Page 1

SA Intelligencer Number 74

5 April 2010 Initiator: Johan Mostert Editor: Dalene Duvenage Contributions and enquiries dalene@4knowledge.co.za

Reports from 31 March - 5 April 2010 Africa: 1. Nigerian soldier urges collective security mechanism for Africa

2. DRC/China intelligence relations 2. Nigeria: Ribadu is Nigeria’s new anti-corruption Czar 2. Israeli spy held in Algeria with false passport

Middle East 3. Yemen court upholds death sentence for man accused of contacting Israel Europe 3. UK: Elite intelligence unit to “take down” crime lords 4. Netherlands: Espionage threat assessment 4. Moroccan-Dutch policeman to face spying trail 4. Kremlin accused of KGB-style honey traps Asia 5. India: Commonwealth Games: Private detectives volunteer for intelligence gathering 5. Chinese city is world’s hacker hub Americas 6. Colombia, Venezuela, silent on alleged spy arrests 6. US: Iranian Scientist’s defection is intel coup Terrorism 7. US to adopt new air security policy 8. CIA handed profiles of British Muslim students People 9. UK: In memoriam: Daphne Park Noteworthy 10. UK Intelligence and Security Committee Report 2009-2010 10. The UK’s Strategy for countering international terrorism 10. US DHS/CBP Female suicide bomber threat assessment 10. Africa: Illicit cash outflows cost Africa $1.8 trillion in 38 years 11. 6 ways Law Enforcement uses social media to fight crime Books Events

Books

Africa Nigerian soldier urges collective security mechanism for Africa Abuja - Pana 01/04/2010 Nigeria's Chief of Defence Staff, Air Chief Marshal Paul Dike, has called for a collective security mechanism approach in Africa to address the daunting security challenges confronting the continent. In a lecture, delivered at the renowned Royal United Services Institute (RUSI) for Defence and Strategic Studies, London, titled "Nigeria and the Quest for an Enduring Security Mechanism in Africa", Air Chief Marshal Dike said this had become necessary as Africa was confronted with several security challenges posing direct threats to peace, security and development on the continent. He noted that given the withering of international boundaries as a result of globalization, these challenges also had the potential to impact on security in the wider global arena. Air Chief Marshal Dike compartmentalized the security challenges into three broad categories -- socio-political, criminal and environmental security challenges. According to him, trans-national terrorism made possible by the porosity of Africa’s borders, weak governments and ineffectual national security systems in Africa, is another key issue that is now receiving attention at security desks, both at the national and continental levels.He said these security challenges had ensured that many African states remained weak and devoid of necessary capacity to perform most of the basic functions of the state. Air Chief Marshal Dike said the logical consequence was the frequent outbreak and persistence of crisis, insecurity and instability to the detriment of growth and development, adding that the ECOWAS Regional Security Mechanism which served as a model and impetus for the continental version would be strengthened to offer effective collective security mechanism in Africa. http://www.afriquejet.com/news/africa-news/nigerian-soldier-urgescollective-security-mechanism-for-africa-2010040146962.html


5 April 2010

SA Intelligencer

Number 74

2

DRC/China Intelligence relations Ma Xioatian, deputy head of the People's Liberation Army (PLA) travelled to the Democratic Republic of Congo March 12-13 to strengthen the SIGINT and ELINT Chinese interception stations operating in the country. (Intelligence Online)

Nigeria: 'Ribadu is Nigeria's new anti-corruption Czar' Lagos - Pana 05/04/2010 Self-exiled former head of Nigeria's anti-graft Economic and Financial Crimes Commission (EFCC), Mr. Nuhu Ribadu, is now the country's new anti-corruption Czar, after he was appointed as the Special Adviser on anticorruption to Acting President Goodluck Jonathan, the local NEXT newspaper reported exclusively Sunday, confirming speculations making the rounds on the issue. In his new post, the paper said Ribadu would oversee the country's anti-corrupti on agency, including the EFCC.''Let me say it is true that I have been contacted,'' he said of the appointment, saying it is the moral duty of Nigerians to support all efforts to save our country. The government set the stage for

the appointment by withdrawing charges filed against Ribadu at the Code of Conduct Tribunal, for allegedly failing to declare his assets while in office. Ribadu, 49, went on self exile in 2009, after he was removed as EFCC chairman and fired from the police. He is currently in Washington DC where he is about concluding a fellowship at the Centre for Global Development, a Think Tank in the US capital. Analysts said Nigeria's anti-corruption battle has taken a nose-dive under the new dispensation. However, Acting President Jonathan has made the fight against corruption a major plank of his administration's policy.

http://www.afriquejet.com/news/africa-news/nigeria:-%27ribadu-is-nigeria%27s-new-anti-corruptionczar%27-2010040547134.html

Israeli spy held in Algeria with false passport Wed, 31 Mar 2010 Algerian forces have arrested an Israeli spy with a false Spanish passport amid the international outcry over use of forged passports by Mossad agents in terrorist operations. Algerian officials say the agent who used the name of Alberto Vagilo was arrested ten days after he arrived in the North African country. Security sources note that the agent entered south Algeria in midMarch from Barcelona in Spain. According to the sources, he had passed himself off as a

35-year-old Spanish man. Earlier, it was reported that an al-Qaeda-linked group had abducted a Spanish citizen only to be denied later by Algerian and Spanish authorities. That person turned out to be the alleged spy. The new arrest was made not long after Israeli agents assassinated a high-ranking Hamas official in Dubai. Last week, Britain expelled a senior Israeli diplomat amid a diplomatic row with Tel Aviv over the use of UK passports to plot the assassination.

http://www.presstv.ir/detail.aspx?id=122164&sectionid=351020506


5 April 2010

SA Intelligencer

Number 74

3

Middle East Yemen Court Upholds Death Sentence for Man Accused of Contacting Israel Heather Murdock | Sana'a 03 April 2010 over any evidence against his client. And even On Saturday, a Yemeni appeals court upheld if he is guilty of the single e-mail exchange, he the death penalty against a man who once is not guilty of treason. stood accused of being an Islamic Jihadist but now has been convicted of offering to work According to the government, al-Haidari is as an Israeli spy. accused of sending an e-mail, in Arabic, that says "We are the Jihad Organization and you In Yemen, in the popular conscience, there are Jews but you are honest and we are ready are few things worse than being an Israeli for anything." spy. And according to a Yemeni court on Saturday, even attempting to spy for Israel is The response, which is believed to be in considered treason, and punishable by death. Hebrew, allegedly says, "We are ready to support you to be a stumbling block to the Bassam al-Haidari was first sentenced to Middle East and we will support you as death in March 2009. He had been convicted agents." of contacting former Israeli Prime Minister Ehud Olmert by email, and on Saturday the Barman says al-Haidari was arrested for appeals court upheld his sentence. He has political reasons, and because he had been one final appeal to Yemen's highest court. harassing the Yemeni government for years. Al-Haidari has repeatedly made threats to Lawyer and human rights activist Abdulbomb foreign embassies. Rahman Ali Barman says his client is no spy. Barman says the courts have refused to hand http://www.globalsecurity.org/intell/library/news/2010/intell-100403-voa01.htm

Europe UK: Elite intelligence unit to 'take down' crime lords (Ed: excerpted) An elite unit aimed at tackling organised crime, human trafficking and serious fraud has been officially opened by the justice secretary. Kenny MacAskill said the Scottish Intelligence Co-ordination Unit (SICU) would gather information about top gangsters in a bid to "take them down." It is part of the Scottish Crime and Drug Enforcement Agency (SCDEA). It was created to act as the "brain" of law enforcement in Scotland, bringing together intelligence and finance specialists. They will work closely with the country's eight police forces and co-ordinate and assess knowledge about the activities of criminal gangs, to develop more effective ways of

preventing, detecting and dismantling serious organised crime. The unit will also be home to Scotland's first dedicated expert resources for the coordination of intelligence on human trafficking, and serious and complex fraud. Dep Chf Con Gordon Meldrum, director general of the SCDEA, said: "The gathering and sharing of intelligence is a powerful tool in the fight against serious organised crime. "The more we know about the 'who, what and how' of organised crime's activities, the better equipped we are to bring them down. "However, knowledge is worthless unless it is turned into action. This is the central purpose of the SICU and already the entire Scottish


5 April 2010

SA Intelligencer

Number 74

4

Police Service is realising the benefits of this new resource." http://news.bbc.co.uk/2/hi/uk_news/scotland/glasgow_and_west/8592525.stm

Netherlands: Espionage threat assessment 1 April 2010 Technological developments and welleducated immigrants have made the Netherlands more vulnerable to espionage, according to the Dutch secret service AIVD. In a vulnerability analysis to be presented to parliament, the AIVD says it is aware that the Netherlands has been subject to espionage in the past. “Scientific institutions, governments and companies are not always aware of the value of their information,” the service explains on their website, “and most information can be accessed quite easily.” The organisation also points out that some recent developments have caused additional security lapses. A policy to attract welleducated foreigners to the Netherlands means foreign intelligence officers posing as

immigrants can get hold of valuable information. Outsourcing system and server management to other countries have also provided foreign intelligence services with easy access to valuable data. The vulnerability analysis includes an inventory of valuable knowledge in the Netherlands and reveals several strategies foreign intelligence services employ to obtain information. The Dutch Secret Service do not seem too concerned about protecting this information: the entire security analysis can be found on the service’s website.

http://www.rnw.nl/english/article/dutch-easy-spy Download the threat assessment in Dutch at https://www.aivd.nl/actueel/@126104/item-126104

Moroccan-Dutch policeman to face spying trial The Rotterdam policeman who was sacked says he was pressurised both physically and after being accused of spying for Morocco is mentally while on a trip to see relatives in to appear in court next week. Morocco. They are also said to have been put under pressure. Moroccan-Dutch Ré Lemhaouli is facing charges of public service corruption and His spying activities are reported to have breach of his official secrets pledge. The news gone on for just over two years. Prior to his of his prosecution broke after Dutch arrest, Mr Lemhaouli was held up as an television programme obtained a copy of the example of a member of the Moroccan summons. immigrant community who had successfully integrated into Dutch society. As such, he was The former officer had access to various involved in a work placement project for classified police systems and is accused of disadvantaged youngsters. passing the information on to the Moroccan embassy in exchange for money. His lawyer http://www.expatica.com/nl/news/dutch-rss-news/moroccan-dutch-policeman-to-face-spyingtrial_34705.html

Kremlin accused of KGB-style 'honey traps' The Telegraph, March 29, 2010 Editor: Dalene Duvenage

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

Number 74

5

The Kremlin has been accused of sanctioning snorting cocaine in the company of a semia Soviet-style dirty tricks campaign against naked glamour model. opposition politicians and journalists using Ilya Yashin, an anti-Kremlin politician who vintage KGB entrapment techniques of featured in the apparent bribe video, alleges money, drugs and women. the same honey trap was set for him in the The allegations follow the release of a string same Moscow apartment used to of videos on the web purporting to show an compromise Fishman. He said he grew opposition politician, a political analyst and suspicious when a girl offering to sleep with the editor of the Russian edition of him offered him cocaine "to relax" minutes Newsweek magazine in compromising after she and a "girlfriend" had foisted a situations. Hidden cameras in police cars number of sex toys upon him. show them apparently offering to bribe their Sensing he was being set up, Yashin said he way out of traffic offences. made a hasty exit. Another video appears to show Mikhail Fishman, the Russian Newsweek editor, http://www.calgaryherald.com/entertainment/Kremlin+accused+style+honey+traps/2737780/stor y.html#ixzz0kEszPjkp

Asia India: Commonwealth Games: Private detectives volunteer for intelligence gathering PTI, April 5, 2010

New Delhi: Over 25,000 private detectives across the country will offer their services to Delhi police in gathering intelligence to prevent any untoward incident during the upcoming Commonwealth Games. The Association of Private Detectives and Investigators (APDI), an umbrella body of 3,000 private detective agencies, will soon submit its proposal to Delhi Police chief Y S Dadwal in this regard. "We have a strong force of 25,000 detectives across the country. They are experienced and have solved many

tough cases. The association has felt that its agents can help in gathering intelligence and keeping untoward incidents at bay especially during the Games, " APDI chairman Kunwar Vikram Singh said. He said the agents can easily mingle with common people without inviting any suspicion from criminals. Commonwealth Games, one of the biggest sporting events hosted by India, are scheduled here between October 3-14 thisyear.Government has made it clear that adequate security arrangements will be made at all the Games venues and sites.

http://www.dnaindia.com/india/report_commonwealth-games-private-detectives-volunteer-forintelligence-gathering_1367636

Chinese city is world’s hacker hub Michael Sheridan, Far East Correspondent A CITY in eastern China has been identified as the world capital of cyber-espionage by an American internet security company. The firm traced 12 billion emails in a study which showed that a higher number of “targeted attacks� on computers come from China than previously thought.

Editor: Dalene Duvenage

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

Number 74

6

Researchers for Symantec found almost 30% ultimate aim ... is to gain access to sensitive of “malicious” emails were sent from China data or internal systems by targeting specific and that 21.3% came from the city of individuals or companies,” the report said. Shaoxing alone. They were able to identify Symantec succeeded in tracing individual key targets for the hackers as experts in Asian computer registration numbers, known as IPs, defence policy and human rights activists, to find the true source of the attacks. strongly suggesting state involvement. Previously, hackers in China had been able to Symantec is assisting the investigation into camouflage themselves behind servers in suspected hacking attacks on Google, which Taiwan. closed its website in China last week rather The findings show China was the source of than censor itself on behalf of the ministry of 28.2% of global targeted attacks. It was state security. followed by Romania, with 21.1%, presumed Cyber-espionage uses emails sent in small to be mostly attempts at commercial fraud. volumes with legitimate-looking attachments The United States came third, followed by or documents to fool the user into letting a Taiwan and then Britain, with 12% of attacks. malicious code infect their computer. “The http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article7078760.ece

Americas Colombia, Venezuela, silent on alleged spy arrests April 5, 2010 , Intelnews.org Caracas and Bogota are remaining silent on served in the same Colombian military unit in the arrests of eight alleged Colombian spies in Medellin, namely the Colombian Army’s 4th northwest Venezuela. Eight people, members Brigade. These latest arrests can be seen in of a factory-owning family in Barinas, were the context of rapidly spiraling intelligence charged with espionage last week, after Luis wars in Latin America, especially between Carlos Cossio, 52, was allegedly caught Colombia and Venezuela, two countries photographing a telecommunications tower which recently broke off all diplomatic belonging to DISIP, Venezuela’s premier relations. Last October, Caracas arrested an intelligence agency. Cossio, who is a dual undisclosed number of Colombian Venezuelan-Colombian citizen, was arrested intelligence agents, who were allegedly on Tuesday, along with his relative, Santiago “captured carrying out actions of espionage”. Giraldo, 21. Two days later, Venezuelan In January of this year, the Colombian counterintelligence agents raided the family’s government announced the expulsion of two factory in Barinas, arresting six more alleged Venezuelan intelligence agents, members of the same family. Colombian reportedly for conducting espionage media report that at least two of the operations on Colombian soil. detainees, Cossio and Cruz Elva Giraldo, http://intelligencenews.wordpress.com/2010/04/05/01-428/

US: Iranian Scientist's Defection Is Intel Coup EU News Network April 01, 2010 The CIA is declining to comment on reports that an award-winning Iranian nuclear

Editor: Dalene Duvenage

scientist who disappeared last year has defected to the United States.

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

Number 74

7

The exclusive report by ABC News said Shahram Amiri's defection was part of a CIA operation to woo Iranian nuclear scientists with family contacts in the United States. The CIA was said to have approached him through an intermediary in Iran who offered Amiri resettlement in the United States. ABC said Wednesday it learned about Amiri from people briefed on the operation by intelligence officials. Those officials termed

Amiri's defection as "an intelligence coup," ABC said. "The significance of the coup will depend on how much the scientist knew in the compartmentalized Iranian nuclear program," said Richard Clarke, an ABC news consultant and former White House counter-terrorism official. Last year, Iranian Foreign Minister Manouchehr Mottaki and other Iranian officials accused the United States of kidnapping Amiri. http://www.officialwire.com/main.php?action=posted_news&rid=122781&catid=848

Terrorism US to adopt new air security policy The United States has announced new security measures to replace the mandatory screening of air travellers from 14 countries, imposed after the failed attack on a flight in December. The measures are designed to significantly reduce the number of passengers pulled aside for additional screening and will not be based on nationality or passport, but on characteristics pulled together by intelligence agencies.The new screening strategy, announced on Friday, results from a review ordered by Barack Obama, the US president.Janet Napolitano, the department of homeland security secretary, said the new measures would "utilise real-time, threatbased intelligence along with multiple, random layers of security, both seen and unseen, to more effectively mitigate evolving terrorist threats". Travellers will be picked out according to how closely they match intelligence on potential terrorist threats. A senior administration official, who spoke to reporters on condition of anonymity, said the new system would require travellers who match information about terrorism suspects, such as a physical description, partial name or

Editor: Dalene Duvenage

travel pattern, to undergo additional screening. "So it's much more tailored to what the intel is telling us, what the threat is telling us, as opposed to stopping all individuals of a particular nationality or all individuals using a particular passport," the official said. He described the measures being scrapped as a "blunt-force instrument". The names of terrorism suspects identified by the US government will continue to be included on security watch lists and no-fly lists as a part of airline security. The new policy affects US citizens, as well as travellers coming into the United States from abroad. The measures in force since January required that passengers travelling to the US from 14 countries be subjected to especially rigorous pre-flight screening. The 14 countries were those on the US list of "state sponsors of terrorism" Cuba, Iran, Sudan and Syria - as well as Afghanistan, Algeria, Iraq, Lebanon, Libya, Nigeria, Pakistan, Saudi Arabia, Somalia and Yemen. Saudi Arabia, Algeria and Nigeria - US partners in the fight against al-Qaeda - were angered at being included on the list. Under

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

Number 74

8

the new measures, if there was information security officials. US officials have been about an individual of interest coming from a consulting with countries and foreign carriers particular Asian country who recently with direct flights to the United States about travelled to certain countries in the Middle airline security, the administration official East and was of a certain nationality and age said. "It is designed to be much more tailored range, that data would be compared with so that we don't stop everybody coming from travellers to the United States at foreign a certain country, because that information is airports. out, and if I'm a terrorist, the last thing I want Anyone who fits the data could be subjected to do then is send somebody with this to additional screening procedures and pulled passport, going that way," the official said. aside for questioning by airline or airport http://english.aljazeera.net/news/americas/2010/04/20104221057983259.html

CIA handed profiles of British Muslim students April 03, 2010, LONDON (Ed: Excerpted) the latest Personal information concerning the private case, lives of almost 1,000 British Muslim details of students from University College university students is to be shared with US London (UCL) were handed over to police by intelligence agencies in the wake of the the university's student union, after Detroit bomb scare. detectives visited the campus in early January The disclosure has outraged Muslim groups 2010 during their continuing investigation and students who are not involved in into the attempted Christmas Day bombing in extremism but have been targeted by police Detroit by Umar Farouk Abdulmutallab. and now fear that their names will appear on Abdulmutallab studied engineering at UCL in international terrorist watch lists. So far, the 2005-08, and was president of the UCL homes of more than 50 of the students have Islamic Society in 2006-07. been visited by police officers, but nobody Police had first approached UCL's Islamic has been arrested. The case has raised Society, which refused to hand over the concerns about how the police use the data information. Mojeed Adams-Mogaji, the of innocent people and calls into question the society's president, said: "I was concerned heavy-handed treatment of Muslim students about what they would do with the data. At by UK security agencies. This week, MPs another meeting with the Metropolitan criticised the Government's key policies on Police, they told us they would keep it for countering extremism which they said were seven years and would share the data with alienating Muslim communities. other intelligence agencies if requested. Last year, The Independent reported on the Obviously, I'm very concerned with what they alleged harassment of young Muslims by the plan to do with this information." police and security service, MI5, whose officers had tried to recruit them as spies. In http://www.thenews.com.pk/updates.asp?id=102082

Editor: Dalene Duvenage

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

Number 74

9

People UK: In memoriam: Daphne Park (Ed: excerpted) Daphne Park, the Baroness of Monmouth, who died on 31 March 2010 aged 88, was one of Britain's most remarkable spies; her distinguished career in the Secret Intelligence Service (SIS) culminated in her appointment as Controller Western Hemisphere in 1975, the highest post ever occupied by a woman. She retired early from SIS in 1979 and was elected principal of Somerville College, Oxford, where she remained until 1989. But as one of the first women to do a fully operational job throughout her SIS career, Park demonstrated that a woman could be an immensely competent officer on the ground. Extracting information in the middle of an African jungle or burning top secret documents (and then hiding the ashes in her underpants) were simply part of the job. Though she once talked her way out of being lynched by a mob, she did not dream of carrying a gun. Nor was she treated as an honorary man. Though formidable, she was quite capable of using her femininity to her advantage. During her time as consul-general in Hanoi in 1969, the confidential talks she enjoyed with the Soviet ambassador owed something of their success to his chauvinistic attitudes toward women. She was, however, realistic about her capacity to conduct "honeytrap" operations, noting: "Do I look like Mata Hari?" Her acts of courage reaped rich rewards. She once smuggled Lumumba's private secretary to safety in the truck of her little Citroen 2CV. "(The car) was excellent cover," she said. "Nobody ever takes 2CVs seriously. But that's Editor: Dalene Duvenage

not why I had it -- if they'd let me loose in anything bigger I'd have been lethal. My director once told me the bravest thing he'd ever done in his life was to be driven round by me." Lumumba's secretary subsequently became head of the Intelligence Service in the new government, and one of the most useful sources in Park's career. On another occasion, she was driving a LandRover when she saw a machete-wielding mob coming towards her. She jumped out, stuck her head under the bonnet and told her potential attackers: "Thank goodness you've come along -- I think I have a problem with my carburetor." The men laid down their weapons and offered their assistance."I always looked just like a fat missionary, which was very useful," she said in later life. "Missionaries get around, you know." Her tradecraft was impeccable. SIS had taken on the case of a Russian spy in Canada who had been turned by Canadian authorities but then recalled to the Soviet Union. There were fears that he had been compromised, and he was instructed to appear, alone, in a particular Moscow street at a particular time carrying a shopping bag in his left hand.Park was sent to the rendezvous. When he arrived with the bag in his right hand, and in the company of a woman, she correctly surmised that he was indicating that he had indeed been compromised. She admitted that, during her career as an agent, she had been terrified on several occasions. "There are frightening moments and there are moments when you should have been frightened but weren't," she said. "I do not have courage, but I do have a mixture of curiosity and optimism." Despite the awful sights to which she had been witness, Park continued to display that optimism in her final years. "This is a

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

Number 74

10

marvellous world," she said. "I wish I could go on and on." http://www.vancouversun.com/ranking+female/2733905/story.html

Noteworthy UK: Intelligence and Security Committee Report 2009-2010 Ed: Interesting sanitized report about the state of the UK’s intelligence agencies. http://www.cabinetoffice.gov.uk/media/348175/isc-annualreport0910.pdf

The United Kingdom’s Strategy for Countering International Terrorism http://security.homeoffice.gov.uk/news-publications/publication-search/contest/CONTEST-annualreport-20102835.pdf?view=Binary

U.S. DHS/CBP Female Suicide Bomber Threat Assessment Ed: A basic document to use for operational/intelligence officers. Also useful to determine indicators. http://www.opensourcesinfo.org/journal/2010/3/31/us-dhscbp-female-suicide-bomber-threatassessment.html

Africa: IIlicit Cash Outflows Cost Africa U.S.$1.8 Trillion in 38 Years - GFI 30 March 2010 - Lagos (ed: Excertpted) Lagos — A new study released yesterday in Washington DC, United States of America (USA) by the Global Financial Integrity (GFI) indicates that Africa lost over $1.8 trillion in illicit financial outflows from 1970 through 2008. The study placed Nigeria at the op of the ladder in illicit outflows among SubSaharan African countries. Titled "Illicit Financial Flows from Africa: Hidden Resource for Development", the new study however focused more on illicit financial outflows from just one source: trade mispricing. It however did not take a look into outflows from mispricing of services and Editor: Dalene Duvenage

smuggling. According to the study, the "massive flow of illicit money out of Africa is facilitated by a global shadow financial system comprising tax havens, secrecy jurisdictions, disguised corporations, anonymous trust accounts, fake foundations, trade mispricing, and money laundering techniques." It stated that "the impact of this structure and the funds it shifts out of Africa is staggering. It drains hard currency reserves, heightens inflation, reduces tax collection, cancels investment, and undermines free trade. It has its greatest impact on those at the bottom of income scales in their countries, removing resources that could

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

Number 74

11

otherwise be used for poverty alleviation and and Central Africa region, which includes economic growth." Nigeria, is by far the dominant driver of illicit flows from the Sub-Saharan region. Nigeria's The new report which is expected to be influence is also behind illicit flows from the tabled at the third Annual Conference of group of "fuel exporters". However, the lack African finance ministers in Malawi, notes of data related to countries in other groups that "the amount of money that has been actually overstates the proportion of West drained out of Africa-hundreds of billions and Central Africa in illicit outflows. Hence, decade after decade-is far in excess of the the long-term evolution of illicit flows from official development assistance going into the different regions of Africa need to be African countries." interpreted with caution in light of these data Examining data for a 38-year range from 1970 gaps. to 2008, key report findings include: that total "Sub-Saharan Africa registered the highest illicit financial outflows from Africa, growth rates in over 30 years during the conservatively estimated, were period 2000-2008 underpinned by high approximately $854 billion; total illicit commodity prices, improved macroeconomic outflows from Africa may be as high as $1.8 policies, and structural reforms in a number trillion; sub-Saharan African countries of countries. The acceleration in growth was experienced the bulk of illicit financial mainly driven by the oil-producing countries outflows with the West and Central African with capacity increases in Angola and the region posting the largest outflow numbers. Republic of Congo and new production in It said the top five countries with the highest Mauritania. However, during the last nine outflow measured were: Nigeria ($89.5 years of the study 2000-2008, when Subbillion) Egypt ($70.5 billion), Algeria ($25.7 Saharan Africa enjoyed its strongest period of billion), Morocco ($25 billion), and South sustained economic growth, the pace of illicit Africa ($24.9 billion) adding that illicit flows from the region also accelerated financial outflows from Africa grew at an relative to previous decades. Some of the average rate of 11.9 percent per year. acceleration in illicit outflows was "When the G20 meets in Canada this June, undoubtedly driven by oil price increases and the problem of illicit financial flows must be increased opportunities to misinvoice trade at the top of the agenda," he said. that typically accompany increasing trading A concluding remark on the study stated: volumes. The rates of outflow in illicit capital "While the overwhelming bulk of this loss in for West and Central Africa (20.4 per cent) as capital through illicit channels over the period well as Fuel-exporters (21.8 per cent) over 1970-2008 was from Sub-Saharan African the entire period 1970-2008 reflect countries, there are significant disparities in substantial outflows from Nigeria and Sudan." the regional pattern of illicit flows. The West http://allafrica.com/stories/201003300305.html Complete study: http://www.gfip.org/storage/gfip/documents/reports/gfi_africareport_web.pdf

6 Ways Law Enforcement Uses Social Media to Fight Crime Lon S. Cohen (Ed: I’m a sucker for seeing how intelligence and law enforcmenet agencies use new technologies and social tools. This is

Editor: Dalene Duvenage

an excellent article about how the US & UK

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

police use social media in their fight against crime. ) From felons on Facebook to tips through Twitter, social media is being used more and more by law enforcement agencies, and not just to fight Internet-related crimes. We’re talking about solving crimes that are happening on the street and in your community. According to Lauri Stevens, founder of LAwS Communications and organizer of the SMILE (Social Media In Law Enforcement)

Number 74

12

Conference being held in Washington D.C. this April, adoption of social media is still in the “very, very, early stages,” but she sees it making an upward turn. “I expect 2010 will be a monumental year,” she said. But many police departments that have embraced social media are still trying to figure it out. Below are six different ways law enforcement is utilizing social media and realtime search to enhance tactics, disseminate public information, and ultimately prevent criminal activity.

1. Police Blotter Blogs A police blotter is the record of events at a police station. Traditionally, a desk sergeant kept a register of these events. Nowadays, Twitter ( ) feeds, blogs, YouTube ( ), and Facebook ( ) Fan Pages are being used by captains and chiefs to put out the digital equivalent of the police blotter in real-time. Publishing a register of crimes and arrests in an area has been an online activity for a while now, especially through local newspaper websites. But social media is allowing many police officers on the scene to report the publicly available details of a crime for

themselves. Reporters are getting their facts directly from a stream of real time-data and blog posts coming from the department. Individual cops aren’t about to turn into citizen journalists anytime soon, but the police are able, through social media and real-time updates, to provide essential information that the public and news gathering agencies need to know. Journalists today often use the web for their first line of research, and rely on web-based police reports for many of the details they need for a story.

2. The Digital “Wanted Poster”

In the vein of an Old West “Wanted” poster, displayed in the most trafficked area of town, modern-day law enforcement agencies are posting descriptions of criminals on today’s most trafficked spots — namely the social Editor: Dalene Duvenage

web. With millions of users, extraordinary reach, and the lightning-fast exchange of text, photos, and video, platforms like Twitter, Facebook, and YouTube are ideal for getting the word out about wanted persons with up-

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

to-the-minute updates. The Boynton Beach Police Department is a good example. On their Facebook Fan Page, the department put up a post with the headline, “Police need help identifying motorcyclist who robbed man at ATM.” In the post there was a photo from the ATM machine of the crime in progress. The department also cross-posted the information to their Twitter page. In the UK, the Leicestershire Constabulary is one of a number of police departments focusing on being hyper-local and involved with the community through social media. Their website has a section titled “Can you

Number 74

13

help?” which is formatted like a blog, and contains posts about ongoing criminal investigations, and a “Wanted Poster” and “Missing Persons” area with photos and requests for residents to respond with any leads they might have. The stories are also fed to a Facebook Page that is very interactive and updated constantly. They also maintain a Twitter profile, a YouTube account, and the department offers the ability to subscribe to their news feed via RSS. It’s an impressive mixture of social media tools that seems to work fluidly and update automatically.

3. Anonymous E-Tipsters Tips from the community have been a time-honored way that citizens have worked with the public text tips and secure social media publishing.” to fight crime. Filtered alerts can then be pushed out Consulting companies are developing very through a police department’s central sophisticated ways for the public and the location to other web mediums. Bundled with police to interact online. The tip411 program other offerings, tip411 can then be published developed by the CitizenObserver with Google Maps ( ) to create a clickable, Corporation is marketed to law enforcement interactive crime “heat map” of sorts where as a web-based notification toolset. Citizen others can click on links directly to add more participation has always been a big part of information and tips based on location. This fighting crime, and the people at tip411 stress program is meant to encourage increased that social media “acts as a ‘force multiplier’ interaction between the police and the by empowering your community to get community through real-time web tools. involved.” “It doesn’t matter to us where the “Anonymous text tip systems are gaining information comes from,” said Detroit’s Chief significant traction because they enable of Police, Warren Evans, a tip411 user. “We young people to provide information without just want the information so we can act on it. fear of retribution, i.e. ‘Snitches get I want people to know that they can feel safe Snitches,’” said CitizenObserver’s Terry using this system to communicate with us Halsch. The program allows tipsters to send directly.” information anonymously through a variety of means including “anonymous web chat,

4. Social Media Stakeout Social media advocates stress listening as a part of any brand’s online marketing strategy. Listening to the bad guys doing bad things has always been a part of police work. It’s important for police to search the real-time web to target particular keywords and phrases being passed around on social media. Editor: Dalene Duvenage

Use of social media monitoring has a strategic, tactical and operational application for law enforcement. Boston Police Department Superintendent John Daly spoke about using Twitter search to monitor chatter around the Boston area in real-time. He’s very sensitive to the

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

implications of engaging in this type of search, as many police departments are. “We have to be very careful because there’s a Big Brother aspect to this,” Daly said.He stressed that they were not looking at “everyday messages,” as he put it, but specific tweets that signaled something they should be looking into.

Number 74

14

“But when people start saying, ‘What’s that smoke coming from the Hancock Tower?’ or ‘Why is everybody running around Copley Place –- is something going on?’ — if two or three things come in we look at patterns, trends, something maybe we should be paying attention [to]. So it’s sort of an early warning system.”

5. Thwarting Thugs in the Social Space Myspace ( ), Facebook and Twitter are popular with gang members, and police use this to their advantage. Law enforcement has been able to infiltrate street gangs by posing as fellow gang members online, making connections, and intercepting criminal communications as they happen. Information like photos, videos, and friend links help law enforcement understand the dynamics of gangs when investigating their activities. “Investigators build phony profiles to ‘friend’ gang members either within YouTube, Facebook or Bebo ( ), and then may migrate that friendship to another platform and gain trust and get their ‘friends’ to share useful information,” said SMILE conference organizer Lauri Stevens. According to an article in 219magazine, police in Cincinnati used Facebook and MySpace to

follow more than 20 members of a local gang, the “Northside Taliband.” The evidence they gathered helped law enforcement connect members to a multitude of crimes, including a possible homicide. Other agencies have employed these tactics as well. The NYPD is using the Internet to monitor gang activity, as well, and in a story reported in the Daily News, cops said that gangs have been communicating on Twitter. They think that one Twitter exchange between gang members may even have resulted in the shooting of a youth. The police seek out code words and slang used by individual members to follow gang members online who are organizing illegal activities. “It is another tool … just like old phone records,” a police source said in the article.

6. Tracking and Informing with Twitter As we all know, Twitter has plenty of uses for individuals and companies. Law enforcement also uses the service to communicate with the public. Stevens told us that she follows at least 700 law enforcement agencies worldwide on Twitter alone. Not all of them are active, but some have found unique ways to incorporate Twitter into their police tactics. “The LAPD used Twitter to monitor crowds during the Michael Jackson ( ) funeral,” for example, said Stevens, and the

Editor: Dalene Duvenage

Boston Police have been using Twitter to alert followers of evolving situations in real time. Sergeant Tim Burrows does media relations for the traffic services unit in the Toronto Police Service. Tim saw his traffic safety messaging hampered by the mainstream media’s editing time lines, so he started using Twitter to talk to the local media about

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

Number 74

15

Since it was rolled out, CyberVisor has been ongoing situations and inform the public. He used to broadcast information about considers his tweets about traffic safety unfolding situations, such as crimes in information a valuable public service. progress, to put out information after a bank The Broward County Sheriff’s Office took robbery and when the Sheriff’s Office was things a step further. When the police wanted looking for an escaped convict. For now, the to utilize social media they, like many public can’t respond to CyberVisor — it’s agencies, felt that existing public sites were broadcast only — but it has still be effective. too unsecured and vulnerable for a systemIn one instance, they alerted followers to wide roll out within the department. So someone in South Broward County inspired by Twitter, the department took impersonating an officer. In another, they things into their own hands. sent out a missing child alert from a local “CyberVisor was my vision of Broward County elementary school with a detailed description Sheriff’s Office’s own controlled Twitter,” said of the child’s physical appearance and where Lynne Martzall, External Affairs Manager, the child was last seen. who worked with webmaster Tony Petruzzi to create it. http://mashable.com/2010/03/17/law-enforcement-social-media/

Books Structured Analytic Techniques for Intelligence Analysis Authors: Richards J. Heuer and Randolph H. Pherson Richards J. Heuer Jr. and Randolph H. Pherson turn a lifetime of expertise toward formalizing, adapting, and standardizing a set of 50 of the most robust analytic techniques in use in intelligence analysis today. This ready reference showcases current and cutting-edge best practices and represents a significant leap forward in depth, detail, and utility from existing handbooks. Logically organized and richly illustrated, Structured Analytic Techniques makes it easy to navigate, reference, and put the tools to use right away. Each technique is clearly and systematically explained: when to use, value added, the method, potential pitfalls, examples of how it can be used, its relationship to other techniques, and its origins. “Heuer and Pherson’s book is an answer to the call that intelligence analysis must improve. Their structured analytical techniques will enrich the analyst’s ability to think, debate and make decisions about the implications of events, threats or opportunities in all fields of study. Applying these practical techniques will reduce our cognitive blind spots by helping us to be mindful of how we think and by more rigorous in the analytical process. The book also aims to shift our current reliance on the individual’s analysis abilities to a shared and social sense-making process where our collective insights make intelligence relevant again. This collaborative approach seeds continuous learning, knowledge sharing and trust on both individual and organizational levels- a goal worth striving for. - Dalene Duvenage, owner, 4Knowledge Analysis Solutions http://www.cqpress.com/product/HeuerPherson.html

Editor: Dalene Duvenage

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

Number 74

16

A Genius for Deception How Cunning Helped the British Win Two World Wars Nicholas Rankin In February 1942, intelligence officer Victor Jones erected 150 tents behind British lines in North Africa. "Hiding tanks in Bedouin tents was an old British trick,null writes Nicholas Rankin; German general Erwin Rommel not only knew of the ploy, but had copied it himself. Jones knew that Rommel knew. In fact, he counted on it--for these tents were empty. With the deception that he was carrying out a deception, Jones made a weak point look like a trap. In A Genius for Deception , Rankin offers a lively and comprehensive history of how Britain bluffed, tricked, and spied its way to victory in two world wars. As he shows, a coherent program of strategic deception emerged in World War I, resting on the pillars of camouflage, propaganda, secret intelligence, and special forces. All forms of deception found an avid sponsor in Winston Churchill, who carried his enthusiasm for deceiving the enemy into World War II. Rankin vividly recounts such little-known episodes as the invention of camouflage by two French artist-soldiers, the creation of dummy airfields for the Germans to bomb during the Blitz, and the fabrication of an army that would supposedly invade Greece. Strategic deception would be key to a number of WWII battles, culminating in the massive misdirection that proved critical to the success of the D-Day invasion in 1944. Deeply researched and written with an eye for telling detail, A Genius for Deception shows how British used craft and cunning to help win the most devastating wars in human history. http://www.oup.com/us/catalog/general/subject/HistoryWorld/British/?view=usa&ci=9780195387049

Spycraft: The Secret History of the CIA's Spytechs, from Communism to Al-Qaeda ~ Robert Wallace, H. Keith Melton, Henry R. Schlesinger Wallace is well positioned to write this organizational and operational history of the CIA’s Office of Technical Service; he was OTS director from 1998 to 2002. The tales he tells are not out of school (the CIA permitted this book’s publication), but they will lure readers fascinated by the cloak-and-dagger aspects of espionage. Regaling readers with the paraphernalia CIA case officers use in running their agents––audio devices, miniature cameras, secret writing, disguises, codes, dead drops, etc.––Wallace and his coauthors well capture the spy-versus-spy dynamic. Tapping cold war battles between the CIA and the KGB, the authors’ narratives show how spy gear must be tailored to specific locations and the agent’s personality. The ingenuity this tasking has required of the OTS constitutes the pride and soul of Wallace’s presentation, which describes the custom designs delivered to the field for various operations. Amply illustrated with photographs and diagrams, Wallace’s work conveys the critical minutiae of clandestine activity, where one slipup can kill an agent, to spy buffs and CIA applicants alike

Editor: Dalene Duvenage

Click on hyperlinks to open documents

dalene@4knowledge.co.za


5 April 2010

SA Intelligencer

25 ANS DANS LES SERVICES SECRETS Years in the Secret Service)

Number 74

17

(25

by PIERRE SIRAMY (Author), LAURENT LEGER Maurice Dufresse, alias Pierre Siramy, has written a memoir in French entitled “Twenty-five years in the Secret Service” (“25 ans dans les services secrets. • • • •

• • • • • • • • • • •

Publisher: FLAMMARION (ÉDITIONS) (April 6 2010) Language: French ISBN-10: 2081232618 ISBN-13: 978-2081232617

Events April 11-14, Geospatial Intelligence Middle East 2010, The Diplomat Radisson SAS Hotel, Residence & Spa, Manama, Bahrain April 14-15: Counter Terror Expo, London, UK April 23-25: International Intelligence History Association Conference, Munich, Germany April 28-30: Global Security International Exhibition & conference, New Delhi, India May 3-7: IALEIA/LEIU Conference May 2010, Orlando May 23-26:IEEE International Conference on Intelligence and Security Informatics, May 2010, Vancouver May 25-26: Quantitative Methods in Defense and National Security 2010: George Mason University May 25-27 :International Association For Intelligence Education (IAFIE) Annual Conference, Ottawa, Canada July 11-13:The Dungarvan Conference 2010: Analytic Best Practices. Dungarvan, Ireland July 27-29: Intelligence – The Next Domino? Australian Institute of Professional Intelligence Officers (AIPIO) Annual Conference: Melbourne, Australia August 09-11: International Symposium on Open Source Intelligence & Web Mining 2010 (OSINT-WM 2010) Odense, Denmark

Publishing the Intelligencer is a labour of love, an awareness campaign, and an educational vehicle. It will not be used for commercial purposes and email addresses are confidential. Previous editions can be found at http://4knowledge-za.blogspot.com/ Notice: The SA Intelligencer does not confirm the correctness of the information carried in the media, neither does it analyse the agendas or political affiliations of such media. The SA Intelligencer’s purpose is informing our readers of the developments in the world of intelligence for research and environmental scanning purposes. We only use OSINT from free open sources and not those from fee-based sources. The SA Intelligencer contains copyrighted material - the use of which has not been specifically authorized by the copyright owner. We do not take responsibility for the correctness of the information contained herein. The content has been harvested from various news aggregators, web alerts, lists etc. This work is in the Public Domain. To view a copy of the public domain certification, visit http://creativecommons.org/licenses/publicdomain/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Contact Dalene Duvenage at dalene@4knowledge.co.za should you wish to subscribe or unsubscribe.

Editor: Dalene Duvenage

Click on hyperlinks to open documents

dalene@4knowledge.co.za

SA Intelligencer #74  

An journal of developments in the world of intelligence

Advertisement