| |||||||
| |||||||
|
|
|
|
|
|
|
|
|
|
David Anhalt |
|||
Biography | |||
Mr. Anhalt joined Orbital Sciences Corporation
in January 2004 and currently serves as Senior Director, Special
Programs in the Advanced Programs Group. In his position with the
company, Mr. Anhalt leads efforts to provide innovative solutions to the
problems facing the national security space sector today. Prior to joining Orbital, Mr. Anhalt served in the U.S. Air Force, attaining the rank of Colonel. His last military assignment was Chief of the Space Control and Advanced Technologies Division for the Undersecretary of the Air Force where he directed the development and procurement of new systems to enhance U.S. military advantage. Before that Mr. Anhalt was the Air Force Military Assistant to the Director of Net Assessment, Office of the Secretary of Defense, where he directed comparative analyses of U.S. and foreign use of long-range strike and space systems in warfare. Mr. Anhalt is a graduate of the U.S. Air Force Test Pilot School and has held several key positions in the test and evaluation of air and space systems including flight test engineer for the Airborne Laser Laboratory and the F-117 stealth fighter; chief scientist for acquisition, tracking and pointing at the Strategic Defense Initiative Organization in the Pentagon; director of engineering for the Joint Surveillance Target Attack Radar System (JSTARS) Test Force in Melbourne, Florida. After that, Mr. Anhalt served as the program manager for the JSTARS aircraft manufacturing program. Mr. Anhalt earned his B.S. degree in Electrical Engineering from the U.S. Air Force Academy and holds an M.S.E. degree in Aerospace and Mechanical Sciences from Princeton University and an M.A. degree in International Relations from Queen's University, Ontario, Canada. |
|||
Seminar PE1: Trends in Intelligence Technology - UAV vs. Satellite |
|||
Cost Effective ISR from Space Abstract This presentation will describe a cost-effective approach for satisfying tactical intelligence, surveillance, and reconnaissance requirements using small spacecraft. The trade between using UAVs versus satellites for providing the warfighter sensor information is determined by a number of variables, including cost, threat environment, and performance requirements. During the Cold War, in order to address strategic intelligence requirements over huge landmasses of denied territory, the satellite-based approach was the cost-effective choice. For more recent wars where air superiority has been assured, the United States military has been successful in employing both manned aircraft-based sensors and UAVs. Recently, the Air Force has initiated a Joint Warfighting Space concept to responsively deliver space capabilities directly to the Joint Force Commander to achieve operational and tactical effects. To be affordable, such a vision needs a new approach for providing satellite-based ISR. Orbital Sciences Corporation will describe its past experiences hosting sensor systems on lightweight satellite buses. Among the systems to be discussed will be commercial imagers such as OrbView 3 and OrbView 4, as well as a set of earth observation payloads hosted on NASA satellite programs. Comparisons will be drawn with UAV system implementations. The tradeoffs between hosting sensors on UAVs or satellites will be discussed from the standpoint of collection, processing, and dissemination. |
|||
Track 2: DOD/Military - DM8: Satellites vs. UAVs - and Other Tradeoffs |
Charles Archer |
|||
Biography | |||
Chuck Archer joined Identix in October 2004
as Vice President, Federal Sector, where he is responsible for leading
and growing Identix' Federal sector customer relations and business. Archer's career began with the Federal Bureau of Investigation, where in 1996, after a highly successful 28 years of service, he was appointed by the U.S. Attorney General and the Director of the FBI as Assistant Director In Charge of the Criminal Justice Information Services Division, with oversight of all criminal justice services, including IAFIS and Uniform Crime Reporting systems. As Assistant Director, Archer managed a $300 million annual budget, and launched the $1 billion expansion, development and automation of the agency's activities that culminated in the new National Crime Information Center (NCIC) and National Instant Check System for handguns. He led a workforce of more than 3,000 FBI employees and 600 outside contractors, and established and maintained strong relationships with other Federal agencies and Congress. In addition to ever-increasing responsibilities during his FBI tenure, from 1993 to 1996 Archer served as Legal Attaché at the U.S. Embassy in Ottawa, Canada. As the senior US law enforcement official in Canada, he had absolute jurisdiction to render advice on laws, regulation, procedures and practices in the U.S. Upon leaving the FBI, from 1998 to 1999, Archer served as President & CEO of publicly-traded STRATESEC, Inc., a single-source provider of comprehensive, technology-based security solutions for commercial, government and international facilities, where he spearheaded a period of rapid expansion, while broadening STRATESEC's offerings to a full suite of integrated services including engineering and design, systems integration, maintenance and technical support. In 1999, Litton PRC appointed Archer Vice President, Strategic Business Development for Criminal Justice, subsequently promoting him to Vice President and General Manager, Office of Integrated Public Safety Programs. Serving in this position through 2002, he oversaw all PRC domestic and international public safety business units, and was a member of the PRC executive Quality Management Board, reporting directly to the company's President. From 2002 until joining Identix, Archer served as Vice President Homeland Security for Northrop Grumman Information Technology, where he was responsible for managing domestic and international strategic planning issues involving homeland security and criminal justice. He regularly presented to senior State and Federal government officials on Northrop's homeland security capabilities, and was an active representative on numerous industry and government committees dealing with the use and integration of biometrics and the importance of interagency cooperation. Archer received a BS in Accounting from Minnesota State College, and has attended a number of graduate programs, including post-graduate courses in statistics and government accounting at the USDA Graduate School; the Litton Executive Education Program in Finance at the University of Pennsylvania's Wharton School; the University of Maryland School of Business's program on international marketing strategies, and business development and execution at the University of Virginia's Darden Graduate School of Business Administration. |
|||
Seminar PE1: Trends in Intelligence Technology
February 8, 09:45-10:45 |
|||
Trends in Biometrics: Future & Past Abstract We live in a changed world - a world that has become global and networked. As such, we are also facing new challenges, which include terrorism, transnational crime, cyber crime and identity fraud and theft. With new challenges, a new security paradigm is needed. Security in this age must go beyond borders and firewalls to establish trusted identity. More than ever governments worldwide are turning to technology such as biometrics to identify people and link human action with identity. Driven by post-9/11 legislation, the US government is leading the world in deploying biometrics technology. Among the significant pieces of legislation driving the awards of large-scale biometrics implementations are: • Aviation & Transportation Security Act - Live scans in all US airports for background checks • U.S. Patriot Act - Laid foundation for biometric entry/exit system - Mandated background checks for HAZMAT drivers (deadline January 2005) • Enhanced Border Security & Visa Reform Act - Initiated creation of VISIT system with single finger and live scan at all border crossings - Spurred DoS Facial Recognition award for travel documents - Laid out visa-waiver country requirements • Maritime Transportation Security Act of 2002 - Mandated Seafarer's ID + background checks • 9/11 Commission Implementation Act This presentation will cover the latest advancements in biometrics and the trends in military, intelligence and global security that are impacting the adoption of biometrics. We will provide an update on several high profile implementations such as the Department of Homeland Security, Department of State, and discuss how the military and intelligence community can continue to work with the biometrics industry in furthering the state of the art. |
Jed Babbin |
|||
Biography | |||
Jed Babbin is the best-selling author of "Inside the Asylum: Why the UN and Old Europe are Worse than You Think" (Regnery 2004). He is a former Air Force officer who served as a deputy undersecretary in the first Bush administration
(1990-1991). Mr. Babbin writes regularly for National Review Online and for the American Spectator Magazine. His weekly column, "Loose Canons", appears in The American Spectator Online. Mr. Babbin's expertise is in national security and foreign affairs. However, he also writes about legal matters and for The American Spectator's "Saloon" series on subjects such as single barrel bourbon and fine cigars. Mr. Babbin is a military analyst and appears frequently on the Fox News Channel and MSNBC, on shows such as "The O'Reilly Factor", "Hardball with Chris Matthews", "Scarborough Country" and many others. He served as guest host of Oliver North's "Common Sense Radio" when Col. North was unavailable – including for nine weeks straight during the Iraq war in 2003 -- and has also subbed for Laura Ingraham and Greg Garrison. "Common Sense Radio" was broadcast nationally by the Radio America Network. He wrote the novel, Legacy of Valor, (Pentland Press, 2000). Mr. Babbin is a graduate of Stevens Institute of Technology (B.E. 1970), Cumberland School of Law (J.D. 1973) and the Georgetown University Law School (LL.M. 1978). |
|||
Seminar PE2: Political, Policy and Legal Issues
February 8, 09:00-11:30 |
|||
Abstract The two most pressing issues in intelligence policy. First, whether the new national intelligence director's powers are properly formulated. It does not appear to be the case at all. The intelligence community is not likely to benefit from another layer of bureaucracy, no matter how well intentioned. Instead, it should be remodeled in the manner the Defense Department was in the Goldwater-Nichols bill, requiring "jointness" in operation, strategy and budgeting. I remain entirely skeptical about whether this necessary result will obtain from the 2004 legislation. Second, the problem of congressional violations of trust. We have seen several horrific instances of security violations by members of the senate in recent years. Sen. Richard Shelby allegedly leaked the fact that we were monitoring Usama bin Laden's cell phone conversations, resulting in the loss of our ability to do so. Second, three Democrats -- Jay Rockefeller, Richard Durbin and Ron Wyden -- apparently leaked details about a "black" satellite program. If the laws that require our secrets be kept secret aren't taken seriously by those who hold the public's trust -- such as Shelby and the "Misty Three" -- -- our system of government will not be able to function as the Constitution says it must. If Congress cannot be trusted with secrets such as these, it cannot provide the essential checks and balances on the Executive we rely on it to perform in order to protect us from a runaway president. Right now, we apparently have a runaway Senate. The Justice Department, and Sen. Frist's office, should be working day and night until this problem is solved, and cooperate to ensure the leakers are punished to the full extent of the law. |
Robert Baer
|
![]() |
||
Biography | |||
A case officer in the Directorate of Operations for the CIA from 1976 to 1997, Robert Baer is the author of two books, Sleeping with the Devil: How Washington Sold Our Soul for Saudi Crude and See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism. Whether in those works or in his articles published in The Atlantic Monthly, The Wall Street Journal,
and other media, Baer's audience can count on him for his candid
exposition about the influence of presidential politics and political
correctitude on our nation's judgment about terrorism emanating from the
Middle East. Having worked in such diverse locations as New Delhi,
Khartoum, Beirut, Paris, Rabat, Dushanbe, and Northern Iraq, Baer
resigned from the CIA in 1997 and was awarded the organization's Career
Intelligence Medal in 1998. Evidently, Baer's talent for providing
refreshing analysis in a prosaic style rich in detail and direct quotes
translates well into screenplay form. Indeed, veterans of this
year's conference may look forward to a motion picture adaptation of
his book See No Evil, re-titled Syriana and starring George Clooney, in Winter 2005.
|
|||
Seminar PE5: Finding and Keeping Intelligence Specialists Spies - Intelligence Agents & Analysts February 8, 09:00-11:30 |
|||
Spies
Abstract Today the CIA faces two major problems in retaining new recruits: relatively low salaries and a stifling bureaucracy. You have a lot of young people smart enough to get in but wise enough to get out. The CIA needs to get rid of a couple layers of management. Not only would it improve moral it would allow new officers to get out in the field earlier. A lot of people applying to today, whether from Wall Street or K Street, are making salaries that let them afford Washington property prices; not so in the CIA. At one point not too long ago a starting CIA case officer was making less than a DC policeman. But above all the CIA has got to get out of the press. Getting blamed for 9/11 and WMD has done serious damage to its morale. | |||
Seminar PE5: Finding and Keeping Intelligence Specialists Translators February 8, 15:00-16:45 |
|||
Translators
Abstract The CIA's directorate of operations cannot dispense with officers who fluently speak the language of the country they're working in. Translators do not cut it. Anyone who considers spying, putting their lives at risk, only want a one on one relationship with the American they're dealing with. They especially will not work with citizens of their own country afraid they would be betrayed. |
Maureen Baginski
|
|||
Biography | |||
Prior to joining the FBI, Ms. Baginski led the
National Security Agency's Signals Intelligence Directorate--the
Nation's high technology cryptologic organization. The Signals
Intelligence Directorate manages, on behalf of the Director of NSA, the
acquisition, production, and dissemination of foreign signals
intelligence for customers ranging from policymakers to warfighters. As
head of this organization, Ms. Baginski managed a complex,
geographically dispersed extended enterprise engaged in distributed
information production. Ms. Baginski established the SIGINT Directorate
from what were once two separate organizations--one responsible for
technology development and one responsible for information production.
Ms. Baginski and her team led a successful transformation of processes,
organizations, and technology to meet the challenges of 21st Century
signals intelligence.
|
|||
Track 3: State and Local Law Enforcement SL3: Working with the IC February 9, 14:00-14:45 |
|||
|
Col. Charbel Barakat
|
|||
Biography | |||
Retired Officer from the Lebanese Army.
Former Deputy Commander of the South Lebanon Army. Was the Foreign
Minister of South Lebanon. Has a unique experience on Hizbollah's
strategies and tactics. Historian based in Toronto.
|
|||
Seminar PE6: View from Abroad Lebanon February 8, 16:30-16:45 |
John Batchelor
|
![]() |
||
Biography | |||
John has published seven political novels, as
well as a history of the Republican Party, Ain't You Glad You Joined the
Republicans?
|
|||
Seminar PE8: Getting the Public Involved Role of the Media February 8, 09:50-10:35 |
Grant Begley
|
|||
Biography | |||
Grant A. Begley is director of Architecture and
Systems Integration – Unmanned and Reconnaissance Systems for Raytheon's
Space and Airborne Systems business. In this role, Mr. Begley has
responsibility for creating and leading growth initiatives in domestic
and international unmanned airborne systems markets, with emphasis in
the Homeland Security and Border Surveillance areas. Mr. Begley's career has included assignments of significant leadership in the area of unmanned airborne systems at Lockheed Martin and with the U.S. Government. Mr. Begley served in the U.S. Navy for 26 years, including operational assignments flying fighter aircraft, development of next-generation weapon systems and joint assignments. Mr. Begley's last government assignment was as Navy Director for Stealth and Counter Stealth - Technologies, Policy and Advanced Programs. He holds a master's degree in aeronautic engineering from the Naval Post-Graduate School and a bachelor's degree in general engineering from the U.S. Naval Academy. |
|||
Track 1: Federal Civilian
FD1: Immigration and Customs February 9, 08:15-09:00 |
|||
Unmanned Airborne Systems: Opportunistic Environment for Border Control ... with Risk.
Abstract Unmanned Airborne Systems (UASs) are currently being evaluated for procurement and use in Border Control and Homeland Security. These evaluations are an opportunistic exploitation of advances in UASs made possible by decades of investments, and billions of dollars, by the Department of Defense. The opportunistic environment for UASs introduction and use for Border Control comes with an obscure yet significant risk: the risk is an ad hoc procurement and insertion of UASs into service where there is no integrated plan for mission system capability, command and control, integration of manned and unmanned capabilities, asset and mission management, and budget process. The February 2004 Defense Science Board Study titled "Unmanned Aerial Vehicles and Uninhabited Combat Aerial Vehicles" concluded, "There is no longer any question of the technical viability and operational utility of Unmanned Aerial Vehicles (UAVs). The benefits and promise offered by UAVs in surveillance, targeting and attack have captured the attention of senior military and civilian officials in the Department of Defense, members of congress, and the public alike". Military planners point to fewer investments in new weaponry and more spending on UASs, along with networked communications to assure command and control required to enable real-time and multi-organizational UASs mission capability. Concurrently a shift has occurred away from Unmanned Aerial Vehicles to Unmanned Aerial Systems (UASs), a shift from platform-centric to mission-centric capability. Future UASs capabilities and success for Border Control will rest upon the firm foundation of past and future DOD UASs investments; but, will require coordination of Border Control stakeholders who must weigh the opportunity for enhanced surveillance using highly capable mission-centric Unmanned Aerial Systems against the risk of ad hoc procurement and use of platform-centric Unmanned Aerial Vehicles , resulting potentially in unrealized capability. |
Daniel J. Benny
|
|||
Biography | |||
Daniel J. Benny, M.A., CPP, PCI, CCO, CLET is a professionally licensed Private Investigator and Security Consultant. He is also a court-qualified expert witness in security matters. Since 1981 he has offered criminal, legal, corporate, fraud, background, private and pre-employment investigations, as well as assets protection, physical security, security management, protective service, counterintelligence and counterterrorism security consulting and training. He holds a Master of Arts in Security Administration from Vermont College of Norwich University, a Bachelor of Arts in Security Administration from Alvernia College and Associate of Arts in both Commercial Security and Police Administration from Harrisburg Area Community College. He is a graduate of the United States Naval War College, and the Navy and Marine Corps Intelligence Training Center. He is Board Certified in Security Management holding the designations of Certified Protection Professional (CPP) and Board Certified as a Professional Certified Investigator (PCI) by ASIS International. He holds the designations of Certified Confidentiality Officer (CCO) from the Business Espionage Controls and Countermeasures Association, and Certified Law Enforcement Trainer (CLET) from the American Society for Law Enforcement Training. He is the author of over 1000 articles and the book, The Private Investigator's Professional Desk Reference . Benny is a contributing author to the ASIS International Protection of Assets Manual. He is also a Professor at Central Pennsylvania College and Harrisburg Area Community College teaching courses in Criminal Justice, Security, Intelligence and Terrorism. As a Lieutenant in the United States Naval Reserve he served ten years as an Intelligence Officer with the Office of Naval Intelligence, the Naval Criminal Investigative Service and the Central Intelligence Agency. He is certified by the Commonwealth of Pennsylvania Act 235 Lethal Weapons Instructor and Terrorism Awareness and Prevention Instructor. He holds the rank of Black Sash in Jeet Kune Do and is a National Rifle Association instructor in firearms, personal protection, and Range Safety Officer. He holds a Federal Aviation Administration Private Pilot Certificate. He is a member of the following: ASIS International, Business Espionage Controls and Countermeasures Association, International Association for Counterterrorism & Security Professionals, Pennsylvania Association of Licensed Investigators, National Association of Investigative Specialists, American Society for Law Enforcement Training, Pennsylvania Association of Criminal Justice Educators, National Criminal Justice Honor Society-Alpha Phi Sigma, International Association of Chiefs of Police, Pennsylvania Chiefs of Police Association, Association of Former Intelligence Officers, International Association for Intelligence Education, Naval Intelligence Professionals, United States Navy Memorial Foundation, Navy League of the United States, Military Order of the World Wars, American Legion Post 730, MG Car Club and MGB Register, Susquehanna Valley Vintage Sports Car Club, Jaguar Enthusiasts' Club, Antique Automobile Club of America, Central Pennsylvania Automobile Club, National Rifle Association of America, Sherlock Holmes Society of London, Knights of Columbus Council 869 "3rd Degree," Bishop J. W. Shanahan Assembly "4th Degree," Free and Accepted Masons of Pennsylvania, Brownstone Lodge 666, "3rd Degree," Ancient Accepted Scottish Rite of Freemasonry Harrisburg Consistory "32 nd Degree," National Sojourners, and Harrisburg Chapter "Heroes of '76 Degree." | |||
Track 4: Business
BN4: Corporate Espionage Countermeasures February 10, 15:00-15:45 |
Jeff Bliss
|
|||
Biography | |||
Jeff Bliss oversees all communications and
outreach efforts. Before joining the Hoover Institution in 2002, he
served as director of public affairs at California State University, San
Luis Obispo. Previous to his work at Cal Poly, he was director of
public information at Pepperdine University. He has written and spoken
on crisis management, and his op-eds and photography have appeared in
numerous regional and national publications. Jeff Bliss received his
degree in journalism from Pepperdine.
|
|||
Seminar PE8: Getting the Public Involved Role of the Media February 8, 09:50-10:35 |
|||
Abstract The history of the relationship between the media and government agencies has typically been one of distrust, distance and disinformation. There have been intermittent periods of "détente," but generally speaking, the two estates have more often than not been at loggerheads. Now, in the post-9/11 – Iraq War – War on Terror world we live in, the media is forced to examine its (changing) role. In addition to having to rethink its practices -- particularly as it confronts the realities of asymmetrical war, the targeting of civilians (including journalists), and the rise of new/alternative forms of news gathering and dissemination – the media is trying to come to grips with the responsibilities it has to the public. |
Yossef Bodansky
|
| ||
Biography | |||
Yossef Bodansky is the Director of the
Congressional Task Force on Terrorism and Unconventional Warfare at the
US House of Representatives. He is also the Director of Research at the
International Strategic Studies Association, as well as a Senior Editor
for the Defense & Foreign Affairs group of publications. Bodansky is
the author of nine books (Target America, Terror, Crisis in Korea,
Offensive in the Balkans, Some Call It Peace, Arafat's "Peace Process",
Islamic Anti-Semitism as a Political Instrument, Bin Laden: The Man Who
Declared War on America and The High Cost of Peace), as well as several
book chapters, entries for the International Military and Defense
Encyclopedia, and numerous articles in several periodicals, including
Global Affairs, Jane's Defence Weekly, Defense & Foreign Affairs:
Strategic Policy, and Business Week. | |||
Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 16:00-16:45 |
|||
|
Bill Boni
|
| ||
Biography | |||
Mr. William C. Boni has spent his entire
professional career as an information protection specialist and has
assisted major organization's in both the public and private sectors.
For more than 25 years Bill has helped a variety of organizations design
and implement cost-effective programs to protect both tangible and
intangible assets. In a wide range of assignments Bill has assisted
clients in safeguarding their digital assets, especially their key
intellectual property, against the many threats arising from the global
Internet. In addition, he has pioneered the innovative application of
emerging technologies including computer forensics, intrusion detection
and others, to deal with incidents directed against electronic business
systems. Bill has served as a consultant in several professional service organizations and now works as the Vice President and Chief Information Security Officer of Motorola Information Protection Services. He is responsible for the company's overall program to protect critical digital proprietary information, intellectual property and trade secrets. He also directs the people, processes and technology programs that safeguard the company's global network, computer systems and electronic business initiatives. Bill has been quoted by leading print publications such as the Wall Street Journal, US News & World Report the Financial Times, LA Times, and CIO Magazine. He has also appeared on many network broadcasts including Prime Time Live, CNN and CNN/fn discussing espionage and cyber crimes directed against American high technology corporations. Other assignments in his distinguished career include work as a U.S. Army counter-intelligence officer; Federal agent and investigator; investigator and security consultant; Vice President of Information Security for First Interstate Bank; and project security officer for "Star Wars" programs and other defense work with Hughes Aircraft Company and Rockwell. Professional Associations / Certifications Bill is the past chairman of the American Society of Industrial Security (ASIS) Council on Safeguarding Proprietary Information http://www.asisonline.org/safeguarding.html and he co-authored both the 1999 and 2001ASIS-PwC report on "Loss of Proprietary Information". He chaired the 1999 Information Systems Audit and Control Association annual conference on Computer Audit and Security. Bill is on the Board of Directors of the International Society for Policing Cyberspace (http://www.polcyb.org) and served as an industry delegate to the National Cyber crime Training Partnership (NCTP) and to the G-8 Cyber crime Task Force, both sponsored by the U.S. Department of Justice. He is a member of the Board for the Certified Information Security Manager's certification sponsored by ISACA. In July 2003 he received a CSO "Compass Award" from the publisher's of CSO magazine recognizing him as one of a handful of thought leader's who "helped build security culture not just in their own organization but in the broader business community and the nation." Bill has also recently been appointed to the 2003/2004 Board of the Computing Technology Industry Association http://comptia.org/. He holds the Certified Information Systems Auditor (CISA) from ISACA and the Certified Protection Professional (CPP) from ASIS International. Professional Publications He is co-author of "I-Way Robbery: Crime on the Internet", and "High Tech Investigator's Handbook: Working in the Global Environment" published by Butterworth-Heinemann (www.bh.com) in 1999. His most recent book "Netspionage: The Global Threat to Information" was released in September 2000. | |||
Track 4: Business
BN8: Business Perspective on Cybersecurity February 10, 15:00-15:45 |
|||
Business Perspective on Cybersecurity
Abstract One of the leading private Sector cyber security practitioner's and a Founding member of the Global Council of Chief Security Officers, Bill will share his perspective on the 21st century security challenges faced by both public and private Sectors. In their common struggle to address the new risks arising from the vast increase in connectivity and communications he will discuss what he believes are the new threats that must be appreciated and key protective measures that should be emphasized. The session will emphasize the critical importance of shaping an effective global response to economic cyber crime and deploying sufficient human and technical resources to address the both criminal abuse of the internet and the rapidly increasing range of cyber security issues. |
Jeffrey Breinholt
|
| ||
Biography | |||
Jeff Breinholt has been a federal prosecutor for
14 years, specializing in financial crime. After 9/11, he was asked to
establish a nationwide program to uncover and redress incidents of
international terrorist organizations raising funds from U.S. sources.
The group of lawyers he formed has since evolved into a permanent
Washington-based unit within the Criminal Division devoted to the
prosecution of terrorist financing crimes. Mr. Breinholt is a frequent
author and lecturer on intelligence and law enforcement issues, and is
the recipient of the
Attorney General's Award for Excellence in Furthering the Interests of
US National Security. His latest publications include the book
Counterterrorism Enforcement: A Lawyer's Guide (DOJ OLE, 2004) and the
article, "How About a Little Perspective? The USA PATRIOT Act and the
Uses and Abuses of History," 9 Texas Review of Law & Politics 225
(Fall 2004). He is currently at work on a book on the history of
American criminal tax prosecutions. | |||
Seminar PE2: Political, Policy and Legal Issues
February 8, 14:00-16:45 |
|||
There is a tendency to focus on particular counterterrorism measures to the exclusion of others. This tendency is undoubtedly driven by media coverage, popular culture, and the American obsession with the question, What's hot and what's not? It too often ignores the multi-faceted nature of the US counterterrorism arsenal. Jeff Breinholt, who heads the Department of Justice's terrorist financing criminal enforcement program, analogizes effective US counterterrorism policy to a golf swing, where the goal is synchronicity. In golf, an unsynchronized swing results in a hook or a fade into the woods. In counterterrorism, the reliance on particular tools to the exclusion of others similarly results in missed opportunities. Synchronicity in counterterrorism means striving to maximize the menu of viable options available to operational decision makers. This ideal requires a healthy and constant competition among governmental components, which aggressively strive for approval to apply their tools to particular counterterrorism challenges. The best example of this dynamic since 9/11 may be the competition between US prosecutors and the Pentagon upon the detection of individual terrorist operatives. While the most prominent legal issues have involved the President's authority to designate enemy combatants, DOD-led military tribunals, and prisoner interrogation methods, academic commentators are beginning to take notice of the large number of terrorism-related criminal prosecutions undertaken in the last few years, seemingly without fanfare. American prosecutors have pushed regular criminal enforcement options and the application of established legal principles to terrorist supporters within the US, from sleeper cells and jihadist groups to seemingly legitimate charities that raise funds for foreign terrorist groups and causes. Mr. Breinholt will survey those prosecutions that have reached a point where public commentary is possible, to illustrate the sometimes-overlooked criminal enforcement option and its importance to a synchronized counterterrorism policy. |
Brigadier General Matthew E. Broderick USMC (Ret)
|
| ||
Biography | |||
Matthew Broderick joined the Department of
Homeland Security in May of 2003 and serves as the Director of the
Homeland Security Operations Center (HSOC). Prior to coming to the
Department, he worked as an adjunct consultant at the Institute for
Defense Analysis (Systems Analysis) where he worked on major DOD
projects to include the Marine Corps Over the Horizon, Ship to Objective
Maneuver, C4ISR issues and the OSD Joint Deployable Headquarters C4I
and facilities standardization efforts. From April of 1998 through October of 2002, Mr. Broderick served as the Vice President of Operations for the Eastern United States and the Caribbean for a large, international corporation that specialized in building, selling and managing vacation resorts. In that capacity, he oversaw the daily activities of 22 Vice President's and Managers, 1100 employees and was responsible for producing $100M in net sales. On 1998, then Brigadier General Broderick retired after serving 30 years as an Infantry Officer in the United States Marine Corps. During his 30 year career, Broderick commanded at the platoon, company, battalion and brigade level; attended the Marine Corps Amphibious Warfare School, the Armed Forces Staff College and the Naval War College; served as the operations officer at the Battalion, Regiment, Division level; and served as the Inspector General for the US Central Command and as the Deputy Director of Operations at Headquarters Marine Corps in Washington, DC. Mr. Broderick holds two Masters Degrees: one from Salve Regina College, Newport, RI and one from the Naval War College, Newport, RI. | |||
Seminar PE8: Getting the Public Involved
February 8, 09:00-09:45 |
|||
Sharing Threat Information at All Levels
Abstract After 9/11, several major cities (NY, LA, etc) approached the federal government and request help on how their law enforcement agencies could better share terrorist related information. This was the birth of the Joint Regional Information Exchange System (JRIES). When the Department of Homeland Security stood up, it found itself unable to quickly reach out and share threat information using one common system. JRIES helped solve some of that problem but there still was a need for reaching non-law enforcement and leadership all the way down to the county and smaller city levels to include all the state and county Emergency Operations Centers. This compounded itself when DHS was required to reach out to the Private sector and to reach out at both the unclassified and classified (Secret) level. A system, called the Homeland Security Information System (HSIN) is trying to do exactly that. How this is implemented and rolled out becomes a key to this country having a standard way of quickly and securely sharing terrorist threat and warning information. |
Brent Budowsky
|
| ||
Biography | |||
From the mid-1970's to 1990 Brent Budowsky
served in senior Congressional Staff positions including Legislative
Assistant to former U.S. Senator Lloyd Bentsen, and Legislative Director
to Representative Bill Alexander, then Chief Deputy Majority Whip.
With Senator Bentsen Mr. Budowsky was extensively involved with the
Intelligence Identities Protection Law and Intelligence Officers Death
Benefits Act. During his years with Congressional Leadership he was
involved with conflicts ranging from Central America and opposing the
Soviet invasion of Afghanistan to supporting freedom in Eastern Europe
and world trade issues. Mr. Budowsky left politics in 1990 to pursue
business interests involving marketing and public affairs ranging from
the talent agency that represented Frank Sinatra to a Papal CD to
traditional corporate business. Mr. Budowsky reengaged politically
after 9-11 and informally
advises both Democrats and Republicans. His politics are
demonstrated in columns he occasionally writes. In a trilogy of essays
in the Christian Science Monitor, Mr. Budowsky proposed after the
contested 2000 election that both parties reach out for a new
bipartisanship. He later proposed "Lets Make the Democrats the Patriot
Party" and finally called in 2002 for a "Star Spangled" national unity
ticket of Bob Kerrey and John McCain. Writing in the National Review
Online (12/15/04) an essay titled "Reagan, Roosevelt, Rushmore" Mr.
Budowsky called Presidents FDR and Ronald Reagan "the great bookends of
freedom" who were the indispensable leaders in the victories over
fascism and communism. Mr. Budowsky deplores the partisanship and
divisions in American politics today and calls for a new bipartisanship
necessary for a nation at war, facing what he believes is an inevitable
terrorist WMD attack on American soil unless dramatic bipartisan
initiatives are undertaken. | |||
Seminar PE2: Political, Policy and Legal Issues February 8, 14:00-16:45 |
|||
Abstract With a very real danger of a future terrorist attack on American soil using WMD there is an urgent need to restore a full bipartisan consensus on policy and appropriate "rules of engagement" between government and media. Intelligence and counter-terrorist policy must be holistic and comprehensive including increased support for human intel, improved protection of classified information, dramatically improved domestic homeland security practices, broad consensus balancing domestic investigative needs and protection of civil liberties, practices and tactics regarding detained prisoners, division of responsibilities and oversight for intelligence policy, and an "attitude adjustment" from both political parties seeking openness and consensus on the litany of leading issues. Regarding the facts of the pending "CIA Identities" ("Wilson") case I will propose going forward that government and media at least informally discuss a non-legislated Code of Ethics in which clear procedures would be established for editors to confirm prior to publication whether identity disclosure should be voluntary withheld. |
|||
Seminar PE3: Role of Congress in Intelligence Oversight February 8, 09:00-09:45 |
|||
Abstract Mr. Budowsky will call for a renewed spirit of bipartisanship between the political parties, and executive-legislative collaboration, appropriate for a Nation facing potential terrorist attacks employing WMD. Deplores politicization of intelligence by either party, calls for maximum sharing of information, maximum respect for confidentiality of classified information, and shared commitment to increased support for human intelligence and for risk taking spirit throughout intelligence community. This is fostered by maximum consensus, cooperation, and avoiding any partisanship which has been historically destructive. Executive-Legislative collaboration should create consensus on structural organization of intelligence responsibilities, notification and oversight of Congress, mutual confidence in good faith, executive avoiding tendencies to withhold information, legislative avoiding tendencies to leak classified information. |
Jim Butterworth
|
| ||
Biography | |||
With more than 12 years of hands-on experience
in Network Security and Computer Forensics, Jim Butterworth provides
Guidance Software clientele with top-level experience and technical
support. His background as a certified Intrusion Analyst, vulnerability
tester, perimeter defense technician, and first responder, has
contributed to countless successful investigations and nicely complement
the Guidance Software Incident Response Team. Butterworth has
investigated global hacking and data mining incidents involving the
defense industry; corporate theft of proprietary source code; Zero-day
outbreak containment; intellectual property theft; e-mail spoofing;
phishing expeditions; eDiscovery; evidence seizure; data recovery;
corporate policy enforcement; Web defacement; harmful threat
communications;
and packet capture/analysis of unknown activity. Butterworth honed
his diverse technological skill set while completing more than 20 years
of distinguished and highly decorated service in the United States Navy.
Seven of those years were spent fulfilling two tours in the Fleet
Information Warfare Center the Navy Center of Excellence for Information
Warfare.
| |||
Seminar PE1: Trends in Intelligence Technology Securing Intelligence Networks February 8, 16:15-17:00 |
|||
Trends in Computer Forensics - Collection in the Networked World
Abstract The proliferation of computers and networking technology has caused the computer forensic industry to rethink static computer forensic investigation. The days of seizing a computer hard drive and conducting analysis in the lab are numbered. Rapid and accurate collection of information requires that the computer forensic industry move to the enterprise environment. During this panel, Mr. Butterworth will discuss some of the challenges facing computer forensics technology and how the Industry is changing investigative and intelligence collection tools to address them. Topics of discussion will be how industry is coping with the emergence of larger storage devices and the popularity of removable storage; use of disk encryption software by targets to hide information; clandestine collection against highly mobile and remote targets; automating the collection effort to maximize collection opportunity; and dealing with foreign language in a digital environment. The ultimate objective of the presentation is to provide an understanding of how the computer forensic industry is dealing with challenges facing the collection of binary intelligence. |
Sir John Chilcot
|
![]() | ||
Biography | |||
Rt Hon Sir John Chilcot GCB is currently
chairman, since 1999, of the B&CE (building and civil engineering)
Group, with c. £1bn of assets, providing on a not-for-profit basis
pensions, insurance, holiday pay and other benefits to the construction
industry. B&CE is the largest supplier in the UK of stakeholder
pensions to medium and low-earning workers. Chairman of the individual
group companies, and of the linked Charitable Trust. Staff Counsellor to the National Criminal Intelligence Service since 2002. Chairman since 2001, of the Police Federation, the leading research foundation on policing in the UK. Member, the National Archives Council (formerly the Lord Chancellor's Advisory Council on the Public Records) since 1999. Trustee, the Police Rehabilitation Trust since 2002. Director, Abraxa Ltd and NBW Ltd. Other former appointments include: Member, Independent Commission on the Voting System, 1997-8; Chairman, First Division Pensioners Group, 1998-2002; Staff Counsellor for the Security and Intelligence Agencies, 1999-2004; seconded Director, Schroders, 1986-7; Director RTZ Pillar, 1986-90. Conducted reviews of Royal and VIP security, 1999, and the Castlereagh Special Branch break-in 2002-3. Before retiring from the Civil Service at the end of 1997, as Permanent Under-Secretary of State at the Northern Ireland Office since 1990, he was Deputy Under-Secretary at the Home Office in charge of the Police Department, and served in a variety of posts in the Home Office, the Civil Service Department and the Cabinet Office, including Private Secretary appointments to the Home Secretary (Roy Jenkins, Merlyn Rees and Willie Whitelaw) and to the Head of the Civil Service (William Armstrong). CB, 1990; KCB, 1994; GCB, 1998. Privy Counsellor, 2004. Born on 22 April 1939, he was educated at Brighton College and Pembroke College, Cambridge (Open Scholar; MA, English and Languages; Hon. Fellow 1999). | |||
Seminar PE6: View from Abroad - Britain
February 8, 09:00-10:35 Track 1: Federal Civilian FD4: Jointness: The New IC Buzzword February 9, 15:00-15:45 |
LtCol. Bill Cowan, USMC (Ret)
|
| ||
Biography | |||
A former Navy enlisted man, graduate of the U.S. Naval Academy, and
retired Marine Corps officer, Bill spent three and a half years on
combat assignments in Viet Nam, the majority in small unit operations,
including extensive experience with the Central Intelligence Agency. In
the 1980's he was specially selected to serve as one of the first
members and as the only Marine at the time in the Pentagon's most
classified counterterrorist unit, the Intelligence Support Activity
(ISA). While there, he served as senior military operations officer and
field operative on covert and clandestine missions into the Middle East,
Europe, and Latin America. Following retirement from the Marine Corps in 1985, he served two years on the staff of U.S. Senator Warren B. Rudman as a legislative assistant and as the Senator's primary staff assistant during the Iran/Contra hearings. He was also a principal drafter of the legislation creating the U.S. Special Operations Command in Tampa, FL. From 1989 through 1994, he was again involved in numerous operations in the Middle East in response to terrorist incidents and the holding of Western hostages in Beirut and Kuwait. In 1990, on behalf of a major New York law firm and working with former CIA Director Bill Colby, he organized and successfully conducted a series of operations resulting in the repatriation of a number of Western hostages from Iraqi-occupied Kuwait. In addition to appearing regularly on the Fox News Channel, he is CEO of wvc3, inc. (on the web at www.wvc3.com), a company providing homeland security services, support, and technologies to government and commercial clients. | |||
Seminar PE5: Finding and Keeping Intelligence Specialists Spies - Intelligence Agents & Analysts February 8, 09:00-11:30 | |||
| |||
Track2: DOD/Military DM2: Military Collection Inside America February 9 10:15-11:00 |
|||
|
Craig Crawford
|
| ||
Biography | |||
Craig Crawford is a special contributor to
Congressional Quarterly and a news analyst for MSNBC, CNBC and "The
Early Show" on CBS. | |||
Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 14:00-14:45 |
Clara Conti
|
| ||
Biography | |||
Clara M. Conti joined IPIX Corporation in 2004 as president and chief
executive officer. Ms. Conti has over 20 years in the information
technology field as a leader, innovator and entrepreneur. Her executive
level experience as a CEO has been documented in graduate level
management textbooks as "value-based leadership". She is known for
building management teams and raising the profile of growing companies.
Ms. Conti comes to IPIX from ObjectVideo, an intelligent video surveillance company, where she presided as President and CEO. She came on board to re-start the failing dot-com, and within 18 months she turned the company into the industry leader for intelligent video surveillance. She was responsible for building a world-class executive team and sales organization. During her tenure, the company received many awards including Top 10 Companies To Watch, by Federal Computing Week; and Best in Show from the International Security Conference. She was also featured in hundreds of magazines and newspapers. Ms. Conti raised Object Video's third round of venture funding, $22 million in total. The company worked extensively for the Department of Homeland Security and the Department of Defense and was awarded contracts to secure the Northern and Southern borders of the United States. Prior to ObjectVideo, Ms. Conti was the President and CEO of Aurora Enterprise Solutions—a company she founded in 1992. Aurora was self-funded and never took on any debt. Aurora originally focused on government contracting and received several SBIR awards. Ms. Conti utilized her profits to develop Aurora's first commercial software product. She grew the company into a premier information security company with an authorization product called SOTERIA. The product was designed to address the security needs of the HIPAA legislation. Aurora worked with Department of Defense Health Affairs in order to secure medical records and meet the HIPAA regulations. The company was sold in 1999 in an all-cash deal to a Belgium firm, Ubizen. Prior to her two successful ventures as an entrepreneur, Ms. Conti worked extensively in the Washington D.C. area as an information technology executive for both commercial organizations (MCI) and government contractors (SAIC) where her roles focused on program management and team leadership. Ms. Conti has served on several boards in the Northern Virginia area including the Northern Virginia Technology Council and George Mason University School of Information Technology and Engineering. She is a graduate of the University of South Alabama where she attended on a full four-year scholarship. | |||
Seminar PE1: Trends in Intelligence Technology The Visual Intelligence Space February 8, 15:20-16:10 | |||
Moving Toward Total Situational Awareness
Abstract In today's dynamic security environment real-time access to reliable visual intelligence is not an option - it's a requirement. The ability to have total situational awareness by having access to relevant visual data gives security professionals the ability to significantly enhance their decision making during critical situations. A growing trend within visual intelligence technologies is the ability to immerse the viewer of surveillance video or still photography in a 360-degree sphere of visual information. These technologies can provide real-time data as well as the ability to navigate within recorded images for the purposes of forensic analysis. This presentation will give participants a greater understanding of spherical 360-degree image processing technology and its applicability a broad range of security concerns. |
Gordon Cucullu
|
| ||
Biography | |||
Former Green Beret lieutenant colonel Gordon Cucullu has more than
three decades of experience dealing with the tumultuous area of East
Asia, including North and South Korea, Japan, Taiwan, China and
Southeast Asian nations. He has written a best-selling new book called
Separated at Birth: How North Korea became the Evil Twin published this
past September. He is recognized as one of the leading authorities on
the complex issues that pose a danger to us all from North Korea and the
international War on Terror. Gordon has for the past three years been a frequent guest on Fox News Channel discussing the War on Terror and the ramifications for America and our allies. During the War with Iraq, Gordon was the primary on-camera commentator for WABC Television, Channel 7 in New York City. He is a regular with national and local talk radio show hosts including such well-known WABC hosts as Monica Crowley, Steve Malzberg, John Bachelor and Steve Alexander. Gordon is a favorite guest of Linda Chavez on her talk show on Liberty Broadcasting. He has been a regular commentator for Laurie Morrow in Vermont and Mike Rose in Atlanta. Gordon has addressed many audiences, large and small, on issues related to Asia. His expertise ranges from contemporary problems to complex geopolitical issues, from Americans doing business in Asia to America's new role on a world-wide stage. He combines an excellent knowledge of the history, culture, politics, military, business protocols and social values of the region with a great sense of humor. Gordon refines the complexities of a distant culture into understandable points welcome to an educated general audience. Gordon has led a Green Beret A Team in the jungle mud of Asia and has briefed the Secretary of Defense in the E-Ring of the Pentagon. He managed military assistance to war-torn Central American republics in a tumultuous period. Because of the quality of his work he was selected for the highly competitive George Marshall Exchange Program and served in the Department of State as political military advisor for the assistant secretary of East Asia Pacific Affairs, at the time Paul Wolfowitz. After leaving the Army he has been a vice president for General Electric Aerospace based in Seoul and as the executive director of the Korea Society, a non-profit organization in Manhattan, rescued that organization from oblivion. | |||
Seminar PE6: View from Abroad - Asia February 8, 10:45-11:30 |
|||
The Continuing Crisis of North Korea.
Abstract: For decades North Korea has posed the most serious threat of destabilization in Northeast Asia. While the regional powers have moved toward greater economic interdependencies since the fall of the Soviet Union, North Korea has continued to upset the political balance by blustering threats, open manufacture of weapons of mass destruction, and grotesque human rights abuses. Since the mid-1990s with the coincidental signing of the Agreed Framework and the death of the original dictator Kim Il Sung, the situation has only grown more tense. Kim's son and successor Kim Jong Il violated the principles of the Agreed Framework from the outset by continuing to pour scarce resources into a nuclear development program. Meanwhile, the US and supporting nations of Japan, South Korea, Russia, and China propped up the decaying Kim regime through massive infusion of assistance. Tragically, little or none reached the starving people of North Korea but were diverted to the military and to the black market. Hence we are faced in the early part of this century with a country that exists of an economy of crime and deceit: counterfeiting, drug manufacture and trafficking, export of banned missiles and technology, and sale of weapons of mass destruction are virtually the only sources of income for the faltering regime. Thought of implosion brings with it fear of massive refugee flow with attendant health and management problems, and the always-present possibility of irrational attacks on neighbors. Gordon Cucullu will discuss these and other factors that brand the Kim Jong Il regime one of the world's most egregious human rights violators and a legitimate charter member of the Axis of Evil. Gordon has addressed many of these topics in his recent book Separated at Birth: How North Korea became the Evil Twin. He will discuss these topics and how we might address them - preferably without overt military action - during his presentation. |
Dr. Philip H.J. Davies
|
| ||
Biography | |||
Dr. Philip H.J. Davies is Deputy Director and a
founder of the Brunel Centre for Intelligence and Security Studies at
Brunel University (West London) where is a lecturer in politics. He is
the author of a detailed administrative history of the British Secret
Intelligence Service(SIS, aka MI6) recently published as "MI6 and the
Machinery of Spying" (London: Taylor and Francis, 2004) and co-author
with Professor Anthony Glees of "Spinning the Spies: Intelligence, Open
Government and the Hutton Inquiry" (London: Social Affairs Unit, 2004)
as well as author of numerous articles in
journals such as "Cambridge Review of International Affairs",
"Harvard International Review" and "Intelligence and National Security",
amongst others, dealing with issues such as intelligence, information
warfare and research methods. Prior to his appointment to Brunel he was
an Associate Professor in Strategic and International Studies at the
University of Malaya in Malaysia. During his time in Malaysia he
provided training consultancy to a number of Malaysian government
agencies including their Department of Information and the Special
Branch of the Royal Malaysian Police. He undertook first two degrees in
Canada and his Ph.D. at Reading University in the UK, during which he
was one of the founding convenors of the Security and Intelligence Group
of the UK Political Studies Association. | |||
Seminar PE6: View from Abroad - Britain
February 8, 09:00-10:35 |
|||
Ideas of Intelligence and the Management of Intelligence
Abstract "Intelligence" means profoundly different things in the British and American governments. In the British government, "intelligence" generally refers to clandestine collection, that is, as the Parliamentary Intelligence and Security Committee has put it, "acquiring more information than is openly available." In the United States, the broader sense is used, meaning all available information from open and covert sources once evaluated, interpreted, integrated and fused into an analytical whole. In British practice, the idea of "intelligence analysis" is almost meaningless. Assessment, as it is generally called, is the ordinary work of the Civil Service in its role of providing Advice to Ministers. The purpose of intelligence is to provide information that the overt organs of the Civil Service cannot acquire from their overt sources. At the highest, national level, the Joint Intelligence Committee is essentially about providing nationally agreed Advice at the Cabinet level, pooling overt and covert sources in what has been called not intelligence assessment but "government assessment." The only exception in British practice is the Defense Intelligence Staff in the Ministry of Defense, but the professional analysts at DIS also provide expert assessment on matters like weapons of mass destruction and proliferation on a national level as well as for the Ministry of Defense. From the British point of view, the most divergent aspect of the American system is its competitive redundancy, with multiple agencies' performing parallel all-source assessments from a more or less common intelligence database. As a result, almost none of the accepted US thinking or conceptual toolkit can be effectively transposed to the British system. Three other key differences between Britain and America intensify these lines of the divergence. The first is the relative strength of the Treasury, which will not pay for multiple groups' performing duplicate tasks in different Departments and Ministries. The next is that the Ministry of Defense is far weaker in the British government than is the DoD in the American system, added to the third difference, the fact that intelligence resourcing is via a national Single Intelligence Vote in which (line-item) funds go directly to the operational agencies and not to the parent Ministries that oversee them (the Home Office in the case of MI5 and the Foreign and Commonwealth Office for SIS and GCHQ). This reduces the conflict of interest between intelligence assessment and finance. But the budgetary constraints also force Britain's intelligence agencies and Civil Service departments to collaborate on the assessment process, which both depends on, and intensifies, the ethos of collegiality that allows the British system to be as closely integrated as it is. | |||
Track 1: Federal Civilian FD6: FBI vs. an American MI5 February 10, 10:15-11:00 | |||
Towards a National Counterintelligence Service: MI5 for America?
Abstract Separating counter-intelligence from law enforcement is a lesson that all of America's allies in the 'Four Eyes' intelligence alliance have had to learn. Only America has failed to decouple counter-intelligence from national policing. Separating the two functions is essential not only for reasons of intelligence operational effectiveness but also for the protection of civil liberties. Providing a body, which has executive action (i.e. arrest) powers with the full range of national security-oriented intrusive intelligence methods as well is a recipe for disaster, as shown the experience of the Royal Canadian Mounted Police and Metropolitan Special Branch as well as the excesses of the FBI during the 1960s and early 1970s. Likewise, a police-ethos will also tend to suppress the kind of long-term, 'long game' thinking required for effective security intelligence, again as can be seen the UK and Canadian experiences. The US has successfully detached aspects of the Federal law enforcement brief from the FBI (e.g. DEA and ATF) and these are criminal law enforcement issues much closer to the Bureau's institutional heart than counterintelligence. Therefore there is far less reason not to decouple counter-intelligence as a separate agency as suggested originally in the 1997 National Institute for Public Policy report on national intelligence. The present crisis regarding religious militancy of both domestic and foreign origin makes an independent National Counter-Intelligence Service. Effective implementation of the NCIS model would also, however, require America taking to heart more general lessons from her allies concerning interagency collegial cooperation and network management structures. MI5 is most effective because of its collaborative relationship with the Special Branches of the assorted regional police forces in the UK, with Military policing and special investigation functions, and foreign intelligence generated by its JIC and JTAC partners such as the Secret Intelligence Service and Government Communications Headquarters. Unfortunately, the lack of collegiality and interagency collaboration represent one of the most persistent weaknesses of the US Intelligence Community, and their cultivation and institutionalization represents the single most important reform upon which any intelligence restructuring will ultimately succeed or fail. |
Arnaud de Borchgrave
|
| ||
Biography | |||
Expertise: U.S. foreign policy; current
political trends in Europe, Asia, the former Soviet Union, the Middle
East, and Africa; cyberspace; terrorism; global organized crime. During a 30-year career at Newsweek magazine, Arnaud de Borchgrave covered most of the world's major news events. At 21, he was appointed Brussels bureau chief of United Press International, and three years later he was Newsweek's bureau chief in Paris. At 27, he became senior editor of the magazine, a position he held for 25 years. He was appointed editor in chief of the Washington Times and Insight magazine in 1985. He left his post with the Washington Times in 1991, and currently serves as its Editor-At-Large. He served as president and CEO of United Press International from 1999 to January 2001. He is currently serving as Editor-At-Large at UPI. His awards include Best Magazine Reporting from Abroad and Best Magazine Interpretation of Foreign Affairs. In 1981, de Borchgrave received the World Business Council's Medal of Honor, and in 1985 he was awarded the George Washington Medal of Honor for Excellence in Published Works. While at CSIS he has coauthored Cyber Threats and Information Security: Meeting the 21st Century Challenge (2001); Russian Organized Crime & Corruption: Putin's Challenge (2000); Cybercrime, Cyberterrorism, Cyberwarfare (1998); Russian Organized Crime (1997); and Global Organized Crime: The New Empire of Evil (1994). | |||
Track 2: DOD/Military DM6: Outsourcing or In-House? February 10, 10:15-11:00 |
Joseph DeTrani
|
| ||
Biography | |||
Joseph R. DeTrani was born in New York City
and received his B.S. from New York University. He also attended NYU
School of Law and NYU Graduate School of Business Administration. Mr.
DeTrani was an officer in the U.S. Air Force and worked in the private
sector as an economist before joining the CIA as an economic analyst.
After serving as the Executive Assistant to Director William J. Casey,
Mr. DeTrani was the Director of European Operations, Director of
Technical Services, Director of Public Affairs, Director of the Crime
and Narcotics Center and Director of East Asia Operations. He spent a
number of years living in East Asia and the Middle East--Taiwan, Seoul,
Hong Kong, Tehran, Rangoon and Beijing. Mr. DeTrani speaks Chinese and
French.
| |||
Track 2: DOD/Military DM1: Asia: the Next Assessment Crisis February 9, 08:15-09:00 |
|||
Abstract
The focus of Mr. DeTrani's presentation will be on the nuclear issue in North Korea and the need to resolve this issue. The regional and international implications of North Korea retaining a nuclear weapons capability will be discussed. An update and evaluation of the Six-Party process will be presented, with some commentary on the likelihood of North Korea returning to the Talks for substantive discussions. China's emergence as a regional and global player will be discussed, with some commentary on domestic issues requiring leadership attention. The importance of ASEAN and other regional alliances as the region addresses issues as diverse as terrorism and trade will also be discussed. |
John Deutch
|
![]() | ||
Biography | |||
The formidable John Deutch was only the second
director of the Central Intelligence Agency to hold Cabinet rank. Dr.
Deutch was nominated by President Clinton and sworn in as Director of
Central Intelligence following a unanimous vote in the Senate. Noted for
his quick-draw style of leadership, his arrival at the CIA heralded an
era of unequaled openness and much needed reform. Time magazine wrote during his tenure, "Deutch is becoming the most powerful CIA chief ever." As head of the Intelligence Community, he directed all foreign intelligence agencies of the United States and directed the Central Intelligence Agency. | |||
Keynote Address KA2: Intelligence disorganization: Where is the Community heading?
February 10, 09:15-10:00 | |||
Intelligence disorganization: Where is the Community heading?
Abstract The Intelligence Reform and Terrorism Prevention Act of 2004 is the result of the 9-11 Commission and other Congressional and Executive Branch inquires into recent intelligence shortcomings. The Reform act contains major uncertainties for future operation of the Intelligence Community. These uncertainties will not be resolved for at least a couple of years and the final outcome for improving Intelligence Community performance in supporting the foreign policy leadership, military operations, and law enforcement is in considerable doubt. |
Sheldon Drobny
|
| ||
Biography | |||
Sheldon Drobny co-founded Air America Radio with
his wife, Anita, then sold it to a group of investors in November 2003.
He returned to help rescue the company after its launch in March 2004.
AAR now reaches millions of listeners on 40 stations and through XM
Satellite Radio and Sirius Radio, the nation's two premiere satellite
networks. Drobny is founder, chairman and principal of Paradigm Group II LLC, an investment firm with more than $200 million of capital in more than 40 companies. Drobny, a certified public accountant, is one of only 173 non-attorneys admitted to practice before the U.S. Tax Court since its inception in 1942. He has a bachelor's of science degree in Business Administration and is author of numerous tax-related articles. Early in his career he served as supervisor of the IRS Technical Review Staff and has been a directing instructor for the Becker CPA Review Course and a lecturer at New York University's Advanced Taxes Study Group, as well as various tax seminars in the Chicago area. Drobny was a managing partner for many years in a public accounting and consulting firm and is affiliated with the American Institute of Certified Public Accountants and the Illinois CPA Society. He is benefactor of the Sheldon and Anita Drobny Interdisciplinary Program for the Study of Jewish Culture and Society at the University of Illinois; member of the University of Illinois Foundation; member of the Woodrow Wilson Council of the Woodrow Wilson International Center for Scholars; and member of the International Leadership Council of the Simon Wiesenthal Center. | |||
Seminar PE8: Getting the Public Involved Role of the Media February 8, 09:50-10:35 |
|||
PERCEPTION OR REALITY? Abstract 1. WW II AND THE COLD WAR-VIDEO-STEPHEN AMBROSE 2. NS ACT OF 1947 AND CREATION OF CIA-VIDEO-GORE VIDAL 3. POLITICALIZATION OF INTELLIGENCE AND THE MEDIA 1947-1989 4. COLLAPSE OF THE USSR-CONSEQUENCES 1990-2001 5. FAILURE OF INTELLIGENCE-9/11 AND IRAQ 2001-PRESENT 6. REPAIRING THE IMAGE-DE-POLICALIZATION OF INTELLIGENCE |
Dr. Rachel Ehrenfeld
|
| ||
Biography | |||
Dr. Rachel Ehrenfeld's new book Funding Evil; How Terrorism is Financed and How to Stop It,
Bonus Books, 2003, 2005). She is the director of the New York-based
American Center for Democracy, and the Center for the Study of
Corruption & the Rule of Law. Her previous book are: Evil Money,
Encounters Along the Money Trail (HarperCollins in 1992, SPI, 1994), and
Narco-Terrorism; How Governments around the World used the Drug Trade
to Finance and Further Terrorist Activities (Basic Books,
1990&1992). Dr. Ehrenfeld is a commentator and consultant on the
problems of terror financing, international terrorism, political
corruption, money laundering, drug trafficking, and organized crime and
the connections that binds these groups together.
She's currently working on a new book on the Islamist penetration of
the US and Western economies. Dr. Ehrenfeld has lectured on these issues in many countries, and has advised banking communities, law enforcement agencies, and governments in many countries, including the U.S. Defense Department's Threat Reduction Agency. She testified before the European Parliament on how the Palestinian Authority uses aid money to fund its terror activities, provided evidence to the UK Parliament on the corruption of the PA, and testified before the U.S. Congress on terrorism related issues. Dr. Ehrenfeld's articles appear in the Wall Street Journal, The Washington Times, the National Review, the Euobserver, The Jerusalem Post, The NY SUN, and the L.A. Times. She appears as an expert commentator on television and radio news programs, including The O'Reilly Factor, Fox News, CNN, ABC, NBC, and MSNBC. Dr. Ehrenfeld worked as a research scholar at New York University School of Law, a visiting scholar at the Columbia University Institute of War and Peace Studies, and as a fellow at Johns Hopkins's SAIS. Her Ph.D. in Criminology is from the Hebrew University School of Law. | |||
Seminar PE7: Sharing Intelligence, Part 1 February 8, 09:00-11:30 |
|||
The Role of Money in Jihad
|
|||
Seminar PE6: View from Abroad - Israel February 8, 15:00-15:45 |
|||
The Role of Money in Jihad Abstract: To win the war on terrorism we need to understand the role that money in itself has as part of the Jihad that was declared against America. Unless we understand that it is not enough to stop the money that funds terrorism but what Jihad bil-Mal is, we will fail to adequately fight this war. |
Steven Emerson
|
| ||
Biography | |||
Steven Emerson is an internationally
recognized expert on terrorism and national security and considered one
of the leading world authorities on Islamic extremist networks,
financing and operations. He now serves as the Executive Director of The
Investigative Project, one of the world's largest archival data and
intelligence on Islamic and Middle Eastern terrorist groups. Mr. Emerson
and his staff frequently provide briefings to US government and law
enforcement agencies, Members of Congress and Congressional committees,
and print and electronic media, both national and international. Since
9-11, Mr. Emerson has testified and briefed Congress dozens of times on
terrorist financing and operational networks of Al Qaeda, Hamas,
Hizzbollah, Islamic Jihad, and the rest of the worldwide Islamic
militant spectrum. Mr. Emerson is the author of five books on terrorism and national security, most recently of the national best seller, American Jihad: The Terrorists Living Among Us (Free Press). He and his organization have been quoted or profiled in hundreds of newspaper and television stories since 09-11. He now serves as NBC's terrorism analyst. Mr. Emerson started The Investigative Project in late 1995, following the broadcast of his documentary film, Jihad in America, on Public Television. The film exposed video of clandestine operations of militant Islamic terrorist groups on American soil. For the film, Mr. Emerson received numerous awards including the George Polk Award for best television documentary, one of the most prestigious awards in journalism. He also received the top prize from the Investigative Reporters and Editors Organization (IRE) for best investigative report in both print and television for the documentary. The award from the IRE was the fourth such award he had received from that group. The documentary, which was excerpted on 60 Minutes, is now standard viewing for federal law enforcement and intelligence organizations. Mr. Emerson is recognized as having been the first and only terrorist expert to have testified and warned about the threat of Islamic militant networks operating in the United States and their connections worldwide. He specifically warned about the threat of Osama Bin Laden's network in pioneering Congressional testimony delivered in 1998. Nearly every one of the terrorist suspects and groups first identified in his 1994 film have been indicted, prosecuted or deported since 9-11. Because of security threats, Mr. Emerson now lives under false cover in the United States. Mr. Emerson has authored or co-authored five books: American Jihad: The Terrorists Living Among Us (Free Press, 2002); Terrorist: The Inside Story of the Highest-Ranking Iraqi Terrorist Ever to Defect to the West (Villard/Random House, 1991); The Fall of Pan Am 103: Inside the Lockerbie Investigation (Putnam, 1990); Secret Warriors: Inside the Covert Military Operations of the Reagan Era (Putnam, 1988); and The American House of Saud: The Secret Petrodollar Connection (Franklin Watts, 1985). In a feature article on Emerson in Brown Alumni Magazine (November-December 2002), former head of NSC Counterterrorism Richard Clarke said, "I think of Steve as the Paul Revere of terrorism ... [Clarke] credits Emerson with repeatedly warning of Al Qaeda sleeper cells in the United States. He adds that he would attend Emerson's speeches whenever possible because 'we'd always learn things we weren't hearing from the FBI or CIA, things which almost always proved to be true.'" In that same feature article, Andrew McCarthy, Assistant U.S. Attorney who prosecuted the 1993 World Trade Center bombings, said ".Emerson was helpful in preparing to cross-examine defense witnesses in the [1993 World Trade Center bombings] case...He's a valuable source of information and knowledge. And in terms of trying to find places to look for evidence, he's a very good person to talk to. He's got a lot of insight." Robert Blitzer, former Chief of the FBI's Domestic Terrorism/Counter-Terrorism Planning Section, has said, "Steve Emerson has tremendous information and I have no doubt that he is better informed in many areas of terrorism than we were in the government." In his speeches, Steven Emerson holds audiences spellbound as he reveals the frightening extent of the worldwide terrorist network in the United States. Now recognized as perhaps the foremost expert in the world on terrorism, Mr. Emerson captivates is audiences with hitherto unknown information on terrorist cells, operating from Boston to San Diego, on behalf of bin Laden, Hamas and Hizzbollah. Mr. Emerson provides mesmerizing first hand accounts of secret terrorist meetings, training, recruitment and above all else--deception of law enforcement and the media--going far beyond the accounts published in his new best-seller, American Jihad: The Terrorists Living Among Us. Consulted by the White House, National Security Council, FBI, Justice Department, Congress and intelligence agencies, Mr. Emerson is in great demand today re as one of the most astute, insightful and knowledgeable experts in the world today on the threat and prospects of militant Islamic terrorism. | |||
Track 3: State and Local Law Enforcement SL5: Convergence of Islamic Terrorist Groups February 10, 08:15-09:00 | |||
|
Bruce Fein
|
| ||
Biography | |||
Bruce Fein is a nationally acclaimed expert on
constitutional law. He commands more than 25 years' experience in legal
fields ranging from antitrust to communications to national security
law. He is former Associate Deputy Attorney General in the Department of
Justice and former General Counsel of the Federal Communications
Commission. He also served as Research Director for the Minority on the
Joint Congressional Irancontra Committee, and at the Justice Department
as Assistant Director in the Office of Legal Policy and Special
Assistant to the Assistant Attorney General for Antitrust. He has been a
Visiting Fellow for Constitutional Studies at the Heritage Foundation,
an Adjunct Scholar at the American Enterprise Institute, and frequent
lecturer on constitutional and communications law for Brookings
Institute. Both parties in Congress have repeatedly summoned Mr. Fein for testimony on such issues as the confirmation of Supreme Court Justices, flag burning, the Victims' Rights Amendment, Helms-Burton law, and the executive powers of the President. He has advised approximately two dozen countries in revising their constitutions, from South Africa to Hungary to Russia to Mozambique. Mr. Fein is a media fixture. He is a weekly columnist for the Washington Times and a guest columnist for USA Today. According to the National Law Journal, he is one of the seven most quoted attorneys in the nation. He regularly appears on national radio and television, including National Public Radio, Face the Nation, C-SPAN, CNN, MSNBC, and the Diana Rheem Show. He is a monthly staple on the Armstrong Williams Show discussing law, morals, and ethics. He has been featured on the cover of the American Bar Association Journal. In addition to the Washington Times and USA Today, his columns have been carried in the New York Times, the Washington Post, the Los Angeles Times, Legal Times, the American Bar Association Journal, the National Law Journal, and the District of Columbia bar journal. His law review articles have been published in the Harvard Law Review and elsewhere. He has addressed conferences of the United States Circuit Courts and regularly speaks before esteemed legal audiences. He was Executive Editor of the World Intelligence Review for several years. Mr. Fein graduated Phi Beta Kappa from the University of California at Berkeley in 1969, cum laude from Harvard Law School in 1972, and then clerked with United States District Judge Frank A. Kaufman in the District of Maryland. He serves as general counsel for a public interest organization, Legal Affairs Council, and is an adjunct scholar and general counsel with the Assembly of Turkish American Associations. He is a member of the bars of the District of Columbia, the United States Supreme Court, and several other federal courts. | |||
Seminar PE2: Political, Policy and Legal Issues
February 8, 09:00-11:30 |
|||
Abstract Mr. Fein's presentation will elaborate on the requirements of the torture convention, domestic laws punishing torture and related techniques, and other techniques that may violate international or domestic law. The presentation will further examine the usefulness in seeking reliable statements from coercive interrogation techniques. | |||
Track 1: Federal Civilian FD3: The International Intelligence Community February 9, 14:00-14:45 | |||
The International Intelligence Community
Abstract Everyone underscores the utility of international intelligence sharing in the war against global terrorism, but few have seriously examined what compromises the United States should make in pursuing parallel national security or foreign policy objectives to secure such cooperation and to avoid creating more terrorists than are killed or captured. The United States, for example, generally champions religious freedom abroad. Should it nonetheless remain silent about the flagrant religious discrimination in Saudi Arabia to elicit at least some cooperation in fighting Al Qaeda or detecting the villains who bombed the Khobar towers? A similar dilemma confronts the United States in Pakistan: should it overlook its disgraceful record on nuclear proliferation and President Pervez Musharraf's autocratic powers in exchange for his assistance in defeating Al Qaeda and shutting down madrassas which breed Islamic terrorists. Mr. Fein's presentation will elaborate an intellectually coherent approach to balancing international intelligence sharing with competing national security and foreign policy goals of the United States. |
Bill Fiora
|
| ||
Biography | |||
Bill Fiora is a president and founder of
Outward Insights, LLC. A leading strategy and competitive intelligence
consulting firm. There, he helps companies build and improve their
ability to deliver actionable intelligence to senior executives. He is a
member of the board of directors of the Society of Competitive
Intelligence Professionals and a former CIA analyst.
| |||
Track 4: Business BN1: What Government and Business Intelligence Pros Can Learn From Each Other February 9, 08:15-09:00 | |||
What Government and Business Intelligence Pros Can Learn From Each Other
Abstract Conventional wisdom presumes that government intelligence professionals are more advanced than their corporate peers in the sophistication of their techniques and deliverables. In recent years, however, business intelligence practitioners have become arguably more skilled in areas such as developing innovative analytic techniques, delivering intelligence tailored to decisionmakers' needs, and in building closer relationships with corporate intelligence consumers. In this presentation, two professionals who work to help both business and government intelligence professionals improve their analytic skills will discuss the areas in which business and government intelligence can learn from each other, and propose ways in which this exchange of ideas should take place. |
Frank J. Gaffney, Jr.
|
| ||
Biography | |||
Frank Gaffney is the founder and president of
the Center for Security Policy in Washington, D.C. The Center is a
not-for-profit, non-partisan educational corporation established in
1988. Under Mr. Gaffney's leadership, the Center has been nationally and
internationally recognized as a resource for timely, informed and
penetrating analyses of foreign and defense policy matters. Mr. Gaffney also contributes actively to these debates in his capacity as a columnist for the Washington Times, Jewish World Review and TownHall.com. He is also a contributing editor to National Review Online. He is a featured weekly contributor to Hugh Hewitt's nationally syndicated radio program and the Monica Crowley Show on WABC and appears frequently on national and international television and radio programs. In addition, his op.ed. articles have appeared, among other places, in The Wall Street Journal, USA Today, The New Republic, The Washington Post, The New York Times, The Christian Science Monitor, The Los Angeles Times, and Newsday. In April 1987, Mr. Gaffney was nominated by President Reagan to become the Assistant Secretary of Defense for International Security Policy, the senior position in the Defense Department with responsibility for policies involving nuclear forces, arms control and U.S.-European defense relations. He acted in that capacity for seven months during which time, he was the Chairman of the prestigious High Level Group, NATO's senior politico-military committee. He also represented the Secretary of Defense in key U.S.-Soviet negotiations and ministerial meetings. From August 1983 until November 1987, Mr. Gaffney was the Deputy Assistant Secretary of Defense for Nuclear Forces and Arms Control Policy under Assistant Secretary Richard Perle. From February 1981 to August 1983, Mr. Gaffney was a Professional Staff Member on the Senate Armed Services Committee, chaired by Senator John Tower (R-Texas). In the latter 1970's, Mr. Gaffney served as an aide to the late Senator Henry M. "Scoop" Jackson (D-Washington) in the areas of defense and foreign policy. Mr. Gaffney holds a Master of Arts degree in International Studies from the Johns Hopkins University School of Advanced International Studies and a Bachelor of Science in Foreign Service from the Georgetown University School of Foreign Service. | |||
Seminar PE4: Reforming the Intelligence Community
February 8, 14:00-16:45 |
Shawn Geddis
|
| ||
Biography | |||
Shawn Geddis came to Apple Computer, Inc. in
1998 after 8 1/2 years as a US Federal Government Defense Contractor
with 5 1/2 of those years at DARPA supporting and defending the network
infrastructure. As a Security Consulting Engineer on the Apple Federal
Team, Shawn has extended Apple Computer's collaboration with the US
Federal Government on protecting their networks. In addition to his work
at Apple, Shawn is also the co-founder and currently the Chairman of
the [STOS] Secure Trusted OS Consortium [http://www.stosdarwin.org/]
which was founded in 1999 with its first Symposium in August of 2000.
The Secure Trusted OS Consortium is a focused group from Public, Private
& Academic sectors openly collaborating to enhance the security of
Darwin / BSD and related projects. | |||
Seminar PE1: Trends in Intelligence Technology Securing Intelligence Networks February 8, 09:00-09:40 |
|||
Securing Intelligence Networks with Security at the Core. Security: Built In, Not Bolted On! Abstract With dreams of "Trustworthy Computing" and "Pervasive System Security" is there really any commercial OS vendor doing anything to help us get there? am I really safe and at what cost? The international community has become painfully aware that better operating system security is a necessity and not a luxury. Worldwide computer system attacks and compromises are on a sharp rise, but what defenses can help? Applications and system services must be built on solid, security-focused foundations. Operating Systems must have security built in from the ground up and not have it bolted on as an afterthought. No operating system is perfect or bullet-proof, but there has to be something better. |
Reuel Marc Gerecht
|
| ||
Biography | |||
Gerecht studies Afghanistan, Central Asia and
the former Soviet Union, intelligence, Iran, the Middle East, and
terrorism. He was formerly a Middle Eastern specialist for the Central
Intelligence Agency,1985-1994. Professional Experience - Director, Middle East Initiative, The Project for the New American Century, 2001 - Risk assessment consultant (Middle East, Central Asia, and the former Soviet Union), Walsingham Inc., 1999-2001 - Consultant on Afghanistan, CBS News, 1999-2000 - Freelance writer, 1994-2001 - Political and consular officer, U.S. Department of State, 1985-1994 - Middle Eastern specialist, Central Intelligence Agency,1985-1994 Education - M.A., Islamic history, Princeton University - The American University of Cairo and Cairo University - University of Edinburgh, The Muir Institute of Islamic Studies - B.A., History, Johns Hopkins University | |||
Seminar PE4: Reforming the Intelligence Community
February 8, 09:00-17:00 | |||
|
Farid Ghadry
|
| ||
Biography | |||
Mr. Farid N. Ghadry was born in Aleppo in
northern Syria on June 18 of 1954. He comes from a prominent Syrian
family that includes many politicians and civil servants who served in
Syria. In 1964, the family emigrated to Lebanon because of political
turmoil and settled in Beirut where Mr. Ghadry attended the Maristes
Brothers School (Champville - Deek-el-Mehdi) In 1975, the Ghadry family,
once again, emigrated to the US and settled in the suburbs of
Washington DC. Mr. Ghadry graduated from the American University in Washington DC in 1979 with a degree in Finance and Marketing. He worked at EG&G, Intertech, Inc., a subsidiary of EG&G, Inc., a Fortune 500 U.S. defense contractor, for two years before starting his own business in 1983 called International TechGroup, Inc. Mr. Ghadry sold his business in 1989 and has been involved in many entrepreneurial operations since. Mr. Ghadry, because of his father's work, was granted the Saudi citizenship. The passport was confiscated by the Saudi embassy in Washington because of his stand on democratic reforms in Saudi Arabia during the Iran-Contra in 1987 and in the last several years. In October of 2001, Mr. Ghadry, along with several American-Syrians, hatched the idea of the Reform Party of Syria. A constructive and comprehensive program has been put in place to bring regime change to Syria. Mr. Ghadry and the co-founders of RPS are hoping to return to Syria one day to rebuild the country on the basis of principles of economic and political reforms that will usher democracy, prosperity, freedom of expression, and human rights in addition to lasting peace with open borders with all of Syria's neighboring countries including Israel. Mr. Ghadry has been invited to speak at the Washington Institute for Near East Policy, Johns Hopkins University (SAIS), Harvard University, University of Virginia, the European Parliament, the French Parliament, and the Belgian Senate. Mr. Ghadry is married to Ahlam Ghadry and has four children. He has served on the Board of Trustees of Norwood School in Bethesda, MD and heads the Capital Campaign for a sport program at St. Albans and National Cathedral Schools. | |||
Seminar PE6: View from Abroad - Syria February 8, 14:00-14:45 | |||
Syrian Intelligence Tactics in Suppressing the Rise of a New Middle East Abstract Three-prong strategy 1) The Iraq Factor Deep intelligence covers are hiding and assisting Iraqi insurgency. Supplying funds that some of which is channeled through the Commercial Bank of Syria. Also, gold bullion and US dollars left Baghdad three days before the war in trucks is used to supplement the insurgency. I bring up Mustapha al-Tajer story: Killed by Ghazi Kanaan for embezzling Iraqi funds earmarked for insurgency. Syrians intelligence is building Terror schools in the Beka'a valley ready to move into action. 2) Stop at all costs dissidence abroad Foreign intelligence services monitoring opposition and dissident groups. Afraid that Chalabi-like can exist to bring their downfall from outside. Embassy staff intimidate and unite under "Syrian Cultural Clubs" phenomena that Syrians think it is just so when in fact, they are monitoring and suppressing stations for Syrians in the Diaspora. 3) Intimidate population. Show usefulness. Interior intelligence services suppress and intimidate the population at large. They also collect information that they us sparsely to convey to western nations to show goodwill. Reality is that there are webs of extremism allowed to operate in Damascus and used to show the Americans that Syrian Ba'athists are useful. They create the enemy, and then kill it to find themselves in the good graces of the international community. |
Rebecca Givner-Forbes
|
| ||
Biography | |||
Rebecca Givner-Forbes is an intelligence
analyst at the Terrorism Research Center. She focuses on terrorist
groups sourced in the Arab world and Middle Eastern regional security in
general. Her work includes translation and analysis of al-Qaeda and
other terrorist statements and Arabic media. She graduated cum laude
from the Edmund A. Walsh School of Foreign Service at Georgetown
University with a major in International Politics, concentrating in
International Security. She studied Arabic at Georgetown and in Cairo,
Egypt and Damascus, Syria. Previously, Rebecca worked at the National
US-Arab Chamber of Commerce as an Arab-world business and economics
analyst.
| |||
Seminar PE5: Finding and Keeping Intelligence Specialists - Translators
February 8, 15:00-16:45 |
Joseph Goldberg
|
| ||
Biography | |||
Joe is Director, Business Intelligence in
Motorola's Corporate Strategy Office. He is responsible for the business
intelligence processes and competitive analysis and collection on a
worldwide basis. He has been at Motorola since 1993 in this, and
related, positions. Prior to joining Motorola, he worked for the Central
Intelligence Agency for eight years where he was involved in all facets
of intelligence collection, analysis, and dissemination.
Before joining the government, Joe worked in the Media and Business
Research departments of Frank N. Magid & Associates, a leading media
research and consultation firm. Joe has been a Society of Competitive
Intelligence Professionals (SCIP) member since 1994. He received Bachelor of Arts degrees in Political Science, and Communications and Theater Arts, from the University of Iowa, and a Master of Arts degree from Iowa in Communications and Theater Arts. | |||
Track 4: Business BN2: Identifying Analytical Aptitudes in Business Intelligence Professionals February 9, 10:15-11:00 | |||
Identifying Analytical Aptitudes in Business Intelligence Professionals
Abstract A critical issue facing intelligence professionals in businesses is ensuring that the individual has the skill set and qualities to do the job. A person who desires to make business intelligence a long-term career must understand their unique competencies and functional characteristics to survive. They need to uncover the core competencies, which make up a BI person - competencies, when correctly trained, successfully link collection, analysis and decision-making. We will examine the process used at one of the world's leading corporate business intelligence programs - Motorola, Inc. |
Jan Goldman
|
| ||
Biography | |||
Jan Goldman is a Professor of Strategic
Warning and Threat Management at the Joint Military Intelligence
College, and a lecturer at other government agencies and schools. He is
the author or editor of several publications to include the recently
declassified, Anticipating Surprise: Analysis for Strategic Warning
(nominated for the Francis Parkman Prize), and a forthcoming book on
ethics and intelligence. His experience includes crisis management,
intelligence support to counter-terrorism operations, counter-insurgency
operations, and space operations.
| |||
Seminar PE5: Finding and Keeping Intelligence Specialists - Training
February 8, 14:00-14:45 | |||
Training
Abstract Mr. Goldman discusses the role of training and education as it relates to keeping and maintaining intelligence analysts with the proper analytical tools and technology in the asymmetrical threat environment. He sees the expansion of intelligence programs at colleges and universities in the U.S. and Canada, as both a blessing and a curse. Students are entering the field better trained and educated for their career but that their expectations are not always met; meanwhile, government institutions must compete for the best and the brightest students and faculty in a field they once monopolized. Finally, Goldman sees the intelligence field being strengthened by this competition, which he believes may eventually lead to the formal professionalization of the intelligence occupation. |
Jamie Gorelick
|
| ||
Biography | |||
Ms. Gorelick is a partner at Wilmer, Cutler,
Pickering, Hale & Dorr . Prior to joining Wilmer, Cutler, Pickering,
Hale & Dorr in July 2003, Gorelick was vice chair of Fannie Mae. As
part of the four-person Office of the Chairman, she shared
responsibility for overall management of the company, directed its
efforts to reach underserved markets and oversaw Fannie Mae's external
relationships, legal and regulatory affairs. Prior to joining Fannie Mae
in May 1997, Gorelick was deputy attorney general of the United States,
a position she assumed in March 1994. From May 1993 until she joined
the Justice Department, Gorelick served as general counsel of the
Department of Defense. From 1979 to 1980 she was assistant to the
secretary and counselor to the deputy secretary of energy. In the
private sector, from 1975 to 1979 and again from 1980 to 1993, Gorelick
was a litigator in Washington, D.C., representing major U.S. companies
on a broad range of legal and business matters. | |||
Seminar PE4: Reforming the Intelligence Community
February 8, 09:50-10:35 |
|||
Abstract
Now that the 9/11 Commission's recommendations have prompted legislation, the question is how that legislation will be implemented, how it will iterate, and how the current structures will adjust to the demand of Congress and the President for a more cooperative and integrated intelligence community. |
Senator Slade Gorton
|
| ||
Biography | |||
Slade Gorton is of counsel at Preston Gates & Ellis LLP. Prior to
joining the firm, he represented Washington State in the United States
Senate in 1980-1986 and 1988-2001. While in the Senate, Gorton served on
the Appropriations, Budget, Commerce, Science and Transportation, and
Energy and Natural Resources Committees. He served as chairman of the
Interior Appropriations Subcommittee (1995-2001), the Commerce
Subcommittees on Consumer Affairs (1995-99), and Aviation (1999-2000).
He was also a member of the Republican leadership as counsel to the
Majority Leader (1996-2000) and a member of
National Commission on Terrorists Attacks Upon the United States from
2002-2004.
Gorton began his political career in 1958 as a Washington state
representative; he went on to serve as State House majority leader. In
1968, he was elected attorney general of Washington state, where he
argued 14 cases before the Supreme Court. Gorton also served on the
president's consumer Advisory Council (1975-77) and on the Washington
State Criminal Justice Training Commission (1969-1981).
| |||
Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 09:00-11:35 |
Jonathan Halevi
|
| ||
Biography | |||
Jonathan D. Halevi is a former career Israeli
intelligence officer and advisor for policy planning in the Israeli
Ministry of Foreign Affairs. Mr. Halevi today works as a researcher in
Middle East politics for the Jerusalem Center for Public Affairs, headed
by former Israeli UN Ambassador Dore Gold and consults on Middle East
and Arab affairs to the Wall Street Journal and other publications. He
is also special consultant to the Linde vs. Arab Bank lawsuit. Mr.
Halevi has written many articles for both Hebrew and English
publications including "Al-Qaeda's Intellectual Legacy: New Radical
Islamic Thinking Justifying the Genocide of Infidels". | |||
Seminar PE6: View from Abroad - Israel
February 8, 15:00-15:45 | |||
Al-Jihad Bi-al-Mal: If not by your sword, then by your money
| |||
Track 1: Federal Civilian FD3: The International Intelligence Community February 9, 14:00-14:45 |
Greg Halpern
|
| ||
Seminar PE1: Trends in Intelligence Technology - UAV vs. Satellite
February 8, 14:00-15:15 |
Tom Harb
|
| ||
Biography | |||
World Lebanese Cultural Union (WLCU). The WLCU
is the legitimate representative of the Lebanese Diaspora of 12 million
people. It is an INGO. M Harb, Florida-based, is the "Foreign Minister"
of the Lebanese Diaspora institution. He coordinates with the State
Department and the UN on disarming Hizbollah according to UNSCR 1559. | |||
Seminar PE6: View from Abroad Lebanon February 8, 16:30-16:45 |
|||
|
Hon. Alcee Hastings (D-FL)
|
![]() | ||
Biography | |||
Congressman Hastings is a member of the
powerful House Rules Committee and is a senior Member of the House
Permanent Select Committee on Intelligence (HPSCI). On the HPSCI,
Hastings is the Ranking Democratic Member of the Subcommittee on
Terrorism and Homeland Security. The Terrorism Subcommittee is the
primary committee in Congress which has direct oversight of the programs
and activities of the intelligence community that relate to U.S.
homeland security and to counterterrorism, including capabilities,
resources, policies and procedures.
| |||
Track 5: Private Sector PS5: Recruiting Minorities February | |||
Mobilizing Minorities for Homeland Security Abstract: Rep. Hastings will address the importance of diversity in the Intelligence Community, implementation of the Intelligence Reform and Terrorism Prevention Act of 2004, and the interaction between the Legislative and Executive Branches on national security matters. |
David W. Henderman, Jr.
|
| ||
Seminar PE7: Sharing Intelligence - Part 2
February 8, 14:00-16:45 |
Charles Intriago
|
| ||
Biography | |||
One of the leading authorities on money
laundering in the world, Charles A. Intriago spent ten years in
government service in the United States, as a federal prosecutor in
Miami, as chief counsel to the U.S. House of Representatives' Government
Operations Subcommittee on Legal and Monetary Affairs, and as special
counsel on organized crime to Governor Reubin Askew of Florida. After
his government service, he practiced law in Miami and was an equity
partner of the international law firm, McDermott, Will & Emery. In 1989, Mr. Intriago, as founder and president of Alert Global Media, Inc., launched Money Laundering Alert, a Miami-based monthly publication that is the world's leading source of information, guidance and analysis on money laundering and terrorist financing issues, including the money laundering-related provisions of the USA Patriot Act of October 26, 2001. In 1995, Mr. Intriago launched the website, www.moneylaundering.com, followed by the Spanish language website, www.lavadodinero.com. The websites are leading Internet sources of money laundering information and serve as training resources for banking, governmental and other organizations. They are known widely in government and financial sectors in the world as premier sources of information on money laundering matters. These information sources are read by many leading major banks, securities dealers and other financial institutions, as well as by central banks and regulatory and law enforcement agencies. Money Laundering Alert's annual international money laundering conference in South Florida is the largest and most acclaimed in the world. The most recent conference, in February 2004, drew 972 attendees from 54 countries. The next one, at the Diplomat Resort & Spa, in Hollywood, Florida, from March 2 to 4, 2005, is on track to draw more than 1,000 attendees. In 2002, Mr. Intriago founded the Association of Certified Anti-Money Laundering Specialists, which provides certification to persons who work in the anti-money laundering field in the public and private sectors and who pass an examination constructed by an independent firm of psychometricians. As of December 2004, ACAMS had 2,200 members in 91 countries. Mr. Intriago is often quoted in major newspapers and frequently appears on television programs around the world. In the United States, he has appeared on 60 Minutes, Frontline, CNN and on all networks in connection with money laundering and terrorist financing issues. He is a frequent lecturer, in English and Spanish, on money laundering subjects. Mr. Intriago is a native of Ecuador and speaks fluent Spanish. He received his law degree from the University of Florida, where he was Editor-in-Chief of the Law Review, and a Bachelor of Arts degree from Florida State University. | |||
Seminar PE7: Sharing Intelligence - Part 1 February 8, 09:00-11:30 |
|||
Abstract
The 9/11 Commission found that little has been learned since 9/11 about how Al Qaeda gathers, controls and moves its money and finances its operations. The pertinent federal investigative and regulatory agencies have not been given the requisite resources to attack terrorist financing vigorously. The Internal Revenue Service Criminal Investigation Division is an example. Although it is the finest financial investigative agency in the world, last year it was denied 80 new special agents to be devoted to terrorist financing investigations although they had been recommended by an independent, bipartisan oversight board. Congress must also accept some of the blame for the slow progress in divining the mysteries of terrorist financing. It has shirked its oversight role and failed to assure that the regulations it required under the USA Patriot Act are issued, implemented and supervised effectively. The Office of Foreign Assets Control has failed to perform its mission effectively, although under its new director, Robert Werner, there is promise that necessary reforms will be achieved. In addition, large segments of the U.S. financial sector, such as the insurance and precious metals industries, are either lacking a federal regulator to monitor compliance with USA Patriot Act obligations or are supervised by the IRS Examination Division, which is woefully understaffed and overwhelmed by its primary mission of examining for tax compliance. |
Dr. Charles Jacobs
|
| ||
Biography | |||
The President of the David Project is Dr.
Charles Jacobs, founder of the American Anti-Slavery Group and
co-founder of CAMERA. A veteran of the civil rights movement, Jacobs
received the 2000 Boston Freedom Award from Coretta Scott King, as well
as the Keter Torah award from the Bureau of Jewish Education in 2003. He
has appeared on NPR's Talk of the Nation, ABC Nightly News, and PBS -
and his writing has appeared in the New York Times, Boston Globe, and
Los Angeles Times.
| |||
Track 5: Private Sector PS8: How Academia and the Intelligence Community Can Work Together February 10, 15:00-15:45 |
Alireza Jafarzadeh
|
| ||
Biography | |||
Alireza Jafarzadeh is the president of Strategic Policy Consulting, Inc. He is also a FOX News Channel foreign affairs analyst. Alireza Jafarzadeh is a well-known authority in issues relating to terrorism, and Islamic fundamentalism in Iraq, Iran, and the Middle East; Iran's nuclear weapons program; and its internal political developments, including the anti-government demonstrations, the student movement, and human rights. The international concerns about Iran's nuclear weapons program has largely arisen from Jafarzadeh's stunning revelations about 7 major previously secret nuclear sites, including the sites in Natanz, Arak, Karaj, Ab-Ali, and Tehran. Jafarzadeh revealed the existence of Natanz uranium enrichment facility, and Arak's heavy water facility in August 2002, Ab-Ali centrifuge testing facility near Tehran in February 2003, two additional nuclear sites near Karaj in May 2003, and two other new nuclear sites in Kolahdouz military complex in Tehran, and Ardekan in July 2003. He unveiled the details of Iran's development of bio-weapons in May 2003, and had previously provided valuable information about the Shahab-3 medium range missile. On April 27, 2004, Jafarzadeh revealed information that Iran, using some 400 nuclear experts, is now running a secret nuclear weapons program supervised by the military and the Supreme Leader parallel to their overt nuclear energy program. Jafarzadeh had previously unveiled in March, a secret meeting held earlier by Iran's senior officials where they decided to speed up their nuclear weapons program, while faking cooperation with the IAEA. He first disclosed the details of Iran's involvement in the Khobar Towers bombing in Saudi Arabia, in 1997, and the Jewish Community Center bombing in Argentina in 1993. In November 2003, Jafarzadeh exposed an extensive covert network of the Iranian regime's agents who had been involved, for months, in meddling in the internal affairs of Iraq, seeking to derail the political process and establish a sister Islamic Republic in Iraq. As an accomplished analyst, Jafarzadeh has frequently appeared on major television and radio broadcasts including Fox News Channel, CNN, MSNBC, CBS Evening News, NBC, VOA, NPR, BBC and WABC to discuss Iran's WMD program and terrorist activities around the world. Jafarzadeh has published essays in, and been interviewed by, news outlets including New York Times, Washington Post, Wall Street Journal, Baltimore Sun, Chicago Tribune, Washington Times, Los Angeles Times, Christian Science Monitor, USA Today, Philadelphia Inquirer, Boston Globe, Miami Herald, Austin-American Statesman, Time, and Newsweek magazines, Space & Missile, Defense Week, Arms Control Today, and the Financial Times. Jafarzadeh has lectured in Georgetown University, University of Michigan, and National War College, and has been a frequent speaker at briefings, hearings and luncheons at the US Congress, the United Nations, Chicago Council on Foreign Relations, and the Morning Newsmaker Program at the National Press Club in Washington, DC. Prior to becoming a contributor for FOX News Channel, and until August 2003, Jafarzadeh acted for a dozen years as the chief congressional liaison and media spokesperson for the US representative office of Iran's parliament in exile, the National Council of Resistance of Iran. Jafarzadeh earned his Bachelor's degree from the University of Michigan, in Ann Arbor, and his Master's degree in Civil Engineering from the University of Texas, in Austin. | |||
Track 2: DOD/Military DM4: Nuclear Intelligence February 9, 15:00-15:45 | |||
Abstract Iran has posed the most serious nuclear challenge to the international community, and many believe that Iran is only one to three years away from getting the nuclear weapons capability. Yet, the intelligence community failed to detect the extent of Iran's nuclear weapons program. The nuclear sites that are now being inspected by the International Atomic Energy Agency were neither detected by the intelligence community nor were declared by the Iranian government. While looking at the latest status of Iran's nuclear weapons program, Alireza Jafarzadeh will examine the shortcomings both in the way the intelligence community has conducted its work on this issue, as well as how the U.S. policy has affected the quality of information now available on Iran's nuclear program. Jafarzadeh will look at ways to improve the quality of intelligence as well as ways to contain Iran's nuclear threat. |
David Jimenez
|
| ||
Biography | |||
David Jimenez, a Lifetime Certified Criminal
Analyst, is an Intelligence Research Analyst with the United States
Border Patrol, Bureau of Customs & Border Protection, Dept of
Homeland Security in El Paso, Texas. He retired in 1994 from the United States Air Force after 24 years of active duty service, which included intelligence assignments with the 17th Reconnaissance Wing (U-2/TR-1) in the United Kingdom, the Strategic Air Command in Omaha, Nebraska, and Joint Task Force Six (Counterdrugs) in Fort Bliss, Texas. His military intelligence experience includes IMINT (imagery intelligence), ELINT (electronic intelligence), and narcotics intelligence support for law enforcement agencies. He is the recipient of the Defense Meritorious Service Award, several Meritorious and Commendation Medals. | |||
Moderator Seminar PE5: Finding and Keeping Intelligence Specialists Spies - Intelligence Agents & Analysts February 8, 09:00-11:30 |
|||
Abstract
How can the U.S. Government possibly hope to retain its intelligence and security specialists when private contractors in Iraq are offering them salaries up to $1000 a day? Is the solution better pension benefits, more suitable career tracks, and more flexibility in their assignments? Or is the growth of private security companies the problem? After investing a quarter of a million dollars in training a special forces operator, what will it take to keep that resource on assignment? Congress may have to recognize that very substantial bonuses - in the quarter million dollar per annum range - may have to be paid before covert operatives volunteer to spend years risking their lives behind the lines in hard target countries such as North Korea and Iran. These are but a few of the issues that will be on the table in this Seminar. |
Robert Jordan
|
![]() | ||
Biography | |||
He also contributes to the planning and
development of synergies between HDJ magazine, conferences, research,
Web site and Homeland Defense Journal Online E-newsletter. Mr. Jordan is an expert in mass communications and strategic planning. A career Marine Corps officer, Mr. Jordan also served as a combat correspondent in Vietnam and distinguished himself as the Marine Corps/DoD spokesman in Beirut, Lebanon, in 1983. He appeared on 20/20, Nightline, Frontline and CNN and was the subject of a Bill Moyers special report. He was awarded the Navy Commendation Medal and the USMCCCA's special DPA award for his service there. During his military service, Mr. Jordan also received the Bronze Star Medal, with "V" for valor; the Air medal with two flight/strike awards; the Combat Action Ribbon with one bronze star; Combat Aircrew Wings; and numerous other personal, campaign and service awards. | |||
Seminar PE8: Getting the Public Involved Citizen Involvement - An American Tradition February 8, 16:00-16:45 | |||
Citizen Involvement - An American Tradition
Abstract From the Minutemen at Concord Bridge and Paul Revere's ride to warn the colonists that "The British are coming," ... to World War II's warning that "Loose Lips Sink Ships!" -- Americans have a tradition of being intimately involved with their government's efforts at keeping its citizens safe and our country free. Today many say that we face a new enemy who intimidates with terror. But terror is as old as man himself. Unfortunately, it is all too familiar to scholars of our history. Britain, France and Spain all used terror, first against our native people, then against each other as they strove to dominate this New World with all its promise and natural resources. Jordan will sketch a brief historical profile of America's struggle with terrorism with special emphasis on where the struggle hits us here at home … and what is being done to neutralize the threat and safeguard our homeland. |
Avi Jorisch
|
| ||
Biography | |||
Previously, Mr. Jorisch was a Soref fellow at
The Washington Institute for Near East Policy from 2001 to 2003,
specializing in Arab and Islamic politics. More recently, he served as
an Arab media and terrorism consultant for the Department of Defense. Mr. Jorisch holds a bachelor's degree in history from Binghamton University and a master's degree in Islamic history from the Hebrew University of Jerusalem. In 2000 and 2001, he studied Arabic and Islamic culture through the Center for Arabic Studies Abroad program at the American University in Cairo. He also earned a certificate in Arabic after participating in an intensive summer program at al-Azhar University, the preeminent institution of Sunni Islamic learning. | |||
Computer/Projector Track 5: Private Sector PS3: Is the Media the IC's Friend or Foe? February 9, 14:00-14:45 |
David Kalinowski
|
| ||
Biography | |||
David J. Kalinowski is the President of
Proactive Worldwide, Inc, a business intelligence decision support
agency he co-founded in 1995. He oversees Proactive's Industrial,
Telecommunications, Financial Services, and Insurance practices. David
is a 15-year veteran in the business intelligence discipline. His
experience includes researching, analyzing, and directing thousands of
BI projects. David's BI expertise has been applied to assist numerous
advisory and executive boards. Kalinowski has authored several articles
on BI topics, two for CI Magazine, and shares his knowledge through
dynamic presentations.
| |||
Track 4: Business BN7: Managing Expectations for Better Intelligence Results February 10, 14:00-14:45 | |||
Managing Expectations for Better Intelligence Results
Abstract Communication between a CI group and its internal clients is crucial to successful CI, and often boils down to how well the client understands what actually can be delivered, the research gathering process, when results can be expected, and at what cost. It also depends on how well the CI facilitator understands what the client expects for the investment. Specific key activities can help manage expectations and develop a consistent win-win relationship between CI users and providers. We'll look at which expectations are most important, and how to convey them. We'll talk about how to eliminate senior management's 'get me whatever you can' mentality, and how to develop a mutually beneficial relationship between internal CI users and providers. Learning objectives: - Learn which expectations are most important to convey - Develop a winning relationship with internal CI clients - Understand how to communicate and effectively manage reasonable expectations |
Evan Kohlmann
|
![]() | ||
Biography | |||
International terrorism expert, formerly of The Investigative Project. Author of Al-Qaida's Jihad in Europe: The Afghan-Bosnian Network
| |||
Track 3: State and Local Law Enforcement SL1: Profiling Terrorists Among Us February 9, 08:15-09:00 | |||
Beyond Profiling: Al-Qaida's Second and Third Generation Terrorists |
Dr. Harvey Kushner
|
| ||
Biography | |||
Harvey Kushner, a respected adviser to the
FBI, the FAA, the INS, and other government agencies, offers frightening
new evidence of a unified Islamic terrorist network that is operating
inside the United States and planning new opportunities to strike. Kushner identifies and assesses the violent plans of these Islamic organizations and individuals who take advantage of our reluctance to engage in ethnic profiling. He supports his claims with never-before-seen documents from top-level government sources, exposing a secret network of Arab intelligence agencies, terrorists, university professors, corrupt imams and other religious leaders, and violent criminals. | |||
Track 1: Federal Civilian FD2: Surveilling Insurgent Movements Domestically February 9, 10:15-11:00 |
Dr. I-chung Lai
|
| ||
Biography | |||
I-chung Lai, Ph.D., is the member of executive
board and director of Foreign Policy Studies of Taiwan Thinktank, a
Taipei based public policy research institute established at December
31st, 2001. Prior to assuming the current position, Dr. Lai has served
as the special assistant to Taiwan's representative in Japan from
2000-2003 and as the executive director of Taiwan Democratic Progressive
Party's U.S. representative office in 1999-2000. Dr. Lai received his
Ph.D. from Virginia Polytechnic Institute and State University in 1999
and has been a visiting research fellow at Cornell University from
1994-1999. Career and Activities: April, 2003-Present: Member of Executive Board & Director of Foreign Policy Studies, The Taiwan Thinktank December, 2000-March, 2003: Special Assistant to the Representative, Taipei Economic and Culture Representative Office in Japan. Jul/1999-Nov/2000: Executive Director, Taiwan Democratic Progressive Party Mission in the United States (Taiwan DPP Mission in the U.S.) 1998 Vice President, North America Taiwan Studies Association (NATSA) 1995-1997 Spokesman, Taiwanese Collegian (TC) Education: 1999 Ph.D. Virginia Polytechnic Institute and State University (Virginia Tech) 1994-1999 Visiting Research Fellow, Cornell University 1988 B.A. National Cheng-Kung University | |||
Seminar PE6: View from Abroad - Asia
February 8, 11:00-11:45 | |||
Asia
Abstract Taiwan is a small country with important strategic implication. It occupies key position in the sea-lanes of communication (SLOC), and its major seaport (the Kaohsiung Port) is one of the top five container ports in the world. In addition, Taiwan has Information Technology industry that produces the majority of the laptop computers and world biggest wafer manufacture; the key ingredient for IC chips in the computer. However, in terms of the anti-terrorism awareness, Taiwan is much left behind. Despite its high tech savvy, Taiwan does not have sophisticated export control regime to regulate its high technology products from falling into dubious hands. Taiwan does not participate in the Proliferation Security Initiative (PSI) even though Taiwan has expressed strong desire to be a contributor in this regard. Moreover, Taiwan is also not well prepared against possible airplane hijacking and terrorist acts from the sea attacking its seaport, not to mention about the reform of the various intelligence agencies for jointness in the anti-terrorism campaign. To ensure the safety of the U.S. homeland security, it is important to integrate Taiwan as a part of this campaign. For many nations around the world, they all face different problems in cooperating with the U.S. for the anti-terrorism campaign. In Taiwan's case, the slow progress is not resulting from the lack of efforts but from the lack of means and knowledge. One of the consequences for Taiwan to be virtually isolated from the international society is that Taiwan also has been deprived of the trend awareness and access to the knowledge for issues of global concern. In all various international agreements and monitoring regimes for the export control, Taiwan has been in none of them. Taiwan usually relies on second hand or third hand information to obtain the necessary knowledge and regulations that come natural to the member countries. Another consequence is that Taiwan is not able to inject its input when norms and regulations are discussed and formed for issues concerning Taiwan dearly. The lack of legal infrastructure and law enforcement in the export control, despite Taiwan is an important export country for dual-use or multiple use technology, has been in large part coming from such international condition. The lack of jointness of the intelligence in Taiwan reflects more with the governance problem of the newly democratic country than with the inappropriate modus operandi. Streamlining the intelligence flow inevitably will affect many of the already existed intelligence bureaucrats, who were normalized in the authoritarian era - nowadays they are strongly hostile to the newly democratic elected civilian leadership. Those established bureaucrats usually tend to view the jointness as a political campaign to weaken their power base. Thus, the intelligence reform, though extremely important for Taiwan's homeland security, has been politicized from the beginning. This is the obstacle that a joint U.S.-Taiwan effort has to encounter. The lack of Taiwan's participation of the PSI also hampers the intelligence exchange between Taiwan and other nations sharing similar concern for anti-proliferation campaign. The integration of Taiwan into the anti-terrorism regime has to be the first step for Taiwan. Then the intelligence, law enforcement or other types of cooperation can integrate more naturally. The top-down approach will definitely work better then the bottom-up. Anti-terrorism is a war on global level that requires no let down and no loopholes in the campaign. Do not let the political complexity compromise the effort. Leave Taiwan out will create just such a loophole. | |||
Track 2: DOD/Military DM1: Asia: the Next Assessment Crisis February 9, 08:15-09:00 |
|||
Asia: the Next Assessment Crisis Abstract In Asian policy community today, people tend to focus on immediate issues rather than the dynamics and structures that generate those problems. Consistently maintaining this behavior pattern usually falls into the "crisis management" mode, i.e., focusing on avoiding worsening of the crisis instead of finding solutions to the problems. Take the Korean Peninsula as an example, the focus now is on the North Korea nuclear weapon/weapon program. But the of the Korean Peninsula actually reflects the worsening problem of the DPRK regime itself, rather than its nuclear weapon/weapon program. If the focus in on the DPRK's nuclear weapons, then the focus should be stopping the DPRK from acquiring the nuclear weapons. If the focus is about the DPRK regime being problem itself, then the focus will be on the behavior of the Pyongyang government. As for the issue regarding the Taiwan Strait, similar problem arises. If we view the Taiwan Strait issue as the dispute between China and Taiwan, then the focus is on how to manage the cross-Strait problems to avoid military conflicts. Since the contingency is one-side, only China attacking Taiwan is possible and no vice versa. The conflict avoidance usually resort to pressure Taiwan not to provoke China while giving less focus on the Chinese military preparation, since it is difficult to dissuade China due to its strong power. If we are looking at this issue from a broader angle and, from what Taiwan stands politically, geo-strategically and economically, the conflict in the Taiwan Strait actually indicates the lack of confidence of Beijing government in its legitimacy, the Chinese strategic intention in Asia and the consequence of economic ramification globally. Taiwan's democracy is a problem to Beijing government, because this reminds the Beijing leadership that democracy has a good chance to be practiced in China. Capturing Taiwan will enable China to dominate Asia by cutting off the linkage between Northeast and Southeast Asia, and by forcing the U.S. to retreat from the Asia-Pacific region. Thus, the Taiwan Strait issue is no longer a matter simply about the conflicts between Taiwan and China, but a matter of the prospect of democracy in China and the geo-political order in the Asia-Pacific region. Asia is now entering a new era, and therefore a new approach is needed to integrate all the developments in this region nuclearization. In addition to the U.S. redeployment of its military presence in East Asia and the rise of Chinese power, there are dramatic changes taking place in Japan, South Korea and Taiwan as well. Old ways of management will fail to solve the problems today; the developments in the Korean Peninsula and the Taiwan Strait issues are two prime examples. How to make a policy effective for creating a new status quo is a challenge to all of us today. |
Dr. Michael Ledeen
|
| ||
Biography | |||
An expert on U.S. foreign policy. His research
areas include state sponsors of terrorism, Iran, the Middle East,
Europe (Italy), U.S.-China relations, intelligence, and Africa
(Mozambique, South Africa, and Zimbabwe). A former consultant to the NSC
and to the U.S. State and Defense Departments, he has also written on
leadership and the use of power. His latest book is entitled The War
against the Terror Masters. Professional Experience - Commissioner, U.S.-China Commission, 2001-2003 - Consultant, NSC, State and Defense Departments, 1982-1986 - Senior fellow, Center for Strategic and International Studies (CSIS), 1982-1986 - Special adviser to the Secretary of State, 1981-1982 - Senior staff member, Georgetown University Center for Strategic and International Studies, 1977-1981 - Rome correspondent, The New Republic, 1975-1977 - Visiting professor of history, University of Rome, Italy, 1975-1977 - Instructor and assistant professor of history, Washington University, 1967-1974 Education - Ph.D., history and philosophy, University of Wisconsin - M.S., history and philosophy, University of Wisconsin - B.A., Pomona College | |||
Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 10:00-11:30 |
|||
|
Stuart A. Levey
|
| ||
Biography | |||
Stuart Levey was confirmed by the Senate on
July 21, 2004 to serve as the Department of the Treasury's Under
Secretary for Enforcement and lead the Office of Terrorism and Financial
Intelligence (TFI). In the role of Under Secretary, Mr. Levey directs
the Treasury's efforts to cut the lines of financial support to
international terrorists, a critical component of the overall effort to
keep America safe from terrorist plots. In addition to helping fight the
financial war on terror, Mr. Levey also focuses on protecting the
integrity of the financial system, fighting financial crime, enforcing
economic sanctions against rogue nations and assisting in the ongoing
hunt for Iraqi assets. He also oversees the Treasury Department's
newly-created Office of Intelligence and Analysis, ensuring that
actionable intelligence is available to key decision makers and that the
Department is fully integrated within the broader intelligence
community.
| |||
Track 1: Federal Civilian FD8: Follow the Money: Treasury's Battle Cry February 10, 15:00-15:45 | |||
Follow the Money: Treasury's Battle Cry
Abstract In this era of transnational threats and instant financial transfers, "following the money" has become both more difficult and more vital than ever. This presentation will examine how the Treasury Department combines its unique array of financial data with intelligence from across the government to develop operable intelligence for policymakers. These products empower Treasury to take action - ranging from regulations and multilateral best practices to targeted actions such as sanctions and Section 311 of the Patriot Act - against national security threats, including terrorists, drug kingpins, proliferators, and rogue regimes. |
James Andrew Lewis
|
| ||
Biography | |||
Expertise: global technology policy issues,
information technology, Internet governance, critical infrastructure
protection and cyber security; aerospace issues, arms and technology
transfers, U.S. foreign policy | |||
Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 15:00-15:45 |
Kim Lindquist
|
| ||
Biography | |||
Kim R. Lindquist is an Assistant United States
Attorney for the District of Idaho, and has been for the past eighteen
years. Before joining the Department of Justice, Kim was in private
practice for eight years, specializing in criminal defense work. He is
currently assigned international and domestic terrorism responsibilities
with the United States Department of Justice. Previously, he worked as a
member of the Federal Organized Crime Drug Task Force for the State of
Idaho, concentrating primarily on large scale drug and violent crime
cases domestically and internationally. Between 1994 and 1997, Kim did a tour of duty for the Department of Justice in Colombia, where he served as an advisor to the Colombian government in the development of their criminal justice system. While living in Bogota and since, he has traveled throughout Latin America and the Caribbean region working with numerous governments in the development of their criminal justice systems. He has played a key role in the drafting, interpretation and implementation of codes of criminal procedure in eight countries and has been involved in and influenced those of many others in providing consultation in criminal code formation and implementation. Kim lectures extensively and works with criminal justice experts from around the world. He has authored in Spanish a comprehensive comparative law treatise on Latin American and Anglo-Saxon legal systems that serves as a text for his lectures worldwide. He has also recently been detailed to the tri-border region of Paraguay, Argentina and Brazil, where he works extensively with criminal justice officials. Kim's trial experience is extensive, both as a defense attorney and prosecutor. It includes the notorious Ruby Ridge case and the recent Al-Hussayen terrorism material support prosecution, as well as cases ranging from murder to misdemeanors on both sides of the courtroom. He was recently awarded the Department of Justice Director's Award for his efforts in organized crime drug prosecutions. Kim is also currently a Special Assistant United States Attorney and lead counsel in a large drug prosecution in Alaska of an organized crime network involving the Dominican Republic, Colombia, Mexico and the United States. Kim has been an adjunct professor in the Department of Criminal Justice Administration at Boise State University for the past twelve years. There he teaches classes in criminal law, criminal procedure, evidence, the law of arrest, search and seizure, and comparative law. | |||
Track 5: Private Sector PS2: US Courts & Terrorism February 9, 10:15-11:00 |
|||
THE AMERICAN CRIMINAL JUSTICE SYSTEM: FROM MAYBERRY TO MOSCOW
Abstract Reference to Waco incident, Colombia drug trafficking and South America tri-border region contraband phenomenon as examples of crime escalation and foundation for presentation Fundamental queries: How can the American criminal justice system deal with crime of such magnitude? Was it intended to do so? Recent terrorism events increase cogency of query Crime phenomenon a object of criminal justice system: a spectrum Single, local crime scenario on the one end War crime scenario on the other end Crime escalation generally plus terrorism has criminal justice system enter into war scenario Capability of the system: historical journey The "Mayberry" time Social institutions responsible for civilized society Criminal justice system an exceptional support Single, local crime scenario in most basic form Abdication by responsible social institutions Civilizing agent void created Crime increases Criminal justice system to solve society's ills Deal with increased crime Become primary civilizing institution Criminal justice system not designed to be civilizing agent As crime phenomenon moves from single, local crime scenario to war scenario, criminal justice system less capable of dealing with Terrorist event responsibility confirms system's entry into war scenario realm and reduced capability to deal with the same System dealing with war scenario facts with crime scenario legal tools Recent terrorism material support prosecution and indicia of system's inability to deal well with terrorism war scenario (Saudi student at University of Idaho in Moscow, Idaho) Normative or statutory indicators Terrorism material support statutes ill-suited Constitutional norms incongruent Procedural indicators Very local juries/judges judging very foreign facts Very local prosecutors as teachers of very foreign facts Very local investigators investigating very foreign facts Some solutions suggested as a result of journey from Mayberry to the two Moscows of Idaho and Russia |
Clare Lopez
|
| ||
Biography | |||
An intelligence professional for 25 years, Ms.
Lopez began her career as an operations officer for the CIA, serving in
postings around the world. Since 2000, Ms. Lopez has worked as an
intelligence analyst in the private sector, with a focus on
counterterrorism issues. She produced Threat Analysis for US Embassies
abroad with the Bureau of Diplomatic Security at the Department of State
and most recently has worked on contracts with DARPA, ONI, and a number
of commercial clients with HawkEye Systems, a high tech strategic
management and technology consulting firm in Alexandria, Virginia. Ms. Lopez received her M.A. in International Relations from the Maxwell School at Syracuse University and holds a B.A. in Communications and French from Notre Dame College of Ohio. She is a Visiting Researcher and occasional guest lecturer at Georgetown University and currently is collaborating as a co-author on the writing of two forthcoming books dealing with U.S. Foreign Policy and Terrorism and Proliferation. | |||
Track 3: State and Local Law Enforcement SL7: Biowarfare Intel February 10, 14:00-14:45 | |||
Biowarfare Intel
Abstract As so clearly articulated by President George W. Bush, the most serious threat facing the United States (U.S.) in the coming years is the possibility that a radical terrorist group will obtain and use Weapons of Mass Destruction (WMD). We know that Al-Qa'eda, in particular, is devoting significant effort to acquiring the means necessary to strike American and Western interests with WMD. While plenty of evidence exists to demonstrate its intentions with regard to nuclear, radiological and chemical weapons, today's subject will address the very real and growing likelihood that Islamist terrorists one day soon will have the means to attack us with a Biological Weapon (BW). Compounding the seriousness of the BW threat from al-Qa'eda and a few other like-minded groups, is the ubiquity of BW knowledge, materials and stocks around the world; globalization and the spread of high tech dual-use equipment makes it increasingly difficult to stop the proliferation of these deadly weapons, despite determined efforts to police international agreements and restrictions. New and emerging threats that conceivably could enhance the lethality and communicability of some of the deadliest viruses known to man, such as smallpox, Ebola, SARS (Severe Acute Respiratory Syndrome) or even influenza, include genetic manipulation and the deliberate creation in the laboratory of recombinant forms of some of these terrible diseases. Huge secret BW production programs, such as that which existed in the Soviet Union, may or may not have completely ceased operation; in any case, experts such as former Biopreparat Deputy Ken Alibek, warn that leftover stocks as well as out-of-work former BW scientists continue to pose the risk of proliferation, whether state-directed or not. One of the hallmarks of rogue states such as Iran and Syria is the existence of government-sponsored WMD programs, including BW. Plentiful evidence from courtroom testimonies of al-Qa'eda members, captured documents, videotapes and abandoned al-Qa'eda safehouses shows that the al-Qa'eda network continues to seek a biological weapons capability. The mastermind of 9/11, Khalid Sheikh Muhammed (KSM), for example, was arrested at the home of Pakistani microbiologist, Dr. Qadoos Khan on March 23, 2003. KSM's laptop computer allegedly contained documents related to biochemical weapons such as botulinum, salmonella toxins, cyanide and anthrax. Hambali, the operational head of the Jemaah Islamiyyah terrorist organization and principal al-Qa'eda contact in Southeast Asia, was working to open an al-Qa'eda bioweapons plant and anthrax program in Kandahar, Afghanistan, prior to his August 2003 arrest. Abu Musab al-Zarqawi, the Jordanian terrorist currently wreaking havoc in Iraq and who recently pledged loyalty to al-Qa'eda, oversaw a training camp in Afghanistan in 2000, which specialized in chemical and biological weapons. Prior to the beginning of Operation Iraqi Freedom in March 2003, al-Zarqawi had established an enclave in the Kurdish region of northern Iraq where he helped establish a new poison and explosives training camp. In January 2003, British security officials discovered traces of the deadly biological toxin, ricin, in an apartment in North London. Despite all the best efforts of the U.S. and other concerned allies, the BW threat not only remains serious, but is spreading. Whereas formerly, only state-run, government-funded programs had the capability, knowledge and funds to pose a BW threat to the world, today that threat has spread to sub-national groups, including Islamist terrorists. The challenge facing the world is to prevent such groups as al-Qa'eda from reaching a level of capability, which would permit them to unleash the unimaginable horrors of a SARS or Ebola plague upon thousands, if not millions, of innocent people. |
Thomas Maiorana
|
| ||
Biography | |||
Tom Maiorana has been an FBI Special Agent for
thirteen years and has been the Director of the Heart of America
Computer Forensic Laboratory in Kansas City, Missouri, for the past two
years. Prior to his current assignment, he was responsible for the
collection, preservation, and forensic examination of computer evidence
as a trained member of the FBI's Computer Analysis and Response Team.
Additionally, he conducted computer intrusion investigations for the
Kansas City office of the FBI. Prior to FBI employment, SA Maiorana was
employed as a computer Software Engineer and Systems Manager for seven
years. SA Maiorana is a graduate of the University of Maryland with a
Bachelor of Science degree in Computer Science.
| |||
Track 3: State and Local Law Enforcement SL4: Computer Forensics February 9, 15:00-15:45 | |||
Computer Forensics
Abstract Due to the wide availability and easy access to electronic equipment, criminals have gone "high-tech" and are using these resources to enhance and maintain their illegal enterprises. Soon after the 9/11 attacks, information was received that the hijackers used computers and the Internet to communicate. The skills of computer forensic examiners became an important tool during the investigation and the collection of intelligence regarding al-Qa'eda operations. Given this new reality, law enforcement has had to become just as resourceful by creating initiatives such as the Regional Computer Forensic Laboratory (RCFL) Program, where law enforcement is leveraging technology to comprehend digital evidence. RCFLs combine the talents and resources of law enforcement agencies at all levels. They increase law enforcement's ability to investigate criminals and detect and prevent acts of terrorism. During this session, we will discuss the importance of the proper collection, preservation, and exploitation of intelligence gathered from computer systems and other digital devices. RCFLs are a critical component in the FBI?'s effort to support state and local law enforcement. There are six operational RCFLs in the U.S. that are providing free computer forensic examinations and expertise to the law enforcement agencies within their service areas. By the end of this year, that number is expected to increase to thirteen. An overview of the RCFL program will be provided that will include the locations and service areas of each RCFL throughout the country. |
David Major
|
| ||
Biography | |||
David Major has made a 40-year commitment to
the practice of counterintelligence, having served in top leadership
roles at the FBI in counterintelligence as a Supervisory Special Agent,
as well as on the National Security Council as the Director of
Counterintelligence, Intelligence and Security Programs. Major was the
first FBI official ever to be appointed to the NSC. During his employment at the FBI from 1970 to 1993, Major became a nationally recognized counterintelligence and security/countermeasures technical expert, strategic planner, practitioner, advocate and spokesman for national counterintelligence and security countermeasures programs. During his time with the NSC from 1985 to 1987, he was involved in every aspect of these disciplines, with extensive operational experience at the highest level of government. While at the NSC, Major was responsible for formulating the policies and programs which led to the first and only mass expulsion of Soviet intelligence officers (80 KGB and GRU) from the United States in October 1986. Following his work at the NSC, Major returned to the FBI where he was in charge of the section within the Intelligence Division of FBI Headquarters responsible for managing all intelligence and counterintelligence strategic and operational analysis, policy and plans formulation, budget formulation, resource management, automated data processing, and counterintelligence training of FBI, DoD and counterintelligence community personnel. To ensure that the counterintelligence programs were integrated into the Executive Agencies' decision-making process, Major served as the architect for the Counterintelligence Operations Board in 1989 (now known as the National Counterintelligence Operations Board). From 1988 until his retirement in 1993, Major was the FBI's principal representative in the national intelligence policy formulation process. As such, he was the principal FBI drafter for the National Security Review (NSR) 18 and National Security Directive (NSD) 47. Major was the principal architect of the National Security Threat List (approved by the Attorney General in December 1991) to meet the ever-changing challenges of the foreign intelligence threat in the 1990s. The National Security Threat List strategy became the primary document which directly governs all DoD counterintelligence programs. Major's deep and persistent commitment to training future counterintelligence professional leaders from the DoD, FBI and CIA to think strategically about counterintelligence led him to formulate a new counterintelligence community course, "Strategic Approaches to Counterintelligence." This course was the first step in the development of a diverse gamut of courses Major later designed and currently conducts for the Intelligence Community. | |||
Plenary Session PL1 Counterintelligence Methods and Applications February 9, 16:00-16:45 | |||
Counterintelligence Methods and Applications
Abstract Any serious examination of intelligence reveals its impact on international relations; however, it is essential to also recognize the corresponding role of counterintelligence as an essential component of national strategy. In today's war on terrorism, the role of counterintelligence is at the front lines of identifying, penetrating and neutralizing the terrorist threat. All terrorist attacks are preceded by intelligence collection; and, the tools used to identify and counter espionage are the same tools, methods and applications required to defeat terrorist organizations. As an example of how essential it will be for the US to use traditional counterintelligence methods to address the terror threat that it faces today, this Seminar will discuss how the British Security Service (MI-5) used them to play the leading role in breaking the back of the terrorism war in Ireland. How MI-5's methods apply to our society will be part of an analysis of US CI that includes a review of the legal and ethical conflict between the requirement to safeguard individual rights, and the need to protect the community, social structure and national security. Also to be addressed are the foundations of, and the relationships between, counterintelligence, internal security, intelligence, security/countermeasures programs and law enforcement. |
Deborah Maklowski
|
| ||
Biography | |||
Ms. Maklowski began her Federal service in
1978 as an analyst/linguist with the U.S. Army in West Berlin. Most of
her focus as a civilian language and intelligence analyst with the
National Security Agency was on military trade, the proliferation of
weapons of mass destruction, and other global issues. Since 1987 she has
been a workcenter leader, most recently serving as the Chief of Staff
for a large intelligence production organization. Currently, as the
NSA/CSS Senior Intelligence Authority and Advocate for the U.S.
cryptologic community's Intelligence Analysis skill field, she oversees
the hiring and development of the Agency's professional intelligence
analysis workforce.
| |||
Seminar PE5: Finding and Keeping Intelligence Specialists Spies - Intelligence Agents & Analysts February 8, 09:00-11:30 |
|||
Spies - Intelligence Agents & Analysts Abstract If finding people with the right skills, knowledge, and personality traits -- not to mention the willingness -- to be an intelligence analyst is a science, then keeping them happy and productive once they're hired is definitely an art. This is especially true for Federal intelligence agencies, which frequently are limited in the salaries they can offer, engaged in activities that do not allow for explicit resumes (or book deals), and subject to sudden shifts of emphasis that can leave capable analysts stranded on the shores of subjects no longer worked. In this session Mrs. Maklowski will discuss these issues from the perspective of the National Security Agency, which currently is engaged in its largest IA hiring effort in nearly two decades. She will cover the qualifications and aptitudes that NSA seeks in its prospective intelligence analysts; describe some of the ways the Agency recruits analysts, along with related issues such as student programs and recruiting for diversity; and briefly review NSA's hiring processes. Mrs. Maklowski will then focus on the training and career development programs that NSA has created and uses to keep analysts growing and moving ahead as Signals Intelligence professionals, with emphasis on the issues that have the greatest impact on analysts' decisions to stay or leave. She will conclude with a brief look at the work NSA has already begun to develop cross-Intelligence Community standards for intelligence analysts and at how the Agency is preparing for the future of analysis. |
Michelle Malkin
|
| ||
Biography | |||
Michelle Malkin makes news, and makes waves,
with a unique combination of investigative journalism and incisive
commentary. She's not afraid to expose hypocritical environmentalists,
needle pork-loving politicians or criticize the MTV generation's morally
deprived icons. Most of all, she's not afraid to hold up the
Immigration and Naturalization Service to the relentless scrutiny it
deserves post-Sept. 11. Her ground-breaking research and reporting led
to her first book, "Invasion: How America Still Welcomes Terrorists,
Criminals, and Other Foreign Menaces to Our Shores" (Regnery 2002), in
which she argues "immigration must be treated as a national-security
issue." The book debuted on The New York Times nonfiction best-seller
list at No. 14 (week of Nov. 17, 2002). Her second book, "In Defense of
Internment: The Case for 'Racial Profiling' in World War II and the War
on Terror" (Regnery 2004), offers a defense of the most reviled wartime
policies in our history. Malkin began her career in newspaper journalism with the Los Angeles Daily News, where she worked as an editorial writer and weekly columnist from 1992-94. In 1995, she was named Warren Brookes Fellow at the Competitive Enterprise Institute in Washington, D.C. In 1996, she joined the editorial board of the Seattle Times, where she penned editorials and weekly columns for three and a half years. Today, her syndicated column appears in over 100 papers nationwide. Malkin's work has been cited in The New York Times, The Washington Post, USA Today, Reader's Digest and U.S. News and World Report. Her freelance work has appeared in The Wall Street Journal, Weekly Standard and Reason magazine. She has appeared on "The O'Reilly Factor," "Hannity and Colmes," "The McLaughlin Group" and "20/20," and is currently a Fox News commentator. Her hard-hitting -- and news-breaking -- commentary has been honored by several national organizations. Among the journalism awards Malkin has received: - The 1998 Council on Governmental Ethics Laws (COGEL) national award, for outstanding service for the cause of governmental ethics and leadership, for investigative columns that exposed campaign finance abuses by Washington state Democrats, Republicans and political organizations. - The 1998 Second Amendment Foundation's James Madison Award, for excellence in journalism "promoting the individual right to keep and bear arms." - The 1997 National Society of Newspaper Columnists writing award, for general interest columnists in newspapers with a circulation of at least 100,000 (2nd place). - The 1997 Evert Clark Science Award for journalists under the age of 30, for commentary and analysis of environmental regulations and science policy (honorable mention). | |||
Track 1: Federal Civilian FD1: Immigration and Customs February 9, 08:15-09:00 | |||
|
Stephen Marrin
|
| ||
Biography | |||
Stephen Marrin is a doctoral candidate in the
Woodrow Wilson Department of Politics at the University of Virginia,
specializing in the study of intelligence. He previously served as an
analyst with the Congressional Government Accountability Office (GAO)
and, before that, the CIA. Mr. Marrin has written many articles on intelligence, including one profiling CIA's Sherman Kent School and another describing the work of CIA's analysts for the Markle Foundation Task Force on National Security in the Information Age. In 1999 and 2000, he proposed the creation of a "CIA University" to integrate various components of CIA's organization in order to improve the development and dissemination of knowledge to intelligence practitioners. CIA subsequently created its CIA University in 2002. In 2004, the National Journal included Mr. Marrin on a list of the 10 leading US experts on intelligence reform. | |||
Seminar PE4: Reforming the Intelligence Community
February 8, 10:45-11:30 |
|||
Abstract
The practices of the medical profession can provide many ideas for reform of intelligence agency processes. Recent Congressional reforms have emphasized primarily reforms of intelligence community organizational structure. Yet process issues are as important as organizational structure, if not more so. Structure and process work together in a complementary fashion, with processes bridging any gaps that exist in structure. In the end, structural changes such as those recommended by the 9/11 Commission and implemented by Congress will require corresponding changes to existing processes in order to ensure the effective functioning of the intelligence community. Unfortunately, debates over intelligence reform have not focused on the procedural reforms that will be necessary to improve intelligence community performance. This presentation is intended to contribute to the discussion regarding possible procedural reforms by identifying some of the many ideas for intelligence reform that can be found in medical practices. Derived from an article co-authored by Dr. Jonathan Clemente--a practicing physician and expert in the history of medical intelligence--that is due to be published in the International Journal of Intelligence and Counterintelligence later this year, this presentation will outline a number of procedural reforms modeled from medicine that could improve many aspects of intelligence practice including: the prioritization of collection resources; the detection of denial and deception; the accuracy of analysis; and the quality of information flowing from intelligence agencies to national security decision makers. |
Cliff May
|
| ||
Biography | |||
Clifford D. May is the President of the
Foundation for the Defense of Democracies, a policy institute focusing
on terrorism created immediately following the 9/11 attacks on the
United States. He is also the Chairman of the Policy Committee of the Committee on the Present Danger (CPD), an international, non-partisan organization based in Washington D.C. comprised of leading members from the policy community with specific expertise in formulating positions on a range of national security issues. Mr. May has had a long and distinguished career in international relations, journalism, communications and politics. A veteran news reporter, foreign correspondent and editor (at The New York Times and other publications), he has covered stories in more than two dozen countries, including Iran, Pakistan, Sudan, Ethiopia, China, Uzbekistan, Northern Ireland and Russia. He is a frequent guest on national television and radio news programs, providing analysis and participating in debates on national security issues. He writes a weekly column that is nationally distributed by Scripps Howard News Service and he is a regular contributor for National Review Online, CNN's American Morning and National Public Radio's Morning Edition. From 1997 to 2001, he served as the Director of Communications for the Republican National Committee. In that role, he was the Republican Party's staff spokesman, and appeared frequently on national television and radio programs. In addition, he managed all RNC communications activities, including long-range strategic planning; press, radio and television services; online services; TV and radio coaching; speech writing; advertising and marketing. He also served as the Editor of the official Republican magazine, Rising Tide. After leaving the RNC, he was named Senior Managing Director in the Washington, D.C. office of BSMG Worldwide, a firm specializing in public affairs advocacy, public relations and media relations. Prior to coming to the RNC, Mr. May was the Associate Editor of the Rocky Mountain News in Denver, Colorado. While in Colorado, Mr. May hosted a talk radio program on the dominant station in the region, and produced and moderated an interview program on KRMA-TV (a PBS station). In addition, Mr. May served as host/moderator for the weekly, nationally distributed TCI cable television series, Race for the Presidency, which featured "resident analysts" Dick Lamm, Gary Hart and Don Hodel. Before moving to Colorado Mr. May spent nearly a decade with The New York Times as a reporter in both New York and Washington, an editor of The New York Times Sunday Magazine and a foreign correspondent. He established the Times' West Africa bureau and, as Bureau Chief, covered more than a score of African nations. Earlier in his career, Mr. May was the Roving Foreign Correspondent for Hearst newspapers, reporting from a variety of global hotspots. During that same period, Mr. May provided special coverage for CBS Radio News and Bill Moyers' Journal on PBS. Prior to that, Mr. May was Senior Editor of Geo Magazine, and an Associate Editor for international news at Newsweek. He holds masters degrees from both Columbia University's School of Public and International Affairs and its School of Journalism. He earned his BA from Sarah Lawrence College in Bronxville, N.Y. In addition, he holds a certificate in Russian language and literature from the University of Leningrad. | |||
Track 5: Private Sector PS3: Is the Media the IC's Friend or Foe? February 9, 14:00-15:45 |
Gen. Thomas G. McInerney USAF, (Ret)
|
| ||
Biography | |||
In January 2000, Lieutenant General Thomas
McInerney, USAF (Ret.), established his own consulting firm, GRTT
(Government Reform Through Technology). Working with high-tech
companies who do business with federal, state, city and local
governments, GRRT helps them introduce advanced technology into the
public sector. From March 1996, to December 1999, he was Chief Executive Officer and President of Business Executives for National Security (BENS), a national, nonpartisan organization of business and professional leaders, with headquarters in Washington, DC. BENS works to engage the business community in securing America's future with a more efficient defense establishment. In February 2000, General McInerney received a Laurel from Aviation Week and Space Technology magazine for his efforts on behalf of military reform as President of BENS. He has also made numerous appearances on National Television discussing Defense Reform and during global military crises such as Kosovo, EP 3 incident in China and now the War on Terrorism where he is the senior Fox News Military Analysts. Prior to joining BENS, General McInerney was Vice President of Command and Control for Loral Defense Systems-Eagan. He joined Loral (then Unisys Electronic Systems Division) in 1994 following 35 years as a pilot, commander, and Joint Force Commander in the United States Air Force. General McInerney retired from military service as Assistant Vice Chief of Staff of the Air Force and as Director of the Defense Performance Review (DPR), reporting to the Secretary of Defense. In that capacity, he led the Pentagon's "reinventing government" effort, visiting more than 100 leading-edge commercial companies to assimilate their ideas about business re-engineering. The DPR was part of Vice President Gore's National Performance Review on Reinventing Government, which focused on making the government perform better at less cost -- a fundamental BENS objective. After his commissioning as a second lieutenant in 1959, and completion of pilot training in 1960, General McInerney served in numerous key Air Force assignments and had extensive military command and overseas experience. A command pilot with more than 4,500 flying hours, he completed four tours of duty in Vietnam, flight reconnaissance missions during the Cuban missile crisis and air escort missions in the Berlin Corridor. General McInerney earned a bachelor of science degree from the US Military Academy in 1959 and a master's degree in international relations from George Washington University in 1972. He completed Armed Forces Staff College in 1970 and the National War College in 1973. General McInerney is a member of the Board of Directors of Alloy Surfaces Company, KIL Inc. Kilgore Flares Co, LLC, SABA (Federal Advisory Board), Pan American International Academy (Flight Simulators) and Crescent Partnerships. | |||
Moderator Seminar PE1: Trends in Intelligence Technology UAV vs. Satellite February 8, 14:00-15:15 | |||
| |||
Moderator Seminar PE1: Trends in Intelligence Technology Securing Intelligence Networks February 8, 16:15-17:00 |
|||
Richard McPherson
|
![]() | ||
Biography | |||
Mr. McPherson is a retired Submarine Officer
with an extensive background in defense related technologies,
information technology and nuclear energy. He also served on surface
ships and major staffs like CINPACFLT. Later, by invitation after
Chernobyl, he was the United States representative to a six-nation group
at the International Atomic Energy Agency (IAEA) in Vienna, Austria.
From 1993-1997, Mr. McPherson, was Managing Director of GoodSmith &
Co., Incorporated, where he was responsible for carrying out a wide
variety of large ticket financings for the international
investment-banking firm. His involvement in the financing of projects,
major assets, large facilities, installations, acquisitions,
divestitures, and related transactions for the firm's corporate clients
encompassed all aspects of finance and required him to participate
directly in transactions initiation, negotiation, client relations, tax
and financial structuring, due diligence, and closings. Mr. McPherson
developed and participated in dozens of corporate financings, ranging
from $5 million to over $500 million. Mr. McPherson has worked in over
thirty countries. His association with international national security
issues span over four decades. |
|||
Track 2: DOD/Military DM5: Are We Losing our Edge on Technical Collection? February 10 08:15-09:00 | |||
Abstract
In the asymmetric war on terrorism, the enemy hides and attacks while we are in the open and must defend. In this scenario, our "offense" is more of an active defense - we strike when we have actionable intelligence about the enemy. The cost of satellites and current collection methods is already high, and getting much higher. From what is basically a reactive stance, two things limit our ability to succeed: 1) quality of the intelligence collected, and 2) the ability to take action intelligence a timely manner. Current technical collection systems were not designed to address a highly decentralized and distributed foe. Worse yet is how current information systems act on collected information. They are too slow to react and adapt. These shortcomings will be discussed. Additionally, a completely novel and mature solution to these shortcomings will be presented. A solution capable of taking advantage of open source information and other structured and unstructured data from collection sources at the same time. |
Ken Meyer
|
| ||
Biography | |||
Kenneth (Ken) Meyer is a Distinguished
Graduate of the Monterey Defense Language Institute's 37 week
Intermediate Hungarian and 47 week Basic Hungarian courses. Ken worked
on the Hungarian Language Team in A-Group at the National Security
Agency 1976 - 1981. While stationed at NSA, Ken also performed airborne
linguist duties with the 6948 Security Service Squadron Det 1. Mobile.
After leaving NSA, Captain Meyer taught Air Weapons Director/Controller
training courses, provided air defense services to the Republic of
Korea, and taught international relations & national security
courses at the University of Maryland - College Park. At the end of his
Air Force service he served as a Special Projects Test Commander and
Director Foreign Electronic Combat with the Air Force Flight Test
Center.
Today, Ken is the Instructional Program Manager for Computer Science
at Florida Community College at Jacksonville. Also, he is the President
of the North Florida Chapter of the Association of Former Intelligence
Officers. Ken holds Masters degrees from the University of Southern
California and Jacksonville University, a Bachelors from the University
of Maryland, and an Associates in Interpreting and Translating -
Hungarian - from the Community College of the Air Force. | |||
Seminar PE5: Finding and Keeping Intelligence Specialists Translators February 8, 15:00-16:45 | |||
Translators
Abstract A call for a National Translation Service - based roughly on the Americorps model combined with some Reserve or Guard parts. The real goal is to leverage the massive dollars spent training linguists at the Defense Language Institute and those non-DOD type linguists that can serve their country this way. |
Dr. James Arnold Miller
|
| ||
Biography | |||
Dr. Miller prepares four regular unclassified
threat reports that are widely disseminated electronically in the
intelligence and public safety communities: (1) Terrorism Open Source
Intelligence Report, (2) Terrorism Literature Report, (3) Warning
Intelligence on the Internet Review, and (4) Regional and Country Watch
List. For twenty-six years Dr. Miller and his firm Interaction Systems
Incorporated have been preparing unclassified reports and organizing
conferences on global threat topics. Earlier he served for a decade in
the U.S. Air Force including in the Office of Special Investigations as a
criminal investigations and counterintelligence officer, detachment
commander (including in Vietnam), and a terrorism analyst. His doctoral
dissertation presented from an intelligence officer's perspective a
methodology for analyzing terrorist, insurgent, and other political
violence movements. Dr. Miller is a member of the board of directors of
the National Military Intelligence Association.
| |||
Plenary Session PL2: Open Source Intelligence and 21st Century Threats February 10, 16:00-16:45 | |||
Abstract
The recently approved intelligence reform legislation requires the Director of National Intelligence (DNI) to ensure that the intelligence community makes efficient and effective use of open source information and analysis. This special plenary presentation will address how anyone in the traditional intelligence community - or in the public safety community or companies - can systematically locate, select, organize, retrieve, analyze, and disseminate useful open source intelligence (OSINT). The speaker will emphasize how to "separate the wheat from the chaff," especially concerning the torrents of information besieging analysts on such pressing 21st century threats as weapons of mass destruction, terrorism, and insurgency. Also in the new reform bill is the sense of Congress that the DNI should establish an intelligence center to coordinate collection, analysis, production, and dissemination of OSINT. The speaker will address whether such a center is necessary, and if so, how it might function to significantly improve the use of OSINT with regard to major threats. Also to be discussed is how electronically networked experts in the private sector could collaborate to substantially supplement secret and proprietary intelligence through such activities as building unclassified foundation databases on major threat topics; conducting alternative analysis; and providing strategic warning on global threats. |
Gen. Kenneth Minihan USAF, (Ret)
|
| ||
Biography | |||
Lieutenant General Ken Minihan retired from
the U. S. Air Force on June 1,1999, after more than 33 years of active
commissioned service to the nation. On his final tour of duty he served
as the 14th Director of the National Security Agency/Central Security
Service, a combat support agency of the Department of Defense with
military and civilian personnel stationed worldwide. As Director, he was
the senior uniformed intelligence officer in the Department of Defense.
He has also served as the Director of the Defense Intelligence Agency.
He has over thirty years experience in national, defense and military
information services, information technology development and diverse
customer support services. Lieutenant General Ken Minihan has vast experience in large complex global and national information operations, information technology deployment, and customer requirement satisfaction. While the Director of NSA, he helped conceive and provide strategic direction to the National Information Assurance Program. He also created strategic approaches and development concepts for emerging telecommunications technology while redesigning core business skills and efficient operations. He has the unique ability to integrate complex programs and business operations allowing the organization to focus on cost and schedule goals. Lieutenant General Ken Minihan has gained exceptional recognition for outstanding performance for organizations he has directed for over a long history. He organized and executed multinational global operations for information services and implemented core business metrics and a strong commitment to teamwork. He led NSA to recognition as a Baldridge and Presidential Quality Award finalist. He has a history of exceeding contract goals while producing breakout technologies and re-engineered operations. Lieutenant General Ken Minihan created strategic approaches to exploit and secure modern network technologies, reshaped multinational operations and reconstructed business products and services. His innovative design solutions helped maintain a competitive advantage in a high charged global market. Products and services were provided in time to make a difference. He has the distinct ability to recruit and communicate with the work force throughout the organization. Lieutenant General Ken Minihan is a Principal in the Paladin Capital Group Homeland Security Fund and is President of the Security Affairs Support Association in Washington DC, the flagship organization for industry and government partnership to enhance intelligence business development. He is also a member of the Air Force Association, the National Military Intelligence Association, and several other national organizations. He often serves on government pro bono committees and panels to examine ways to enhance homeland and national security capabilities. Lieutenant General Ken Minihan has a Baccalaureate Degree from Florida State University, a Masters Degree from the Naval Postgraduate School, and has completed executive development programs at the University of Illinois and Harvard University. Among his awards and decorations are the National Security Medal, the Defense Distinguished Service Medal, the Bronze Star, and the National Intelligence Distinguished Service Medal. | |||
Seminar PE1: Trends in Intelligence Technology
February 8, 10:50-11:30 |
|||
Technology Challenges, Intelligence and the 21st Century
Abstract We must come to grips with the inevitable fading of US technological superiority in an increasingly dangerous and sophisticated global economy. That global economy and its dispersed network has become the "tool of the weak" where groups with limited resources and less sophisticated capabilities can compete or even outmatch American capabilities. Technology advances in our intelligence community have not kept pace with the more diverse, unconventional (and non-static) threat. Nor have we produced technology solutions with the attributes of full spectrum attack; horizontal and vertical integration; assessments of effects achieved vice targets attrited; and, a comprehensive understanding of our adversary (moral, mental and physical domains). We must structure our technology investment strategy against our hardest problems of transnational terrorism, homeland security, participation in military operations and indications and warning to prevent surprise. Because of the inherently unpredictable effects of major technological changes in the coming decade and the potential synergies across emerging technological sectors, it is critical for US intelligence that American industry lead the development of next-generation intelligence technology to regain lost superiority. Waiting for another disaster to point out our shortcomings and generate programmatic responses is not a strategy. |
Yehoshuah Mizrachi
|
| ||
Biography | |||
Yehoshuah Mizrachi is the founder and Program
Director of Operation Shiloh - the Israeli Counter-Terrorism Training
for American Civilians (http://www.opshiloh.com). In January 2002 Mr. Mizrachi was yards away from a homicide bombing in downtown Jerusalem. Reflecting upon this experience, Mr. Mizrachi recognized that Israeli citizens have a well-rehearsed, almost instinctive reaction to terror attacks. This collective knowledge base regarding prevention of, and response to, mass casualty terror attacks have been gleaned over the last 80 years of hard and bloody experience. In light of the fact that such attacks are likely to recur in the US, he recognized the need for an Israeli-based curriculum designed for American civilians that teaches terror prevention and response techniques appropriate for civilians at large. The result was the OpShiloh training doctrine. For almost a year, Mr. Mizrachi developed the OpShiloh curriculum, working closely with the IDF. The first group of American trainees came through the course in July 2003. In July 2004, OpShiloh announced the development of a modified US-based training curriculum. Mr. Mizrachi holds a BA from Georgetown University. | |||
Seminar PE8: Getting the Public Involved
February 8, 15:00-15:45 | |||
Civilians: America's Secret Weapon in Homeland Defense
Abstract Intelligence estimates indicate that additional mass casualty terror attacks like 9/11 are very likely on American soil, and perhaps soon. Additionally, there have been hundreds of documented hostile surveillance incidents against Jewish and Christian soft targets around the US. Aside from confusing pronouncements warning American citizens to 'be especially alert' while simultaneously warning them go about their normal routines, there is very little tangible information available to American citizens as to how - precisely - to be 'alert.' In the absence of guidance, the public seems to vacillate between complacency on the on hand and hysteria on the other. Yet between these extremes lies the golden mean - realistic threat assessment and response. This presentation will explore what practical options exist for citizens; whether is there a role for citizens in homeland defense; and how citizen programs integrate into the broader homeland defense schema. Presentation to be followed by question and answer session. |
Ray Musser
|
| ||
Biography | |||
Raymond H. Musser has over 30 years of
experience in security and law enforcement matters. He currently directs
global security operations for General Dynamics Corporation. As part of his duties he established the company's Global Incident Response Center which links 16 separate business units for reporting and emergency assistance anywhere in the world. This Center has become a model in the security industry. Mr. Musser has had extensive experience in security planning and programs abroad, particularly in the Southwest Asia region. He is a Certified Protection Professional credentialed by ASIS international. He is co-chairman of the ASIS Military Liaison Council. He also serves as an industry member of the National Industrial Security Program Policy Advisory Committee. | |||
Track 4: Business BN5: Industry and FBI Partnership for Counterintelligence February 10, 08:15-09:00 | |||
|
Dame Pauline Neville-Jones
|
| ||
Biography | |||
Dame Pauline Neville-Jones is Chairman of
QinetiQ Group plc, a defence technology company with government
customers in the UK and USA and Chairman of the Information Assurance
Advisory Council (IAAC). From 1998- 2004 she was the International
Governor of the BBC with responsibility, among other things, for
external broadcasting, notably the BBC World Service (radio and online)
and BBC World (television). Prior to that, she was a career member of the British Diplomatic Service serving, among other places, in Singapore, Washington DC, the European Commission in Brussels and Bonn. She was a foreign affairs adviser to Prime Minister John Major, chairman of the Joint Intelligence Committee in Whitehall (1991- 1994) and, as Political Director in the Foreign and Commonwealth Office, leader of the British delegation to the Dayton peace conference on Bosnia in 1995. | |||
Seminar PE6: View from Abroad Britain February 8, 09:00-10:35 |
|||
Abstract Nature of threats (WMD, terrorism, crime non state actors) has dramatically increased the centrality of the role to be played for the foreseeable future by intelligence in policy making and operations. It is much more difficult than in the past to distinguish between strategic and operational intelligence and arguably unhelpful to do so as it is the purpose to which intelligence is applied that matters. But the big picture is in danger of being forced out/ignored by focus on day-to-day developments and operations. Absence of context and underlying analysis of the drivers and implications of an emerging big picture can lead to unforced errors of policy, which cumulatively, can be dangerous. Strategic assessment, which brings together open source as well as secret source information, remains as important as ever. Is it currently getting the resources or the attention it deserves either from the intelligence community or the policy maker? The difficulty of understanding what is going on makes this task more, not less important. Robustness of the intelligence assessment is an issue. How easy does the intelligence community make it for the busy policy maker to crack the professional code which indicates the degree of confidence to be attached to a given interpretation or judgment? How influenced is the policy maker by preconceived ideas or policy goals? Is the dialogue between the two sufficient or frank enough? How close should the intelligence community and the policy maker be to each other? When it comes to operations, is the whole community of users being properly catered for? Channels for the flow of intelligence for military use are well organized and understood. But in an age of network global criminality with a capacity for surprise and potentially devastating direct action against civilian populations, there is an additional vast range of civilian agencies and users with an operational need to know. Getting this right is a huge challenge and there is some way to go. International cooperation seems a natural response to global threats. But how much can we expect from it? |
|||
Keynote Address KA1: A look at the special relationship: policy and intelligence. February 9, 09:15-10:00 |
Dr. Walid Phares
|
| ||
Biography | |||
Dr. Walid Phares is a professor of Conflict
and Middle East Studies at Florida Atlantic University and is now a
Senior Fellow with the Foundation for the Defense of Democracies in
Washington. He is the Terrorism Expert with the Family Security Matters
based in New York. Phares served as an Expert on Jihadism and Terrorism
for the US Department of Justice and for the Dutch Government in
2002-2003. He has produced a master video presentation for US security
agencies on "Profile of the Terrorists" in 2001. He is a Terrorism
Analyst with NBC-MSNBC, and appears on Fox News, CNN, BBC, al Hurra and
other networks around the world. Phares is a regular expert with many
national and international radio programs. Phares published eight books on Middle East Conflicts including: the Iranian Islamic Revolution, Lebanon war, minorities and Islamic Fundamentalism. He has published many scholarly articles and hundreds of op eds in the international press including the Wall Street Journal, Washington Times, al Nahar, etc. His upcoming book for 2005 will analyze the strategies of the Jihadists worldwide. He holds degrees in law and political science from Saint Joseph University and the Lebanese University in Beirut, a Masters in international law from the Universite de Lyons in France and a Ph.D. in international relations and strategic studies from the University of Miami. | |||
Seminar PE6: View from Abroad Middle East February 8, 16:00-16:30 | |||
Middle East
Abstract | |||
Track 5: Private Sector PS4: Intelligence & Civil Society February 9, 15:10-15:45 |
|||
Intelligence & Civil Society Abstract |
|||
Track 5: Private Sector PS6: Dialoguing with Ethnic and Religious Organizations February 10, 10:15-11:00 |
|||
Dialoguing with Ethnic and Religious Organizations Abstract |
|||
Track 5: Private Sector PS7: Academia: Terrorist Battleground? February 10, 14:00-14:45 |
|||
Academia: Terrorist Battleground? Abstract |
Steve Pomerantz
|
| ||
Biography | |||
Mr. Pomerantz currently operates Steve L.
Pomerantz & Associates, a consulting firm located in Annandale, VA
specializing in security and criminal justice related matters. He also
serves as the Executive Vice-President of the Institute For The Study of
Terrorism and Political Violence, a non-profit international
organization located in Washington, DC. Mr. Pomerantz retired from the
FBI in June 1995 after a career spanning twenty-seven years. During that
time period he rose from a field investigative Special Agent to the
rank of Assistant Deputy Director. Mr. Pomerantz served as a Special
Agent in the Mobile. Alabama, and Detroit, Michigan field offices
between 1968 and 1976. | |||
Seminar PE7: Sharing Intelligence, Part 2 February 8, 14:00-16:45 Track3: State and Local Law Enforcement SL6: Terrorism Task Forces: Band-aid or Solution? February 10, 10:15-11:00 Track 1: Federal Civilian FD7: Inter-Agency Task Forces February 10, 14:00-14:45 |
|||
Stephen Price-Francis
|
| ||
Biography | |||
Stephen Price-Francis is Vice President,
Business Development of LaserCard Corporation, of Mountain View,
California, the world leader in Optical Memory Card technology. In this
role, he has been directly involved in the development and
implementation of the largest secure government multiple biometric ID
card program in North America which is based on the U.S. "Green Card",
the Mexican Border Crossing Card (or "LaserVisa"), and the Canadian
Permanent Resident Card. Price-Francis is a director of the North American Secure Products Organization and a founding director and past president of the Advanced Card Technology Association of Canada. He is active in the development of international standards for optical cards, biometrics and travel documents and is the inventor of a patented identity verification process. He is a regular contributor to industry conferences and publications. | |||
Seminar PE1: Trends in Intelligence Technology - Trends in Biometrics: Future & Past
February 8, 09:45-10:45 |
|||
LaserCard Optical Memory Card in U.S. and Other Government Programs
Abstract LaserCard optical memory card is the most widely used secure, biometric-based ID technology in the U.S. Homeland Security market. In North America as a whole, more than 20 million people in the U.S.A., Canada and Mexico have been issued an optical memory card for border crossing and residency applications. As a result, the NAFTA region boasts the largest Homeland Security biometric ID card population in the world with no known case of the optical card's security having been compromised. The governments of Italy and Saudi Arabia have also demanded the security of optical memory card for their national ID programs, which play a key role in their Homeland Security, and both have added an IC chip to the card for e-government applications. Optical memory card is specified for these Homeland Security applications based on three key characteristics which are unequalled by any other card technology - security, durability, and high data storage capacity. In addition, a full suite of international standards defines methods for the transportability of data (such as biometric images of face and fingerprints) and interoperability of cards and reading systems between countries. The more than 1,000 LaserCard optical memory inspection systems purchased by the U.S. Department of Homeland Security, and its Canadian equivalent, comply with these standards and are fully capable of authenticating and reading any other nation's ICAO-compliant optical card. This complete border security system is fully functional, available today and proven in the field. Just such a system could be assisting with Homeland Security issues immediately in strife-torn areas, such as Iraq. It is impossible to fraudulently alter data stored on an optical memory card and there is no known incidence of a working optical card's having been counterfeited. Thus undesirables would have no opportunity to penetrate the security perimeter, such as that surrounding the "Green Zone" in Baghdad or Armed Forces bases, either by creating a counterfeit card or by impersonating the legitimate holder of an authentic card. Future trends: Several nations have acknowledged the fundamental security provided by optical memory in the Homeland Security environment. Now, increasingly, we will see the requirement to couple this key security strength with the convenience of RFID, especially at land borders where volume of border crossers is high. In this scenario, the RFID can "pre-notify" the inspection system of the arrival of the cardholder, so that watch list checks can be carried out, in the background, prior to the final card authentication and ID verification processes. Also, we are seeing the emergence of a requirement to achieve transportability of biometrics across national and system boundaries. It is generally acknowledged that the most effective way of achieving this is by carrying original images of face, fingerprints, irises, etc, on the ID card. The only card technology available to deliver on this requirement, without compromising on resolution and therefore accuracy, is optical memory card. |
Walter Purdy
|
| ||
Biography | |||
Walter Purdy has developed and directed the training of law
enforcement officers in areas such as Law Enforcement Response to
Terrorism, Responding to WMD Incidents, Critical Incidents-Command and
Control, Counter-terrorism Techniques Advanced SWAT Techniques, and
Lessons Learned from Terrorism over Twenty Five Years. Mr. Purdy has
undertaken a number of special projects and research projects and has
supported efforts by the U.S. State Department, U.S. Department of
Justice and the IACP. Mr. Purdy received a Bachelor's Degree and did
graduate work at George Mason University. He later obtained a Law degree
from Thomas Cooley School of Law in Lansing, Michigan. Mr. Purdy has
served in the United States Marine Corp. Mr. Purdy has traveled
extensively to include the Middle East, and Asia.
|
|||
Track 3: State and Local Law Enforcement SL1: Profiling Terrorists Among Us February 9, 08:15-09:00 | |||
|
Harold Rhode
|
| ||
Biography | |||
Harold Rhode is the Foreign Policy Assistant
to the Director of Net Assessment, a position he has held since 1994. He
specializes in Middle Eastern and Islamic affairs. Mr. Rhode has spent past 22 years working in OSD in various Middle Eastern and Islamic-oriented capacities. He also spent the first three months of the Iraq war and the aftermath with ORHA/CPA. He graduated from Columbia University with a Ph.D. in Middle Eastern History in 1979. Rhode also studied in universities in Israel, Egypt, and Iran, and has traveled extensively in throughout the Middle East. | |||
Moderator Seminar PE4: Reforming the Intelligence Community February 8, 14:00-16:45 |
The Rev. Canon Keith Roderick, D.D.
|
| ||
Biography | |||
An Episcopal priest, Father Keith Roderick was a
Cold War human rights activist on behalf of Soviet citizens facing
religious persecution under Communist rule. A chance encounter with an
Egyptian Muslim who faced death threats upon converting to Christianity
awakened Roderick to the problem of religious persecution in the Muslim
world. He now serves as Christian Solidarity International's
Representative in Washington, D.C. Christian Solidarity International
(CSI) is a Christian human rights organization for religious liberty
helping victims of religious repression, victimized children and victims
of disaster. It is based in Zurich, Switzerland but has office in
several countries, including the U.S. www.csi-usa.org
Father Roderick has served as Secretary General of the Coalition for the Defense of Human Rights (CDHR) since 1993. The Coalition is a consortium of over fifty-five organizations working together to champion the rights of minorities living in Islamic countries. Its primary focus is the condition of religious minorities living in Islamic countries. Members of the Coalition include Catholics, Protestants, Orthodox Christians, Jews, Hindus, Muslims, Assyrians, Armenians, Bahai, Copts, Lebanese, Indonesians, Iranians, Pakistanis, Indians, Sudanese, Nigerians, and others. Father Roderick has testified to the Senate and House of Representatives on the issue of religious freedom and human rights concerns of non-Muslim minorities in Islamic countries. www.dhimmi.com He is an Episcopal priest of the Diocese of Quincy, serving as the only Canon for Persecuted Christians in the Episcopal Church. Father Roderick also serves as Executive Director of the Sudan Campaign and was one of the organizers of daily demonstrations at the Sudan embassy in protest of slavery and genocide in Sudan in 2004. Father Roderick and his wife, Mary Beth, have six children, Seth, Micah, Noah, Sarah, Joseph and Susannah. Formerly he was the Director of Spoon River College in Macomb, Illinois and taught religion and philosophy for fifteen years. He founded the Society of St. Stephen in 1982 that worked on behalf of religious prisoners of conscience and their families in the former Soviet Union. He served as the Co-Director of the International Task Force, formerly The Task Force on Soviet Jewry. Education 1996 - Doctor of Divinity, Faith Theological Seminary, Gujranwala, Pakistan 1986 - Certificate for Post-Graduate Studies, Nashotah House, Delafield, WI 1980 - Master of Divinity, University of Dubuque Theological Seminary, Dubuque, IA 1976 - Bachelor of Arts, University of Illinois - Springfield, Springfield, IL | |||
Track 5: Private Sector PS6: Dialoguing with Ethnic and Religious Organizations February 10, 10:15-11:00 | |||
|
Hon. Dutch Ruppersberger
|
![]() | ||
Biography | |||
Congressman Dutch Ruppersberger is serving his first term in the
United States House of Representatives representing the citizens of
Maryland's 2nd District. Congressman Ruppersberger is known as a
consensus builder who works with Members from both sides of the aisle to
get results for Maryland and the nation. In what Congressional Quarterly called "a coup", Congressman Ruppersberger was the first Democratic freshman ever to be appointed to the powerful House Select Committee on Intelligence. The committee oversees the collection and analysis of intelligence information from all around the world to ensure our national security and prevent potential crisis situations - especially terrorist activity. Congressman Ruppersberger was hand-picked by the Democratic Leadership and named an Assistant Whip. In this prestigious position he meets regularly with the House leadership to help set legislative priorities and to ensure the passage of key measures. Congressman Ruppersberger serves on the Government Reform Committee, the investigative arm of Congress, where he works to prevent government fraud and waste and to craft reforms to improve the efficiency and effectiveness of government programs. The Congressman was also elected by his freshman Democratic peers to represent them on the Democratic Steering and Policy Committee. Congressman Ruppersberger is working hard in Washington to create jobs and rebuild our economy in Maryland and across the country. He is dedicated to improving healthcare for everyone and helping seniors by providing them with quality, affordable and accessible healthcare and prescription drugs. The Congressman considers one of his highest priorities to improve the security of our homeland and get our first responders the money they need to protect our communities and our families. Maryland's 2nd District includes parts of Baltimore City, Baltimore County, Anne Arundel County and Harford County. It is a vital center of trade and commerce for the state and national economy as it includes Baltimore-Washington International Airport, the Port of Baltimore and thousands of businesses and manufacturing concerns dependent on these international gateways. The 2nd is also home to the National Security Agency, Fort Meade, Aberdeen Proving Grounds, and other installations essential to the country's national security. Congressman Ruppersberger has spent the last 17 years serving his community as an elected official. Before being elected to the 100th Congress, he was the Baltimore County Executive from 1994 to 2002. Under his leadership, Baltimore County was named one of the nation's four best-managed counties by Governing Magazine in 2001 and is still one of only 19 counties nationally which continue to receive a triple-A bond rating from all three of the country's bond rating agencies. Prior to serving as County Executive, Congressman Ruppersberger served nine years on the Baltimore County Council and was twice elected as council chairman. Congressman Ruppersberger chose a political career after a near-fatal car accident in 1975 while investigating a drug trafficking case as a State's Attorney. With luck and the dedication of doctors at the University of Maryland's renowned Shock Trauma center, he survived. After recovering the young investigative prosecutor decided to run for public office to help others and to repay Shock Trauma for saving his life. Today, he remains an active supporter of the hospital, serving as Vice Chairman of the hospital's Board of Visitors. A native of Baltimore City, Congressman Ruppersberger spent his summers as a lifeguard in Ocean City. He attended Baltimore City College and the University of Maryland at College Park, where he played varsity lacrosse. He earned his Juris Doctorate from the University Of Baltimore Law School. | |||
Seminar PE5: Finding and Keeping Intelligence Specialists - Training
February 8, 14:00-14:45 |
Ken Sawka
|
| ||
Biography | |||
Kenneth Sawka is a principal at Outward
Insights, a leading competitive intelligence and strategy consulting
firm. There, he counsels senior executives at leading companies on how
to use intelligence to set business strategies. Mr. Sawka has 20 years
experience in government and private sector intelligence, including
serving eight years as an analyst at CIA. Ken has been quoted
extensively on matters of competitive strategy and intelligence in Time,
Investors Business Daily, American Banker, and other prominent
journals. He is a member of the Society of Competitive Intelligence
Professionals and served on the Society's Board of Directors.
| |||
Track 4: Business BN1: What Government and Business Intelligence Pros Can Learn From Each Other February 9, 08:15-09:00 | |||
What Government and Business Intelligence Pros Can Learn From Each Other
Abstract Conventional wisdom presumes that government intelligence professionals are more advanced than their corporate peers in the sophistication of their techniques and deliverables. In recent years, however, business intelligence practitioners have become arguably more skilled in areas such as developing innovative analytic techniques, delivering intelligence tailored to decisionmakers' needs, and in building closer relationships with corporate intelligence consumers. In this presentation, two professionals who work to help both business and government intelligence professionals improve their analytic skills will discuss the areas in which business and government intelligence can learn from each other, and propose ways in which this exchange of ideas should take place. |
Michael Scheuer
|
| ||
Biography | |||
Michael Scheuer, former chief of the
Counterterrorist Center's Bin Laden unit, resigned from the CIA in
November 2004 after 22 years of federal service devoted to national
security issues related to South Asia and Islamic extremism. Because of
the CIA's pre-publication requirements, he anonymously wrote the New
York Times and Washington Post bestseller Imperial Hubris: Why the West
Is Losing the War on Terror and Through Our Enemies' Eyes: Osama bin
Laden, Radical Islam, and the Future of America. He has been featured on
many national and international news programs and interviews for
broadcast media and documentaries, as well as in print media worldwide.
| |||
Seminar PE4: Reforming the Intelligence Community
February 8, 14:00-16:45 | |||
| |||
Track 1: Federal Civilian FD5: Reforming Covert Operations February 10, 08:15-09:00 |
|||
Ray Shanley
|
| ||
Biography | |||
Ray Shanley, Senior Architect with Identity
Systems (formerly known as Search Software America) has over 20 years
experience in enterprise software development. As a Senior Architect
with Identity Systems, Ray has extensive experience working with
organizations in the law enforcement, judicial and intelligence
communities requiring expertise focusing on the use of identity data to
search, match and link records in critical data applications.
| |||
Seminar PE1: Trends in Intelligence Technology Search Software & Intelligence Software February 8, 16:15-17:00 |
|||
Search Software & Intelligence Software Abstract - Using identity data to search databases quickly and accurately every time - The complexities associated with the often overlooked and underestimated problem space of searching and matching data systems using names and address. - How identity data differs from other kinds of data and considerations needed when approaching this type of data - Common reasons why systems have problems finding, grouping and linking identity records and how to overcome and improve the failure rate - New approaches that are proven to work on both US and multinational/international data - How searching on text and alphanumeric identity data can complement biometric applications - Identity data is not only for people but addresses and items that will not have biometric data available. The future will require both biometric and trustworthy text and alphanumeric searching and matching capabilities. |
Eric Shawn
|
![]() | ||
Biography | |||
Eric Shawn, a New York based senior
correspondent for FOX News Channel, joined the network from FOX's
affiliate news service, FOX News Edge. He has covered a number of breaking news stories for FNC, including the Indian and Pakistani nuclear warfare threats, the death of Princess Diana, the Iraqi standoff with the U.N., Louise Woodward Nanny trial and the Martha Moxley murder investigation. As a senior correspondent for FOX News Edge, Shawn covered the Unabomber arrest, the Persian Gulf War and the 1992 Clinton campaign. He also provided daily reports for the 1995 murder trial of O.J. Simpson direct from the courthouse in Los Angeles. Prior to his stint at FOX News Edge, Shawn was a reporter for WNYW-TV (FOX) in New York. He graduated from Georgetown University with a degree in Urban Studies. | |||
Seminar PE8: Getting the Public Involved Role of the Media February 8, 09:50-10:35 |
Izhar Shay
|
| ||
Biography | |||
Mr. Shay has more than 20 years of experience
in management, business and technical positions. He was the Co-Founder
and CEO of Business Layers, the company that pioneered the eProvisioning
space. Izhar holds a B.Sc. in Electronics Engineering from the Technion
Institute, in Haifa, Israel.
| |||
Seminar PE1: Trends in Intelligence Technology Securing Intelligence Networks February 8, 09:00-09:40 |
|||
Securing Intelligence Networks
Abstract More than 80% of companies connected to the Internet experience a disruption in business due to a worm or virus, with 40% of these respondents also experiencing at least one denial of service attack. V-Secure suggests a panel, which will address Cyber Threats and the way to deal with them through global cooperation between governments, vendors and service providers. - Cyber Security has become a global concern - Cyber threats are a major concern for government and commercial organizations alike - Possible damages include, financial, reputation, image, breach of commercial confidential information, and national security - Attending to these concerns requires cooperation between vendors and policy makers - Appropriate strategy towards protection against cyber threats requires planning, cooperation between various constituents, regulation, enforcement and technology innovation - Appropriate protection means still letting the "good guys" in, enabling global connectivity, but properly protecting against cyber attacks - The layered approach towards security - a concerted effort in various parts of the infrastructure, including appropriate organizational policies, structure and enforcement. |
Katherine M. Shelfer, PhD.
|
| ||
Biography | |||
Katherine M. Shelfer, PhD.(www.biodemographics.org) developed and currently directs the Competitive Intelligence Certificate Program at Drexel University (www.drexel.edu).
Her teaching interests include business research, strategic knowledge
management, competitive intelligence and software/systems design and
development. Her research and consulting activities focus on smartcard
systems; the strategic acquisition and use of biometric, demographic and
biodemographic data in a wide range of contexts; and the creation and
use of reality-based scenarios for use in strategic analysis.
Examples of her work have appeared in Advances in Computer Science,
Communications of the ACM, the Defense Intelligence Journal, Information
Outlook, Foundations of Data Mining, JASIST and Knowledge Management
for the Information Professional. A Fellow of the Society of Competitive
Intelligence Professionals and a founding member of the Women's
Leadership Council, she also serves on the editorial board of the
Journal of Competitive Intelligence and Management.
| |||
Track 4: Business BN3: Improving the Interpretive Value of Demographic Data February 9, 14:00-14:45 |
Col. Oded Shoham, IDF (Res.)
|
| ||
Biography | |||
Col. Oded Shoham (IDF - Israel Defense Forces,
Res.), has been intensely involved in intelligence and security
activities over the past 30 years. An expert System & Electronics Engineer, a summa cum laude graduate, Col. Shoham is the former head of the Technological Research, Development and Implementation Center of the Israel Defense Forces' Intelligence Corps. During his 25-year military service Col. Shoham accumulated wide-ranging expertise and experience, encompassing the design and development of complex, large-scale, innovative technological systems designed to meet specific intelligence and security requirements, from the initial stage of analyzing and determining the field requirements, through system planning, concept design, development and implementation, to system installation, provision of long-term maintenance and subsequently - technological upgrading to meet evolving intelligence and security needs. In many cases, Col. Shoham was entrusted with the task of developing unique, creative technological solutions in order to provide suitable responses to specific problems. Throughout his career, Col. Shoham has successfully executed numerous highly sophisticated projects and has implemented pioneering programs of major significance, for governmental and private organizations in the US, Europe and Israel. After retiring from the Israel Defense Forces, Col. Shoham joined a private firm specializing in network security solutions, as its General Manager. In his current position as the CEO of ICTS Technologies, Col. Shoham continues to lead the development and management of advanced technological solutions for the homeland security market. ICTS Technologies, develops state-of-the-art technological products that combine the company's significant technological capabilities with its extensive expertise and international experience in security operations worldwide, spanning a period of more than two decades. | |||
Seminar PE1: Trends in Intelligence Technology Technology Aiding Intelligence Collection February 8, 15:20-16:10 |
|||
Technology Aiding Intelligence Collection
Abstract Accurate, reliable and detailed intelligence is a crucial to security operations on local and national levels, yet is extremely difficult to obtain. It is the product of a structured methodology that includes the collection of raw information, its processing and analysis, decision making based on the analysis, distribution to a defined list of recipients, and storage in databases in a determined format. Since the events of 9/11, terror threats have escalated as never before. Recent intelligence points to declared targets that include public transportation and facilities at which large-scale events are held (stadiums, for example), where the human toll resulting from an attack would be extremely high, and the effect on public morale severe. In order to substantially decrease the probability of several types of attack and thus reduce security risks, it is essential to perform effective security processing of the relevant population (travelers, spectators, visitors, etc.) – concerning whom very little or no advance information is available – before they enter the facility or board aircraft or trains. By implementing the structured methodology described above on the one hand, and enhancing each of its stages in terms of accuracy and speed on the other hand, we can obtain high quality results: Information concerning a random population may be gathered in several ways – collecting the basic information by employing extremely accurate automated document reading technologies; through the examination of appearance and behavior by trained security agents, advanced biometric processing and more. The collected information may be processed and analyzed using sophisticated, high-performance positive rule engines; the analysis results are then transferred to decision makers, allowing them to arrive at well-based conclusions. Intelligence is distributed on a need-to-know basis (to security agents, command and control centers, emergency forces, etc.). The data is also used to update existing databases and where relevant – to construct new ones, enabling efficient retrieval in the future. In the case of surveillance systems, the information may be gathered through use of innovative sensors such as passive electro-optic sensors, super-resolution cameras and more that will enable the system to detect intruders or any unauthorized activity both within the perimeter area as well as at a predefined distance from it. The information gathered by the sensors may be integrated into the Command and Control system, and some images may also be displayed in 3D. Security forces are thus provided with additional time to effectively respond to the threat and take appropriate action. |
Michael Shrimpton
|
| ||
Biography | |||
Michael Shrimpton is a barrister specializing in national security
and intelligence law, practising in the UK. He was called to the
English Bar by Gray’s Inn in 1983 and appointed to part-time judicial
office as a Chairman of the Immigration Appeal Tribunal in 1992. A
British neoconservative, he was a Parliamentary candidate for the Labour
Party in the 1980s but moved to the Conservative Party in the 1990s. A
prominent Eurosceptic who has called for UK withdrawal from the
European Union and a UKUSA free trade area to match the NATO &
intelligence relationship, he was formerly Co-Chairman of the Bruges
Group (Hon. President Lady Margaret Thatcher). He is believed to be close to the Bush Administration and the British, American and Israeli intelligence communities. He visited the West Bank, Israeli/Lebanon frontier and Jerusalem in 2003, when he was present at a counter-terrorist briefing given by a senior officer of the Mossad. His contacts include former Directors of the CIA, the Mossad, MI5 and the UK Defence Intelligence Staff. Michael Shrimpton met with General Pinochet in London in 1999 and negotiated the national security aspects of the Pinochet case with inter alia the late one-time CIA Deputy Director, Lt-Gen Vernon Walters. His clients have included officers/retired officers of the NSA, CIA and Mossad. He specializes in counter-terrorism, counter-intelligence, assassination deconstruction and counter-proliferation and has negotiated the recovery of weapons-grade fissile material. He has given briefings on national security matters to staffers on the Joint Congressional Inquiry into 9-11, the Senate Select Committee on Intelligence and former UNSCOM inspectors. He has been prominent in calling for detailed investigation into the 2003 assassination of former UNSCOM inspector Dr. David Kelly CMG. Michael Shrimpton is a member of the Royal Institute of International Affairs (Chatham House), the Royal United Services Institute (RUSI), the UK Defence and Security Forum, the European-Atlantic Group, the Military Commentators Circle and the US Naval Institute. He is a Fellow of the Atlantic Council of the United Kingdom. His publications record includes articles in the London Times and the Journal of International Security Affairs and he has made numerous media appearances, including on the BBC and CNN. | |||
Seminar PE2: Political, Policy and Legal Issues February 8, 14:00-16:45 | |||
POLITICO-LEGAL ISSUES ARISIN FROM THE WAR ON TERROR
Abstract (1) GUANTANAMO BAY The detention of unlawful combatants at Guantanamo Bay USMC facility fully justified, under the Laws of War, and applicable federal and military law. Neither Al Qaeda nor the Taliban conducted operations in accordance with the Laws of War and their prisoners forfeit any claim to POW status under Geneva Convention III. Reciprocity principle considered. They are not 'detained without trial' – prisoners in time of war are not tried, save for specific war crimes. We should have greater confidence in military justice and reject grandstanding criticisms from within the military justice community. National Security lawyers need to get out there and explain the issues to the media – the War on Terror is quite unlike any other conflict. It poses unique legal challenges. The Administration’s response has been both coherent and correct. A-Gs John Ashcroft and Judge Gonzales have done a fine job. (2) AUTHORITY FOR WAR UN authority for hostilities is clearly not required, any more than League of Nations authority was required for WW2. I will examine State Practice since 1945, concentrating on the Permanent Members of the Security Council; the glaring weaknesses of the UN Charter, a badly drafted if not botched instrument, and the case foe US withdrawal from the United Nations. Better practice would have been to declare war on Afghanistan and Iraq, with 9-11 as the casus belli in each case. (3) ABU GHRAIB Serious counter-intelligence failure. Fake photos should have been exposed and CBS taken to task within days of 60 Minutes going to air. Real danger of a failure of military justice arising from the botched prosecutions of the 372nd MPC, who were set up. Real issue at Abu Ghraib is not US ‘abuse’ but who set up the operation and why. The anti-US and anti-UK smear operations were linked - intelligence responses compared. British intelligence failed in its duty as an ally to alert the US to the fabrication of some of the photos, given that the US and British fakes were fabricated at the same time. Historic parallel with My Lai and SDECE narcotics operations in South Vietnam, modeled on earlier operations against the British Army. |
Wayne Simmons
|
| ||
Biography | |||
RECRUITED BY THE CIA IN 1973 WHILE IN THE
U.S. NAVY, WAYNE SIMMONS BECAME PART OF AN OUTSIDE PARAMILITARY SPECIAL
OPERATIONS GROUP THAT WAS NOT ONLY PREPARED TO DIE FOR AMERICA, BUT THEY
WERE PREPARED TO GO ANYWHERE AND DO VIRTUALLY ANYTHING WHEN ORDERED. HE
SPENT HIS CAREER IN THE CARIBBEAN, EUROPE, THE FAR EAST AND CENTRAL
ASIA WORKING AGAINST, NARCO-TERRORISTS, ARMS SMUGGLERS, COUNTERFEITERS,
CYBER-TERRORISTS AND INDUSTRIAL AND ECONOMIC ESPIONAGE. HE SPEARHEADED
DEEP COVER INTEL OPS AGAINST SOME OF THE WORLD'S MOST DANGEROUS DRUG
CARTELS FROM CENTRAL AND SOUTH AMERICA AND THE MIDDLE EAST. FOR 8 OF HIS 27 YEARS IN THE INTELLIGENCE BUSINESS, WAYNE SIMMONS, ATE SLEPT AND DRANK WITH NARCO-TERRORISTS AND SMUGGLERS WHILE HELPING TO CONDUCT SOME OF HIS NATIONS MOST IMPORTANT ANTI-DRUG, INTELLIGENCE GATHERING EFFORTS ON BEHALF OF THE CENTRAL INTELLIGENCE AGENCY. HIS DEEP COVER INTELLIGENCE OPERATIONS HELPED LEAD TO THE SEIZURES OF MARIJUANA, COCAINE AND HEROIN WITH A COMBINED VALUE OF OVER $1 BILLION DOLLARS. SIMMONS IS RIVETING WITH HIS SIMPLE MESSAGE: STOP RESTRICTING THE ABILITY OF THE CIA AND OTHER U.S. INTELLIGENCE AGENCIES TO OPERATE INSIDE AND OUTSIDE THE UNITED STATES, OR FACE THE CATASTROPHIC CONSEQUENCES OF TERRORISM. SIMMONS HARSHLY CRITICIZES THOSE WHO UNFAIRLY ATTACK THE CIA AND BELIEVES THAT 99.99% OF THE MEN AND WOMEN EMPLOYED BY THE CIA AND ALL OF THE U.S. INTELLIGENCE AGENCIES, ARE THE VERY FINEST, MOST MORAL, UPSTANDING, PATRIOTIC PEOPLE ON EARTH, SACRIFICING DAILY TO PROTECT THE AMERICAN PEOPLE. | |||
Seminar PE5: Finding and Keeping Intelligence Specialists Spies - Intelligence Agents & Analysts February 8, 09:00-11:30 | |||
| |||
Track2: DOD/Military DM2: Military Collection Inside America February 9 10:15-11:00 |
|||
|
Hon. Stanley Sporkin
|
| ||
Biography | |||
Judge Stanley Sporkin (Ret.) is a Partner at
Weil, Gotshal & Manges residing in its Washington, D.C. office.
Judge Sporkin's practice consists of counseling parties in SEC,
Corporate Governance and Litigation Matters. Because of his judicial
background, he also acts as an arbitrator and provides mediation
services. Judge Stanley Sporkin attended Pennsylvania State University from 1949-1953 and received his law degree from Yale University in 1957. Judge Sporkin spent twenty years with the SEC serving the last seven as the Director of the Division of Enforcement. He then went to the CIA where he served five years as the General Counsel. In 1985, President Ronald Reagan appointed him to the Federal Bench where he served as a United States District Judge for the District of Columbia for 14 years. | |||
Leader Seminar PE2: Political, Policy and Legal Issues February 8, 09:00-11:30 |
|||
|
Scott Swanson
|
| ||
Biography | |||
Mr. Swanson's specialty is strategic and
tactical intelligence collection and analysis with additional projects
in anti-trust investigations. With over 10 years of corporate
intelligence involvement, Scott has worked for Big 5 management
consultancies, operated a successful Executive Search and Research firm,
and has done extensive Industrial Intelligence/Counterintelligence
contracting. Scott has given a number of presentations and published articles within both the public and private sector regarding Globalization, Human Asset Networking, Indications and Warning Threat Analysis- Post 9/11, Intellectual Property Containment, counterintelligence exercises, and Maritime Port Security Vulnerability/Threat Assessments. | |||
Track 4: Business BN6: Global Risk Aversion: Role of the Corporate Intelligence Unit February 10, 10:15-11:00 | |||
Global Risk Aversion: Role of the Corporate Intelligence Unit
Abstract Government intelligence requirements have historically blended with aspects of corporate affairs, and will likely continue to do so in the future. From the corporate side, those businesses directly linked to the government or military have become involved with intelligence requirements, leaving those companies without such involvement in the dark. Due to restrictions on both sides of the public and private sector, collaboration with regard to national intelligence tasking and sharing strategic information is not always a viable solution. Such separations then require the government intelligence functions to include business acumen to their talent pools, and similarly corporations must enhance their fundamental intelligence capabilities. To date, however, many U.S. companies remain very conservative and unwilling to embrace more comprehensive efforts in collection and analysis, typically limiting such action to focus on competitors. Many of the government agencies remain conservative and unwilling to embrace realistic efforts to hire valuable individuals from the private sector to facilitate the business or economic factors of intelligence and national policy. Globalization of economies will require a quicker awakening to embrace the skills that understand more than competitive markets and include topical issues related to foreign culture, religions of the world, economies, social-political structures or movements, and emerging threats. Adding to those needs will be new specialists in the public sector who can rapidly recruit assets, collect in multiple environments, conduct analysis, and correlate the intelligence to business issues and national economic security. |
David Szady
|
| ||
Biography | |||
Mr. Szady currently serves as the Assistant
Director of the Counterintelligence Division, appointed to that position
March 2002 and reappointed following his mandatory retirement on
November 4, 2003. Mr. Szady's former position was as the National
Counterintelligence Executive (NCIX), a position created by a
Presidential Decision Directive in December 2000. Mr. Szady has over 30 years of service in the FBI, with 25 years experience in espionage and foreign counterintelligence investigations. He entered on duty with the FBI in September 1972 and was assigned to the FBI's Mobile, Alabama, Field Division where he worked general criminal investigative matters. | |||
Track 4: Business BN5: Industry and FBI Partnership for Counterintelligence February 10, 08:15-09:00 |
Bill Tierney
|
| ||
Seminar PE2: Political, Policy and Legal Issues
February 8, 09:00-11:30 |
|||
| |||
Seminar PE5: Finding and Keeping Intelligence Specialists - Translators February 8, 15:00-16:45 |
|||
Abstract There is an unspoken understanding among interrogators. If someone is smart enough to learn Chinese or Russian, they should be smart enough to persuade someone to talk. An interrogator who has to resort to violence to get cooperation is just showing that he doesn't have what it takes. Call it an egotistical method to stay on the straight and narrow. The concern has always been that infantrymen with prisoners taken in the heat of battle will dispense with the niceties and pull out their field telephone, complete with it handy electrical generator, and we interrogators would be painted with the same brush. That was all before the War to Defend Western Civilization from Jihad, know by some as the Global War on Terror. I went to Baghdad as an intelligence contractor in April 2004 confident of the superiority of the "Smarts-over-Smacks" method. But after close contact with an enemy that holds no code of civility, an enemy who is eager to kill both us and the Iraqis with the courage to work with us, an enemy who is capable of great feats of emotional manipulation, an enemy whose ultimate goal is a World map painted Islamic green, there comes a time to put aside our collective narcissism and question our underlying assumptions regarding torture, interrogation, and what it takes to win. |
Joe Trento
|
| ||
Biography | |||
Joseph Trento has spent more than 35 years as
an investigative journalist, working with both print and broadcast
outlets and writing extensively on national security issues. Before
joining the National Security News Service in 1991, Trento worked for
CNN's Special Assignment Unit, the Wilmington News Journal, and
prominent journalist Jack Anderson. Trento has received six Pulitzer
nominations and is the author of five books, the most recent of which is
The Secret History of the CIA.
| |||
Seminar PE8: Getting the Public Involved Stop Pandering to American People February 8, 10:45-11:30 |
|||
Stop Pandering to American People
Abstract Public support for the intelligence community requires the public to believe the community is competent and honest and not being misused by the government for political purposes. When the public discovers that a government institution has not leveled with them the consequences can lead to mission failure. Trento outlines examples of how a lack of candor has done crippling damage to US policy throughout our history and how it relates today. He will reveal for the first time new details of the Reagan/Bush Administration's relationship with Saddam and US relations with Saudi Arabia that exacerbated our future problems with Iraq and al Qaeda. He will make the case that the CIA's misuse by the Bush Administration in allowing certain anti-terrorism successes to be made public prematurely prevented British Intelligence from fully exploiting high-level al Qaeda officials in custody. Trento will also discuss how public claims by the Administration of the CIA's role in shutting down the Kahn network are without foundation. He will argue that such exaggerations and claims from the White House will have the effect of undermining the post 9.11 public unity in support of intelligence operations as the situation in affected regions continue to degenerate. |
Major General Paul E. Vallely, USA (Ret)
|
| ||
Biography | |||
Paul E. Vallely retired in 1991 from the US
Army as Deputy Commanding General, US Army, Pacific in Honolulu, Hawaii.
General Vallely graduated from the US Military Academy at West Point
and was commissioned in the Army in 1961 serving a distinguishing career
of 32 years in the Army. He served in many overseas theaters to include
Europe and the Pacific Rim Countries as well as two combat tours in
Vietnam. He has served on US security assistance missions on
civilian-military relations to Europe, Japan, Korea, Thailand, Indonesia
and Central America with in-country experience in Indonesia, Columbia,
El Salvador, Panama, Honduras and Guatemala. General Vallely is a graduate of the Infantry School, Ranger and Airborne Schools, Jumpmaster School, the Command and General Staff School, The Industrial College of the Armed Forces and the Army War College. His combat service in Vietnam included positions as infantry company commander, intelligence officer, operations officer, military advisor and aide-de-camp. He has over fifteen (15) years experience in Special Operations, Psychological and Civil-Military Operations. He was one of the first nominees for Assistant Secretary of Defense for Special Operations under President Reagan. From 1982-1986, he commanded the 351st Civil Affairs Command that included all Special Forces, Psychological Warfare and Civil Military units in the Western United States and Hawaii. He was the first President of the National Psychological Operations Association. His units participated in worldwide missions in Europe, Africa, Central America, Japan, Solomon Islands, Guam, Belgium, Korea and Thailand. He has served as a consultant to the Commanding General of the Special Operations Command as well as the DOD Anti-Drug and Counter -Terrorist Task Forces. He also designed and developed the Host-Nation Support Program in the Pacific for DOD and the State Department. Most recently, he has in-country security assistance - experience in El Salvador, Columbia and Indonesia in the development of civil-military relations interfacing with senior level military and civilian leadership. General Vallely is a military analyst for FOX News Channel and is a guest on many nationally syndicated radio talk shows. He is also a guest lecturer on the War on Terror. He has just co-authored a book entitled , "The Endgame", Winning the War on terror. | |||
Seminar PE3: Role of Congress in Intelligence Oversight
February 8, 09:50-11:30 | |||
Seminar PE4: Reforming the Intelligence Community
February 8, 14:00-16:15 |
|||
Track 2: DOD/Military DM3: Where we are in the Global War on Terror February 9, 14:00-14:45 |
Maria Velez de Berliner
|
| ||
Biography | |||
Ms. Velez de Berliner holds an Honors Master
in International Relations and International Security from the
University of Pittsburgh. She is a Phi Beta Kappa, Summa Cum Laude
graduate of Lake Forest College where she obtained a B.A. in
International Relations. In 2002 the Governor of Pennsylvania named her
one of Pennsylvania's Best 50 Women in Business. She lectures nationally
and internationally on international security threats in Latin America
and on how to do business internationally, profitably and safely. She is
interviewed and quoted often on business issues in Latin America,
including Brazil and Mexico, especially NAFTA, telecommunications,
biometrics, information technology, transportation, energy, agriculture,
and international security. She has also written and lectured on the
relationships China, the European Union, India, Asia, and Japan have
with Latin America.
She is a contributor to the Harvard Business Review América Latina,
Harvard Business Review Brasil, The Latin America Advisor, Satellite
News, Via Satellite, and Corporate Location Magazine in London. Her work
on transnational criminal organizations in Brazil was published by
Frank Cass Journals in London. Ms. Velez de Berliner serves on the Advisory Board of the Duquesne University's Small Business Development Center and is a member of the Board of Governors of the Rivers Club, Pittsburgh. She also serves on the Board of the Hopewell Fund, in Wheeling, West Virginia. | |||
Seminar PE7: Sharing Intelligence - Part 1
February 8, 09:00-11:30 |
|||
Abstract
Economic, regulatory, and geographic environments facilitate the financing and activities of criminal groups in three flash points in Latin America: The Triple Frontier (Brazil, Argentina, Paraguay), The Amazon/Orinoco Basin (Venezuela, Colombia, Brazil), and Tres Banderas (Belize, Guatemala, and Mexico). What the US must do to protect the underbelly of its War on Terror. |
Ben Venzke
|
| ||
Biography | |||
Ben Venzke is the founder and CEO of
IntelCenter which provides intelligence support to the intelligence, law
enforcement, military and security communities. He has been working for
the past 14 years to create professional-level intelligence products
that place timely, actionable intelligence into the hands of those who
need it, whether it is an operator prepping to perform an entry, an
analyst sitting at Langley, or a chief of police attempting to assess
the threat to his or her city. Venzke has recently co-authored "The
al-Qaeda Threat: An Analytical Guide to al-Qaeda's Tactics &
Targets", which has provided readers for the first time in a publicly
available format the ability to see what al-Qaeda has said in its own
words about targets and tactics. Venzke started his work on the
counterintelligence side with a focus on foreign intelligence agencies. | |||
Track 2: DOD/Military DM7: al-Qaeda's Messaging, Tactics and Targets February 10, 14:00-14:45 | |||
al-Qaeda's Messaging, Tactics and Targets
Abstract The focus of the session will be on understanding the tactics and targeting methodologies employed by al-Qaeda as well as the current threat environment. It will build and expand upon the material included in "The al-Qaeda Threat: An Analytical Guide to al-Qaeda's Tactics & Targets," co-authored by the presenter. The material will be heavily based on actual statements and communications made by al-Qaeda and will include analytical work on timing/targeting trends related to al-Qaeda's messaging efforts. Operational and training video by both al-Qaeda and its affiliate groups will also be shown. |
Dan Verton
|
| ||
Biography | |||
Dan Verton is the Vice President and Executive
Editor of IT*SECURITY Magazine, the nation's first Professional Journal
of IT Security & Infrastructure Protection. Dan is a former senior
writer for Computerworld magazine and Federal Computer Week in
Washington, D.C., and is the first-place recipient of the 2003 Jesse H.
Neal National Business Journalism Award for Best News Coverage for a
series of reports on wireless network security threats at some of the
nation's largest airlines and airports. Dan is also the author of the
highly acclaimed book Black Ice: The Invisible threat of Cyber-Terrorism
(McGraw-Hill, 2003), endorsed by some of the nation's top experts as
one of the best descriptions of the terrorist threat to critical cyber
infrastructures to date. | |||
Seminar PE8: Getting the Public Involved The Media and National Security: Views of an Intelligence Officer Turned Journalist February 8, 14:00-14:45 | |||
The Media and National Security: Views of an Intelligence Officer Turned Journalist
Abstract The War on Terror (WOT) is unlike the wars with which most Americans are familiar. This is a war that demands secrecy, a war that is and must be fought in the shadows and the dark places where our terrorist enemies live. It is also a war that will be won or lost on the nation's ability to collect, analyze, act upon and protect secret intelligence. So how do we balance the public's right to know (and from a homeland defense perspective, a "need to know") certain vital information about the WOT and the status of the nation's homeland defense initiatives? Dan Verton -- a former U.S. Marine Corps intelligence officer -- will discuss his experience as someone who has gone from being an officer entrusted to protect vital national secrets to a journalist who's job is to keep the public informed on what its government is doing in its name. Verton, an award-winning journalist and author, finds it to be a balancing act that he sometimes finds difficult to perform. During this presentation, he'll share his detailed experiences from both sides of this issue. |
Lorenzo Vidino
|
| ||
Biography | |||
Mr. Vidino is a native of Milan, Italy and the
organization's European expert. He speaks five languages and has a wide
range of valuable contacts in journalism and the intelligence
communities both in Europe and the United States. Mr. Vidino evaluates
and analyzes legal documents for The Investigative Project and works
closely with government officials, producing fact sheets on terrorist
activity and leadership. His articles on terrorism and Middle Eastern affairs have appeared in several publications, including the Wall Street Journal, National Review Online, The National Interest, Middle East Quarterly and several European newspapers. Mr. Vidino is often asked to review other terrorism experts' material for substantive accuracy. He regularly appears on NBC Nightly News, Fox News, MSNBC and Canadian TV as a terrorism expert, with a specialty on terror in Europe and Al Qaeda. Mr. Vidino has a law degree. | |||
Seminar PE7: Sharing Intelligence - Part 1 February 8, 09:00-11:30 |
|||
|
Chris Westphal
|
| ||
Biography | |||
Mr. Westphal is co-founder and CEO of Visual
Analytics. He guided the growth of the company from launch into an
increasingly important provider of critical data analytic capabilities.
The flagship application, VisuaLinks, has steadily expanded in power and
sophistication, leading to its adoption by federal and local law
enforcement, all major US intelligence agencies, the Department of
Defense, civilian agencies, international Financial Intelligence Units
(FIUs), as well as large corporations. Mr. Westphal is a recognized authority in the detection and exposure of complex patterns. He has applied his expertise in commercial domains including forensic accounting, embezzlement, and fraud. He works closely with government programs addressing organized crime - including the Office of National Drug Control Policy (ONDCP), as well as agencies countering narco-terrorism, money laundering, and insider trading, including the Financial Crimes Enforcement Network (FinCEN), Internal Revenue Service (IRS, Criminal Investigations Division), Anti-Money Laundering Office (Thailand), U.S. Customs Service, Defense Intelligence Agency, Defense Information Systems Agency (DISA), and a number of joint DoD programs involved with national security. Mr. Westphal received his B.S.E. from Tulane University and has over 18 years of experience in advanced analytics utilizing data mining, visualization, and artificial intelligence technologies. His second book, Data Mining Solutions, was published by John Wiley and Sons in 1998. He has also authored numerous papers for symposia, conferences, professional journals, and newsletters addressing data visualization, expert systems, and other advanced analytical issues. He is routinely asked to speak and participate on technology panels on advanced analytical systems and data mining methodologies. | |||
Track 3: State and Local Law Enforcement SL2: Intelligence Technology February 9, 10:15-11:00 | |||
Intelligence Technology
Abstract Chaos is a common term used to represent extreme confusion, disorder, and disarray. Much of the intelligence production process used throughout law enforcement, the intelligence community, and other investigative organizations is based on accessing, combining, analyzing, and reporting on data that comes from multiple sources in different formats spanning across many systems. The chaos introduced from variations in content, formats, spellings, errors, and other incompatibilities makes it very difficult to understand and detect the patterns in the data. As new systems and technologies are introduced into marketplace, they offer better methods standardize, classify, clean-up, disambiguate, and provide better clarity on the data. This paper discusses a number of chaotic factors associated with data and novel techniques and approaches for clarifying their use in proactive analytics with a specific focus on the use network diagramming and visual charting. |
Ted Whetstone
|
| ||
Biography | |||
Ted Whetstone has been working product and
market development issues in high technology for over fifteen years. In
1998 he returned to the United States after starting up and operating a
highly successful U.S. electronics subsidiary in Tokyo, Japan. Mr.
Whetstone then joined MitoSystems, Inc., headquartered in Santa Monica,
California heading up applications and product development of the
Mitopia system. He has been instrumental in developing relationships
and educating parts of the Intelligence community about Mitopia. Mr.
Whetstone graduated in 1987, with a B.S. in Material Science &
Engineering from Cornell University. |
|||
Track 2: DOD/Military DM5: Are We Losing our Edge on Technical Collection? February 10 08:15-09:00 | |||
Abstract
In the asymmetric war on terrorism, the enemy hides and attacks while we are in the open and must defend. In this scenario, our "offense" is more of an active defense - we strike when we have actionable intelligence about the enemy. The cost of satellites and current collection methods is already high, and getting much higher. From what is basically a reactive stance, two things limit our ability to succeed: 1) quality of the intelligence collected, and 2) the ability to take action intelligence a timely manner. Current technical collection systems were not designed to address a highly decentralized and distributed foe. Worse yet is how current information systems act on collected information. They are too slow to react and adapt. These shortcomings will be discussed. Additionally, a completely novel and mature solution to these shortcomings will be presented. A solution capable of taking advantage of open source information and other structured and unstructured data from collection sources at the same time. |
Lt. Herb Williams
|
| ||
| |||
Track 3: State and Local Law Enforcement SL8: Intelligence Training February 10, 15:00-15:45 |
Gen. James Williams, USA (Ret)
|
| ||
Biography | |||
General Williams focused the DIA on enhancing
support to tactical and theater commanders, improving capabilities to
meet major wartime intelligence requirements, and strengthening
indications and warning assets. In December 1981, President Reagan
signed Executive Order 12333 giving the Intelligence Community a mandate
for the years ahead. In response to a requirement to improve intelligence support to the Unified and Specified (U&S) Commands' warfighting capabilities, the functional manager for intelligence processing was established in 1982. Under General Williams' direction DIA established the first terrorism billet in the National Military Intelligence Center, created the Secure Analytic File Environment (SAFE) to support analysts, and laid the groundwork for the Defense HUMINT Service by having the Director DIA designated Functional Manager for HUMINT. They also created the National Military Intelligence Support Terminals (NMIST) which were flyaway kits providing data link capability for deployed units to the SIPERNET. | |||
Seminar PE7: Sharing Intelligence - Part 2
February 8, 14:00-16:45 |
Hon. R. James Woolsey
|
| ||
Biography | |||
R. James Woolsey joined FDD in August, 2002, as a
Distinguished Advisor. Previously Mr. Woolsey was a partner at the law
firm of Shea & Gardner in Washington, D.C., where he practiced for
twenty-two years, on four occasions, beginning in1973; his practice was
in the fields of civil litigation, alternative dispute resolution, and
corporate transactions. During the twelve years he has served in the U.S. Government Mr. Woolsey has held Presidential appointments in two Democratic and two Republican administrations. He was Director of Central Intelligence in 1993-95. He also served as: Ambassador to the Negotiation on Conventional Armed Forces in Europe (CFE), Vienna, 1989-1991; Under Secretary of the Navy, 1977-1979; and General Counsel to the U.S. Senate Committee on Armed Services, 1970-73. He was appointed by the President as Delegate at Large to the U.S.-Soviet Strategic Arms Reduction Talks (START) and Nuclear and Space Arms Talks (NST), and served in that capacity on a part-time basis in Geneva, 1983-1986. As an officer in the U.S. Army he was an adviser on the U.S. Delegation to the Strategic Arms Limitation Talks (SALT I), Helsinki and Vienna, 1969-1970. Mr. Woolsey has been a Director or Trustee of numerous civic organizations, including The Smithsonian Institution, where he was Chairman of the Executive Committee of the Board of Regents, Stanford University, The Goldwater Scholarship Foundation, and The Aerospace Corporation. He has been a member of: The National Commission on Terrorism, 1999-2000; The Commission to Assess the Ballistic Missile Threat to the U.S. (Rumsfeld Commission), 1998; The President's Commission on Federal Ethics Law Reform, 1989; The President's Blue Ribbon Commission on Defense Management (Packard Commission), 1985-1986; and The President's Commission on Strategic Forces (Scowcroft Commission), 1983. He is currently a Trustee of The Center for Strategic & International Studies; Chairman of the Advisory Committee of the Clean Fuels Foundation; and Vice Chairman of the Advisory Board of Global Options LLC. Mr. Woolsey is presently a member of the Board of Directors or Board of Managers of: Information Systems Laboratories, Inc. (ISL); Linsang Partners, LLC; Fibersense Technology Corporation; Invicta Networks, Inc.; DIANA, LLC; and Agorics, Inc. He has served in the past as a member of the Boards of Directors of: BC International Corporation; Sun HealthCare Group, Inc.; USF&G; Yurie Systems, Inc.; Martin Marietta; British Aerospace, Inc.; Fairchild Industries; Titan Corporation; and DynCorp, and as a member of the Board of Governors of the Philadelphia Stock Exchange. Mr. Woolsey was born in Tulsa, Oklahoma, in 1941. He is married to Suzanne Haley Woolsey, the Chief Communications Officer of the National Academies (Science, Engineering, and Medicine) and they have three sons: Robert, Daniel, and Benjamin. Mr. Woolsey attended Tulsa public schools, graduating from Tulsa Central High School in 1959. He received his B.A. Degree in 1963 from Stanford University (With Great Distinction, Phi Beta Kappa), an M.A. from Oxford University, where he was a Rhodes Scholar 1963-65, and an LL.B from Yale Law School in 1968, where he was Managing Editor of the Yale Law Journal. Mr. Woolsey is a frequent contributor to major publications, and from time to time gives public speeches, on the subjects of foreign affairs, defense, energy, and intelligence. | |||
Luncheon: The Long War of the 21st Century
February 8, 12:15-13:45 |