds for foreign terrorist groups and causes. Mr. Breinholt will survey those prosecutions that have reached a point where public commentary is possible, to illustrate the sometimes-overlooked criminal enforcement option and its importance to a synchronized counterterrorism policy.

Brigadier General Matthew E. Broderick USMC (Ret)
Director of the Homeland Security Operations Center
Infrastructure Analysis and Infrastructure Protection Directorate


 
Biography
Matthew Broderick joined the Department of Homeland Security in May of 2003 and serves as the Director of the Homeland Security Operations Center (HSOC). Prior to coming to the Department, he worked as an adjunct consultant at the Institute for Defense Analysis (Systems Analysis) where he worked on major DOD projects to include the Marine Corps Over the Horizon, Ship to Objective Maneuver, C4ISR issues and the OSD Joint Deployable Headquarters C4I and facilities standardization efforts.

From April of 1998 through October of 2002, Mr. Broderick served as the Vice President of Operations for the Eastern United States and the Caribbean for a large, international corporation that specialized in building, selling and managing vacation resorts. In that capacity, he oversaw the daily activities of 22 Vice President's and Managers, 1100 employees and was responsible for producing $100M in net sales.

On 1998, then Brigadier General Broderick retired after serving 30 years as an Infantry Officer in the United States Marine Corps. During his 30 year career, Broderick commanded at the platoon, company, battalion and brigade level; attended the Marine Corps Amphibious Warfare School, the Armed Forces Staff College and the Naval War College; served as the operations officer at the Battalion, Regiment, Division level; and served as the Inspector General for the US Central Command and as the Deputy Director of Operations at Headquarters Marine Corps in Washington, DC.

Mr. Broderick holds two Masters Degrees: one from Salve Regina College, Newport, RI and one from the Naval War College, Newport, RI.


Seminar PE8: Getting the Public Involved
February 8, 09:00-09:45
Sharing Threat Information at All Levels
Abstract

After 9/11, several major cities (NY, LA, etc) approached the federal government and request help on how their law enforcement agencies could better share terrorist related information. This was the birth of the Joint Regional Information Exchange System (JRIES). When the Department of Homeland Security stood up, it found itself unable to quickly reach out and share threat information using one common system. JRIES helped solve some of that problem but there still was a need for reaching non-law enforcement and leadership all the way down to the county and smaller city levels to include all the state and county Emergency Operations Centers. This compounded itself when DHS was required to reach out to the Private sector and to reach out at both the unclassified and classified (Secret) level. A system, called the Homeland Security Information System (HSIN) is trying to do exactly that. How this is implemented and rolled out becomes a key to this country having a standard way of quickly and securely sharing terrorist threat and warning information.

Brent Budowsky
Former Congressional Leadership Staff


 
Biography
From the mid-1970's to 1990 Brent Budowsky served in senior Congressional Staff positions including Legislative Assistant to former U.S. Senator Lloyd Bentsen, and Legislative Director to Representative Bill Alexander, then Chief Deputy Majority Whip. With Senator Bentsen Mr. Budowsky was extensively involved with the Intelligence Identities Protection Law and Intelligence Officers Death Benefits Act. During his years with Congressional Leadership he was involved with conflicts ranging from Central America and opposing the Soviet invasion of Afghanistan to supporting freedom in Eastern Europe and world trade issues. Mr. Budowsky left politics in 1990 to pursue business interests involving marketing and public affairs ranging from the talent agency that represented Frank Sinatra to a Papal CD to traditional corporate business. Mr. Budowsky reengaged politically after 9-11 and informally advises both Democrats and Republicans. His politics are demonstrated in columns he occasionally writes. In a trilogy of essays in the Christian Science Monitor, Mr. Budowsky proposed after the contested 2000 election that both parties reach out for a new bipartisanship. He later proposed "Lets Make the Democrats the Patriot Party" and finally called in 2002 for a "Star Spangled" national unity ticket of Bob Kerrey and John McCain. Writing in the National Review Online (12/15/04) an essay titled "Reagan, Roosevelt, Rushmore" Mr. Budowsky called Presidents FDR and Ronald Reagan "the great bookends of freedom" who were the indispensable leaders in the victories over fascism and communism. Mr. Budowsky deplores the partisanship and divisions in American politics today and calls for a new bipartisanship necessary for a nation at war, facing what he believes is an inevitable terrorist WMD attack on American soil unless dramatic bipartisan initiatives are undertaken.


Seminar PE2: Political, Policy and Legal Issues
February 8, 14:00-16:45
Abstract

With a very real danger of a future terrorist attack on American soil using WMD there is an urgent need to restore a full bipartisan consensus on policy and appropriate "rules of engagement" between government and media. Intelligence and counter-terrorist policy must be holistic and comprehensive including increased support for human intel, improved protection of classified information, dramatically improved domestic homeland security practices, broad consensus balancing domestic investigative needs and protection of civil liberties, practices and tactics regarding detained prisoners, division of responsibilities and oversight for intelligence policy, and an "attitude adjustment" from both political parties seeking openness and consensus on the litany of leading issues. Regarding the facts of the pending "CIA Identities" ("Wilson") case I will propose going forward that government and media at least informally discuss a non-legislated Code of Ethics in which clear procedures would be established for editors to confirm prior to publication whether identity disclosure should be voluntary withheld.

Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 09:00-09:45
Abstract

Mr. Budowsky will call for a renewed spirit of bipartisanship between the political parties, and executive-legislative collaboration, appropriate for a Nation facing potential terrorist attacks employing WMD. Deplores politicization of intelligence by either party, calls for maximum sharing of information, maximum respect for confidentiality of classified information, and shared commitment to increased support for human intelligence and for risk taking spirit throughout intelligence community. This is fostered by maximum consensus, cooperation, and avoiding any partisanship which has been historically destructive. Executive-Legislative collaboration should create consensus on structural organization of intelligence responsibilities, notification and oversight of Congress, mutual confidence in good faith, executive avoiding tendencies to withhold information, legislative avoiding tendencies to leak classified information.

Jim Butterworth
Senior Forensic Consultant, Guidance Software, Inc.


 
Biography
With more than 12 years of hands-on experience in Network Security and Computer Forensics, Jim Butterworth provides Guidance Software clientele with top-level experience and technical support. His background as a certified Intrusion Analyst, vulnerability tester, perimeter defense technician, and first responder, has contributed to countless successful investigations and nicely complement the Guidance Software Incident Response Team. Butterworth has investigated global hacking and data mining incidents involving the defense industry; corporate theft of proprietary source code; Zero-day outbreak containment; intellectual property theft; e-mail spoofing; phishing expeditions; eDiscovery; evidence seizure; data recovery; corporate policy enforcement; Web defacement; harmful threat communications; and packet capture/analysis of unknown activity. Butterworth honed his diverse technological skill set while completing more than 20 years of distinguished and highly decorated service in the United States Navy. Seven of those years were spent fulfilling two tours in the Fleet Information Warfare Center the Navy Center of Excellence for Information Warfare.


Seminar PE1: Trends in Intelligence Technology
Securing Intelligence Networks
February 8, 16:15-17:00
Trends in Computer Forensics - Collection in the Networked World
Abstract

The proliferation of computers and networking technology has caused the computer forensic industry to rethink static computer forensic investigation. The days of seizing a computer hard drive and conducting analysis in the lab are numbered. Rapid and accurate collection of information requires that the computer forensic industry move to the enterprise environment. During this panel, Mr. Butterworth will discuss some of the challenges facing computer forensics technology and how the Industry is changing investigative and intelligence collection tools to address them. Topics of discussion will be how industry is coping with the emergence of larger storage devices and the popularity of removable storage; use of disk encryption software by targets to hide information; clandestine collection against highly mobile and remote targets; automating the collection effort to maximize collection opportunity; and dealing with foreign language in a digital environment. The ultimate objective of the presentation is to provide an understanding of how the computer forensic industry is dealing with challenges facing the collection of binary intelligence.

Sir John Chilcot
[Butler] Review of Intelligence on Weapons of Mass Destruction


 
Biography
Rt Hon Sir John Chilcot GCB is currently chairman, since 1999, of the B&CE (building and civil engineering) Group, with c. £1bn of assets, providing on a not-for-profit basis pensions, insurance, holiday pay and other benefits to the construction industry. B&CE is the largest supplier in the UK of stakeholder pensions to medium and low-earning workers. Chairman of the individual group companies, and of the linked Charitable Trust.

Staff Counsellor to the National Criminal Intelligence Service since 2002.

Chairman since 2001, of the Police Federation, the leading research foundation on policing in the UK.

Member, the National Archives Council (formerly the Lord Chancellor's Advisory Council on the Public Records) since 1999.

Trustee, the Police Rehabilitation Trust since 2002.

Director, Abraxa Ltd and NBW Ltd.

Other former appointments include: Member, Independent Commission on the Voting System, 1997-8; Chairman, First Division Pensioners Group, 1998-2002; Staff Counsellor for the Security and Intelligence Agencies, 1999-2004; seconded Director, Schroders, 1986-7; Director RTZ Pillar, 1986-90. Conducted reviews of Royal and VIP security, 1999, and the Castlereagh Special Branch break-in 2002-3.

Before retiring from the Civil Service at the end of 1997, as Permanent Under-Secretary of State at the Northern Ireland Office since 1990, he was Deputy Under-Secretary at the Home Office in charge of the Police Department, and served in a variety of posts in the Home Office, the Civil Service Department and the Cabinet Office, including Private Secretary appointments to the Home Secretary (Roy Jenkins, Merlyn Rees and Willie Whitelaw) and to the Head of the Civil Service (William Armstrong). CB, 1990; KCB, 1994; GCB, 1998. Privy Counsellor, 2004.

Born on 22 April 1939, he was educated at Brighton College and Pembroke College, Cambridge (Open Scholar; MA, English and Languages; Hon. Fellow 1999).


Seminar PE6: View from Abroad - Britain
February 8, 09:00-10:35


Track 1: Federal Civilian
FD4: Jointness: The New IC Buzzword
February 9, 15:00-15:45

LtCol. Bill Cowan, USMC (Ret)
CEO, WVC3 Group


 
Biography
A former Navy enlisted man, graduate of the U.S. Naval Academy, and retired Marine Corps officer, Bill spent three and a half years on combat assignments in Viet Nam, the majority in small unit operations, including extensive experience with the Central Intelligence Agency. In the 1980's he was specially selected to serve as one of the first members and as the only Marine at the time in the Pentagon's most classified counterterrorist unit, the Intelligence Support Activity (ISA). While there, he served as senior military operations officer and field operative on covert and clandestine missions into the Middle East, Europe, and Latin America.

Following retirement from the Marine Corps in 1985, he served two years on the staff of U.S. Senator Warren B. Rudman as a legislative assistant and as the Senator's primary staff assistant during the Iran/Contra hearings. He was also a principal drafter of the legislation creating the U.S. Special Operations Command in Tampa, FL.

From 1989 through 1994, he was again involved in numerous operations in the Middle East in response to terrorist incidents and the holding of Western hostages in Beirut and Kuwait. In 1990, on behalf of a major New York law firm and working with former CIA Director Bill Colby, he organized and successfully conducted a series of operations resulting in the repatriation of a number of Western hostages from Iraqi-occupied Kuwait.

In addition to appearing regularly on the Fox News Channel, he is CEO of wvc3, inc. (on the web at www.wvc3.com), a company providing homeland security services, support, and technologies to government and commercial clients.


Seminar PE5:
Finding and Keeping Intelligence Specialists
Spies - Intelligence Agents & Analysts
February 8, 09:00-11:30

Track2: DOD/Military
DM2: Military Collection Inside America
February 9
10:15-11:00

Craig Crawford
Congressional Quarterly


 
Biography
Craig Crawford is a special contributor to Congressional Quarterly and a news analyst for MSNBC, CNBC and "The Early Show" on CBS.


Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 14:00-14:45

Clara Conti
President and CEO
IPIX Corporation


 
Biography
Clara M. Conti joined IPIX Corporation in 2004 as president and chief executive officer. Ms. Conti has over 20 years in the information technology field as a leader, innovator and entrepreneur. Her executive level experience as a CEO has been documented in graduate level management textbooks as "value-based leadership". She is known for building management teams and raising the profile of growing companies.

Ms. Conti comes to IPIX from ObjectVideo, an intelligent video surveillance company, where she presided as President and CEO. She came on board to re-start the failing dot-com, and within 18 months she turned the company into the industry leader for intelligent video surveillance. She was responsible for building a world-class executive team and sales organization. During her tenure, the company received many awards including Top 10 Companies To Watch, by Federal Computing Week; and Best in Show from the International Security Conference. She was also featured in hundreds of magazines and newspapers. Ms. Conti raised Object Video's third round of venture funding, $22 million in total. The company worked extensively for the Department of Homeland Security and the Department of Defense and was awarded contracts to secure the Northern and Southern borders of the United States.

Prior to ObjectVideo, Ms. Conti was the President and CEO of Aurora Enterprise Solutions—a company she founded in 1992. Aurora was self-funded and never took on any debt. Aurora originally focused on government contracting and received several SBIR awards. Ms. Conti utilized her profits to develop Aurora's first commercial software product. She grew the company into a premier information security company with an authorization product called SOTERIA. The product was designed to address the security needs of the HIPAA legislation. Aurora worked with Department of Defense Health Affairs in order to secure medical records and meet the HIPAA regulations. The company was sold in 1999 in an all-cash deal to a Belgium firm, Ubizen.

Prior to her two successful ventures as an entrepreneur, Ms. Conti worked extensively in the Washington D.C. area as an information technology executive for both commercial organizations (MCI) and government contractors (SAIC) where her roles focused on program management and team leadership.

Ms. Conti has served on several boards in the Northern Virginia area including the Northern Virginia Technology Council and George Mason University School of Information Technology and Engineering. She is a graduate of the University of South Alabama where she attended on a full four-year scholarship.


Seminar PE1:
Trends in Intelligence Technology
The Visual Intelligence Space
February 8, 15:20-16:10
Moving Toward Total Situational Awareness
Abstract

In today's dynamic security environment real-time access to reliable visual intelligence is not an option - it's a requirement. The ability to have total situational awareness by having access to relevant visual data gives security professionals the ability to significantly enhance their decision making during critical situations.

A growing trend within visual intelligence technologies is the ability to immerse the viewer of surveillance video or still photography in a 360-degree sphere of visual information. These technologies can provide real-time data as well as the ability to navigate within recorded images for the purposes of forensic analysis.

This presentation will give participants a greater understanding of spherical 360-degree image processing technology and its applicability a broad range of security concerns.

Gordon Cucullu
Former Green Beret


 
Biography
Former Green Beret lieutenant colonel Gordon Cucullu has more than three decades of experience dealing with the tumultuous area of East Asia, including North and South Korea, Japan, Taiwan, China and Southeast Asian nations. He has written a best-selling new book called Separated at Birth: How North Korea became the Evil Twin published this past September. He is recognized as one of the leading authorities on the complex issues that pose a danger to us all from North Korea and the international War on Terror.

Gordon has for the past three years been a frequent guest on Fox News Channel discussing the War on Terror and the ramifications for America and our allies. During the War with Iraq, Gordon was the primary on-camera commentator for WABC Television, Channel 7 in New York City. He is a regular with national and local talk radio show hosts including such well-known WABC hosts as Monica Crowley, Steve Malzberg, John Bachelor and Steve Alexander. Gordon is a favorite guest of Linda Chavez on her talk show on Liberty Broadcasting. He has been a regular commentator for Laurie Morrow in Vermont and Mike Rose in Atlanta.

Gordon has addressed many audiences, large and small, on issues related to Asia. His expertise ranges from contemporary problems to complex geopolitical issues, from Americans doing business in Asia to America's new role on a world-wide stage. He combines an excellent knowledge of the history, culture, politics, military, business protocols and social values of the region with a great sense of humor. Gordon refines the complexities of a distant culture into understandable points welcome to an educated general audience.

Gordon has led a Green Beret A Team in the jungle mud of Asia and has briefed the Secretary of Defense in the E-Ring of the Pentagon. He managed military assistance to war-torn Central American republics in a tumultuous period. Because of the quality of his work he was selected for the highly competitive George Marshall Exchange Program and served in the Department of State as political military advisor for the assistant secretary of East Asia Pacific Affairs, at the time Paul Wolfowitz. After leaving the Army he has been a vice president for General Electric Aerospace based in Seoul and as the executive director of the Korea Society, a non-profit organization in Manhattan, rescued that organization from oblivion.


Seminar PE6:
View from Abroad - Asia
February 8, 10:45-11:30
The Continuing Crisis of North Korea.
Abstract:

For decades North Korea has posed the most serious threat of destabilization in Northeast Asia. While the regional powers have moved toward greater economic interdependencies since the fall of the Soviet Union, North Korea has continued to upset the political balance by blustering threats, open manufacture of weapons of mass destruction, and grotesque human rights abuses.

Since the mid-1990s with the coincidental signing of the Agreed Framework and the death of the original dictator Kim Il Sung, the situation has only grown more tense. Kim's son and successor Kim Jong Il violated the principles of the Agreed Framework from the outset by continuing to pour scarce resources into a nuclear development program. Meanwhile, the US and supporting nations of Japan, South Korea, Russia, and China propped up the decaying Kim regime through massive infusion of assistance. Tragically, little or none reached the starving people of North Korea but were diverted to the military and to the black market.

Hence we are faced in the early part of this century with a country that exists of an economy of crime and deceit: counterfeiting, drug manufacture and trafficking, export of banned missiles and technology, and sale of weapons of mass destruction are virtually the only sources of income for the faltering regime. Thought of implosion brings with it fear of massive refugee flow with attendant health and management problems, and the always-present possibility of irrational attacks on neighbors.

Gordon Cucullu will discuss these and other factors that brand the Kim Jong Il regime one of the world's most egregious human rights violators and a legitimate charter member of the Axis of Evil. Gordon has addressed many of these topics in his recent book Separated at Birth: How North Korea became the Evil Twin. He will discuss these topics and how we might address them - preferably without overt military action - during his presentation.

Dr. Philip H.J. Davies
Deputy Director, Brunel Centre for Intelligence and Security Studies
Brunel University (West London)


 
Biography
Dr. Philip H.J. Davies is Deputy Director and a founder of the Brunel Centre for Intelligence and Security Studies at Brunel University (West London) where is a lecturer in politics. He is the author of a detailed administrative history of the British Secret Intelligence Service(SIS, aka MI6) recently published as "MI6 and the Machinery of Spying" (London: Taylor and Francis, 2004) and co-author with Professor Anthony Glees of "Spinning the Spies: Intelligence, Open Government and the Hutton Inquiry" (London: Social Affairs Unit, 2004) as well as author of numerous articles in journals such as "Cambridge Review of International Affairs", "Harvard International Review" and "Intelligence and National Security", amongst others, dealing with issues such as intelligence, information warfare and research methods. Prior to his appointment to Brunel he was an Associate Professor in Strategic and International Studies at the University of Malaya in Malaysia. During his time in Malaysia he provided training consultancy to a number of Malaysian government agencies including their Department of Information and the Special Branch of the Royal Malaysian Police. He undertook first two degrees in Canada and his Ph.D. at Reading University in the UK, during which he was one of the founding convenors of the Security and Intelligence Group of the UK Political Studies Association.


Seminar PE6: View from Abroad - Britain
February 8, 09:00-10:35
Ideas of Intelligence and the Management of Intelligence
Abstract

"Intelligence" means profoundly different things in the British and American governments. In the British government, "intelligence" generally refers to clandestine collection, that is, as the Parliamentary Intelligence and Security Committee has put it, "acquiring more information than is openly available." In the United States, the broader sense is used, meaning all available information from open and covert sources once evaluated, interpreted, integrated and fused into an analytical whole. In British practice, the idea of "intelligence analysis" is almost meaningless. Assessment, as it is generally called, is the ordinary work of the Civil Service in its role of providing Advice to Ministers.

The purpose of intelligence is to provide information that the overt organs of the Civil Service cannot acquire from their overt sources. At the highest, national level, the Joint Intelligence Committee is essentially about providing nationally agreed Advice at the Cabinet level, pooling overt and covert sources in what has been called not intelligence assessment but "government assessment." The only exception in British practice is the Defense Intelligence Staff in the Ministry of Defense, but the professional analysts at DIS also provide expert assessment on matters like weapons of mass destruction and proliferation on a national level as well as for the Ministry of Defense. From the British point of view, the most divergent aspect of the American system is its competitive redundancy, with multiple agencies' performing parallel all-source assessments from a more or less common intelligence database. As a result, almost none of the accepted US thinking or conceptual toolkit can be effectively transposed to the British system.

Three other key differences between Britain and America intensify these lines of the divergence. The first is the relative strength of the Treasury, which will not pay for multiple groups' performing duplicate tasks in different Departments and Ministries. The next is that the Ministry of Defense is far weaker in the British government than is the DoD in the American system, added to the third difference, the fact that intelligence resourcing is via a national Single Intelligence Vote in which (line-item) funds go directly to the operational agencies and not to the parent Ministries that oversee them (the Home Office in the case of MI5 and the Foreign and Commonwealth Office for SIS and GCHQ). This reduces the conflict of interest between intelligence assessment and finance. But the budgetary constraints also force Britain's intelligence agencies and Civil Service departments to collaborate on the assessment process, which both depends on, and intensifies, the ethos of collegiality that allows the British system to be as closely integrated as it is.

Track 1: Federal Civilian
FD6: FBI vs. an American MI5
February 10, 10:15-11:00
Towards a National Counterintelligence Service: MI5 for America?
Abstract

Separating counter-intelligence from law enforcement is a lesson that all of America's allies in the 'Four Eyes' intelligence alliance have had to learn. Only America has failed to decouple counter-intelligence from national policing. Separating the two functions is essential not only for reasons of intelligence operational effectiveness but also for the protection of civil liberties. Providing a body, which has executive action (i.e. arrest) powers with the full range of national security-oriented intrusive intelligence methods as well is a recipe for disaster, as shown the experience of the Royal Canadian Mounted Police and Metropolitan Special Branch as well as the excesses of the FBI during the 1960s and early 1970s. Likewise, a police-ethos will also tend to suppress the kind of long-term, 'long game' thinking required for effective security intelligence, again as can be seen the UK and Canadian experiences. The US has successfully detached aspects of the Federal law enforcement brief from the FBI (e.g. DEA and ATF) and these are criminal law enforcement issues much closer to the Bureau's institutional heart than counterintelligence. Therefore there is far less reason not to decouple counter-intelligence as a separate agency as suggested originally in the 1997 National Institute for Public Policy report on national intelligence. The present crisis regarding religious militancy of both domestic and foreign origin makes an independent National Counter-Intelligence Service. Effective implementation of the NCIS model would also, however, require America taking to heart more general lessons from her allies concerning interagency collegial cooperation and network management structures. MI5 is most effective because of its collaborative relationship with the Special Branches of the assorted regional police forces in the UK, with Military policing and special investigation functions, and foreign intelligence generated by its JIC and JTAC partners such as the Secret Intelligence Service and Government Communications Headquarters. Unfortunately, the lack of collegiality and interagency collaboration represent one of the most persistent weaknesses of the US Intelligence Community, and their cultivation and institutionalization represents the single most important reform upon which any intelligence restructuring will ultimately succeed or fail.

Arnaud de Borchgrave
Senior Adviser and Director
Center for Strategic and International Studies

 
Biography
Expertise: U.S. foreign policy; current political trends in Europe, Asia, the former Soviet Union, the Middle East, and Africa; cyberspace; terrorism; global organized crime.

During a 30-year career at Newsweek magazine, Arnaud de Borchgrave covered most of the world's major news events. At 21, he was appointed Brussels bureau chief of United Press International, and three years later he was Newsweek's bureau chief in Paris. At 27, he became senior editor of the magazine, a position he held for 25 years. He was appointed editor in chief of the Washington Times and Insight magazine in 1985. He left his post with the Washington Times in 1991, and currently serves as its Editor-At-Large. He served as president and CEO of United Press International from 1999 to January 2001. He is currently serving as Editor-At-Large at UPI. His awards include Best Magazine Reporting from Abroad and Best Magazine Interpretation of Foreign Affairs. In 1981, de Borchgrave received the World Business Council's Medal of Honor, and in 1985 he was awarded the George Washington Medal of Honor for Excellence in Published Works. While at CSIS he has coauthored Cyber Threats and Information Security: Meeting the 21st Century Challenge (2001); Russian Organized Crime & Corruption: Putin's Challenge (2000); Cybercrime, Cyberterrorism, Cyberwarfare (1998); Russian Organized Crime (1997); and Global Organized Crime: The New Empire of Evil (1994).


Track 2: DOD/Military
DM6: Outsourcing or In-House?
February 10, 10:15-11:00

Joseph DeTrani
Special Envoy for Six-Party Talks


 
Biography
Joseph R. DeTrani was born in New York City and received his B.S. from New York University. He also attended NYU School of Law and NYU Graduate School of Business Administration. Mr. DeTrani was an officer in the U.S. Air Force and worked in the private sector as an economist before joining the CIA as an economic analyst. After serving as the Executive Assistant to Director William J. Casey, Mr. DeTrani was the Director of European Operations, Director of Technical Services, Director of Public Affairs, Director of the Crime and Narcotics Center and Director of East Asia Operations. He spent a number of years living in East Asia and the Middle East--Taiwan, Seoul, Hong Kong, Tehran, Rangoon and Beijing. Mr. DeTrani speaks Chinese and French.


Track 2: DOD/Military
DM1: Asia: the Next Assessment Crisis
February 9, 08:15-09:00
Abstract

The focus of Mr. DeTrani's presentation will be on the nuclear issue in North Korea and the need to resolve this issue. The regional and international implications of North Korea retaining a nuclear weapons capability will be discussed. An update and evaluation of the Six-Party process will be presented, with some commentary on the likelihood of North Korea returning to the Talks for substantive discussions. China's emergence as a regional and global player will be discussed, with some commentary on domestic issues requiring leadership attention. The importance of ASEAN and other regional alliances as the region addresses issues as diverse as terrorism and trade will also be discussed.

John Deutch
Former Director, CIA


 
Biography
The formidable John Deutch was only the second director of the Central Intelligence Agency to hold Cabinet rank. Dr. Deutch was nominated by President Clinton and sworn in as Director of Central Intelligence following a unanimous vote in the Senate. Noted for his quick-draw style of leadership, his arrival at the CIA heralded an era of unequaled openness and much needed reform.

Time magazine wrote during his tenure, "Deutch is becoming the most powerful CIA chief ever." As head of the Intelligence Community, he directed all foreign intelligence agencies of the United States and directed the Central Intelligence Agency.


Keynote Address KA2: Intelligence disorganization: Where is the Community heading?
February 10, 09:15-10:00
Intelligence disorganization: Where is the Community heading?
Abstract

The Intelligence Reform and Terrorism Prevention Act of 2004 is the result of the 9-11 Commission and other Congressional and Executive Branch inquires into recent intelligence shortcomings. The Reform act contains major uncertainties for future operation of the Intelligence Community. These uncertainties will not be resolved for at least a couple of years and the final outcome for improving Intelligence Community performance in supporting the foreign policy leadership, military operations, and law enforcement is in considerable doubt.

Sheldon Drobny
CEO, Air America


 
Biography
Sheldon Drobny co-founded Air America Radio with his wife, Anita, then sold it to a group of investors in November 2003. He returned to help rescue the company after its launch in March 2004. AAR now reaches millions of listeners on 40 stations and through XM Satellite Radio and Sirius Radio, the nation's two premiere satellite networks.

Drobny is founder, chairman and principal of Paradigm Group II LLC, an investment firm with more than $200 million of capital in more than 40 companies. Drobny, a certified public accountant, is one of only 173 non-attorneys admitted to practice before the U.S. Tax Court since its inception in 1942. He has a bachelor's of science degree in Business Administration and is author of numerous tax-related articles. Early in his career he served as supervisor of the IRS Technical Review Staff and has been a directing instructor for the Becker CPA Review Course and a lecturer at New York University's Advanced Taxes Study Group, as well as various tax seminars in the Chicago area. Drobny was a managing partner for many years in a public accounting and consulting firm and is affiliated with the American Institute of Certified Public Accountants and the Illinois CPA Society. He is benefactor of the Sheldon and Anita Drobny Interdisciplinary Program for the Study of Jewish Culture and Society at the University of Illinois; member of the University of Illinois Foundation; member of the Woodrow Wilson Council of the Woodrow Wilson International Center for Scholars; and member of the International Leadership Council of the Simon Wiesenthal Center.


Seminar PE8: Getting the Public Involved
Role of the Media
February 8, 09:50-10:35
PERCEPTION OR REALITY?
Abstract


1. WW II AND THE COLD WAR-VIDEO-STEPHEN AMBROSE
2. NS ACT OF 1947 AND CREATION OF CIA-VIDEO-GORE VIDAL
3. POLITICALIZATION OF INTELLIGENCE AND THE MEDIA 1947-1989
4. COLLAPSE OF THE USSR-CONSEQUENCES 1990-2001
5. FAILURE OF INTELLIGENCE-9/11 AND IRAQ 2001-PRESENT
6. REPAIRING THE IMAGE-DE-POLICALIZATION OF INTELLIGENCE

Dr. Rachel Ehrenfeld
Consultant to State and Defense Departments


 
Biography
Dr. Rachel Ehrenfeld's new book Funding Evil; How Terrorism is Financed and How to Stop It, Bonus Books, 2003, 2005). She is the director of the New York-based American Center for Democracy, and the Center for the Study of Corruption & the Rule of Law. Her previous book are: Evil Money, Encounters Along the Money Trail (HarperCollins in 1992, SPI, 1994), and Narco-Terrorism; How Governments around the World used the Drug Trade to Finance and Further Terrorist Activities (Basic Books, 1990&1992). Dr. Ehrenfeld is a commentator and consultant on the problems of terror financing, international terrorism, political corruption, money laundering, drug trafficking, and organized crime and the connections that binds these groups together. She's currently working on a new book on the Islamist penetration of the US and Western economies.

Dr. Ehrenfeld has lectured on these issues in many countries, and has advised banking communities, law enforcement agencies, and governments in many countries, including the U.S. Defense Department's Threat Reduction Agency. She testified before the European Parliament on how the Palestinian Authority uses aid money to fund its terror activities, provided evidence to the UK Parliament on the corruption of the PA, and testified before the U.S. Congress on terrorism related issues.

Dr. Ehrenfeld's articles appear in the Wall Street Journal, The Washington Times, the National Review, the Euobserver, The Jerusalem Post, The NY SUN, and the L.A. Times. She appears as an expert commentator on television and radio news programs, including The O'Reilly Factor, Fox News, CNN, ABC, NBC, and MSNBC.

Dr. Ehrenfeld worked as a research scholar at New York University School of Law, a visiting scholar at the Columbia University Institute of War and Peace Studies, and as a fellow at Johns Hopkins's SAIS. Her Ph.D. in Criminology is from the Hebrew University School of Law.


Seminar PE7: Sharing Intelligence, Part 1
February 8, 09:00-11:30

The Role of Money in Jihad
Abstract:

We are concentrating on ways in which we can improve our intelligence sharing. However, there is little discussion about the possibility that our national secrets have been exposed to the very enemies we are trying to defeat. When referring to the enemy's money we are usually concerned with how the terrorists collect the funds they need. Equally, if not more disturbing, however, is the possibility that terrorists may be using their money to buy into our national infrastructure in order to undermine our economy and security from within, thus fulfilling Bin Laden's promise to undermine our economic infrastructure. This presentation will focus on one such case study.

 

Seminar PE6: View from Abroad - Israel
February 8, 15:00-15:45
The Role of Money in Jihad
Abstract:

To win the war on terrorism we need to understand the role that money in itself has as part of the Jihad that was declared against America. Unless we understand that it is not enough to stop the money that funds terrorism but what Jihad bil-Mal is, we will fail to adequately fight this war.

Steven Emerson
Executive Director, The Investigative Project
Veteran Terrorism Expert
NBC News Consultant


 
Biography
Steven Emerson is an internationally recognized expert on terrorism and national security and considered one of the leading world authorities on Islamic extremist networks, financing and operations. He now serves as the Executive Director of The Investigative Project, one of the world's largest archival data and intelligence on Islamic and Middle Eastern terrorist groups. Mr. Emerson and his staff frequently provide briefings to US government and law enforcement agencies, Members of Congress and Congressional committees, and print and electronic media, both national and international. Since 9-11, Mr. Emerson has testified and briefed Congress dozens of times on terrorist financing and operational networks of Al Qaeda, Hamas, Hizzbollah, Islamic Jihad, and the rest of the worldwide Islamic militant spectrum.

Mr. Emerson is the author of five books on terrorism and national security, most recently of the national best seller, American Jihad: The Terrorists Living Among Us (Free Press). He and his organization have been quoted or profiled in hundreds of newspaper and television stories since 09-11. He now serves as NBC's terrorism analyst.

Mr. Emerson started The Investigative Project in late 1995, following the broadcast of his documentary film, Jihad in America, on Public Television. The film exposed video of clandestine operations of militant Islamic terrorist groups on American soil. For the film, Mr. Emerson received numerous awards including the George Polk Award for best television documentary, one of the most prestigious awards in journalism. He also received the top prize from the Investigative Reporters and Editors Organization (IRE) for best investigative report in both print and television for the documentary. The award from the IRE was the fourth such award he had received from that group. The documentary, which was excerpted on 60 Minutes, is now standard viewing for federal law enforcement and intelligence organizations.

Mr. Emerson is recognized as having been the first and only terrorist expert to have testified and warned about the threat of Islamic militant networks operating in the United States and their connections worldwide. He specifically warned about the threat of Osama Bin Laden's network in pioneering Congressional testimony delivered in 1998. Nearly every one of the terrorist suspects and groups first identified in his 1994 film have been indicted, prosecuted or deported since 9-11. Because of security threats, Mr. Emerson now lives under false cover in the United States.

Mr. Emerson has authored or co-authored five books: American Jihad: The Terrorists Living Among Us (Free Press, 2002); Terrorist: The Inside Story of the Highest-Ranking Iraqi Terrorist Ever to Defect to the West (Villard/Random House, 1991); The Fall of Pan Am 103: Inside the Lockerbie Investigation (Putnam, 1990); Secret Warriors: Inside the Covert Military Operations of the Reagan Era (Putnam, 1988); and The American House of Saud: The Secret Petrodollar Connection (Franklin Watts, 1985).

In a feature article on Emerson in Brown Alumni Magazine (November-December 2002), former head of NSC Counterterrorism Richard Clarke said, "I think of Steve as the Paul Revere of terrorism ... [Clarke] credits Emerson with repeatedly warning of Al Qaeda sleeper cells in the United States. He adds that he would attend Emerson's speeches whenever possible because 'we'd always learn things we weren't hearing from the FBI or CIA, things which almost always proved to be true.'"

In that same feature article, Andrew McCarthy, Assistant U.S. Attorney who prosecuted the 1993 World Trade Center bombings, said ".Emerson was helpful in preparing to cross-examine defense witnesses in the [1993 World Trade Center bombings] case...He's a valuable source of information and knowledge. And in terms of trying to find places to look for evidence, he's a very good person to talk to. He's got a lot of insight."

Robert Blitzer, former Chief of the FBI's Domestic Terrorism/Counter-Terrorism Planning Section, has said, "Steve Emerson has tremendous information and I have no doubt that he is better informed in many areas of terrorism than we were in the government."

In his speeches, Steven Emerson holds audiences spellbound as he reveals the frightening extent of the worldwide terrorist network in the United States. Now recognized as perhaps the foremost expert in the world on terrorism, Mr. Emerson captivates is audiences with hitherto unknown information on terrorist cells, operating from Boston to San Diego, on behalf of bin Laden, Hamas and Hizzbollah. Mr. Emerson provides mesmerizing first hand accounts of secret terrorist meetings, training, recruitment and above all else--deception of law enforcement and the media--going far beyond the accounts published in his new best-seller, American Jihad: The Terrorists Living Among Us. Consulted by the White House, National Security Council, FBI, Justice Department, Congress and intelligence agencies, Mr. Emerson is in great demand today re as one of the most astute, insightful and knowledgeable experts in the world today on the threat and prospects of militant Islamic terrorism.


Track 3: State and Local Law Enforcement
SL5: Convergence of Islamic Terrorist Groups
February 10, 08:15-09:00



Bruce Fein
Syndicated columnist, Washington Times
Former U.S. Deputy Attorney General

 
Biography
Bruce Fein is a nationally acclaimed expert on constitutional law. He commands more than 25 years' experience in legal fields ranging from antitrust to communications to national security law. He is former Associate Deputy Attorney General in the Department of Justice and former General Counsel of the Federal Communications Commission. He also served as Research Director for the Minority on the Joint Congressional Irancontra Committee, and at the Justice Department as Assistant Director in the Office of Legal Policy and Special Assistant to the Assistant Attorney General for Antitrust. He has been a Visiting Fellow for Constitutional Studies at the Heritage Foundation, an Adjunct Scholar at the American Enterprise Institute, and frequent lecturer on constitutional and communications law for Brookings Institute.

Both parties in Congress have repeatedly summoned Mr. Fein for testimony on such issues as the confirmation of Supreme Court Justices, flag burning, the Victims' Rights Amendment, Helms-Burton law, and the executive powers of the President. He has advised approximately two dozen countries in revising their constitutions, from South Africa to Hungary to Russia to Mozambique. Mr. Fein is a media fixture. He is a weekly columnist for the Washington Times and a guest columnist for USA Today. According to the National Law Journal, he is one of the seven most quoted attorneys in the nation. He regularly appears on national radio and television, including National Public Radio, Face the Nation, C-SPAN, CNN, MSNBC, and the Diana Rheem Show. He is a monthly staple on the Armstrong Williams Show discussing law, morals, and ethics. He has been featured on the cover of the American Bar Association Journal. In addition to the Washington Times and USA Today, his columns have been carried in the New York Times, the Washington Post, the Los Angeles Times, Legal Times, the American Bar Association Journal, the National Law Journal, and the District of Columbia bar journal. His law review articles have been published in the Harvard Law Review and elsewhere. He has addressed conferences of the United States Circuit Courts and regularly speaks before esteemed legal audiences. He was Executive Editor of the World Intelligence Review for several years.

Mr. Fein graduated Phi Beta Kappa from the University of California at Berkeley in 1969, cum laude from Harvard Law School in 1972, and then clerked with United States District Judge Frank A. Kaufman in the District of Maryland. He serves as general counsel for a public interest organization, Legal Affairs Council, and is an adjunct scholar and general counsel with the Assembly of Turkish American Associations. He is a member of the bars of the District of Columbia, the United States Supreme Court, and several other federal courts.


Seminar PE2: Political, Policy and Legal Issues
February 8, 09:00-11:30
Abstract

Mr. Fein's presentation will elaborate on the requirements of the torture convention, domestic laws punishing torture and related techniques, and other techniques that may violate international or domestic law. The presentation will further examine the usefulness in seeking reliable statements from coercive interrogation techniques.

Track 1: Federal Civilian
FD3: The International Intelligence Community
February 9, 14:00-14:45
The International Intelligence Community
Abstract

Everyone underscores the utility of international intelligence sharing in the war against global terrorism, but few have seriously examined what compromises the United States should make in pursuing parallel national security or foreign policy objectives to secure such cooperation and to avoid creating more terrorists than are killed or captured. The United States, for example, generally champions religious freedom abroad. Should it nonetheless remain silent about the flagrant religious discrimination in Saudi Arabia to elicit at least some cooperation in fighting Al Qaeda or detecting the villains who bombed the Khobar towers? A similar dilemma confronts the United States in Pakistan: should it overlook its disgraceful record on nuclear proliferation and President Pervez Musharraf's autocratic powers in exchange for his assistance in defeating Al Qaeda and shutting down madrassas which breed Islamic terrorists. Mr. Fein's presentation will elaborate an intellectually coherent approach to balancing international intelligence sharing with competing national security and foreign policy goals of the United States.

Bill Fiora
President, Outward Insights


 
Biography
Bill Fiora is a president and founder of Outward Insights, LLC. A leading strategy and competitive intelligence consulting firm. There, he helps companies build and improve their ability to deliver actionable intelligence to senior executives. He is a member of the board of directors of the Society of Competitive Intelligence Professionals and a former CIA analyst.


Track 4: Business
BN1: What Government and Business Intelligence Pros Can Learn From Each Other
February 9, 08:15-09:00
What Government and Business Intelligence Pros Can Learn From Each Other
Abstract

Conventional wisdom presumes that government intelligence professionals are more advanced than their corporate peers in the sophistication of their techniques and deliverables. In recent years, however, business intelligence practitioners have become arguably more skilled in areas such as developing innovative analytic techniques, delivering intelligence tailored to decisionmakers' needs, and in building closer relationships with corporate intelligence consumers. In this presentation, two professionals who work to help both business and government intelligence professionals improve their analytic skills will discuss the areas in which business and government intelligence can learn from each other, and propose ways in which this exchange of ideas should take place.

Frank J. Gaffney, Jr.
President & CEO
The Center for Security Policy


 
Biography
Frank Gaffney is the founder and president of the Center for Security Policy in Washington, D.C. The Center is a not-for-profit, non-partisan educational corporation established in 1988. Under Mr. Gaffney's leadership, the Center has been nationally and internationally recognized as a resource for timely, informed and penetrating analyses of foreign and defense policy matters.

Mr. Gaffney also contributes actively to these debates in his capacity as a columnist for the Washington Times, Jewish World Review and TownHall.com. He is also a contributing editor to National Review Online. He is a featured weekly contributor to Hugh Hewitt's nationally syndicated radio program and the Monica Crowley Show on WABC and appears frequently on national and international television and radio programs. In addition, his op.ed. articles have appeared, among other places, in The Wall Street Journal, USA Today, The New Republic, The Washington Post, The New York Times, The Christian Science Monitor, The Los Angeles Times, and Newsday.

In April 1987, Mr. Gaffney was nominated by President Reagan to become the Assistant Secretary of Defense for International Security Policy, the senior position in the Defense Department with responsibility for policies involving nuclear forces, arms control and U.S.-European defense relations. He acted in that capacity for seven months during which time, he was the Chairman of the prestigious High Level Group, NATO's senior politico-military committee. He also represented the Secretary of Defense in key U.S.-Soviet negotiations and ministerial meetings.

From August 1983 until November 1987, Mr. Gaffney was the Deputy Assistant Secretary of Defense for Nuclear Forces and Arms Control Policy under Assistant Secretary Richard Perle. From February 1981 to August 1983, Mr. Gaffney was a Professional Staff Member on the Senate Armed Services Committee, chaired by Senator John Tower (R-Texas). In the latter 1970's, Mr. Gaffney served as an aide to the late Senator Henry M. "Scoop" Jackson (D-Washington) in the areas of defense and foreign policy.

Mr. Gaffney holds a Master of Arts degree in International Studies from the Johns Hopkins University School of Advanced International Studies and a Bachelor of Science in Foreign Service from the Georgetown University School of Foreign Service.


Seminar PE4: Reforming the Intelligence Community
February 8, 14:00-16:45

Shawn Geddis
Security Consulting Engineer
Apple Computer, Federal
Chairman, [STOS] Secure Trusted Operating System Consortium


 
Biography
Shawn Geddis came to Apple Computer, Inc. in 1998 after 8 1/2 years as a US Federal Government Defense Contractor with 5 1/2 of those years at DARPA supporting and defending the network infrastructure. As a Security Consulting Engineer on the Apple Federal Team, Shawn has extended Apple Computer's collaboration with the US Federal Government on protecting their networks. In addition to his work at Apple, Shawn is also the co-founder and currently the Chairman of the [STOS] Secure Trusted OS Consortium [http://www.stosdarwin.org/] which was founded in 1999 with its first Symposium in August of 2000. The Secure Trusted OS Consortium is a focused group from Public, Private & Academic sectors openly collaborating to enhance the security of Darwin / BSD and related projects.


Seminar PE1: Trends in Intelligence Technology
Securing Intelligence Networks
February 8, 09:00-09:40
Securing Intelligence Networks with Security at the Core. Security: Built In, Not Bolted On!
Abstract

With dreams of "Trustworthy Computing" and "Pervasive System Security" is there really any commercial OS vendor doing anything to help us get there? am I really safe and at what cost? The international community has become painfully aware that better operating system security is a necessity and not a luxury. Worldwide computer system attacks and compromises are on a sharp rise, but what defenses can help?

Applications and system services must be built on solid, security-focused foundations. Operating Systems must have security built in from the ground up and not have it bolted on as an afterthought. No operating system is perfect or bullet-proof, but there has to be something better.

Reuel Marc Gerecht
Resident Fellow, American Enterprise Institute
Former CIA


 
Biography
Gerecht studies Afghanistan, Central Asia and the former Soviet Union, intelligence, Iran, the Middle East, and terrorism. He was formerly a Middle Eastern specialist for the Central Intelligence Agency,1985-1994.

Professional Experience
- Director, Middle East Initiative, The Project for the New American Century, 2001
- Risk assessment consultant (Middle East, Central Asia, and the former Soviet Union), Walsingham Inc., 1999-2001
- Consultant on Afghanistan, CBS News, 1999-2000
- Freelance writer, 1994-2001
- Political and consular officer, U.S. Department of State, 1985-1994
- Middle Eastern specialist, Central Intelligence Agency,1985-1994

Education
- M.A., Islamic history, Princeton University
- The American University of Cairo and Cairo University
- University of Edinburgh, The Muir Institute of Islamic Studies
- B.A., History, Johns Hopkins University


Seminar PE4: Reforming the Intelligence Community
February 8, 09:00-17:00



Farid Ghadry
President of the Reform Party of Syria


 
Biography
Mr. Farid N. Ghadry was born in Aleppo in northern Syria on June 18 of 1954. He comes from a prominent Syrian family that includes many politicians and civil servants who served in Syria. In 1964, the family emigrated to Lebanon because of political turmoil and settled in Beirut where Mr. Ghadry attended the Maristes Brothers School (Champville - Deek-el-Mehdi) In 1975, the Ghadry family, once again, emigrated to the US and settled in the suburbs of Washington DC.

Mr. Ghadry graduated from the American University in Washington DC in 1979 with a degree in Finance and Marketing. He worked at EG&G, Intertech, Inc., a subsidiary of EG&G, Inc., a Fortune 500 U.S. defense contractor, for two years before starting his own business in 1983 called International TechGroup, Inc. Mr. Ghadry sold his business in 1989 and has been involved in many entrepreneurial operations since.

Mr. Ghadry, because of his father's work, was granted the Saudi citizenship. The passport was confiscated by the Saudi embassy in Washington because of his stand on democratic reforms in Saudi Arabia during the Iran-Contra in 1987 and in the last several years.

In October of 2001, Mr. Ghadry, along with several American-Syrians, hatched the idea of the Reform Party of Syria. A constructive and comprehensive program has been put in place to bring regime change to Syria.

Mr. Ghadry and the co-founders of RPS are hoping to return to Syria one day to rebuild the country on the basis of principles of economic and political reforms that will usher democracy, prosperity, freedom of expression, and human rights in addition to lasting peace with open borders with all of Syria's neighboring countries including Israel.

Mr. Ghadry has been invited to speak at the Washington Institute for Near East Policy, Johns Hopkins University (SAIS), Harvard University, University of Virginia, the European Parliament, the French Parliament, and the Belgian Senate.

Mr. Ghadry is married to Ahlam Ghadry and has four children. He has served on the Board of Trustees of Norwood School in Bethesda, MD and heads the Capital Campaign for a sport program at St. Albans and National Cathedral Schools.


Seminar PE6: View from Abroad - Syria

February 8, 14:00-14:45

Syrian Intelligence Tactics in Suppressing the Rise of a New Middle East
Abstract

Three-prong strategy

1) The Iraq Factor
Deep intelligence covers are hiding and assisting Iraqi insurgency. Supplying funds that some of which is channeled through the Commercial Bank of Syria. Also, gold bullion and US dollars left Baghdad three days before the war in trucks is used to supplement the insurgency. I bring up Mustapha al-Tajer story: Killed by Ghazi Kanaan for embezzling Iraqi funds earmarked for insurgency. Syrians intelligence is building Terror schools in the Beka'a valley ready to move into action.

2) Stop at all costs dissidence abroad
Foreign intelligence services monitoring opposition and dissident groups. Afraid that Chalabi-like can exist to bring their downfall from outside. Embassy staff intimidate and unite under "Syrian Cultural Clubs" phenomena that Syrians think it is just so when in fact, they are monitoring and suppressing stations for Syrians in the Diaspora.

3) Intimidate population. Show usefulness.
Interior intelligence services suppress and intimidate the population at large. They also collect information that they us sparsely to convey to western nations to show goodwill. Reality is that there are webs of extremism allowed to operate in Damascus and used to show the Americans that Syrian Ba'athists are useful. They create the enemy, and then kill it to find themselves in the good graces of the international community.

Rebecca Givner-Forbes
Terrorism Research Center


 
Biography
Rebecca Givner-Forbes is an intelligence analyst at the Terrorism Research Center. She focuses on terrorist groups sourced in the Arab world and Middle Eastern regional security in general. Her work includes translation and analysis of al-Qaeda and other terrorist statements and Arabic media. She graduated cum laude from the Edmund A. Walsh School of Foreign Service at Georgetown University with a major in International Politics, concentrating in International Security. She studied Arabic at Georgetown and in Cairo, Egypt and Damascus, Syria. Previously, Rebecca worked at the National US-Arab Chamber of Commerce as an Arab-world business and economics analyst.


Seminar PE5: Finding and Keeping Intelligence Specialists - Translators
February 8, 15:00-16:45

Joseph Goldberg
Director of Corporate Business Intelligence, Motorola


 
Biography
Joe is Director, Business Intelligence in Motorola's Corporate Strategy Office. He is responsible for the business intelligence processes and competitive analysis and collection on a worldwide basis. He has been at Motorola since 1993 in this, and related, positions. Prior to joining Motorola, he worked for the Central Intelligence Agency for eight years where he was involved in all facets of intelligence collection, analysis, and dissemination. Before joining the government, Joe worked in the Media and Business Research departments of Frank N. Magid & Associates, a leading media research and consultation firm. Joe has been a Society of Competitive Intelligence Professionals (SCIP) member since 1994.

He received Bachelor of Arts degrees in Political Science, and Communications and Theater Arts, from the University of Iowa, and a Master of Arts degree from Iowa in Communications and Theater Arts.


Track 4: Business
BN2: Identifying Analytical Aptitudes in Business Intelligence Professionals
February 9, 10:15-11:00
Identifying Analytical Aptitudes in Business Intelligence Professionals
Abstract

A critical issue facing intelligence professionals in businesses is ensuring that the individual has the skill set and qualities to do the job. A person who desires to make business intelligence a long-term career must understand their unique competencies and functional characteristics to survive. They need to uncover the core competencies, which make up a BI person - competencies, when correctly trained, successfully link collection, analysis and decision-making. We will examine the process used at one of the world's leading corporate business intelligence programs - Motorola, Inc.

Jan Goldman
Joint Military Intelligence College, DIA


 
Biography
Jan Goldman is a Professor of Strategic Warning and Threat Management at the Joint Military Intelligence College, and a lecturer at other government agencies and schools. He is the author or editor of several publications to include the recently declassified, Anticipating Surprise: Analysis for Strategic Warning (nominated for the Francis Parkman Prize), and a forthcoming book on ethics and intelligence. His experience includes crisis management, intelligence support to counter-terrorism operations, counter-insurgency operations, and space operations.


Seminar PE5: Finding and Keeping Intelligence Specialists - Training
February 8, 14:00-14:45
Training
Abstract

Mr. Goldman discusses the role of training and education as it relates to keeping and maintaining intelligence analysts with the proper analytical tools and technology in the asymmetrical threat environment. He sees the expansion of intelligence programs at colleges and universities in the U.S. and Canada, as both a blessing and a curse. Students are entering the field better trained and educated for their career but that their expectations are not always met; meanwhile, government institutions must compete for the best and the brightest students and faculty in a field they once monopolized. Finally, Goldman sees the intelligence field being strengthened by this competition, which he believes may eventually lead to the formal professionalization of the intelligence occupation.

Jamie Gorelick
9/11 Commission


 
Biography
Ms. Gorelick is a partner at Wilmer, Cutler, Pickering, Hale & Dorr . Prior to joining Wilmer, Cutler, Pickering, Hale & Dorr in July 2003, Gorelick was vice chair of Fannie Mae. As part of the four-person Office of the Chairman, she shared responsibility for overall management of the company, directed its efforts to reach underserved markets and oversaw Fannie Mae's external relationships, legal and regulatory affairs. Prior to joining Fannie Mae in May 1997, Gorelick was deputy attorney general of the United States, a position she assumed in March 1994. From May 1993 until she joined the Justice Department, Gorelick served as general counsel of the Department of Defense. From 1979 to 1980 she was assistant to the secretary and counselor to the deputy secretary of energy. In the private sector, from 1975 to 1979 and again from 1980 to 1993, Gorelick was a litigator in Washington, D.C., representing major U.S. companies on a broad range of legal and business matters.


Seminar PE4: Reforming the Intelligence Community
February 8, 09:50-10:35
Abstract

Now that the 9/11 Commission's recommendations have prompted legislation, the question is how that legislation will be implemented, how it will iterate, and how the current structures will adjust to the demand of Congress and the President for a more cooperative and integrated intelligence community.

Senator Slade Gorton
9/11 Commission


 
Biography
Slade Gorton is of counsel at Preston Gates & Ellis LLP. Prior to joining the firm, he represented Washington State in the United States Senate in 1980-1986 and 1988-2001. While in the Senate, Gorton served on the Appropriations, Budget, Commerce, Science and Transportation, and Energy and Natural Resources Committees. He served as chairman of the Interior Appropriations Subcommittee (1995-2001), the Commerce Subcommittees on Consumer Affairs (1995-99), and Aviation (1999-2000). He was also a member of the Republican leadership as counsel to the Majority Leader (1996-2000) and a member of National Commission on Terrorists Attacks Upon the United States from 2002-2004. Gorton began his political career in 1958 as a Washington state representative; he went on to serve as State House majority leader. In 1968, he was elected attorney general of Washington state, where he argued 14 cases before the Supreme Court. Gorton also served on the president's consumer Advisory Council (1975-77) and on the Washington State Criminal Justice Training Commission (1969-1981).


Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 09:00-11:35

Jonathan Halevi
Jerusalem Center for Public Affairs
Former Israeli IO


 
Biography
Jonathan D. Halevi is a former career Israeli intelligence officer and advisor for policy planning in the Israeli Ministry of Foreign Affairs. Mr. Halevi today works as a researcher in Middle East politics for the Jerusalem Center for Public Affairs, headed by former Israeli UN Ambassador Dore Gold and consults on Middle East and Arab affairs to the Wall Street Journal and other publications. He is also special consultant to the Linde vs. Arab Bank lawsuit. Mr. Halevi has written many articles for both Hebrew and English publications including "Al-Qaeda's Intellectual Legacy: New Radical Islamic Thinking Justifying the Genocide of Infidels".


Seminar PE6: View from Abroad - Israel
February 8, 15:00-15:45

Al-Jihad Bi-al-Mal: If not by your sword, then by your money
Abstract

The Jihad is not only an expression of violent action against the infidels, but comprises diverse acts every Moslem is commanded to perform in sustaining the Jihad. Radical Islamic terror groups use the concept of Jihad Bi-al-Mal (the financial Jihad) to solicit funds from across the Muslim world. Hamas, in particular, citing Quranic verses, promise the rewards of Jihad and Martyrdom to its wealthy and not-so-wealthy financial donors. Hamas social infrastructure is an integral component of its terrorist operation and therefore the financial support transferred to "humanitarian" purposes is funneled directly and indirectly to sustaining the Jihad. International Intelligence cooperation is vital in order to liquidate Hamas financial resources worldwide.

 

Track 1: Federal Civilian
FD3: The International Intelligence Community
February 9, 14:00-14:45

Greg Halpern
CEO, Circle Group


 
 
 
Seminar PE1: Trends in Intelligence Technology - UAV vs. Satellite
February 8, 14:00-15:15

Tom Harb
Chairman, Commission on International Relations


 
Biography
World Lebanese Cultural Union (WLCU). The WLCU is the legitimate representative of the Lebanese Diaspora of 12 million people. It is an INGO. M Harb, Florida-based, is the "Foreign Minister" of the Lebanese Diaspora institution. He coordinates with the State Department and the UN on disarming Hizbollah according to UNSCR 1559.


Seminar PE6: View from Abroad
Lebanon
February 8, 16:30-16:45


Hon. Alcee Hastings (D-FL)
House Permanent Select Committee on Intelligence


 
Biography
Congressman Hastings is a member of the powerful House Rules Committee and is a senior Member of the House Permanent Select Committee on Intelligence (HPSCI). On the HPSCI, Hastings is the Ranking Democratic Member of the Subcommittee on Terrorism and Homeland Security. The Terrorism Subcommittee is the primary committee in Congress which has direct oversight of the programs and activities of the intelligence community that relate to U.S. homeland security and to counterterrorism, including capabilities, resources, policies and procedures.


Track 5: Private Sector
PS5: Recruiting Minorities
February
Mobilizing Minorities for Homeland Security
Abstract:


Rep. Hastings will address the importance of diversity in the Intelligence Community, implementation of the Intelligence Reform and Terrorism Prevention Act of 2004, and the interaction between the Legislative and Executive Branches on national security matters.

David W. Henderman, Jr.
Knowledge Transfer Director
International Association of Counterterrorism & Security Professionals
President of OSI Network

 
 
 
Seminar PE7: Sharing Intelligence - Part 2
February 8, 14:00-16:45

Charles Intriago
Publisher, Money Laundering Alert


 
Biography
One of the leading authorities on money laundering in the world, Charles A. Intriago spent ten years in government service in the United States, as a federal prosecutor in Miami, as chief counsel to the U.S. House of Representatives' Government Operations Subcommittee on Legal and Monetary Affairs, and as special counsel on organized crime to Governor Reubin Askew of Florida. After his government service, he practiced law in Miami and was an equity partner of the international law firm, McDermott, Will & Emery.

In 1989, Mr. Intriago, as founder and president of Alert Global Media, Inc., launched Money Laundering Alert, a Miami-based monthly publication that is the world's leading source of information, guidance and analysis on money laundering and terrorist financing issues, including the money laundering-related provisions of the USA Patriot Act of October 26, 2001.

In 1995, Mr. Intriago launched the website, www.moneylaundering.com, followed by the Spanish language website, www.lavadodinero.com. The websites are leading Internet sources of money laundering information and serve as training resources for banking, governmental and other organizations. They are known widely in government and financial sectors in the world as premier sources of information on money laundering matters. These information sources are read by many leading major banks, securities dealers and other financial institutions, as well as by central banks and regulatory and law enforcement agencies.

Money Laundering Alert's annual international money laundering conference in South Florida is the largest and most acclaimed in the world. The most recent conference, in February 2004, drew 972 attendees from 54 countries. The next one, at the Diplomat Resort & Spa, in Hollywood, Florida, from March 2 to 4, 2005, is on track to draw more than 1,000 attendees.

In 2002, Mr. Intriago founded the Association of Certified Anti-Money Laundering Specialists, which provides certification to persons who work in the anti-money laundering field in the public and private sectors and who pass an examination constructed by an independent firm of psychometricians. As of December 2004, ACAMS had 2,200 members in 91 countries.

Mr. Intriago is often quoted in major newspapers and frequently appears on television programs around the world. In the United States, he has appeared on 60 Minutes, Frontline, CNN and on all networks in connection with money laundering and terrorist financing issues. He is a frequent lecturer, in English and Spanish, on money laundering subjects.

Mr. Intriago is a native of Ecuador and speaks fluent Spanish. He received his law degree from the University of Florida, where he was Editor-in-Chief of the Law Review, and a Bachelor of Arts degree from Florida State University.


Seminar PE7: Sharing Intelligence - Part 1
February 8, 09:00-11:30
Abstract

The 9/11 Commission found that little has been learned since 9/11 about how Al Qaeda gathers, controls and moves its money and finances its operations. The pertinent federal investigative and regulatory agencies have not been given the requisite resources to attack terrorist financing vigorously. The Internal Revenue Service Criminal Investigation Division is an example. Although it is the finest financial investigative agency in the world, last year it was denied 80 new special agents to be devoted to terrorist financing investigations although they had been recommended by an independent, bipartisan oversight board.

Congress must also accept some of the blame for the slow progress in divining the mysteries of terrorist financing. It has shirked its oversight role and failed to assure that the regulations it required under the USA Patriot Act are issued, implemented and supervised effectively. The Office of Foreign Assets Control has failed to perform its mission effectively, although under its new director, Robert Werner, there is promise that necessary reforms will be achieved. In addition, large segments of the U.S. financial sector, such as the insurance and precious metals industries, are either lacking a federal regulator to monitor compliance with USA Patriot Act obligations or are supervised by the IRS Examination Division, which is woefully understaffed and overwhelmed by its primary mission of examining for tax compliance.

Dr. Charles Jacobs
President
David Project


 
Biography
The President of the David Project is Dr. Charles Jacobs, founder of the American Anti-Slavery Group and co-founder of CAMERA. A veteran of the civil rights movement, Jacobs received the 2000 Boston Freedom Award from Coretta Scott King, as well as the Keter Torah award from the Bureau of Jewish Education in 2003. He has appeared on NPR's Talk of the Nation, ABC Nightly News, and PBS - and his writing has appeared in the New York Times, Boston Globe, and Los Angeles Times.


Track 5: Private Sector
PS8: How Academia and the Intelligence Community Can Work Together
February 10, 15:00-15:45

Alireza Jafarzadeh
President, Strategic Policy Consulting, Inc.


 
Biography
Alireza Jafarzadeh is the president of Strategic Policy Consulting, Inc. He is also a FOX News Channel foreign affairs analyst.

Alireza Jafarzadeh is a well-known authority in issues relating to terrorism, and Islamic fundamentalism in Iraq, Iran, and the Middle East; Iran's nuclear weapons program; and its internal political developments, including the anti-government demonstrations, the student movement, and human rights.

The international concerns about Iran's nuclear weapons program has largely arisen from Jafarzadeh's stunning revelations about 7 major previously secret nuclear sites, including the sites in Natanz, Arak, Karaj, Ab-Ali, and Tehran. Jafarzadeh revealed the existence of Natanz uranium enrichment facility, and Arak's heavy water facility in August 2002, Ab-Ali centrifuge testing facility near Tehran in February 2003, two additional nuclear sites near Karaj in May 2003, and two other new nuclear sites in Kolahdouz military complex in Tehran, and Ardekan in July 2003. He unveiled the details of Iran's development of bio-weapons in May 2003, and had previously provided valuable information about the Shahab-3 medium range missile.

On April 27, 2004, Jafarzadeh revealed information that Iran, using some 400 nuclear experts, is now running a secret nuclear weapons program supervised by the military and the Supreme Leader parallel to their overt nuclear energy program. Jafarzadeh had previously unveiled in March, a secret meeting held earlier by Iran's senior officials where they decided to speed up their nuclear weapons program, while faking cooperation with the IAEA.

He first disclosed the details of Iran's involvement in the Khobar Towers bombing in Saudi Arabia, in 1997, and the Jewish Community Center bombing in Argentina in 1993.

In November 2003, Jafarzadeh exposed an extensive covert network of the Iranian regime's agents who had been involved, for months, in meddling in the internal affairs of Iraq, seeking to derail the political process and establish a sister Islamic Republic in Iraq.

As an accomplished analyst, Jafarzadeh has frequently appeared on major television and radio broadcasts including Fox News Channel, CNN, MSNBC, CBS Evening News, NBC, VOA, NPR, BBC and WABC to discuss Iran's WMD program and terrorist activities around the world.

Jafarzadeh has published essays in, and been interviewed by, news outlets including New York Times, Washington Post, Wall Street Journal, Baltimore Sun, Chicago Tribune, Washington Times, Los Angeles Times, Christian Science Monitor, USA Today, Philadelphia Inquirer, Boston Globe, Miami Herald, Austin-American Statesman, Time, and Newsweek magazines, Space & Missile, Defense Week, Arms Control Today, and the Financial Times.

Jafarzadeh has lectured in Georgetown University, University of Michigan, and National War College, and has been a frequent speaker at briefings, hearings and luncheons at the US Congress, the United Nations, Chicago Council on Foreign Relations, and the Morning Newsmaker Program at the National Press Club in Washington, DC.

Prior to becoming a contributor for FOX News Channel, and until August 2003, Jafarzadeh acted for a dozen years as the chief congressional liaison and media spokesperson for the US representative office of Iran's parliament in exile, the National Council of Resistance of Iran.

Jafarzadeh earned his Bachelor's degree from the University of Michigan, in Ann Arbor, and his Master's degree in Civil Engineering from the University of Texas, in Austin.


Track 2: DOD/Military
DM4: Nuclear Intelligence
February 9, 15:00-15:45
Abstract

Iran has posed the most serious nuclear challenge to the international community, and many believe that Iran is only one to three years away from getting the nuclear weapons capability. Yet, the intelligence community failed to detect the extent of Iran's nuclear weapons program. The nuclear sites that are now being inspected by the International Atomic Energy Agency were neither detected by the intelligence community nor were declared by the Iranian government.

While looking at the latest status of Iran's nuclear weapons program, Alireza Jafarzadeh will examine the shortcomings both in the way the intelligence community has conducted its work on this issue, as well as how the U.S. policy has affected the quality of information now available on Iran's nuclear program.

Jafarzadeh will look at ways to improve the quality of intelligence as well as ways to contain Iran's nuclear threat.

David Jimenez
U.S. Border Patrol, DHS


 
Biography
David Jimenez, a Lifetime Certified Criminal Analyst, is an Intelligence Research Analyst with the United States Border Patrol, Bureau of Customs & Border Protection, Dept of Homeland Security in El Paso, Texas.

He retired in 1994 from the United States Air Force after 24 years of active duty service, which included intelligence assignments with the 17th Reconnaissance Wing (U-2/TR-1) in the United Kingdom, the Strategic Air Command in Omaha, Nebraska, and Joint Task Force Six (Counterdrugs) in Fort Bliss, Texas. His military intelligence experience includes IMINT (imagery intelligence), ELINT (electronic intelligence), and narcotics intelligence support for law enforcement agencies. He is the recipient of the Defense Meritorious Service Award, several Meritorious and Commendation Medals.


Moderator
Seminar PE5: Finding and Keeping Intelligence Specialists
Spies - Intelligence Agents & Analysts
February 8, 09:00-11:30
Abstract

How can the U.S. Government possibly hope to retain its intelligence and security specialists when private contractors in Iraq are offering them salaries up to $1000 a day? Is the solution better pension benefits, more suitable career tracks, and more flexibility in their assignments? Or is the growth of private security companies the problem? After investing a quarter of a million dollars in training a special forces operator, what will it take to keep that resource on assignment? Congress may have to recognize that very substantial bonuses - in the quarter million dollar per annum range - may have to be paid before covert operatives volunteer to spend years risking their lives behind the lines in hard target countries such as North Korea and Iran. These are but a few of the issues that will be on the table in this Seminar.

Robert Jordan
Homeland Defense Journal


 
Biography
He also contributes to the planning and development of synergies between HDJ magazine, conferences, research, Web site and Homeland Defense Journal Online E-newsletter.

Mr. Jordan is an expert in mass communications and strategic planning. A career Marine Corps officer, Mr. Jordan also served as a combat correspondent in Vietnam and distinguished himself as the Marine Corps/DoD spokesman in Beirut, Lebanon, in 1983. He appeared on 20/20, Nightline, Frontline and CNN and was the subject of a Bill Moyers special report. He was awarded the Navy Commendation Medal and the USMCCCA's special DPA award for his service there. During his military service, Mr. Jordan also received the Bronze Star Medal, with "V" for valor; the Air medal with two flight/strike awards; the Combat Action Ribbon with one bronze star; Combat Aircrew Wings; and numerous other personal, campaign and service awards.




Seminar PE8: Getting the Public Involved
Citizen Involvement - An American Tradition
February 8, 16:00-16:45
Citizen Involvement - An American Tradition
Abstract

From the Minutemen at Concord Bridge and Paul Revere's ride to warn the colonists that "The British are coming," ... to World War II's warning that "Loose Lips Sink Ships!" -- Americans have a tradition of being intimately involved with their government's efforts at keeping its citizens safe and our country free. Today many say that we face a new enemy who intimidates with terror. But terror is as old as man himself. Unfortunately, it is all too familiar to scholars of our history. Britain, France and Spain all used terror, first against our native people, then against each other as they strove to dominate this New World with all its promise and natural resources. Jordan will sketch a brief historical profile of America's struggle with terrorism with special emphasis on where the struggle hits us here at home … and what is being done to neutralize the threat and safeguard our homeland.

Avi Jorisch
The Foundation for the Defense of Democracies
Senior Fellow / Terrorism Expert
The Washington Institute for Near East Policy
Adjunct Scholar

 
Biography
Previously, Mr. Jorisch was a Soref fellow at The Washington Institute for Near East Policy from 2001 to 2003, specializing in Arab and Islamic politics. More recently, he served as an Arab media and terrorism consultant for the Department of Defense.

Mr. Jorisch holds a bachelor's degree in history from Binghamton University and a master's degree in Islamic history from the Hebrew University of Jerusalem. In 2000 and 2001, he studied Arabic and Islamic culture through the Center for Arabic Studies Abroad program at the American University in Cairo. He also earned a certificate in Arabic after participating in an intensive summer program at al-Azhar University, the preeminent institution of Sunni Islamic learning.


Computer/Projector Track 5: Private Sector
PS3: Is the Media the IC's Friend or Foe?
February 9, 14:00-14:45

David Kalinowski
President & COO, Proactive Worldwide, Inc.


 
Biography
David J. Kalinowski is the President of Proactive Worldwide, Inc, a business intelligence decision support agency he co-founded in 1995. He oversees Proactive's Industrial, Telecommunications, Financial Services, and Insurance practices. David is a 15-year veteran in the business intelligence discipline. His experience includes researching, analyzing, and directing thousands of BI projects. David's BI expertise has been applied to assist numerous advisory and executive boards. Kalinowski has authored several articles on BI topics, two for CI Magazine, and shares his knowledge through dynamic presentations.


Track 4: Business
BN7: Managing Expectations for Better Intelligence Results
February 10, 14:00-14:45
Managing Expectations for Better Intelligence Results
Abstract

Communication between a CI group and its internal clients is crucial to successful CI, and often boils down to how well the client understands what actually can be delivered, the research gathering process, when results can be expected, and at what cost. It also depends on how well the CI facilitator understands what the client expects for the investment. Specific key activities can help manage expectations and develop a consistent win-win relationship between CI users and providers. We'll look at which expectations are most important, and how to convey them. We'll talk about how to eliminate senior management's 'get me whatever you can' mentality, and how to develop a mutually beneficial relationship between internal CI users and providers.

Learning objectives:
- Learn which expectations are most important to convey
- Develop a winning relationship with internal CI clients
- Understand how to communicate and effectively manage reasonable expectations

Evan Kohlmann
GlobalTerrorAlert.com


 
Biography
International terrorism expert, formerly of The Investigative Project. Author of Al-Qaida's Jihad in Europe: The Afghan-Bosnian Network


Track 3: State and Local Law Enforcement
SL1: Profiling Terrorists Among Us
February 9, 08:15-09:00
Beyond Profiling: Al-Qaida's Second and Third Generation Terrorists


Dr. Harvey Kushner
Author, Holy War on the Home Front:
The Secret Islamic Terrorist Network in the United States


 
Biography
Harvey Kushner, a respected adviser to the FBI, the FAA, the INS, and other government agencies, offers frightening new evidence of a unified Islamic terrorist network that is operating inside the United States and planning new opportunities to strike.

Kushner identifies and assesses the violent plans of these Islamic organizations and individuals who take advantage of our reluctance to engage in ethnic profiling. He supports his claims with never-before-seen documents from top-level government sources, exposing a secret network of Arab intelligence agencies, terrorists, university professors, corrupt imams and other religious leaders, and violent criminals.


Track 1: Federal Civilian
FD2: Surveilling Insurgent Movements Domestically
February 9, 10:15-11:00

Dr. I-chung Lai
Taiwan Thinktank


 
Biography
I-chung Lai, Ph.D., is the member of executive board and director of Foreign Policy Studies of Taiwan Thinktank, a Taipei based public policy research institute established at December 31st, 2001. Prior to assuming the current position, Dr. Lai has served as the special assistant to Taiwan's representative in Japan from 2000-2003 and as the executive director of Taiwan Democratic Progressive Party's U.S. representative office in 1999-2000. Dr. Lai received his Ph.D. from Virginia Polytechnic Institute and State University in 1999 and has been a visiting research fellow at Cornell University from 1994-1999.

Career and Activities:
April, 2003-Present: Member of Executive Board & Director of Foreign Policy Studies, The Taiwan Thinktank
December, 2000-March, 2003: Special Assistant to the Representative, Taipei Economic and Culture Representative Office in Japan.
Jul/1999-Nov/2000: Executive Director, Taiwan Democratic Progressive Party Mission in the United States (Taiwan DPP Mission in the U.S.)
1998 Vice President, North America Taiwan Studies Association (NATSA)
1995-1997 Spokesman, Taiwanese Collegian (TC)

Education:
1999 Ph.D. Virginia Polytechnic Institute and State University (Virginia Tech)
1994-1999 Visiting Research Fellow, Cornell University
1988 B.A. National Cheng-Kung University


Seminar PE6: View from Abroad - Asia
February 8, 11:00-11:45
Asia
Abstract

Taiwan is a small country with important strategic implication. It occupies key position in the sea-lanes of communication (SLOC), and its major seaport (the Kaohsiung Port) is one of the top five container ports in the world. In addition, Taiwan has Information Technology industry that produces the majority of the laptop computers and world biggest wafer manufacture; the key ingredient for IC chips in the computer. However, in terms of the anti-terrorism awareness, Taiwan is much left behind. Despite its high tech savvy, Taiwan does not have sophisticated export control regime to regulate its high technology products from falling into dubious hands. Taiwan does not participate in the Proliferation Security Initiative (PSI) even though Taiwan has expressed strong desire to be a contributor in this regard. Moreover, Taiwan is also not well prepared against possible airplane hijacking and terrorist acts from the sea attacking its seaport, not to mention about the reform of the various intelligence agencies for jointness in the anti-terrorism campaign.

To ensure the safety of the U.S. homeland security, it is important to integrate Taiwan as a part of this campaign. For many nations around the world, they all face different problems in cooperating with the U.S. for the anti-terrorism campaign. In Taiwan's case, the slow progress is not resulting from the lack of efforts but from the lack of means and knowledge. One of the consequences for Taiwan to be virtually isolated from the international society is that Taiwan also has been deprived of the trend awareness and access to the knowledge for issues of global concern. In all various international agreements and monitoring regimes for the export control, Taiwan has been in none of them. Taiwan usually relies on second hand or third hand information to obtain the necessary knowledge and regulations that come natural to the member countries. Another consequence is that Taiwan is not able to inject its input when norms and regulations are discussed and formed for issues concerning Taiwan dearly. The lack of legal infrastructure and law enforcement in the export control, despite Taiwan is an important export country for dual-use or multiple use technology, has been in large part coming from such international condition.

The lack of jointness of the intelligence in Taiwan reflects more with the governance problem of the newly democratic country than with the inappropriate modus operandi. Streamlining the intelligence flow inevitably will affect many of the already existed intelligence bureaucrats, who were normalized in the authoritarian era - nowadays they are strongly hostile to the newly democratic elected civilian leadership. Those established bureaucrats usually tend to view the jointness as a political campaign to weaken their power base. Thus, the intelligence reform, though extremely important for Taiwan's homeland security, has been politicized from the beginning. This is the obstacle that a joint U.S.-Taiwan effort has to encounter.

The lack of Taiwan's participation of the PSI also hampers the intelligence exchange between Taiwan and other nations sharing similar concern for anti-proliferation campaign. The integration of Taiwan into the anti-terrorism regime has to be the first step for Taiwan. Then the intelligence, law enforcement or other types of cooperation can integrate more naturally. The top-down approach will definitely work better then the bottom-up.

Anti-terrorism is a war on global level that requires no let down and no loopholes in the campaign. Do not let the political complexity compromise the effort. Leave Taiwan out will create just such a loophole.

Track 2: DOD/Military
DM1: Asia: the Next Assessment Crisis
February 9, 08:15-09:00
Asia: the Next Assessment Crisis
Abstract

In Asian policy community today, people tend to focus on immediate issues rather than the dynamics and structures that generate those problems. Consistently maintaining this behavior pattern usually falls into the "crisis management" mode, i.e., focusing on avoiding worsening of the crisis instead of finding solutions to the problems.

Take the Korean Peninsula as an example, the focus now is on the North Korea nuclear weapon/weapon program. But the of the Korean Peninsula actually reflects the worsening problem of the DPRK regime itself, rather than its nuclear weapon/weapon program. If the focus in on the DPRK's nuclear weapons, then the focus should be stopping the DPRK from acquiring the nuclear weapons. If the focus is about the DPRK regime being problem itself, then the focus will be on the behavior of the Pyongyang government.

As for the issue regarding the Taiwan Strait, similar problem arises. If we view the Taiwan Strait issue as the dispute between China and Taiwan, then the focus is on how to manage the cross-Strait problems to avoid military conflicts. Since the contingency is one-side, only China attacking Taiwan is possible and no vice versa. The conflict avoidance usually resort to pressure Taiwan not to provoke China while giving less focus on the Chinese military preparation, since it is difficult to dissuade China due to its strong power.

If we are looking at this issue from a broader angle and, from what Taiwan stands politically, geo-strategically and economically, the conflict in the Taiwan Strait actually indicates the lack of confidence of Beijing government in its legitimacy, the Chinese strategic intention in Asia and the consequence of economic ramification globally. Taiwan's democracy is a problem to Beijing government, because this reminds the Beijing leadership that democracy has a good chance to be practiced in China. Capturing Taiwan will enable China to dominate Asia by cutting off the linkage between Northeast and Southeast Asia, and by forcing the U.S. to retreat from the Asia-Pacific region. Thus, the Taiwan Strait issue is no longer a matter simply about the conflicts between Taiwan and China, but a matter of the prospect of democracy in China and the geo-political order in the Asia-Pacific region.

Asia is now entering a new era, and therefore a new approach is needed to integrate all the developments in this region nuclearization. In addition to the U.S. redeployment of its military presence in East Asia and the rise of Chinese power, there are dramatic changes taking place in Japan, South Korea and Taiwan as well. Old ways of management will fail to solve the problems today; the developments in the Korean Peninsula and the Taiwan Strait issues are two prime examples. How to make a policy effective for creating a new status quo is a challenge to all of us today.

Dr. Michael Ledeen
Freedom Scholar, American Enterprise Institute


 
Biography
An expert on U.S. foreign policy. His research areas include state sponsors of terrorism, Iran, the Middle East, Europe (Italy), U.S.-China relations, intelligence, and Africa (Mozambique, South Africa, and Zimbabwe). A former consultant to the NSC and to the U.S. State and Defense Departments, he has also written on leadership and the use of power. His latest book is entitled The War against the Terror Masters.

Professional Experience
- Commissioner, U.S.-China Commission, 2001-2003
- Consultant, NSC, State and Defense Departments, 1982-1986
- Senior fellow, Center for Strategic and International Studies (CSIS), 1982-1986
- Special adviser to the Secretary of State, 1981-1982
- Senior staff member, Georgetown University Center for Strategic and International Studies, 1977-1981
- Rome correspondent, The New Republic, 1975-1977
- Visiting professor of history, University of Rome, Italy, 1975-1977
- Instructor and assistant professor of history, Washington University, 1967-1974

Education
- Ph.D., history and philosophy, University of Wisconsin
- M.S., history and philosophy, University of Wisconsin
- B.A., Pomona College


Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 10:00-11:30


Stuart A. Levey
Under Secretary, Office of Terrorism and Financial Intelligence
Department of Treasury


 
Biography
Stuart Levey was confirmed by the Senate on July 21, 2004 to serve as the Department of the Treasury's Under Secretary for Enforcement and lead the Office of Terrorism and Financial Intelligence (TFI). In the role of Under Secretary, Mr. Levey directs the Treasury's efforts to cut the lines of financial support to international terrorists, a critical component of the overall effort to keep America safe from terrorist plots. In addition to helping fight the financial war on terror, Mr. Levey also focuses on protecting the integrity of the financial system, fighting financial crime, enforcing economic sanctions against rogue nations and assisting in the ongoing hunt for Iraqi assets. He also oversees the Treasury Department's newly-created Office of Intelligence and Analysis, ensuring that actionable intelligence is available to key decision makers and that the Department is fully integrated within the broader intelligence community.


Track 1: Federal Civilian
FD8: Follow the Money: Treasury's Battle Cry
February 10, 15:00-15:45
Follow the Money: Treasury's Battle Cry
Abstract

In this era of transnational threats and instant financial transfers, "following the money" has become both more difficult and more vital than ever. This presentation will examine how the Treasury Department combines its unique array of financial data with intelligence from across the government to develop operable intelligence for policymakers. These products empower Treasury to take action - ranging from regulations and multilateral best practices to targeted actions such as sanctions and Section 311 of the Patriot Act - against national security threats, including terrorists, drug kingpins, proliferators, and rogue regimes.

James Andrew Lewis
Center for Strategic and International Studies
Senior Fellow and Director Technology Policy


 
Biography
Expertise: global technology policy issues, information technology, Internet governance, critical infrastructure protection and cyber security; aerospace issues, arms and technology transfers, U.S. foreign policy James Andrew Lewis joined CSIS in October 2000. Before coming to CSIS, Lewis was a member of the Foreign Service and the Senior Executive Service. He worked on a range of security, technology and intelligence issues during his tenure with government, including Asian basing and access negotiations, Cambodia Peace Talks, the Five Power Talks on Arms Transfer Restraint, the Wassenaar Arrangement, policies for communications and remote sensing satellites, encryption, and technology transfer issues with China.


Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 15:00-15:45

Kim Lindquist
Assistant U.S. Attorney for the District of Idaho


 
Biography
Kim R. Lindquist is an Assistant United States Attorney for the District of Idaho, and has been for the past eighteen years. Before joining the Department of Justice, Kim was in private practice for eight years, specializing in criminal defense work. He is currently assigned international and domestic terrorism responsibilities with the United States Department of Justice. Previously, he worked as a member of the Federal Organized Crime Drug Task Force for the State of Idaho, concentrating primarily on large scale drug and violent crime cases domestically and internationally.

Between 1994 and 1997, Kim did a tour of duty for the Department of Justice in Colombia, where he served as an advisor to the Colombian government in the development of their criminal justice system. While living in Bogota and since, he has traveled throughout Latin America and the Caribbean region working with numerous governments in the development of their criminal justice systems. He has played a key role in the drafting, interpretation and implementation of codes of criminal procedure in eight countries and has been involved in and influenced those of many others in providing consultation in criminal code formation and implementation. Kim lectures extensively and works with criminal justice experts from around the world. He has authored in Spanish a comprehensive comparative law treatise on Latin American and Anglo-Saxon legal systems that serves as a text for his lectures worldwide. He has also recently been detailed to the tri-border region of Paraguay, Argentina and Brazil, where he works extensively with criminal justice officials.

Kim's trial experience is extensive, both as a defense attorney and prosecutor. It includes the notorious Ruby Ridge case and the recent Al-Hussayen terrorism material support prosecution, as well as cases ranging from murder to misdemeanors on both sides of the courtroom. He was recently awarded the Department of Justice Director's Award for his efforts in organized crime drug prosecutions. Kim is also currently a Special Assistant United States Attorney and lead counsel in a large drug prosecution in Alaska of an organized crime network involving the Dominican Republic, Colombia, Mexico and the United States.

Kim has been an adjunct professor in the Department of Criminal Justice Administration at Boise State University for the past twelve years. There he teaches classes in criminal law, criminal procedure, evidence, the law of arrest, search and seizure, and comparative law.


Track 5: Private Sector
PS2: US Courts & Terrorism
February 9, 10:15-11:00
THE AMERICAN CRIMINAL JUSTICE SYSTEM: FROM MAYBERRY TO MOSCOW
Abstract

Reference to Waco incident, Colombia drug trafficking and South America tri-border region contraband phenomenon as examples of crime escalation and foundation for presentation

Fundamental queries: How can the American criminal justice system deal with crime of such magnitude? Was it intended to do so?

Recent terrorism events increase cogency of query

Crime phenomenon a object of criminal justice system: a spectrum

Single, local crime scenario on the one end
War crime scenario on the other end
Crime escalation generally plus terrorism has criminal justice system enter into war scenario

Capability of the system: historical journey
The "Mayberry" time
Social institutions responsible for civilized society
Criminal justice system an exceptional support
Single, local crime scenario in most basic form

Abdication by responsible social institutions
Civilizing agent void created
Crime increases

Criminal justice system to solve society's ills
Deal with increased crime
Become primary civilizing institution

Criminal justice system not designed to be civilizing agent

As crime phenomenon moves from single, local crime scenario to war scenario, criminal justice system less capable of dealing with

Terrorist event responsibility confirms system's entry into war scenario realm and reduced capability to deal with the same

System dealing with war scenario facts with crime scenario legal tools

Recent terrorism material support prosecution and indicia of system's inability to deal well with terrorism war scenario (Saudi student at University of Idaho in Moscow, Idaho)

Normative or statutory indicators
Terrorism material support statutes ill-suited
Constitutional norms incongruent

Procedural indicators
Very local juries/judges judging very foreign facts
Very local prosecutors as teachers of very foreign facts
Very local investigators investigating very foreign facts

Some solutions suggested as a result of journey from Mayberry to the two Moscows of Idaho and Russia

Clare Lopez
Senior intelligence analyst
Hawkeye Systems

 
Biography
An intelligence professional for 25 years, Ms. Lopez began her career as an operations officer for the CIA, serving in postings around the world. Since 2000, Ms. Lopez has worked as an intelligence analyst in the private sector, with a focus on counterterrorism issues. She produced Threat Analysis for US Embassies abroad with the Bureau of Diplomatic Security at the Department of State and most recently has worked on contracts with DARPA, ONI, and a number of commercial clients with HawkEye Systems, a high tech strategic management and technology consulting firm in Alexandria, Virginia.

Ms. Lopez received her M.A. in International Relations from the Maxwell School at Syracuse University and holds a B.A. in Communications and French from Notre Dame College of Ohio. She is a Visiting Researcher and occasional guest lecturer at Georgetown University and currently is collaborating as a co-author on the writing of two forthcoming books dealing with U.S. Foreign Policy and Terrorism and Proliferation.


Track 3: State and Local Law Enforcement
SL7: Biowarfare Intel
February 10, 14:00-14:45
Biowarfare Intel
Abstract

As so clearly articulated by President George W. Bush, the most serious threat facing the United States (U.S.) in the coming years is the possibility that a radical terrorist group will obtain and use Weapons of Mass Destruction (WMD). We know that Al-Qa'eda, in particular, is devoting significant effort to acquiring the means necessary to strike American and Western interests with WMD. While plenty of evidence exists to demonstrate its intentions with regard to nuclear, radiological and chemical weapons, today's subject will address the very real and growing likelihood that Islamist terrorists one day soon will have the means to attack us with a Biological Weapon (BW).

Compounding the seriousness of the BW threat from al-Qa'eda and a few other like-minded groups, is the ubiquity of BW knowledge, materials and stocks around the world; globalization and the spread of high tech dual-use equipment makes it increasingly difficult to stop the proliferation of these deadly weapons, despite determined efforts to police international agreements and restrictions.

New and emerging threats that conceivably could enhance the lethality and communicability of some of the deadliest viruses known to man, such as smallpox, Ebola, SARS (Severe Acute Respiratory Syndrome) or even influenza, include genetic manipulation and the deliberate creation in the laboratory of recombinant forms of some of these terrible diseases. Huge secret BW production programs, such as that which existed in the Soviet Union, may or may not have completely ceased operation; in any case, experts such as former Biopreparat Deputy Ken Alibek, warn that leftover stocks as well as out-of-work former BW scientists continue to pose the risk of proliferation, whether state-directed or not. One of the hallmarks of rogue states such as Iran and Syria is the existence of government-sponsored WMD programs, including BW.

Plentiful evidence from courtroom testimonies of al-Qa'eda members, captured documents, videotapes and abandoned al-Qa'eda safehouses shows that the al-Qa'eda network continues to seek a biological weapons capability. The mastermind of 9/11, Khalid Sheikh Muhammed (KSM), for example, was arrested at the home of Pakistani microbiologist, Dr. Qadoos Khan on March 23, 2003. KSM's laptop computer allegedly contained documents related to biochemical weapons such as botulinum, salmonella toxins, cyanide and anthrax. Hambali, the operational head of the Jemaah Islamiyyah terrorist organization and principal al-Qa'eda contact in Southeast Asia, was working to open an al-Qa'eda bioweapons plant and anthrax program in Kandahar, Afghanistan, prior to his August 2003 arrest. Abu Musab al-Zarqawi, the Jordanian terrorist currently wreaking havoc in Iraq and who recently pledged loyalty to al-Qa'eda, oversaw a training camp in Afghanistan in 2000, which specialized in chemical and biological weapons. Prior to the beginning of Operation Iraqi Freedom in March 2003, al-Zarqawi had established an enclave in the Kurdish region of northern Iraq where he helped establish a new poison and explosives training camp. In January 2003, British security officials discovered traces of the deadly biological toxin, ricin, in an apartment in North London.

Despite all the best efforts of the U.S. and other concerned allies, the BW threat not only remains serious, but is spreading. Whereas formerly, only state-run, government-funded programs had the capability, knowledge and funds to pose a BW threat to the world, today that threat has spread to sub-national groups, including Islamist terrorists. The challenge facing the world is to prevent such groups as al-Qa'eda from reaching a level of capability, which would permit them to unleash the unimaginable horrors of a SARS or Ebola plague upon thousands, if not millions, of innocent people.

Thomas Maiorana
FBI Special Agent
Director, Kansas City Regional Computer Forensic Laboratory


 
Biography
Tom Maiorana has been an FBI Special Agent for thirteen years and has been the Director of the Heart of America Computer Forensic Laboratory in Kansas City, Missouri, for the past two years. Prior to his current assignment, he was responsible for the collection, preservation, and forensic examination of computer evidence as a trained member of the FBI's Computer Analysis and Response Team. Additionally, he conducted computer intrusion investigations for the Kansas City office of the FBI. Prior to FBI employment, SA Maiorana was employed as a computer Software Engineer and Systems Manager for seven years. SA Maiorana is a graduate of the University of Maryland with a Bachelor of Science degree in Computer Science.


Track 3: State and Local Law Enforcement
SL4: Computer Forensics
February 9, 15:00-15:45
Computer Forensics
Abstract

Due to the wide availability and easy access to electronic equipment, criminals have gone "high-tech" and are using these resources to enhance and maintain their illegal enterprises. Soon after the 9/11 attacks, information was received that the hijackers used computers and the Internet to communicate. The skills of computer forensic examiners became an important tool during the investigation and the collection of intelligence regarding al-Qa'eda operations. Given this new reality, law enforcement has had to become just as resourceful by creating initiatives such as the Regional Computer Forensic Laboratory (RCFL) Program, where law enforcement is leveraging technology to comprehend digital evidence. RCFLs combine the talents and resources of law enforcement agencies at all levels. They increase law enforcement's ability to investigate criminals and detect and prevent acts of terrorism. During this session, we will discuss the importance of the proper collection, preservation, and exploitation of intelligence gathered from computer systems and other digital devices.

RCFLs are a critical component in the FBI?'s effort to support state and local law enforcement. There are six operational RCFLs in the U.S. that are providing free computer forensic examinations and expertise to the law enforcement agencies within their service areas. By the end of this year, that number is expected to increase to thirteen. An overview of the RCFL program will be provided that will include the locations and service areas of each RCFL throughout the country.

David Major
Vice President
Centre for Counterintelligence and Security Studies


 
Biography
David Major has made a 40-year commitment to the practice of counterintelligence, having served in top leadership roles at the FBI in counterintelligence as a Supervisory Special Agent, as well as on the National Security Council as the Director of Counterintelligence, Intelligence and Security Programs. Major was the first FBI official ever to be appointed to the NSC.

During his employment at the FBI from 1970 to 1993, Major became a nationally recognized counterintelligence and security/countermeasures technical expert, strategic planner, practitioner, advocate and spokesman for national counterintelligence and security countermeasures programs. During his time with the NSC from 1985 to 1987, he was involved in every aspect of these disciplines, with extensive operational experience at the highest level of government. While at the NSC, Major was responsible for formulating the policies and programs which led to the first and only mass expulsion of Soviet intelligence officers (80 KGB and GRU) from the United States in October 1986.

Following his work at the NSC, Major returned to the FBI where he was in charge of the section within the Intelligence Division of FBI Headquarters responsible for managing all intelligence and counterintelligence strategic and operational analysis, policy and plans formulation, budget formulation, resource management, automated data processing, and counterintelligence training of FBI, DoD and counterintelligence community personnel. To ensure that the counterintelligence programs were integrated into the Executive Agencies' decision-making process, Major served as the architect for the Counterintelligence Operations Board in 1989 (now known as the National Counterintelligence Operations Board). From 1988 until his retirement in 1993, Major was the FBI's principal representative in the national intelligence policy formulation process. As such, he was the principal FBI drafter for the National Security Review (NSR) 18 and National Security Directive (NSD) 47. Major was the principal architect of the National Security Threat List (approved by the Attorney General in December 1991) to meet the ever-changing challenges of the foreign intelligence threat in the 1990s. The National Security Threat List strategy became the primary document which directly governs all DoD counterintelligence programs.

Major's deep and persistent commitment to training future counterintelligence professional leaders from the DoD, FBI and CIA to think strategically about counterintelligence led him to formulate a new counterintelligence community course, "Strategic Approaches to Counterintelligence." This course was the first step in the development of a diverse gamut of courses Major later designed and currently conducts for the Intelligence Community.


Plenary Session PL1
Counterintelligence Methods and Applications
February 9, 16:00-16:45
Counterintelligence Methods and Applications
Abstract

Any serious examination of intelligence reveals its impact on international relations; however, it is essential to also recognize the corresponding role of counterintelligence as an essential component of national strategy. In today's war on terrorism, the role of counterintelligence is at the front lines of identifying, penetrating and neutralizing the terrorist threat. All terrorist attacks are preceded by intelligence collection; and, the tools used to identify and counter espionage are the same tools, methods and applications required to defeat terrorist organizations.

As an example of how essential it will be for the US to use traditional counterintelligence methods to address the terror threat that it faces today, this Seminar will discuss how the British Security Service (MI-5) used them to play the leading role in breaking the back of the terrorism war in Ireland. How MI-5's methods apply to our society will be part of an analysis of US CI that includes a review of the legal and ethical conflict between the requirement to safeguard individual rights, and the need to protect the community, social structure and national security. Also to be addressed are the foundations of, and the relationships between, counterintelligence, internal security, intelligence, security/countermeasures programs and law enforcement.

Deborah Maklowski
NSA/CSS Senior Intelligence Authority, National Security Agency


 
Biography
Ms. Maklowski began her Federal service in 1978 as an analyst/linguist with the U.S. Army in West Berlin. Most of her focus as a civilian language and intelligence analyst with the National Security Agency was on military trade, the proliferation of weapons of mass destruction, and other global issues. Since 1987 she has been a workcenter leader, most recently serving as the Chief of Staff for a large intelligence production organization. Currently, as the NSA/CSS Senior Intelligence Authority and Advocate for the U.S. cryptologic community's Intelligence Analysis skill field, she oversees the hiring and development of the Agency's professional intelligence analysis workforce.


Seminar PE5: Finding and Keeping Intelligence Specialists
Spies - Intelligence Agents & Analysts
February 8, 09:00-11:30
Spies - Intelligence Agents & Analysts
Abstract

If finding people with the right skills, knowledge, and personality traits -- not to mention the willingness -- to be an intelligence analyst is a science, then keeping them happy and productive once they're hired is definitely an art. This is especially true for Federal intelligence agencies, which frequently are limited in the salaries they can offer, engaged in activities that do not allow for explicit resumes (or book deals), and subject to sudden shifts of emphasis that can leave capable analysts stranded on the shores of subjects no longer worked. In this session Mrs. Maklowski will discuss these issues from the perspective of the National Security Agency, which currently is engaged in its largest IA hiring effort in nearly two decades. She will cover the qualifications and aptitudes that NSA seeks in its prospective intelligence analysts; describe some of the ways the Agency recruits analysts, along with related issues such as student programs and recruiting for diversity; and briefly review NSA's hiring processes. Mrs. Maklowski will then focus on the training and career development programs that NSA has created and uses to keep analysts growing and moving ahead as Signals Intelligence professionals, with emphasis on the issues that have the greatest impact on analysts' decisions to stay or leave. She will conclude with a brief look at the work NSA has already begun to develop cross-Intelligence Community standards for intelligence analysts and at how the Agency is preparing for the future of analysis.

Michelle Malkin
Fox News Channel Contributor, Author


 
Biography
Michelle Malkin makes news, and makes waves, with a unique combination of investigative journalism and incisive commentary. She's not afraid to expose hypocritical environmentalists, needle pork-loving politicians or criticize the MTV generation's morally deprived icons. Most of all, she's not afraid to hold up the Immigration and Naturalization Service to the relentless scrutiny it deserves post-Sept. 11. Her ground-breaking research and reporting led to her first book, "Invasion: How America Still Welcomes Terrorists, Criminals, and Other Foreign Menaces to Our Shores" (Regnery 2002), in which she argues "immigration must be treated as a national-security issue." The book debuted on The New York Times nonfiction best-seller list at No. 14 (week of Nov. 17, 2002). Her second book, "In Defense of Internment: The Case for 'Racial Profiling' in World War II and the War on Terror" (Regnery 2004), offers a defense of the most reviled wartime policies in our history.

Malkin began her career in newspaper journalism with the Los Angeles Daily News, where she worked as an editorial writer and weekly columnist from 1992-94. In 1995, she was named Warren Brookes Fellow at the Competitive Enterprise Institute in Washington, D.C. In 1996, she joined the editorial board of the Seattle Times, where she penned editorials and weekly columns for three and a half years. Today, her syndicated column appears in over 100 papers nationwide.

Malkin's work has been cited in The New York Times, The Washington Post, USA Today, Reader's Digest and U.S. News and World Report. Her freelance work has appeared in The Wall Street Journal, Weekly Standard and Reason magazine. She has appeared on "The O'Reilly Factor," "Hannity and Colmes," "The McLaughlin Group" and "20/20," and is currently a Fox News commentator.

Her hard-hitting -- and news-breaking -- commentary has been honored by several national organizations. Among the journalism awards Malkin has received:

- The 1998 Council on Governmental Ethics Laws (COGEL) national award, for outstanding service for the cause of governmental ethics and leadership, for investigative columns that exposed campaign finance abuses by Washington state Democrats, Republicans and political organizations.

- The 1998 Second Amendment Foundation's James Madison Award, for excellence in journalism "promoting the individual right to keep and bear arms."

- The 1997 National Society of Newspaper Columnists writing award, for general interest columnists in newspapers with a circulation of at least 100,000 (2nd place).

- The 1997 Evert Clark Science Award for journalists under the age of 30, for commentary and analysis of environmental regulations and science policy (honorable mention).


Track 1: Federal Civilian
FD1: Immigration and Customs
February 9, 08:15-09:00


Stephen Marrin
Intelligence Reform Consultant


 
Biography
Stephen Marrin is a doctoral candidate in the Woodrow Wilson Department of Politics at the University of Virginia, specializing in the study of intelligence. He previously served as an analyst with the Congressional Government Accountability Office (GAO) and, before that, the CIA.

Mr. Marrin has written many articles on intelligence, including one profiling CIA's Sherman Kent School and another describing the work of CIA's analysts for the Markle Foundation Task Force on National Security in the Information Age. In 1999 and 2000, he proposed the creation of a "CIA University" to integrate various components of CIA's organization in order to improve the development and dissemination of knowledge to intelligence practitioners. CIA subsequently created its CIA University in 2002. In 2004, the National Journal included Mr. Marrin on a list of the 10 leading US experts on intelligence reform.


Seminar PE4: Reforming the Intelligence Community
February 8, 10:45-11:30
Abstract

The practices of the medical profession can provide many ideas for reform of intelligence agency processes. Recent Congressional reforms have emphasized primarily reforms of intelligence community organizational structure. Yet process issues are as important as organizational structure, if not more so. Structure and process work together in a complementary fashion, with processes bridging any gaps that exist in structure. In the end, structural changes such as those recommended by the 9/11 Commission and implemented by Congress will require corresponding changes to existing processes in order to ensure the effective functioning of the intelligence community. Unfortunately, debates over intelligence reform have not focused on the procedural reforms that will be necessary to improve intelligence community performance. This presentation is intended to contribute to the discussion regarding possible procedural reforms by identifying some of the many ideas for intelligence reform that can be found in medical practices. Derived from an article co-authored by Dr. Jonathan Clemente--a practicing physician and expert in the history of medical intelligence--that is due to be published in the International Journal of Intelligence and Counterintelligence later this year, this presentation will outline a number of procedural reforms modeled from medicine that could improve many aspects of intelligence practice including: the prioritization of collection resources; the detection of denial and deception; the accuracy of analysis; and the quality of information flowing from intelligence agencies to national security decision makers.

Cliff May
President
The Foundation for the Defense of Democracies


 
Biography
Clifford D. May is the President of the Foundation for the Defense of Democracies, a policy institute focusing on terrorism created immediately following the 9/11 attacks on the United States.

He is also the Chairman of the Policy Committee of the Committee on the Present Danger (CPD), an international, non-partisan organization based in Washington D.C. comprised of leading members from the policy community with specific expertise in formulating positions on a range of national security issues.

Mr. May has had a long and distinguished career in international relations, journalism, communications and politics.

A veteran news reporter, foreign correspondent and editor (at The New York Times and other publications), he has covered stories in more than two dozen countries, including Iran, Pakistan, Sudan, Ethiopia, China, Uzbekistan, Northern Ireland and Russia. He is a frequent guest on national television and radio news programs, providing analysis and participating in debates on national security issues. He writes a weekly column that is nationally distributed by Scripps Howard News Service and he is a regular contributor for National Review Online, CNN's American Morning and National Public Radio's Morning Edition.

From 1997 to 2001, he served as the Director of Communications for the Republican National Committee. In that role, he was the Republican Party's staff spokesman, and appeared frequently on national television and radio programs. In addition, he managed all RNC communications activities, including long-range strategic planning; press, radio and television services; online services; TV and radio coaching; speech writing; advertising and marketing. He also served as the Editor of the official Republican magazine, Rising Tide.

After leaving the RNC, he was named Senior Managing Director in the Washington, D.C. office of BSMG Worldwide, a firm specializing in public affairs advocacy, public relations and media relations.

Prior to coming to the RNC, Mr. May was the Associate Editor of the Rocky Mountain News in Denver, Colorado. While in Colorado, Mr. May hosted a talk radio program on the dominant station in the region, and produced and moderated an interview program on KRMA-TV (a PBS station). In addition, Mr. May served as host/moderator for the weekly, nationally distributed TCI cable television series, Race for the Presidency, which featured "resident analysts" Dick Lamm, Gary Hart and Don Hodel.

Before moving to Colorado Mr. May spent nearly a decade with The New York Times as a reporter in both New York and Washington, an editor of The New York Times Sunday Magazine and a foreign correspondent. He established the Times' West Africa bureau and, as Bureau Chief, covered more than a score of African nations.

Earlier in his career, Mr. May was the Roving Foreign Correspondent for Hearst newspapers, reporting from a variety of global hotspots. During that same period, Mr. May provided special coverage for CBS Radio News and Bill Moyers' Journal on PBS. Prior to that, Mr. May was Senior Editor of Geo Magazine, and an Associate Editor for international news at Newsweek.

He holds masters degrees from both Columbia University's School of Public and International Affairs and its School of Journalism. He earned his BA from Sarah Lawrence College in Bronxville, N.Y. In addition, he holds a certificate in Russian language and literature from the University of Leningrad.


Track 5: Private Sector
PS3: Is the Media the IC's Friend or Foe?
February 9, 14:00-15:45

Gen. Thomas G. McInerney USAF, (Ret)
Consultant and Media Analyst


 
Biography
In January 2000, Lieutenant General Thomas McInerney, USAF (Ret.), established his own consulting firm, GRTT (Government Reform Through Technology). Working with high-tech companies who do business with federal, state, city and local governments, GRRT helps them introduce advanced technology into the public sector.

From March 1996, to December 1999, he was Chief Executive Officer and President of Business Executives for National Security (BENS), a national, nonpartisan organization of business and professional leaders, with headquarters in Washington, DC. BENS works to engage the business community in securing America's future with a more efficient defense establishment. In February 2000, General McInerney received a Laurel from Aviation Week and Space Technology magazine for his efforts on behalf of military reform as President of BENS. He has also made numerous appearances on National Television discussing Defense Reform and during global military crises such as Kosovo, EP 3 incident in China and now the War on Terrorism where he is the senior Fox News Military Analysts.

Prior to joining BENS, General McInerney was Vice President of Command and Control for Loral Defense Systems-Eagan. He joined Loral (then Unisys Electronic Systems Division) in 1994 following 35 years as a pilot, commander, and Joint Force Commander in the United States Air Force.

General McInerney retired from military service as Assistant Vice Chief of Staff of the Air Force and as Director of the Defense Performance Review (DPR), reporting to the Secretary of Defense. In that capacity, he led the Pentagon's "reinventing government" effort, visiting more than 100 leading-edge commercial companies to assimilate their ideas about business re-engineering. The DPR was part of Vice President Gore's National Performance Review on Reinventing Government, which focused on making the government perform better at less cost -- a fundamental BENS objective.

After his commissioning as a second lieutenant in 1959, and completion of pilot training in 1960, General McInerney served in numerous key Air Force assignments and had extensive military command and overseas experience. A command pilot with more than 4,500 flying hours, he completed four tours of duty in Vietnam, flight reconnaissance missions during the Cuban missile crisis and air escort missions in the Berlin Corridor.

General McInerney earned a bachelor of science degree from the US Military Academy in 1959 and a master's degree in international relations from George Washington University in 1972. He completed Armed Forces Staff College in 1970 and the National War College in 1973.

General McInerney is a member of the Board of Directors of Alloy Surfaces Company, KIL Inc. Kilgore Flares Co, LLC, SABA (Federal Advisory Board), Pan American International Academy (Flight Simulators) and Crescent Partnerships.


Moderator
Seminar PE1: Trends in Intelligence Technology
UAV vs. Satellite
February 8, 14:00-15:15


Moderator
Seminar PE1: Trends in Intelligence Technology
Securing Intelligence Networks
February 8, 16:15-17:00


Richard McPherson
Mitopia System


 
Biography
Mr. McPherson is a retired Submarine Officer with an extensive background in defense related technologies, information technology and nuclear energy. He also served on surface ships and major staffs like CINPACFLT. Later, by invitation after Chernobyl, he was the United States representative to a six-nation group at the International Atomic Energy Agency (IAEA) in Vienna, Austria. From 1993-1997, Mr. McPherson, was Managing Director of GoodSmith & Co., Incorporated, where he was responsible for carrying out a wide variety of large ticket financings for the international investment-banking firm. His involvement in the financing of projects, major assets, large facilities, installations, acquisitions, divestitures, and related transactions for the firm's corporate clients encompassed all aspects of finance and required him to participate directly in transactions initiation, negotiation, client relations, tax and financial structuring, due diligence, and closings. Mr. McPherson developed and participated in dozens of corporate financings, ranging from $5 million to over $500 million. Mr. McPherson has worked in over thirty countries. His association with international national security issues span over four decades.


Track 2: DOD/Military
DM5: Are We Losing our Edge on Technical Collection?
February 10
08:15-09:00
Abstract

In the asymmetric war on terrorism, the enemy hides and attacks while we are in the open and must defend. In this scenario, our "offense" is more of an active defense - we strike when we have actionable intelligence about the enemy. The cost of satellites and current collection methods is already high, and getting much higher. From what is basically a reactive stance, two things limit our ability to succeed: 1) quality of the intelligence collected, and 2) the ability to take action intelligence a timely manner. Current technical collection systems were not designed to address a highly decentralized and distributed foe. Worse yet is how current information systems act on collected information. They are too slow to react and adapt. These shortcomings will be discussed. Additionally, a completely novel and mature solution to these shortcomings will be presented. A solution capable of taking advantage of open source information and other structured and unstructured data from collection sources at the same time.

Ken Meyer
Instructional Program Manager
Florida Community College at Jacksonville
President, AFIO North Florida Chapter


 
Biography
Kenneth (Ken) Meyer is a Distinguished Graduate of the Monterey Defense Language Institute's 37 week Intermediate Hungarian and 47 week Basic Hungarian courses. Ken worked on the Hungarian Language Team in A-Group at the National Security Agency 1976 - 1981. While stationed at NSA, Ken also performed airborne linguist duties with the 6948 Security Service Squadron Det 1. Mobile. After leaving NSA, Captain Meyer taught Air Weapons Director/Controller training courses, provided air defense services to the Republic of Korea, and taught international relations & national security courses at the University of Maryland - College Park. At the end of his Air Force service he served as a Special Projects Test Commander and Director Foreign Electronic Combat with the Air Force Flight Test Center. Today, Ken is the Instructional Program Manager for Computer Science at Florida Community College at Jacksonville. Also, he is the President of the North Florida Chapter of the Association of Former Intelligence Officers. Ken holds Masters degrees from the University of Southern California and Jacksonville University, a Bachelors from the University of Maryland, and an Associates in Interpreting and Translating - Hungarian - from the Community College of the Air Force.


Seminar PE5: Finding and Keeping Intelligence Specialists
Translators
February 8, 15:00-16:45
Translators
Abstract

A call for a National Translation Service - based roughly on the Americorps model combined with some Reserve or Guard parts. The real goal is to leverage the massive dollars spent training linguists at the Defense Language Institute and those non-DOD type linguists that can serve their country this way.

Dr. James Arnold Miller
Chairman, Interaction Systems Incorporated


 
Biography
Dr. Miller prepares four regular unclassified threat reports that are widely disseminated electronically in the intelligence and public safety communities: (1) Terrorism Open Source Intelligence Report, (2) Terrorism Literature Report, (3) Warning Intelligence on the Internet Review, and (4) Regional and Country Watch List. For twenty-six years Dr. Miller and his firm Interaction Systems Incorporated have been preparing unclassified reports and organizing conferences on global threat topics. Earlier he served for a decade in the U.S. Air Force including in the Office of Special Investigations as a criminal investigations and counterintelligence officer, detachment commander (including in Vietnam), and a terrorism analyst. His doctoral dissertation presented from an intelligence officer's perspective a methodology for analyzing terrorist, insurgent, and other political violence movements. Dr. Miller is a member of the board of directors of the National Military Intelligence Association.


Plenary Session PL2:
Open Source Intelligence and 21st Century Threats
February 10, 16:00-16:45
Abstract

The recently approved intelligence reform legislation requires the Director of National Intelligence (DNI) to ensure that the intelligence community makes efficient and effective use of open source information and analysis. This special plenary presentation will address how anyone in the traditional intelligence community - or in the public safety community or companies - can systematically locate, select, organize, retrieve, analyze, and disseminate useful open source intelligence (OSINT). The speaker will emphasize how to "separate the wheat from the chaff," especially concerning the torrents of information besieging analysts on such pressing 21st century threats as weapons of mass destruction, terrorism, and insurgency.

Also in the new reform bill is the sense of Congress that the DNI should establish an intelligence center to coordinate collection, analysis, production, and dissemination of OSINT. The speaker will address whether such a center is necessary, and if so, how it might function to significantly improve the use of OSINT with regard to major threats. Also to be discussed is how electronically networked experts in the private sector could collaborate to substantially supplement secret and proprietary intelligence through such activities as building unclassified foundation databases on major threat topics; conducting alternative analysis; and providing strategic warning on global threats.

Gen. Kenneth Minihan USAF, (Ret)
President and Chairman, SASA
Former Director, NSA


 
Biography
Lieutenant General Ken Minihan retired from the U. S. Air Force on June 1,1999, after more than 33 years of active commissioned service to the nation. On his final tour of duty he served as the 14th Director of the National Security Agency/Central Security Service, a combat support agency of the Department of Defense with military and civilian personnel stationed worldwide. As Director, he was the senior uniformed intelligence officer in the Department of Defense. He has also served as the Director of the Defense Intelligence Agency. He has over thirty years experience in national, defense and military information services, information technology development and diverse customer support services.

Lieutenant General Ken Minihan has vast experience in large complex global and national information operations, information technology deployment, and customer requirement satisfaction. While the Director of NSA, he helped conceive and provide strategic direction to the National Information Assurance Program. He also created strategic approaches and development concepts for emerging telecommunications technology while redesigning core business skills and efficient operations. He has the unique ability to integrate complex programs and business operations allowing the organization to focus on cost and schedule goals.

Lieutenant General Ken Minihan has gained exceptional recognition for outstanding performance for organizations he has directed for over a long history. He organized and executed multinational global operations for information services and implemented core business metrics and a strong commitment to teamwork. He led NSA to recognition as a Baldridge and Presidential Quality Award finalist. He has a history of exceeding contract goals while producing breakout technologies and re-engineered operations.

Lieutenant General Ken Minihan created strategic approaches to exploit and secure modern network technologies, reshaped multinational operations and reconstructed business products and services. His innovative design solutions helped maintain a competitive advantage in a high charged global market. Products and services were provided in time to make a difference. He has the distinct ability to recruit and communicate with the work force throughout the organization.

Lieutenant General Ken Minihan is a Principal in the Paladin Capital Group Homeland Security Fund and is President of the Security Affairs Support Association in Washington DC, the flagship organization for industry and government partnership to enhance intelligence business development. He is also a member of the Air Force Association, the National Military Intelligence Association, and several other national organizations. He often serves on government pro bono committees and panels to examine ways to enhance homeland and national security capabilities.

Lieutenant General Ken Minihan has a Baccalaureate Degree from Florida State University, a Masters Degree from the Naval Postgraduate School, and has completed executive development programs at the University of Illinois and Harvard University. Among his awards and decorations are the National Security Medal, the Defense Distinguished Service Medal, the Bronze Star, and the National Intelligence Distinguished Service Medal.


Seminar PE1: Trends in Intelligence Technology
February 8, 10:50-11:30
Technology Challenges, Intelligence and the 21st Century
Abstract

We must come to grips with the inevitable fading of US technological superiority in an increasingly dangerous and sophisticated global economy. That global economy and its dispersed network has become the "tool of the weak" where groups with limited resources and less sophisticated capabilities can compete or even outmatch American capabilities. Technology advances in our intelligence community have not kept pace with the more diverse, unconventional (and non-static) threat. Nor have we produced technology solutions with the attributes of full spectrum attack; horizontal and vertical integration; assessments of effects achieved vice targets attrited; and, a comprehensive understanding of our adversary (moral, mental and physical domains). We must structure our technology investment strategy against our hardest problems of transnational terrorism, homeland security, participation in military operations and indications and warning to prevent surprise. Because of the inherently unpredictable effects of major technological changes in the coming decade and the potential synergies across emerging technological sectors, it is critical for US intelligence that American industry lead the development of next-generation intelligence technology to regain lost superiority. Waiting for another disaster to point out our shortcomings and generate programmatic responses is not a strategy.

Yehoshuah Mizrachi
Director, Operation Shiloh


 
Biography
Yehoshuah Mizrachi is the founder and Program Director of Operation Shiloh - the Israeli Counter-Terrorism Training for American Civilians (http://www.opshiloh.com).

In January 2002 Mr. Mizrachi was yards away from a homicide bombing in downtown Jerusalem. Reflecting upon this experience, Mr. Mizrachi recognized that Israeli citizens have a well-rehearsed, almost instinctive reaction to terror attacks. This collective knowledge base regarding prevention of, and response to, mass casualty terror attacks have been gleaned over the last 80 years of hard and bloody experience.

In light of the fact that such attacks are likely to recur in the US, he recognized the need for an Israeli-based curriculum designed for American civilians that teaches terror prevention and response techniques appropriate for civilians at large. The result was the OpShiloh training doctrine.

For almost a year, Mr. Mizrachi developed the OpShiloh curriculum, working closely with the IDF. The first group of American trainees came through the course in July 2003.

In July 2004, OpShiloh announced the development of a modified US-based training curriculum.

Mr. Mizrachi holds a BA from Georgetown University.


Seminar PE8: Getting the Public Involved
February 8, 15:00-15:45
Civilians: America's Secret Weapon in Homeland Defense
Abstract

Intelligence estimates indicate that additional mass casualty terror attacks like 9/11 are very likely on American soil, and perhaps soon. Additionally, there have been hundreds of documented hostile surveillance incidents against Jewish and Christian soft targets around the US.

Aside from confusing pronouncements warning American citizens to 'be especially alert' while simultaneously warning them go about their normal routines, there is very little tangible information available to American citizens as to how - precisely - to be 'alert.'

In the absence of guidance, the public seems to vacillate between complacency on the on hand and hysteria on the other. Yet between these extremes lies the golden mean - realistic threat assessment and response.

This presentation will explore what practical options exist for citizens; whether is there a role for citizens in homeland defense; and how citizen programs integrate into the broader homeland defense schema.

Presentation to be followed by question and answer session.

Ray Musser
Director of Security, General Dynamics


 
Biography
Raymond H. Musser has over 30 years of experience in security and law enforcement matters. He currently directs global security operations for General Dynamics Corporation.

As part of his duties he established the company's Global Incident Response Center which links 16 separate business units for reporting and emergency assistance anywhere in the world. This Center has become a model in the security industry.

Mr. Musser has had extensive experience in security planning and programs abroad, particularly in the Southwest Asia region.

He is a Certified Protection Professional credentialed by ASIS international. He is co-chairman of the ASIS Military Liaison Council. He also serves as an industry member of the National Industrial Security Program Policy Advisory Committee.


Track 4: Business
BN5: Industry and FBI Partnership for Counterintelligence
February 10, 08:15-09:00


Dame Pauline Neville-Jones
Former Chair, UK Joint Intelligence Committee


 
Biography
Dame Pauline Neville-Jones is Chairman of QinetiQ Group plc, a defence technology company with government customers in the UK and USA and Chairman of the Information Assurance Advisory Council (IAAC). From 1998- 2004 she was the International Governor of the BBC with responsibility, among other things, for external broadcasting, notably the BBC World Service (radio and online) and BBC World (television).

Prior to that, she was a career member of the British Diplomatic Service serving, among other places, in Singapore, Washington DC, the European Commission in Brussels and Bonn. She was a foreign affairs adviser to Prime Minister John Major, chairman of the Joint Intelligence Committee in Whitehall (1991- 1994) and, as Political Director in the Foreign and Commonwealth Office, leader of the British delegation to the Dayton peace conference on Bosnia in 1995.


Seminar PE6: View from Abroad
Britain
February 8, 09:00-10:35
Abstract

Nature of threats (WMD, terrorism, crime non state actors) has dramatically increased the centrality of the role to be played for the foreseeable future by intelligence in policy making and operations.

It is much more difficult than in the past to distinguish between strategic and operational intelligence and arguably unhelpful to do so as it is the purpose to which intelligence is applied that matters. But the big picture is in danger of being forced out/ignored by focus on day-to-day developments and operations. Absence of context and underlying analysis of the drivers and implications of an emerging big picture can lead to unforced errors of policy, which cumulatively, can be dangerous.

Strategic assessment, which brings together open source as well as secret source information, remains as important as ever. Is it currently getting the resources or the attention it deserves either from the intelligence community or the policy maker? The difficulty of understanding what is going on makes this task more, not less important.

Robustness of the intelligence assessment is an issue. How easy does the intelligence community make it for the busy policy maker to crack the professional code which indicates the degree of confidence to be attached to a given interpretation or judgment? How influenced is the policy maker by preconceived ideas or policy goals? Is the dialogue between the two sufficient or frank enough? How close should the intelligence community and the policy maker be to each other?

When it comes to operations, is the whole community of users being properly catered for? Channels for the flow of intelligence for military use are well organized and understood. But in an age of network global criminality with a capacity for surprise and potentially devastating direct action against civilian populations, there is an additional vast range of civilian agencies and users with an operational need to know. Getting this right is a huge challenge and there is some way to go.

International cooperation seems a natural response to global threats. But how much can we expect from it?


Keynote Address KA1: A look at the special relationship: policy and intelligence.
February 9, 09:15-10:00

Dr. Walid Phares
Senior Fellow
The Foundation for the Defense of Democracies


 
Biography
Dr. Walid Phares is a professor of Conflict and Middle East Studies at Florida Atlantic University and is now a Senior Fellow with the Foundation for the Defense of Democracies in Washington. He is the Terrorism Expert with the Family Security Matters based in New York. Phares served as an Expert on Jihadism and Terrorism for the US Department of Justice and for the Dutch Government in 2002-2003. He has produced a master video presentation for US security agencies on "Profile of the Terrorists" in 2001. He is a Terrorism Analyst with NBC-MSNBC, and appears on Fox News, CNN, BBC, al Hurra and other networks around the world. Phares is a regular expert with many national and international radio programs.

Phares published eight books on Middle East Conflicts including: the Iranian Islamic Revolution, Lebanon war, minorities and Islamic Fundamentalism. He has published many scholarly articles and hundreds of op eds in the international press including the Wall Street Journal, Washington Times, al Nahar, etc. His upcoming book for 2005 will analyze the strategies of the Jihadists worldwide.

He holds degrees in law and political science from Saint Joseph University and the Lebanese University in Beirut, a Masters in international law from the Universite de Lyons in France and a Ph.D. in international relations and strategic studies from the University of Miami.


Seminar PE6: View from Abroad
Middle East
February 8, 16:00-16:30
Middle East
Abstract

Track 5: Private Sector
PS4: Intelligence & Civil Society
February 9, 15:10-15:45
Intelligence & Civil Society
Abstract

Track 5: Private Sector
PS6: Dialoguing with Ethnic and Religious Organizations
February 10, 10:15-11:00
Dialoguing with Ethnic and Religious Organizations
Abstract

Track 5: Private Sector
PS7: Academia: Terrorist Battleground?
February 10, 14:00-14:45
Academia: Terrorist Battleground?
Abstract

Steve Pomerantz
Former Deputy Director and Director of Counterterrorism, FBI


 
Biography
Mr. Pomerantz currently operates Steve L. Pomerantz & Associates, a consulting firm located in Annandale, VA specializing in security and criminal justice related matters. He also serves as the Executive Vice-President of the Institute For The Study of Terrorism and Political Violence, a non-profit international organization located in Washington, DC. Mr. Pomerantz retired from the FBI in June 1995 after a career spanning twenty-seven years. During that time period he rose from a field investigative Special Agent to the rank of Assistant Deputy Director. Mr. Pomerantz served as a Special Agent in the Mobile. Alabama, and Detroit, Michigan field offices between 1968 and 1976.


Seminar PE7: Sharing Intelligence, Part 2
February 8, 14:00-16:45

Track3: State and Local Law Enforcement
SL6: Terrorism Task Forces: Band-aid or Solution?
February 10, 10:15-11:00

Track 1: Federal Civilian
FD7: Inter-Agency Task Forces
February 10, 14:00-14:45

Stephen Price-Francis
VP, LaserCard Corporation


 
Biography
Stephen Price-Francis is Vice President, Business Development of LaserCard Corporation, of Mountain View, California, the world leader in Optical Memory Card technology. In this role, he has been directly involved in the development and implementation of the largest secure government multiple biometric ID card program in North America which is based on the U.S. "Green Card", the Mexican Border Crossing Card (or "LaserVisa"), and the Canadian Permanent Resident Card.

Price-Francis is a director of the North American Secure Products Organization and a founding director and past president of the Advanced Card Technology Association of Canada. He is active in the development of international standards for optical cards, biometrics and travel documents and is the inventor of a patented identity verification process. He is a regular contributor to industry conferences and publications.


Seminar PE1: Trends in Intelligence Technology - Trends in Biometrics: Future & Past
February 8, 09:45-10:45
LaserCard Optical Memory Card in U.S. and Other Government Programs
Abstract

LaserCard optical memory card is the most widely used secure, biometric-based ID technology in the U.S. Homeland Security market. In North America as a whole, more than 20 million people in the U.S.A., Canada and Mexico have been issued an optical memory card for border crossing and residency applications. As a result, the NAFTA region boasts the largest Homeland Security biometric ID card population in the world with no known case of the optical card's security having been compromised.

The governments of Italy and Saudi Arabia have also demanded the security of optical memory card for their national ID programs, which play a key role in their Homeland Security, and both have added an IC chip to the card for e-government applications.

Optical memory card is specified for these Homeland Security applications based on three key characteristics which are unequalled by any other card technology - security, durability, and high data storage capacity. In addition, a full suite of international standards defines methods for the transportability of data (such as biometric images of face and fingerprints) and interoperability of cards and reading systems between countries.

The more than 1,000 LaserCard optical memory inspection systems purchased by the U.S. Department of Homeland Security, and its Canadian equivalent, comply with these standards and are fully capable of authenticating and reading any other nation's ICAO-compliant optical card. This complete border security system is fully functional, available today and proven in the field.

Just such a system could be assisting with Homeland Security issues immediately in strife-torn areas, such as Iraq. It is impossible to fraudulently alter data stored on an optical memory card and there is no known incidence of a working optical card's having been counterfeited. Thus undesirables would have no opportunity to penetrate the security perimeter, such as that surrounding the "Green Zone" in Baghdad or Armed Forces bases, either by creating a counterfeit card or by impersonating the legitimate holder of an authentic card.


Future trends:

Several nations have acknowledged the fundamental security provided by optical memory in the Homeland Security environment. Now, increasingly, we will see the requirement to couple this key security strength with the convenience of RFID, especially at land borders where volume of border crossers is high. In this scenario, the RFID can "pre-notify" the inspection system of the arrival of the cardholder, so that watch list checks can be carried out, in the background, prior to the final card authentication and ID verification processes.

Also, we are seeing the emergence of a requirement to achieve transportability of biometrics across national and system boundaries. It is generally acknowledged that the most effective way of achieving this is by carrying original images of face, fingerprints, irises, etc, on the ID card. The only card technology available to deliver on this requirement, without compromising on resolution and therefore accuracy, is optical memory card.

Walter Purdy
Terrorism Research Center
Vice President - Training and Special Projects


 
Biography
Walter Purdy has developed and directed the training of law enforcement officers in areas such as Law Enforcement Response to Terrorism, Responding to WMD Incidents, Critical Incidents-Command and Control, Counter-terrorism Techniques Advanced SWAT Techniques, and Lessons Learned from Terrorism over Twenty Five Years. Mr. Purdy has undertaken a number of special projects and research projects and has supported efforts by the U.S. State Department, U.S. Department of Justice and the IACP. Mr. Purdy received a Bachelor's Degree and did graduate work at George Mason University. He later obtained a Law degree from Thomas Cooley School of Law in Lansing, Michigan. Mr. Purdy has served in the United States Marine Corp. Mr. Purdy has traveled extensively to include the Middle East, and Asia.


Track 3: State and Local Law Enforcement
SL1: Profiling Terrorists Among Us
February 9, 08:15-09:00


Harold Rhode
Office of the Secretary of Defense


 
Biography
Harold Rhode is the Foreign Policy Assistant to the Director of Net Assessment, a position he has held since 1994. He specializes in Middle Eastern and Islamic affairs.

Mr. Rhode has spent past 22 years working in OSD in various Middle Eastern and Islamic-oriented capacities. He also spent the first three months of the Iraq war and the aftermath with ORHA/CPA. He graduated from Columbia University with a Ph.D. in Middle Eastern History in 1979. Rhode also studied in universities in Israel, Egypt, and Iran, and has traveled extensively in throughout the Middle East.


Moderator
Seminar PE4: Reforming the Intelligence Community
February 8, 14:00-16:45

The Rev. Canon Keith Roderick, D.D.
Secretary General
Coalition for the Defense of Human Rights


 
Biography
An Episcopal priest, Father Keith Roderick was a Cold War human rights activist on behalf of Soviet citizens facing religious persecution under Communist rule. A chance encounter with an Egyptian Muslim who faced death threats upon converting to Christianity awakened Roderick to the problem of religious persecution in the Muslim world. He now serves as Christian Solidarity International's Representative in Washington, D.C. Christian Solidarity International (CSI) is a Christian human rights organization for religious liberty helping victims of religious repression, victimized children and victims of disaster. It is based in Zurich, Switzerland but has office in several countries, including the U.S. www.csi-usa.org

Father Roderick has served as Secretary General of the Coalition for the Defense of Human Rights (CDHR) since 1993. The Coalition is a consortium of over fifty-five organizations working together to champion the rights of minorities living in Islamic countries. Its primary focus is the condition of religious minorities living in Islamic countries. Members of the Coalition include Catholics, Protestants, Orthodox Christians, Jews, Hindus, Muslims, Assyrians, Armenians, Bahai, Copts, Lebanese, Indonesians, Iranians, Pakistanis, Indians, Sudanese, Nigerians, and others. Father Roderick has testified to the Senate and House of Representatives on the issue of religious freedom and human rights concerns of non-Muslim minorities in Islamic countries. www.dhimmi.com

He is an Episcopal priest of the Diocese of Quincy, serving as the only Canon for Persecuted Christians in the Episcopal Church. Father Roderick also serves as Executive Director of the Sudan Campaign and was one of the organizers of daily demonstrations at the Sudan embassy in protest of slavery and genocide in Sudan in 2004.

Father Roderick and his wife, Mary Beth, have six children, Seth, Micah, Noah, Sarah, Joseph and Susannah. Formerly he was the Director of Spoon River College in Macomb, Illinois and taught religion and philosophy for fifteen years. He founded the Society of St. Stephen in 1982 that worked on behalf of religious prisoners of conscience and their families in the former Soviet Union. He served as the Co-Director of the International Task Force, formerly The Task Force on Soviet Jewry.

Education
1996 - Doctor of Divinity, Faith Theological Seminary, Gujranwala, Pakistan
1986 - Certificate for Post-Graduate Studies, Nashotah House, Delafield, WI
1980 - Master of Divinity, University of Dubuque Theological Seminary, Dubuque, IA
1976 - Bachelor of Arts, University of Illinois - Springfield, Springfield, IL


Track 5: Private Sector
PS6: Dialoguing with Ethnic and Religious Organizations
February 10, 10:15-11:00



Hon. Dutch Ruppersberger
US Congressman, MD, 2nd District


 
Biography
Congressman Dutch Ruppersberger is serving his first term in the United States House of Representatives representing the citizens of Maryland's 2nd District. Congressman Ruppersberger is known as a consensus builder who works with Members from both sides of the aisle to get results for Maryland and the nation.

In what Congressional Quarterly called "a coup", Congressman Ruppersberger was the first Democratic freshman ever to be appointed to the powerful House Select Committee on Intelligence. The committee oversees the collection and analysis of intelligence information from all around the world to ensure our national security and prevent potential crisis situations - especially terrorist activity.

Congressman Ruppersberger was hand-picked by the Democratic Leadership and named an Assistant Whip. In this prestigious position he meets regularly with the House leadership to help set legislative priorities and to ensure the passage of key measures.

Congressman Ruppersberger serves on the Government Reform Committee, the investigative arm of Congress, where he works to prevent government fraud and waste and to craft reforms to improve the efficiency and effectiveness of government programs. The Congressman was also elected by his freshman Democratic peers to represent them on the Democratic Steering and Policy Committee.

Congressman Ruppersberger is working hard in Washington to create jobs and rebuild our economy in Maryland and across the country. He is dedicated to improving healthcare for everyone and helping seniors by providing them with quality, affordable and accessible healthcare and prescription drugs. The Congressman considers one of his highest priorities to improve the security of our homeland and get our first responders the money they need to protect our communities and our families.

Maryland's 2nd District includes parts of Baltimore City, Baltimore County, Anne Arundel County and Harford County. It is a vital center of trade and commerce for the state and national economy as it includes Baltimore-Washington International Airport, the Port of Baltimore and thousands of businesses and manufacturing concerns dependent on these international gateways. The 2nd is also home to the National Security Agency, Fort Meade, Aberdeen Proving Grounds, and other installations essential to the country's national security.

Congressman Ruppersberger has spent the last 17 years serving his community as an elected official. Before being elected to the 100th Congress, he was the Baltimore County Executive from 1994 to 2002. Under his leadership, Baltimore County was named one of the nation's four best-managed counties by Governing Magazine in 2001 and is still one of only 19 counties nationally which continue to receive a triple-A bond rating from all three of the country's bond rating agencies. Prior to serving as County Executive, Congressman Ruppersberger served nine years on the Baltimore County Council and was twice elected as council chairman.

Congressman Ruppersberger chose a political career after a near-fatal car accident in 1975 while investigating a drug trafficking case as a State's Attorney. With luck and the dedication of doctors at the University of Maryland's renowned Shock Trauma center, he survived. After recovering the young investigative prosecutor decided to run for public office to help others and to repay Shock Trauma for saving his life. Today, he remains an active supporter of the hospital, serving as Vice Chairman of the hospital's Board of Visitors.

A native of Baltimore City, Congressman Ruppersberger spent his summers as a lifeguard in Ocean City. He attended Baltimore City College and the University of Maryland at College Park, where he played varsity lacrosse. He earned his Juris Doctorate from the University Of Baltimore Law School.


Seminar PE5: Finding and Keeping Intelligence Specialists - Training
February 8, 14:00-14:45

Ken Sawka
Principal, Outward Insights


 
Biography
Kenneth Sawka is a principal at Outward Insights, a leading competitive intelligence and strategy consulting firm. There, he counsels senior executives at leading companies on how to use intelligence to set business strategies. Mr. Sawka has 20 years experience in government and private sector intelligence, including serving eight years as an analyst at CIA. Ken has been quoted extensively on matters of competitive strategy and intelligence in Time, Investors Business Daily, American Banker, and other prominent journals. He is a member of the Society of Competitive Intelligence Professionals and served on the Society's Board of Directors.


Track 4: Business
BN1: What Government and Business Intelligence Pros Can Learn From Each Other
February 9, 08:15-09:00
What Government and Business Intelligence Pros Can Learn From Each Other
Abstract

Conventional wisdom presumes that government intelligence professionals are more advanced than their corporate peers in the sophistication of their techniques and deliverables. In recent years, however, business intelligence practitioners have become arguably more skilled in areas such as developing innovative analytic techniques, delivering intelligence tailored to decisionmakers' needs, and in building closer relationships with corporate intelligence consumers. In this presentation, two professionals who work to help both business and government intelligence professionals improve their analytic skills will discuss the areas in which business and government intelligence can learn from each other, and propose ways in which this exchange of ideas should take place.

Michael Scheuer
Former CIA
Author of "Imperial Hubris"


 
Biography
Michael Scheuer, former chief of the Counterterrorist Center's Bin Laden unit, resigned from the CIA in November 2004 after 22 years of federal service devoted to national security issues related to South Asia and Islamic extremism. Because of the CIA's pre-publication requirements, he anonymously wrote the New York Times and Washington Post bestseller Imperial Hubris: Why the West Is Losing the War on Terror and Through Our Enemies' Eyes: Osama bin Laden, Radical Islam, and the Future of America. He has been featured on many national and international news programs and interviews for broadcast media and documentaries, as well as in print media worldwide.


Seminar PE4: Reforming the Intelligence Community
February 8, 14:00-16:45

Track 1: Federal Civilian
FD5: Reforming Covert Operations
February 10, 08:15-09:00

Ray Shanley
Senior Architect
Identity Systems


 
Biography
Ray Shanley, Senior Architect with Identity Systems (formerly known as Search Software America) has over 20 years experience in enterprise software development. As a Senior Architect with Identity Systems, Ray has extensive experience working with organizations in the law enforcement, judicial and intelligence communities requiring expertise focusing on the use of identity data to search, match and link records in critical data applications.


Seminar PE1: Trends in Intelligence Technology
Search Software & Intelligence Software
February 8, 16:15-17:00
Search Software & Intelligence Software
Abstract

- Using identity data to search databases quickly and accurately every time

- The complexities associated with the often overlooked and underestimated problem space of searching and matching data systems using names and address.

- How identity data differs from other kinds of data and considerations needed when approaching this type of data

- Common reasons why systems have problems finding, grouping and linking identity records and how to overcome and improve the failure rate

- New approaches that are proven to work on both US and multinational/international data

- How searching on text and alphanumeric identity data can complement biometric applications

- Identity data is not only for people but addresses and items that will not have biometric data available. The future will require both biometric and trustworthy text and alphanumeric searching and matching capabilities.

Eric Shawn
Fox News Channel


 
Biography
Eric Shawn, a New York based senior correspondent for FOX News Channel, joined the network from FOX's affiliate news service, FOX News Edge.

He has covered a number of breaking news stories for FNC, including the Indian and Pakistani nuclear warfare threats, the death of Princess Diana, the Iraqi standoff with the U.N., Louise Woodward Nanny trial and the Martha Moxley murder investigation.

As a senior correspondent for FOX News Edge, Shawn covered the Unabomber arrest, the Persian Gulf War and the 1992 Clinton campaign. He also provided daily reports for the 1995 murder trial of O.J. Simpson direct from the courthouse in Los Angeles.

Prior to his stint at FOX News Edge, Shawn was a reporter for WNYW-TV (FOX) in New York.

He graduated from Georgetown University with a degree in Urban Studies.


Seminar PE8: Getting the Public Involved
Role of the Media
February 8, 09:50-10:35

Izhar Shay
Chairman and CEO
V-Secure Technologies


 
Biography
Mr. Shay has more than 20 years of experience in management, business and technical positions. He was the Co-Founder and CEO of Business Layers, the company that pioneered the eProvisioning space. Izhar holds a B.Sc. in Electronics Engineering from the Technion Institute, in Haifa, Israel.


Seminar PE1: Trends in Intelligence Technology
Securing Intelligence Networks
February 8, 09:00-09:40
Securing Intelligence Networks
Abstract

More than 80% of companies connected to the Internet experience a disruption in business due to a worm or virus, with 40% of these respondents also experiencing at least one denial of service attack.

V-Secure suggests a panel, which will address Cyber Threats and the way to deal with them through global cooperation between governments, vendors and service providers.

- Cyber Security has become a global concern
- Cyber threats are a major concern for government and commercial organizations alike
- Possible damages include, financial, reputation, image, breach of commercial confidential information, and national security
- Attending to these concerns requires cooperation between vendors and policy makers
- Appropriate strategy towards protection against cyber threats requires planning, cooperation between various constituents, regulation, enforcement and technology innovation
- Appropriate protection means still letting the "good guys" in, enabling global connectivity, but properly protecting against cyber attacks
- The layered approach towards security - a concerted effort in various parts of the infrastructure, including appropriate organizational policies, structure and enforcement.

Katherine M. Shelfer, PhD.
Assistant Professor & Director Competitive Intelligence Certificate Program
Drexel University


 
Biography
Katherine M. Shelfer, PhD.(www.biodemographics.org) developed and currently directs the Competitive Intelligence Certificate Program at Drexel University (www.drexel.edu). Her teaching interests include business research, strategic knowledge management, competitive intelligence and software/systems design and development. Her research and consulting activities focus on smartcard systems; the strategic acquisition and use of biometric, demographic and biodemographic data in a wide range of contexts; and the creation and use of reality-based scenarios for use in strategic analysis. Examples of her work have appeared in Advances in Computer Science, Communications of the ACM, the Defense Intelligence Journal, Information Outlook, Foundations of Data Mining, JASIST and Knowledge Management for the Information Professional. A Fellow of the Society of Competitive Intelligence Professionals and a founding member of the Women's Leadership Council, she also serves on the editorial board of the Journal of Competitive Intelligence and Management.


Track 4: Business
BN3: Improving the Interpretive Value of Demographic Data
February 9, 14:00-14:45

Col. Oded Shoham, IDF (Res.)
CEO, ICTS Technologies USA, Inc.


 
Biography
Col. Oded Shoham (IDF - Israel Defense Forces, Res.), has been intensely involved in intelligence and security activities over the past 30 years.

An expert System & Electronics Engineer, a summa cum laude graduate, Col. Shoham is the former head of the Technological Research, Development and Implementation Center of the Israel Defense Forces' Intelligence Corps.

During his 25-year military service Col. Shoham accumulated wide-ranging expertise and experience, encompassing the design and development of complex, large-scale, innovative technological systems designed to meet specific intelligence and security requirements, from the initial stage of analyzing and determining the field requirements, through system planning, concept design, development and implementation, to system installation, provision of long-term maintenance and subsequently - technological upgrading to meet evolving intelligence and security needs. In many cases, Col. Shoham was entrusted with the task of developing unique, creative technological solutions in order to provide suitable responses to specific problems. Throughout his career, Col. Shoham has successfully executed numerous highly sophisticated projects and has implemented pioneering programs of major significance, for governmental and private organizations in the US, Europe and Israel.

After retiring from the Israel Defense Forces, Col. Shoham joined a private firm specializing in network security solutions, as its General Manager.

In his current position as the CEO of ICTS Technologies, Col. Shoham continues to lead the development and management of advanced technological solutions for the homeland security market. ICTS Technologies, develops state-of-the-art technological products that combine the company's significant technological capabilities with its extensive expertise and international experience in security operations worldwide, spanning a period of more than two decades.


Seminar PE1: Trends in Intelligence Technology
Technology Aiding Intelligence Collection
February 8, 15:20-16:10
Technology Aiding Intelligence Collection
Abstract

Accurate, reliable and detailed intelligence is a crucial to security operations on local and national levels, yet is extremely difficult to obtain. It is the product of a structured methodology that includes the collection of raw information, its processing and analysis, decision making based on the analysis, distribution to a defined list of recipients, and storage in databases in a determined format.

Since the events of 9/11, terror threats have escalated as never before. Recent intelligence points to declared targets that include public transportation and facilities at which large-scale events are held (stadiums, for example), where the human toll resulting from an attack would be extremely high, and the effect on public morale severe. In order to substantially decrease the probability of several types of attack and thus reduce security risks, it is essential to perform effective security processing of the relevant population (travelers, spectators, visitors, etc.) – concerning whom very little or no advance information is available – before they enter the facility or board aircraft or trains.

By implementing the structured methodology described above on the one hand, and enhancing each of its stages in terms of accuracy and speed on the other hand, we can obtain high quality results: Information concerning a random population may be gathered in several ways – collecting the basic information by employing extremely accurate automated document reading technologies; through the examination of appearance and behavior by trained security agents, advanced biometric processing and more. The collected information may be processed and analyzed using sophisticated, high-performance positive rule engines; the analysis results are then transferred to decision makers, allowing them to arrive at well-based conclusions. Intelligence is distributed on a need-to-know basis (to security agents, command and control centers, emergency forces, etc.). The data is also used to update existing databases and where relevant – to construct new ones, enabling efficient retrieval in the future.

In the case of surveillance systems, the information may be gathered through use of innovative sensors such as passive electro-optic sensors, super-resolution cameras and more that will enable the system to detect intruders or any unauthorized activity both within the perimeter area as well as at a predefined distance from it. The information gathered by the sensors may be integrated into the Command and Control system, and some images may also be displayed in 3D. Security forces are thus provided with additional time to effectively respond to the threat and take appropriate action.

Michael Shrimpton
UK national security lawyer


 
Biography
Michael Shrimpton is a barrister specializing in national security and intelligence law, practising in the UK. He was called to the English Bar by Gray’s Inn in 1983 and appointed to part-time judicial office as a Chairman of the Immigration Appeal Tribunal in 1992. A British neoconservative, he was a Parliamentary candidate for the Labour Party in the 1980s but moved to the Conservative Party in the 1990s. A prominent Eurosceptic who has called for UK withdrawal from the European Union and a UKUSA free trade area to match the NATO & intelligence relationship, he was formerly Co-Chairman of the Bruges Group (Hon. President Lady Margaret Thatcher).

He is believed to be close to the Bush Administration and the British, American and Israeli intelligence communities. He visited the West Bank, Israeli/Lebanon frontier and Jerusalem in 2003, when he was present at a counter-terrorist briefing given by a senior officer of the Mossad. His contacts include former Directors of the CIA, the Mossad, MI5 and the UK Defence Intelligence Staff.

Michael Shrimpton met with General Pinochet in London in 1999 and negotiated the national security aspects of the Pinochet case with inter alia the late one-time CIA Deputy Director, Lt-Gen Vernon Walters. His clients have included officers/retired officers of the NSA, CIA and Mossad. He specializes in counter-terrorism, counter-intelligence, assassination deconstruction and counter-proliferation and has negotiated the recovery of weapons-grade fissile material. He has given briefings on national security matters to staffers on the Joint Congressional Inquiry into 9-11, the Senate Select Committee on Intelligence and former UNSCOM inspectors. He has been prominent in calling for detailed investigation into the 2003 assassination of former UNSCOM inspector Dr. David Kelly CMG.

Michael Shrimpton is a member of the Royal Institute of International Affairs (Chatham House), the Royal United Services Institute (RUSI), the UK Defence and Security Forum, the European-Atlantic Group, the Military Commentators Circle and the US Naval Institute. He is a Fellow of the Atlantic Council of the United Kingdom.

His publications record includes articles in the London Times and the Journal of International Security Affairs and he has made numerous media appearances, including on the BBC and CNN.


Seminar PE2:
Political, Policy and Legal Issues
February 8, 14:00-16:45
POLITICO-LEGAL ISSUES ARISIN FROM THE WAR ON TERROR
Abstract

(1) GUANTANAMO BAY

The detention of unlawful combatants at Guantanamo Bay USMC facility fully justified, under the Laws of War, and applicable federal and military law. Neither Al Qaeda nor the Taliban conducted operations in accordance with the Laws of War and their prisoners forfeit any claim to POW status under Geneva Convention III. Reciprocity principle considered.

They are not 'detained without trial' – prisoners in time of war are not tried, save for specific war crimes. We should have greater confidence in military justice and reject grandstanding criticisms from within the military justice community.

National Security lawyers need to get out there and explain the issues to the media – the War on Terror is quite unlike any other conflict. It poses unique legal challenges. The Administration’s response has been both coherent and correct. A-Gs John Ashcroft and Judge Gonzales have done a fine job.

(2) AUTHORITY FOR WAR

UN authority for hostilities is clearly not required, any more than League of Nations authority was required for WW2. I will examine State Practice since 1945, concentrating on the Permanent Members of the Security Council; the glaring weaknesses of the UN Charter, a badly drafted if not botched instrument, and the case foe US withdrawal from the United Nations.

Better practice would have been to declare war on Afghanistan and Iraq, with 9-11 as the casus belli in each case.

(3) ABU GHRAIB

Serious counter-intelligence failure. Fake photos should have been exposed and CBS taken to task within days of 60 Minutes going to air. Real danger of a failure of military justice arising from the botched prosecutions of the 372nd MPC, who were set up. Real issue at Abu Ghraib is not US ‘abuse’ but who set up the operation and why. The anti-US and anti-UK smear operations were linked - intelligence responses compared. British intelligence failed in its duty as an ally to alert the US to the fabrication of some of the photos, given that the US and British fakes were fabricated at the same time. Historic parallel with My Lai and SDECE narcotics operations in South Vietnam, modeled on earlier operations against the British Army.

Wayne Simmons
Former CIA


 
Biography
RECRUITED BY THE CIA IN 1973 WHILE IN THE U.S. NAVY, WAYNE SIMMONS BECAME PART OF AN OUTSIDE PARAMILITARY SPECIAL OPERATIONS GROUP THAT WAS NOT ONLY PREPARED TO DIE FOR AMERICA, BUT THEY WERE PREPARED TO GO ANYWHERE AND DO VIRTUALLY ANYTHING WHEN ORDERED. HE SPENT HIS CAREER IN THE CARIBBEAN, EUROPE, THE FAR EAST AND CENTRAL ASIA WORKING AGAINST, NARCO-TERRORISTS, ARMS SMUGGLERS, COUNTERFEITERS, CYBER-TERRORISTS AND INDUSTRIAL AND ECONOMIC ESPIONAGE. HE SPEARHEADED DEEP COVER INTEL OPS AGAINST SOME OF THE WORLD'S MOST DANGEROUS DRUG CARTELS FROM CENTRAL AND SOUTH AMERICA AND THE MIDDLE EAST.

FOR 8 OF HIS 27 YEARS IN THE INTELLIGENCE BUSINESS, WAYNE SIMMONS, ATE SLEPT AND DRANK WITH NARCO-TERRORISTS AND SMUGGLERS WHILE HELPING TO CONDUCT SOME OF HIS NATIONS MOST IMPORTANT ANTI-DRUG, INTELLIGENCE GATHERING EFFORTS ON BEHALF OF THE CENTRAL INTELLIGENCE AGENCY. HIS DEEP COVER INTELLIGENCE OPERATIONS HELPED LEAD TO THE SEIZURES OF MARIJUANA, COCAINE AND HEROIN WITH A COMBINED VALUE OF OVER $1 BILLION DOLLARS.

SIMMONS IS RIVETING WITH HIS SIMPLE MESSAGE: STOP RESTRICTING THE ABILITY OF THE CIA AND OTHER U.S. INTELLIGENCE AGENCIES TO OPERATE INSIDE AND OUTSIDE THE UNITED STATES, OR FACE THE CATASTROPHIC CONSEQUENCES OF TERRORISM.

SIMMONS HARSHLY CRITICIZES THOSE WHO UNFAIRLY ATTACK THE CIA AND BELIEVES THAT 99.99% OF THE MEN AND WOMEN EMPLOYED BY THE CIA AND ALL OF THE U.S. INTELLIGENCE AGENCIES, ARE THE VERY FINEST, MOST MORAL, UPSTANDING, PATRIOTIC PEOPLE ON EARTH, SACRIFICING DAILY TO PROTECT THE AMERICAN PEOPLE.

Seminar PE5:
Finding and Keeping Intelligence Specialists
Spies - Intelligence Agents & Analysts
February 8, 09:00-11:30

Track2: DOD/Military
DM2: Military Collection Inside America
February 9
10:15-11:00

Hon. Stanley Sporkin
Former General Counsel, CIA


 
Biography
Judge Stanley Sporkin (Ret.) is a Partner at Weil, Gotshal & Manges residing in its Washington, D.C. office. Judge Sporkin's practice consists of counseling parties in SEC, Corporate Governance and Litigation Matters. Because of his judicial background, he also acts as an arbitrator and provides mediation services.

Judge Stanley Sporkin attended Pennsylvania State University from 1949-1953 and received his law degree from Yale University in 1957. Judge Sporkin spent twenty years with the SEC serving the last seven as the Director of the Division of Enforcement. He then went to the CIA where he served five years as the General Counsel. In 1985, President Ronald Reagan appointed him to the Federal Bench where he served as a United States District Judge for the District of Columbia for 14 years.


Leader
Seminar PE2: Political, Policy and Legal Issues
February 8, 09:00-11:30


Scott Swanson
Director, Global Business Intelligence
Oracle Corporation


 
Biography
Mr. Swanson's specialty is strategic and tactical intelligence collection and analysis with additional projects in anti-trust investigations. With over 10 years of corporate intelligence involvement, Scott has worked for Big 5 management consultancies, operated a successful Executive Search and Research firm, and has done extensive Industrial Intelligence/Counterintelligence contracting.

Scott has given a number of presentations and published articles within both the public and private sector regarding Globalization, Human Asset Networking, Indications and Warning Threat Analysis- Post 9/11, Intellectual Property Containment, counterintelligence exercises, and Maritime Port Security Vulnerability/Threat Assessments.


Track 4: Business
BN6: Global Risk Aversion: Role of the Corporate Intelligence Unit
February 10, 10:15-11:00
Global Risk Aversion: Role of the Corporate Intelligence Unit
Abstract

Government intelligence requirements have historically blended with aspects of corporate affairs, and will likely continue to do so in the future. From the corporate side, those businesses directly linked to the government or military have become involved with intelligence requirements, leaving those companies without such involvement in the dark. Due to restrictions on both sides of the public and private sector, collaboration with regard to national intelligence tasking and sharing strategic information is not always a viable solution. Such separations then require the government intelligence functions to include business acumen to their talent pools, and similarly corporations must enhance their fundamental intelligence capabilities.

To date, however, many U.S. companies remain very conservative and unwilling to embrace more comprehensive efforts in collection and analysis, typically limiting such action to focus on competitors. Many of the government agencies remain conservative and unwilling to embrace realistic efforts to hire valuable individuals from the private sector to facilitate the business or economic factors of intelligence and national policy.

Globalization of economies will require a quicker awakening to embrace the skills that understand more than competitive markets and include topical issues related to foreign culture, religions of the world, economies, social-political structures or movements, and emerging threats. Adding to those needs will be new specialists in the public sector who can rapidly recruit assets, collect in multiple environments, conduct analysis, and correlate the intelligence to business issues and national economic security.

David Szady
Assistant Director, Counterintelligence Division, FBI


 
Biography
Mr. Szady currently serves as the Assistant Director of the Counterintelligence Division, appointed to that position March 2002 and reappointed following his mandatory retirement on November 4, 2003. Mr. Szady's former position was as the National Counterintelligence Executive (NCIX), a position created by a Presidential Decision Directive in December 2000.

Mr. Szady has over 30 years of service in the FBI, with 25 years experience in espionage and foreign counterintelligence investigations. He entered on duty with the FBI in September 1972 and was assigned to the FBI's Mobile, Alabama, Field Division where he worked general criminal investigative matters.


Track 4: Business
BN5: Industry and FBI Partnership for Counterintelligence
February 10, 08:15-09:00

Bill Tierney
Former Senior Interrogator
US Army


 
 
Seminar PE2: Political, Policy and Legal Issues
February 8, 09:00-11:30

Seminar PE5: Finding and Keeping Intelligence Specialists - Translators
February 8, 15:00-16:45
Abstract

There is an unspoken understanding among interrogators. If someone is smart enough to learn Chinese or Russian, they should be smart enough to persuade someone to talk. An interrogator who has to resort to violence to get cooperation is just showing that he doesn't have what it takes. Call it an egotistical method to stay on the straight and narrow. The concern has always been that infantrymen with prisoners taken in the heat of battle will dispense with the niceties and pull out their field telephone, complete with it handy electrical generator, and we interrogators would be painted with the same brush.

That was all before the War to Defend Western Civilization from Jihad, know by some as the Global War on Terror.

I went to Baghdad as an intelligence contractor in April 2004 confident of the superiority of the "Smarts-over-Smacks" method. But after close contact with an enemy that holds no code of civility, an enemy who is eager to kill both us and the Iraqis with the courage to work with us, an enemy who is capable of great feats of emotional manipulation, an enemy whose ultimate goal is a World map painted Islamic green, there comes a time to put aside our collective narcissism and question our underlying assumptions regarding torture, interrogation, and what it takes to win.

Joe Trento
Public Education Center


 
Biography
Joseph Trento has spent more than 35 years as an investigative journalist, working with both print and broadcast outlets and writing extensively on national security issues. Before joining the National Security News Service in 1991, Trento worked for CNN's Special Assignment Unit, the Wilmington News Journal, and prominent journalist Jack Anderson. Trento has received six Pulitzer nominations and is the author of five books, the most recent of which is The Secret History of the CIA.


Seminar PE8: Getting the Public Involved
Stop Pandering to American People
February 8, 10:45-11:30
Stop Pandering to American People
Abstract

Public support for the intelligence community requires the public to believe the community is competent and honest and not being misused by the government for political purposes. When the public discovers that a government institution has not leveled with them the consequences can lead to mission failure. Trento outlines examples of how a lack of candor has done crippling damage to US policy throughout our history and how it relates today. He will reveal for the first time new details of the Reagan/Bush Administration's relationship with Saddam and US relations with Saudi Arabia that exacerbated our future problems with Iraq and al Qaeda. He will make the case that the CIA's misuse by the Bush Administration in allowing certain anti-terrorism successes to be made public prematurely prevented British Intelligence from fully exploiting high-level al Qaeda officials in custody. Trento will also discuss how public claims by the Administration of the CIA's role in shutting down the Kahn network are without foundation. He will argue that such exaggerations and claims from the White House will have the effect of undermining the post 9.11 public unity in support of intelligence operations as the situation in affected regions continue to degenerate.

Major General Paul E. Vallely, USA (Ret)
Consultant and Media Analyst


 
Biography
Paul E. Vallely retired in 1991 from the US Army as Deputy Commanding General, US Army, Pacific in Honolulu, Hawaii. General Vallely graduated from the US Military Academy at West Point and was commissioned in the Army in 1961 serving a distinguishing career of 32 years in the Army. He served in many overseas theaters to include Europe and the Pacific Rim Countries as well as two combat tours in Vietnam. He has served on US security assistance missions on civilian-military relations to Europe, Japan, Korea, Thailand, Indonesia and Central America with in-country experience in Indonesia, Columbia, El Salvador, Panama, Honduras and Guatemala.

General Vallely is a graduate of the Infantry School, Ranger and Airborne Schools, Jumpmaster School, the Command and General Staff School, The Industrial College of the Armed Forces and the Army War College. His combat service in Vietnam included positions as infantry company commander, intelligence officer, operations officer, military advisor and aide-de-camp. He has over fifteen (15) years experience in Special Operations, Psychological and Civil-Military Operations.

He was one of the first nominees for Assistant Secretary of Defense for Special Operations under President Reagan. From 1982-1986, he commanded the 351st Civil Affairs Command that included all Special Forces, Psychological Warfare and Civil Military units in the Western United States and Hawaii. He was the first President of the National Psychological Operations Association. His units participated in worldwide missions in Europe, Africa, Central America, Japan, Solomon Islands, Guam, Belgium, Korea and Thailand. He has served as a consultant to the Commanding General of the Special Operations Command as well as the DOD Anti-Drug and Counter -Terrorist Task Forces. He also designed and developed the Host-Nation Support Program in the Pacific for DOD and the State Department. Most recently, he has in-country security assistance - experience in El Salvador, Columbia and Indonesia in the development of civil-military relations interfacing with senior level military and civilian leadership.

General Vallely is a military analyst for FOX News Channel and is a guest on many nationally syndicated radio talk shows. He is also a guest lecturer on the War on Terror. He has just co-authored a book entitled , "The Endgame", Winning the War on terror.


Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 09:50-11:30
Seminar PE4: Reforming the Intelligence Community
February 8, 14:00-16:15
Track 2: DOD/Military
DM3: Where we are in the Global War on Terror
February 9, 14:00-14:45

Maria Velez de Berliner
President
Latin Trade Solutions, Inc.


 
Biography
Ms. Velez de Berliner holds an Honors Master in International Relations and International Security from the University of Pittsburgh. She is a Phi Beta Kappa, Summa Cum Laude graduate of Lake Forest College where she obtained a B.A. in International Relations. In 2002 the Governor of Pennsylvania named her one of Pennsylvania's Best 50 Women in Business. She lectures nationally and internationally on international security threats in Latin America and on how to do business internationally, profitably and safely. She is interviewed and quoted often on business issues in Latin America, including Brazil and Mexico, especially NAFTA, telecommunications, biometrics, information technology, transportation, energy, agriculture, and international security. She has also written and lectured on the relationships China, the European Union, India, Asia, and Japan have with Latin America. She is a contributor to the Harvard Business Review América Latina, Harvard Business Review Brasil, The Latin America Advisor, Satellite News, Via Satellite, and Corporate Location Magazine in London. Her work on transnational criminal organizations in Brazil was published by Frank Cass Journals in London.

Ms. Velez de Berliner serves on the Advisory Board of the Duquesne University's Small Business Development Center and is a member of the Board of Governors of the Rivers Club, Pittsburgh. She also serves on the Board of the Hopewell Fund, in Wheeling, West Virginia.


Seminar PE7: Sharing Intelligence - Part 1
February 8, 09:00-11:30
Abstract

Economic, regulatory, and geographic environments facilitate the financing and activities of criminal groups in three flash points in Latin America: The Triple Frontier (Brazil, Argentina, Paraguay), The Amazon/Orinoco Basin (Venezuela, Colombia, Brazil), and Tres Banderas (Belize, Guatemala, and Mexico). What the US must do to protect the underbelly of its War on Terror.

Ben Venzke
CEO, IntelCenter


 
Biography
Ben Venzke is the founder and CEO of IntelCenter which provides intelligence support to the intelligence, law enforcement, military and security communities. He has been working for the past 14 years to create professional-level intelligence products that place timely, actionable intelligence into the hands of those who need it, whether it is an operator prepping to perform an entry, an analyst sitting at Langley, or a chief of police attempting to assess the threat to his or her city. Venzke has recently co-authored "The al-Qaeda Threat: An Analytical Guide to al-Qaeda's Tactics & Targets", which has provided readers for the first time in a publicly available format the ability to see what al-Qaeda has said in its own words about targets and tactics. Venzke started his work on the counterintelligence side with a focus on foreign intelligence agencies.


Track 2: DOD/Military
DM7: al-Qaeda's Messaging, Tactics and Targets
February 10, 14:00-14:45
al-Qaeda's Messaging, Tactics and Targets
Abstract

The focus of the session will be on understanding the tactics and targeting methodologies employed by al-Qaeda as well as the current threat environment. It will build and expand upon the material included in "The al-Qaeda Threat: An Analytical Guide to al-Qaeda's Tactics & Targets," co-authored by the presenter. The material will be heavily based on actual statements and communications made by al-Qaeda and will include analytical work on timing/targeting trends related to al-Qaeda's messaging efforts. Operational and training video by both al-Qaeda and its affiliate groups will also be shown.

Dan Verton
Consultant


 
Biography
Dan Verton is the Vice President and Executive Editor of IT*SECURITY Magazine, the nation's first Professional Journal of IT Security & Infrastructure Protection. Dan is a former senior writer for Computerworld magazine and Federal Computer Week in Washington, D.C., and is the first-place recipient of the 2003 Jesse H. Neal National Business Journalism Award for Best News Coverage for a series of reports on wireless network security threats at some of the nation's largest airlines and airports. Dan is also the author of the highly acclaimed book Black Ice: The Invisible threat of Cyber-Terrorism (McGraw-Hill, 2003), endorsed by some of the nation's top experts as one of the best descriptions of the terrorist threat to critical cyber infrastructures to date.


Seminar PE8: Getting the Public Involved
The Media and National Security: Views of an Intelligence Officer Turned Journalist
February 8, 14:00-14:45
The Media and National Security: Views of an Intelligence Officer Turned Journalist
Abstract

The War on Terror (WOT) is unlike the wars with which most Americans are familiar. This is a war that demands secrecy, a war that is and must be fought in the shadows and the dark places where our terrorist enemies live. It is also a war that will be won or lost on the nation's ability to collect, analyze, act upon and protect secret intelligence. So how do we balance the public's right to know (and from a homeland defense perspective, a "need to know") certain vital information about the WOT and the status of the nation's homeland defense initiatives?

Dan Verton -- a former U.S. Marine Corps intelligence officer -- will discuss his experience as someone who has gone from being an officer entrusted to protect vital national secrets to a journalist who's job is to keep the public informed on what its government is doing in its name. Verton, an award-winning journalist and author, finds it to be a balancing act that he sometimes finds difficult to perform. During this presentation, he'll share his detailed experiences from both sides of this issue.

Lorenzo Vidino
Deputy Director, The Investigative Project


 
Biography
Mr. Vidino is a native of Milan, Italy and the organization's European expert. He speaks five languages and has a wide range of valuable contacts in journalism and the intelligence communities both in Europe and the United States. Mr. Vidino evaluates and analyzes legal documents for The Investigative Project and works closely with government officials, producing fact sheets on terrorist activity and leadership.

His articles on terrorism and Middle Eastern affairs have appeared in several publications, including the Wall Street Journal, National Review Online, The National Interest, Middle East Quarterly and several European newspapers. Mr. Vidino is often asked to review other terrorism experts' material for substantive accuracy.

He regularly appears on NBC Nightly News, Fox News, MSNBC and Canadian TV as a terrorism expert, with a specialty on terror in Europe and Al Qaeda.

Mr. Vidino has a law degree.


Seminar PE7: Sharing Intelligence - Part 1
February 8, 09:00-11:30


Chris Westphal
CEO, Visual Analytics


 
Biography
Mr. Westphal is co-founder and CEO of Visual Analytics. He guided the growth of the company from launch into an increasingly important provider of critical data analytic capabilities. The flagship application, VisuaLinks, has steadily expanded in power and sophistication, leading to its adoption by federal and local law enforcement, all major US intelligence agencies, the Department of Defense, civilian agencies, international Financial Intelligence Units (FIUs), as well as large corporations.

Mr. Westphal is a recognized authority in the detection and exposure of complex patterns. He has applied his expertise in commercial domains including forensic accounting, embezzlement, and fraud. He works closely with government programs addressing organized crime - including the Office of National Drug Control Policy (ONDCP), as well as agencies countering narco-terrorism, money laundering, and insider trading, including the Financial Crimes Enforcement Network (FinCEN), Internal Revenue Service (IRS, Criminal Investigations Division), Anti-Money Laundering Office (Thailand), U.S. Customs Service, Defense Intelligence Agency, Defense Information Systems Agency (DISA), and a number of joint DoD programs involved with national security.

Mr. Westphal received his B.S.E. from Tulane University and has over 18 years of experience in advanced analytics utilizing data mining, visualization, and artificial intelligence technologies. His second book, Data Mining Solutions, was published by John Wiley and Sons in 1998. He has also authored numerous papers for symposia, conferences, professional journals, and newsletters addressing data visualization, expert systems, and other advanced analytical issues. He is routinely asked to speak and participate on technology panels on advanced analytical systems and data mining methodologies.


Track 3: State and Local Law Enforcement
SL2: Intelligence Technology
February 9, 10:15-11:00
Intelligence Technology
Abstract

Chaos is a common term used to represent extreme confusion, disorder, and disarray. Much of the intelligence production process used throughout law enforcement, the intelligence community, and other investigative organizations is based on accessing, combining, analyzing, and reporting on data that comes from multiple sources in different formats spanning across many systems. The chaos introduced from variations in content, formats, spellings, errors, and other incompatibilities makes it very difficult to understand and detect the patterns in the data. As new systems and technologies are introduced into marketplace, they offer better methods standardize, classify, clean-up, disambiguate, and provide better clarity on the data. This paper discusses a number of chaotic factors associated with data and novel techniques and approaches for clarifying their use in proactive analytics with a specific focus on the use network diagramming and visual charting.

Ted Whetstone
Mitopia System


 
Biography
Ted Whetstone has been working product and market development issues in high technology for over fifteen years. In 1998 he returned to the United States after starting up and operating a highly successful U.S. electronics subsidiary in Tokyo, Japan. Mr. Whetstone then joined MitoSystems, Inc., headquartered in Santa Monica, California heading up applications and product development of the Mitopia system. He has been instrumental in developing relationships and educating parts of the Intelligence community about Mitopia. Mr. Whetstone graduated in 1987, with a B.S. in Material Science & Engineering from Cornell University.


Track 2: DOD/Military
DM5: Are We Losing our Edge on Technical Collection?
February 10
08:15-09:00
Abstract

In the asymmetric war on terrorism, the enemy hides and attacks while we are in the open and must defend. In this scenario, our "offense" is more of an active defense - we strike when we have actionable intelligence about the enemy. The cost of satellites and current collection methods is already high, and getting much higher. From what is basically a reactive stance, two things limit our ability to succeed: 1) quality of the intelligence collected, and 2) the ability to take action intelligence a timely manner. Current technical collection systems were not designed to address a highly decentralized and distributed foe. Worse yet is how current information systems act on collected information. They are too slow to react and adapt. These shortcomings will be discussed. Additionally, a completely novel and mature solution to these shortcomings will be presented. A solution capable of taking advantage of open source information and other structured and unstructured data from collection sources at the same time.

Lt. Herb Williams
Head of the Intelligence Unit
Woodbridge, NJ, Police Department


 



Track 3: State and Local Law Enforcement
SL8: Intelligence Training
February 10, 15:00-15:45

Gen. James Williams, USA (Ret)
Chairman, National Military Intelligence Association
Former Director, DIA


 
Biography
General Williams focused the DIA on enhancing support to tactical and theater commanders, improving capabilities to meet major wartime intelligence requirements, and strengthening indications and warning assets. In December 1981, President Reagan signed Executive Order 12333 giving the Intelligence Community a mandate for the years ahead.

In response to a requirement to improve intelligence support to the Unified and Specified (U&S) Commands' warfighting capabilities, the functional manager for intelligence processing was established in 1982.

Under General Williams' direction DIA established the first terrorism billet in the National Military Intelligence Center, created the Secure Analytic File Environment (SAFE) to support analysts, and laid the groundwork for the Defense HUMINT Service by having the Director DIA designated Functional Manager for HUMINT. They also created the National Military Intelligence Support Terminals (NMIST) which were flyaway kits providing data link capability for deployed units to the SIPERNET.


Seminar PE7: Sharing Intelligence - Part 2
February 8, 14:00-16:45

Hon. R. James Woolsey
Former Director, CIA


 
Biography
R. James Woolsey joined FDD in August, 2002, as a Distinguished Advisor. Previously Mr. Woolsey was a partner at the law firm of Shea & Gardner in Washington, D.C., where he practiced for twenty-two years, on four occasions, beginning in1973; his practice was in the fields of civil litigation, alternative dispute resolution, and corporate transactions.

During the twelve years he has served in the U.S. Government Mr. Woolsey has held Presidential appointments in two Democratic and two Republican administrations. He was Director of Central Intelligence in 1993-95. He also served as: Ambassador to the Negotiation on Conventional Armed Forces in Europe (CFE), Vienna, 1989-1991; Under Secretary of the Navy, 1977-1979; and General Counsel to the U.S. Senate Committee on Armed Services, 1970-73. He was appointed by the President as Delegate at Large to the U.S.-Soviet Strategic Arms Reduction Talks (START) and Nuclear and Space Arms Talks (NST), and served in that capacity on a part-time basis in Geneva, 1983-1986. As an officer in the U.S. Army he was an adviser on the U.S. Delegation to the Strategic Arms Limitation Talks (SALT I), Helsinki and Vienna, 1969-1970.

Mr. Woolsey has been a Director or Trustee of numerous civic organizations, including The Smithsonian Institution, where he was Chairman of the Executive Committee of the Board of Regents, Stanford University, The Goldwater Scholarship Foundation, and The Aerospace Corporation. He has been a member of: The National Commission on Terrorism, 1999-2000; The Commission to Assess the Ballistic Missile Threat to the U.S. (Rumsfeld Commission), 1998; The President's Commission on Federal Ethics Law Reform, 1989; The President's Blue Ribbon Commission on Defense Management (Packard Commission), 1985-1986; and The President's Commission on Strategic Forces (Scowcroft Commission), 1983. He is currently a Trustee of The Center for Strategic & International Studies; Chairman of the Advisory Committee of the Clean Fuels Foundation; and Vice Chairman of the Advisory Board of Global Options LLC.

Mr. Woolsey is presently a member of the Board of Directors or Board of Managers of: Information Systems Laboratories, Inc. (ISL); Linsang Partners, LLC; Fibersense Technology Corporation; Invicta Networks, Inc.; DIANA, LLC; and Agorics, Inc. He has served in the past as a member of the Boards of Directors of: BC International Corporation; Sun HealthCare Group, Inc.; USF&G; Yurie Systems, Inc.; Martin Marietta; British Aerospace, Inc.; Fairchild Industries; Titan Corporation; and DynCorp, and as a member of the Board of Governors of the Philadelphia Stock Exchange.

Mr. Woolsey was born in Tulsa, Oklahoma, in 1941. He is married to Suzanne Haley Woolsey, the Chief Communications Officer of the National Academies (Science, Engineering, and Medicine) and they have three sons: Robert, Daniel, and Benjamin. Mr. Woolsey attended Tulsa public schools, graduating from Tulsa Central High School in 1959. He received his B.A. Degree in 1963 from Stanford University (With Great Distinction, Phi Beta Kappa), an M.A. from Oxford University, where he was a Rhodes Scholar 1963-65, and an LL.B from Yale Law School in 1968, where he was Managing Editor of the Yale Law Journal.

Mr. Woolsey is a frequent contributor to major publications, and from time to time gives public speeches, on the subjects of foreign affairs, defense, energy, and intelligence.


Luncheon: The Long War of the 21st Century
February 8, 12:15-13:45